Russian Cyberattacks Linked to Missile Strikes: ATT&CK Advisory Council Exposes Predator Bypassing iOS Security Indicators

Russian-Cyberattacks-Linked-to-Missile-Strikes-ATT-CK-Advisory-Council-Exposes-Predator-Bypassing-iOS-Security-Indicatorsdata

New Technique Allows Predator Spyware to Bypass Apple’s Recording Indicators

A recently discovered technique used by Predator spyware allows it to bypass Apple’s recording indicators on iOS devices. By installing a single hook to intercept and silently discard sensor activity updates, the malware can suppress both camera and microphone indicators simultaneously during covert recording.

Technique Requires Prior Full Device Compromise

This capability requires prior full device compromise and does not rely on new iOS vulnerabilities. The technique uses kernel-level access to modify thread state and exploit Objective-C nil messaging.

Russian Cyberattacks Shift Focus to Intelligence Gathering

In a separate development, Ukrainian cybersecurity officials have revealed that Russian cyberattacks against the country’s energy grid have shifted from causing immediate disruptions to gathering intelligence to support and guide missile strikes.

Intrusions Help Map Facilities and Monitor Repair Efforts

These intrusions help map facilities, monitor repair efforts, and evaluate recovery timelines both before and after physical attacks.

US Department of the Treasury Launches Cybersecurity Initiative

The US Department of the Treasury has announced a public-private initiative to improve cybersecurity and risk management for artificial intelligence (AI) in the financial services sector.

Initiative to Deliver Practical Resources for Safe AI Adoption

The effort, developed through the Artificial Intelligence Executive Oversight Group, will deliver a series of practical resources to support safe and resilient AI adoption while addressing related cyber risks.

Cybersecurity and Venture Markets See Increased Valuations

A recent report by DataTribe found that valuations in cybersecurity and broader venture markets rose in Q4 2025, with capital concentrated in large deals and early-stage activity showing gains.

AI Remains Central to Investment Focus

AI remained central to investment focus, driving startup alignment with enterprise priorities in areas like AI security and automation.

ShinyHunters Claims Responsibility for Odido Hack

ShinyHunters has claimed responsibility for hacking Dutch telecommunications provider Odido, alleging they stole nearly 21 million records containing personal customer information.

Odido Confirms Personal Data Exposure

Odido previously disclosed a cyberattack affecting its customer contact system, confirming personal data exposure for about 6.2 million customers but denying that passwords, billing details, or other sensitive elements were compromised.

CrowdStrike’s 2026 Global Threat Report Highlights Evasive Adversaries

CrowdStrike’s 2026 Global Threat Report describes 2025 as the year of the evasive adversary, with attackers using AI to accelerate operations and exploit new surfaces.

Key Trends Include Rise in AI-Enabled Attacks

Key trends include an 89% rise in AI-enabled attacks, faster breakout times averaging 29 minutes, and a high proportion of malware-free detections.

MITRE Forms ATT&CK Advisory Council

MITRE has formed a new ATT&CK Advisory Council composed of cybersecurity experts from government, industry, and academia.

Council to Provide Strategic Guidance

The council will provide strategic guidance to support the ongoing development and long-term stewardship of the MITRE ATT&CK framework.

New Android Remote Access Trojan Emerges

A new Android remote access trojan called Oblivion is being sold for around $300 and claims to bypass detection and security features on devices from major manufacturers.

Malware Uses Advanced Techniques to Gain Persistent Access

The malware reportedly uses advanced techniques to gain persistent access, steal sensitive data, and maintain control without triggering built-in protections.

OpenAI Takes Action Against Threat Actors

OpenAI has reported taking action against multiple threat actors who attempted to use its AI models for harmful purposes, including influence operations, phishing, and malware development.

Company Disrupts Coordinated Campaigns

The company disrupted several coordinated campaigns by banning associated accounts, removing malicious content, and sharing indicators with industry partners and law enforcement.



About Author

en_USEnglish