Weekly Intelligence Report – 05 March 2026

Published On : 2026-03-05
Share :
Weekly Intelligence Report – 05 March 2026

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows
Target Industries: Real Estate and Retail
Target Countries: Mexico, Egypt

Introduction
CYFIRMA Research and Advisory Team has observed Payload Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Payload Ransomware
Payload is a file-encrypting ransomware that appends the “.payload” extension to compromised data and drops a ransom note named RECOVER_payload.txt. It employs a double-extortion model, claiming to exfiltrate sensitive information and threatening public disclosure if the victim fails to initiate negotiations within a defined timeframe. Victims are instructed to access a Tor-based portal to communicate with the attackers and are offered limited free file decryption as proof of capability. The malware avoids encrypting critical system directories and executable file types to maintain system stability, ensuring the victim can still access the ransom instructions and complete payment.

Screenshot of files encrypted by the ransomware (Source: Surface Web)

Before initiating encryption, the ransomware performs extensive defensive evasion and impact-maximization actions. It deletes shadow copies to prevent file restoration, clears event logs, disables security monitoring through in-memory patching, and terminates backup services and productivity applications to unlock open files. It also enumerates network shares for lateral encryption, supports multi-threaded execution for speed optimization, and selects encryption routines based on processor capabilities, ultimately using ChaCha20 for file encryption with Curve25519 for key exchange. To reduce forensic artifacts, it relaunches itself in hidden mode and leverages NTFS alternate data streams for self-deletion, leaving behind only encrypted files and ransom notes.

The appearance of the Payload Ransomware ransom note (RECOVER_payload.txt) (Source: Surface Web)

The appearance of the Payload Ransomware’s victim blog (Source: Surface Web)

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1106 Native API
Execution T1129 Shared Modules
Persistence T1543.003 Create or Modify System Process: Windows Service
Privilege
Escalation
T1055 Process Injection
Privilege
Escalation
T1543.003 Create or Modify System Process: Windows Service
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal
from Tools
Defense Evasion T1027.009 Obfuscated Files or Information: Embedded Payloads
Defense Evasion T1055 Process Injection
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Defense Evasion T1562.006 Impair Defenses: Indicator Blocking
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Defense Evasion T1564.004 Hide Artifacts: NTFS File Attributes
Credential Access T1056 Input Capture
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1518 Software Discovery
Discovery T1614 System Location Discovery
Collection T1056 Input Capture
Collection T1074 Data Staged
Command and
Control
T1071 Application Layer Protocol
Command and
Control
T1090 Proxy
Impact T1486 Data Encrypted for Impact
Impact T1489 Service Stop
Impact T1490 Inhibit System Recovery

Relevancy and Insights:

  • The ransomware primarily affects the Windows operating system, which is commonly utilized in enterprise environments across multiple industries.
  • The ransomware kills processes like vssadmin.exe Delete Shadows /all /quiet and wmic shadowcopy delete /nointeractive to eliminate Volume Shadow Copies, which Windows utilizes for backup and restoration. By deleting these shadow copies, the malware guarantees that victims are unable to retrieve their files through system restore points or backup tools.
  • Payload ransomware includes a built-in self-deletion mechanism that leverages NTFS Alternate Data Streams (ADS) to remove its executable after execution. It obtains its own file path, reopens the binary with DELETE permissions, renames itself to an alternate data stream (e.g., payload.exe:payload), and then marks the file for deletion upon handle closure using native file information calls. Once the handle is closed, the original executable is removed from disk, leaving behind only the encrypted files and ransom note. This approach reduces visible artifacts and complicates post-incident forensic recovery of the malware sample.

ETLM Assessment:
CYFIRMA’s assessment indicates that this ransomware currently functions as a structured and operationally disciplined double-extortion threat. In its present form, it encrypts victim files and appends a distinct extension while simultaneously deploying a ransom note that directs victims to a negotiation portal hosted over an anonymity network. Beyond encryption, it undertakes multiple pre-encryption impact-maximization steps, including deleting volume shadow copies to inhibit recovery, clearing Windows event logs to reduce forensic visibility, terminating backup and security-related services, and stopping user applications to ensure file accessibility for encryption. It also demonstrates network awareness by enumerating accessible drives to broaden its reach. The malware employs a hybrid cryptographic model, using symmetric encryption for data locking and asymmetric key exchange for secure key management, and incorporates a self-deletion routine to remove its executable after execution, thereby minimizing artifacts on disk.

Looking forward, CYFIRMA assesses that this ransomware has the potential to mature into a more sophisticated, enterprise-grade intrusion toolset. Future iterations may integrate automated lateral movement capabilities, credential harvesting, and pre-encryption data exfiltration workflows to strengthen extortion leverage. The operators could adopt intermittent or partial encryption strategies to evade behavioral detection systems while accelerating execution speed in large environments. Enhanced anti-analysis features such as sandbox detection, virtualization checks, and deeper in-memory obfuscation may also be introduced to counter evolving endpoint defenses. Additionally, the threat actors may expand their targeting scope to include cloud infrastructure, virtualized workloads, and backup repositories, increasing operational impact and negotiation pressure. Such developments would signal a transition from opportunistic ransomware activity toward more coordinated and strategically executed cyber extortion campaigns.

Sigma rule:
title: Shadow Copies Deletion Using Operating Systems Utilities description: Shadow Copies deletion using operating systems utilities tags:
– attack.defense-evasion
– attack.impact
– attack.t1070
– attack.t1490 logsource:
category: process_creation product: windows
detection: selection1_img:
– Image|endswith:
– ‘\powershell.exe’
– ‘\pwsh.exe’
– ‘\wmic.exe’
– ‘\vssadmin.exe’
– ‘\diskshadow.exe’
– OriginalFileName:
– ‘PowerShell.EXE’
– ‘pwsh.dll’
– ‘wmic.exe’
– ‘VSSADMIN.EXE’
– ‘diskshadow.exe’ selection1_cli:
CommandLine|contains|all:
– ‘shadow’ # will match “delete shadows” and “shadowcopy delete” and “shadowstorage”
– ‘delete’ selection2_img:
– Image|endswith: ‘\wbadmin.exe’
– OriginalFileName: ‘WBADMIN.EXE’ selection2_cli:
CommandLine|contains|all:
– ‘delete’
– ‘catalog’
– ‘quiet’ # will match -quiet or /quiet selection3_img:
– Image|endswith: ‘\vssadmin.exe’
– OriginalFileName: ‘VSSADMIN.EXE’ selection3_cli:
CommandLine|contains|all:
– ‘resize’
– ‘shadowstorage’ CommandLine|contains:
– ‘unbounded’
– ‘/MaxSize=’
condition: (all of selection1*) or (all of selection2*) or (all of selection3*) falsepositives:
– Legitimate Administrator deletes Shadow Copies using operating systems utilities for legitimate reason
– LANDesk LDClient Ivanti-PSModule (PS EncodedCommand) level: high
(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained, which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is a requirement to inform the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Information stealer (RAT)| Objectives: Data Exfiltration | Target Technology:
Android | Target Industry: Finance| Target Geography: Russia

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week, “TaxiSpy RAT” is in focus.

Overview of Operation TaxiSpy RAT Malware
TaxiSpy RAT is a highly advanced Android banking malware specifically engineered to target Russian financial users. The threat combines traditional banking trojan capabilities with full Remote Access Trojan (RAT) functionality, enabling attackers to conduct comprehensive surveillance and financial fraud operations. Its primary objective is to intercept banking credentials, capture one-time passwords (OTPs), monitor financial applications, and remotely control infected devices. The malware demonstrates a clear regional focus, particularly targeting Russian banking institutions such as Alfa-Bank, while leveraging stealth techniques to remain undetected on compromised devices.

TaxiSpy RAT employs layered persistence, aggressive permission abuse, and runtime obfuscation to evade analysis and detection. By integrating native code routines, encrypted configuration storage, Firebase-based push communication, and WebSocket-driven remote control, the malware enables real-time screen monitoring, SMS interception, keylogging, and lock-screen PIN capture. Its ability to disguise itself, suppress notifications, and maintain continuous background execution makes it a significant financial threat to affected users and institutions. Overall, TaxiSpy represents a financially motivated, infrastructure-backed Android threat designed for sustained access, credential theft, and remote exploitation within a targeted geographic ecosystem.

Attack Method
TaxiSpy RAT operates through a structured infection and control process designed to achieve complete device compromise and financial exploitation. Once installed, the application immediately attempts to set itself as the default SMS handler. If the user grants this request, the malware gains extensive control over SMS functionality, including reading incoming messages, sending SMS, and intercepting one-time passwords (OTPs). It further abuses Accessibility Service permissions to observe on-screen activity, capture user inputs, automate actions, and hinder removal attempts. To maintain long-term presence on the device, the malware registers boot receivers, schedules alarms and background jobs, initiates persistent foreground services, and requests exemptions from battery optimization mechanisms.

A notable aspect of the malware’s design is its reliance on a native library (libsysruntime.so) to store and execute sensitive logic. Instead of embedding critical configuration details directly in the main application code, the operators conceal command and control (C2) addresses, Firebase credentials, bot identifiers, and campaign-specific worker keys within the native binary. These values are encrypted using customized XOR routines with rolling keys and non-linear memory access patterns. The encrypted data is only decrypted at runtime, which significantly complicates static analysis and helps the malware evade detection by security tools. Once operational, the application communicates with its hardcoded C2 server using HTTP POST requests and WebSocket connections.

After establishing communication, TaxiSpy performs detailed device reconnaissance. It collects system information, such as device model, operating system version, SIM data, and a complete list of installed applications. The malware specifically checks for banking, government, marketplace, and cryptocurrency applications, using decrypted package lists to identify high-value targets. When a banking application or the device lock screen is active, it captures keystrokes, intercepts PIN entries, and extracts OTPs from SMS and notifications using pattern-matching techniques. The harvested information, including messages, contacts, call logs, clipboard data, and application Metadata is systematically transmitted to dedicated C2 endpoints.

In addition to passive data theft, TaxiSpy enables active remote control. By leveraging Accessibility and MediaProjection APIs, the malware establishes VNC-like functionality through WebSocket communication, allowing operators to stream the device screen and monitor user interactions in real time. Firebase Cloud Messaging is also integrated as an auxiliary command channel, enabling push-based instructions and background activation. This combination of encrypted configuration storage, persistent execution mechanisms, structured data exfiltration, and real-time remote access forms a comprehensive attack framework aimed at credential theft

The following are the TTPs based on the MITRE Attack Framework for Enterprise

Tactic (ID) Technique ID Technique Name
Initial Access T1660 Phishing
  T1541 Foreground Persistence
Persistence T1603 Scheduled Task/Job
Privilege Escalation T1626.001 Abuse Elevation Control Mechanism: Device Administrator Permissions
  T1628 Hide Artifacts
  T1628:002 Hide Artifacts: User Evasion
  T1629.001 Impair Defenses: Prevent Application Removal
Defense Evasion T1516 Input Injection
  T1414 Clipboard Data
Credential Access T1417.001 Input Capture: Keylogging
  T1420 File and Directory Discovery
  T1430 Location Tracking
  T1418 Software Discovery
  T1426 System Information Discovery
Discovery T1422 System Network Configuration Discovery
  T1636:001 Protected User Data: Calendar Entries
  T1636:002 Protected User Data: Call Log
  T1636:003 Protected User Data: Contact List
  T1636:004 Protected User Data: SMS Messages
  T1417 Input Capture
  T1513 Screen Capture
Collection T1512 Video Capture
  T1437 Application Layer Protocol
  T1437.001 Application Layer Protocol: Web Protocols
  T1521 Encrypted Channel
  T1521.003 Encrypted Channel: SSL Pinning
Command and control T1481 Web Service
Exfiltration T1646 Exfiltration Over C2 Channel

INSIGHTS
The malware reflects a clearly defined and selective target strategy rather than indiscriminate distribution. Its focus on specific financial and high-value applications suggests that the operators have carefully identified their intended victim base. This indicates that the campaign is structured around financial prioritization, with deliberate attention given to users who present greater monetary opportunities.

The operational structure behind the activity suggests coordination and organized management. The presence of distinct campaign identifiers implies that multiple actors may operate under a shared infrastructure while maintaining separation of activity. This arrangement reflects a controlled environment where operations are monitored and managed systematically rather than conducted randomly.

The overall behavior emphasizes sustained oversight instead of rapid or disruptive action. The activity appears designed to maintain ongoing awareness of user interactions, particularly those involving financial applications. This measured and supervisory approach highlights an intent to observe and control victim activity discreetly, reinforcing the structured nature of the operation.

ETLM ASSESSMENT
The analyzed application reflects a highly targeted, industry-specific threat primarily impacting users within the local banking ecosystem, including major financial institutions and widely used banking applications. Its design, permission model, and operational behavior indicate deliberate alignment with this demographic while minimizing exposure outside the intended region.

Distribution appears to leverage social engineering, repackaged applications, and localized delivery channels, supported by automated build processes that enable scalable deployment. The campaign is financially motivated, focusing on credential theft, interception of verification codes (e.g., OTPs), and remote device control— suggesting a structured and organized operation designed to maintain persistent access and facilitate fraudulent transactions.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule TaxiSpy_RAT_Android
{
meta:
description = “Detection rule for TaxiSpy RAT Android banking malware (Russian- targeted variant)”
author = “CYFIRMA” date = “2026-03-03”
strings:
/* Malware Sample Hash */
$hash_1 =
“67d5d8283346f850eb560f10424ea5a9ccdca5e6769fbbbf659a3e308987cafd”
/* C2 Indicator */
$c2_ip = “193.233.112.229”
/* Worker Key */
$worker_key = “9bc096a5f4ec7ba133d743cbaf4b8a2e”
/* XOR Key Arrays (Native Obfuscation Indicators) */
$xor_key_1 = { 3A 7F B2 1D E9 54 C8 6B }
$xor_key_2 = { B2 1F CC E3 6A 7E 71 F4 0A C0 1D 78 7B 4B 1B 15 2A 2F 24 20 33 1C }
condition:
any of ($hash_*) or any of ($c2_ip, $worker_key, $xor_key_*)
}

Recommendations

Strategic Recommendations

  • Develop and formalize a comprehensive mobile security strategy that specifically addresses the risks associated with targeted Android banking malware.
  • Incorporate mobile device risk considerations into the organization’s broader cybersecurity, fraud prevention, and enterprise risk management frameworks.
  • Strengthen coordination between cybersecurity, fraud management, and compliance functions to ensure unified oversight of mobile-related financial threats.
  • Expand risk assessments of digital banking platforms and third-party integrations to account for potential compromise through infected mobile devices.
  • Maintain continuous monitoring of threat intelligence sources to remain informed about region-specific malware campaigns and evolving attack patterns.

Management Recommendations

  • Establish and enforce clear policies governing the use of personal and corporate mobile devices, particularly for employees with access to financial systems or sensitive information.
  • Mandate baseline security controls on mobile devices used for official or financial transactions.
  • Conduct regular employee awareness initiatives to highlight the risks of mobile phishing, repackaged applications, and SMS-based manipulation tactics.
  • Define and document incident response procedures tailored to mobile device compromise scenarios.
  • Implement monitoring mechanisms to identify unusual financial activities that may indicate credential misuse originating from mobile infections.

Tactical Recommendations

  • Deploy Mobile Device Management (MDM) or Mobile Threat Defense (MTD) solutions to monitor device integrity and restrict suspicious application behavior.
  • Limit application installation to trusted sources and restrict the use of third-party or unofficial app repositories on high-risk devices.
  • Strengthen authentication mechanisms by reducing reliance on SMS-based one-time passwords and adopting more secure multi-factor authentication methods.
  • Monitor devices for abnormal changes, such as unauthorized activation of accessibility services or unexpected modification of default system applications.
  • Conduct periodic reviews of application permissions to ensure that excessive or high-risk privileges are not granted unnecessarily.

CYFIRMA’s Weekly Insights

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Spear Phishing, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – INC Ransomware, The Gentlemen Ransomware| Malware – TaxiSpy RAT
  • INC Ransomware – One of the ransomware groups.
  • The Gentlemen Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – TaxiSpy RAT
    Behavior – Most of these malware use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

FishMonger (aka Earth Lusca): Espionage-Driven Cyber Activity Briefing

  • Threat Actor: FishMonger aka Earth Lusca
  • Attack Type: Vulnerability Exploitation, Spear Phishing, Privileged Account Compromise, Custom Malware Deployment, Encrypted C2 (TLS), Proxy-based C2 (SOCKS), Living-off-the-Land Abuse (LOLBINs), Credential Dumping, LSASS Dumping, Registry Hive Dumping, Service Masquerading, Process Injection, DLL Side-Loading.
  • Objective: Information theft, Political Espionage, Financial Gains
  • Suspected Target Technology: Application Frameworks, LinuxOS, Office Suites Software, Operating System, VPN, Web Application, Web Servers
  • Suspected Target Geography: East/Southeast Asia, Europe, Selected Middle Eastern targets, South Asia, United States
  • Suspected Target Industries: Governments, IT Services, NGOs, Software, Telecommunication, Think Tanks, Academia
  • Business Impact: Financial Loss, Data Theft, Operational Disruption, Reputational Damage

About the Threat Actor
FishMonger (aka Earth Lusca) is a China-linked threat actor active since 2019 that focuses primarily on cyber-espionage against government, media, telecommunications, academic, and religious organizations, while also conducting financially motivated campaigns targeting cryptocurrency platforms. The group leverages tooling and tradecraft like APT41 and the Winnti Group cluster, but is assessed to operate independently from the Winnti Umbrella.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2024-21412 Internet Shortcut Files Security 8.1
CVE-2016-5195 Linux kernel 7.0 Link1, link2, link3, link4, link5, link6
CVE-2023-32315 Openfire 7.5 Link
CVE-2024-23897 Jenkins 9.8 Link1, link2
CVE-2022-21587 Oracle Web Applications 9.8 link
CVE-2021-22555 Linux 7.8 Link1, link2, link3, link4, link5

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1595.002 Active Scanning: Vulnerability Scanning
Resource Development T1608.001 Stage Capabilities: Upload Malware
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1583.004 Acquire Infrastructure: Server
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1584.004 Compromise Infrastructure: Server
Resource Development T1584.006 Compromise Infrastructure: Web Services
Resource Development T1588.002 Obtain Capabilities: Tool
Resource Development T1588.001 Obtain Capabilities: Malware
Initial Access T1189 Drive-by Compromise
Initial Access T1566.002 Phishing: Spear phishing Link
Initial Access T1190 Exploit Public-Facing Application
Execution T1059.001 Command and Scripting Interpreter: PowerShell
Execution T1059.007 Command and Scripting Interpreter: JavaScript
Execution T1047 Windows Management Instrumentation
Execution T1053.005 Scheduled Task/Job: Scheduled Task
Execution T1204.002 User Execution: Malicious File
Execution T1204.001 User Execution: Malicious Link
Execution T1059.005 Command and Scripting Interpreter: Visual Basic
Execution T1059.006 Command and Scripting Interpreter: Python
Persistence T1547.012 Boot or Logon Autostart Execution: Print Processors
Persistence T1543.003 Create or Modify System Process: Windows Service
Persistence T1574.001 Hijack Execution Flow: DLL
Persistence T1112 Modify Registry
Persistence T1098.004 Account Manipulation: SSH Authorized Keys
Persistence T1053.005 Scheduled Task/Job: Scheduled Task
Privilege Escalation T1053.005 Scheduled Task/Job: Scheduled Task
Privilege Escalation T1098.004 Account Manipulation: SSH Authorized Keys
Privilege Escalation T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control
Privilege Escalation T1547.012 Boot or Logon Autostart Execution: Print Processors
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1574.001 Hijack Execution Flow: DLL
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control
Defense Evasion T1574.001 Hijack Execution Flow: DLL
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
Defense Evasion T1027.003 Obfuscated Files or Information: Steganography
Defense Evasion T1218.005 System Binary Proxy Execution: Mshta
Defense Evasion T1112 Modify Registry
Credential Access T1003.001 OS Credential Dumping: LSASS Memory
Credential Access T1003.006 OS Credential Dumping: DCSync
Discovery T1482 Domain Trust Discovery
Discovery T1057 Process Discovery
Discovery T1049 System Network Connections Discovery
Discovery T1007 System Service Discovery
Discovery T1018 Remote System Discovery
Discovery T1016 System Network Configuration Discovery
Discovery T1033 System Owner/User Discovery
Lateral Movement T1210 Exploitation of Remote Services
Collection T1056.001 Input Capture: Keylogging
Command and Control T1090 Proxy
Exfiltration T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage

Latest Developments Observed
The threat actor is suspected of expanding beyond traditional cyber-espionage to conduct financially motivated campaigns targeting cryptocurrency payment platforms and cryptocurrency exchanges. These campaigns appear aimed at generating revenue while maintaining ongoing intelligence collection operations against government and civil society-linked organizations.

ETLM Insights
FishMonger (aka Earth Lusca) is assessed as a China-aligned cyber-espionage actor whose primary objective is sustained intelligence collection rather than short-term disruption or purely financial gain.

Operationally, FishMonger prioritizes stealth, persistence, and infrastructure hygiene across enterprise and research networks. The group demonstrates a preference for exploiting newly disclosed vulnerabilities in internet-facing services to establish initial access, followed by long-dwell intrusions supported by custom loaders, backdoors, and web shells. Its use of domain masquerading, frequent command-and-control rotation, and low-volume staged exfiltration indicates an emphasis on remaining covert to preserve intelligence collection opportunities over extended periods rather than achieving immediate disruptive effects.

Based on observed tradecraft and targeting patterns, FishMonger is likely to continue focusing on its targets to sustain long-term access for strategic intelligence purposes. This positions the group as a persistent espionage threat to organizations involved in governance, emerging technology development, and policy formation, with continued risk to the confidentiality of sensitive research, communications, and strategic planning information.

YARA Rules
rule EarthLusca_FishMonger_IOC_Detection
{
meta:
description = “Detects FishMonger (aka Earth Lusca) malware and infrastructure based on known IOCs”
author = “CYFIRMA”
threat_actor = “FishMonger / Earth Lusca” last_updated = “2026-03-03”
confidence = “IOC-based detection”
strings:

/* IP Addresses */
$ip1 = “104.21.71.224”
$ip2 = “101.200.63.187”
$ip3 = “61.238.103.165”
$ip4 = “162.33.178.23”
$ip5 = “78.141.202.70”

/* Domains */
$d1 = “api.googleauthenticatoronline.com”
$d2 = “tfirsdaily.store”
$d3 = “softupdate.xyz”
$d4 = “gtlgtdl.store”
$d5 = “support.helpkaspersky.top”

/* File names / hashes / paths */
$f1 = “elf205abe6c8c2be8ebb8e03eaf7b025f4”
$f2 = “24de00559463ef4103032e24c58ce35d.virus”
$f3 = “2317d3e14ab214f06ae38a729524646971e21b398eda15cc9deb8b00b231abc3.exe”
$f4 = “mustangpanda_20230922”
$f5 = “c:\\users\\user\\appdata\\local\\temp\\a1qngbu4.l2b\\mustangpanda_20230922”

/* ELF marker */
$elf_magic = { 7F 45 4C 46 }

condition:
1 of ($ip*) or 1 of ($d*) or 1 of ($f*) or
$elf_magic
}

Recommendations

Strategic Recommendations

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.
  • Deploy Zero Trust Policy that leverages tools like security information management, advanced security analytics platforms, security user behaviour analytics, and other analytics systems to help the organization’s security personnel observe in real-time what is happening within their networks so they can orient defences more intelligently.

Management Recommendations

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in- line prompts to help educate users.
  • Regularly reinforce awareness of unauthorized attempts with end-users across the environment and emphasize the human weakness in mandatory information security training sessions.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

Tactical Recommendations

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Add the YARA rule for threat detection and monitoring, which will help to detect anomalies in log events, identify, and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

3. Major Geopolitical Developments in Cybersecurity

The opening cyber salvo in the Iran War
As fighter jets and cruise missiles targeted IRGC command centers on February 28, 2026, a simultaneous digital offensive reportedly plunged Iran into near-total communications paralysis. This cyber dimension unfolded alongside Israel’s Operation Roaring Lion and the U.S.’s Operation Epic Fury, creating a “parallel front” that severely disrupted the regime’s internal coordination and public messaging.

Iran experienced a dramatic nationwide internet blackout, with independent monitor NetBlocks reporting connectivity dropping to just 4% of normal levels starting around 07:00 UTC that day—later flatlining near 1% in subsequent updates. The disruption, which has persisted for over 48 hours in many areas, severely limited information flow, government operations, and potential civilian coordination amid the strikes. While some analysts attribute this partly to regime-imposed shutdowns (a tactic Iran has used before to control unrest or prevent leaks during crises, as seen in the 2025 Israel- Iran clashes), others point to large-scale cyberattacks contributing to or exploiting the collapse, targeting telecom infrastructure, critical services, and command networks. The offensive also struck the regime’s propaganda apparatus: State-run news agency IRNA (Islamic Republic News Agency) went offline for extended periods, crippling official narratives.

Tasnim (media house closely tied to the Iranian Revolutionary Guards) faced major disruptions, with reports of hacks that replaced content with subversive anti-regime messages directed at Supreme Leader Ali Khamenei (who was later confirmed killed in the early strikes).

These cyber intrusions aligned with broader psychological operations, including the compromise of popular apps like BadeSaba (a prayer/calendar tool with millions of users), which pushed notifications urging security forces to defect, disarm, and join civilians—messages like “It’s time for reckoning” and “Help has arrived!” aimed at sowing internal discord. Attribution remains challenging in the fog of war, but it is safe to assume the most disruptive elements in the cyber campaign can be attributed to governmental agencies from the USA and Israel.

ETLM Assessment:
The limited nature of the previous round of American strikes on the Iranian nuclear programme in June meant that the US has not deployed every capability it had at hand – and is now likely using a wider spectrum of cyber tools, usage of which will likely surface in the coming days. Meanwhile, Iran’s degraded central command structure may lead to more decentralized, unpredictable actions led by proxies and loosely affiliated hacktivists operating via platforms like Telegram. This could accelerate low-to-medium sophistication attacks in the short term, filling the gap left by disrupted regime coordination and aiming to impose costs, signal defiance, and complicate any de-escalation efforts. Organizations in defense, critical infrastructure, finance, energy, and government sectors—particularly those with ties to the U.S. or Israel—are urged to heighten vigilance, patch vulnerabilities, and monitor for indicators of compromise from known Iranian-linked actors.

Chinese espionage campaign found using Google Sheets
Google has announced a major disruption of a long-running, sophisticated cyber espionage campaign attributed to a suspected Chinese state-linked threat actor tracked as UNC2814 (also known as Gallium), which has been active since at least 2017. The operation targeted at least 53 organizations across 42 countries, with suspected activity extending to at least 20 more nations. The victims primarily included government entities and global telecommunications providers spanning Africa, Asia, the Americas, Europe, and beyond—highlighting a nearly decade-long effort to establish persistent access for intelligence collection and surveillance. Some of the data stolen includes sensitive personal information such as full names, phone numbers, dates of birth, voter IDs, and national IDs in at least one documented case.

ETLM Assessment:
UNC2814 operates distinctly from other high-profile Chinese-linked actors like Salt Typhoon, with no observed overlap in victims, tactics, or infrastructure. The group is described as both prolific and elusive, often gaining initial footholds by compromising web servers and edge systems. While the disruption significantly hampers UNC2814’s current operations, researchers caution that the actor is likely to aggressively attempt to rebuild its global footprint.

4. Rise in Malware/Ransomware and Phishing

INC Ransomware Impacts JA Akita Kita Life Service, K.K

  • Attack Type: Ransomware
  • Target Industry: Energy Retail and Distribution
  • Target Geography: Japan
  • Ransomware: INC Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, JA Akita Kita Life Service, K.K (https[:]//ja-akitakita-ls[.]jp/), was compromised by INC Ransomware. JA Akita Kita Life Service, K.K. is a Japanese firm providing energy and lifestyle services. The compromised dataset includes internal records, financial information, client lists, and other confidential and sensitive data belonging to the organisation. The Total size of compromised data is approximately 43.1GB

Source: Dark Web

Relevancy & Insights:

  • INC Ransomware, also known as Incransom, is a cyber threat that emerged in mid- 2023. Incransom uses strong encryption algorithms to lock files, making recovery without the decryption key virtually impossible. The ransomware typically appends specific file extensions to encrypted files, signalling that they have been compromised.
  • Incransom is commonly distributed through:
  • Phishing emails: Containing malicious attachments or links that, when opened, deploy the ransomware.
  • Malicious downloads: From compromised websites or software packages.
  • The INC Ransomware group primarily targets countries such as the United States of America, Canada, Germany, the United Kingdom, and Australia.
  • The INC Ransomware group primarily targets industries, such as Professional Goods & Services, Healthcare, Government & Civic, Manufacturing, and Consumer Goods & Services.
  • Based on the INC Ransomware victims list from 1st Jan 2025 to 03rd March 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the INC Ransomware victims list from 1st Jan 2025 to 03rd March 2026 are as follows:

ETLM Assessment:
Based on recent assessments by CYFIRMA, INC Ransomware represents a significant threat within the evolving landscape of ransomware attacks. Its use of strong encryption methods and double extortion tactics highlights the increasing sophistication of cybercriminal operations. Organizations are advised to enhance their cybersecurity measures by implementing robust defenses against phishing attacks, maintaining updated security protocols, and monitoring for unusual network activity to mitigate risks associated with this and other ransomware variants. Continuous vigilance is essential to protect against the threats posed by emerging ransomware groups like INC Ransomware.

The Gentlemen Ransomware Impacts Sando Tech

  • Attack Type: Ransomware
  • Target Industry: Industrial Machinery Manufacturing
  • Target Geography: Japan
  • Ransomware: The Gentlemen Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Sando Tech(https[:]//www[.]sando[.]co[.]jp/), was compromised by the Gentlemen Ransomware. Sando Tech specialises in the development, design, manufacturing, and sales of machinery. The company offers a range of products, including testing machines, repair services, and consumable parts orders. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • The Gentlemen is a relatively highly sophisticated ransomware-as-a-service (RaaS) group that emerged in mid-2025.
  • The Gentlemen Ransomware group primarily targets countries such as the United States of America, Brazil, Thailand, Spain, and Vietnam.
  • The Gentlemen Ransomware group primarily targets industries, including Manufacturing, Materials, Professional Goods & Services, Consumer Goods & Services, and Information Technology.
  • Based on the Gentlemen Ransomware victims list from 1st July 2025 to 03rd March 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Gentlemen Ransomware victims list from 1st July 2025 to 03rd March 2026are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, the Gentlemen Ransomware is a highly adaptive and globally active threat that leverages dual-extortion tactics, combining data theft with file encryption. The group employs advanced evasion and persistence techniques, supports cross-platform and scalable ransomware deployment, and conducts targeted attacks across multiple industries and geographic regions. This combination of capabilities makes it a significant risk to enterprise cybersecurity defenses, particularly for organizations with limited detection and incident-response maturity.

5. Vulnerabilities and Exploits

Vulnerability in Docker Desktop

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Containerization Platforms / Desktop DevOps Tools
  • Vulnerability: CVE-2026-28400
  • CVSS Base Score: 7.5 Source
  • Vulnerability Type: Command Injection

Summary:
The vulnerability allows a remote user to bypass implemented security restrictions.

Relevancy & Insights:
The vulnerability exists due to insufficient input validation.

Impact:
A remote user can perform runtime flag injection and escalate privileges on the system.

Affected Products:
https[:/]/docs[.]docker[.]com/security/security-announcements/#docker- desktop-4620-security-update-cve-2026-28400

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in Docker Desktop introduces significant security risks to development environments, containerized workflows, and integrated DevOps pipelines. As Docker Desktop is widely used across enterprises, cloud-native teams, and software engineering environments, exploitation of this command injection flaw can impact numerous industries globally. Ensuring the security of Docker Desktop is crucial for maintaining the integrity of local development ecosystems, protecting container orchestration processes, and preventing unauthorized command execution on host systems. Therefore, addressing this vulnerability is essential to safeguarding development workstations, securing container environments, and ensuring operational reliability across diverse sectors and geographic regions.

6. Latest Cyber-Attacks, Incidents, and Breaches

Space Bears Ransomware attacked and published the data of Kymco (Kwang Yang Motor Co., Ltd.)

  • Threat Actor: Space Bears Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Manufacturing
  • Target Geography: Taiwan
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Space Bears Ransomware attacked and published the data of Kymco (Kwang Yang Motor Co., Ltd.) (https[:]//www[.]kymco[.]com[.]tw) on its dark web website. Kymco (Kwang Yang Motor Co., Ltd.) – Taiwanese company founded in 1963, specializing in the production of motorcycles, scooters, and electric vehicles. It is known for offering a wide range of high-quality products, from small scooters to sport motorcycles and e-bikes. The company actively integrates innovative technologies, including electric drivetrains and advanced control systems, positioning itself as a leader in the market. Kymco also has a strong global presence, exporting its products to over 100 countries. Additionally, the company is committed to developing eco-friendly transportation solutions, such as electric scooters and e-bikes. The ransomware incident resulted in the exposure of sensitive data, including Patent and Innovation Data, Financial Data, Customer and Partner Data, 3D models of developments, Schematics and test results, and much more.

Source: Dark Web

Relevancy & Insights:

  • Space Bears operates a dedicated leak site that was first identified in April 2024. This site is used to publish stolen data from victims, showcasing the group’s pivot towards data theft as a primary method of extortion.
  • Space Bears is associated with the Phobos ransomware-as-a-service (RaaS) operation. The group utilizes similar tactics and tools, including hosting stolen data on their leak site, which has been linked to the Faust operator within the Phobos ecosystem.
  • The Space Bears group employs double extortion strategies, where they not only encrypt files but also exfiltrate sensitive data before encryption. If the ransom is not paid, they threaten to leak this data publicly.

ETLM Assessment:
According to CYFIRMA’s assessment, Space Bears ransomware represents a significant threat in the evolving landscape of cybercrime. With its aggressive tactics, association with established ransomware operations like Phobos, and focus on double extortion, organizations are advised to bolster their cybersecurity measures to mitigate risks associated with such attacks. Continuous monitoring of this group’s activities will be essential for understanding their methods and potential impact on various sectors.

7. Data Leaks

Bahrain’s National Security Agency Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Government
  • Target Geography: Bahrain
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA research team has identified a post published on a well- known hacking forum by a threat actor operating under the alias “TheAshborn”, claiming responsibility for a data breach involving the National Security Agency of Bahrain (NSA[.]gov[.]bh), based in Bahrain.

According to the forum post, the actor alleges that they gained access to the agency’s email server and exfiltrated approximately 200 GB of data, reportedly including email communications and internal correspondence from around 50 user accounts. The actor claims to possess the full dataset within their database and has offered it for sale on the forum.

The post includes references to external file-sharing links (presumably as proof samples) and indicates a sale price of USD 2,500 in cryptocurrency. The threat actor specifies “No Telegram – No TOX – Just Session,” providing a session-based contact string for negotiation. The post also advises potential buyers to use an escrow service for a secure transaction.

Based on the description provided in the forum listing, the allegedly compromised data may include:

  • Email account data from NSA[.]gov[.]bh
  • Internal email communications and letters
  • Potential administrative or operational correspondence
  • Associated email metadata

At this stage, the authenticity of the breach claim remains unverified, as the information originates solely from the threat actor’s forum post. There has been no publicly confirmed statement from the affected organization validating the incident at the time of reporting.

Source: Underground Forums

Malaysia Government Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Government
  • Target Geography: Malaysia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA research team has identified a post published on a well- known hacking forum by a threat actor operating under the alias “TheAshborn”, advertising the sale of multiple alleged Malaysian government databases under the title “[Malaysia] GOV DBs for sale 2025.”

According to the forum post, the actor claims to possess databases allegedly exfiltrated from several Malaysian government entities, including:

  1. Majlis Amanah Rakyat (MARA) – (mara[.]gov[.]my)
  2. Jabatan Imigresen Malaysia – (gitn[.]com[.]my referenced in the post)
  3. Ministry of Health Malaysia – (mohe[.]gov[.]my / moha.gov.my referenced in the post)
  4. Ministry of Home Affairs Malaysia – (moha[.]gov[.]my)
  5. Ministry of Defence Malaysia – (mod[.]gov[.]my)

The threat actor claims that the alleged data includes extensive personnel information, particularly referencing employee-related records, such as:

  • Employee numbers
  • Full names
  • Positions
  • Departments
  • Categories
  • Employment status

The post states that proof of the data will only be shared with customers who are ready to pay, indicating a controlled disclosure model commonly used in underground marketplaces. The actor specifies communication restrictions (“No Telegram – No TOX – Just Session”) and provides a session-based contact string for negotiation. Additionally, the post suggests using an escrow service for secure transactions.

At this stage, the authenticity of the breach claims remains unverified, as the information is based solely on the threat actor’s forum advertisement. No official confirmation from the referenced Malaysian government entities has been identified at the time of this reporting.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor known by the alias “TheAshborn” is assessed to be a recently emerged but highly active and capable entity, primarily engaged in data-leak operations. The group’s activity highlights the persistent and fast-evolving cyber threat landscape, driven by underground criminal ecosystems. This development underscores the urgent need for organizations to reinforce their cybersecurity posture through continuous monitoring, improved threat intelligence capabilities, and proactive defensive strategies to protect sensitive information and critical infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA research team has identified a post published in an underground cybercrime forum’s auction section by a threat actor using the alias “Ragnarok.” The listing is titled “East Asia ~60B” and was posted approximately two hours prior to capture.

According to the threat actor, the offering allegedly involves access to an international company with operational presence across multiple East Asian regions, specifically referencing Taiwan (TW), Hong Kong (HK), Japan (JP), Korea (KR), and Singapore (SG). The actor claims the company is widely recognized, though no explicit organization name is disclosed in the listing.

The post advertises the following alleged access details:

  • Revenue: ~60 billion (currency not specified)
  • Infrastructure Size: 400,000–500,000 hosts
  • Privilege Level: Local Administrator access
  • Security Software Present: Symantec endpoint protection referenced
  • Access Type: Claimed bot-based access capable of executing command-line (CMD) instructions
  • Privilege Escalation: Actor claims administrative rights can be launched via their botnet
  • Access Transfer Method: File or PIN-based transfer mechanism
  • Communication Platform Mentioned: Zoom (actor indicates information will be provided during a transaction or upon deposit)

Pricing Structure

  • The actor lists a tiered pricing model:
  • Start Price: 12,000 (currency unspecified)
  • Step Increment: 1,000
  • Blitz/Buyout Price: 25,000

Additionally, the post states that a guarantor (escrow) service would be at the buyer’s expense.

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Ensure that detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies should be continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security controls, such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.