Unit 42 Palo Alto Networks
- PhantomVAI Loader Delivers a Range of Infostealersby Tom Fakterman on October 15, 2025 at 10:00 am
PhantomVAI is a new loader used to deploy multiple infostealers. We discuss its overall evolution and use of steganography and obfuscated scripts. The post PhantomVAI Loader Delivers a Range of Infostealers appeared first on Unit 42.
- Anatomy of an Attack: The “BlackSuit Blitz” at a Global Equipment Manufacturerby Preston Miller on October 14, 2025 at 11:00 pm
BlackSuit ransomware delivered by APT Ignoble Scorpius started with a vishing attack. Read how Unit 42 helped and the ultimate outcome. The post Anatomy of an Attack: The “BlackSuit Blitz” at a Global Equipment Manufacturer appeared first on Unit 42.
- The Golden Scale: Bling Libra and the Evolving Extortion Economyby Matt Brady on October 10, 2025 at 9:00 pm
Scattered Lapsus$ Hunters: Organizations, be aware of the effort of this cybercriminal alliance as they target retail and hospitality for extortion. The post The Golden Scale: Bling Libra and the Evolving Extortion Economy appeared first on Unit 42.
- When AI Remembers Too Much – Persistent Behaviors in Agents’ Memoryby Jay Chen and Royce Lu on October 9, 2025 at 10:00 pm
Indirect prompt injection can poison long-term AI agent memory, allowing injected instructions to persist and potentially exfiltrate conversation history. The post When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory appeared first on Unit 42.
- The ClickFix Factory: First Exposure of IUAM ClickFix Generatorby Amer Elsad on October 8, 2025 at 10:00 am
Unit 42 discovers ClickFix phishing kits, commoditizing social engineering. This kit presents a lowered barrier for inexperienced cybercriminals. The post The ClickFix Factory: First Exposure of IUAM ClickFix Generator appeared first on Unit 42.
- Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Reportby Margaret Kelley on October 7, 2025 at 11:00 pm
Cloud breaches are rising. This step-by-step guide from Unit 42 shows how to investigate, contain and recover from cloud-based attacks. The post Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report appeared first on Unit 42.
- TOTOLINK X6000R: Three New Vulnerabilities Uncoveredby Zhibin Zhang on October 1, 2025 at 10:00 am
Researchers identified vulnerabilities in TOTOLINK X6000R routers: CVE-2025-52905, CVE-2025-52906 and CVE-2025-52907. We discuss root cause and impact. The post TOTOLINK X6000R: Three New Vulnerabilities Uncovered appeared first on Unit 42.
- Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suiteby Lior Rochberger on September 30, 2025 at 10:00 am
Phantom Taurus is a previously undocumented Chinese threat group. Explore how this group’s distinctive toolset lead to uncovering their existence. The post Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite appeared first on Unit 42.
- Threat Insights: Active Exploitation of Cisco ASA Zero Daysby Andy Piazza on September 26, 2025 at 8:30 pm
CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 affect multiple Cisco products, and are being exploited by a threat actor linked to the ArcaneDoor campaign. The post Threat Insights: Active Exploitation of Cisco ASA Zero Days appeared first on Unit 42.
- Bookworm to Stately Taurus Using the Unit 42 Attribution Frameworkby Kyle Wilhoit on September 24, 2025 at 9:00 pm
We connect Bookworm malware to Chinese APT Stately Taurus using our attribution framework, enhancing our understanding of threat group tradecraft. The post Bookworm to Stately Taurus Using the Unit 42 Attribution Framework appeared first on Unit 42.
- “Shai-Hulud” Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23)by Unit 42 on September 23, 2025 at 7:30 pm
Self-replicating worm “Shai-Hulud” has compromised hundreds of software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and more. The post “Shai-Hulud” Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23) appeared first on Unit 42.
- Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaignby Yoav Zemah on September 22, 2025 at 11:00 pm
SEO poisoning campaign “Operation Rewrite” uses a malicious IIS module called BadIIS to redirect users to unwanted websites. The post Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign appeared first on Unit 42.
- Myth Busting: Why “Innocent Clicks” Don’t Exist in Cybersecurityby Reethika Ramesh on September 16, 2025 at 11:00 pm
Unit 42 explores how innocent clicks can have serious repercussions. Learn how simply visiting a malicious site can expose users to significant digital dangers. The post Myth Busting: Why “Innocent Clicks” Don’t Exist in Cybersecurity appeared first on Unit 42.
- The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deceptionby Osher Jacob on September 15, 2025 at 10:00 pm
We examine security weaknesses in LLM code assistants. Issues like indirect prompt injection and model misuse are prevalent across platforms. The post The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception appeared first on Unit 42.
- Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chainby Bill Batchelor, Eyal Rafian and Nathaniel Quist on September 12, 2025 at 11:00 pm
Effective OAuth token management is crucial for supply chain security, preventing breaches caused by dormant integrations, insecure storage or lack of rotation. The post Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain appeared first on Unit 42.