The PolySwarm Blog

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

The ClawHavoc Campaign

Feb 27, 2026 1:48:52 PM / by The Hivemind posted in Threat Bulletin, Atomic macOS Stealer, AI agent supply chain attack, AMOS info stealer, ClickFix social engineering, ClawHub poisoning, PolySkill trojan, ClawHavoc, OpenClaw malicious Skills

0 Comments

Verticals Targeted: Cryptocurrency, Corporations, Social Media, Finance, Developers
Regions Targeted: Not Specified
Related Families: Trojan/OpenClaw.PolySkill, Atomic Stealer (AMOS)

Executive Summary

Threat actors conducted a widespread supply chain poisoning operation, named ClawHavoc, by uploading hundreds of malicious Skills to the ClawHub marketplace for the OpenClaw AI agent framework, employing social engineering to induce users to execute payloads that install information stealers and backdoors. The campaign leverages over 900 malicious skills to target high-value users across cryptocurrency, productivity, and social media categories to steal credentials, wallet data, and bot configurations.

Read More

Massiv Android Banking Trojan

Feb 23, 2026 2:39:35 PM / by The Hivemind posted in Threat Bulletin, device takeover, Android banking trojan, Android Overlay Attacks, IPTV masquerade, mobile banking fraud, remote control Android, Massiv malware, southern Europe threats

0 Comments

Verticals Targeted: Financial, Government
Regions Targeted: Southern Europe
Related Families: None

Executive Summary

Massiv represents an emerging Android banking Trojan family capable of overlay-based credential theft, keylogging, message interception, and full device takeover via remote control features, enabling fraudulent transactions and account manipulations. Distributed primarily through fake IPTV applications sideloaded outside official stores, it has facilitated confirmed fraud in southern Europe, particularly exploiting Portuguese government digital identity tools for bypassing security verifications.

Read More

UNC1069 Uses New Tools to Target Crypto Entities

Feb 20, 2026 1:53:03 PM / by The Hivemind posted in Threat Bulletin, social engineering, Cryptocurrency Theft, MacOS malware, North Korean threat actors, DeFi targeting, deepfake, UNC1069

0 Comments

Verticals Targeted: Cryptocurrency, Financial
Regions Targeted: Not specified
Related Families: SUGARLOADER, WAVESHAPER, HYPERCALL, HIDDENCALL, SILENCELIFT, DEEPBREATH, CHROMEPUSH

Executive Summary

A targeted intrusion into a FinTech entity in the cryptocurrency sector was attributed to UNC1069, a North Korea-nexus financially motivated threat actor. The operation deployed seven unique malware families on a macOS host through sophisticated social engineering involving a compromised Telegram account, a spoofed Zoom meeting, a reported deepfake video, and a ClickFix technique to initiate infection.

Read More

“Shadow Campaigns” Show Evidence of Global Espionage Using ShadowGuard Rootkit

Feb 13, 2026 1:01:00 PM / by The Hivemind posted in Threat Bulletin, Cobalt Strike, cyber espionage, government targeting, TGR-STA-1030, Diaoyu Loader, ShadowGuard rootkit, eBPF backdoor, global reconnaissance, Shadow Campaigns, state-aligned threat

0 Comments

Verticals Targeted: Government, Telecommunications, Finance, Aerospace
Regions Targeted: North America, South America, Africa, Europe, Asia
Related Families: Diaoyu Loader, ShadowGuard, Cobalt Strike, VShell


Executive Summary

A sophisticated state-aligned cyberespionage operation attributed to TGR-STA-1030 (also tracked as UNC6619) has been discovered, operating from Asia. It has compromised government and critical infrastructure entities across 37 countries over the past year while conducting reconnaissance against government infrastructure in 155 countries. The group's “Shadow Campaigns” leverage phishing, N-day exploitations, and advanced tooling to prioritize intelligence collection on economic partnerships, trade, and diplomatic activities.

Read More

Fancy Bear Leveraging CVE-2026-21509 in Operation Neusploit

Feb 9, 2026 12:29:14 PM / by The Hivemind posted in Threat Bulletin, Fancy Bear, MiniDoor, CVE-2026-21509, PixyNetLoader, Covenant Grunt, Operation Neusploit, email stealer

0 Comments

Verticals Targeted: Not specified
Regions Targeted: Central and Eastern Europe
Related Families: MiniDoor, Covenant Grunt, PixyNetLoader

Executive Summary

Operation Neusploit is a campaign attributed with high confidence to the Russia-linked Fancy Bear group, which exploits the zero-day vulnerability CVE-2026-21509 in Microsoft RTF files to deploy backdoors and email stealers targeting users in Central and Eastern Europe. The multi-stage infection chain delivers MiniDoor for email exfiltration from Outlook and PixyNetLoader leading to a Covenant Grunt implant for C2.

Read More

Labyrinth Chollima Expands Activity, Spawns Offshoots

Feb 6, 2026 12:15:57 PM / by The Hivemind posted in Threat Bulletin, Labyrinth Chollima, Golden Chollima, Pressure Chollima, North Korea Cryptocurrency Theft, Fudmodule Malware, DPRK Cyber Threats, Hoplight Lineage

0 Comments

Verticals Targeted: Cryptocurrency, Financial, Industrial, Manufacturing, Defense, Aerospace, Logistics, Shipping
Regions Targeted: United States, Canada, South Korea, India, Europe, Japan, Italy
Related Families: Multiple families per each threat actor

Executive Summary

Labyrinth Chollima operations have segmented into three distinct entities since 2018: Golden Chollima and Pressure Chollima, focused on cryptocurrency theft, and the core Labyrinth Chollima group, oriented toward espionage. Despite operational separation, the groups share tools, infrastructure, and tradecraft rooted in common malware frameworks, reflecting coordinated resource management within North Korea's cyber apparatus.

Read More

China Nexus Threat Actors Use PeckBirdy C2 Framework

Feb 2, 2026 1:43:12 PM / by The Hivemind posted in Threat Bulletin, China-aligned APT, SHADOW-VOID-044, watering hole attacks, LOLBins exploitation, SHADOW-EARTH-045, HOLODONUT backdoor, MKDOOR backdoor, PeckBirdy framework

0 Comments

Verticals Targeted: Gambling, Government
Regions Targeted: China, Philippines, Broader Asia
Related Families: HOLODONUT, MKDOOR

Executive Summary

Researchers have identified PeckBirdy, a versatile JScript-based C2 framework, deployed since 2023 in campaigns linked to China-aligned APT actors. This framework supports multiple execution environments via living-off-the-land binaries and delivers modular backdoors in operations targeting gambling operations and government entities.

Read More

Osiris Ransomware

Jan 30, 2026 12:41:59 PM / by The Hivemind posted in Threat Bulletin, Emerging Threat, Wasabi exfiltration, new ransomware family, Inc ransomware links, Poortry driver, BYOVD attack, Osiris ransomware, Rustdesk modification

0 Comments

Verticals Targeted: Food & Beverage
Regions Targeted: Southeast Asia
Related Families: Inc

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts