Skip to main content
Mallory
Mallory

Multiple Unrelated Cybersecurity Reports: Iranian Spear-Phishing, Alleged Mexican Government Data Leak, and Lazarus ‘Contagious Interview’ Findings

spear-phishingdata leakphishing infrastructurecredential theftsocial engineeringunauthenticated endpointsfake recruitingaggregated dataplaintext credentialshardcoded credentialsthird-partysurveillanceobsolete systems
Updated February 5, 2026 at 05:03 PM3 sources
Multiple Unrelated Cybersecurity Reports: Iranian Spear-Phishing, Alleged Mexican Government Data Leak, and Lazarus ‘Contagious Interview’ Findings

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

The provided items do not describe a single cohesive cybersecurity event; they cover separate incidents and research. Dark Reading reported an Iran-linked credential theft and surveillance effort targeting people of interest abroad (including Iranian expats and regional targets) using spear-phishing and social engineering, including lures delivered via WhatsApp and phishing infrastructure that was rapidly stood up and taken down as campaigns shifted targets.

Separately, Dark Reading covered allegations that the Chronus Group leaked 2.3TB of data purportedly sourced from 25+ Mexican government institutions, claiming exposure affecting 36 million people; Mexico’s ATDT disputed that it represented a new breach, stating it appeared to be aggregated data from prior incidents and that impacted systems were largely obsolete, third-party administered state-level platforms. In parallel, Red Asgard published new technical findings on the Lazarus-linked “Contagious Interview” activity targeting developers/freelancers via fake recruiting, reporting recovery of 241,764 plaintext credentials from unauthenticated endpoints, identification of an AnyDesk-based RAT with persistent remote access and hardcoded attacker credentials, and additional detection content (e.g., YARA and Snort rules).

Related Entities

Threat Actors

Malware

Affected Products

Related Stories

Mixed Threat Reporting: Cloud Worm Campaigns, Tor-Enabled Espionage, and GitHub Supply-Chain Malware

Mixed Threat Reporting: Cloud Worm Campaigns, Tor-Enabled Espionage, and GitHub Supply-Chain Malware

The provided items do not describe a single cohesive cybersecurity event; they are a mix of unrelated threat reporting and one executive opinion piece. Reported activity includes: **TeamPCP** (aka *DeadCatx3/PCPcat/ShellForce*) running a worm-driven campaign against cloud-native environments by abusing exposed Docker and Kubernetes APIs, Ray dashboards, Redis, and the critical **React2Shell** vulnerability `CVE-2025-55182` to build distributed criminal infrastructure used for proxying/scanning, follow-on compromise, data theft/extortion, and cryptomining. Separately, BI.ZONE-described **Vortex Werewolf** targeted Russian government/defense entities via phishing lures that lead to Tor-routed remote access over **RDP/SMB/SFTP/SSH**, using legitimate utilities and Windows persistence (e.g., scheduled tasks) to maintain covert access. Additional reporting describes a GitHub-focused supply-chain campaign targeting IT and OSINT professionals: attackers revived dormant GitHub accounts, published AI-generated “legitimate-looking” repositories, then introduced malicious “maintenance” commits delivering a backdoor dubbed **PyStoreRAT** (JavaScript/HTA), used as a loader for follow-on payloads including **Rhadamanthys** stealer and capable of spreading via removable media. A weekly threat bulletin also lists multiple ransomware disruptions (including an attack claimed by **Qilin** against Romania’s oil pipeline operator Conpet) and an AI-assisted cloud intrusion scenario involving exposed credentials in public S3 buckets, rapid privilege escalation via Lambda/IAM abuse, and **LLMjacking** via Amazon Bedrock; however, these are separate incidents rather than one unified story. One CSO Online item is general CISO/compliance commentary and does not add incident-specific intelligence.

1 months ago
Mixed threat reporting: APT campaigns, malware delivery via compromised web assets, and ransomware exploitation

Mixed threat reporting: APT campaigns, malware delivery via compromised web assets, and ransomware exploitation

The provided items do not describe a single cohesive cybersecurity event; they span multiple unrelated threat reports and opinion pieces. Notable incident-level reporting includes **APT28** activity in Western/Central Europe (“Operation MacroMaze”) using spear-phishing lures with Office macros that beacon via `INCLUDEPICTURE` to `webhook[.]site` and then execute VBScript/CMD/batch stages for persistence and follow-on payload delivery. Separately, **MuddyWater** (Iran/MOIS-linked) was reported running “Operation Olalampo” against organizations in the Middle East and Africa, delivering new custom malware (including a **Char** backdoor using a **Telegram bot** for C2) and, in some cases, attempting exploitation of public-facing servers in addition to phishing. Criminal activity and initial-access tradecraft were also covered across distinct stories: a DFIR case study described exploitation of **Apache ActiveMQ** `CVE-2023-46604` to gain RCE, conduct post-exploitation (Metasploit/Meterpreter, privilege escalation, LSASS access, lateral movement), and ultimately deploy **LockBit**-branded ransomware via RDP using previously stolen credentials (with indications the payload was built using the leaked builder and used *Session* for communications). Multiple reports described malware delivery via compromised web assets and social engineering, including **GrayCharlie** injecting malicious JavaScript into WordPress sites to push **NetSupport RAT**, **Stealc**, and **SectopRAT** via fake updates/ClickFix-style CAPTCHAs, and a separate **ClickFix** campaign delivering a custom C++ RAT (**MIMICRAT**) through fake Cloudflare verification prompts that trick users into running PowerShell. Additional, unrelated threat reporting included a **NuGet** supply-chain attack (typosquatted `NCryptYo` plus companion packages) targeting ASP.NET Identity data and enabling backdoored authorization rules, and malicious Chrome extensions using a “**Promise Bomb**” browser-crash technique to drive users to run fake “CrashFix” PowerShell steps. Several other items were generic commentary/roundups (data breach trends, quantum preparedness, Enigma history, NATO public opinion polling, recon how-to, and a malware-newsletter link list) and do not add event-specific intelligence.

3 weeks ago
Weekly threat intelligence roundup covering breaches, ransomware, and emerging AI-enabled tradecraft

Weekly threat intelligence roundup covering breaches, ransomware, and emerging AI-enabled tradecraft

Reporting during the week of Feb. 23 highlighted multiple unrelated security incidents and research findings rather than a single cohesive event. **France’s Ministry of Economy** disclosed unauthorized access to the national bank account registry **FICOBA**, exposing data tied to **~1.2 million accounts** (e.g., names, addresses, account identifiers, and in some cases tax-related identifiers), with officials attributing access to **compromised government credentials**. Separately, **Advantest** reported a **ransomware** intrusion following third-party unauthorized access, **University of Mississippi Medical Center** experienced a ransomware event that disrupted clinics and electronic medical records, and **Ukraine’s National Bank** reported a **supply-chain** exposure at a contractor supporting its collectible coin online store (customer registration data exposed; payment data reportedly unaffected). In Taiwan, **Taipei Grand Hotel** said a third party accessed internal systems without authorization during the Lunar New Year period; the hotel took networks offline for forensics and warned customers to be cautious of suspicious messages. Threat-actor and technique reporting also described ongoing campaigns and emerging tradecraft. **MuddyWater** (Iran-aligned) was reported targeting **MENA** organizations in “Operation Olalampo,” using phishing lures with malicious Office documents/macros to deploy tooling including **GhostFetch**, **HTTP_VIP**, a Rust backdoor **CHAR**, and an implant dubbed **GhostBackDoor**, with one chain also deploying *AnyDesk* for remote access. Separately, reporting on **DPRK-linked** crypto operations described sustained, social-engineering-led targeting of the crypto ecosystem following the **Bybit** theft, including AI-assisted persona and communication crafting and laundering via mixing/OTC pathways. Additional research noted internet-wide scanning telemetry involving **OAST/Interactsh** callback domains and shifts toward cookie-based injection, while another item profiled PRC-attributed **Lotus Blossom** as an espionage actor (including discussion of the *Notepad++* ecosystem incident) and a separate post provided general reconnaissance methodology rather than incident-specific intelligence.

3 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.