Weekly Intelligence Report – 20 March 2026

Published On : 2026-03-20
Share :
Weekly Intelligence Report – 20 March 2026

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows

Introduction
CYFIRMA Research and Advisory Team has found Zollo Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Zollo Ransomware
Research identified Zollo as a ransomware variant associated with the MedusaLocker family. Upon successful infection, the malware initiates a file encryption routine that targets user data and appends a distinct extension, such as “.zollo6” (with possible numerical variation), to each affected file, effectively rendering them inaccessible. For example, files like “1.jpg” and “2.png” are renamed to “1.jpg.zollo6” and “2.png.zollo6.” Beyond encryption, Zollo performs additional system modifications, including altering the desktop wallpaper to signal compromise and deploying a ransom note file titled “READ_NOTE.html.” These actions demonstrate a structured post-infection workflow designed to both disrupt normal system use and ensure the victim is immediately aware of the attack.

Screenshot: File encrypted by the ransomware (Source: Surface Web)

The ransom note outlines that the encryption process relies on a combination of RSA and AES cryptographic algorithms and explicitly warns against attempts to restore, rename, or tamper with the encrypted files, stating such actions may lead to permanent data loss. It also claims that confidential and personal data have been exfiltrated and stored on a private server controlled by the attackers. According to the message, this data will be deleted only after payment is completed; otherwise, it may be publicly released or sold. The note provides contact instructions via two email addresses and imposes a 72-hour window for the victim to respond, after which the ransom amount is said to increase, reinforcing urgency and pressure within the communication.

The appearance of the Zollo Ransomware ransom note (READ_NOTE.html) (Source: Surface Web)

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1112 Modify Registry
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1055 Process Injection
Privilege Escalation T1134.004 Access Token Manipulation: Parent PID Spoofing
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Defense Evasion T1014 Rootkit
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from Tools
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1112 Modify Registry
Defense Evasion T1134.004 Access Token Manipulation: Parent PID Spoofing
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Credential Access T1056.001 Input Capture: Keylogging
Discovery T1010 Application Window Discovery
Discovery T1012 Query Registry
Discovery T1016 System Network Configuration Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1518.001 Software Discovery: Security Software Discovery
Discovery T1614 System Location Discovery
Collection T1056.001 Input Capture: Keylogging
Collection T1074 Data Staged
Command and Control T1071 Application Layer Protocol
Command and Control T1573 Encrypted Channel
Impact T1486 Data Encrypted for Impact
Impact T1490 Inhibit System Recovery

Relevancy and Insights:

  • The ransomware primarily targets Windows operating systems, which are widely used across enterprise environments in multiple industries.
  • The ransomware executes commands such as vssadmin.exe Delete Shadows /all /quiet and wmic shadowcopy delete /nointeractive to remove Volume Shadow Copies, thereby preventing victims from restoring files through system backups or recovery mechanisms.
  • Persistence: The ransomware employs persistence mechanisms to maintain its presence within the compromised environment. This may include creating autostart entries or modifying system configurations to ensure continued execution and enable further malicious activities.

ETLM Assessment:
CYFIRMA’s assessment indicates that Zollo is a ransomware threat that encrypts data on compromised systems, leading to restricted access to critical files and disruption of normal operations. Its execution reflects a structured and multi-stage workflow, where the malware performs system-level interactions to ensure effective deployment and impact. It demonstrates environmental awareness through checks such as CPU identification and available disk space evaluation, which can be used to assess execution conditions. The malware also establishes persistence within the infected system, enabling it to remain active across reboots and maintain control over time. In addition, it undertakes actions that support uninterrupted execution, including interacting with system processes and services to facilitate broader access to targeted data.

From a forward-looking perspective, this ransomware has the potential to evolve into a more adaptive and resilient threat by enhancing its operational depth and evasion capabilities. Future iterations could incorporate more advanced environment profiling techniques, enabling more precise targeting and improved avoidance of analysis or security controls. The persistence mechanisms may become more sophisticated and layered, ensuring long-term access even in partially remediated environments. Furthermore, the integration of more efficient data handling and exfiltration workflows, combined with expanded system interference techniques, could increase overall impact. Such developments would allow the threat to operate with greater stealth, sustain longer dwell times, and exert increased pressure on affected systems through a combination of disruption and data control.

Additionally, the threat could progress toward more automated and scalable attack capabilities, enabling wider distribution and faster execution across multiple environments. Enhancements in lateral movement techniques and network propagation could allow it to spread more effectively within organizational infrastructures. Coupled with improved coordination between encryption routines and system disruption mechanisms, these advancements would further strengthen its ability to maximize damage, maintain persistence across endpoints, and complicate detection and incident response efforts.

Sigma rule:
title: New RUN Key Pointing to Suspicious Folder tags:
– attack.privilege-escalation
– attack.persistence
– attack.t1547.001 logsource:
category: registry_set product: windows
detection: selection_target:
TargetObject|contains:
– ‘\Software\Microsoft\Windows\CurrentVersion\Run’
– ‘\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run’
– ‘\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run’ selection_suspicious_paths_1:
Details|contains:
– ‘:\Perflogs’
– :\ProgramData’
– ‘:\Windows\Temp’
– ‘:\Temp’
– ‘\AppData\Local\Temp’
– ‘\AppData\Roaming’
– ‘:\$Recycle.bin’
– ‘:\Users\Default’
– ‘:\Users\public’
– ‘%temp%’
– ‘%tmp%’
– ‘%Public%’
– ‘%AppData%’ selection_suspicious_paths_user_1:
Details|contains: ‘:\Users\’ selection_suspicious_paths_user_2:
Details|contains:
– ‘\Favorites’
– ‘\Favourites’
– ‘\Contacts’
– ‘\Music’
– ‘\Pictures’
– ‘\Documents’
– ‘\Photos’ filter_main_windows_update:
TargetObject|contains: ‘\Microsoft\Windows\CurrentVersion\RunOnce\’ Image|startswith: ‘C:\Windows\SoftwareDistribution\Download\’ Details|contains|all:
– ‘rundll32.exe ‘
– ‘C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32’ Details|contains:
– ‘\AppData\Local\Temp\’
– ‘C:\Windows\Temp\’ filter_optional_spotify:
Image|endswith:
– ‘C:\Program Files\Spotify\Spotify.exe’
– ‘C:\Program Files (x86)\Spotify\Spotify.exe’
– ‘\AppData\Roaming\Spotify\Spotify.exe’ TargetObject|endswith:
‘SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Spotify’ Details|endswith: ‘Spotify.exe –autostart –minimized’
condition: selection_target and (selection_suspicious_paths_1 or (all of selection_suspicious_paths_user_* )) and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
– Software using weird folders for updates level: high
(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained, which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is a requirement to inform the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Active Malware of the Week

Type: Remote Access Trojan | Objectives: Data Exfiltration/ Remote Control | Target Technology: Windows OS | Target Geography: Global

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week, “Raton RAT” is in focus.

Overview of Operation Raton RAT Malware
The analysed Raton RAT sample functions as a remote access tool designed to provide an external operator with control over a compromised Windows system. When executed, the malware begins interacting with the local environment and initiates communication with external infrastructure to establish a connection with its operator. During execution, it performs several system queries, including checks related to the operating system, running processes, and registry entries. These activities indicate that the malware attempts to gather basic information about the host system while preparing the environment for further interaction.

Network analysis shows that the sample sends requests to external IP lookup services such as ip-api.com to determine the public IP address and network characteristics of the infected machine. Such queries are commonly used by malware to identify the geographical location or network environment of a target system. In addition to these lookups, the malware establishes outbound connections to remote infrastructure that may serve as command-and-control communication channels, enabling the operator to exchange commands and data with the compromised host.

Further observation reveals that the malware interacts with several Windows services and system components during runtime. It accesses registry paths, creates temporary files within user directories, and loads multiple system libraries required for its execution. These behaviours allow the malware to operate alongside legitimate system processes and maintain its functionality while remaining relatively unobtrusive. Taken together, these activities indicate that malware is designed to collect basic system information, establish network connectivity with external infrastructure, and enable remote interaction with the infected system.

Attack Method
Upon execution, the malware begins performing a sequence of operations to integrate itself into the system environment. It interacts with several core Windows processes, including svchost.exe, services.exe, and lsass.exe, allowing the malicious process to run in parallel with legitimate system activities. During this stage, multiple Windows libraries are loaded, particularly those associated with service management and registry operations. These components enable the malware to access system resources and carry out actions that require elevated interaction with the operating system.

Following successful execution, malware conducts reconnaissance activities to gather information about the host system. It leverages Windows Management Instrumentation (WMI) to query system classes such as Win32_OperatingSystem and AntivirusProduct, which provide details about the operating system and the presence of installed security solutions. The malware also collects additional system information by invoking functions related to process enumeration and network configuration. Furthermore, it accesses several registry locations across both user and system hives, likely to obtain configuration details and assess the system environment before proceeding with additional operations.

Network communication plays a key role in malware’s behaviour. During analysis, the sample was observed by issuing HTTP requests to external IP lookup services, including ip-api.com, to determine the public IP address and network attributes of the infected system. Such requests allow attackers to identify the network environment of the compromised host, including its geographical location or whether it is operating within a hosting or proxy-based network. In parallel, the malware performs DNS lookups and establishes outbound TCP connections to infrastructure linked to the domain cloudpub[.]ru, which appears to support command-and-control communication.

In addition to reconnaissance and network activity, the malware carries out several runtime management tasks. Temporary files are created within user directories during execution and are later removed, indicating their use for temporary operational purposes. The malware also generates mutex objects to regulate process execution and prevent multiple instances from running simultaneously. Registry entries associated with Windows tracing services are modified as well, which may assist in controlling or monitoring certain internal functions. Collectively, these actions demonstrate how malware prepares the system environment, gathers system.

The following are the TTPs based on the MITRE Attack Framework for Enterprise

Tactic Technique ID Technique Name
Execution T1053 Scheduled Task/Job
Execution T1059 Command and Scripting Interpreter
Execution T1106 Native API
Execution T1129 Shared Modules
Persistence T1112 Modify Registry
Persistence T1547 Boot or Logon Autostart Execution
Privilege Escalation T1055 Process Injection
Privilege Escalation T1134 Access Token Manipulation
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1070 Indicator Removal
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1620 Reflective Code Loading
Discovery T1012 Query Registry
Discovery T1033 System Owner/User Discovery
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1087 Account Discovery
Discovery T1518 Software Discovery
Command and control T1071 Application Layer Protocol
Command and control T1095 Non-Application Layer Protocol
Impact T1496 Resource Hijacking

INSIGHTS
The behaviour of the analysed sample indicates that it operates as a multi-purpose remote access tool rather than a single-function piece of malware. Its design and feature set suggest that it was developed to provide operators with broad control over infected systems. The presence of several configurable functions and management options indicates that the tool can be adjusted depending on the operator’s needs or the conditions of the compromised environment.

Another noticeable characteristic is the way the malware operates alongside normal system activity. Instead of relying solely on suspicious standalone processes, it interacts with legitimate Windows components and services during execution. By utilizing standard system libraries and processes, the malware’s activity can appear similar to routine operating system behaviour, which helps it remain less conspicuous during runtime.

The analysis also shows that malware attempts to understand the system and network environment before further interaction occurs. By collecting basic host and network information, the operator can obtain a clearer picture of the compromised system. This behaviour indicates that the tool is not only intended for remote control, but also for assessing and managing the infected environment during an intrusion.

ETLM ASSESSMENT
From an ETLM perspective, Raton RAT highlights a future in which Windows-focused threats may become increasingly adaptive and integrated with normal system operations, making malicious activity more difficult to detect. Such tools are likely to leverage legitimate services and everyday applications to maintain covert access and control. For organizations and employees, this evolution could increase the risk of unauthorized data access, system manipulation, and ongoing surveillance of user activity. Over time, even routine processes may be exploited, potentially undermining trust in standard IT environments and increasing the complexity of maintaining effective security.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule RatonRAT_Comprehensive
{
meta:
description = “detection for Raton RAT including hashes and behavioral indicators” author = “CYFIRMA”
date = “2026-03-16”

strings:
/* File Hashes */
$hash_1 = “b15562c0771ce6855e2186998be98482584951039424400b2413dd2f86362820”
$hash_2 = “25b442da47743d5c195cdf6178248d2b1eeb5238d22341dc6a7fedfa5abdab37”
$hash_3 = “13f4b05abe78f7a5714f32ecddc9b5b463803c62cd8355f493b42af8cb4fa9db”
$hash_4 = “a9123cc28991a45d576c7a1302fb4c335cff34d4548c8a8f78aae54aa839c173”
$hash_5 = “15734c54d25341317a2f58bbc3c9ed3f8efa73af50fb5feb1ef46b6c3e02cab9”
$hash_6 = “3578222693be106eac90343c12f06454b6de6e19a50d31ae5105218c36514bbd”

/* Mutexes created */
$mutex_1 = “eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0”
$mutex_2 = “pXKpWDdoLzpgwPiRSUNkUJ9”
$mutex_3 = “Local\\MidiMapper_modLongMessage_RefCnt”

/* Registry keys accessed or modified */
$reg_1 = “HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Tracing\\qZGuNez_RASAPI32”
$reg_2 = “HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Tracing\\qZGuNez_RASMANCS”
$reg_3 = “HKEY_CURRENT_USER\\Software\\Microsoft\\.NETFramework”
$reg_4 = “HKEY_CURRENT_USER\\Control Panel\\International”

/* Network indicators */
$net_1 = “cloudpub.ru”

/* Behavioural indicators */
$behavior_1 = “ExecQueryWmi”
$behavior_2 = “GetAdaptersAddresses”
$behavior_3 = “advapi32.RegOpenKeyExW”
$behavior_4 = “GetTickCount”
$behavior_5 = “IsDebuggerPresent”

condition:
any of ($hash_*) or any of ($mutex_*) or any of ($reg_*) or any of ($net_*) or any of ($behavior_*)
}

Recommendations

Strategic Recommendations

  • Implement a comprehensive cybersecurity strategy that integrates endpoint protection, network monitoring, and threat intelligence.
  • Develop organization-wide policies for secure software usage and strict controls over privileged accounts.
  • Establish continuous threat assessment programs to monitor emerging malware trends and adapt defences accordingly.
  • Invest in advanced detection technologies, including behavioural analytics and anomaly detection, to identify sophisticated threats that evade traditional signature-based solutions.

Management Recommendations

  • Enforce regular employee training on phishing, social engineering, and safe computing practices to reduce the risk of malware infection.
  • Maintain up-to-date asset inventories, including endpoints, servers, and network devices, to improve incident response efficiency.
  • Ensure regular backup policies and secure storage of critical data to minimize operational impact in case of compromise.
  • Conduct periodic tabletop exercises and simulations to assess response readiness for ransomware or remote access malware incidents.

Tactical Recommendations

  • Deploy endpoint detection and response (EDR) tools to monitor process execution, registry modifications, and network connections.
  • Implement network-level controls, such as DNS filtering, firewall rules, and blocking access to known malicious domains like ip-api.com and cloudpub.ru.
  • Use YARA rules and threat intelligence feeds to detect malware based on file hashes, mutexes, and behavioural indicators.
  • Regularly patch operating systems and applications to reduce vulnerabilities that malware can exploit for execution, persistence, or privilege escalation.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

CYFIRMA’s Weekly Insights

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Spear Phishing, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – INC Ransomware, The Gentlemen Ransomware| Malware – Raton RAT
  • INC Ransomware – One of the ransomware groups.
  • The Gentlemen Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – Raton RAT
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Camaro Dragon, aka Mustang Panda, Carries Out Rapid Espionage Operations

  • Threat Actor: Camaro Dragon aka Mustang Panda
  • Attack Type: Connection Proxy, Credential Dumping, DLL Sideloading, USB, Exploitation of Vulnerability, Spear-Phishing, Social Engineering Attack, Malware Deployment, DLL Hijacking
  • Objective: Information Theft, Espionage
  • Suspected Target Technology: Air Gapped systems, Office Suites Software, Operating System, Web Application, Citrix NetScaler, NVDA
  • Suspected Target Geography: Australia, India, Japan, South Korea, Taiwan, Thailand, US, Vietnam, Myanmar, Philippines, Mongolia, Pakistan, Qatar, Middle East, Turkey
  • Suspected Target Industries: Critical Infrastructure, Government, NGOs, Religion, Think Tank, Military
  • Business Impact: Compromised user accounts, Data Theft, Operational Disruption, Reputational Damage
  • About the Threat Actor
    Mustang Panda is a Chinese state-associated espionage group active since at least 2012, known for conducting structured, geopolitically motivated intelligence operations with a strong focus on adaptability and long-term persistence. Its campaigns often start with targeted spear-phishing emails, typically using politically themed lures delivered via ZIP, RAR, LNK, or malicious URLs, followed by multi-stage payload deployment, where initial loaders introduce backdoors, reverse shells, and tools for lateral movement.

    The group frequently uses malware families such as PlugX, Poison Ivy, ToneShell, StarProxy, Claimloader, and SplatCloak, relying heavily on techniques like DLL sideloading and encrypted command-and-control channels to remain undetected and maintain access. In some cases, it has also leveraged infected USB drives for propagation. Overall, Mustang Panda demonstrates a high level of capability, combining precise targeting with modular malware frameworks to sustain prolonged access to sensitive networks.

    Details on Exploited Vulnerabilities

    CVE ID AffectedProducts CVSS Score Exploit Links
    CVE-2021-1675 Microsoft Windows 7.8 link1, link2, link3
    CVE-2021-40444 Microsoft Windows 7.8 link1, link2, link3

    TTPs based on MITRE ATT&CK Framework

    Tactic ID Technique
    Reconnaissance T1598.003 Phishing for Information: Spear phishing Link
    Resource Development T1585.002 Establish Accounts: Email Accounts
    Resource Development T1608 Stage Capabilities
    Resource Development T1608.001 Stage Capabilities: Upload Malware
    Resource Development T1588.004 Obtain Capabilities: Digital Certificates
    Resource Development T1583.001 Acquire Infrastructure: Domains
    Initial Access T1091 Replication Through Removable Media
    Initial Access T1566.001 Phishing: Spear phishing Attachment
    Initial Access T1566.002 Phishing: Spear phishing Link
    Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
    Execution T1059.005 Command and Scripting Interpreter: Visual Basic
    Execution T1059.001 Command and Scripting Interpreter: PowerShell
    Execution T1203 Exploitation for Client Execution
    Execution T1053.005 Scheduled Task/Job: Scheduled Task
    Execution T1204.001 User Execution: Malicious Link
    Execution T1204.002 User Execution: Malicious File
    Execution T1047 Windows Management Instrumentation
    Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
    Persistence T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription
    Persistence T1574.001 Hijack Execution Flow: DLL
    Persistence T1053.005 Scheduled Task/Job: Scheduled Task
    Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
    Privilege Escalation T1546.003 Event Triggered Execution: Windows Management Instrumentation Event Subscription
    Privilege Escalation T1574.001 Hijack Execution Flow: DLL
    Privilege Escalation T1053.005 Scheduled Task/Job: Scheduled Task
    Defense Evasion T1480 Execution Guardrails
    Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
    Defense Evasion T1574.001 Hijack Execution Flow: DLL
    Defense Evasion T1070.004 Indicator Removal: File Deletion
    Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
    Defense Evasion T1036.007 Masquerading: Double File Extension
    Defense Evasion T1036.004 Masquerading: Masquerade Task or Service
    Defense Evasion T1027 Obfuscated Files or Information
    Defense Evasion T1027.013 Obfuscated Files or Information: Encrypted/Encoded File
    Defense Evasion T1027.016 Obfuscated Files or Information: Junk Code Insertion
    Defense Evasion T1553.002 Subvert Trust Controls: Code Signing
    Defense Evasion T1218.004 System Binary Proxy Execution: InstallUtil
    Defense Evasion T1218.005 System Binary Proxy Execution: Mshta
    Defense Evasion T1218.014 System Binary Proxy Execution: MMC
    Defense Evasion T1218.007 System Binary Proxy Execution: Msiexec
    Credential Access T1003.003 OS Credential Dumping: NTDS
    Discovery T1083 File and Directory Discovery
    Discovery T1057 Process Discovery
    Discovery T1518 Software Discovery
    Discovery T1082 System Information Discovery
    Discovery T1016 System Network Configuration Discovery
    Discovery T1049 System Network Connections Discovery
    Lateral Movement T1091 Replication Through Removable Media
    Collection T1557.004 Adversary-in-the-Middle: Evil Twin
    Collection T1560.001 Archive Collected Data: Archive via Utility
    Collection T1119 Automated Collection
    Collection T1560.003 Archive Collected Data: Archive via Custom Method
    Collection T1074.001 Data Staged: Local Data Staging
    Command and Control T1071.001 Application Layer Protocol: Web Protocols
    Command and Control T1219.002 Remote Access Tools: Remote Desktop Software
    Command and Control T1573.001 Encrypted Channel: Symmetric Cryptography
    Command and Control T1105 Ingress Tool Transfer
    Command and Control T1102 Web Service
    Command and Control T1090 Proxy
    Command and Control T1095 Non-Application Layer Protocol
    Exfiltration T1052.001 Exfiltration Over Physical Medium: Exfiltration over USB

    Latest Developments Observed
    The threat actor is suspected of conducting targeted campaigns against Qatari entities using Middle East conflict-themed lures to improve delivery success. The activity involved deploying PlugX through DLL hijacking alongside the use of Cobalt Strike for initial access and reconnaissance. Furthermore, the actor utilized a previously unseen Rust-based loader exploiting NVDA components, reflecting evolving tradecraft and a rapid operational pivot aligned with geopolitical developments, likely for espionage objectives.

    ETLM Insights
    Mustang Panda is a state-aligned cyber espionage actor focused on intelligence collection in line with China’s geopolitical priorities, demonstrating a high degree of operational agility in response to evolving regional dynamics.

    China’s cyber operations strategy remains closely aligned with its broader national economic and strategic objectives. State-linked advanced persistent threat (APT) groups are consistently observed pursuing four primary goals:

    • Acquisition of strategic intelligence.
    • Access to intellectual property and advanced technologies.
    • Support for the economic competitiveness of domestic industries.
    • Demonstration of sophisticated cyber capabilities on the global stage.

    Cyber espionage campaigns attributed to Chinese nation-state actors typically target high-value industrial sectors and multinational enterprises. These operations are designed to advance geopolitical interests while facilitating the collection of sensitive corporate data, research insights, and strategic business intelligence. Such intelligence can be leveraged to accelerate domestic technological development, enhance innovation cycles, and provide a competitive advantage to state-supported enterprises.

    IOCs:
    Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

    YARA Rules
    rule MustangPanda_CamaroDragon_PlugX_Variant
    {
    meta:
    description = “Detects Mustang Panda (Camaro Dragon) activity using PlugX/Cobalt Strike related infrastructure”
    author = “CYFIRMA” date = “2026-03-17”
    threat_actor = “Mustang Panda / Camaro Dragon” malware_family = “PlugX / Loader”
    hash1 =
    “960e06362417ccfbcf4fed3713537961382ee856e83eae93ef528b1512bb9bd0”
    hash2 =
    “00000077553a5b27a610ac98f29563bbd6e0decc020c2d49e4fa0d89197e7fd8”

    strings:
    $s1 = “eqfvkn” ascii

    /* Domains */
    $d1 = “www.dest-working.com” ascii nocase
    $d2 = “www.ynsins.com” ascii nocase
    $d3 = “www.ainkstore.com” ascii nocase
    $d4 = “www.bcller.com” ascii nocase
    $d5 = “jcswcd.com” ascii nocase
    $d6 = “newsmailnet.com” ascii nocase

    /* IPs */
    $ip1 = “202.59.10.106” ascii
    $ip2 = “188.208.141.196” ascii
    $ip3 = “139.59.46.88” ascii
    $ip4 = “23.216.147.76” ascii
    $ip5 = “20.99.133.109” ascii

    /* CVE references */
    $cve1 = “CVE-2021-40444” ascii
    $cve2 = “CVE-2021-1675” ascii

    condition:
    (uint16(0) == 0x5A4D) and (
    $s1 and
    (2 of ($d*) or 2 of ($ip*) or any of ($cve*))
    )
    }

    Recommendations

    Strategic Recommendations

    • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
    • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
    • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

    Management Recommendations

    • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in- line prompts to help educate users.
    • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

    Tactical Recommendations

    • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
    • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
    • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
    • Add the YARA rules for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
    • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defenses based on the tactical intelligence provided.

    3. Major Geopolitical Developments in Cybersecurity

    Europol and Interpol announce hit cybercrime operations in Bangladesh
    Europol, in collaboration with Eurojust and law enforcement agencies from Austria, France, the Netherlands, and the United States, has executed Operation Lightning to dismantle the malicious residential proxy service known as SocksEscort. This service exploited compromised devices—primarily routers and IoT devices infected via vulnerabilities in certain residential modems—to build a large-scale botnet.

    The operation targeted a network that had allegedly compromised more than 369,000 such devices across 163 countries, providing cybercriminals with access to over 35,000 proxies in recent years for activities like fraud and other cybercrimes. Authorities seized 34 domains and 23 servers in seven countries, while the United States froze approximately $3.5 million in cryptocurrency linked to the operation.

    Separately, Interpol has announced the results of Operation Synergia III, the third phase of its ongoing counter-cybercrime initiative that began in 2023. Running from July 18, 2025, to January 31, 2026, this operation involved law enforcement from 72 countries and territories and focused on disrupting infrastructure used for phishing, malware, ransomware, and related schemes. The effort resulted in the takedown of more than 45,000 malicious IP addresses and servers. Authorities made 94 arrests worldwide, with 110 individuals still under investigation. In total, 212 electronic devices and servers were seized. Notably, Bangladesh saw significant action, with 40 arrests and the seizure of 134 devices tied to various scams, including loan fraud, job scams, identity theft, and credit card fraud. Coordinated raids and disruptions targeted key locations and malicious activities globally.

    ETLM Assessment:
    The operation focused on disrupting the infrastructure (domains, servers, and cryptocurrency wallets), but despite the initial focus on the hub in Bangladesh, investigations continue, with indications that seized servers may lead to further evidence and pursuits of the operators or downstream users. The hub in Bangladesh was providing anonymizing proxy infrastructure as a service (PaaS-like for cybercrime), enabling widespread fraud and other malicious operations rather than directly carrying out end-user attacks themselves. Roughly half of the arrests were conducted in other countries around the globe.

    Russian hackers are targeting Signal and WhatsApp
    Dutch intelligence agencies, the General Intelligence and Security Service (AIVD) and the Defence Intelligence and Security Service (MIVD), have issued a joint warning about a large-scale global cyber campaign attributed to Russian state-backed hackers (often referred to as Russian state actors or Kremlin-linked operatives). The attackers are targeting Signal and WhatsApp accounts belonging to high-value individuals, including dignitaries, government officials, military personnel, civil servants, and potentially journalists or others of interest to the Russian government. Dutch authorities confirmed that Dutch government employees have been among the targets and victims.

    The primary tactic involves social engineering and phishing: Hackers impersonate official support entities—such as posing as a “Signal Support” chatbot, “Signal Security Support Chatbot,” or similar fake accounts—to trick users into revealing their verification codes, registration codes, or PINs. Once obtained, these credentials allow the attackers to take over the accounts, bypassing end-to-end encryption by gaining direct access to read messages, view contacts, and monitor communications. The agencies emphasized that this campaign relies on deception rather than exploiting technical vulnerabilities in the apps themselves.

    ETLM Assessment:
    The goal of the Russian state-backed hackers in this large-scale global cyber campaign, as identified by the intelligence agencies and CYFIRMA, is to gain unauthorized access to Signal and WhatsApp accounts belonging to high-value targets such as dignitaries, government officials, civil servants, military personnel, and potentially journalists or others of interest to the Russian government—including confirmed victims among Dutch government employees—in order to conduct espionage by secretly reading private messages, monitoring communications, and eavesdropping on group chats without needing to break the apps’ end-to-end encryption. Thus, enabling surveillance of sensitive discussions related to national security, policy, or other strategic information valuable to the Russian state’s interests.

    Iranian hackers wipe a US medical manufacturing company
    Iranian hackers have claimed responsibility for a major data-wiping cyberattack against a leading US medical manufacturing company, prompting the firm to instruct its 56,000 employees to disconnect from all networks and avoid powering on company devices. The hacktivist group stated the operation was in retaliation for recent US-Israeli military strikes on Iran. Authorities have linked the group to Iran’s intelligence services. The attackers reportedly gained access to the company’s device management platform, enabling them to remotely trigger wipes on enrolled corporate devices. The company has stated that ransomware was not involved and that its core production systems were not directly compromised. The incident carries significant potential for supply-chain disruptions, given the widespread use of the company’s medical devices in US hospitals.

    ETLM Assessment:
    Iranian state-linked hackers and affiliated hacktivist groups, such as Handala, typically pursue retaliation against US, Israeli, or Western interests following military strikes by opportunistically exploiting any vulnerable target that offers low barriers to entry and symbolic or disruptive impact, rather than limiting themselves to high-value military or government systems. This approach includes probing poorly secured networks, internet-connected devices, corporate supply chains, and mid-sized enterprises— often using unpatched vulnerabilities, compromised management platforms like Microsoft Intune for mass device wipes, or data exfiltration—to cause visible economic harm, operational chaos, or propaganda value while minimizing their own risk and resource demands amid constrained domestic connectivity or escalation risks. By framing such attacks as direct responses to perceived aggressions, they broaden the cyber battlespace, signal resolve, and impose asymmetric costs on adversaries through indirect, high-visibility disruptions in non-strategic sectors like healthcare manufacturing.

    4. Rise in Malware/Ransomware and Phishing

    INC Ransomware Impacts LHT Holdings Limited

    • Attack Type: Ransomware
    • Target Industry: Manufacturing
    • Target Geography: Singapore
    • Ransomware: INC Ransomware
    • Objective: Data Theft, Data Encryption, Financial Gains
    • Business Impact: Financial Loss, Data Loss, Reputational Damage

    Summary:
    CYFIRMA observed in an underground forum that a company from Singapore, LHT Holdings Limited (https[:]//www[.]lht[.]com[.]sg/), was compromised by INC Ransomware. LHT Holdings is a leading manufacturer of wooden pallets and crates based in Singapore. The company specializes in environmentally friendly packaging solutions, offering a comprehensive range of products, including pest-free IPPC pallets, plastic pallets, and technical wood. LHT also provides services such as industrial packaging, pallet rental, and waste disposal, catering to clients looking for sustainable and innovative packaging options. With a focus on emerging technology and sustainability, LHT aims to reduce carbon footprints while delivering high-quality products and services. Based on the screenshot, the ransomware leak post related to LHT Holdings Limited appears to expose internal corporate and financial documents. The preview images indicate that the compromised data likely includes financial records, invoices, transaction summaries, accounting spreadsheets, and operational documentation. Some of the visible files resemble billing statements, financial reports, and structured data tables, which may contain company financial details, payment information, and internal business records. Additionally, the presence of document forms and tabulated reports suggests that administrative paperwork and internal operational documents may also be part of the leaked dataset. Overall, the exposed data appears to consist primarily of sensitive financial and corporate business documentation, which could potentially reveal commercial transactions, financial performance details, and internal organizational records.

    Source: Dark Web

    Relevancy & Insights:

    • INC Ransomware, also known as Incransom, is a cyber threat that emerged in mid- 2023. Incransom uses strong encryption algorithms to lock files, making recovery without the decryption key virtually impossible. The ransomware typically appends specific file extensions to encrypted files, signalling that they have been compromised.
    • Incransom is commonly distributed through:
    • Phishing emails: Containing malicious attachments or links that, when opened, deploy the ransomware.
    • Malicious downloads: From compromised websites or software packages.
    • The INC Ransomware group primarily targets countries such as the United States of America, Canada, Germany, the United Kingdom, and Australia.
    • The INC Ransomware group primarily targets industries, such as Professional Goods & Services, Healthcare, Government & Civic, Manufacturing, and Consumer Goods & Services.
    • Based on the INC Ransomware victims list from 1st Jan 2025 to 17th March 2026, the top 5 Target Countries are as follows:
    • The Top 10 Industries most affected by the INC Ransomware victims list from 1st Jan 2025 to 17th March 2026 are as follows:

    ETLM Assessment:
    Based on recent assessments by CYFIRMA, INC Ransomware represents a significant threat within the evolving landscape of ransomware attacks. Its use of strong encryption methods and double extortion tactics highlights the increasing sophistication of cybercriminal operations. Organizations are advised to enhance their cybersecurity measures by implementing robust defenses against phishing attacks, maintaining updated security protocols, and monitoring for unusual network activity to mitigate risks associated with this and other ransomware variants. Continuous vigilance is essential to protect against the threats posed by emerging ransomware groups like INC Ransomware.

    The Gentlemen Ransomware Impacts Malia Group

    • Attack Type: Ransomware
    • Target Industry: Conglomerate, Consumer Goods Distribution, Technology Solutions, Fashion, Engineering and contracting, Hospitality, and Real Estate
    • Target Geography: The United Arab Emirates (UAE), Lebanon, and Iraq
    • Ransomware: The Gentlemen Ransomware
    • Objective: Data Theft, Data Encryption, Financial Gains
    • Business Impact: Financial Loss, Data Loss, Reputational Damage

    Summary:
    CYFIRMA observed in an underground forum that a company from the United Arab Emirates, Malia Group(https[:]//www[.]maliagroup[.]com/), was compromised by the Gentlemen Ransomware. Malia Group is a multifaceted organization comprising 21 companies that operate across six sectors, including consumer goods distribution, technology solutions, fashion, engineering and contracting, and hospitality and real estate. With a strong presence in Lebanon, Iraq, and the United Arab Emirates (UAE), the group is committed to excellence in the creation, production, and timely delivery of goods and services. Over the past 80 years, Malia Group has built a portfolio of 60 brands and established partnerships with 50 leading multinationals, making it a preferred choice in the region. The compromised data includes confidential and sensitive information belonging to the organization.

    Source: Dark Web

    Relevancy & Insights:

    • The Gentlemen is a relatively highly sophisticated ransomware-as-a-service (RaaS) group that emerged in mid-2025.
    • The Gentlemen Ransomware group primarily targets countries such as the United States of America, Brazil, Thailand, France, and Spain.
    • The Gentlemen Ransomware group primarily targets industries, including Consumer Goods & Services, Manufacturing, Materials, Professional Goods & Services, and Information Technology.
    • Based on the Gentlemen Ransomware victims list from 1st July 2025 to 17th March 2026, the top 5 Target Countries are as follows:
    • The Top 10 Industries most affected by the Gentlemen Ransomware victims list from 1st July 2025 to 17th March 2026 are as follows:

    ETLM Assessment:
    According to CYFIRMA’s assessment, the Gentlemen Ransomware is a highly adaptive and globally active threat that leverages dual-extortion tactics, combining data theft with file encryption. The group employs advanced evasion and persistence techniques, supports cross-platform and scalable ransomware deployment, and conducts targeted attacks across multiple industries and geographic regions. This combination of capabilities makes it a significant risk to enterprise cybersecurity defenses, particularly for organizations with limited detection and incident-response maturity.

    5. Vulnerabilities and Exploits

    Vulnerability in Ingress-NGINX Controller for Kubernetes

    • Attack Type: Vulnerabilities & Exploits
    • Target Technology: Container Orchestration Platforms / Cloud-Native Infrastructure (Kubernetes)
    • Vulnerability: CVE-2026-3288
    • CVSS Base Score: 8.8 Source
    • Vulnerability Type: Code Injection
    • Summary: The vulnerability allows a remote user to execute arbitrary code on the target system.

    Relevancy & Insights:
    The vulnerability exists due to improper input validation, where the “nginx.ingress.kubernetes.io/rewrite-target” Ingress annotation can be used to inject configuration into nginx.

    Impact:
    A remote user can inject and execute arbitrary code in the context of the ingress-nginx controller.

    Affected Products:
    https[:]//github[.]com/kubernetes/kubernetes/issues/137560

    Recommendations:
    Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

    TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
    This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

    ETLM Assessment
    Vulnerability in the Ingress-NGINX Controller for Kubernetes introduces significant risks to cloud-native infrastructures that rely on Kubernetes for container orchestration and application deployment. As Kubernetes is widely used across enterprise environments, cloud platforms, and DevOps pipelines, exploitation of this vulnerability could allow attackers to gain unauthorized access to cluster resources and manipulate containerized workloads. Organizations leveraging Kubernetes- based deployments must ensure timely patching and robust security monitoring to protect against potential compromise. Addressing this vulnerability is essential to maintaining the integrity of container orchestration platforms and safeguarding critical application infrastructure across industries and geographic regions.

    6. Latest Cyber-Attacks, Incidents, and Breaches

    DragonForce Ransomware attacked and published the data of Pantomath Group

    • Threat Actor: DragonForce Ransomware
    • Attack Type: Ransomware
    • Objective: Data Leak, Financial Gains
    • Target Technology: Web Applications
    • Target Industry: Financial Services
    • Target Geography: India
    • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

    Summary:
    Recently, we observed that DragonForce Ransomware attacked and published the data of Pantomath Group (www[.]pantomathgroup[.]com) on its dark web website. Pantomath is a mid-market investment bank that offers a range of financial services, including investment banking, corporate advisory, asset management, and structured finance. The company serves mid-market businesses, family offices, and leading investors, leveraging a global network across 12+ countries. Based on the screenshot, the ransomware group appears to have published internal corporate documents belonging to Pantómath Group. The visible directory structure and file names suggest that the compromised data includes business development records, internal email folders, financial spreadsheets, and investment-related documentation. Files such as investment process status reports, valuation working sheets, provisional financial statements, and financial reports from March 2025 indicate that confidential financial and accounting information may have been exposed. Additionally, presentation files and annexure documents related to business unit activities and project assessments suggest that internal strategic planning materials, operational reports, and business presentations were also leaked. Overall, the breach appears to involve sensitive corporate financial data, investment documentation, and internal business communications, potentially revealing financial performance details, valuation analyses, and internal business strategies of the affected organization. The total volume of compromised data is estimated to be approximately 123.6 GB.

    Source: Dark Web

    Relevancy & Insights:

    • DragonForce Ransomware poses a significant threat as a mature Ransomware- as-a-Service (RaaS) operation active since mid-2023, employing sophisticated double-extortion tactics across Windows, Linux, ESXi, and NAS environments.
    • The DragonForce Ransomware group primarily targets industries, such as Professional Goods & Services, Consumer Goods & Services, Manufacturing, Real Estate & Construction, and Information Technology.

    ETLM Assessment:
    According to CYFIRMA’s assessment, DragonForce represents a significant threat in the ransomware landscape due to its advanced operational methods and extensive use of modified ransomware tools. As it continues to target high-profile organizations globally, ongoing vigilance and proactive cybersecurity strategies will be essential for mitigating risks associated with this formidable threat actor. Organizations should remain alert to the evolving tactics employed by groups like DragonForce to protect their sensitive data and maintain operational integrity.

    7. Data Leaks

    Mideast Data Advertised on a Leak Site

    • Attack Type: Data leak
    • Target Industry: Automotive, Transportation & Mobility
    • Target Geography: Saudi Arabia
    • Objective: Financial Gains
    • Business Impact: Data Loss, Reputational Damage

    Summary:
    The CYFIRMA research team identified a post on a dark web forum by a threat actor operating under the alias “Anonymous2090”, who claims responsibility for a major data breach involving Mideast[.]com[.]sa (Saudi Arabia). According to the post, the compromise impacted the organization’s website, associated subdomains, mobile applications (available on Google Play and the Apple App Store), and backend infrastructure, with the attacker allegedly gaining access to the complete source code of both the web platform and mobile applications.

    The threat actor further claims that the attack led to the deletion of databases and disruption of services, requiring the organization to rebuild its systems from the ground up. The exposed dataset is reported to exceed 40 GB of database content, in addition to sensitive source code.

    The post also indicates that the stolen data is being offered for sale, including a sample download link and contact details shared via a messaging platform.

    The allegedly compromised data includes:

    • Full names
    • Email addresses
    • Passwords
    • Phone numbers and device types
    • Bank transfer details and bank account numbers
    • Payment card information
    • Vehicle license plate numbers
    • Vehicle types and models
    • Website and mobile application source codeTop of FormBottom of Form

    At the time of analysis, the authenticity of the breach claim remains unverified. The available information originates solely from the threat actor’s forum post, and there has been no official confirmation from the affected organization or relevant authorities.

    Source: Underground Forums

    Electronic City Indonesia Data Advertised on a Leak Site

    • Attack Type: Data leak
    • Target Industry: Retail
    • Target Geography: Indonesia
    • Objective: Data Theft, Financial Gains
    • Business Impact: Data Loss, Reputational Damage

    Summary: CYFIRMA’s research team observed that Electronic City Indonesia, a prominent online retail platform specializing in consumer electronics and home appliances, has allegedly been compromised by a threat actor. In a post published on a hacker forum, the actor claims to have breached the company’s backend systems on March 10, 2026, acquiring a substantial customer and order database.

    According to the actor, the complete database contains over 618,000 unique customer records, with a sample of 54,000 rows publicly released to the community. The allegedly compromised data includes:

    • Full names
    • Email addresses
    • Phone numbers
    • Physical addresses (including recipients and labels)
    • Birthdays
    • Genders
    • National Identity Numbers (NIK)
    • Order histories (products, invoices, statuses, and tracking numbers)
    • Payment methods
    • Account creation and activity dates

    The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

    Source: Underground Forums

    Relevancy & Insights:
    Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

    ETLM Assessment:
    The threat actor known as “Anonymous2090” appears to be an active entity involved in data leak activities, frequently associated with claims of unauthorized system access and the sale of allegedly stolen data on dark web forums. Reports linking this alias to multiple incidents suggest a pattern of targeting organizations and attempting to monetize compromised information. The activity attributed to Anonymous2090 highlights the ongoing and evolving risks posed by actors operating within underground communities. These developments reinforce the need for organizations to strengthen their cybersecurity posture through continuous monitoring, effective use of threat intelligence, and proactive security measures to safeguard sensitive data and critical infrastructure.

    Recommendations:
    Enhance the cybersecurity posture by:

    1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
    2. Ensure proper database configuration to mitigate the risk of database-related attacks.
    3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

    8. Other Observations

    CYFIRMA’s research team observed that Cgpey International Private Limited, an Indian fintech platform specializing in payment infrastructure, salary disbursement, and business automation, has allegedly been compromised by an unidentified party. The incident, which reportedly took place on February 3, 2026, resulted in the exfiltration of approximately 26 GB of the company’s internal databases. The actor behind the breach claims the compromise was successful despite the platform’s public assertions of providing “100% secure” solutions.

    The allegedly compromised data encompasses 3.85 million unique records, primarily consisting of payment processing logs from various merchants. According to the actor, the compromised data includes:

    • Transaction IDs
    • Payment amounts
    • Client names
    • User IDs
    • Phone numbers
    • Transaction links
    • Internal employee information (including email addresses, IP addresses, and hashed passwords)

    The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

    Source: Underground Forums

    RECOMMENDATIONS

    STRATEGIC RECOMMENDATIONS

    • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
    • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
    • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
    • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
    • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

    MANAGEMENT RECOMMENDATIONS

    • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
    • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
    • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
    • Ensure that detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies should be continuously evolved to keep up with refined ransomware threats.

    TACTICAL RECOMMENDATIONS

    • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
    • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
    • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
    • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
    • Implement a combination of security controls, such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
    • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

    Situational Awareness – Cyber News

    Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

    For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.