threatintel
actor tracker
intel briefs · 8 published

Long-form analyst writeups

OSINT briefs and technical profiles, synthesised from primary public reporting. Each piece cites its sources inline and is authored to the standard of a vendor intel team’s deliverable.

  1. Infrastructure pivot: KV-botnet & Volt Typhoon's residential-proxy plane

    2026-05-18Thomas Malinowski

    The KV-botnet is a cluster of compromised end-of-life SOHO routers — principally Cisco RV320/RV325 dual-WAN devices, NetGear ProSAFE series, and Axis network cameras — that the PRC state-sponsored group Microsoft tracks…

    Volt TyphoonPRCKV-botnetJDY-botnetSOHO routerspassive DNS
  2. Threat-hunting brief: Golden SAML token forgery in Azure AD / ADFS environments

    2026-05-18Thomas Malinowski

    APT29 / Midnight Blizzard demonstrated in the SolarWinds post-compromise phase (Dec 2020 – Jan 2021) that an attacker who extracts an on-prem ADFS token-signing certificate can forge SAML 2.0 assertions for any identity…

    APT29Midnight BlizzardAzure ADMicrosoft 365Golden SAMLT1606.002
  3. Technical profile: AcidRain (Sandworm, Viasat KA-SAT modem wiper, Feb 24 2022)

    2026-05-18Thomas Malinowski

    AcidRain is a statically-linked MIPS ELF wiper deployed against Viasat KA-SAT satellite modems on 24 February 2022 — approximately one hour before Russian ground forces crossed into Ukraine. Executing on the modems' emb…

    SandwormRussiaGRU Unit 74455AcidRainViasatKA-SAT
  4. BlueHammer and the disgruntled-researcher zero-day class

    2026-05-17Thomas Malinowski

    On **3 April 2026**, a researcher publishing under the aliases **Chaotic Eclipse** and **Nightmare-Eclipse** dropped a working proof-of-concept on GitHub for an unpatched Windows local privilege escalation now tracked a…

    WindowsDefenderMsMpEngTOCTOUVSSSAM
  5. Technical profile: VersaMem (Volt Typhoon, CVE-2024-39717)

    2026-05-16Thomas Malinowski

    VersaMem is a custom Java web shell observed by Lumen Technologies' Black Lotus Labs in August 2024, attached as a malicious agent to the Apache Tomcat process running on Versa Director — the centralised management plan…

    Volt TyphoonChinaweb shellJavaTomcatJavassist
  6. Stryker, Handala, and the rise of MDM-abuse-as-wiper

    2026-05-16Thomas Malinowski

    On 11 March 2026, **Stryker Corporation** — one of the world's largest medical-device manufacturers (~$22B revenue, 51,000 employees) — disclosed a destructive cyberattack that disrupted its global internal networks and…

    IranMOISHandalaVoid ManticoreStrykerMDM
  7. ShinyHunters' cloud-data-platform pivot: Snowflake to Salesforce, 2024–2026

    2026-05-16Thomas Malinowski

    Between mid-2024 and early 2026, the financially-motivated cybercrime collective tracked as **ShinyHunters** (and its sub-cluster **UNC5537** in Mandiant's reporting) executed two of the largest eCrime campaigns of the…

    ShinyHuntersUNC5537SnowflakeSalesforceeCrimeinfostealer
  8. Salt Typhoon — a two-year reconstruction (Sep 2024 – Apr 2026)

    2026-05-16Thomas Malinowski

    A People's Republic of China Ministry of State Security cluster that Microsoft tracks as Salt Typhoon (and that other vendors track as OPERATOR PANDA, RedMike, UNC5807, GhostEmperor, and FamousSparrow) spent at least th…

    ChinaMSStelecomespionagelawful-interceptedge-devices