BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /State Actors Unleash New Malware Arsenal as Phishing-as-a-Service Operations Scale Globally

State Actors Unleash New Malware Arsenal as Phishing-as-a-Service Operations Scale Globally

March 5, 2026Vulnerabilities & Exploits3 min readhigh

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#apt28#malware#phishing-as-a-service#ios-exploits#state-sponsored#ukraine#iraq#mobile-security
Share

TL;DR

Iran-linked Dust Specter and Russian APT28 campaigns unveiled new malware families targeting government officials in Iraq and Ukraine respectively. Meanwhile, Tycoon2FA phishing-as-a-service operations reached over 500,000 organizations monthly before disruption by Microsoft and Europol.

Why high?

Multiple active state-sponsored campaigns deploying new malware families targeting government entities, combined with a large-scale phishing-as-a-service operation affecting over 500,000 organizations monthly.

State-Sponsored Campaigns Deploy New Malware Arsenal

Dust Specter Targets Iraqi Government with SPLITDROP and GHOSTFORM

Zscaler ThreatLabz identified a suspected Iran-nexus threat actor targeting Iraqi government officials through sophisticated impersonation campaigns. The cluster, tracked as Dust Specter, leveraged fake Ministry of Foreign Affairs communications to deliver two previously unknown malware families: SPLITDROP and GHOSTFORM. The January 2026 campaign demonstrates continued state-sponsored interest in regional government networks through targeted social engineering.

APT28 Deploys BadPaw Loader and MeowMeow Backdoor Against Ukraine

Russian threat actors linked to APT28 launched a new campaign against Ukrainian entities using two undocumented malware families: BadPaw and MeowMeow. The attack chain initiates through phishing emails containing links to ZIP archives. Once extracted, HTA files display Ukrainian-language lure documents concerning border crossing appeals while deploying the malicious payloads. This represents a continuation of sustained Russian cyber operations against Ukrainian infrastructure.

Large-Scale Criminal Infrastructure Disrupted

Microsoft Disrupts Tycoon2FA Phishing-as-a-Service Platform

Microsoft's Digital Crimes Unit, working with Europol and industry partners, disrupted the Tycoon2FA phishing-as-a-service platform that enabled campaigns reaching over 500,000 organizations monthly. The AiTM (Adversary-in-the-Middle) phishing kit had become a leading PhaaS platform, demonstrating the industrial scale of modern credential harvesting operations. The disruption highlights the growing threat posed by commercialized cybercrime services.

Mobile Security Under Assault

Google Identifies Powerful Coruna iOS Exploit Kit

Google Threat Intelligence Group discovered the Coruna (aka CryptoWaters) exploit kit targeting iPhone models running iOS versions 13.0 through 17.2.1. The sophisticated kit features five complete iOS exploit chains incorporating 23 individual exploits. While ineffective against the latest iOS versions, Coruna represents one of the most comprehensive mobile exploit kits identified to date, emphasizing the importance of maintaining current mobile operating system versions.

Geopolitical Tensions Drive Hacktivist Surge

Middle East Conflict Triggers 149 DDoS Attacks Across 16 Countries

Radware researchers documented a surge in retaliatory hacktivist activity following the U.S.-Israel military campaign against Iran. Between February 28 and March 2, threat actors conducted 149 DDoS attacks against 110 organizations across 16 countries. Two groups, Keymous+ and DieNet, drove nearly 70% of all attack activity, demonstrating how geopolitical events rapidly translate into cyber operations.

Enterprise Security Gaps Persist

Multi-Factor Authentication Coverage Remains Incomplete

Security researchers highlighted persistent gaps in MFA implementation across Windows environments. While organizations deploy MFA through identity providers like Microsoft Entra ID and Okta, coverage gaps continue enabling credential-based compromises. The analysis emphasizes that MFA deployment alone insufficient without comprehensive coverage across all authentication points.

CVE Roundup: Linux Kernel and System Vulnerabilities

Microsoft published information on multiple CVEs affecting various system components:

  • CVE-2022-4543: EntryBleed vulnerability in Linux Kernel Page Table Isolation enabling KASLR base leakage
  • CVE-2025-8732: libxml2 xmlcatalog recursion vulnerability
  • CVE-2026-3336: Certificate chain validation bypass in AWS-LC PKCS7_verify function
  • Multiple Linux kernel vulnerabilities across filesystem, memory management, and driver subsystems

These CVE publications represent ongoing maintenance of the vulnerability database rather than immediate threats requiring emergency patching.

Sources

  • Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
  • APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
  • Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
  • Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
  • 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
  • Where Multi-Factor Authentication Stops and Credential Abuse Starts

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#apt28#malware#phishing-as-a-service#ios-exploits#state-sponsored#ukraine#iraq#mobile-security

Threat Actors

πŸ‡·πŸ‡ΊAPT28

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • APT28 Macro Campaign, AI Model Theft, and Central Asian Telecom Attacks

    highFeb 24, 2026
  • Multi-Platform RATs, AI-Driven Attacks, and Certificate Abuse: Weekly Vulnerability Roundup

    highMar 4, 2026
  • Active Android Exploit, Government-Targeted Campaigns, and OAuth Abuse Highlight March Threat Landscape

    highMar 3, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← VMware Exploitation Active, Major Law Enforcement Wins Against Cybercrime Infrastructure

Next Article

Security Roundup: Certificate Abuse, Phishing Evolution, and Enterprise Defense Gaps β†’