<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with unc2465]]></title><description><![CDATA[A list of topics that have been tagged with unc2465]]></description><link>https://board.circlewithadot.net/tags/unc2465</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:02:26 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/unc2465.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[Our CERT is releasing a new research into UNC2465, a ransomware affiliate actively distributing Qilin across Europe 🇪🇺.]]></title><description><![CDATA[Our CERT is releasing a new research into UNC2465, a ransomware affiliate actively distributing Qilin across Europe . A TLP:RED version of this research was presented during @botconf  2026.https://www.orangecyberdefense.com/global/blog/cert-news/smoking-out-an-affiliate-smokedham-qilin-a-few-google-ads-and-some-bosswareUNC2465 primarily relies on malvertising to distribute the SmokedHam backdoor. By pivoting on its delivery infrastructure, we identified a large number of spoofed software like RVTools, @hornetsecurity , Angry IP Scanner, Remote Desktop Manager...UNC2465 also relies on bossware like ControlioNet and Teramindco to further blend malicious actions with normal activity and avoid detection.IOCs are available here: https://github.com/cert-orangecyberdefense/cti/blob/main/smokedham/iocs#CTI #ThreatIntel #SmokedHam #UNC2465 #ransomware #Qilin #rvtools #bossware]]></description><link>https://board.circlewithadot.net/topic/eebd5525-1c4e-42b2-8a6b-36c8c25b7046/our-cert-is-releasing-a-new-research-into-unc2465-a-ransomware-affiliate-actively-distributing-qilin-across-europe-.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/eebd5525-1c4e-42b2-8a6b-36c8c25b7046/our-cert-is-releasing-a-new-research-into-unc2465-a-ransomware-affiliate-actively-distributing-qilin-across-europe-.</guid><dc:creator><![CDATA[worldwatch_ocd@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[An article written by my colleague, Marine Pichon, I think it is worth a read if your interested by the Qilin ransomware operation.]]></title><description><![CDATA[An article written by my colleague,  Marine Pichon, I think it is worth a read if your interested by the Qilin ransomware operation.https://research.cert.orangecyberdefense.com/smokedham/smoking_out_an_affiliate.pdf#qilin #cti #UNC2465 #ThreatIntel #smokedham]]></description><link>https://board.circlewithadot.net/topic/d98d5eae-0bd0-45a8-832a-b9494a530c8e/an-article-written-by-my-colleague-marine-pichon-i-think-it-is-worth-a-read-if-your-interested-by-the-qilin-ransomware-operation.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/d98d5eae-0bd0-45a8-832a-b9494a530c8e/an-article-written-by-my-colleague-marine-pichon-i-think-it-is-worth-a-read-if-your-interested-by-the-qilin-ransomware-operation.</guid><dc:creator><![CDATA[bongoknight@ioc.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>