Verticals Targeted: Government, Defense, Technology, Transportation, Critical Infrastructure
Regions Targeted: South Asia, Southeast Asia, East Asia
Related Families: ShadowPad, GODZILLA, NOODLERAT, IOX, GOST, Wstunnel, RingQ, VShell
SHADOW-EARTH-053 Uses Legacy Exchange Exploitation to Target Asia-Pacific Governments
May 15, 2026 2:02:38 PM / by The Hivemind posted in Threat Bulletin, APT41, ShadowPad, Cybersecurity, government targeting, CyberEspionage, ChinaAPT, ExchangeServer, ProxyLogon, ThreatIntelligence, ShadowEarth053
DAEMON Tools Backdoor Enables Targeted Follow-On Malware Operations
May 11, 2026 3:03:25 PM / by The Hivemind posted in Threat Bulletin, Supply Chain Attack, PowerShell malware, Chinese threat actors, DAEMON Tools, QUIC RAT, Trojanized Installer, Software Supply Chain Security, Backdoor Malware
Verticals Targeted: Government, Scientific Research, Manufacturing, Retail, Education
Regions Targeted: Russia, Belarus, Thailand, Brazil, Turkey, Spain, Germany, France, Italy, China
Related Families: QUIC RAT
Executive Summary
A large-scale supply chain compromise involving the widely used DAEMON Tools software platform has exposed organizations and consumers to malicious payload deployment through digitally signed installers distributed from the vendor’s legitimate infrastructure. The attack, active since at least April 8, 2026, involved trojanized versions of DAEMON Tools containing embedded backdoors capable of downloading and executing additional malware. While thousands of infection attempts were observed globally, the operation appears selectively targeted, with advanced payloads deployed against a small subset of victims.
AI Agents: the New Shadow IT
May 5, 2026 1:41:07 PM / by PolySwarm Team posted in Cybersecurity, AI Agents, Zero Trust, AI Security, Security Risk, Threat Detection, Enterprise Security
Executive Summary
65% of organizations report experiencing at least one AI agent-related security incident in the past year. That’s not a projection. It’s a warning about the future. And it’s already happening.
Critical Condition: The 2026 Healthcare Cyber Threat Landscape
May 4, 2026 2:15:01 PM / by The Hivemind posted in Threat Bulletin, .NET DNS Backdoor, healthcare data breaches, healthcare cybersecurity, ransomware healthcare, medical device cybersecurity, Iran cyber threat healthcare, hospital cyber attacks, healthcare supply chain attacks
Verticals Targeted: Healthcare
Regions Targeted: US, Global
Related Families & Threat Actors: Lynx, ANUBIS, Rhysida, LockBit, ALPHV/BlackCat, Qilin, Medusa, The Gentleman, Payload, NetRunner, Genesis, ShinyHunters, Pay2Key, Handala
Executive Summary
Healthcare remains the most targeted critical infrastructure sector for cyberattacks, driven by ransomware, large-scale data theft, and increasing geopolitical activity. In 2026, threat activity reflects a convergence of ransomware operators, data extortion groups, and Iran-linked cyber operations, significantly increasing risk to healthcare delivery, patient safety, and supply chain stability.
Turbulence Ahead: Cyber Threats Targeting Aviation and Aerospace in 2026
May 1, 2026 1:21:29 PM / by The Hivemind posted in Threat Bulletin, viation ransomware, aviation supply chain attack, aviation cybersecurity, aerospace cybersecurity, airline cyber threats, identity-based cyber attack, GNSS spoofing aviation, airport cyberattack
Verticals Targeted: Aviation, Aerospace
Regions Targeted: US, Global
Related Threat Actors: Scattered Spider, Refined Kitten, Wicked Panda, Fancy Bear
Related Families: Qilin, LockBit, Cl0p
Executive Summary
Cyber risk in the aviation and aerospace sector is evolving toward ransomware, identity-based intrusion, platform-level disruption, and potential impacts to navigation and satellite-dependent services. Recent reporting on airport disruption in April 2026, combined with the confirmed 2025 Collins Aerospace/MUSE ransomware incident, shows how cyber incidents can rapidly affect passenger processing, baggage handling, scheduling, and broader aviation continuity.
The Gentlemen RaaS and SystemBC Activity Observed in Enterprise Intrusions
Apr 27, 2026 2:06:10 PM / by The Hivemind posted in Threat Bulletin, Ransomware, RaaS, Cobalt Strike, SystemBC, lateral movement, enterprise compromise, GPO abuse, proxy malware
Verticals Targeted: Enterprise Networks
Regions Targeted: US, UK, Germany
Related Families: SystemBC, Cobalt Strike
Executive Summary
The Gentlemen ransomware-as-a-service (RaaS) operation has rapidly scaled in early 2026, leveraging multi-platform encryption capabilities and enterprise-focused intrusion techniques. Recent DFIR analysis shows affiliates using tools such as SystemBC and Cobalt Strike to establish covert access, pivot laterally, and deploy ransomware at scale via Group Policy, enabling rapid domain-wide encryption events. The Gentlemen has been observed targeting enterprise networks primarily in the US, UK, and Germany.
ZionSiphon: OT-Focused Malware Highlights Emerging Risk to Water Infrastructure Systems
Apr 24, 2026 3:01:13 PM / by The Hivemind posted in Threat Bulletin, Ransomware, Cobalt Strike, SystemBC, Emerging Threat, lateral movement, post-exploitation, enterprise compromise, GPO abuse, proxy malware, credential access, TheGentlemen
Verticals Targeted: Water, Critical Infrastructure
Regions Targeted: Israel
Executive Summary
ZionSiphon is an OT-focused malware sample designed to identify and interact with water treatment and desalination environments. It was used to target water treatment systems in Israel. Although the analyzed version appears partially non-functional, it demonstrates ICS-aware targeting, industrial protocol interaction, and politically motivated intent. The sample provides insight into evolving adversary interest in manipulating systems that underpin critical infrastructure operations.
Iran-Linked PLC Exploitation Expands Across US Critical Infrastructure
Apr 17, 2026 2:14:36 PM / by The Hivemind posted in Threat Bulletin, Iran cyber attacks, PLC exploitation, Iranian hackers critical infrastructure, Rockwell PLC vulnerability, Allen Bradley cyber attack, SCADA manipulation, water infrastructure cyber attack, OT cybersecurity threat
Verticals Targeted: Critical Infrastructure, ONG, Electricity, Water, Government
Regions Targeted: US
Related Threat Actors: CyberAv3ngers, Static Kitten, Refined Kitten, Helix Kitten, Banished Kitten