Global cyber-espionage campaign breaches sensitive targets in 37 countries
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Google flags intensifying cyber campaigns against the global defense supply chain
Google’s Threat Intelligence Group alerts that coordinated cyber campaigns against firms and personnel in the defense industrial base are increasing, combining long‑dwell implants, commodity exploit reuse, and LLM-assisted social engineering. The advisory urges identity‑first controls, extended cross‑domain telemetry to suppliers and staff, hardware-backed MFA and governed agentic automation to shorten attackers’ windows and blunt supply‑chain impact.

Google disrupts UNC2814 GridTide espionage campaign
Google and partners dismantled a cloud‑hosted espionage operation that used spreadsheets and SaaS APIs as covert command channels, attributed to the actor UNC2814 and a backdoor called GridTide . The takedown affects at least 53 organizations across 42 countries and highlights an accelerating trend: cloud services are becoming primary vectors for stealthy state‑linked intrusions.
India targeted by Pakistan‑linked APT36 in coordinated three‑pronged RAT campaign
A Pakistan‑linked actor tracked as APT36 is conducting coordinated espionage against Indian government and defense networks using three distinct RAT families across Windows and Linux hosts, emphasizing stealthy persistence and in‑memory execution. The tradecraft mirrors broader long‑duration intrusion campaigns—including session orchestration and social‑engineering techniques—so defenders should prioritize cross‑domain telemetry, identity‑first controls, and rapid session protections to detect and disrupt access.
Investigation Links ShinyHunters to Broad Vishing Campaign Targeting Over 100 Organizations
Researchers say a coordinated campaign combined telephone-based social engineering with browser-resident phishing toolkits to target more than 100 organisations across sectors, manipulating live authentication sessions to bypass MFA and SSO protections. A contemporaneous but separate infostealer disclosure — an unsecured cache of roughly 149 million credential pairs captured from endpoints — heightens the risk of credential-stuffing and targeted vishing, complicating response and containment.
Italy thwarts Russian-linked cyber intrusions aimed at foreign ministry and Winter Olympics sites
Italian authorities say they disrupted cyber intrusions against diplomatic web properties and online services tied to the Milan-Cortina 2026 Winter Olympics, publicly linking the activity to actors with ties to Russia. Independent security analysis from Palo Alto Networks frames the activity as part of a wider espionage campaign — dubbed the "Shadow Campaign" and tracked as TGR‑STA‑1030 — that uses long‑duration implants, polymorphic loaders, browser‑resident scripts and telephone social engineering, underscoring the need for rapid technical sharing and identity‑first mitigations.

US–Israel Strikes Trigger Widespread Cyber Operations Against Iran
Coordinated US and Israeli kinetic strikes were followed by broad cyber campaigns that disrupted Iranian networks — including a reported nationwide internet outage lasting at least 48+ hours — and targeted intrusions against energy, aviation and government systems. U.S. authorities raised domestic readiness while investigators traced parallel long‑duration espionage activity spanning dozens of countries, creating a complex mix of denial, disruption and intelligence‑collection operations amid noisy attribution.
Cyberwar in 2026: Pre-positioning, AI and the Blurred Line Between Crime and Statecraft
Nation-state operations are increasingly about long-term pre-positioning inside critical infrastructure rather than one-off disruptive strikes, and the rapid spread of generative and agentic AI lowers the barrier to assemble and coordinate complex campaigns. That convergence — together with scalable impersonation, commodified access in underground markets, and the latent threat from future quantum decryption — forces defenders to prioritize early detection, identity-first controls, post-quantum planning, and calibrated public–private response mechanisms.

Cisco SD‑WAN Compromised; CISA and Five Eyes Order Emergency Hunts
CISA and Five Eyes partners warned of active exploitation against Cisco SD‑WAN, flagging two tracked CVEs and urging immediate hunts, log preservation, and patching. The alert joins a string of rapid, high‑impact exploit events (Fortinet, SolarWinds and other KEV additions), compressing remediation windows and forcing both near‑term incident response and longer‑term edge‑device inventory and replacement planning.