APT28
Country: Russia ๐ท๐บ
Targets: Ukraine ๐บ๐ฆ (#1), NATO / EU
APT36
Country: Pakistan ๐ต๐ฐ
Targets: India ๐ฎ๐ณ (#1), Afghanistan ๐ฆ๐ซ, Bangladesh ๐ง๐ฉ, Sri Lanka ๐ฑ๐ฐ
Gamaredon
Country: Russia ๐ท๐บ
Targets: Ukraine ๐บ๐ฆ (#1)
- Following Gamaredons Infrastructure Rotations using Kraken
- Gamaredon: Now Downloading via Windows Updates Best Friend “BITS”
- Defending Against Gamaredon: Practical Controls That Actually Work
- Gamaredon: Same Goal, Fewer Fingerprints
- GamaWiper Explained: Gamaredonโs “New” Anti-Analysis Weapon
- Inside Gamaredon 2025: Zero-Click Espionage at Scale
- How a Russian Threat Actor Uses a Recent WinRAR Vulnerability in Their Ukraine Operations
MuddyWater
Country: Iran ๐ฎ๐ท
Targets: Iraq ๐ฎ๐ถ, Saudi Arabia ๐ธ๐ฆ, United Arab Emirates ๐ฆ๐ช, Jordan ๐ฏ๐ด, Turkey ๐น๐ท, Israel ๐ฎ๐ฑ, Germany ๐ฉ๐ช, United States ๐บ๐ธ
- Observed Telegram Bot Naming Patterns in Recent MuddyWater Malware Activity
- RustyStealer: Your Compiler Is Snitching on You
- MuddyWater: When Your Build System Becomes an IOC – “Jacob”
North Korea
Country: North Korea ๐ฐ๐ต
Targets: Democracy
UAC-0226
Country: UNKNOWN
Targets: Ukraine ๐บ๐ฆ (#1)
All
- Obfuscation Without Effort: Breaking a UAC-0226 GIFTEDCROOK Stealer
- Following Gamaredons Infrastructure Rotations using Kraken
- Observed Telegram Bot Naming Patterns in Recent MuddyWater Malware Activity
- APT28: Geofencing as a Targeting Signal (CVE-2026-21509 Campaign)
- Why Is a North Korean Mail Server Using a .cc Domain? – Threat Intelligence Beyond Malware
- RustyStealer: Your Compiler Is Snitching on You
- Gamaredon: Now Downloading via Windows Updates Best Friend “BITS”
- MuddyWater: When Your Build System Becomes an IOC – “Jacob”
- Defending Against Gamaredon: Practical Controls That Actually Work
- Gamaredon: Same Goal, Fewer Fingerprints
- GamaWiper Explained: Gamaredonโs “New” Anti-Analysis Weapon
- Inside Gamaredon 2025: Zero-Click Espionage at Scale
- How a Russian Threat Actor Uses a Recent WinRAR Vulnerability in Their Ukraine Operations
- APT36 – “Abaris” Deobfuscating VB Dropper
- APT44 – Sandworm Team
- APT1