<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Our CERT is releasing a new research into UNC2465, a ransomware affiliate actively distributing Qilin across Europe 🇪🇺.]]></title><description><![CDATA[<p>Our CERT is releasing a new research into UNC2465, a ransomware affiliate actively distributing Qilin across Europe <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f1ea-1f1fa.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--flag-eu" style="height:23px;width:auto;vertical-align:middle" title="🇪🇺" alt="🇪🇺" />. </p><p>A TLP:RED version of this research was presented during <span><a href="/user/botconf%40infosec.exchange">@<span>botconf</span></a></span> <br /> 2026.</p><p><a href="https://www.orangecyberdefense.com/global/blog/cert-news/smoking-out-an-affiliate-smokedham-qilin-a-few-google-ads-and-some-bossware" rel="nofollow noopener"><span>https://www.</span><span>orangecyberdefense.com/global/</span><span>blog/cert-news/smoking-out-an-affiliate-smokedham-qilin-a-few-google-ads-and-some-bossware</span></a></p><p>UNC2465 primarily relies on malvertising to distribute the SmokedHam backdoor. By pivoting on its delivery infrastructure, we identified a large number of spoofed software like RVTools, <span><a href="https://bird.makeup/users/hornetsecurity">@<span>hornetsecurity</span></a></span> <br />, Angry IP Scanner, Remote Desktop Manager...</p><p>UNC2465 also relies on bossware like ControlioNet and Teramindco to further blend malicious actions with normal activity and avoid detection.</p><p>IOCs are available here: </p><p><a href="https://github.com/cert-orangecyberdefense/cti/blob/main/smokedham/iocs" rel="nofollow noopener"><span>https://</span><span>github.com/cert-orangecyberdef</span><span>ense/cti/blob/main/smokedham/iocs</span></a></p><p><a href="https://infosec.exchange/tags/CTI" rel="tag">#<span>CTI</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/SmokedHam" rel="tag">#<span>SmokedHam</span></a> <a href="https://infosec.exchange/tags/UNC2465" rel="tag">#<span>UNC2465</span></a> <a href="https://infosec.exchange/tags/ransomware" rel="tag">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/Qilin" rel="tag">#<span>Qilin</span></a> <a href="https://infosec.exchange/tags/rvtools" rel="tag">#<span>rvtools</span></a> <a href="https://infosec.exchange/tags/bossware" rel="tag">#<span>bossware</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/eebd5525-1c4e-42b2-8a6b-36c8c25b7046/our-cert-is-releasing-a-new-research-into-unc2465-a-ransomware-affiliate-actively-distributing-qilin-across-europe-.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:38:22 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/eebd5525-1c4e-42b2-8a6b-36c8c25b7046.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 05 May 2026 10:35:11 GMT</pubDate><ttl>60</ttl></channel></rss>