top of page


When Your Toaster Joins a Botnet: ShadowV2’s World Tour
The OSINT reports that a Mirai-based botnet variant named ShadowV2 is exploiting known vulnerabilities in widely deployed IoT devices across multiple countries and industries to build a DDoS-capable botnet, with recent activity during a global AWS outage assessed as a likely test run for future attacks.
2 days ago18 min read


How to Lose Crypto and Alienate Developers: A Guide by OtterCookie
The OSINT reports that North Korean state-sponsored operators are running the “Contagious Interview” campaign, using malicious npm packages, GitHub, and Vercel infrastructure, and the OtterCookie malware family to compromise blockchain and Web3 developers, exfiltrate credentials and wallet data, and remotely control infected systems for digital asset theft and espionage.
2 days ago21 min read


The Ministry of Just Kidding: How Bloody Wolf Turns PDFs into Remote Control
“Bloody Wolf” is actively expanding spear-phishing campaigns across Central Asia by impersonating Ministries of Justice and using custom JAR loaders to deploy the legitimate NetSupport RAT for persistent remote access and low-profile operations.
3 days ago16 min read


Driver’s Ed for Criminals: How Ransomware Learns to Run Over Your Defenses
The OSINT reports that threat actors deploying Qilin ransomware are using a previously undocumented Windows malware packer, TangleCrypt, to hide and launch the STONESTOP EDR-killer with the ABYSSWORKER driver, using multi-layered encoding and flexible injection techniques but with implementation flaws that can cause crashes and reduce reliability.
3 days ago19 min read
bottom of page