Global Espionage Campaigns & Record DDoS Attacks šš. AIādriven Threat Detection & Ransomware Evolution š¤š”ļø.
Hello, here is your daily cybersecurity and AI threat intelligence roundup for February 10, 2026.
Today's headlines
- Shadow campaigns exploited over 15 highāprofile software vulnerabilities.
- AmaranthāDragon leverages new CVEā2025ā8088 for espionage in Southeast Asia.
- Critical infrastructure hit: Romaniaās Conpet pipeline suffered a disruptive cyberattack.
- Cloudābased threatāactor tracking gains a novel detection technique using logging data.
- Recordābreaking 31.4āÆTbps DDoS attack underscores growing volumetric threats.
1ļøā£ Shadow Campaigns Reveal Global Espionage Ops

Key Points:
- Detected exploitation attempts on SAP Solution Manager, Microsoft Exchange, DāLink, and other enterprise products.
- Attacks used public and zeroāday flaws such as XXE, remote code execution, and SQL injection.
- Unit42's Advanced Threat Prevention blocked the malicious activity across multiple regions.
- Threat actor demonstrated persistent targeting of supplyāchain and email systems.
- Continuous monitoring uncovered over a dozen distinct vulnerability classes.
Description:
Unit42ās Shadow Campaigns report details a worldwide espionage operation that has leveraged a broad set of vulnerabilities, from SAP privilege escalation to Microsoft Exchange remote code execution, to infiltrate organizations and exfiltrate data, with the serviceās prevention tools stopping many attempts in real time.
Why It Matters:
The breadth of exploited flaws shows that threat actors are actively hunting for unpatched software across industries, highlighting the urgent need for comprehensive vulnerability management and continuous threat monitoring to protect sensitive information from stateāaligned espionage campaigns.
2ļøā£ AmaranthāDragon Exploits CVEā2025ā8088 in SE Asia

Key Points:
- AmaranthāDragon weaponizes the newly disclosed CVEā2025ā8088 for targeted attacks.
- Campaign focuses on organizations in Southeast Asian governments and telecoms.
- Malware employs advanced evasion techniques and custom implants.
- Check Point observed rapid postāexploit credential dumping and data exfiltration.
- Attribution points to a nexus linked to known APTā41 activity.
Description:
Checkpoint researchers identified AmaranthāDragon as a sophisticated threat group that has adopted the recently released CVEā2025ā8088 to conduct targeted espionage operations against critical infrastructure and government entities across Southeast Asia, using custom tools to maintain persistence and evade detection.
Why It Matters:
The rapid weaponization of a fresh vulnerability underscores the importance of swift patch deployment and threatāintel sharing, as stateāaligned actors can quickly turn new exploits into operational capabilities that threaten regional stability and data confidentiality.
3ļøā£ Conpet Oil Pipeline Disruption Highlights Critical Infrastructure Risk

Key Points:
- Romaniaās national oil pipeline operator, Conpet, experienced a cyberattack that took its website offline.
- Attack disrupted internal IT systems but did not affect physical oil flow.
- Preliminary analysis points to a credentialātheft based intrusion.
- Threat actors leveraged publicly available tools to move laterally.
- Incident emphasizes the vulnerability of energy sector IT assets.
Description:
The 9th February Threat Intelligence Report from Check Point details a cyber incident against Conpet, Romaniaās national oil pipeline operator, where attackers compromised IT services, resulting in website downtime and highlighting the broader threat to energy infrastructure.
Why It Matters:
Even when physical operations remain unaffected, cyber disruptions can damage reputation, incur financial loss, and expose critical supplyāchain data, reinforcing the need for hardened perimeter defenses and incidentāresponse readiness in the energy sector.
4ļøā£ New Cloud Logging Method Tracks Threat Actors Across Platforms

Key Points:
- Introduces a technique that correlates cloudāprovider logs to uncover actor behavior.
- Successfully identified activities of Scattered Spider, Halcyon Silk Typhoon, and HAFNIUM.
- Method reduces detection latency by leveraging APIālevel audit trails.
- Demonstrates increased visibility into multiācloud lateral movement.
- Provides actionable indicators for SOCs to hunt across Azure, AWS, and GCP.
Description:
Unit42 presents a novel detection approach that uses comprehensive cloud logging data to monitor and attribute malicious activities across major cloud platforms, revealing the tactics of several advanced threat groups operating in a multiācloud environment.
Why It Matters:
As enterprises migrate workloads to the cloud, traditional perimeter defenses lose efficacy; this loggingābased technique offers a scalable way to spot covert actor behavior early, enabling faster containment and reducing breach impact.
5ļøā£ CISA Report Highlights Abuse of OpenāSource Tools in Cyber Intrusions
Key Points:
- Publicly available scanning and exploitation tools were used in recent incidents.
- Adversaries combined these tools with custom scripts to achieve persistence.
- Report urges organizations to monitor tool usage and enforce strict access controls.
- Recommendations include inventorying legitimate admin tools and logging their execution.
- Collaboration with NCCIC encouraged for reporting suspicious activity.
Description:
The CISA advisory outlines how threat actors are leveraging widelyāavailable openāsource utilities to conduct reconnaissance, exploit vulnerabilities, and maintain footholds within victim networks, stressing the need for heightened awareness and governance.
Why It Matters:
Openāsource tools lower the entry barrier for attackers, making it essential for defenders to differentiate benign usage from malicious activity, thereby preventing tool misuse from escalating into fullāscale compromises.
6ļøā£ RecordāSetting 31.4āÆTbps DDoS Attack Marks 2025 Surge

Key Points:
- A 31.4āÆTbps volumetric attack set a new record for the year.
- Attack leveraged amplification of UDPābased protocols and misāconfigured DNS servers.
- Cloudflare mitigated the traffic using its global Anycast network.
- Report notes a 42% increase in multiāvector DDoS campaigns versus Q3 2025.
- Recommendations include scrubbing services and upstream traffic filtering.
Description:
Cloudflareās Q4 2025 DDoS Threat Report documents a historic 31.4āÆTbps attack that overwhelmed targeted networks, demonstrating the scale of modern volumetric threats and the effectiveness of largeāscale mitigation infrastructure.
Why It Matters:
The unprecedented size of the attack highlights the growing capability of adversaries to disrupt services, urging organizations to adopt robust DDoS protection strategies and ensure upstream providers can handle extreme traffic spikes.
7ļøā£ Rise of the Digital Parasite Extends Ransomware Dwell Time

Key Points:
- Ransomware groups are shifting toward longāterm persistence, termed the āDigital Parasiteā.
- Red Report 2026 shows increased use of legitimate admin tools for stealth.
- Victims experience longer undetected dwell times before ransom demand.
- Emphasis on moving laterally and exfiltrating data before encryption.
- Security teams advised to adopt continuous monitoring and endpoint detection.
Description:
The Hacker News reports on the emerging āDigital Parasiteā model where ransomware operators maintain footholds within networks for extended periods, blending traditional ransomware tactics with sophisticated espionage techniques to maximize impact.
Why It Matters:
Extended dwell allows attackers to gather valuable data and impair recovery, making early detection and comprehensive threat hunting vital to limit damage and avoid costly ransom payments.
8ļøā£ CrowdStrike Linux Sensor Enhances WebāShell Detection

Key Points:
- New Linux sensor leverages behavioral analytics to spot malicious web shells.
- Detection covers fileless techniques and obfuscated scripts.
- Integration with Falcon platform provides realātime alerts and automated response.
- Field tests show a 68% reduction in false positives compared to signatureāonly methods.
- Supports remediation actions such as quarantine and process termination.
Description:
CrowdStrikeās latest blog details the advanced capabilities of its Linux sensor, which now incorporates sophisticated webāshell detection mechanisms that identify anomalous file activity and command execution patterns across containerized environments.
Why It Matters:
Web shells remain a common persistence mechanism for attackers targeting Linux servers; enhanced detection reduces the window of exposure and helps organizations secure critical infrastructure against stealthy compromise.
9ļøā£ CrowdStrike Recognized as Gartnerās Sole Customersā Choice for EASM
Key Points:
- Gartnerās 2025 Voice of the Customer named CrowdStrike the only vendor achieving Customersā Choice for External Attack Surface Management.
- Award reflects high satisfaction with Falconās exposure management and asset discovery.
- Customers cite rapid detection of shadow IT and streamlined remediation workflows.
- Recognition boosts market confidence in cloudānative EASM solutions.
- CrowdStrike plans further AIādriven enhancements for surface monitoring.
Description:
CrowdStrike announced its distinction as the exclusive Customersā Choice award holder in Gartnerās 2025 EASM category, underscoring the platformās effectiveness in identifying and managing external attack surfaces for enterprise clients.
Why It Matters:
Strong customer endorsement validates the importance of continuous external surface monitoring, encouraging organizations to adopt EASM tools that can proactively reduce attack vectors before they are exploited.
š VMware vDefend Advances ZeroāTrust Lateral Security

Key Points:
- vDefend introduces microāsegmentation and identityābased policies for lateral movement control.
- Solution integrates with VMware Cloud Foundation to provide continuous risk assessment.
- Early adopters report a 73% reduction in successful lateral attacks.
- Supports AIādriven anomaly detection across private and hybrid clouds.
- Provides automated policy enforcement and incident response playbooks.
Description:
VMwareās security blog outlines the capabilities of vDefend, a new zeroātrust solution that enforces granular lateral security controls within private cloud environments, leveraging AI to detect anomalous behavior and automatically remediate threats.
Why It Matters:
As attackers increasingly target eastāwest traffic within data centers, adopting zeroātrust architectures like vDefend is critical for limiting breach impact and maintaining compliance across modern multiācloud deployments.
Stay vigilant and keep your defenses updated.
Member discussion