It's been a busy 24 hours in the cyber world with updates on nation-state activity, a concerning espionage attempt, new malware campaigns, and a look at the geopolitical tech landscape. Let's dive in:
Dutch Teens Arrested for Russian Espionage Attempt 🚨
- Two 17-year-old Dutch boys were arrested for attempting to spy for Russia, using WiFi sniffer devices near Europol, Eurojust, and the Canadian embassy in The Hague.
- Recruited via Telegram, this incident highlights a concerning trend of foreign adversaries leveraging younger individuals for reconnaissance and potentially more.
- While Europol confirmed no compromise of their systems, it's a stark reminder that even low-tech reconnaissance can be part of sophisticated state-sponsored operations.
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/dutch-teens-arrested-for-trying-to-spy-on-europol-for-russia/
Chinese State-Sponsored Espionage Campaigns 🇨🇳
- Recorded Future's Insikt Group detailed a year-long campaign (June 2024 - July 2025) by Chinese state-sponsored group RedNovember (TAG-100, Storm-2077) targeting government, aerospace, defence, and professional services globally.
- RedNovember exploited internet-facing appliances like Ivanti Connect Secure, SonicWall VPN, Cisco ASA, F5 BIG-IP, Palo Alto GlobalProtect, Sophos SSL VPN, and OWA, deploying Go-based Pantegana backdoor, SparkRAT, and Cobalt Strike.
- Separately, new PlugX variants (linked to Lotus Panda/Naikon APT and BackdoorDiplomacy) are hitting Asian telecom and manufacturing, while Mustang Panda (Stately Taurus) continues to use the modular Bookworm malware against ASEAN networks, both relying on DLL side-loading.
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/27/rednovember_chinese_espionage/
📰 The Hacker News | https://thehackernews.com/2025/09/china-linked-plugx-and-bookworm-malware.html
Fake Microsoft Teams Installers Push Oyster Malware 🎣
- Threat actors are leveraging malvertising and SEO poisoning to distribute fake Microsoft Teams installers that infect Windows devices with the Oyster backdoor (Broomstick, CleanUpLoader).
- Oyster grants remote access, command execution, and payload deployment capabilities, and has been linked to ransomware operations like Rhysida for initial access.
- The campaign uses code-signed executables and establishes persistence via a scheduled task, underscoring the ongoing effectiveness of social engineering and trusted software impersonation for network breaches.
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/fake-microsoft-teams-installers-push-oyster-malware-via-malvertising/
Alibaba's Global AI Ambitions and Challenges 🌍
- Alibaba has announced a $53 billion investment in global AI infrastructure, including new data centres in Europe, and released its Qwen3-Omni LLM under an Apache 2.0 license.
- The ambitious plan faces significant hurdles, particularly securing high-end GPUs due to US sanctions on Chinese entities, and navigating complex data sovereignty concerns in Europe.
- This move highlights the intensifying global competition in the GenAI space, not just in model development but also in the underlying infrastructure, with geopolitical factors heavily influencing resource availability and market access.
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/27/alibaba_ai_drive/
#CyberSecurity #ThreatIntelligence #NationState #APT #Malware #Espionage #Malvertising #AI #Geopolitics #InfoSec #CyberAttack #IncidentResponse