CYFIRMA Research

CYFIRMA

Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.

  1. 4D AGO

    CYFIRMA Research: Tracking Ransomware- March 2026

    March reflected a further escalation in ransomware activity, with incident volumes rising and multiple threat actors expanding operations simultaneously. Qilin emerged as the most dominant group with a sharp increase in activity, while several others, including Akira, Incransom, Nightspire, Dragonforce, and LockBit5, showed significant growth, indicating a highly competitive and rapidly scaling ecosystem. At the same time, a few groups declined, reinforcing the fluid and continuously shifting nature of ransomware operations. The threat model continues to evolve toward access-driven intrusions, with attackers leveraging credential compromise, exploitation of internet-facing vulnerabilities, and brokered access. Increased use of legitimate administrative tools, stealth-focused techniques, and rapid deployment through cloud and virtual infrastructure highlights a strong shift toward efficiency and evasion. Geographically, the United States remained the most impacted region by a wide margin, followed by the United Kingdom, Canada, and major European economies, with continued expansion across Asia-Pacific and emerging markets. Industry targeting remained concentrated on sectors with high operational reliance and sensitive data exposure, particularly professional services, manufacturing, healthcare, and information technology. Link to the Research Report: https://www.cyfirma.com/research/tracking-ransomware-march-2026/  #CyberSecurity #Ransomware #ThreatIntel #ETLM #CYFIRMA  #ThreatLandscape #CyberRisk #DataExtortion #ExternalThreatLandscapeManagement #ETLM https://www.cyfirma.com/

    4 min
  2. APR 7

    CYFIRMA Research: Tracking Ransomware- February 2026

    Stay informed with CYFIRMA’s February 2026 Ransomware Threat Report. February continued to reflect a high-activity ransomware environment, with noticeable shifts in group dynamics and operational patterns. While Qilin sustained consistent activity levels, other actors showed mixed trends, with some groups scaling rapidly and others reducing operations, highlighting the constantly evolving nature of the ecosystem. The ransomware model continues to move toward access-led intrusions and extortion strategies driven by psychological and operational pressure rather than purely technical compromise. Techniques such as credential-based access, abuse of legitimate tools, and stealth-focused persistence are becoming more prominent, alongside increasing use of cloud and virtual infrastructure to support campaigns. Geographically, the United States remained the most affected region, followed by Canada, the United Kingdom, and key European markets, with continued spread across Asia-Pacific and emerging economies. Industry targeting remained focused on sectors with high operational dependency and valuable data, particularly professional services, manufacturing, and information technology. Link to The Research Report: https://www.cyfirma.com/research/tracking-ransomware-feb-2026/ #CyberSecurity #Ransomware #ThreatIntel #ETLM #CYFIRMA #ThreatLandscape #CyberRisk #DataExtortion #ExternalThreatLandscapeManagement #ETLM https://www.cyfirma.com/

    4 min
  3. MAR 30

    CYFIRMA Research- TaxiSpy RAT: Analysis of TaxiSpy RAT – Russian Banking-Focused Android Malware with Full Remote Control

    New Report Released: Advanced Android Banking RAT Targeting Russian Financial Institutions CYFIRMA Research has uncovered a highly sophisticated Android Banking Trojan with integrated Remote Access Trojan (RAT) capabilities targeting Russian users and financial institutions, such as banking apps, cryptocurrency applications, government services apps, and marketplace platforms. What the report covers:  • Native library–based obfuscation (sysruntime[.]so)  • Custom rolling XOR encryption hiding C2 infrastructure  • Firebase-backed command & control  • Real-time VNC-like remote device control  • SMS takeover & OTP interception  • Lock screen PIN capture & keylogging  • Targeted monitoring of 33+ Russian banking apps  • Multi-layered persistence mechanisms The malware demonstrates advanced operational security, runtime decryption of infrastructure, affiliate-style worker keys, and comprehensive financial fraud capabilities. This campaign reflects the growing sophistication of Android banking RAT ecosystems — combining stealth, persistence, and full remote access into a scalable threat model. Link to the Research Report: TAXISPY RAT : Analysis of TaxiSpy RAT - Russian Banking - Focused Android Malware with Full Remote Control - CYFIRMA  #ThreatIntelligence #AndroidMalware #BankingTrojan #CyberSecurity  #MobileThreats #RAT #MalwareAnalysis #CYFIRMA #CYFIRMAResearch  #ExternalThreatLandscapeManagement #ETLM https://www.cyfirma.com/

    5 min

About

Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.