Weekly Threat Intel Briefing
Consolidated signals, vulnerabilities, IOCs, and detections for rapid operational action.
Analytics Snapshot
All available metrics from signals, vulnerabilities, IOCs, and detections.
Intel Category
Geography targeted
Industry targeted
IOC types
Weekly Signals
Executive summaries with attack context, business impact, and immediate actions.
How Hacked Construction Apps Are Bringing Down Jobsite SecurityPublishedJanuary 21, 2026Updated
Attack Profile
Surface: Web Application (Mjobtime)
Phases: Initial Access, Lateral Movement, Command Execution
MITRE: Initial Access, Execution, Persistence T1189 (Blind SQL Injection), T1059.001 (Command and Scripting Interpreter: PowerShell)
Actors and Tooling
Threat Actors: Unknown
Malware/Tools: sqlservr.exe, xp_cmdshell
Campaign: Unknown
Business Impact
Why it matters: Construction companies often rely on specialized software for managing operations. Exploiting vulnerabilities in these applications can compromise critical data and systems.
Owner team: Not specified
Mitigation
Patch Mjobtime to version 15.7.3 or later. Secure MSSQL instances, restrict access, and disable xp_cmdshell.
Immediate Actions
Check for Mjobtime installations. Review IIS logs for suspicious POST requests to /Default.aspx/update_profile_Server. Verify xp_cmdshell is disabled on MSSQL instances.
Inside a Multi-Stage Windows Malware CampaignPublishedJanuary 20, 2026Updated
Attack Profile
Surface: User Execution of LNK files
Phases: Initial Infection, Payload Delivery, System Compromise
MITRE: Initial Access, Execution, Persistence, Defense Evasion, Collection, Command and Control T1566.001 - Phishing, T1204.002 - Obfuscated Files or Information, T1059.001 - Command and Scripting Interpreter: PowerShell, T1078 - Valid Accounts
Actors and Tooling
Threat Actors: Unknown
Malware/Tools: Amnesia RAT, Microsoft Defender
Campaign: N/A
Business Impact
Why it matters: Widespread file encryption, stolen data, abuse of Defendnot to disable Microsoft Defender.
Owner team: N/A
Mitigation
User education on phishing and social engineering, security control bypass, Defender updates.
Immediate Actions
Review PowerShell execution policies, monitor for suspicious file activity.
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real TimePublishedJanuary 22, 2026Updated
Attack Profile
Surface: Web Browsers
Phases: Delivery, Execution
MITRE: Execution
Actors and Tooling
Threat Actors:
Malware/Tools: LogoKit
Campaign:
Business Impact
Why it matters: This technique allows attackers to evade network analysis, increase the diversity of malicious scripts, and tailor phishing campaigns.
Owner team:
Mitigation
Runtime behavioral analysis that can detect and block malicious activity at the point of execution within the browser.
Immediate Actions
Contact Unit 42 Incident Response if compromised.
DNS OverDoS: Are Private Endpoints Too Private?PublishedJanuary 20, 2026Updated
Attack Profile
Surface: Azure Private Link, DNS resolution
Phases: Reconnaissance, Denial of Service
MITRE: Denial of Service
Actors and Tooling
Threat Actors:
Malware/Tools:
Campaign:
Business Impact
Why it matters: Denial of service to storage accounts can cause Azure Functions to fail, and DoS to Key Vaults can disrupt dependent processes.
Owner team:
Mitigation
Microsoft provides fallback to internet advice. Defenders should scan environments for susceptible resources.
Immediate Actions
Foxit, Epic Games Store, MedDreams vulnerabilitiesPublishedUpdated
Attack Profile
Surface:
Phases:
MITRE:
Actors and Tooling
Threat Actors:
Malware/Tools:
Campaign:
Business Impact
Why it matters:
Owner team:
Mitigation
Immediate Actions
Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2PublishedJan 20, 2026Updated
Attack Profile
Surface: Email (Spear Phishing)
Phases: Initial Infection, Lateral Movement, Command and Control
MITRE: Initial Access, Execution, Command and Control T1566.001 (Phishing), T1204.002 (User Execution via Malicious File), T1059.001 (Command and Scripting Interpreter – PowerShell), T1047 (Windows Management Instrumentation)
Actors and Tooling
Threat Actors: UNG0902
Malware/Tools: DUPERUNNER, AdaptixC2, PowerShell
Campaign: Operation DupeHike
Business Impact
Why it matters: Targets critical departments (HR, payroll) within Russian organizations, potentially leading to data breaches and financial fraud.
Owner team:
Mitigation
Immediate Actions
Operation Covert Access: Weaponized LNK-Based Spear-Phishing Targeting Argentina’s Judicial Sector to Deploy a Covert RATPublishedJan 19, 2026Updated
Attack Profile
Surface: Email
Phases: Initial Access, Execution, Persistence
MITRE: Initial Access, Execution, Persistence; Initial Access, Persistence, Execution, Exfiltration; Initial Access, Persistence, Command and Control T1566.001 (Phishing: Spearphishing Attachment), T1204.002 (User Execution: Malicious File); T1566.001 (Phishing: Spearphishing Attachment), T1059.003 (Command and Scripting Interpreter: PowerShell), T1053.001 (Scheduled Task/Job: Scheduled Task); T1566.001 (Phishing), T1547.001 (Boot or Logon Autostart Execution), T1059.003 (Scheduled Task/Job: Post-Scheduling)
Actors and Tooling
Threat Actors: Unknown; KONNI
Malware/Tools: Rust-based RAT, PowerShell, Batch scripts; FALSECUB; PowerShell Backdoor, OneDriveUpdater.exe
Campaign: Operation Covert Access
Business Impact
Why it matters: Targets sensitive legal and institutional data within the judicial sector.
Owner team:
Mitigation
Immediate Actions
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has BegunPublishedJanuary 20, 2026Updated
Attack Profile
Surface: Unknown
Phases: Unknown
MITRE:
Actors and Tooling
Threat Actors: Single individual
Malware/Tools: VoidLink, TRAE SOLO, TRAE
Campaign: VoidLink
Business Impact
Why it matters: Highlights the dangers of AI in malware development, normalizing high-complexity attacks previously associated with high-resource threat actors.
Owner team:
Mitigation
Immediate Actions
19th January – Threat Intelligence ReportPublishedJanuary 19, 2026Updated
Attack Profile
Surface: Customer data platforms, IT systems, servers, email platforms, third-party vendors, WordPress plugins, Bluetooth accessories, Microsoft Desktop Window Manager
Phases: Initial Access, Exploitation, Lateral Movement, Data Exfiltration
MITRE: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Data Encrypted for Impact, Command and Control Spearphishing Attachment (T1566.001), Exploit Public-Facing Application (T1190), Credential Theft (T1003), Data Encrypted for Impact (T1486), Command and Control
Actors and Tooling
Threat Actors: Unknown, China-affiliated, Possibly Russian-linked (Sicarii ransomware)
Malware/Tools: Ransomware, Sicarii, VoidLink
Campaign: N/A
Business Impact
Why it matters: These attacks highlight the continued risk of data breaches, ransomware, and social engineering. The exploitation of vulnerabilities like CVE-2025-37164 and CVE-2026-20805 requires immediate attention. The wide range of targeted organizations demonstrates the broad threat landscape.
Owner team: N/A
Mitigation
Patch vulnerabilities (CVE-2025-37164, CVE-2026-20805, CVE-2026-23550), Implement strong security awareness training, strengthen third-party risk management, improve incident response capabilities
Immediate Actions
Ransom & Dark Web Issues Week 3, January 2026PublishedJan 22 2026Updated
Attack Profile
Surface: Endpoint, Networks
Phases:
MITRE:
Actors and Tooling
Threat Actors: Qilin Ransomware, r1z
Malware/Tools: Qilin Ransomware
Campaign:
Business Impact
Why it matters: Highlights ongoing ransomware activity, particularly targeting specific industries and geographic regions, and exposes access broker activity.
Owner team:
Mitigation
Subscribe to AhnLab TIP for IOCs and detailed analysis.
Immediate Actions
December 2025 Security Issues in Korean & Global Financial SectorPublishedJan 21 2026Updated
Attack Profile
Surface: Networks, EndPoint
Phases:
MITRE:
Actors and Tooling
Threat Actors: INC Ransom, BreachLaboratory
Malware/Tools: INCRansom
Campaign:
Business Impact
Why it matters: Significant data breaches affecting major financial institutions pose a systemic risk to national financial systems and require proactive measures.
Owner team:
Mitigation
Immediate Actions
Proxyware Disguised as Notepad++ ToolPublishedUpdated
Attack Profile
Surface: Software Download Portals, Task Scheduler, DLL side-loading
Phases: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion
MITRE: Defense Evasion, Execution, Persistence T1059.003 - Task Scheduler, T1027 - Obfuscated Files or Information, T1202 - Indirect Command Execution
Actors and Tooling
Threat Actors: Larva-25012
Malware/Tools: Proxyware (DigitalPulse, Honeygain, Infatica), DPLoader, Notepad++
Campaign:
Business Impact
Why it matters: Proxyware hijacks user bandwidth for malicious purposes, impacting performance and potentially exposing users to further attacks.
Owner team:
Mitigation
Immediate Actions
December 2025 APT Group TrendsPublishedJan 19 2026Updated
Attack Profile
Surface: Remote Work Infrastructure, Hiring Platforms
Phases: Initial Access, Exploitation, Persistence
MITRE: Initial Access Social Engineering (T1566), Impersonation (T1098)
Actors and Tooling
Threat Actors: Famous Chollima
Malware/Tools: AnyDesk, Google Remote Desktop, Astrill VPN, Simplify Copilot, AIApply, Final Round AI
Campaign:
Business Impact
Why it matters: Highlights a growing trend of APT groups using fake job opportunities to gain access to critical systems and data.
Owner team:
Mitigation
Verify job applicants' identities, implement multi-factor authentication, monitor remote access activity, and educate employees about social engineering tactics.
Immediate Actions
Critical Infrastructure Attacks Became Routine for Hacktivists in 2025PublishedUpdated
Attack Profile
Surface:
Phases:
MITRE:
Actors and Tooling
Threat Actors: Hacktivists
Malware/Tools:
Campaign:
Business Impact
Why it matters:
Owner team:
Mitigation
Immediate Actions
CallOnDoc Telemedicine Platform Allegedly Breached, Exposing 1.14 Million Patient Records Including Medical ConditionsPublishedJanuary 22, 2026Updated
Attack Profile
Surface: Internal systems
Phases: Initial Access, Data Exfiltration
MITRE: Exfiltration
Actors and Tooling
Threat Actors: iProfessor; aming
Malware/Tools:
Campaign:
Business Impact
Why it matters: Exposure of sensitive patient medical information could lead to identity theft, fraud, and reputational damage.
Owner team:
Mitigation
Immediate Actions
Attackers Actively Probing RCE Vulnerability in Cisco Enterprise Communications ProductsPublishedJanuary 21, 2026Updated
Attack Profile
Surface: Web-based management interface
Phases: Initial Access, Exploitation
MITRE: Initial Access T1189 - Drive-by Compromise
Actors and Tooling
Threat Actors:
Malware/Tools:
Campaign:
Business Impact
Why it matters: The vulnerability allows privilege escalation to root, potentially giving attackers full control of affected devices.
Owner team:
Mitigation
Apply Cisco's security patch when available.
Immediate Actions
Monitor for exploitation attempts, review network traffic for suspicious activity.
Menulux Turkish POS Platform Allegedly Breached, Exposing 93,000 Customer RecordsPublishedJanuary 21, 2026Updated
Attack Profile
Surface: POS platform
Phases:
MITRE:
Actors and Tooling
Threat Actors: 888
Malware/Tools:
Campaign:
Business Impact
Why it matters: Exposure of sensitive customer data including addresses, phone numbers, and potentially financial information from a POS system.
Owner team:
Mitigation
Immediate Actions
53,000 USA Driver License Images Allegedly for Sale on Exploit ForumPublishedJanuary 21, 2026Updated
Attack Profile
Surface: Exploit Forum
Phases: Initial Access, Data Exfiltration
MITRE: Collection
Actors and Tooling
Threat Actors: SinCity
Malware/Tools:
Campaign:
Business Impact
Why it matters: The sale of driver license images enables identity theft and fraud. The actor's history suggests a broader pattern of selling illicit credentials and materials.
Owner team:
Mitigation
Immediate Actions
PCComponentes Allegedly Breached, Exposing 16.3 Million Customer Records Including Payment Card DataPublishedJanuary 20, 2026Updated
Attack Profile
Surface: Customer Database
Phases:
MITRE:
Actors and Tooling
Threat Actors: daghetiaw
Malware/Tools:
Campaign:
Business Impact
Why it matters: The breach exposes sensitive customer data, including financial information, potentially leading to identity theft and financial fraud.
Owner team:
Mitigation
Immediate Actions
Ransomware IOCs LookupPublishedJanuary 20, 2026Updated
Attack Profile
Surface:
Phases:
MITRE:
Actors and Tooling
Threat Actors:
Malware/Tools:
Campaign:
Business Impact
Why it matters:
Owner team:
Mitigation
Immediate Actions
Inter Partner Assistance Algeria Allegedly Hacked, Exposing Internal Systems, User Accounts, and Insurance DocumentsPublishedJanuary 20, 2026Updated
Attack Profile
Surface: Internal Systems
Phases: Initial Access, Exploitation
MITRE: Initial Access
Actors and Tooling
Threat Actors: darrk07x (TEAM DARK 07X), JOKEIR 07X, DR SHELL 08X
Malware/Tools:
Campaign:
Business Impact
Why it matters: Exposure of citizen data and insurance documents poses a risk of identity theft and financial fraud.
Owner team:
Mitigation
Immediate Actions
Acuity Insurance Allegedly Breached, Exposing 9 Million Illinois Customer Records with Detailed DemographicsPublishedJan 19, 2026Updated
Attack Profile
Surface: acuity.com
Phases:
MITRE:
Actors and Tooling
Threat Actors: Solonik
Malware/Tools:
Campaign:
Business Impact
Why it matters: Exposure of sensitive customer data including PII and financial information. Potential for identity theft, fraud, and targeted attacks.
Owner team:
Mitigation
Immediate Actions
Fascist Forge Neo-Nazi Forum Database Allegedly Leaked with 2.3 Million RecordsPublishedJanuary 19, 2026Updated
Attack Profile
Surface: Online Forum Database
Phases: Initial Access, Data Collection, Exfiltration
MITRE: Collection Data Encapsulation (T1005), Exfiltration Over C2 Channel (T1041)
Actors and Tooling
Threat Actors: 0BITS
Malware/Tools: N/A
Campaign: ANTIFA Database Leak
Business Impact
Why it matters: The leaked data could be used for doxing, identity theft, and harassment of individuals associated with Fascist Forge. It also reveals the inner workings and communication of a network of white supremacists and accelerationist groups.
Owner team: N/A
Mitigation
Monitor dark web forums for further data dissemination. Review security practices for online forums to prevent similar breaches.
Immediate Actions
Monitor for misuse of compromised credentials.
Malware Trends Report 2025: New Security Risks for Businesses in 2026PublishedUpdated
Attack Profile
Surface:
Phases:
MITRE:
Actors and Tooling
Threat Actors:
Malware/Tools:
Campaign:
Business Impact
Why it matters:
Owner team:
Mitigation
Immediate Actions
Spanish judge closes NSO Group spyware probe due to lack of cooperation from IsraelPublishedJanuary 22nd, 2026Updated
Attack Profile
Surface: Mobile Devices (Phones)
Phases: Weaponization, Delivery, Exploitation, Action on Objectives
MITRE: Initial Access, Execution, Collection T1056.001 - Native API (Pegasus)
Actors and Tooling
Threat Actors: NSO Group, Israeli Government
Malware/Tools: Pegasus
Campaign:
Business Impact
Why it matters: Highlights the potential for state-sponsored cyber-espionage and the challenges of international cooperation in investigations involving spyware technologies. Demonstrates the impact on government officials and civil society.
Owner team:
Mitigation
Enhanced mobile device security measures, investigation into the source of the attacks, diplomatic efforts to address the issues of spyware proliferation.
Immediate Actions
Review mobile device security posture. Monitor for similar activity.
Jordan used Cellebrite phone-hacking tools against activists critical of Gaza war, report findsPublishedJanuary 22nd, 2026Updated
Attack Profile
Surface: Mobile Devices (iOS & Android)
Phases: Data Extraction, Forensics
MITRE: Collection T1005 - Data from Local System
Actors and Tooling
Threat Actors: Government of Jordan
Malware/Tools: Cellebrite
Campaign:
Business Impact
Why it matters: Demonstrates abuse of digital forensics tools against civil society and human rights defenders.
Owner team:
Mitigation
Cellebrite should implement watermarking and increase customer vetting.
Immediate Actions
Review and enhance data security practices.
Greek police arrest scammers using fake cell tower hidden in car trunkPublishedJanuary 21st, 2026Updated
Attack Profile
Surface: Mobile networks, SMS
Phases: Initial Access, Execution, Persistence, Collection, Exfiltration
MITRE: Initial Access, Collection, Command and Control T1189 - Drive-by Compromise, T1005 - Input Capture, T1071.001 - System Information Discovery
Actors and Tooling
Threat Actors: Chinese nationals (reportedly)
Malware/Tools: SMS blaster, DC-to-AC power converter (NFA)
Campaign: N/A
Business Impact
Why it matters: This operation demonstrates a sophisticated and rapidly deployable scamming technique that exploits vulnerabilities in mobile networks to steal sensitive information and commit fraud.
Owner team: N/A
Mitigation
Strengthen mobile network security, implement 2FA for sensitive transactions, educate users about phishing scams, monitor for rogue base stations.
Immediate Actions
Monitor mobile network traffic, investigate suspicious SMS activity, share threat intelligence with telecom providers.
Vulnerabilities
Exploitable CVEs and patch guidance.
| Signal ID | CVE | Vendor/Product | CVSS | Exploited | Patch | Notes | Fix/Workaround | References |
|---|---|---|---|---|---|---|---|---|
| SIG-001 | CVE-2025-51683 | Mjobtime | Not specified | Yes | Yes (Version 15.7.3 or later) | Blind SQL injection vulnerability | Patch application, restrict MSSQL access, disable xp_cmdshell | https://www.huntress.com/blog/hacked-construction-apps-bringing-down-jobsite-security |
| SIG-016 | CVE-2026-20045 | Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, Cisco Unity Connection, Cisco Webex Calling Dedicated Instance | 8.2 | Yes | Yes | Improper validation of user-supplied input in HTTP requests. | Apply Cisco security patch | https://nvd.nist.gov/vuln/detail/CVE-2026-20045 |
Indicators of Compromise
Hunt-ready indicators with context, confidence, and expiry guidance.
| Signal ID | Type | Value | Context | Kill Chain | Confidence | First Seen | Last Seen | Action | FP Risk | References |
|---|---|---|---|---|---|---|---|---|---|---|
| SIG-001 | URI | /Default.aspx/update_profile_Server | Web server logs | Initial Access | High | Feb 21, 2025 | Dec 20, 2025 | Monitor | Low | https://www.huntress.com/blog/hacked-construction-apps-bringing-down-jobsite-security |
| SIG-001 | Command Line | cmd /c net user | Executed commands | Lateral Movement | High | Feb 21, 2025 | Dec 20, 2025 | Block | Medium | https://www.huntress.com/blog/hacked-construction-apps-bringing-down-jobsite-security |
| SIG-001 | Command Line | ping ei0lwafp0h7178z7qer9r9oualgc45su.oastify.com | Executed commands | Lateral Movement | High | Feb 21, 2025 | Dec 20, 2025 | Block | Medium | https://www.huntress.com/blog/hacked-construction-apps-bringing-down-jobsite-security |
| SIG-006 | File Name | Премия 2025.zip | ZIP archive containing malicious LNK | Initial Access | High | |||||
| SIG-006 | File Name | Документ_1_О_размере_годовой_премии.pdf.lnk | Malicious LNK file | Initial Access | High | |||||
| SIG-006 | IP Address | 46.149.71.230 | Remote server hosting malicious files | Execution | High | |||||
| SIG-006 | File Name | s.exe | DUPERUNNER implant | Execution | High | |||||
| SIG-006 | File Name | fontawesome_tld.woff | File downloaded by DUPERUNNER | Execution | Medium | |||||
| SIG-006 | File Name | fontawesome.woff | AdaptixC2 beacon disguised as a font file | Command and Control | Medium | |||||
| SIG-007 | File Name | AfghanistanIslamiEmirates.iso | Initial Sample | Initial Access | High | Dec 23, 2025 | Dec 24, 2025 | Block/Monitor | Low | https://www.seqrite.com/blog/operation-nomad-leopard-targeted-spear-phishing-campaign-against-government-entities-in-afghanistan/ |
| SIG-007 | File Name | Doc.pdf.lnk | Malicious LNK File | Execution, Persistence | High | Block/Monitor | Low | https://www.seqrite.com/blog/operation-nomad-leopard-targeted-spear-phishing-campaign-against-government-entities-in-afghanistan/ | ||
| SIG-007 | File Name | img.jpg | FALSECUB Payload | Execution | High | Block/Monitor | Low | https://www.seqrite.com/blog/operation-nomad-leopard-targeted-spear-phishing-campaign-against-government-entities-in-afghanistan/ | ||
| SIG-011 | MD5 | 02ec920f0e4d4e2df98bb523f5a90d4c | ||||||||
| SIG-011 | MD5 | 12c541f80f6a563f3ce4b9a665cb610f | ||||||||
| SIG-011 | MD5 | 6a02be4a99d0595e6ec6c1d9587cc8d8 | ||||||||
| SIG-011 | MD5 | 6e30ce3e09f20e3a60c8aabb2a0fdc1c | ||||||||
| SIG-011 | MD5 | 7a54f209d041272a73ed4316b3b106cb | ||||||||
| SIG-026 | File Name | Cellebrite | Software name | |||||||
| SIG-027 | Domain | N/A | Phishing links in scam messages | Exfiltration | Low | N/A | N/A | Block | Low | https://therecord.media/greek-police-arrest-scammers-using-hidden-cell-towers |
Detection Ideas
Queries and hunting logic for quick detection engineering.
Suspicious Job Application Activity
Log Sources
Email Logs, Application Logs, Network Traffic Logs
Data Prereqs
Access to application logs and email archives
Logic Summary
Monitor for suspicious job applications from unusual locations or with generic/automated content. Analyze email traffic for signs of social engineering.
Use Cases
- Identify potential attackers using fake job applications.
FP Profile
False positives from legitimate applicants using automated tools or from regions with limited internet access.
Triage Notes
Prioritize investigations based on the reputation of the applicant and the sensitivity of the target systems.
Cellebrite Data Extraction
Log Sources
Mobile device logs, network traffic logs
Data Prereqs
Access to Cellebrite software, forensic data
Logic Summary
Hypothesis: Identify instances of data extraction from mobile devices using Cellebrite software based on logs and network traffic patterns. This could indicate unauthorized data access.
Use Cases
- Detect if Cellebrite software is installed and running on employee devices.
- Monitor network traffic for communication with Cellebrite servers.
- Investigate potential data breaches involving mobile devices.
FP Profile
False positives may occur if Cellebrite is legitimately used for forensic analysis by authorized personnel.
Triage Notes
Verify legitimate use cases before escalating.
SMS Blaster Activity
Log Sources
Mobile network logs, SMS traffic data
Data Prereqs
Ability to monitor mobile network traffic and identify unusual SMS activity.
Logic Summary
Detect unusual SMS traffic patterns originating from a single device or location, including mass SMS sending and downgrading of network connections to 2G.
Use Cases
- Identify rogue base stations and SMS blaster campaigns targeting mobile users.
- Investigate reports of phishing SMS messages and trace their origin.
- Monitor for indicators of compromise related to known SMS blaster equipment.
FP Profile
Legitimate SMS marketing campaigns or network maintenance activities.
Triage Notes
Investigate any alerts related to unusually high SMS traffic volume or downgrade to 2G.