{"id":93767,"date":"2026-01-31T07:00:00","date_gmt":"2026-01-31T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=93767"},"modified":"2026-01-31T07:01:56","modified_gmt":"2026-01-31T04:01:56","slug":"fbi-shutters-ransomwares-last-refuge-cisa-boss-uploads-agency-documents-to-chatgpt-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/fbi-shutters-ransomwares-last-refuge-cisa-boss-uploads-agency-documents-to-chatgpt-and-other-cybersecurity-news\/","title":{"rendered":"FBI shutters ransomware\u2019s \u2018last refuge\u2019, CISA boss uploads agency documents to ChatGPT, and other cybersecurity news"},"content":{"rendered":"<p>Here are the week\u2019s key cybersecurity stories.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>North Korean hackers targeted blockchain developers to steal crypto.<\/li>\n<li>The FBI dismantled ransomware\u2019s \u2018last refuge\u2019.<\/li>\n<li>Hackers breached single sign-on systems to target corporations.<\/li>\n<li>CISA\u2019s acting chief sparked a scandal by uploading agency documents to ChatGPT.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">North Korean hackers targeted blockchain developers to steal crypto<\/h2>\n<p>The North Korean hacking group Konni used AI-generated malware to attack blockchain developers, <a href=\"https:\/\/research.checkpoint.com\/2026\/konni-targets-developers-with-ai-malware\/\">according to<\/a> Check Point analysts.<\/p>\n<p>The attackers\u2019 main objective is to gain access to development environments, opening a path to <span data-descr=\"application programming interface\" class=\"old_tooltip\">API<\/span> credentials, infrastructure and, ultimately, company crypto wallets.<\/p>\n<p>Experts say the attack starts on Discord, where the victim receives a link to a ZIP archive. Inside are a PDF lure and a malicious LNK file. Launching the shortcut kicks off a complex chain:<\/p>\n<ol class=\"wp-block-list\">\n<li>A PowerShell loader starts and opens a DOCX document to distract the user.<\/li>\n<li>In the background, a CAB archive is extracted with a backdoor, batch (BAT) files, and a tool to bypass user account control.<\/li>\n<li>An hourly task is created in the scheduler disguised as a OneDrive process, which runs an encrypted script directly in memory and wipes traces after execution.<\/li>\n<\/ol>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"413\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-8453e273cf50b3d2-5023548041581332-1024x413.png\" alt=\"image\" class=\"wp-image-274337\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-8453e273cf50b3d2-5023548041581332-1024x413.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-8453e273cf50b3d2-5023548041581332-300x121.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-8453e273cf50b3d2-5023548041581332-768x310.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-8453e273cf50b3d2-5023548041581332-1536x619.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-8453e273cf50b3d2-5023548041581332.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Infection chain. Source: Check Point.<\/figcaption><\/figure>\n<p>Analysts concluded the malicious script was created with a <span data-descr=\"large language model\" class=\"old_tooltip\">LLM<\/span>. Several factors point to this:<\/p>\n<ul class=\"wp-block-list\">\n<li>an unusual structure. Clear documentation at the start of the code and a neat, modular layout rarely seen in \u201chand-made\u201d malware;<\/li>\n<li>telling comments. The code contains the line # &lt; \u2014 \u2014 your permanent project UUID (your permanent project UUID).<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"341\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-458c4e0be1a3fbda-5023548131317219-1024x341.png\" alt=\"image\" class=\"wp-image-274341\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-458c4e0be1a3fbda-5023548131317219-1024x341.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-458c4e0be1a3fbda-5023548131317219-300x100.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-458c4e0be1a3fbda-5023548131317219-768x256.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-458c4e0be1a3fbda-5023548131317219-1536x512.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-458c4e0be1a3fbda-5023548131317219.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Check Point.<\/figcaption><\/figure>\n<p>Researchers linked the campaign to Konni based on similarities in loader formats and file names used in previous operations.<\/p>\n<p>Active since 2014, the group has typically targeted South Korea, Russia and Europe. The new campaign focuses on three Asia-Pacific countries: India, Japan and Australia.<\/p>\n<h2 class=\"wp-block-heading\">The FBI dismantled ransomware\u2019s \u2018last refuge\u2019<\/h2>\n<p>The FBI, in coordination with the US Department of Justice, seized the popular cyber-extortion forum RAMP, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs\/\">BleepingComputer<\/a> reports.<\/p>\n<p>RAMP styled itself as the \u201clast refuge\u201d for ransomware operators, attracting numerous groups that used the forum to recruit affiliates and to buy and sell access to corporate networks.<\/p>\n<p>Though there has been no official statement yet, the domain\u2019s DNS servers were switched to those the FBI typically uses in seizures:<\/p>\n<ul class=\"wp-block-list\">\n<li>ns1.fbi.seized.gov;<\/li>\n<li>ns2.fbi.seized.gov.<\/li>\n<\/ul>\n<p>An administrator known as Stallman confirmed the development, acknowledging that years of his work were wiped out.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"296\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-18061c40a9b8c186-5023548128779373-1024x296.png\" alt=\"image\" class=\"wp-image-274338\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-18061c40a9b8c186-5023548128779373-1024x296.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-18061c40a9b8c186-5023548128779373-300x87.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-18061c40a9b8c186-5023548128779373-768x222.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-18061c40a9b8c186-5023548128779373-1536x444.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-18061c40a9b8c186-5023548128779373.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Screenshot of the XSS hacker forum. Source: BleepingComputer.<\/figcaption><\/figure>\n<p>According to the outlet, law enforcement obtained a vast trove of confidential data: users\u2019 IP addresses, private messages and mailboxes. For forum participants who failed to maintain strict anonymity, this poses a direct risk of de-anonymisation and arrest.<\/p>\n<p>The platform emerged in 2021 after other hacker portals such as Exploit and XSS banned ransomware advertising. The resource is <a href=\"https:\/\/therecord.media\/an-interview-with-initial-access-broker-wazawaka-there-is-no-such-money-anywhere-as-there-is-in-ransomware\">run by<\/a> hacker Mikhail Matveev, known as Orange.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-bd5259c074c088ff-5023548166794355-1024x766.png\" alt=\"image\" class=\"wp-image-274340\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-bd5259c074c088ff-5023548166794355-1024x766.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-bd5259c074c088ff-5023548166794355-300x224.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-bd5259c074c088ff-5023548166794355-768x574.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-bd5259c074c088ff-5023548166794355.png 1054w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/www.fbi.gov\/wanted\/cyber\/mikhail-pavlovich-matveev\">FBI<\/a>.<\/figcaption><\/figure>\n<p>In 2023, the US Department of Justice charged Matveev with involvement in developing the Babuk, LockBit and Hive malware. He was added to the FBI\u2019s most-wanted cybercriminals list, and in November 2024 he was <a href=\"https:\/\/forklog.com\/en\/news\/phishing-from-a-van-wazawaka-arrested-and-other-cybersecurity-events\">arrested<\/a> in Kaliningrad.<\/p>\n<h2 class=\"wp-block-heading\">Hackers breached single sign-on systems to target corporations<\/h2>\n<p>The ShinyHunters group launched a large wave of <span data-descr=\"voice-based phishing\" class=\"old_tooltip\">vishing<\/span> attacks aimed at single sign-on (SSO) systems from Okta, Microsoft and Google, the hackers told <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks\/\">BleepingComputer<\/a>.<\/p>\n<p>The attackers use advanced social engineering: they call employees posing as support and convince them to enter logins and codes on spoofed sites.<\/p>\n<p>An <a href=\"https:\/\/www.okta.com\/blog\/threat-intelligence\/phishing-kits-adapt-to-the-script-of-callers\/\">Okta<\/a> report confirmed the use of sophisticated phishing kits. These tools include a web control panel that lets the hacker change site content in real time while talking to the victim by phone:<\/p>\n<ul class=\"wp-block-list\">\n<li>if the attacker needs a code when entering the stolen credentials, a matching field instantly appears on the victim\u2019s screen;<\/li>\n<li>if push approval is required, the phishing site displays instructions on how to approve it.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"354\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-40470f8ad17971cf-5023548063624436-1024x354.png\" alt=\"image\" class=\"wp-image-274339\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-40470f8ad17971cf-5023548063624436-1024x354.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-40470f8ad17971cf-5023548063624436-300x104.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-40470f8ad17971cf-5023548063624436-768x266.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-40470f8ad17971cf-5023548063624436.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Hackers\u2019 rapid-response toolkit. Source: Okta.<\/figcaption><\/figure>\n<p>Compromising a single SSO account can give criminals access to an entire corporate ecosystem, including Google Workspace, Slack and Microsoft 365. To prepare their attacks, ShinyHunters use data from earlier breaches\u2014names, roles and phone numbers\u2014making their calls highly convincing.<\/p>\n<p>The group also relaunched its leak site, posting data on breaches at SoundCloud, Betterment and Crunchbase. The companies\u2019 representatives confirmed the incidents.<\/p>\n<h2 class=\"wp-block-heading\">CISA chief sparks furor by uploading agency documents to ChatGPT<\/h2>\n<p>Acting director of the US Cybersecurity and Infrastructure Security Agency (CISA) Madhu Gottumukkala became the subject of an internal probe after uploading sensitive agency contract documents to ChatGPT, <a href=\"https:\/\/www.politico.com\/news\/2026\/01\/27\/cisa-madhu-gottumukkala-chatgpt-00749361\">Politico<\/a> reports.<\/p>\n<p>Most CISA staff are blocked from accessing the chatbot, but Gottumukkala sought special permission to use OpenAI\u2019s product instead of approved secure tools.<\/p>\n<p>According to media reports, the federal network security system issued several data-leak warnings. While the uploaded information was not classified, it was marked \u201cfor official use only.\u201d The data can now be used by the model to answer users, putting the confidentiality of government contracts at risk.<\/p>\n<p>Gottumukkala could face discipline ranging from a formal reprimand to loss of clearance for classified information.<\/p>\n<h2 class=\"wp-block-heading\">Cyberattack on Poland\u2019s power sector: new details<\/h2>\n<p>In late December, Poland\u2019s energy infrastructure was hit by a coordinated attack targeting distributed energy facilities across the country. The strikes affected thermal power plants as well as wind and solar control systems, <a href=\"https:\/\/www.reuters.com\/sustainability\/climate-energy\/massive-cyberattack-polish-power-system-december-failed-minister-says-2026-01-13\/\">Reuters<\/a> reports.<\/p>\n<p>Although the attackers breached operating systems and damaged \u201ckey equipment beyond repair,\u201d they failed to interrupt electricity supply. The total capacity of affected assets was 1.2 GW, equivalent to 5% of Poland\u2019s power supply.<\/p>\n<p>Officially, 12 facilities were hit. However, cybersecurity firm <a href=\"https:\/\/hub.dragos.com\/thank-you\/electrum-targeting-polands-electric-sector\">Dragos<\/a> said the real number was as high as 30.<\/p>\n<p>Researchers \u201cwith moderate confidence\u201d attributed the attack to the Russian hacking group Electrum. Though its activity overlaps with the well-known Sandworm (APT44), the team classified it as a separate cluster.<\/p>\n<p>Electrum had previously been linked to attacks on Ukrainian networks using the Caddywiper and Industroyer2 malware. In Poland, the hackers deployed a new <span data-descr=\"software designed to destroy data on a victim's device\" class=\"old_tooltip\">wiper<\/span>\u2014DynoWiper.<\/p>\n<p>According to Dragos, the attackers demonstrated deep knowledge of industrial equipment. They deliberately targeted:<\/p>\n<ul class=\"wp-block-list\">\n<li>vulnerable dispatching and communications systems;<\/li>\n<li>remote terminals and border network devices;<\/li>\n<li>Windows-based monitoring and control systems.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-1ac55211565faeb2-5023548172289449-1024x533.png\" alt=\"image\" class=\"wp-image-274342\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-1ac55211565faeb2-5023548172289449-1024x533.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-1ac55211565faeb2-5023548172289449-300x156.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-1ac55211565faeb2-5023548172289449-768x400.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-1ac55211565faeb2-5023548172289449.png 1347w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Diagram of a renewable energy system\u2019s infrastructure. Source: Dragos.<\/figcaption><\/figure>\n<p>The hackers successfully disabled communications equipment at several sites, depriving operators of remote control, though generation continued in autonomous mode.<\/p>\n<p>Experts believe the shutdowns did not trigger a blackout. However, a sudden 1.2 GW drop could have caused a critical frequency deviation. Similar fluctuations have led to cascading failures in other countries, including the large-scale <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A1%D0%B1%D0%BE%D0%B9_%D0%B2_%D1%8D%D0%BD%D0%B5%D1%80%D0%B3%D0%BE%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B5_%D0%9F%D0%B8%D1%80%D0%B5%D0%BD%D0%B5%D0%B9%D1%81%D0%BA%D0%BE%D0%B3%D0%BE_%D0%BF%D0%BE%D0%BB%D1%83%D0%BE%D1%81%D1%82%D1%80%D0%BE%D0%B2%D0%B0_(2025)\">collapse of the Iberian power system<\/a> in 2025.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>The US Department of Justice <a href=\"https:\/\/forklog.com\/en\/news\/us-justice-department-seizes-400-million-from-bitcoin-mixer-helix\">seized<\/a> $400 million from the Helix bitcoin mixer.<\/li>\n<li>Hackers <a href=\"https:\/\/forklog.com\/en\/news\/sanctions-evasion-fuels-a-158bn-boom-in-cryptos-shadows\">stole<\/a> $2.9 billion in crypto in 2025.<\/li>\n<li>Critical vulnerabilities were <a href=\"https:\/\/forklog.com\/en\/news\/critical-vulnerabilities-found-in-clawdbot-ai-agent-for-cryptocurrency-theft\">found<\/a> in the Clawdbot AI agent.<\/li>\n<li>Boasting on Telegram <a href=\"https:\/\/forklog.com\/en\/news\/boasting-on-telegram-leads-to-unveiling-of-40-million-theft-from-us-government\">helped<\/a> uncover the theft of $40 million from the US government.<\/li>\n<li>ZachXBT <a href=\"https:\/\/forklog.com\/en\/news\/zachxbt-criticizes-circles-inaction-following-16-8-million-swapnet-hack\">accused<\/a> Circle of inaction after the $16.8 million SwapNet hack.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>Vasily Smirnov unpacks the UN\u2019s Hanoi Convention on cybercrime. In his new piece, he explores how signatory countries might apply it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We gathered the most important cybersecurity news of the week.<\/p>\n","protected":false},"author":1,"featured_media":93768,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"This week\u2019s key cybersecurity stories.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-93767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"218","promo_type":"1","layout_type":"1","short_excerpt":"This week\u2019s key cybersecurity stories.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=93767"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93767\/revisions"}],"predecessor-version":[{"id":93769,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93767\/revisions\/93769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/93768"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=93767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=93767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=93767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}