BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /Week in Review: North Korean Ransomware, Telecoms Breach, and Mobile App Vulnerabilities

Week in Review: North Korean Ransomware, Telecoms Breach, and Mobile App Vulnerabilities

February 24, 2026Malware & Threats3 min readhigh

Originally reported by BleepingComputer, Malwarebytes Labs

#ransomware#data-breach#lazarus-group#mobile-security#scams#ddos#surveillance-malware#healthcare
Share

TL;DR

North Korean state hackers are deploying Medusa ransomware against US healthcare organizations while ShinyHunters claims a breach of Dutch telecom Odido affecting millions of users. Meanwhile, popular mental health apps contain vulnerabilities exposing sensitive medical data.

Why high?

North Korean state actors deploying ransomware against US healthcare infrastructure combined with a major telecommunications breach affecting millions represents significant threat activity requiring immediate attention.

North Korean State Actors Deploy Medusa Ransomware Against Healthcare

Researchers have linked the North Korean state-backed Lazarus group to attacks using Medusa ransomware targeting US healthcare organizations. The attribution marks a concerning evolution in North Korean cyber operations, expanding from traditional financial theft to ransomware deployment against critical infrastructure sectors. Healthcare organizations should immediately review their security posture and implement additional monitoring for indicators associated with Lazarus tactics, techniques, and procedures.

ShinyHunters Claims Breach of Dutch Telecom Odido

The ShinyHunters extortion gang has claimed responsibility for breaching Dutch telecommunications provider Odido, alleging theft of millions of user records. The group, known for high-profile data breaches and subsequent sale of stolen information on underground markets, represents a persistent threat to telecommunications infrastructure. Organizations in the sector should validate their security controls and monitor for potential credential exposure.

Mental Health Apps Expose Sensitive Medical Data

Security researchers have identified vulnerabilities in several Android mental health applications with a combined 14.7 million downloads on Google Play. The flaws could expose users' sensitive medical information, highlighting the critical need for enhanced security practices in healthcare-adjacent mobile applications. Users of mental health apps should review their data sharing settings and consider the privacy implications of their chosen applications.

Spanish Authorities Arrest Hacktivist Group Members

Spanish law enforcement has arrested four suspected members of a hacktivist group believed responsible for distributed denial-of-service attacks against government ministries, political parties, and public institutions. The arrests demonstrate ongoing law enforcement efforts to disrupt hacktivist operations targeting government infrastructure. Organizations should maintain robust DDoS mitigation capabilities and incident response procedures.

Fake Zoom Updates Deploy Surveillance Software

Malwarebytes researchers have identified a campaign using fake Zoom meeting pages to trick users into installing surveillance software through bogus "updates." The attack leverages the ubiquity of video conferencing platforms to deliver malicious payloads. Organizations should educate users about legitimate software update procedures and implement application whitelisting where possible.

Avast Impersonation Scam Harvests Credit Card Details

Cybercriminals are operating a convincing fake Avast website that displays fraudulent charges of €499.99 and offers refunds to harvest victims' personal and financial information. The scam demonstrates the continued effectiveness of brand impersonation in social engineering attacks. Users should verify unexpected charges through official channels before providing sensitive information.

Microsoft Addresses Outlook Mouse Pointer Bug

Microsoft has acknowledged a known issue causing mouse pointers to disappear in the classic Outlook desktop client for some users. While not a security vulnerability, the bug affects user productivity and may prompt users to seek unofficial workarounds. Organizations should monitor Microsoft's official channels for resolution timelines and approved workarounds.

OpenClaw AI Assistant Security Considerations

Malwarebytes has published guidance on safely using OpenClaw, a 24/7 AI assistant that has gained recent attention. The analysis provides security practitioners with considerations for evaluating AI tools within organizational contexts. As AI assistants become more prevalent, organizations should establish policies governing their use with sensitive data.

Sources

  • https://www.bleepingcomputer.com/news/security/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/
  • https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/
  • https://www.bleepingcomputer.com/news/security/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/
  • https://www.bleepingcomputer.com/news/security/spain-arrests-suspected-anonymous-fenix-hacktivists-for-ddosing-govt-sites/
  • https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-in-classic-outlook-hides-the-mouse-pointer/
  • https://www.malwarebytes.com/blog/scams/2026/02/fake-zoom-meeting-update-silently-installs-surveillance-software
  • https://www.malwarebytes.com/blog/threat-intel/2026/02/refund-scam-impersonates-avast-to-harvest-credit-card-details
  • https://www.malwarebytes.com/blog/news/2026/02/openclaw-what-is-it-and-can-you-use-it-safely

Originally reported by BleepingComputer, Malwarebytes Labs

Tags

#ransomware#data-breach#lazarus-group#mobile-security#scams#ddos#surveillance-malware#healthcare

Threat Actors

🏴Medusa
πŸ‡°πŸ‡΅Lazarus
🏴ShinyHunters
🏴Anonymous
🏴Play

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • Threat Intelligence Digest: Chinese APT Campaign, Critical Router RCE, and Agent Tesla Resurgence

    highFeb 26, 2026
  • Critical Infrastructure Vulnerabilities and Evolving Attack Vectors: Weekly Threat Roundup

    criticalFeb 27, 2026
  • Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

    criticalFeb 25, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Receives Four Awards in 2026 Latio Application Security Report

Next Article

Digital Frontlines Weekly: AI-Armed Amateurs, Iranian Campaigns, and ATM Jackpotting Surge β†’