Verticals Targeted: Cryptocurrency, Financial
Regions Targeted: Not specified
Related Families: SUGARLOADER, WAVESHAPER, HYPERCALL, HIDDENCALL, SILENCELIFT, DEEPBREATH, CHROMEPUSH
UNC1069 Uses New Tools to Target Crypto Entities
Feb 20, 2026 1:53:03 PM / by The Hivemind posted in Threat Bulletin, social engineering, Cryptocurrency Theft, MacOS malware, North Korean threat actors, DeFi targeting, deepfake, UNC1069
“Shadow Campaigns” Show Evidence of Global Espionage Using ShadowGuard Rootkit
Feb 13, 2026 1:01:00 PM / by The Hivemind posted in Threat Bulletin, Cobalt Strike, cyber espionage, government targeting, TGR-STA-1030, Diaoyu Loader, ShadowGuard rootkit, eBPF backdoor, global reconnaissance, Shadow Campaigns, state-aligned threat
Verticals Targeted: Government, Telecommunications, Finance, Aerospace
Regions Targeted: North America, South America, Africa, Europe, Asia
Related Families: Diaoyu Loader, ShadowGuard, Cobalt Strike, VShell
Executive Summary
A sophisticated state-aligned cyberespionage operation attributed to TGR-STA-1030 (also tracked as UNC6619) has been discovered, operating from Asia. It has compromised government and critical infrastructure entities across 37 countries over the past year while conducting reconnaissance against government infrastructure in 155 countries. The group's “Shadow Campaigns” leverage phishing, N-day exploitations, and advanced tooling to prioritize intelligence collection on economic partnerships, trade, and diplomatic activities.
Fancy Bear Leveraging CVE-2026-21509 in Operation Neusploit
Feb 9, 2026 12:29:14 PM / by The Hivemind posted in Threat Bulletin, Fancy Bear, MiniDoor, CVE-2026-21509, PixyNetLoader, Covenant Grunt, Operation Neusploit, email stealer
Verticals Targeted: Not specified
Regions Targeted: Central and Eastern Europe
Related Families: MiniDoor, Covenant Grunt, PixyNetLoader
Executive Summary
Operation Neusploit is a campaign attributed with high confidence to the Russia-linked Fancy Bear group, which exploits the zero-day vulnerability CVE-2026-21509 in Microsoft RTF files to deploy backdoors and email stealers targeting users in Central and Eastern Europe. The multi-stage infection chain delivers MiniDoor for email exfiltration from Outlook and PixyNetLoader leading to a Covenant Grunt implant for C2.
Labyrinth Chollima Expands Activity, Spawns Offshoots
Feb 6, 2026 12:15:57 PM / by The Hivemind posted in Threat Bulletin, Labyrinth Chollima, Golden Chollima, Pressure Chollima, North Korea Cryptocurrency Theft, Fudmodule Malware, DPRK Cyber Threats, Hoplight Lineage
Verticals Targeted: Cryptocurrency, Financial, Industrial, Manufacturing, Defense, Aerospace, Logistics, Shipping
Regions Targeted: United States, Canada, South Korea, India, Europe, Japan, Italy
Related Families: Multiple families per each threat actor
Executive Summary
Labyrinth Chollima operations have segmented into three distinct entities since 2018: Golden Chollima and Pressure Chollima, focused on cryptocurrency theft, and the core Labyrinth Chollima group, oriented toward espionage. Despite operational separation, the groups share tools, infrastructure, and tradecraft rooted in common malware frameworks, reflecting coordinated resource management within North Korea's cyber apparatus.
China Nexus Threat Actors Use PeckBirdy C2 Framework
Feb 2, 2026 1:43:12 PM / by The Hivemind posted in Threat Bulletin, China-aligned APT, SHADOW-VOID-044, watering hole attacks, LOLBins exploitation, SHADOW-EARTH-045, HOLODONUT backdoor, MKDOOR backdoor, PeckBirdy framework
Verticals Targeted: Gambling, Government
Regions Targeted: China, Philippines, Broader Asia
Related Families: HOLODONUT, MKDOOR
Executive Summary
Researchers have identified PeckBirdy, a versatile JScript-based C2 framework, deployed since 2023 in campaigns linked to China-aligned APT actors. This framework supports multiple execution environments via living-off-the-land binaries and delivers modular backdoors in operations targeting gambling operations and government entities.
Osiris Ransomware
Jan 30, 2026 12:41:59 PM / by The Hivemind posted in Threat Bulletin, Emerging Threat, Wasabi exfiltration, new ransomware family, Inc ransomware links, Poortry driver, BYOVD attack, Osiris ransomware, Rustdesk modification
Verticals Targeted: Food & Beverage
Regions Targeted: Southeast Asia
Related Families: Inc
Mustang Panda’s LotusLite Backdoor
Jan 26, 2026 2:03:02 PM / by The Hivemind posted in Threat Bulletin, Mustang Panda, DLL sideloading, LOTUSLITE backdoor, espionage campaign, custom C++ implant, geopolitical lure, US government targeting
Verticals Targeted: Government, Policy-Focused Organizations
Regions Targeted: US
Related Families: None
Executive Summary
China nexus threat actors launched a targeted espionage campaign against US government and policy-related entities, delivering a custom backdoor named LOTUSLITE via politically themed spear-phishing lures centered on US-Venezuela relations. The campaign prioritizes reliable espionage capabilities over technical sophistication, with moderate-confidence attribution to Mustang Panda based on shared delivery patterns, infrastructure, and operational behaviors.
SOLYXIMMORTAL: A Python-Based Infostealer
Jan 23, 2026 1:25:13 PM / by The Hivemind posted in Threat Bulletin, credential theft, information stealer, keylogger, Python stealer, Discord C2, SolyxImmortal, screenshot capture
Verticals Targeted: None specified
Regions Targeted: None specified
Related Families: None