India targeted by Pakistan‑linked APT36 in coordinated three‑pronged RAT campaign
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Global cyber-espionage campaign breaches sensitive targets in 37 countries
A coordinated, long-duration hacking campaign has established persistent access to high-value government and diplomatic networks in 37 countries, prioritizing intelligence collection over immediate disruption. The operation leverages polymorphic tooling, credential harvesting and social-engineering techniques that complicate detection and raise urgent needs for identity-focused defenses and cross-border incident coordination.

APT37 expands toolkit to pierce air gaps using removable media and cloud C2
Zscaler observed a December 2025 APT37 campaign that combined five newly identified modules — including a memory‑resident loader, a backdoored interpreter runtime, a USB relay spreader and an Android surveillance app — to pierce air‑gapped enclaves while using a mainstream cloud storage service for command-and-control. Defenders should couple stricter removable‑media controls with identity‑first telemetry and cross‑service signal fusion; platform takedowns help but do not eliminate the underlying tradecraft.

Malware Campaign Used Hugging Face to Host Android RAT Payloads
Security researchers discovered an Android remote-access Trojan distributed via a dropper that redirected victims to Hugging Face-hosted payloads. The campaign used short-lived repositories and frequent payload updates to evade takedowns while abusing a popular model-sharing platform as a file host.
Italy thwarts Russian-linked cyber intrusions aimed at foreign ministry and Winter Olympics sites
Italian authorities say they disrupted cyber intrusions against diplomatic web properties and online services tied to the Milan-Cortina 2026 Winter Olympics, publicly linking the activity to actors with ties to Russia. Independent security analysis from Palo Alto Networks frames the activity as part of a wider espionage campaign — dubbed the "Shadow Campaign" and tracked as TGR‑STA‑1030 — that uses long‑duration implants, polymorphic loaders, browser‑resident scripts and telephone social engineering, underscoring the need for rapid technical sharing and identity‑first mitigations.
TeamPCP's CanisterWorm: npm Supply-Chain Compromise with Iran-Targeted Wiper
A self‑propagating worm, tracked as CanisterWorm, spread through npm packages and CI/CD pipelines to harvest credentials and push poisoned artifacts; researchers removed malicious packages after tracing a distribution chain tied to earlier tooling compromises. The implant contains an environment‑aware destructive module (Kamikaze) that activates destructive routines under Iran‑specific cues while otherwise focusing on persistence and exfiltration, exposing systemic gaps in artifact provenance, package‑manager logic, and control‑plane credential hygiene.
Investigation Links ShinyHunters to Broad Vishing Campaign Targeting Over 100 Organizations
Researchers say a coordinated campaign combined telephone-based social engineering with browser-resident phishing toolkits to target more than 100 organisations across sectors, manipulating live authentication sessions to bypass MFA and SSO protections. A contemporaneous but separate infostealer disclosure — an unsecured cache of roughly 149 million credential pairs captured from endpoints — heightens the risk of credential-stuffing and targeted vishing, complicating response and containment.
Google flags intensifying cyber campaigns against the global defense supply chain
Google’s Threat Intelligence Group alerts that coordinated cyber campaigns against firms and personnel in the defense industrial base are increasing, combining long‑dwell implants, commodity exploit reuse, and LLM-assisted social engineering. The advisory urges identity‑first controls, extended cross‑domain telemetry to suppliers and staff, hardware-backed MFA and governed agentic automation to shorten attackers’ windows and blunt supply‑chain impact.

China-linked actors exploited hosting compromise to hijack Notepad++ updater
Notepad++ disclosed that attackers, likely backed by China, used a compromised shared hosting environment to reroute selective users to malicious update servers. The project moved hosting and added client-side update verification after the intrusion, which persisted in parts from June through December 2025.