The targeting of Iran foreign policy experts reflects the Iranian government's intel collection priorities.
The targeting of Iran foreign policy experts reflects the Iranian government's intel collection priorities.
The hybrid style tradecraft—mixing social engineering, Microsoft 365 credential theft, and RMM software—is rarely used by state-aligned groups.
The hybrid style tradecraft—mixing social engineering, Microsoft 365 credential theft, and RMM software—is rarely used by state-aligned groups.
Our blog has recommendations, Emerging Threat Labs signatures, and IOCs for reference.
Our blog has recommendations, Emerging Threat Labs signatures, and IOCs for reference.
While the activity we detail in our report focuses on North America, it’s a global problem.
While the activity we detail in our report focuses on North America, it’s a global problem.
⬇️
Once the trucker replies, they infect them with malicious RMMs to overtake their company. They then try to bid on real loads to intercept and pick them up.
⬇️
The stolen physical goods are sold.
⬇️
Once the trucker replies, they infect them with malicious RMMs to overtake their company. They then try to bid on real loads to intercept and pick them up.
⬇️
The stolen physical goods are sold.
Here’s how it works:
Here’s how it works:
Threat actors are combining #socialengineering w/ transportation industry knowledge to steal real physical goods. brnw.ch/21wX9UA
Threat actors are combining #socialengineering w/ transportation industry knowledge to steal real physical goods. brnw.ch/21wX9UA
Learn more about it here: brnw.ch/21wWSH0
#PDF #threatdetection #cyberthreat
Learn more about it here: brnw.ch/21wWSH0
#PDF #threatdetection #cyberthreat
🚩 Upon discovery of a suspected malicious application in the environment, we suggest immediately invalidating all client secrets and removing all existing certificates.
🚩 Upon discovery of a suspected malicious application in the environment, we suggest immediately invalidating all client secrets and removing all existing certificates.
Our blog shows they’re increasingly weaponizing #OAuth applications to maintain persistent access in the cloud—even after #passwords are reset or #MFA is enforced.
This persistence poses a growing risk to modern enterprises.
Our blog shows they’re increasingly weaponizing #OAuth applications to maintain persistent access in the cloud—even after #passwords are reset or #MFA is enforced.
This persistence poses a growing risk to modern enterprises.
Historically, this actor focused on North America and the UK. TA584 expanded its targeting to include European entities including Germany since 1 July 2025.
Historically, this actor focused on North America and the UK. TA584 expanded its targeting to include European entities including Germany since 1 July 2025.
XWorm C2: 85[.]208[.]84[.]208:4411
SharpHide Payload: 85[.]208[.]84[.]208/x.jpg
XWorm C2: 85[.]208[.]84[.]208:4411
SharpHide Payload: 85[.]208[.]84[.]208/x.jpg