Duty Analyst: Salva Rocha

Blog

Insights & Blog

Research, detection engineering notes, and incident response lessons learned.

Latest

122 articles published.

Sarcoma Ransomware Group

Sarcoma is a relatively new but technically competent ransomware group, first identified in early 2024. Like many contemporary cybercriminal entities, Sarcoma operates under a double extortion model, combining traditional ransomware encryption with the theft and threatened exposure of sensitive data. While still considered an emerging threat, Sarcoma’s campaigns demonstrate a high degree of intentionality, persistence, and an increasing level of sophistication.

Scattered Spider (Octo Tempest) – Threat Actor Profile

Scattered Spider, also tracked as Octo Tempest by Microsoft, is a financially motivated threat actor that has rapidly gained prominence for its use of advanced social engineering, SIM swapping, and multi-stage extortion campaigns. First observed in 2022, the group has successfully infiltrated major companies across multiple sectors, including telecommunications, technology, hospitality, and critical infrastructure.

Silent Ransom (Silk Typhoon) – Threat Actor Profile

Silent Ransom, also referred to as Silk Typhoon by Microsoft, is a Chinese state-aligned threat actor operating at the intersection of cyber espionage and data extortion. The group is known for conducting stealthy intrusions into government, telecom, and critical infrastructure organisations, typically without deploying ransomware in the traditional sense. Instead, it focuses on access operations, credential theft, and selective data exfiltration, occasionally coupled with financial or reputational extortion.

TA406 / Phosphorus

TA406, also tracked as Phosphorus, Charming Kitten, or APT35 in overlapping campaigns, is an Iranian-linked cyber espionage group that has been active since at least 2015. While TA406 shares infrastructure and methodology with other Iranian threat actors, it is uniquely focused on long-term intelligence gathering through persistent spear-phishing campaigns, credential theft, and surveillance of individuals in strategic policy, defence, human rights, and academia.

UserSec Collective

UserSec Collective is a pro-Russian hacktivist entity active since mid-2022. The group promotes itself as a decentralised digital army operating in support of Russian national interests and frequently targets government, financial, and public sector websites across NATO-aligned nations. Like other politically aligned hacktivist groups, UserSec primarily uses denial-of-service attacks and defacement tactics, alongside an active propaganda presence on Telegram and fringe social media platforms.

Mastering Threat Hunting: Scaling Threat Hunting with Automation and Orchestration

Throughout this series, we’ve explored thestrategic frameworks,essential tools, andreal-world scenariosthat define effective threat hunting. Scaling Threat Hunting with Automation and Orchestration delves into the critical strategies of automation and orchestration, revealing how organisations can effectively scale theirthreat-huntingcapabilities without compromising accuracy or effectiveness.

Mastering Threat Hunting: Real-World Threat Hunting Scenarios

Having covered structured frameworks, methodologies, and essential tools, it’s time to explore real-world scenarios that illustrate the power and effectiveness ofproactive threat hunting. Through these detailed case studies, we aim to highlight practical applications of the techniques and tools we’ve previously discussed, showing clearly how structured methodologies deliver measurable value in detecting and mitigating threats.