Documents
0
Active Sources
0
CVEs
0
IOCs
0
Welcome to BlackFile: Inside a Vishing Extortion Operation
Mandiant Research 15 May 2026 SEV 4/10
phishing data_breach Conti Play
Welcome to BlackFile: Inside a Vishing Extortion Operation | Google Cloud Blog Threat Intelligence Welcome to BlackFile: Inside a Vishing Extortion Operation May 15, 2026 Google Threat Intelligence Group Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Written by: Austin Larsen, Tyler McLellan, Genevieve Stark, Dan Ebreo Introduction Google Threat Intelligence Group (GTIG) has continued to track an expansive extortion campaign by UNC6671, a threat actor operating under the "BlackFile" brand, that targets organizations via sophisticated voice phishing (vishing) and single sign-on (SSO) compromise. The group primarily targets Microsoft 365 and Okta infrastructure, leveraging Python and PowerShell scripts to programmatically exfiltrate sensitive corporate data for subsequent extortion attempts.
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
Mandiant Research 11 May 2026 SEV 4/10
vulnerability malware APT27 Conti
Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access | Google Cloud Blog Threat Intelligence GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access May 11, 2026 Google Threat Intelligence Group Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI-enabled operations to the industrial-scale application of generative models within adversarial workflows. This report, based on insights derived from Mandiant incident response engagements, Gemini, and GTIG’s proactive research, highlights the dual nature of the current threat environment where AI serves as both a sophisticated engine for adversary operations and a high-value target for attacks.
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
Mandiant Research 23 Apr 2026 SEV 5/10
malware phishing Conti Play
How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite | Google Cloud Blog Threat Intelligence Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite April 23, 2026 Mandiant Mandiant Services Stop attacks, reduce risk, and advance your security. Contact Mandiant Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged persistent social engineering, a custom modular malware suite, and deft pivoting inside the victim’s environment to achieve deep network penetration. As with many other intrusions in recent years, UNC6692 relied heavily on impersonating IT helpdesk employees, convincing their victim to accept a Microsoft Teams chat invitation from an account outside their organization.
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
Mandiant Research 16 Apr 2026 SEV 4/10
vulnerability iot_ot_security Conti Play
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever | Google Cloud Blog Threat Intelligence Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever April 16, 2026 Francis deSouza COO, Google Cloud and President, Security Products Mandiant and Google Threat Intelligence Group ⠀ Mandiant Services Stop attacks, reduce risk, and advance your security. Contact Mandiant Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such as these will be integrated directly into the development cycle, and code will be more difficult to exploit than ever; however, this transition creates a critical window of risk.
The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape
Mandiant Research 15 Apr 2026 SEV 4/10
ransomware data_breach LockBit ALPHV
The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape | Google Cloud Blog Threat Intelligence The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape April 15, 2026 Google Threat Intelligence Group Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligence (GTI) data shows that the surge is hitting German infrastructure harder and faster than its regional neighbors, marking a significant return to the high-pressure levels previously observed in the country during 2022 and 2023.
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
Mandiant Research 31 Mar 2026 SEV 5/10
supply_chain malware Conti
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | Google Cloud Blog Threat Intelligence North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack March 31, 2026 Google Threat Intelligence Group Mandiant Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Written by: Austin Larsen, Dima Lenz, Adrian Hernandez, Tyler McLellan, Christopher Gardner, Ashley Zaya, Michael Rudden, Mon Liclican, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) is tracking an active software supply chain attack targeting the popular Node Package Manager (NPM) package " axios ." Between March 31, 2026, 00:21 and 03:20 UTC, an attacker introduced a malicious dependency named " plain-crypto-js " into axios NPM releases versions 1.14.1 and 0.30.4. Axios is the most popular JavaScript library used to simplify HTTP requests, and these packages typically have over 100 million and 83 million weekly downloads, respectively.
M-Trends 2026: Data, Insights, and Strategies From the Frontlines
Mandiant Research 23 Mar 2026 SEV 4/10
vulnerability phishing Conti Akira
M-Trends 2026: Data, Insights, and Strategies From the Frontlines | Google Cloud Blog Threat Intelligence M-Trends 2026: Data, Insights, and Strategies From the Frontlines March 23, 2026 Jurgen Kutscher Vice President, Mandiant Consulting, Google Cloud Mandiant Services Stop attacks, reduce risk, and advance your security. Contact Mandiant Every year, the cyber threat landscape forces defenders to adapt to evolving adversary tactics, techniques, and procedures (TTPs). In 2025, Mandiant observed a clear divergence in adversary pacing that closely aligns with the trends we have been documenting for defenders over the past year.
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
Mandiant Research 25 Feb 2026 SEV 5/10
apt malware Salt Typhoon Conti
Disrupting the GRIDTIDE Global Cyber Espionage Campaign | Google Cloud Blog Threat Intelligence Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign February 25, 2026 Google Threat Intelligence Group Mandiant Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Introduction Last week, Google Threat Intelligence Group (GTIG), Mandiant, and partners took action to disrupt a global espionage campaign targeting telecommunications and government organizations in dozens of nations across four continents. The threat actor, UNC2814, is a suspected People's Republic of China (PRC)-nexus cyber espionage group that GTIG has tracked since 2017.
GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use
Mandiant Research 12 Feb 2026 SEV 4/10
malware phishing APT31 APT41
GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use | Google Cloud Blog Threat Intelligence GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use February 12, 2026 Google Threat Intelligence Group Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (AI) to accelerate the attack lifecycle, achieving productivity gains in reconnaissance, social engineering, and malware development. This report serves as an update to our November 2025 findings regarding the advances in threat actor usage of AI tools.
Beyond the Battlefield: Threats to the Defense Industrial Base
Mandiant Research 10 Feb 2026 SEV 4/10
apt vulnerability Sandworm APT1
Threats to the Defense Industrial Base | Google Cloud Blog Threat Intelligence Beyond the Battlefield: Threats to the Defense Industrial Base February 10, 2026 Google Threat Intelligence Group Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Introduction In modern warfare, the front lines are no longer confined to the battlefield; they extend directly into the servers and supply chains of the industry that safeguards the nation. Today, the defense sector faces a relentless barrage of cyber operations conducted by state-sponsored actors and criminal groups alike.
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering
Mandiant Research 09 Feb 2026 SEV 5/10
malware phishing BlueNoroff Conti
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering | Google Cloud Blog Threat Intelligence UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering February 9, 2026 Mandiant Mandiant Services Stop attacks, reduce risk, and advance your security. Contact Mandiant Written by: Ross Inman, Adrian Hernandez Introduction North Korean threat actors continue to evolve their tradecraft to target the cryptocurrency and decentralized finance (DeFi) verticals. Mandiant recently investigated an intrusion targeting a FinTech entity within this sector, attributed to UNC1069 , a financially motivated threat actor active since at least 2018.
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
Mandiant Research 30 Jan 2026 SEV 3/10
vulnerability identity_threat
Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS | Google Cloud Blog Threat Intelligence Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS January 30, 2026 Mandiant Mandiant Services Stop attacks, reduce risk, and advance your security. Contact Mandiant Introduction Mandiant is tracking a significant expansion and escalation in the operations of threat clusters associated with ShinyHunters-branded extortion. As detailed in our companion report, 'Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft' , these campaigns leverage evolved voice phishing (vishing) and victim-branded credential harvesting to successfully compromise single sign-on (SSO) credentials and enroll unauthorized devices into victim multi-factor authentication (MFA) solutions.
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
Mandiant Research 30 Jan 2026 SEV 4/10
phishing ransomware Conti Play
Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft | Google Cloud Blog Threat Intelligence Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft January 30, 2026 Mandiant Google Threat Intelligence Visibility and context on the threats that matter most. Contact Us & Get a Demo Introduction Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-branded extortion operations. These operations primarily leverage sophisticated voice phishing (vishing) and victim-branded credential harvesting sites to gain initial access to corporate environments by obtaining single sign-on (SSO) credentials and multi-factor authentication (MFA) codes.