Mark Kelly
@mkyo.bsky.social
490 followers 170 following 30 posts
🇨🇳 Threat Research at Proofpoint
Posts Media Videos Starter Packs
Reposted by Mark Kelly
pivotcon.bsky.social
📣 🔥 🛋️ SAVE THE DATE 🛋️ 🔥 📣
The next #PIVOTcon will be on 6-8 May 2026, in Malaga, ES!!!

You favorite ;) #ThreatResearch conference is coming back and we are planning to bring you the usual experience and content of utmost quality. Follow us + #StayTuned for more info
#CTI #ThreatIntel #PIVOTcon26
mkyo.bsky.social
Good piece covering a big burst of TA416 activity targeting European governments last week!
strikereadylabs.com
Quite a bit of CN APT activity in europe in the past week

strikeready.com/blog/cn-apt-...

As always, if you're interested in tuning your skills, download the samples here github.com/StrikeReady-...
CN APT targets Serbian Government
Mustang Panda continues targeting European governments
strikeready.com
Reposted by Mark Kelly
mkyo.bsky.social
Our reporting overlaps this recent WSJ article:
www.wsj.com/politics/nat...

See our full research here:
www.proofpoint.com/us/blog/thre...
mkyo.bsky.social
In these campaigns, TA415 delivered infection chains to set up VS Code Remote Tunnels 🚇 This is in line with recent TA415 phishing operations over the past year, which have relied on legit services (e,g, Google Sheets, Google Calendar, VS Code) for C2 to blend w/ trusted traffic
TA415 infection chain diagram
mkyo.bsky.social
🚨🇨🇳💰 New @threatinsight.proofpoint.com blog on TA415 (aka APT41) economy and trade-themed spearphishing against US govt, think tanks & academia.

The campaigns used U.S.-China economic lures and spoofed the Chair of the House Select Committee on CCP competition + the US-China Business Council.
mkyo.bsky.social
It is time the Mustang Panda moniker went the way of Winnti Group ☠️
Reposted by Mark Kelly
saffronsec.bsky.social
New DISCARDED podcast drop! Join
@greg-l.bsky.social and me as we talk about our fave North Korean groups, DPRK as the neglected child, TA406 and the Russian connection, and finally, the dreaded but pervasive IT worker problem podcasts.apple.com/us/podcast/c...
open.spotify.com/episode/01d1...
Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook
Podcast Episode · DISCARDED: Tales From the Threat Research Trenches · 07/01/2025 · 53m
podcasts.apple.com
Reposted by Mark Kelly
greg-l.bsky.social
Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals @selenalarson.bsky.social it’s got it all:

🛰️ Popped routers for sending phish

📊 ACH on attribution

👾 custom protocols

👽 cool malware

🕵️ crime

🎯 espionage

❔many unanswered questions

www.proofpoint.com/us/blog/thre...
10 Things I Hate About Attribution: RomCom vs. TransferLoader | Proofpoint US
Threat Research would like to acknowledge and thank the Paranoids, Spur, and Pim Trouerbach for their collaboration to identify, track, and disrupt this activity.  Key takeaways
www.proofpoint.com
Reposted by Mark Kelly
calwarez.bsky.social
🚨 We’re hiring at Recorded Future’s Insikt Group

Two senior analyst roles are open right now. Both focus on tracking nation-state threats.

🧵
mkyo.bsky.social
ELECTRONIC ESPIONAGE and ELECTRONIC CRIME ftw
Reposted by Mark Kelly
greg-l.bsky.social
Is the era of the “named actor” done?

As the OG adversary sets diverge, get promoted, or move on

actors dispersing across the kill chain based on specialized skills increases (ORBs, criminal underground)

AND the CTI models maturing…

APTs ⬇️⬇️

UNCs ⬆️⬆️
mkyo.bsky.social
Hey nice to meet you my name is @nickattfield.bsky.social