One of the fastest ways to trigger me in a work context these days is to whisper "Mustang Panda". Instant menty b β¨
One of the fastest ways to trigger me in a work context these days is to whisper "Mustang Panda". Instant menty b β¨
In addition to espionage threat actors, financially motivated cybercriminals have been exploiting the WinRAR vulnerability CVE-2025-8088.
The highly effective ecrime actor, typically seen distributing Koi Stealer/Koi Loader (TA4561), was observed doing so in Fall 2025.
Details. ‡οΈ
Alongside this activity recently highlighted by Google (cloud.google.com/blog/topics/...), Proofpoint threat researchers have observed additional exploitation of WinRAR vulnerability CVE-2025-8088 by stateβaligned groups linked to China and the DPRK.
The report includes a section on suspected RU-aligned actor UNK_AcademicFlare, which has been very active using compromised gov/mil emails to target gov, think tanks, academia & transport sectors in US/EU, often via weeks-long benign rapport building prior to delivering a device code phish.
New espionage/e-crime crossover blog from the team on the continued rise of device code phishing by state-aligned and financially motivated groups.
A study in the evolution of SVR cyberespionage tradecraft
@volexity.com tracks a variety of threat actors abusing Device Code & OAuth authentication workflows to phish credentials, which continue to see success due to creative social engineering. Our latest blog post details Russian threat actor UTA0355βs campaigns impersonating European security events.
1/ Today we release a new report exposing previously undisclosed entities connected to the wider #Intellexa ecosystem as well as newly identified activity clusters in Iraq and indications of activity in Pakistan: www.recordedfuture.com/research/int...
PlugX C2: doorforum[.]com
I'm just glad I'm not the one being shut up this time
New Iran drop from me tracking an attribution nightmare - UNK_SmudgedSerpent! A little Charming, a little Muddy, and a lot C5. Targeting policy experts with benign conversation starters, health-themed infra, OnlyOffice spoofs, and RMMs. Check out the full story www.proofpoint.com/us/blog/thre...
Proofpoint threat researchers have designed an open-source toolβnamed PDF Object Hashingβto track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint. π«
We use this tool internally to help track multiple threat actors with high confidence.
π£ π₯ ποΈ SAVE THE DATE ποΈ π₯ π£
The next #PIVOTcon will be on 6-8 May 2026, in Malaga, ES!!!
You favorite ;) #ThreatResearch conference is coming back and we are planning to bring you the usual experience and content of utmost quality. Follow us + #StayTuned for more info
#CTI #ThreatIntel #PIVOTcon26
Good piece covering a big burst of TA416 activity targeting European governments last week!
First public report at Recorded Future by yours truly is out! RedNovember (formerly TAG-100, a.k.a. Storm-2077) is a Chinese state-sponsored threat group focused on intelligence collection, especially on flashpoint issues of strategic interest to China. www.recordedfuture.com/research/red...
Proofpoint threat researchers have published new research identifying a new cyber-espionage campaign by #TA415 (#APT41), a China-aligned threat actor, exploiting growing uncertainty in U.S.-China economic relations.
Blog: www.proofpoint.com/us/blog/thre....
Our reporting overlaps this recent WSJ article:
www.wsj.com/politics/nat...
See our full research here:
www.proofpoint.com/us/blog/thre...
TA415 infection chain diagram
In these campaigns, TA415 delivered infection chains to set up VS Code Remote Tunnels π This is in line with recent TA415 phishing operations over the past year, which have relied on legit services (e,g, Google Sheets, Google Calendar, VS Code) for C2 to blend w/ trusted traffic
π¨π¨π³π° New @threatinsight.proofpoint.com blog on TA415 (aka APT41) economy and trade-themed spearphishing against US govt, think tanks & academia.
The campaigns used U.S.-China economic lures and spoofed the Chair of the House Select Committee on CCP competition + the US-China Business Council.
It is time the Mustang Panda moniker went the way of Winnti Group β οΈ
1/ We've just released a new report uncovering new infrastructure tied to multiple activity clusters linked to the Israeli spyware vendor #Candiru across several countries. Full report: www.recordedfuture.com/research/tra...
π¨πππ New blog from me and the amazing @threatinsight.proofpoint.com team covering recent activity by multiple China-aligned threat actors targeting semiconductor companies in Taiwan over the past few months:
www.proofpoint.com/us/blog/thre...
New: A handful of Chinese-linked cyber espionage groups are stepping up targeting of Taiwanese semiconductor companies, per new analysis from @proofpoint.com. Campaigns include targeting of financial analysts focused on the sector as well: www.reuters.com/sustainabili...
New DISCARDED podcast drop! Join
@greg-l.bsky.social and me as we talk about our fave North Korean groups, DPRK as the neglected child, TA406 and the Russian connection, and finally, the dreaded but pervasive IT worker problem podcasts.apple.com/us/podcast/c...
open.spotify.com/episode/01d1...
Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals @selenalarson.bsky.social itβs got it all:
π°οΈ Popped routers for sending phish
π ACH on attribution
πΎ custom protocols
π½ cool malware
π΅οΈ crime
π― espionage
βmany unanswered questions
www.proofpoint.com/us/blog/thre...
π¨ Weβre hiring at Recorded Futureβs Insikt Group
Two senior analyst roles are open right now. Both focus on tracking nation-state threats.
π§΅
Today weβre publishing new findings on Predator spyware, still active despite global sanctions, now with a new client and ties to a Czech entity. Hereβs what we found π§΅
www.recordedfuture.com/research/pre...
Dropping some joint research today with Threatray on TA397/Bitter π
We dive into the confluence of signals that led us to our attribution of the threat actor π―
Shoutout to @konstantinklinger.bsky.social and Threatray for collaborating on this research.
www.proofpoint.com/us/blog/thre...
From phishes to hands-on-keyboard commands π₯ new @proofpoint.bsky.social research from @nickattfield.bsky.social and @konstantinklinger.bsky.social on Indian state-sponsored actor TA397 (Bitter) with a great story on the steps to technical and political attribution www.proofpoint.com/us/blog/thre...