Black Arrow Cyber Threat Intelligence Briefing 19 December 2025

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

This week we start with interesting research findings on organisations that pay ransoms, and we look at how organisations are planning to increase their spend on security. We also look at developments by attackers to look out for over the next year, including of course phishing and AI, as well as organisational practices highlighted in the articles that are closely linked to risk exposure.

Addressing these requires a sound understanding of how risks are evolving and the pragmatic and proportionate ways that business leaders can address them. The key is knowing the questions to ask of your control providers, including your IT, with support from impartial specialists.

As we head into the festive season, we thank you for reading our weekly summaries. We wish you a merry and peaceful holiday.


Top Cyber Stories of the Last Week

Streisand Effect: Businesses That Pay Ransomware Gangs Are More Likely to Hit the Headlines

Analysis of LockBit negotiation data suggests organisations that pay ransomware demands are more likely to attract press coverage than those that refuse. Researcher Max Smeets compared reporting on 100 payers with 100 non-payers and found paying did not reduce publicity. The data also shows victims making negotiating errors, including admitting they lacked backups or sharing insurance documents. After Operation Chronos where the US National Crime Agency seized LockBit’s infrastructure, LockBit’s reputation and payments reportedly fell sharply.

Source: https://www.computerweekly.com/news/366636266/Streisand-effect-Businesses-that-pay-ransomware-gangs-more-likely-to-hit-the-headlines

Future of Security Holds Bigger Budgets, New Threats

A Marsh survey of 2,200 cyber security leaders found two‑thirds plan to increase cyber-risk prevention investment in 2026, and at least one in four intend to raise spending by more than 25%. 70% experienced at least one third‑party security incident in the past year. Separately, US senators raised concerns about AI‑driven attacks, and analysts warned humanoid robots are currently easy to hack.

Source: https://www.techtarget.com/searchsecurity/news/366636186/News-brief-Future-of-security-holds-bigger-budgets-new-threats

The ‘World Is Not Ready’ for AI Cyber Security Risks, Booz Allen CEO Warns

Booz Allen Hamilton CEO Horacio Rozanski warned that advanced artificial intelligence could amplify cyber threats, including network compromise, data theft and ransomware, and argued that trust in models is critical for adoption. He framed US - China competition as a race across technology, adoption and national security use. Rozanski also highlighted the risk of disruption in space, using an example of bank ATMs that rely on GPS information, and pointed to Chinese plans for space-based computing.

Source: https://www.washingtontimes.com/news/2025/dec/12/world-ready-ai-cybersecurity-risks-booz-allen-ceo-horacio-rozanski/

Phishing Messages and Social Scams Flood Users Ahead of Christmas

Check Point reported a surge of festive scams, claiming it detected 33,500 unique Christmas-themed phishing emails and over 10,000 seasonal social media ads in the prior 14 days. It said artificial intelligence is improving localisation and brand mimicry, enabling fake e-commerce sites with chatbots and checkout pages, plus deepfake and scripted voice phishing. Check Point also claimed a 100% increase in fake delivery scams in November/December compared with the same period last year.

Source: https://www.infosecurity-magazine.com/news/phishing-messages-social-scams/

2025’s Top Phishing Trends and What They Mean for Your Security Strategy

The article highlights how phishing in 2025 is evolving around authentication and multi-channel lures. It describes tactics designed to defeat or abuse multi-factor authentication, including repeated prompts and real-time interception during sign-in. It also notes attackers moving beyond email into messaging and collaboration tools, while using familiar hooks such as invoices, account warnings and delivery notifications. The article describes approaches such as layered controls, realistic user guidance and monitoring across channels.

Source: https://www.bleepingcomputer.com/news/security/2025s-top-phishing-trends-and-what-they-mean-for-your-security-strategy/

The Agentic Shift: How Autonomous AI Is Reshaping the Global Threat Landscape

Control Risks describes an agentic shift where autonomous AI agents can plan, act and adapt with limited human input, changing both defence and offence. It notes automation can improve monitoring and response, but attackers can use agents to accelerate reconnaissance, exploitation and social engineering. Risks include where objectives are delegated to systems that behave unpredictably, and outlines governance, testing and control considerations.

Source: https://www.controlrisks.com/our-thinking/insights/the-agentic-shift-how-autonomous-ai-is-reshaping-the-global-threat-landscape

From Open Source to OpenAI: The Evolution of Third-Party Risk

Third‑party risk has expanded from suppliers and open-source dependencies to include cloud services and generative AI. AI features can introduce new external dependencies and data flows, complicating vendor oversight and risk assessment. The article discusses improving visibility into components, strengthening contractual requirements, and continuously monitoring suppliers, arguing that third-party governance should be treated as a business risk discipline, not just a technical exercise.

Source: https://www.securityweek.com/from-open-source-to-openai-the-evolution-of-third-party-risk/

Shadow Spreadsheets: The Security Gap Your Tools Can’t See

“Shadow spreadsheets” are unmanaged files that end up holding operational or sensitive information outside approved systems. Employees use spreadsheets for tracking projects, budgets, access lists and customer data, bypassing access controls, logging and retention policies. Because files are often shared, copied and stored in multiple places, they can expose credentials, personal data and business logic. The article discusses discovery, ownership and governance to bring these files under control.

Source: https://www.bleepingcomputer.com/news/security/shadow-spreadsheets-the-security-gap-your-tools-cant-see/

Financial Times Investigation Raises Questions Over King Gaming Saga

A Financial Times investigation into cyber crime and fraud has prompted scrutiny of due diligence by local authorities in their dealings with a firm called King Gaming. It focuses on how the government of the Isle of Man granted planning permission for a substantial headquarters project by King Gaming; later police executed raids linked to the operation and arrests were made. Court records from China show convictions for investment fraud by individuals connected to a related Isle of Man entity.

Source: https://www.iomtoday.co.im/news/financial-times-investigation-raises-questions-over-king-gaming-saga-863104

North Korea Stole a Record $2B in Crypto This Year

North Korea-linked actors are estimated to have stolen just over $2 billion in cryptocurrency in 2025, a 51% year‑on‑year increase, and about $3.4 billion was stolen globally. DPRK attacks accounted for a record 76% of service compromises, with the February Bybit incident contributing about $1.5 billion. The piece also reports increased targeting of personal wallets (44% of value) and a shift towards recruiter-style social engineering.

Source: https://www.theregister.com/2025/12/18/north_korea_stole_2b_crypto_2025/

New MI6 Chief Warns of Acute Russian Threat, Urges Tech-Driven Intelligence

In her first public speech as MI6 chief, Blaise Metreweli warned of a more acute Russian threat and described a security environment that sits between peace and war. She pointed to hybrid tactics, including cyberattacks on infrastructure and drones appearing over airports and airbases. The article also highlights her emphasis on technology and tradecraft, saying MI6 officers must be as comfortable with code as with human sources and fluent in Python.

Source: https://www.easterneye.biz/new-mi6-chief-warns-russian-threat/

The Things Young Kids Are Using AI for Are Absolutely Horrifying

An Aura report analysing anonymised activity from about 3,000 children aged five to 17 found 42% used AI chatbots specifically for companionship across nearly 90 services. Among those using chatbots for companionship, 37% engaged in conversations depicting violence, including coercion and non-consensual acts. The report says violent conversations peaked among 11-year-olds, with 44% of interactions turning violent, and that sexual or romantic roleplay peaked among 13-year-olds at 63%.

Source: https://futurism.com/future-society/young-kids-using-ai



Threats

Ransomware, Extortion and Destructive Attacks

Streisand effect: Businesses that pay ransomware gangs are more likely to hit the headlines | Computer Weekly

RansomHouse RaaS Service Upgraded with Double Extortion Strategy that Steals and Encrypt Data

Clop ransomware targets Gladinet CentreStack in data theft attacks

Researchers see global surge in attacks by new ransomware group “Gentlemen”​ | Cybernews

FBI takes down alleged money laundering service for ransomware groups | The Record from Recorded Future News

The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet

How CISOs Can Beat the Ransomware Blame Game  - Security Boulevard

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

Ransomware Victims

JLR cyberattack pushes TCS to standardize security for top clients | Company Business News

Jaguar Land Rover workers’ payroll data stolen in cyber attack

PornHub extorted after hackers steal Premium member activity data

Askul confirms theft of 740k customer records in ransomware attack

Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack - Infosecurity Magazine

Under Armour Sued After Ransomware Group Reports Data Breach (1)

Phishing & Email Based Attacks

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

2025’s Top Phishing Trends and What They Mean for Your Security Strategy

OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 - Infosecurity Magazine

Where does the data stolen in a phishing attack go? | Kaspersky official blog

Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files - Infosecurity Magazine

Inside a purchase order PDF phishing campaign | Malwarebytes

Clipping Scripted Sparrow's wings: Tracking a global phishing ring - Help Net Security

Google Sues Chinese ‘Darcula’ Group Over Alleged Phishing Scheme

New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails

Other Social Engineering

Hackers Are Stealing Microsoft Account Passwords With This Trick

Shut Down And Restart—New Microsoft Attack Beats Passwords, 2FA And Passkeys

ClickFix attacks that bypass cyber controls on the rise | Computer Weekly

New ClickFix 'Word Online' Message Tricks Users into Installing DarkGate Malware

PureRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading | Trend Micro (US)

The WhatsApp takeover scam that doesn’t need your password

Deepfakes Expose New Risks in Identity and Digital Trust

North Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location | Tom's Hardware

Amazon blocked 1,800 suspected DPRK job applicants • The Register

Inside a purchase order PDF phishing campaign | Malwarebytes

Fraud, Scams and Financial Crime

Financial Times investigation raises questions over King Gaming saga | Isle of Man Today

Money Mules Require Banks to Switch from Defense to Offense

European authorities dismantle call center fraud ring in Ukraine

What Is 'NGate'? The Android Phone ATM Scam You Need To Know About

The Secret Life Of Parked Domains: The Internet’s Forgotten Real Estate Is Now A Pressing Threat | Scoop News

Darkweb Powers Decentralized Financial Crimes

Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram

Nomad settles with the FTC over $186M cyberattack • The Register

HMRC Warns of Over 135,000 Scam Reports - Infosecurity Magazine

Myanmar calls on countries to take back citizens held in crackdown on scam centers - ABC News

Singapore Entrepreneur Loses Entire Crypto Portfolio After Downloading Fake Game - Decrypt

Artificial Intelligence

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

The 'world is not ready' for AI cybersecurity risks, Booz Allen CEO Horacio Rozanski warns - Washington Times

Cybersecurity Crossed the AI Rubicon: Why 2025 Marked a Point of No Return - Security Boulevard

Deepfakes Expose New Risks in Identity and Digital Trust

The internet in 2025: Bigger, more fragile than ever - and 'fundamentally rewired' by AI | ZDNET

AI-era cybersecurity is 'so dangerous,' CrowdStrike pres. explains

AI breaks the old security playbook - Help Net Security

The agentic shift: how autonomous AI is reshaping the global threat landscape

Chrome, Edge privacy extensions quietly snarf AI chats • The Register

Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram

Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow - SecurityWeek

The Things Young Kids Are Using AI for Are Absolutely Horrifying

NIST releases draft AI cybersecurity framework profile to guide secure AI adoption - SiliconANGLE

What Cyber Defenders Really Think About AI Risk | Trend Micro (US)

I Work at Google in AI Security: Things I Would Never Tell Chatbots - Business Insider

AI is causing all kinds of problems in the legal sector  | CyberScoop

AML/CFT/Money Laundering/Terrorist Financing/Sanctions

Belgian politicians and finance bosses targeted by Russian intelligence over seized assets | Russia | The Guardian

FBI takes down alleged money laundering service for ransomware groups | The Record from Recorded Future News

Europe Targets Kremlin Disinformation, Cyber Networks in New Sanctions Push

EU Sanctions Target Russia’s ‘Shadow Fleet’ Backers and Disinformation Network - The Moscow Times

2FA/MFA

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Your Accounts Can Still Get Hacked, Even Using Multi-Factor Authentication

Malware

Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek

New ClickFix 'Word Online' Message Tricks Users into Installing DarkGate Malware

PureRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading | Trend Micro (US)

New SantaStealer malware steals data from browsers, crypto wallets

What is driving the rise of infostealer malware? | Computer Weekly

A Browser Extension Risk Guide After the ShadyPanda Campaign

17 Firefox extensions hide malware in icons | Cybernews

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

Stop clicking “allow” on these pop-ups — they’re more dangerous than malware

Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files - Infosecurity Magazine

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Elastic detects stealthy NANOREMOTE malware using Google Drive as C2

ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices

Fake ‘One Battle After Another’ torrent hides malware in subtitles

New BeaverTail Malware Variant Linked to Lazarus Group - Infosecurity Magazine

Fake Zoom malware scam tied to North Korean hackers targets crypto users - CoinJournal

Man jailed for teaching criminals how to use malware

Bots/Botnets

Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Mobile

What Is 'NGate'? The Android Phone ATM Scam You Need To Know About

The WhatsApp takeover scam that doesn’t need your password

Android mobile adware surges in second half of 2025 | Malwarebytes

'Cellik' Android RAT Leverages Google Play Store

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

The ghosts of WhatsApp: How GhostPairing hijacks accounts | Malwarebytes

WhatsApp users unknowingly link hackers’ devices | Cybernews

Europe's DMA raises new security worries for mobile ecosystems - Help Net Security

‘Completely Deactivate Wi-Fi’—Cyber Agency Warns iPhone And Android Users

Microsoft to block Exchange Online access for outdated mobile devices

Denial of Service/DoS/DDoS

Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Internet of Things – IoT

Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Is your smart home an easy target? 6 ways experts lock theirs down | ZDNET

Your car’s web browser may be on the road to cyber ruin • The Register

Data Breaches/Leaks

Coupang data breach traced to ex-employee who retained system access

ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru

Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats

Nearly 5.6 million people hit by massive data breach at credit check company — what you need to know | Tom's Guide

Data breach at credit check giant 700Credit affects at least 5.6 million | TechCrunch

PornHub Premium hacked. This is the info they reportedly stole. | Mashable

Analytics provider: We didn't expose stolen smut data • The Register

Data may have been taken in Ombudsman office cyber attack

French Interior Ministry confirms cyberattack on email servers

France arrests suspect tied to cyberattack on Interior Ministry

UK Information Commissioner Investigates Film & TV Worker Data Breach

Personal data breach affects thousands across Channel Islands - BBC News

GDPR failures in Home Office eVisa rollout in spotlight • The Register

SoundCloud confirms breach after member data stolen, VPN access disrupted

NHS tech supplier probes cyberattack on internal systems • The Register

University of Sydney suffers data breach exposing student and staff info

Organised Crime & Criminal Actors

Financial Times investigation raises questions over King Gaming saga | Isle of Man Today

Scammers, spies and triads: inside cyber-crime’s $15tn global empire | FT Film

North Korea stole a record $2B in crypto this year • The Register

Hackers Are Stealing Microsoft Account Passwords With This Trick

Money Mules Require Banks to Switch from Defense to Offense

European authorities dismantle call center fraud ring in Ukraine

Darkweb Powers Decentralized Financial Crimes

Nomad settles with the FTC over $186M cyberattack • The Register

Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case - Infosecurity Magazine

Myanmar calls on countries to take back citizens held in crackdown on scam centers - ABC News

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

North Korea stole a record $2B in crypto this year • The Register

New SantaStealer malware steals data from browsers, crypto wallets

Nomad settles with the FTC over $186M cyberattack • The Register

Fake Zoom malware scam tied to North Korean hackers targets crypto users - CoinJournal

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Singapore Entrepreneur Loses Entire Crypto Portfolio After Downloading Fake Game - Decrypt

Insider Risk and Insider Threats

Coupang data breach traced to ex-employee who retained system access

North Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location | Tom's Hardware

Amazon blocked 1,800 suspected DPRK job applicants • The Register

Insurance

What is a Cyber Insurance Managing General Agent?

Supply Chain and Third Parties

JLR cyberattack pushes TCS to standardize security for top clients | Company Business News

From Open Source to OpenAI: The Evolution of Third-Party Risk - SecurityWeek

PornHub Premium hacked. This is the info they reportedly stole. | Mashable

Analytics provider: We didn't expose stolen smut data • The Register

NHS tech supplier probes cyberattack on internal systems • The Register

Software Supply Chain

From Open Source to OpenAI: The Evolution of Third-Party Risk - SecurityWeek

Cloud/SaaS

Elastic detects stealthy NANOREMOTE malware using Google Drive as C2

OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 - Infosecurity Magazine

US sues ex-Accenture manager over Army cloud security claims • The Register

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

NATO's battle for cloud sovereignty: Speed is existential • The Register

Identity and Access Management

Identity risk is changing faster than most security teams expect - Help Net Security

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Encryption

After years of cyberattacks, Microsoft cripples RC4 and forces networks to adopt stronger encryption immediately | TechRadar

Linux and Open Source

From Open Source to OpenAI: The Evolution of Third-Party Risk - SecurityWeek

Passwords, Credential Stuffing & Brute Force Attacks

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

FBI Confirms 630 Million Stolen Passwords — How To Check Yours Now

Social Media

Deepfakes Expose New Risks in Identity and Digital Trust

Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram

Privacy risks sit inside the ads that fill your social media feed - Help Net Security

Meta adopts new age-check system to meet global child safety laws

Regulations, Fines and Legislation

Financial Times investigation raises questions over King Gaming saga | Isle of Man Today

Scammers, spies and triads: inside cyber-crime’s $15tn global empire | FT Film

ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru

UK Lords propose ban on VPNs for children | TechRadar

Making cybercrime illegal won't stop it; making cybersec research legal may | CSO Online

Whistleblowers raise ‘extreme’ concern about security of government’s Digital ID | ITV News

Nomad settles with the FTC over $186M cyberattack • The Register

The EU prepares ground for wider data retention – and VPN providers are among the targets | TechRadar

Europe's DMA raises new security worries for mobile ecosystems - Help Net Security

UK surveillance law still full of holes, watchdog warns • The Register

Are Trade Concerns Trumping Cybersecurity?

Trump Administration Turning to Private Firms in Cyber Offensive

China Finalises Amendments to the Cybersecurity Law What Businesses Need to Know Before 1 January 2026 | Mayer Brown - JDSupra

Key lawmaker says Congress likely to kick can down road on cyber information sharing law | CyberScoop

Legal protection for ethical hacking is only the first step • The Register

Models, Frameworks and Standards

ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru

UK Lords propose ban on VPNs for children | TechRadar

GDPR failures in Home Office eVisa rollout in spotlight • The Register

NIST releases draft AI cybersecurity framework profile to guide secure AI adoption - SiliconANGLE

Data Protection

ICO Issues Post Office Public Reprimand Instead of Fine Over Data Breach - IT Security Guru

GDPR failures in Home Office eVisa rollout in spotlight • The Register

Careers, Roles, Skills, Working in Cyber and Information Security

EU can’t attract and retain cyber talent: why? | Cybernews

What lies in store for cyber security skills in 2026? | Computer Weekly

Increased workloads, strategic influence and technical focus - CISO predictions for 2026 - BetaNews

The Burnout Nobody Talks About: When “Always-On” Leadership Becomes a Liability - Security Boulevard

Leading Through Ambiguity: Decision-Making in Cybersecurity Leadership - Security Boulevard

Law Enforcement Action and Take Downs

European police busts Ukraine scam call centers - Help Net Security

France arrests suspect tied to cyberattack on Interior Ministry

FBI takes down alleged money laundering service for ransomware groups | The Record from Recorded Future News

Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case - Infosecurity Magazine

Myanmar calls on countries to take back citizens held in crackdown on scam centers - ABC News

Man jailed for teaching criminals how to use malware

France arrests Latvian for installing malware on Italian ferry

Misinformation, Disinformation and Propaganda

EU Sanctions Target Russia’s ‘Shadow Fleet’ Backers and Disinformation Network - The Moscow Times


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

MI6 chief: 'We are operating in space between peace and war' - BBC News

MI6 chief warns of Russian hybrid threats, urges tech focus | EasternEye

MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin | The Record from Recorded Future News

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

The agentic shift: how autonomous AI is reshaping the global threat landscape

Three ways teams can tackle Iran's tangled web of state-sponsored espionage | SC Media

Israel Issues Chilling Cyber Warfare Warning After Iran Attacks

Russia suspected of hacking European ferry with ‘remote control’

Nation State Actors

A ‘whole society’ response to threats to national security

China

Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek

A Browser Extension Risk Guide After the ShadyPanda Campaign

The $0 Transaction That Signaled a Nation-State Cyberattack

US has failed to stop massive Chinese cyber campaign, warns senator

React2Shell vuln exploited by China, Iran, Google warns • The Register

China's Ink Dragon hides out in European government networks • The Register

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear - SecurityWeek

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

Financial Times investigation raises questions over King Gaming saga | Isle of Man Today

Scammers, spies and triads: inside cyber-crime’s $15tn global empire | FT Film

Google Sues Chinese ‘Darcula’ Group Over Alleged Phishing Scheme

EU security doctrine highlights high-risk dependency on Chinese solar inverters – pv magazine International

China Finalises Amendments to the Cybersecurity Law What Businesses Need to Know Before 1 January 2026 | Mayer Brown - JDSupra

Russia

MI6 chief: 'We are operating in space between peace and war' - BBC News

MI6 chief warns of Russian hybrid threats, urges tech focus | EasternEye

MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin | The Record from Recorded Future News

Belgian politicians and finance bosses targeted by Russian intelligence over seized assets | Russia | The Guardian

France and Germany Grappling With Nation-State Hacks

Germany accuses Russia of 2024 cyber attack and election disinformation campaign - BBC News

EU Sanctions Target Russia’s ‘Shadow Fleet’ Backers and Disinformation Network - The Moscow Times

Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files - Infosecurity Magazine

Amazon security boss blames Russia's GRU for energy hacks • The Register

Denmark says Russia was behind two ‘destructive and disruptive’ cyber-attacks | Denmark | The Guardian

Russia suspected of hacking European ferry with ‘remote control’

Amazon disrupts Russian GRU hackers attacking edge network devices

German Parliament Hit By Cyber-Attack During Zelensky Visit

Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files

Russian BlueDelta hackers ran phishing campaign against Ukrainian webmail users | The Record from Recorded Future News

Iran

Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek

React2Shell vuln exploited by China, Iran, Google warns • The Register

Dormant Iran APT is Still Alive, Spying on Dissidents

Three ways teams can tackle Iran's tangled web of state-sponsored espionage | SC Media

Israel Issues Chilling Cyber Warfare Warning After Iran Attacks

North Korea

North Korea stole a record $2B in crypto this year • The Register

North Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location | Tom's Hardware

Amazon blocked 1,800 suspected DPRK job applicants • The Register

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

Fake Zoom malware scam tied to North Korean hackers targets crypto users - CoinJournal

New BeaverTail Malware Variant Linked to Lazarus Group - Infosecurity Magazine

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files

Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow - SecurityWeek





Vulnerability Management

More than half of public vulnerabilities bypass leading WAFs - Help Net Security

41 Microsoft Zero-Day Warnings — Millions Of Users Face Update Choice

Vulnerabilities

Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery - SecurityWeek

React2Shell vuln exploited by China, Iran, Google warns • The Register

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Half of exposed React servers remain unpatched amid attacks • The Register

Another bad week for SonicWall as SMA 1000 0-day exploited • The Register

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear - SecurityWeek

Google and Apple roll out emergency security updates after zero-day attacks | TechCrunch

Emergency fixes deployed by Google and Apple after targeted attacks

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Chrome Security Update - Patch for Critical Vulnerabilities that Enables Remote Code Execution

Hackers are exploiting critical Fortinet flaws days after patch release

Notepad++ fixed updater bugs that allowed malicious update hijacking

Microsoft: December security updates cause Message Queuing failures

Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

Microsoft RasMan 0-day gets an unofficial patch and exploit • The Register

Recent GeoServer Vulnerability Exploited in Attacks - SecurityWeek

Hewlett Packard Enterprise (HPE) fixed maximum severity OneView flaw

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

JumpCloud Windows Agent Flaw Enables Local Privilege Escalation - Infosecurity Magazine


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

Previous
Previous

Black Arrow Cyber Threat Intelligence Briefing 26 December 2025

Next
Next

Black Arrow Cyber Threat Intelligence Briefing 12 December 2025