
Sign up to save your podcasts
Or


Broadcom's Symantec and Carbon Black confirmed that a state intelligence-linked threat group compromised a bank, an airport, nonprofits, and a defense aerospace software supplier starting in early February 2026 — weeks before the kinetic strikes began on February 28. The group deployed the previously unknown Dindoor backdoor using the Deno JavaScript runtime and attempted data exfiltration via Rclone to cloud storage. Intel 471, Nozomi Networks, CrowdStrike, Flashpoint, and CSIS all documented the broader surge in state-aligned cyber operations targeting financial services, aviation, defense, industrial control systems, and government infrastructure across the conflict zone. The pre-positioning phase is over. The question is whether defenders find the implants before the operators activate them.
Links & Resources
By Tushar VartakBroadcom's Symantec and Carbon Black confirmed that a state intelligence-linked threat group compromised a bank, an airport, nonprofits, and a defense aerospace software supplier starting in early February 2026 — weeks before the kinetic strikes began on February 28. The group deployed the previously unknown Dindoor backdoor using the Deno JavaScript runtime and attempted data exfiltration via Rclone to cloud storage. Intel 471, Nozomi Networks, CrowdStrike, Flashpoint, and CSIS all documented the broader surge in state-aligned cyber operations targeting financial services, aviation, defense, industrial control systems, and government infrastructure across the conflict zone. The pre-positioning phase is over. The question is whether defenders find the implants before the operators activate them.
Links & Resources