The PolySwarm Blog

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

Iran-Linked PLC Exploitation Expands Across US Critical Infrastructure

Apr 17, 2026 2:14:36 PM / by The Hivemind posted in Threat Bulletin, Iran cyber attacks, PLC exploitation, Iranian hackers critical infrastructure, Rockwell PLC vulnerability, Allen Bradley cyber attack, SCADA manipulation, water infrastructure cyber attack, OT cybersecurity threat

0 Comments

Verticals Targeted: Critical Infrastructure, ONG, Electricity, Water, Government
Regions Targeted: US
Related Threat Actors: CyberAv3ngers, Static Kitten, Refined Kitten, Helix Kitten, Banished Kitten

Executive Summary

A joint US government advisory confirmed that Iran-affiliated cyber actors are actively exploiting internet-facing industrial control systems, particularly Rockwell Automation/Allen-Bradley PLCs, across US critical infrastructure. The activity has resulted in operational disruption, manipulation of HMI/SCADA data, and financial loss in sectors including water, energy, and government facilities. The campaign reflects a continuation of Iran’s established OT targeting playbook, prioritizing exposed industrial assets over sophisticated intrusion chains. Recent activity indicates a shift from defacement and signaling toward direct process interference, increasing the risk of real-world operational impact during periods of geopolitical tension.

Read More

CrystalX RAT Emerges as Multi-Functional MaaS Platform with Espionage, Theft, and Disruption Capabilities

Apr 13, 2026 3:08:43 PM / by The Hivemind posted in Threat Bulletin, Remote Access Trojan, MaaS malware, crypto clipper, keylogger trojan, Webcrystal RAT, CrystalX RAT, Telegram malware

0 Comments

Verticals Targeted: Cryptocurrency, Gaming, Social Messaging, Enterprise Systems
Regions Targeted: Russia
Related Families: WebRAT (aka Salat Stealer)

Executive Summary

CrystalX RAT is a newly identified malware-as-a-service (MaaS) platform combining traditional remote access, credential theft, and surveillance capabilities with disruptive prankware features, signaling a shift toward multi-purpose, user-impacting cybercrime tooling. It has been observed targeting consumer endpoints, cryptocurrency users, gaming and messaging platforms, and general enterprise users across Russia, with the potential for global reach.

Read More

Healthcare in the Crosshairs: Iran-Linked Cyber Threats Raise Risk for Hospitals, MedTech, and Care Delivery Supply Chains

Apr 10, 2026 3:27:14 PM / by The Hivemind posted in Threat Bulletin, Stryker cyberattack, Handala Hack, Banished Kitten, medical device security, healthcare supply chain security, cyber threat intelligence, Iran cyber attacks, healthcare cybersecurity, hospital cyber risk, Void Manticore, Iranian threat actors

0 Comments

Verticals Targeted: Healthcare
Regions Targeted: US

Executive Summary

Iran-linked cyber threats have elevated risk across the US healthcare sector, driven by the disruptive March 11 attack on Stryker, increased geopolitical tensions, and explicit warning signals from government and industry. A CISA acting director threat brief identifies healthcare as an actively targeted and highly exposed civilian sector, while vendor reporting links recent disruptive activity to MOIS-affiliated actors operating under personas such as Handala. Although widespread direct intrusions into hospitals have not been publicly confirmed, the convergence of supplier disruption, proxy activity, and sector vulnerabilities creates a credible near-term threat environment for healthcare entities and their supporting ecosystem.

Read More

The Axios Breach: When npm Trust Becomes an APT Attack Vector

Apr 6, 2026 2:36:03 PM / by The Hivemind posted in Threat Bulletin, North Korean threat actors, UNC1069, CI/CD compromise, npm malware, supply chain attacks, Axios npm compromise, WAVESHAPER, DPRK cyber operations, RAT malware

0 Comments

Verticals Targeted: Software, Technology, Cloud, Enterprise IT environments
Regions Targeted: Global
Related Families: WAVESHAPER.V2

Executive Summary

A supply chain compromise of the widely used Axios npm package introduced a malicious dependency delivering cross-platform remote access trojans, now linked with high confidence to a North Korea–aligned threat cluster UNC1069. The campaign leveraged maintainer account takeover, npm publishing abuse, and install-time execution to target developer environments and CI/CD pipelines during a short but high-risk exposure window.

Read More

Capability Gaps as Targets: Forecasting Chinese APT Targeting Under the 15th Five-Year Plan

Apr 3, 2026 12:20:51 PM / by The Hivemind posted in Threat Bulletin, APT41, Volt Typhoon, China cyber espionage, Five-Year Plan 2026, semiconductor espionage, PRC APT activity, supply chain attacks, AI cyber threats

0 Comments

Verticals Targeted: Semiconductors, Artificial Intelligence, Cloud, Biotechnology, Healthcare, Critical Infrastructure, Telecommunications, Aerospace, Defense
Regions Targeted: US, Taiwan, Japan, South Korea, UK, Germany, France, Israel, Singapore, Australia

Read More

Infect Once, Spread Everywhere: CanisterWorm and the Automation of Supply Chain Compromise

Mar 31, 2026 11:07:10 AM / by The Hivemind posted in Threat Bulletin, DevSecOps security, decentralized C2, ICP malware, CanisterWorm, CI/CD compromise, Kubernetes security, software supply chain attack, npm malware, TeamPCP, container security, token harvesting malware

0 Comments

Related Families: CanisterWorm

Read More

PolyKG Discovers Previously Unreported OilRig Samples Using Stolen Cert

Mar 27, 2026 11:49:49 AM / by The Hivemind posted in Threat Bulletin, OilRig APT34 campaign, stolen code signing certificate malware, MOSCII Corporation malware, Karkoff malware analysis, EV certificate abuse cybersecurity, supply chain cyber attack Thailand

0 Comments

Executive Summary

Using PolySwarm’s knowledge graph, PolyKG, PolySwarm analysts have identified previously unreported OilRig activity leveraging a stolen Entrust Extended Validation (EV) code signing certificate issued to Thai IT vendor MOSCII Corporation. The certificate was used to sign multiple malware samples, including the Karkoff backdoor, alongside additional undetected payloads with minimal antivirus coverage. The use of a legitimate vendor certificate and EGAT-themed naming potentially suggests a supply chain intrusion targeting Thailand’s energy sector. This activity highlights a continued evolution in OilRig tradecraft, combining trusted infrastructure abuse with low-detection tooling to enable stealthy, persistent access.

Read More

China-Linked Espionage Campaign Targets Southeast Asian Military Networks

Mar 23, 2026 2:53:38 PM / by The Hivemind posted in Threat Bulletin, APT, military targeting, China cyber espionage, DDR technique, AppleChris malware, MemFun backdoor, Pastebin C2, credential harvesting

0 Comments

Verticals Targeted: Defense
Regions Targeted: Southeast Asia
Related Families: AppleChris, MemFun, Getpass

Executive Summary

A long-running espionage campaign, tracked as CL-STA-1087, is targeting Southeast Asian military organizations using custom backdoors and credential harvesting tools. The activity demonstrates sustained persistence, operational discipline, and a focus on high-value intelligence collection.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts