Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users | TechCrunch
Critical security flaws targeting Windows and Office users allow hackers to take complete control of a victim's computer by clicking a malicious link or opening a file. Patch now.
By me: Microsoft has fixed three zero-day bugs in Windows and Office that are being actively abused by hackers to break into people's computers. Microsoft said three of the exploits are now public.
Google, which helped find the bugs, said one of them is under โwidespread, active exploitation."
11.02.2026 21:33
๐ 36
๐ 20
๐ฌ 8
๐ 5
Outstanding work ๐
10.02.2026 09:49
๐ 1
๐ 0
๐ฌ 0
๐ 0
Report cover showing a dark blue patch with crossed sword, arrow and scroll emblem, titled "Unveiling GRU's Information Operations Troops (VIO)"
๐ด ๐ก๐๐ช ๐ฅ๐๐ฃ๐ข๐ฅ๐ง
Last year, we've been able to unearth the infrastructure of the FSB's 16th Centre, combining #OSINT techniques and photos of old medals. We replicated this method to explore the Information Operations Troops (#VIO) of #Russiaโs military intelligence service (#GRU).
09.02.2026 10:23
๐ 26
๐ 18
๐ฌ 1
๐ 8
Overall, this activity underscores the GRUโs continued reliance on credential harvesting as a low-cost, high-yield intelligence collection method, enabled by the persistent abuse of legitimate internet services and disposable infrastructure. (5/5)
07.01.2026 15:39
๐ 1
๐ 0
๐ฌ 0
๐ 0
Victimology indicates targeted activity rather than broad spraying. Observed targets included researchers linked to a Turkish energy research agency, a European think tank, and organizations in North Macedonia and Uzbekistan, which align with Russian intelligence priorities. (4/5)
07.01.2026 15:39
๐ 2
๐ 1
๐ฌ 1
๐ 0
The credential-harvesting pages captured usernames and passwords and then redirected victims to legitimate portals to reduce suspicion. BlueDelta refined its JavaScript to automate URL handling, victim tracking, and data exfiltration, lowering operational overhead and complicating detection. (3/5)
07.01.2026 15:39
๐ 1
๐ 0
๐ฌ 1
๐ 0
BlueDelta impersonated MS OWA, Google, and Sophos VPN login pages, often using multi-stage redirection chains hosted on free services such as Webhook[.]site, InfinityFree, Byet Internet Services, and ngrok. Several campaigns began with legitimate PDF lures to increase credibility. (2/5)
07.01.2026 15:39
๐ 2
๐ 0
๐ฌ 1
๐ 0
GRU-Linked BlueDelta Evolves Credential Harvesting
Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.
Today, we released new @RecordedFuture research detailing BlueDeltaโs expanded credential-harvesting activity observed between February and September 2025. #BlueDelta #APT28 #FANCYBEAR #ForestBlizzard #FROZENLAKE #ITG05 #PawnStorm #Sednit #Sofacy #TA422 (1/5) www.recordedfuture.com/research/gru...
07.01.2026 15:39
๐ 7
๐ 5
๐ฌ 1
๐ 0
Notably, the infrastructure shows rapid adaptation following previous takedown actions. BlueDelta continues to rely on free, disposable hosting and tunneling services, enabling resilient, low-cost credential theft operations targeting Ukrainian users. (5/5)
17.12.2025 15:46
๐ 1
๐ 0
๐ฌ 0
๐ 0
While the campaign does not reveal specific victim industries, this activity aligns with BlueDeltaโs longstanding objective: collecting credentials to support GRU intelligence requirements amid Russiaโs ongoing war in Ukraine. (4/5)
17.12.2025 15:46
๐ 2
๐ 0
๐ฌ 1
๐ 0
These pages harvested usernames, passwords, MFA codes, and CAPTCHA responses. BlueDelta refined its JavaScript to automate URL handling and exfiltration, reducing operational overhead and complicating detection efforts. (3/5)
17.12.2025 15:46
๐ 0
๐ 0
๐ฌ 1
๐ 0
BlueDelta impersonated UKR.NET login pages using multi-stage redirection chains hosted on free services such as Mocky, DNS EXIT, and later ngrok and Serveo. The group also deployed PDF lures to bypass automated email filtering and increase user trust. (2/5)
17.12.2025 15:46
๐ 1
๐ 0
๐ฌ 1
๐ 0
BlueDeltaโs Persistent Campaign Against UKR.NET
Discover how Russiaโs BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.
Today, we released new @RecordedFuture research detailing BlueDeltaโs sustained credential-harvesting campaign targeting UKR.NET users between June 2024 and April 2025. www.recordedfuture.com/research/blu...
#BlueDelta #APT28 #FANCYBEAR #ForestBlizzard #FROZENLAKE #PawnStorm #Sednit #Sofacy (1/5)
17.12.2025 15:46
๐ 3
๐ 2
๐ฌ 1
๐ 0
APT28 Operation Phantom Net Voxel
APT28 Operation Phantom Net Voxel: weaponized Office lures, COM-hijack DLL, PNG stego to Covenant Grunt via Koofr, BeardShell on icedrive.
Great work by Sekoia uncovering new #BlueDelta #APT28 #Sofacy #FancyBear #ForestBlizzard #TAG110 malware samples. Linked to CERT-UAโs BeardShell & Covenant frameworks + revealed fresh weaponized docs & subtle TTPs. Activity ties to Russia-nexus ops incl. Double-Tap. blog.sekoia.io/apt28-operat...
16.09.2025 09:24
๐ 2
๐ 1
๐ฌ 0
๐ 0
This report on Stark Industries is a fantastic case study in the cat-and-mouse game between hosting providers and law enforcement. The new "Threat Activity Enabler" (TAE) terminology is spot-on and highlights the critical role these providers play in the cybercrime ecosystem.
27.08.2025 14:57
๐ 3
๐ 4
๐ฌ 0
๐ 0
Finnish police wiretap reveals Russian โshadow fleetโ captain instructed to destroy evidence
The captain of a Russia-linked oil tanker that damaged five subsea cables in the Baltic Sea was reportedly instructed to destroy evidence after the ship was seized by authorities.
Scandi noir meets The Wire...
๐ซ๐ฎ๐ข
The captain of a Russia-linked oil tanker that damaged five subsea cables in the Baltic Sea on Christmas Day was instructed by his shipping company to destroy evidence after the ship was seized by Finnish authorities, according to a wiretap transcript.
27.08.2025 12:33
๐ 56
๐ 22
๐ฌ 0
๐ 3
Fantastic new report by @julianferdinand.bsky.social and @aejleslie.bsky.social exposing Lummaโs vast info-stealing ecosystemโwhere affiliates juggle scams, MaaS platforms, and evasion tools to stay ahead of defenders๐ช Great work team ๐ฅ
21.08.2025 08:23
๐ 4
๐ 1
๐ฌ 0
๐ 0
Saher's first blog on the scourge that is ClickFix usage in the espionage space!!
Had to sneak in the UNK_RemoteRogue RDP shenanigans as well - a thus far unattributed group we assess to be Russia-aligned, using a pretty fun set of email tactics
17.04.2025 12:22
๐ 16
๐ 7
๐ฌ 1
๐ 0
Attention!
Check your Compromised Website Report for critical events tagged โfortinet-compromisedโ and follow Fortinet's mitigation advice on compromised devices:
fortinet.com/blog/psirt-b...
Data available from 2025-04-11+
shadowserver.org/what-we-do/n...
12.04.2025 12:15
๐ 14
๐ 10
๐ฌ 3
๐ 1
Snoop, a Romanian investigative journalism outlet, has linked an online advertising company named AdNow to intelligence officials from Russia's FSB and SVR services
snoop.ro/pe-urmele-ba...
04.03.2025 14:15
๐ 79
๐ 34
๐ฌ 1
๐ 0
๐ชก Our 2024 Malicious Infrastructure Report showcases the results of our detections across hundreds of malware families and threat actors, revealing victims in 200+ countries and highlighting the global scale of cyber threats.
Blog: www.recordedfuture.com/research/202... (1/10)
28.02.2025 15:03
๐ 10
๐ 6
๐ฌ 1
๐ 1
New Insikt Report just landed: RedMike AKA Salt Typhoon targeting of Global Telcos.
www.recordedfuture.com/research/red...
13.02.2025 10:25
๐ 5
๐ 1
๐ฌ 0
๐ 0
"Crazy Evil" Cryptoscam Gang: Unmasking a Global Threat in 2024
Explore how the "Crazy Evil" cryptoscam gang operates, infecting thousands worldwide with infostealer malware. Learn how its tactics pose a threat to the Web3 ecosystem and digital asset security.
New report! Check it out.
This research examines the operations of Crazy Evil โ a Russian-speaking โtraffer teamโ and cryptoscam gang โ which has victimized thousands of people with infostealer malware.
Blog: www.recordedfuture.com/research/cra...
PDF: go.recordedfuture.com/hubfs/report...
23.01.2025 16:42
๐ 13
๐ 4
๐ฌ 1
๐ 0