#espionage

2025-12-26

‘All brakes are off’: Russia’s attempt to rein in an illicit market for leaked data backfires.

Russia is scrambling to rein in the country’s sprawling illicit market for leaked personal data, a shadowy ecosystem long exploited by investigative journalists, police and criminal groups.

The state has tolerated ‘Probiv’ for its convenience but now Ukrainian spies are exploiting it.

mediafaro.org/article/20251226

#Probiv #Russia #Cybercrime #Ukraine #DataProtection #InvestigativeJournalism #Espionage

Negative PID Inc.negativepid
2025-12-25

What is cyber-warfare? How does it affect our daily lives and jobs? And what does it have to do with cybersecurity? Is this real, or is it just science fiction?

Here's what you need to know about it, and why it matters.

negativepid.blog/cyberwarfare-
negativepid.blog/cyberwarfare-

रञ्जित (Ranjit Mathew)rmathew
2025-12-25

😈:

“AMD First Entered The CPU Market With Reverse-Engineered Intel 8080 Clone 50 Years Ago — The Am9080 Cost 50 Cents Apiece To Make, But Sold For $700”, Tom’s Hardware (tomshardware.com/pc-components).

Via HN: news.ycombinator.com/item?id=4

Article passionnant du #newyorktimes sur une histoire digne d'un filme d'espionnage : comment des agents de la CIA ont paumé un petit réacteur nucléaire en Inde destiné à espionner les missiles nucléaires chinois dans les années 60 !

#espionage #cia #inde #coldwar #polution

nytimes.com/interactive/2025/1

John A. Mulhalljohmmlhll@mastodon.ie
2025-12-23

🔍 Espionage. Betrayal. Political intrigue.

From Terror to Valor is a gripping political thriller where Jack Debaut navigates covert operations, shifting loyalties, and deadly secrets.

Adrenaline-fueled action to the final page.

🔗 books2read.com/fromterror2valor

#PoliticalThriller #Espionage #ThrillerBooks #AmReading #BookLovers #ReadingCommunity

2025-12-23

In this video:

- TV manufacturers sued in Texas for spying on viewers

- Polish police apprehended 3 Ukrainians in Warsaw in a car full of spying equipment

- Browser extensions spying on users

youtube.com/watch?v=yPkRPVPMtWE

#privacy #surveillance #enshittification #TV #ACR #VPN #espionage #technology

2025-12-23

UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel

An analysis of threat clusters, dubbed UNG0801 or Operation IconCat, targeting Israeli organizations. The actors use socially engineered phishing lures in Hebrew, exploiting antivirus icon spoofing from well-known vendors like SentinelOne and Check Point. Two distinct infection chains were identified, both utilizing AV-themed decoys dropped by malicious Word and PDF documents. The first campaign deploys a PyInstaller-based implant called PYTRIC, capable of system-wide wipes and backup deletion. The second campaign uses a Rust-based implant named RUSTRIC, focusing on antivirus enumeration and system information gathering. Both campaigns share similar tactics but differ in their ultimate objectives, with the first aimed at destruction and the second at espionage.

Pulse ID: 69497ab14e1d473cf9e65693
Pulse Link: otx.alienvault.com/pulse/69497
Pulse Author: AlienVault
Created: 2025-12-22 17:06:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CheckPoint #CyberSecurity #Espionage #ICS #InfoSec #Israel #OTX #OpenThreatExchange #PDF #Phishing #RAT #Rust #SentinelOne #Word #bot #AlienVault

2025-12-22

December 23rd, 2025 - CryptoGen Cyber Threat Intelligence Advisory #8802 - Arcane Werewolf Adopts Loki 2.1 Malware in Targeted Espionage Attacks

The cyber espionage group Arcane Werewolf is deploying the upgraded Loki 2.1 malware in targeted attacks against organizations using phishing based delivery methods. The new version improves stealth by executing malicious code in memory, making detection more challenging. It is designed to maximize damage while avoiding detection systems.

Pulse ID: 6949ca5a3075d54a42a4517d
Pulse Link: otx.alienvault.com/pulse/6949c
Pulse Author: cryptocti
Created: 2025-12-22 22:46:50

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CryptoGen #CyberSecurity #Espionage #InfoSec #Malware #OTX #OpenThreatExchange #Phishing #bot #cryptocti

2025-12-22

Evasive SideWinder APT Campaign Detected

A sophisticated espionage campaign targeting Indian entities has been identified, masquerading as the Income Tax Department of India. The activity is associated with the SideWinder APT group, which has evolved its toolkit to evade detection by mimicking Chinese enterprise software. The campaign uses DLL side-loading techniques with legitimate Microsoft Defender binaries to bypass EDR, and utilizes public cloud storage and URL shorteners to evade reputation-based detections. The threat actors employ geofencing behavior, focusing on systems in South Asian timezones. The attack chain includes phishing emails, fraudulent websites, and malicious payloads delivered through file-sharing services. The final stage involves a resident agent that beacons to a command-and-control server, mimicking Chinese endpoint tool protocols.

Pulse ID: 6946da89fb6334ddbb8e3f5c
Pulse Link: otx.alienvault.com/pulse/6946d
Pulse Author: AlienVault
Created: 2025-12-20 17:19:05

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Asia #Chinese #Cloud #CyberSecurity #EDR #Email #Endpoint #Espionage #FileSharing #India #InfoSec #Microsoft #MicrosoftDefender #Mimic #OTX #OpenThreatExchange #Phishing #Sidewinder #SouthAsia #bot #AlienVault

John A. Mulhalljohmmlhll@mastodon.ie
2025-12-21

Spy thriller • Military fiction • Political intrigue

Set after Operation Desert Storm, From Terror to Valor follows Jack Debaut, a former U.S. Army Ranger, pulled into a deadly world of espionage and covert operations. As he uncovers a conspiracy linking extremist groups and government power, truth becomes the ultimate weapon.

Fans of The Bourne Identity will love this.
🔗 books2read.com/fromterror2valor

#SpyThriller #MilitaryFiction #PoliticalThriller #Espionage #BookMastodon #ThrillerReads

2025-12-20

UPI: Denmark accuses Russia of supporting cyberattacks on water, elections. “The Danish Defense Intelligence Service said it determined that Russia was behind a cyberattack on a Danish water utility in 2024 and a series of distributed denial-of-service attacks on Danish websites before the 2025 municipal and regional council elections in the country, the agency said in a press release.”

https://rbfirehose.com/2025/12/20/upi-denmark-accuses-russia-of-supporting-cyberattacks-on-water-elections/
The Japan Timesthejapantimes
2025-12-20

U.S. intelligence reports continue to warn that Russian President Vladimir Putin intends to capture all of Ukraine and reclaim parts of Europe that belonged to the former Soviet empire. japantimes.co.jp/news/2025/12/

2025-12-19

Attempts to sniff out governmental affairs in Southeast Asia and Japan

A newly discovered China-aligned APT group named LongNosedGoblin has been targeting governmental entities in Southeast Asia and Japan for cyberespionage purposes. The group employs a varied custom toolset consisting mainly of C#/.NET applications and notably uses Group Policy to deploy malware and move laterally across compromised networks. Their main tools include NosyHistorian for collecting browser history, NosyDoor backdoor using cloud services as C&C, and NosyStealer for exfiltrating browser data. The group has been active since at least September 2023 and uses techniques like AMSI bypassing and living-off-the-land tactics. LongNosedGoblin's campaigns involve multiple stages of execution and various malware components, showcasing a sophisticated approach to cyber espionage operations.

Pulse ID: 69457bc9ca97fde0a0f01d2c
Pulse Link: otx.alienvault.com/pulse/69457
Pulse Author: AlienVault
Created: 2025-12-19 16:22:33

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Asia #BackDoor #Browser #CandC #China #Cloud #CyberSecurity #Cyberespionage #Espionage #Government #ICS #InfoSec #Japan #Malware #NET #OTX #OpenThreatExchange #RAT #bot #AlienVault

Henry Stonehstone519
2025-12-19

and are the least of 's worries, and charges are coming in 2026 for him, his family and all of his co-conspirators .

Gerd_BrodowskiGerd_Brodowski
2025-12-19

: / / /

„Israel has charged a Russian citizen with spying for Iran, including photographing Israeli ports and infrastructure under the direction of ‍Iranian ​intelligence agencies, Israel's police and its internal ‍security agency said on Friday.“

straitstimes.com/world/middle-

Lazarou Monkey Terror 🚀💙🌈Lazarou
2025-12-17

Russia is at war with Europe and this is what it looks like.
I was only saying the other day that Belgium's actions recently suggested they were on the take or coerced

theguardian.com/world/2025/dec

Negative PID Inc.negativepid
2025-12-17

Steganography is a fascinating discipline that involves concealing a file within another file. Using the "empty spaces" in a media file, be it a text, picture, video, or even a song, you can hide hidden pieces of code to create an entirely new file and bypass controls.

Here's how it works.

negativepid.blog/steganography
negativepid.blog/steganography

John A. Mulhalljohmmlhll@mastodon.ie
2025-12-17

Dive into the world of espionage and covert ops.

🔗 books2read.com/fromterror2valor

In this espionage thriller, Jack Debaut is pulled into a shadow war of betrayal, secrets, and blurred loyalties.

Packed with action and suspense, From Terror to Valor keeps you guessing until the end.

Can Jack uncover the truth in time?

#Espionage #SpyThriller #PoliticalThriller #MilitaryFiction #Bookstodon #AmReading #ThrillerBooks

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst