From November 2023 to April 2024, Insikt Group identified cyber-espionage activities conducted by RedJuliett, a likely Chinese state-sponsored group, primarily targeting government, academic, technology, and diplomatic organizations in Taiwan. RedJuliett exploited known vulnerabilities in network edge
Continue ReadingCategory: Recorded Future
OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen
SummaryInsikt Group's research reveals that OilAlpha, a likely pro-Houthi group, continues to target humanitarian and human rights organizations operating in Yemen. They use malicious Android applications to steal credentials and gather intelligence, potentially to control aid
Continue ReadingCaught in the Net: Using Infostealer Logs to Unmask CSAM Consumers
SummaryIn this proof-of-concept report, Recorded Future's Identity Intelligence analyzed infostealer malware data to identify consumers of child sexual abuse material (CSAM). Approximately 3,300 unique users were found with accounts on known CSAM sources. A notable 4.2%
Continue ReadingSombres Influences: Russian and Iranian Influence Networks Target French Elections
SummaryInsikt Group's research assesses that Russian and Iranian influence networks are targeting the upcoming French elections, and so far, they are having a negligible impact. The Russia-linked Doppelgnger network uses cloned websites and social media bots
Continue Reading5 Threat Intelligence Solution Use Cases
Cyber threats are becoming increasingly sophisticated and frequent, making it imperative for organizations to leverage cyber threat intelligence to stay ahead of potential cyber attacks. Organizations across all industries are recognizing the importance of implementing robust
Continue ReadingChinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation
From November 2023 to April 2024, Insikt Group identified cyber-espionage activities conducted by RedJuliett, a likely Chinese state-sponsored group, primarily targeting government, academic, technology, and diplomatic organizations in Taiwan. RedJuliett exploited known vulnerabilities in network edge
Continue ReadingWhat Is Open Source Intelligence (OSINT)?
Open Source Intelligence (OSINT) is the practice of gathering, analyzing, and disseminating information from publicly available sources to address specific intelligence requirements.Of all the threat intelligence subtypes, open source intelligence (OSINT) is perhaps the most widely
Continue ReadingRansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates
RansomHub, a new ransomware-as-a-service (RaaS) platform, emerged in February 2024, targeting Windows, Linux, and ESXi systems with malware written in Go and C++. Its high 90% commission rate attracts seasoned affiliates, leading to a surge in
Continue ReadingThe Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications
Recorded Futures Insikt Group identified that Vortax, a purported virtual meeting software, spreads three infostealersRhadamanthys, Stealc, and Atomic macOS Stealer (AMOS). This extensive campaign targets cryptocurrency users, exploiting macOS vulnerabilities. Operated by the threat actor markopolo,
Continue ReadingIsrael-Hamas Conflict and US Elections Drive Violent Extremist Threats in 2024
The ongoing Israel-Hamas conflict, the upcoming 2024 US presidential election, and the rise of violent extremist content online are likely to escalate homegrown and domestic violent extremist (HVE and DVE) threats. HVEs and DVEs are expected
Continue Reading