Threat Research

    During October and November 2025, a series of campaigns targeting the energy, defense, pharmaceutical, and cybersecurity sectors displayed traits consistent with earlier operations linked to Void Rabisu (also known as ROMCOM, Tropical Scorpius, or Storm-0978)....
    RomCom vs. TransferLoader highlights two related cybercriminal operations. TA829 conducts espionage and cybercrime using tools based on the legacy RomCom backdoor. A highly similar campaign, using a new loader and backdoor called TransferLoader, is linked to a separate cluster named UNK_GreenSec....
    "UAT-5647" refers to a cyber threat actor targeting entities in Ukraine and Poland using variants of RomCom malware. This malware is designed to facilitate espionage and data theft. The attacks typically involve phishing campaigns and malicious software delivery, aiming to compromise sensitive information from government and private sector organizations....
    We’ve uncovered a new variant of the RomCom malware family named SnipBot, revealing post-infection activity on victim systems for the first time. This strain employs unique obfuscation techniques alongside methods from earlier versions, RomCom 3.0 and PEAPOD (RomCom 4.0)....
    Looking for Something?
    Threat Research Categories:
    Tags