Four New Malware Campaigns

31096224480?profile=RESIZE_400xANY.RUN, a provider of interactive malware analysis and threat intelligence solutions, has published new research outlining the most significant cyber threats targeting organizations in February 2026.ย  The report highlights how modern threat actors increasingly exploit trusted infrastructure, legitimate workflows, and gaps in early detection.[1]

Key Threat Trends Security Teams should Watch - Februaryโ€™s investigations reveal several important shifts in attacker tactics that directly impact enterprise security programs.

  • ๐—š๐—ฅ๐—˜๐—˜๐—ก๐—•๐—Ÿ๐—ข๐—ข๐——, a Go-based ransomware capable of encrypting environments within minutes using ChaCha8 encryption, followed by self-deletion and extortion via a TOR-based leak site. This malware rapidly encrypts files across Windows environments using the ChaCha8 algorithm. After completing its encryption routine, GREENBLOOD deletes itself to hinder forensic analysis and demands ransom through a TOR-based leak site, pressuring victims with threats of public data exposure.
  • ๐—•๐—ค๐—ง๐—Ÿ๐—ผ๐—ฐ๐—ธ, a stealth-oriented ransomware chain that injects into trusted Windows processes, performs UAC bypass, establishes persistence, and steals credentials before visible encryption begins. This malware is designed to evade early detection by operating within legitimate system processes and delaying overt malicious activity until it has already compromised sensitive information. Its sophisticated approach makes it particularly dangerous for organizations relying on traditional endpoint defenses.
  • ๐— ๐—ผ๐—ผ๐—ป๐—ฟ๐—ถ๐˜€๐—ฒ ๐—ฅ๐—”๐—ง, a previously undocumented RAT discovered with zero detections on VirusTotal at the time of analysis, capable of credential theft, screen capture, remote command execution, and long-term persistence. Moonrise RATโ€™s stealthy nature and broad capabilities make it a significant threat, particularly for organizations lacking advanced endpoint monitoring solutions.
  • ๐—ž๐—ฎ๐—ฟ๐˜€๐˜๐—ผ ๐—ฅ๐—”๐—ง, a modular RAT with built-in victim profiling, selective activation logic, and disguised command-and-control traffic designed to evade network monitoring. Karsto RAT, a modular remote access trojan, features advanced victim profiling and selective activation logic that allows attackers to tailor their operations based on specific targets. ย Its command-and-control communications are disguised to evade detection by traditional network monitoring tools, making it particularly challenging for security teams to identify and mitigate its activity. ย The modular design supports the integration of additional capabilities, enhancing its adaptability in ongoing campaigns.

How Security Teams can Improve Early Threat Detection - Strengthening early threat detection requires shifting security operations from static checks to behavior-driven investigation processes. Security teams can validate suspicious files and URLs through sandbox analysis, correlate indicators with active campaigns, and use continuously updated cyber threat intelligence (CTI) to prioritize risks earlier in the attack lifecycle. ย Together, these processes help organizations move from reactive incident response toward proactive detection and faster containment of emerging threats.ย  ย ย 

This article is shared at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.ย  We provide indicators of compromise information (CTI) via a notification service (RedXray) or an analysis service (CTAC). ย For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@redskyalliance.comย ย ย ย 

Weekly Cyber Intelligence Briefings:

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

https://register.gotowebinar.com/register/5207428251321676122

[1] https://any.run/cybersecurity-blog/february-26-attacks/

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!