Campaign  

DATE

NAME

CATEGORY

SUBCATE

INFO

19.4.25 Smishing Triad CAMPAIGN SPAM Smishing Triad: Chinese eCrime Group Targets 121+ Countries, Intros New Banking Phishing Kit
17.4.25 Sponsored Actors Try ClickFix CAMPAIGN CAMPAIGN Around the World in 90 Days: State-Sponsored Actors Try ClickFix

6.4.25

PoisonSeed Campaign CAMPAIGN SPAM PoisonSeed Campaign Targets CRM and Bulk Email Providers in Supply Chain Spam Operation
3.4.25 Stripe API Skimming Campaign CAMPAIGN Skimming Stripe API Skimming Campaign: Additional Victims and Insights

28.3.25

J-Magic

CAMPAIGN

MALWARE

Juniper Routers, Network Devices Targeted with Custom Backdoors

28.3.25

Gamaredon

CAMPAIGN

MALWARE

Gamaredon campaign abuses LNK files to distribute Remcos backdoor

25.3.25

.NET MAUI CAMPAIGN Malware New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI

20.3.25

ClearFake CAMPAIGN MALWARE ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery
10.3.25 Desert Dexter. Attacks CAMPAIGN Malware Desert Dexter. Attacks on Middle Eastern countries

8.3.25

Phishing Campaign Using Private Video Sharing CAMPAIGN PHISHING We’re aware that phishers have been sharing private videos to send false videos, including an AI generated video of YouTube’s CEO Neal Mohan announcing changes in monetization.

8.3.25

Snail Mail Fail CAMPAIGN Ransom Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear
25.2.25 GitVenom campaign CAMPAIGN CRYPTOCURRENCY The GitVenom campaign: cryptocurrency theft using GitHub
22.2.25 DeceptiveDevelopment CAMPAIGN Malware Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers.
18.2.25 RevivalStone CAMPAIGN APT The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024.
18.2.25 Earth Freybug’s CAMPAIGN Malware Stealth in the Shadows: Dissecting Earth Freybug’s Recent Campaign and Operational Techniques
15.2.25 DEEP#DRIVE CAMPAIGN APT Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
15.2.25 BadPilot CAMPAIGN Operation The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation
10.2.25 Webflow CDN CAMPAIGN Phishing New Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHAs

18.1.25

GSocket Gambling Scavenger CAMPAIGN CAMPAIGN GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia
16.12.24 DeceptionAds CAMPAIGN MALWARETISING “DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising
18.12.24 HubPhish CAMPAIGN Phishing Effective Phishing Campaign Targeting European Companies and Organizations
09.12.24 Drops Zbot CAMPAIGN RANSOMWARE Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware
05.12.24 Earth Kasha Spear CAMPAIGN PHISHING Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024
04.12.24 Secret Blizzard CAMPAIGN ESPIONAGE Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage

13.11.2024

Dream Job

CAMPAIGN

CAMPAIGN

Iranian “Dream Job” Campaign 11.24

07.11.24

VEILDrive 

CAMPAIGN

EXPLOIT

Unmasking VEILDrive: Threat Actors Exploit Microsoft Services for C2

07.11.24

CopyRh(ight)adamantys

CAMPAIGN

EXPLOIT

CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits

05.11.24

Typosquat 

CAMPAIGN

MALWARE

Typosquat Campaign Targeting npm Developers

30.10.24

Rampant Phishing CAMPAIGN PHISHING You’re Invited: Rampant Phishing Abuses Eventbrite

28.10.24

Gun Campaign CAMPAIGN CAMPAIGN TeamTNT’s Docker Gatling Gun Campaign

28.10.24

ClickFix CAMPAIGN SOCIAL ClickFix tactic: The Phantom Meet

27.9.24

SilentSelfieCAMPAIGNCAMPAIGNSilentSelfie: Uncovering a major watering hole campaign against Kurdish websites

26.9.24

SloppyLemmingCAMPAIGNCryptoUnraveling SloppyLemming’s Operations Across South Asia

26.9.24

Salt TyphoonCAMPAIGNISPChina's 'Salt Typhoon' Cooks Up Cyberattacks on US ISPs

23.9.24

Earth BaxiaCAMPAIGNPHISHINGEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC

19.9.24

Vanilla TempestCAMPAIGNRansomwareHighway Blobbery: Data Theft using Azure Storage Explorer

19.9.24

Storm cloudsCAMPAIGNCAMPAIGNStorm clouds on the horizon: Resurgence of TeamTNT?

13.9.24

ProxyjackingCAMPAIGNCRYPTOCURRENCYFrom Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking

11.9.24

Crimson PalaceCAMPAIGNAPTCrimson Palace returns: New Tools, Tactics, and Targets

11.9.24

Earth PretaCAMPAIGNAPTEarth Preta Evolves its Attacks with New Malware and Strategies

30.8.24

VoldemortCAMPAIGNCAMPAIGNThe Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”

30.8.24

SLOW#TEMPESTCAMPAIGNAPTFrom Cobalt Strike to Mimikatz: A Deep Dive into the SLOW#TEMPEST Campaign Targeting Chinese Users

16.8.24

TuskCAMPAIGNMalwareTusk: unraveling a complex infostealer campaign

15.8.24

River of Phish CAMPAIGNPhishingSPEAR-PHISHING CASES FROM EASTERN EUROPE 2022-2024A TECHNICAL BRIEF

15.8.24

Earth BakuCAMPAIGNCAMPAIGNA Dive into Earth Baku’s Latest Campaign

4.8.24

PanamorfiCAMPAIGNDDOSA New Discord DDoS Campaign

2.8.24

ERIAKOSCAMPAIGNScam"ERIAKOS" Scam Campaign: Detected by Recorded Future’s Payment Fraud Intelligence Team

2.8.24

DEV#POPPER campaign

CAMPAIGN

CAMPAIGN

The Securonix Threat Research team has been monitoring the threat actors behind the ongoing investigation into the DEV#POPPER campaign, we have identified additional malware variants linked to the same North Korean threat actors using similar, stealthy malicious code execution tactics, though now with much more robust capabilities.

2.8.24

OneDrive Pastejacking

CAMPAIGN

PHISHING

OneDrive Pastejacking: The crafty phishing and downloader campaign

25.7.24

CVE-2024-21412CAMPAIGNCVEExploiting CVE-2024-21412: A Stealer Campaign Unleashed
20.6.24SustainedCAMPAIGNCAMPAIGNSustained Campaign Using Chinese Espionage Tools Targets Telcos
18.6.24Spinning YARNCAMPAIGNMalwareSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence

18.5.24

Earth Hundun'sCampaignCyberSpyTracking the Progression of Earth Hundun's Cyberespionage Campaign in 2024

10.5.24

APT28 CampaignAPTAPT28 campaign targeting Polish government institutions
30.4.24DEV#POPPERCampaignCampaignANALYSIS OF DEV#POPPER: NEW ATTACK CAMPAIGN TARGETING SOFTWARE DEVELOPERS LIKELY ASSOCIATED WITH NORTH KOREAN THREAT ACTORS
25.4.24 ArcaneDoor Campaign Spy ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
25.4.24 FROZEN#SHADOW Attack Campaign Campaign Analysis of Ongoing FROZEN#SHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover
19.4.24 BlackTech CampaignCyberespionage Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear
19.4.24 DuneQuixoteCampaignCampaign DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware
17.4.24 Connect:funCampaignCampaign In a new threat briefing, Forescout Research – Vedere Labs details an exploitation campaign targeting organizations running Fortinet’s FortiClient EMS which is vulnerable to CVE-2023-48788. We are designating this campaign Connect:fun because of the use of ScreenConnect and Powerfun as post-exploitation tools – our first-ever named campaign.
16.4.24 SteganoAmorCampaignCampaign SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world
12.4.24 DarkBeatC2CampaignAPT DarkBeatC2: The Latest MuddyWater Attack Framework

11.4.24

eXotic Visit

Campaign

Android

ESET researchers uncovered the eXotic Visit espionage campaign that targets users mainly in India and Pakistan with seemingly innocuous apps

11.4.24

Raspberry Robin

Campaign

Virus

Raspberry Robin Now Spreading Through Windows Script Files

28.3.24 ShadowRay Campaign AI ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
27.3.24 RedAlpha Campaign Campaign Recorded Future’s Insikt Group has identified two new cyberespionage campaigns targeting the Tibetan Community over the past two years. The campaigns, which we are collectively naming RedAlpha, combine light reconnaissance, selective targeting, and diverse malicious tooling.
12.3.24Copybara Fraud OperationCampaignOperationOn top of this fraud operation architecture, TAs exploit Social Engineering techniques for distributing the Copybara banking trojan, which typically involves smishing and vishing techniques, leveraging native-speaker operators. In particular, several samples reveal TAs distributing Copybara through seemingly legitimate apps, utilizing logos of well-known banks and names that sound authentic, such as “Caixa Sign Nueva”, “BBVA Codigo”, “Sabadell Codigo”.
7.3.24Spinning YARNCampaignCampaignSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence
21.2.24SMUGX CampaignCampaignCHINESE THREAT ACTORS TARGETING EUROPE IN SMUGX CAMPAIGN
21.2.24Earth PretaCampaignCampaignEarth Preta Campaign Uses DOPLUGS to Target Asia

2.2.24

Commando Cat CampaignCryptocurrencyThe Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker

18.1.24

Mind Sandstorm CampaignCampaign New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs

10.1.24

DB#JAMMER

Campaign

Campaign

Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware

24.12.23

Nim-based

Campaign

Campaign

A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government