Cyber

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

Ravie LakshmananFeb 05, 2026Cybersecurity / Hacking News This week didn’t produce one big headline. It produced many small signals

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories


Ravie LakshmananFeb 05, 2026Cybersecurity / Hacking News

This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next.

Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry is becoming less visible while impact scales later.

Several findings also show how attackers are industrializing their work — shared infrastructure, repeatable playbooks, rented access, and affiliate-style ecosystems. Operations are no longer isolated campaigns. They run more like services.

This edition pulls those fragments together — short, precise updates that show where techniques are maturing, where exposure is widening, and what patterns are forming behind the noise.

  1. Startup espionage expansion

    In a sign that the threat actor has moved beyond government targets, the Pakistan-aligned APT36 threat actor has been observed targeting India’s startup ecosystem, using ISO files and malicious LNK shortcuts using sensitive, startup-themed lures to deliver Crimson RAT, enabling comprehensive surveillance, data exfiltration, and system reconnaissance. The initial access vector is a spear-phishing email carrying an ISO image. Once executed, the ISO contains a malicious shortcut file and a folder holding three files: a decoy document, a batch script that acts as the persistence mechanism, and the final Crimson RAT payload, disguised as an executable named Excel. “Despite this expansion, the campaign remains closely aligned with Transparent Tribe’s historical focus on Indian government and defense-adjacent intelligence collection, with overlap suggesting that startup-linked individuals may be targeted for their proximity to government, law enforcement, or security operations,” Acronis said.

Across these updates, the common thread is operational efficiency. Attackers are cutting time between access and impact, removing friction from tooling, and relying more on automation, prebuilt frameworks, and reusable infrastructure. Speed is no longer a byproduct — it’s a design goal.

Another shift sits on the defensive side. Several cases show how security gaps are forming not from unknown threats, but from known behaviors — legacy configurations, trusted integrations, overlooked exposure, and assumptions about how tools should behave.

Taken together, the signals point to a threat environment that is scaling quietly rather than loudly — broader reach, lower visibility, and faster execution cycles. The fragments in this bulletin map that direction.



Source link

About Author

IndianCyberDefender