The PolySwarm Blog

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

PolyKG Discovers Previously Unreported OilRig Samples Using Stolen Cert

Mar 27, 2026 11:49:49 AM / by The Hivemind posted in Threat Bulletin, OilRig APT34 campaign, stolen code signing certificate malware, MOSCII Corporation malware, Karkoff malware analysis, EV certificate abuse cybersecurity, supply chain cyber attack Thailand

0 Comments

Executive Summary

Using PolySwarm’s knowledge graph, PolyKG, PolySwarm analysts have identified previously unreported OilRig activity leveraging a stolen Entrust Extended Validation (EV) code signing certificate issued to Thai IT vendor MOSCII Corporation. The certificate was used to sign multiple malware samples, including the Karkoff backdoor, alongside additional undetected payloads with minimal antivirus coverage. The use of a legitimate vendor certificate and EGAT-themed naming potentially suggests a supply chain intrusion targeting Thailand’s energy sector. This activity highlights a continued evolution in OilRig tradecraft, combining trusted infrastructure abuse with low-detection tooling to enable stealthy, persistent access.

Read More

China-Linked Espionage Campaign Targets Southeast Asian Military Networks

Mar 23, 2026 2:53:38 PM / by The Hivemind posted in Threat Bulletin, APT, military targeting, China cyber espionage, DDR technique, AppleChris malware, MemFun backdoor, Pastebin C2, credential harvesting

0 Comments

Verticals Targeted: Defense
Regions Targeted: Southeast Asia
Related Families: AppleChris, MemFun, Getpass

Executive Summary

A long-running espionage campaign, tracked as CL-STA-1087, is targeting Southeast Asian military organizations using custom backdoors and credential harvesting tools. The activity demonstrates sustained persistence, operational discipline, and a focus on high-value intelligence collection.

Read More

Threat Spotlight on Cuba: Emerging Security Risks in the Caribbean

Mar 20, 2026 1:03:06 PM / by The Hivemind posted in Threat Bulletin, Cuba, Cuba electronic warfare capabilities, Cuba signals intelligence operations, US–Cuba cyber security risks, Cuba intelligence hub Caribbean, Caribbean undersea cable security, Cuba SIGINT monitoring United States, Cuba cyber capabilities

0 Comments

Executive Summary

Recent developments involving Iran illustrate how states with degraded or constrained cyber capabilities may shift toward signals intelligence and electronic warfare to compensate for reduced offensive cyber capacity. Following recent strikes and internet disruptions that limited Iran’s ability to coordinate sophisticated cyber operations, analysts observed a greater reliance on intelligence collection, proxy activity, and electronic-domain pressure operations. Accordingly, PolySwarm analysts chose to highlight another potential flashpoint, Cuba, which similarly lacks robust offensive cyber capability and would likely rely on signals intelligence, electronic surveillance, and electronic warfare activities in the event of escalating confrontation. Although Cuba lacks advanced offensive cyber or electronic warfare capabilities comparable to major cyber powers, the island’s geography enables monitoring of critical telecommunications, maritime routes, and military communications across the Caribbean.

Read More

Footholds, Live Feeds, and Lifelines: Iranian Cyber Operations Surviving, Not Thriving

Mar 16, 2026 2:42:32 PM / by The Hivemind posted in Threat Bulletin, Critical Infrastructure, Iran, MOIS, MuddyWater, Cyber Warfare, CVE-2021-33044, Handala, IRGC, IP cameras, CVE-2017-7921

0 Comments

Verticals Targeted: Banking, Aviation, Defense, Healthcare
Regions Targeted: US, Canada
Related Families: Dindoor, Fakeset, Stagecomp, Darkcomp

Executive Summary

Recent reporting indicates Iranian cyber actors are expanding operations targeting US organizations while also exploiting internet-connected cameras across the Middle East for intelligence collection and battlefield awareness. These developments represent another layer in Iran’s evolving hybrid warfare strategy. Iranian APT group MuddyWater has maintained access to multiple US organizations since early February, while Iran-linked infrastructure has targeted internet-connected surveillance cameras across the Middle East. Hacktivist group Handala has recently claimed responsibility for a destructive cyberattack against medical technology firm Stryker. Taken together, these incidents suggest Iran’s cyber ecosystem is currently surviving but not thriving, maintaining operational capability despite disruption to infrastructure and command structures.

Read More

Electronic Warfare Disruptions Near the Strait of Hormuz

Mar 13, 2026 2:18:36 PM / by The Hivemind posted in Threat Bulletin, GNSS spoofing, Strait of Hormuz navigation disruption, Iranian electronic warfare, Persian Gulf maritime security, maritime GPS spoofing, cyber warfare Iran APT groups, AIS manipulation, hybrid warfare Iran cyber strategy, IRGC electronic warfare capabilities

0 Comments

Verticals Targeted: Maritime, Shipping
Regions Targeted: Middle East

Executive Summary

Recent maritime navigation anomalies in the Persian Gulf and Strait of Hormuz suggest the use of GNSS spoofing and other electronic warfare techniques disrupting vessel positioning systems and AIS tracking data. Ships have reported GPS positions drifting or appearing in multiple locations across maritime telemetry platforms. The activity coincides with radio warnings broadcast to ships transiting the Strait and may reflect Iran’s asymmetric strategy to influence maritime traffic while avoiding direct escalation. It may also indicate a temporary shift toward electronic warfare while Iranian cyber operators rebuild infrastructure following recent strikes.

Read More

Hybrid Warfare Evolves: Iranian Drone Strikes Impact AWS Infrastructure

Mar 9, 2026 2:41:54 PM / by The Hivemind posted in Threat Bulletin, AWS outage Middle East, cloud resilience, critical infrastructure warfare, AWS EC2 outage, S3 outage telemetry, hybrid warfare, cloud infrastructure security, AWS data center attack

0 Comments

Verticals Targeted: Cloud Computing
Regions Targeted: United Arab Emirates, Bahrain

Executive Summary

Iranian drone strikes damaging multiple Amazon Web Services (AWS) data centers in the United Arab Emirates and Bahrain demonstrate how modern conflicts increasingly target digital infrastructure that underpins global computing. The incident disrupted multiple AWS services and highlights the growing strategic importance and vulnerability of hyperscale cloud infrastructure.

Read More

Cyber Strategy Under Fire: Iranian APT and Proxy Retaliation Risks

Mar 6, 2026 1:24:51 PM / by The Hivemind posted in Threat Bulletin, IRGC cyber operations, Iran US Israel war 2026, Operation Lion’s Roar, Iran cyber retaliation, Twelve-Day War 2025, Operation Epic Fury,, Iran internet blackout, Iranian APT groups

0 Comments

 

Executive Summary

On February 28th, US and Israeli military forces conducted a coordinated and multifaceted attack on Iran. Known as Operation Epic Fury by the Americans and Operation Lion’s Roar by the Israelis, the objective was to neutralize a long-term threat and prevent the Iranian regime from obtaining nuclear missiles. As with any conflict involving Iran, practitioners monitoring the cybersecurity threat landscape expect kinetic warfare to spill over into the cyber realm and wait with bated breath to see what retaliatory attacks may occur. As of early March 2026, the conflict remains active, with ongoing strikes, regional disruptions, and uncertain regime stability.

Read More

PromptSpy Android Malware Uses Generative AI

Mar 2, 2026 12:48:41 PM / by The Hivemind posted in Threat Bulletin, Android Malware, accessibility service abuse, PromptSpy, VNC malwar, persistence technique, Argentina targeting, Gemini abuse, generative AI

0 Comments

Verticals Targeted: Financial
Regions Targeted: Argentina
Related Families: VNCSpy

Executive Summary

PromptSpy is the first documented Android malware family to integrate generative AI, specifically Google's Gemini, into its execution flow for dynamic, context-aware persistence. Primarily functioning as a remote access trojan with a built-in VNC module, this malware demonstrates how large language models can enhance adaptability in mobile threats, particularly for UI manipulation resistant to device variations.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts