BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Weekly Threat Roundup: Vishing Breaches, Zero-Knowledge Gaps, and RAT Distribution Networks

Weekly Threat Roundup: Vishing Breaches, Zero-Knowledge Gaps, and RAT Distribution Networks

February 23, 2026Malware & Threats3 min readmedium

Originally reported by BleepingComputer, Checkpoint Research, Malwarebytes Labs

#vishing#data-breach#password-managers#valleyrat#social-engineering#zero-trust#threat-research
Share

TL;DR

This week saw Optimizely confirm a data breach following a successful voice phishing attack, while researchers exposed potential weaknesses in password managers' zero-knowledge architectures. Meanwhile, threat actors continue leveraging typosquatted security software sites to distribute ValleyRAT malware.

Why medium?

Multiple incidents involving active threat campaigns, including confirmed data breach via vishing and active malware distribution, but no evidence of mass exploitation or critical infrastructure impact.

Optimizely Data Breach Following Voice Phishing Campaign

New York-based advertising technology company Optimizely has confirmed a data breach after threat actors successfully executed a voice phishing (vishing) attack against its systems. The company notified an undisclosed number of customers about the incident, which resulted in unauthorized access to internal systems.

Vishing attacks continue to prove effective against organizations despite increased security awareness, as they exploit human psychology rather than technical vulnerabilities. The incident underscores the persistent threat posed by social engineering techniques that bypass traditional security controls.

Research Challenges Zero-Knowledge Claims in Password Managers

Security researchers have investigated the zero-knowledge architecture claims made by popular password managers, uncovering potential attack scenarios that could compromise user data. The research questions whether current implementations truly provide the level of protection advertised to users.

The findings highlight the complexity of implementing genuine zero-knowledge systems and the importance of rigorous security auditing in password management solutions. Organizations relying on these tools should evaluate their chosen solutions' actual security implementations rather than relying solely on marketing claims.

ValleyRAT Distribution via Typosquatted Security Software

Threat actors are distributing ValleyRAT malware through a fake website impersonating the legitimate Huorong security software. The malicious site uses a domain with a single additional letter to deceive users seeking to download the genuine security product.

This campaign demonstrates the continued effectiveness of typosquatting attacks in malware distribution. Users downloading what they believe to be security software instead receive remote access tools that grant attackers complete system control. The technique exploits user trust in security vendors and highlights the need for careful URL verification when downloading software.

Identity vs. Access: Beyond Authentication Failures

Security research from Specops Software examines how stolen authentication tokens and compromised devices allow attackers to bypass identity verification systems. The analysis demonstrates that robust identity authentication alone cannot prevent unauthorized access when tokens are compromised or devices are infected.

The research advocates for continuous device verification as a critical component of Zero Trust architectures. Traditional authentication models that rely solely on identity verification at login time fail to address the realities of token theft and device compromise in modern threat landscapes.

Check Point Research 2025 Threat Intelligence Recap

Check Point Research has published a comprehensive review of their 2025 threat tracking activities, detailing investigations into both financially-motivated cybercrime and state-sponsored operations. The report provides insights into the research methodologies used to identify and track major threat actors throughout the year.

The retrospective offers valuable perspective on the evolving threat landscape and the continuous effort required to monitor and respond to sophisticated adversaries. The research team's work highlights the importance of proactive threat hunting in identifying campaigns before they achieve widespread impact.

Sources

  • https://www.bleepingcomputer.com/news/security/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/
  • https://www.bleepingcomputer.com/news/security/when-identity-isnt-the-weak-link-access-still-is/
  • https://research.checkpoint.com/2026/2025-the-untold-stories-of-check-point-research/
  • https://www.malwarebytes.com/blog/news/2026/02/password-managers-keep-your-passwords-safe-unless
  • https://www.malwarebytes.com/blog/scams/2026/02/huorong

Originally reported by BleepingComputer, Checkpoint Research, Malwarebytes Labs

Tags

#vishing#data-breach#password-managers#valleyrat#social-engineering#zero-trust#threat-research

Related Intelligence

  • Critical Infrastructure Vulnerabilities and Evolving Attack Vectors: Weekly Threat Roundup

    criticalFeb 27, 2026
  • Fraud Investigation Exposes Advanced Python Malware with Obfuscation Tactics

    mediumFeb 23, 2026
  • ClickFix Campaign Expands to Target Cryptocurrency Wallets and 25+ Browsers

    mediumFeb 22, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Active RoundCube Exploitation, AI-Generated Stealers, and France's FICOBA Breach

Next Article

Weekend Security Roundup: PDF Platform Zero-Days, PayPal Data Leak, and Development Stack Trends →