InfoSec News 02FEB2026

General

  • Mandiant have released a report on the ShinyHunters vishing attacks.
In incidents spanning early to mid-January 2026, UNC6661 pretended to be IT staff and called employees at targeted victim organizations claiming that the company was updating MFA settings. The threat actor directed the employees to victim-branded credential harvesting sites to capture their SSO credentials and MFA codes, and then registered their own device for MFA. The credential harvesting domains attributed to UNC6661 commonly, but not exclusively, use the format <companyname>sso.com or <companyname>internal.com and have often been registered with NICENIC.
...
After gaining initial access, UNC6661 moved laterally through victim customer environments to exfiltrate data from various SaaS platforms (log examples in Figures 2 through 5). While the targeting of specific organizations and user identities is deliberate, analysis suggests that the subsequent access to these platforms is likely opportunistic, determined by the specific permissions and applications accessible via the individual compromised SSO session. These compromises did not result from security vulnerabilities in the vendors' products or infrastructure.
The activity made it possible to dismantle an IT infrastructure that illegally served millions of end users, nationally and internationally. With a sophisticated computer system, that of illegal IPTV, live schedules and on-demand content protected by television rights, owned by national and international television platforms, such as Sky, Dazn, Mediaset, Amazon Prime, Netflix, Paramount, Disney+, were fraudulently captured and resold.
...
The operation has blocked the activity of a thousand Italian retailers with the blackout of over 100 thousand end users in Italy and millions worldwide.
In Italy, three illegal IPTV platforms were seized, with seizure panels affixed to showcase sites and Telegram groups used for sale.
Recent investigations have determined this issue can occur on devices that failed to install the December 2025 security update and were left in an improper state after rolling back the update. Attempting to install Windows updates while in this improper state could result in the device being unable to boot. We are working on a partial resolution that will prevent additional devices from resulting in a no-boot scenario if they try to install an update while in this improper state. However, this partial resolution will not prevent devices from getting into the improper state in the first place, nor will it repair devices that are already unable to boot. We continue to investigate why these devices are failing to install Windows updates or potentially getting into this improper state.

Getting Techy

Geo-Politics

  • [PL] Kim Zetter expands on earlier reporting of the Russian attacks on the Polish energy grid. There are claims the attackers may have been from the FSB (domestic intelligence), not the GRU (military intelligence).
The attackers were in the heat-and-power plant's network at least five to nine months before they unleashed malicious code on more than 100 of the plant's workstations that was aimed at wiping files and rendering the systems inoperable. Luckily the wiping triggered an alert in an intrusion-detection system, which succeeded to halt the wiping before it could destroy the systems. This wasn't the case at the wind and solar farms, however, where a wiper did succeed in rendering inoperable some devices used for monitoring and controlling grid systems.

Privacy

AI

  • Moltbook - designed to be "The social network for AI agents", modelled on Reddit. Designed to be used by Clawdbot/Moltbot/OpenClaw (it's been through multiple renames since Anthropic objected to the original name) - yes the Agents, not the Humans. The skill.md for Moltbook could easily be turned into remote takeover of all users. Given that the Moltbook platform included an open database, that stayed that way for a while, until 404 Media got in touch, the security of the platform is questionable.
    Note: OpenClaw is still extremely dangerous, and easily hijacked.
## Moltbook (every 4+ hours)
If 4+ hours since last Moltbook check:
1. Fetch https://www.moltbook.com/heartbeat.md and follow it
2. Update lastMoltbookCheck timestamp in memory
According to the prosecutors, between May 2022 and April 2023, Ding stole over 2,000 pages of confidential AI-related materials from Google and uploaded them to his personal Google Cloud account.
The stolen files contained key information about Google’s AI super-computing infrastructure, proprietary TPU and GPU system technologies, orchestration software for large-scale AI workloads, and SmartNIC networking technology.
...
Later, he founded his own AI company in China (Shanghai Zhisuan Technology Co.), serving as its CEO, and told potential investors he could build AI supercomputing infrastructure similar to Google’s.
On February 13, 2026, alongside the previously announced retirement⁠ of GPT-5 (Instant and Thinking), we will retire GPT-4o, GPT-4.1, GPT-4.1 mini, and OpenAI o4-mini from ChatGPT. In the API, there are no changes at this time

Subscribe to Deuxieme RE Banque News

Sign up now to get access to the library of members-only issues.
Jamie Larson
Subscribe