-
Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we’ll dig through digital clues left behind by the hackers, network operators, and cybercrime services that appear to have benefitted from Kimwolf’s spread.
·
3XK Tech GmbH, A Little Sunshine, Aisuru, AT&T, Benjamin Brundage, Breadcrumbs, ByteConnect, Cassidy Hales, DDoS-for-Hire, Dort, Ethereum Name Service, Flashpoint, Forky, Friedrich Kraft, GreyNoise Intelligence, Internet of Things (IoT), Julia Levi, Kimwolf, Linus, Maskify, Ne’er-Do-Well News, Plainproxies, Resi Rack LLC, Shox, Snow, Synthient, XLab¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” made headlines regularly this year by stealing data from and publicly mass extorting dozens of major corporations. But the tables seem to have turned somewhat for “Rey,” the moniker chosen by the technical operator and public face of the hacker group: Earlier this week, Rey confirmed his real life identity and agreed to an interview after KrebsOnSecurity tracked him down and contacted his father.
·
A Little Sunshine, BreachForums, Breadcrumbs, CrowdStrike, Cyb3r Drag0nz Team, cybero5tdev@proton.me, Disney/Hulu, FedEx, Flashpoint, Hellcat, Hikki-Chan, KELA, LAPSUS$, Ne’er-Do-Well News, o5tdev, Orange Romania, Ransomware, Saif Al-Din Khader, Scattered LAPSUS$ Hunters, Scattered Spider, Schneider Electric, SentinelOne, ShinyHunters, ShinySp1d3r, SpyCloud, Telefonica, Toyota, U.S. Centers for Disease Control and Prevention, ups, wristmug, Zaid Khader¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


