Long-form analyst writeups
OSINT briefs and technical profiles, synthesised from primary public reporting. Each piece cites its sources inline and is authored to the standard of a vendor intel team’s deliverable.
Infrastructure pivot: KV-botnet & Volt Typhoon's residential-proxy plane
2026-05-18Thomas MalinowskiThe KV-botnet is a cluster of compromised end-of-life SOHO routers — principally Cisco RV320/RV325 dual-WAN devices, NetGear ProSAFE series, and Axis network cameras — that the PRC state-sponsored group Microsoft tracks…
Volt TyphoonPRCKV-botnetJDY-botnetSOHO routerspassive DNSThreat-hunting brief: Golden SAML token forgery in Azure AD / ADFS environments
2026-05-18Thomas MalinowskiAPT29 / Midnight Blizzard demonstrated in the SolarWinds post-compromise phase (Dec 2020 – Jan 2021) that an attacker who extracts an on-prem ADFS token-signing certificate can forge SAML 2.0 assertions for any identity…
APT29Midnight BlizzardAzure ADMicrosoft 365Golden SAMLT1606.002Technical profile: AcidRain (Sandworm, Viasat KA-SAT modem wiper, Feb 24 2022)
2026-05-18Thomas MalinowskiAcidRain is a statically-linked MIPS ELF wiper deployed against Viasat KA-SAT satellite modems on 24 February 2022 — approximately one hour before Russian ground forces crossed into Ukraine. Executing on the modems' emb…
SandwormRussiaGRU Unit 74455AcidRainViasatKA-SATBlueHammer and the disgruntled-researcher zero-day class
2026-05-17Thomas MalinowskiOn **3 April 2026**, a researcher publishing under the aliases **Chaotic Eclipse** and **Nightmare-Eclipse** dropped a working proof-of-concept on GitHub for an unpatched Windows local privilege escalation now tracked a…
WindowsDefenderMsMpEngTOCTOUVSSSAMTechnical profile: VersaMem (Volt Typhoon, CVE-2024-39717)
2026-05-16Thomas MalinowskiVersaMem is a custom Java web shell observed by Lumen Technologies' Black Lotus Labs in August 2024, attached as a malicious agent to the Apache Tomcat process running on Versa Director — the centralised management plan…
Volt TyphoonChinaweb shellJavaTomcatJavassistStryker, Handala, and the rise of MDM-abuse-as-wiper
2026-05-16Thomas MalinowskiOn 11 March 2026, **Stryker Corporation** — one of the world's largest medical-device manufacturers (~$22B revenue, 51,000 employees) — disclosed a destructive cyberattack that disrupted its global internal networks and…
IranMOISHandalaVoid ManticoreStrykerMDMShinyHunters' cloud-data-platform pivot: Snowflake to Salesforce, 2024–2026
2026-05-16Thomas MalinowskiBetween mid-2024 and early 2026, the financially-motivated cybercrime collective tracked as **ShinyHunters** (and its sub-cluster **UNC5537** in Mandiant's reporting) executed two of the largest eCrime campaigns of the…
ShinyHuntersUNC5537SnowflakeSalesforceeCrimeinfostealerSalt Typhoon — a two-year reconstruction (Sep 2024 – Apr 2026)
2026-05-16Thomas MalinowskiA People's Republic of China Ministry of State Security cluster that Microsoft tracks as Salt Typhoon (and that other vendors track as OPERATOR PANDA, RedMike, UNC5807, GhostEmperor, and FamousSparrow) spent at least th…
ChinaMSStelecomespionagelawful-interceptedge-devices