Threat IntelHIGH

Cybercriminals Move Deeper into Networks, Hiding in Edge Infrastructure

Featured image for Cybercriminals Move Deeper into Networks, Hiding in Edge Infrastructure
#Lumen#Aisuru#DanaBot#Rhadamanthys#Kimwolf

Original Reporting

HNHelp Net Security·Sinisa Markovic

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupVarious criminal organizations and nation-states
AliasesJ-magic, Secret Blizzard, Aisuru, DanaBot
Attribution
Target SectorsAll Sectors
Target RegionsGlobal
Active Since2022
Campaign NameJ-magic, Secret Blizzard
Primary TTPsUse of edge devices, proxy networks, botnets
Tools UsedProxy services, botnet infrastructure
MITRE ATT&CKT1071.001 (Application Layer Protocol: Web Protocols)
MotivationFinancial gain, espionage
🎯

Basically, cybercriminals are hiding in devices that regular security tools can't see.

Quick Summary

Cybercriminals are increasingly using edge infrastructure to hide their activities. This shift poses significant risks as traditional security measures often overlook these areas. Enhanced threat intelligence is crucial for early detection and prevention.

What Happened

Cybercriminals are shifting their focus towards edge infrastructure, which is often overlooked by traditional security measures. According to Lumen’s 2026 Threatscape Report, attackers are using proxy networks and edge devices as entry points into networks. This trend allows them to evade detection and maintain persistence within compromised systems.

Who's Behind It

The report highlights various threat actors, including both criminal organizations and nation-states. Notable campaigns like J-magic and Secret Blizzard have been active, utilizing unique methods to infiltrate networks and evade detection.

Tactics & Techniques

Attackers are now leveraging edge devices, such as routers and VPN gateways, as initial access points. This strategy allows them to remain hidden from endpoint detection and response (EDR) tools. For instance, Aisuru and DanaBot have been noted for their extensive use of proxy services and botnets, showcasing how modern attacks are evolving.

Defensive Measures

To combat these emerging threats, organizations must enhance their threat intelligence capabilities. Chris Kissel, IDC VP of Security & Trust, emphasizes the need for early detection to identify adversaries as close to the point of origination as possible. Implementing network intelligence is crucial for spotting and stopping attacks before they escalate.

The Growing Threat Landscape

The report also details the significant growth in botnet activity. For example, Aisuru recorded nearly 3 million IPs in 2025, indicating a massive scale of operations. The rapid evolution of these threats, particularly towards the end of 2025, demonstrates how quickly cybercriminals can adapt and rebuild their infrastructures.

Conclusion

As cybercriminals become more sophisticated, the need for robust security measures becomes increasingly critical. Organizations must prioritize visibility across all network layers, especially those that are traditionally less monitored, to effectively defend against these evolving threats.

🔍 How to Check If You're Affected

  1. 1.Monitor network traffic for unusual patterns or spikes.
  2. 2.Implement threat intelligence feeds to identify known malicious IPs.
  3. 3.Regularly audit edge devices for vulnerabilities and unauthorized access.

🏢 Impacted Sectors

All Sectors

Pro Insight

🔒 Pro insight: The shift towards edge infrastructure highlights the necessity for comprehensive network visibility to detect and mitigate advanced persistent threats effectively.

Sources

Original Report

HNHelp Net Security· Sinisa Markovic
Read Original

Related Pings

HIGHThreat Intel

Russia-Backed Espionage Network - Feds Neutralize Threat

Federal authorities have dismantled a major espionage network linked to Russia, affecting over 18,000 devices globally. This operation targeted sensitive data through compromised routers. The threat has been neutralized, but vigilance is essential.

CyberScoop·
HIGHThreat Intel

Charming Kitten - Iran Group Leverages Social Engineering Tactics

Charming Kitten, an Iran-linked group, is ramping up cyber espionage efforts by using social engineering tactics. Targeting officials and researchers, they manipulate trust to access sensitive data. This shift in strategy highlights the need for enhanced cybersecurity awareness and training.

SC Media·
HIGHThreat Intel

APT28 Hackers Hijack Routers to Steal Credentials, New Insights Revealed

APT28 hackers are exploiting vulnerabilities in routers to hijack web traffic and steal sensitive credentials. The UK NCSC warns organizations to enhance their defenses.

Infosecurity Magazine·
HIGHThreat Intel

Authorities Disrupt FrostArmada DNS Hijacks Targeting Microsoft

A major international operation has disrupted the FrostArmada campaign, which hijacked routers to steal Microsoft 365 logins. This attack affected thousands of devices worldwide, primarily targeting government and IT sectors. Authorities are now working to secure the compromised infrastructure and protect users from future threats.

BleepingComputer·
HIGHThreat Intel

SOHO Router Compromise - DNS Hijacking and AiTM Attacks Uncovered

Forest Blizzard, a Russian military-linked threat actor, is exploiting SOHO routers for DNS hijacking and AiTM attacks, impacting thousands of devices and organizations globally.

Microsoft Security Blog·
HIGHThreat Intel

Cybercrime - Industrialization and Its Implications Explained

Cybercrime has evolved into a serious industry affecting everyone. Experts stress the need for preparedness and public-private cooperation to combat this growing threat effectively.

Fortinet Threat Research·