cyber-espionage

Preview image for: China's Red Menshen APT Group Unleashes Upgraded BPFdoor: A Global Telecommunications Threat

China's Red Menshen APT Group Unleashes Upgraded BPFdoor: A Global Telecommunications Threat

Red Menshen APT's BPFdoor malware, upgraded for stealth, targets global telcos, bypassing traditional defenses.
Preview image for: Silver Fox's Evolving Threat Landscape: A Deep Dive into Dual Espionage Cyber Campaigns

Silver Fox's Evolving Threat Landscape: A Deep Dive into Dual Espionage Cyber Campaigns

Silver Fox group shifts from tax lures to WhatsApp stealers, blending espionage with phishing for dual-purpose data theft and intelligence gathering.
Preview image for: Unmasking the Dragon: Web Server Exploits & Mimikatz in Attacks on Asian Critical Infrastructure

Unmasking the Dragon: Web Server Exploits & Mimikatz in Attacks on Asian Critical Infrastructure

Analysis of a Chinese APT campaign targeting Asian critical infrastructure using sophisticated web server exploits and Mimikatz for lateral movement.
Preview image for: Seedworm Unleashes New Backdoors: Iranian APT Targets US Critical Infrastructure Amid Geopolitical Tensions

Seedworm Unleashes New Backdoors: Iranian APT Targets US Critical Infrastructure Amid Geopolitical Tensions

Iranian APT Seedworm (MuddyWater) deploys new backdoors against US critical sectors, raising cyberwarfare concerns.
Preview image for: Iran's MuddyWater APT Unleashes 'Dindoor' Backdoor on US Critical Infrastructure and Software Firms

Iran's MuddyWater APT Unleashes 'Dindoor' Backdoor on US Critical Infrastructure and Software Firms

MuddyWater APT deploys new 'Dindoor' backdoor targeting US firms, banks, airports, and software companies with advanced cyber espionage tactics.
Preview image for: Unpacking the Proliferation: Possible U.S.-Developed Exploits in the First 'Mass' iOS Attack

Unpacking the Proliferation: Possible U.S.-Developed Exploits in the First 'Mass' iOS Attack

Analysis of a sophisticated iOS exploit kit, its journey from a spyware vendor to global threat actors, and potential U.S. origins.
Preview image for: APT37's Evolving Threat: North Korean Hackers Master Air-Gapped Breaches with New Toolkit

APT37's Evolving Threat: North Korean Hackers Master Air-Gapped Breaches with New Toolkit

North Korea's APT37 expands its sophisticated toolkit, enabling breaches of air-gapped networks, as revealed by Zscaler ThreatLabz.
Preview image for: Google's Decisive Strike: Unpacking the UNC2814 GRIDTIDE Campaign and Global Cyber Espionage Disruption

Google's Decisive Strike: Unpacking the UNC2814 GRIDTIDE Campaign and Global Cyber Espionage Disruption

Google disrupted UNC2814 (GRIDTIDE), a China-nexus cyber espionage group, responsible for 53 breaches across 42 countries targeting governments and telcos.
Preview image for: Anthropic's Claude Under Siege: Investigating Allegations of Illicit Capability Exfiltration by State-Affiliated Actors

Anthropic's Claude Under Siege: Investigating Allegations of Illicit Capability Exfiltration by State-Affiliated Actors

Anthropic accuses Chinese labs of illicitly taking Claude's AI capabilities, posing national security risks and enabling offensive cyber operations.
Preview image for: APT36 and SideCopy Unleash Cross-Platform RAT Campaigns Against Indian Entities

APT36 and SideCopy Unleash Cross-Platform RAT Campaigns Against Indian Entities

APT36 and SideCopy target Indian defense/government with Geta, Ares, DeskRATs for Windows/Linux data exfiltration.
Preview image for: APT28's Lightning Strike: Weaponizing Microsoft Office RTF Zero-Day in 72 Hours

APT28's Lightning Strike: Weaponizing Microsoft Office RTF Zero-Day in 72 Hours

APT28 rapidly weaponized a Microsoft Office RTF vulnerability in three days, launching sophisticated multistage attacks.
Preview image for: APT28 Unleashes

APT28 Unleashes "Operation Neusploit" with Microsoft Office Zero-Day Exploit (CVE-2026-21509)

APT28 weaponizes CVE-2026-21509 in Microsoft Office for espionage, targeting Ukraine, Slovakia, Romania in "Operation Neusploit."
Preview image for: RedKitten Unleashed: Iran-Linked Cyber Campaign Targets Human Rights Defenders Amidst Unrest

RedKitten Unleashed: Iran-Linked Cyber Campaign Targets Human Rights Defenders Amidst Unrest

RedKitten, an Iran-linked cyber campaign, targets human rights NGOs and activists documenting abuses amidst 2025-2026 unrest, using sophisticated social engineering.
Preview image for: Labyrinth Chollima Evolves: Dissecting the Tripartite North Korean Threat

Labyrinth Chollima Evolves: Dissecting the Tripartite North Korean Threat

CrowdStrike assesses Labyrinth Chollima fractured into three North Korean APTs, specializing in finance, espionage, and disruption.
Preview image for: Rising Tide: Chinese APTs Unleash Advanced Malware on Asian Organizations

Rising Tide: Chinese APTs Unleash Advanced Malware on Asian Organizations

Chinese APTs deploy new, high-end cyber weapons against Asian organizations, escalating regional cyber threats and demanding robust defenses.
Preview image for: The Silent Spies: How Malicious Chrome Extensions Hijack Your ChatGPT Sessions

The Silent Spies: How Malicious Chrome Extensions Hijack Your ChatGPT Sessions

Researchers uncover 16 malicious Chrome extensions silently siphoning user data and hijacking active ChatGPT sessions.
Preview image for: PeckBirdy Takes Flight: Unpacking China's Cross-Platform JScript C2 Operations

PeckBirdy Takes Flight: Unpacking China's Cross-Platform JScript C2 Operations

China-backed 'PeckBirdy' group uses JScript C2 and new backdoors in cross-platform attacks targeting gambling sites and governments.
Preview image for: North Korean APTs Weaponize VS Code Projects: A New Frontier in Developer Targeting

North Korean APTs Weaponize VS Code Projects: A New Frontier in Developer Targeting

North Korean hackers evolve the Contagious Interview campaign, using malicious VS Code projects to deliver backdoors, targeting developers.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics