Iranian APT Hits Defense as KimWolf DDoS Operator Arrested

Events tracked
182
Critical exposure
67

Summary

A heavy mid-month day dominated by Indonesian hacktivism volume and a contrasting trio of high-tier criminal disruptions: Unit 42 brought a long-running Iranian APT into clearer focus, the FBI took down a million-device DDoS-for-hire botnet, and a CVSS-10 Cisco bug landed atop CISA's daily KEV additions. The shape is a familiar one -- small forum actors driving most of the noise while the day's actual operational damage runs through credential rotations missed in supply-chain compromises and unpatched maximum-severity flaws.

Today's developments

Indonesian-aligned hacktivist crews drove most of the day's posting volume. Actor INDRAMAYU CHAOS SYSTEM claimed 20 separate events in 24 hours -- overwhelmingly Indonesian local government and education portals; BABAYO EROR SYSTEM followed with 11 claims; DEFACER INDONESIAN TEAM and a half-dozen smaller crews accounted for most of the 56 defacement posts. BabayoErorSystem separately claimed a database breach against Universitas Muhammadiyah Metro, and SCTH posted samples from SMP Negeri 9 Pekanbaru, an Indonesian junior secondary school.

Tier-one criminal actors made up the smaller, more consequential layer. Actor The BlackH4t MD-Ghost posted a data-breach claim against BMW AG's German operations and a separate Canadian consumer-services target Michael's Hair Body & Mind, plus two unspecified UK and Indian dumps within the same 12-hour window. Worldleaks listed BMJ Paper Pack, an Indonesian print supplier. Angel_Batista posted three France-targeted claims, one against the catering and equipment vendor ATOL Group. Nova and Qilin together accounted for nine ransomware claims spread across European manufacturing and Latin American retail. Infrastructure Destruction Squad claimed two Italian targets including I.B. SRL. Two pro-Russian-aligned listings stood out: mosad (an actor adopting an inverted intelligence-agency callsign) posted twin data-breach claims against Russia's own Federal Security Services, while NoName057(16) ran eight DDoS claims against European municipal and energy targets. BestCombo listed a generic "Microsoft Outlook" dump -- likely combolist recycling rather than a fresh intrusion. LaPampaLeaks claimed Uruguay's Ministry of Education and Culture.

External analysis hardened around four substantive disclosures. Palo Alto's Unit 42 published new tracking on the Iranian APT it calls Screening Serpens, detailing AppDomainManager hijacking and new RAT variants used in 2026 espionage campaigns against technology and defense sector targets. The US Justice Department unsealed charges against 23-year-old Canadian Jacob Butler for operating the KimWolf DDoS-for-hire botnet, which the FBI says had infected over a million devices worldwide; multiple outlets carried the case and US authorities are now seeking extradition. The Hacker News disclosed Megalodon, an automated supply-chain campaign that pushed 5,718 malicious commits across 5,561 GitHub repositories inside a single six-hour throttled window. Grafana confirmed that attackers had used a token compromised in the broader TanStack supply-chain incident -- which the company had not rotated -- to access its GitHub repositories and steal codebase and other internal data.

Three patch-and-CVE stories closed the day. Cisco issued an emergency fix for CVE-2026-20223, a CVSS 10.0 unauthenticated remote flaw in Secure Workload's REST API that allows sensitive-data access. Trend Micro patched CVE-2026-34926, a directory-traversal zero-day in the on-prem version of Apex One that was exploited in the wild before disclosure. CISA added both the Apex One bug and a previously known Langflow vulnerability to its Known Exploited Vulnerabilities catalogue. Securelist meanwhile detailed continued Cloud Atlas activity in late 2025 and early 2026 -- including a new payload, PowerCloud, used alongside ReverseSocks, SSH and Tor for persistence in Russian and Belarusian public-sector and diplomatic networks. SecurityWeek separately reported the FBI's takedown of First VPN, an anonymisation service the agency said had been used by dozens of ransomware groups for network reconnaissance and intrusions.

Threat landscape signals

The day's actor concentration is asymmetric: the top three crews (INDRAMAYU CHAOS SYSTEM, BABAYO EROR SYSTEM, NoName057(16)) account for roughly one in five logged events, yet none of them ran a tier-one extortion. The five Qilin and four BlackH4t MD-Ghost claims sit in a different operational tier altogether. Geographically, Indonesia, Mexico, France, Israel and Brazil dominate the day's posting volume; the surface is most exposed in government administration and automotive -- the latter unusual and tied to the BMW AG listing plus a cluster of smaller dealership and parts-supplier targets. Defenders should treat the combination of (1) two unrotated supply-chain tokens producing both the Grafana intrusion and the Megalodon GitHub backdoor sweep, and (2) the CVSS-10 Cisco Secure Workload bug landing the same day as an in-the-wild Apex One zero-day, as the actionable signal here: rotate any token that touched a known-compromised CI/CD pipeline in the past 60 days, and ringfence the Cisco and Trend Micro management planes pending patch verification.

All incidents are reported as alleged claims by threat actors and have not been independently verified by GrayscaleInsight.

Threat intelligence is reported for security awareness purposes only and does not constitute endorsement of any actor, group, or activity.

Recent editions