A Russian-aligned hacking group, tracked as TAG-110, has been conducting a widespread cyber espionage campaign across Europe and Asia, targeting government entities, human rights groups, and educational institutions. According to Recorded Future's threat intelligence team, Insikt Group, the campaign has compromised 62 unique victims across 11 countries, with the majority located in Central Asia. The group has been using custom malware strains, HatVibe and CherrySpy, to gain access to sensitive information and bolster Russia's military efforts in Ukraine. The malware strains, HatVibe and CherrySpy, are designed to evade detection and maintain persistence on compromised systems. HatVibe is a custom HTML application loader that deploys additional malware, including the CherrySpy backdoor, while CherrySpy is a Python-based backdoor used for espionage. The group has also been using LogPie and StilLarch custom malware in its campaigns. Insikt Group believes that TAG-110's motivation is to acquire intelligence on geopolitical events in neighboring countries and support Russia's military efforts in Ukraine. The campaign, which started in July 2024, aligns with historical reporting on the Russian state-sponsored advanced persistent threat (APT) group BlueDelta (APT28). While the attribution to BlueDelta cannot be confirmed, TAG-110's activity overlaps with BlueDelta's strategic interests in national security, military operations, and geopolitical influence. Recorded Future's researchers anticipate that TAG-110 will conduct similar campaigns in the near term, targeting post-Soviet Central Asian states, Ukraine, and its supporting states. To mitigate these threats, organizations are advised to implement robust security measures, including monitoring for suspicious activity, updating software, and educating employees on cyber hygiene best
Microsoft’s Threat Intelligence team disclosed “Whisper Leak,” a side-channel attack that infers the topic of encrypted AI chatbot conversations by observing packet sizes and...
LangGraph’s langgraph-checkpoint library contains a dangerous deserialization flaw (CVE-2025-64439) that allows remote code execution when untrusted checkpoint or persistence dat...
Security researchers have uncovered an actively exploited remote code execution (RCE) vulnerability in Monsta FTP, a web-based FTP client widely used by enterprises, financial inst...