The Network · 2026-04-07 17:27:25 · Forest Blizzard (APT28 / GRU)
Russian military intelligence hackers have executed a stealthy, large-scale espionage campaign by exploiting old router vulnerabilities to steal Microsoft Office authentication tokens from users on more than 18,000 networks. The operation, attributed to the GRU-linked group known as Forest Blizzard (or APT28/Fancy Bear...
The Network · 2026-04-07 17:27:26 · Fancy Bear (APT28) / Russian GRU
Russian state-linked hackers have seized control of thousands of residential home routers worldwide, using them as a covert platform to steal passwords and authentication tokens. The operation, attributed to the group known as Fancy Bear or APT28, represents a significant escalation in cyber espionage tactics, moving b...
The Network · 2026-04-08 12:26:56 · APT28 (Russian Military Intelligence)
Russia's military intelligence unit, APT28, has commandeered tens of thousands of consumer routers worldwide, weaponizing them to redirect unsuspecting users to credential-harvesting sites. Researchers from Lumen Technologies' Black Lotus Labs report that between 18,000 and 40,000 routers, primarily from MikroTik and T...
The Network · 2026-04-08 23:27:00 · ZeroHedge
The US Justice Department and FBI have executed a court-authorized technical operation to dismantle a segment of a botnet built from compromised American routers, a network directly controlled by a notorious Russian military intelligence unit. This action neutralized a key tool used for global DNS hijacking operations,...
The Network · 2026-04-16 16:52:46 · TechCrunch
Two American citizens have been sentenced to federal prison for their roles in a scheme that placed North Korean IT workers, posing as U.S.-based contractors, inside American companies. The U.S. Department of Justice detailed a multi-year operation where the individuals helped the North Korean government circumvent san...
The Network · 2026-04-20 11:22:46 · GitHub Issues
A breach at Vercel, confirmed to originate from a compromised third-party AI tool's OAuth application, highlights the acute security paradox of modern innovation: the very tools driving progress are creating new vectors for exposure. This incident underscores the tangible risks when external AI integrations become a we...
The Network · 2026-05-04 08:24:06 · ZeroHedge
Chinese state-linked hackers reportedly breached email systems at the United States Embassy in Havana during a period of heightened geopolitical confrontation between Washington and Caracas. According to findings from the cybersecurity firm Gambit Security, cited in a Bloomberg report, the campaign targeted sensitive d...
The Lab · 2026-05-06 17:01:38 · The Register
Security researchers at Rapid7 have identified what they believe to be an Iranian state-sponsored cyber unit reusing ransomware branding to conceal espionage operations targeting Western organizations. The campaign, observed earlier this year, involved actors operating under medium confidence attribution to MuddyWater,...
The Vault · 2026-05-08 19:24:43 · Mastodon:hachyderm.io:#cybersecurity
A former cybersecurity executive has been ordered to pay $10 million in damages to his former employer after stealing proprietary surveillance and hacking tools and selling them to a Russian broker with documented ties to President Vladimir Putin's government. The case represents one of the more significant insider-thr...