S1GMA

S1GMA

Danger IndexSupply CalculatorPrep QuizSignal MapArticlesSurvival Pillars3D Prints
StoreAbout
S1GMA
S1GMA

Survival Intelligence for the Prepared Mind. Real-time threat monitoring, preparedness resources, and community connections.

Intelligence
SignalsArticles
Resources
Survival Kits3D PrintsDIY ProjectsGear Store
Apps
NO REMORSE — Morse Code
Community
Find Communities
Company
AboutContactPrivacy PolicyTerms of Service

© 2026 S1GMA. All rights reserved.

X / TwitterTikTok

Survival Signals

Back to Signals
APT36 uses AI malware, Crazy gang abuses RMM, malicious Stripe package, Aeternum botnet on Polygon
Technology
cybersecurity
ransomware
supply-chain-attack

APT36 uses AI malware, Crazy gang abuses RMM, malicious Stripe package, Aeternum botnet on Polygon

bleepingcomputer.com

•

Wednesday, February 11, 2026

Multiple threat actors are actively employing diverse and sophisticated techniques to compromise systems and evade detection. These include state-sponsored groups leveraging AI-generated malware, ransomware gangs abusing legitimate remote management tools, supply chain attacks targeting developers, and botnets utilizing blockchain technology for command and control. The variety of methods highlights the evolving threat landscape and the need for vigilance across multiple attack vectors. ## Latest Update Bitdefender Labs uncovered APT36, a Pakistan-linked group, using AI-generated 'vibeware' against Indian government and defense personnel. The group abuses Google Sheets for C2, blending malicious traffic with legitimate cloud services. ## Timeline * 2026-02-11: The Crazy ransomware gang was observed abusing employee monitoring software (Net Monitor) and SimpleHelp for persistence and remote access in corporate networks. * 2026-02-25: A malicious NuGet package, 'Stripe.net.Metrics', was discovered targeting Stripe developers by harvesting sensitive information and sending it to a remote server. * 2026-02-27: The Aeternum botnet was found using Polygon smart contracts for its command-and-control infrastructure, making it difficult to disrupt. * 2026-03-05: APT36 (Transparent Tribe), linked to Pakistan, is using AI-generated 'vibeware' to target Indian government and defense personnel, using Google Sheets for C2. ## What to Watch * Monitor for unusual RMM tool usage, especially in conjunction with employee monitoring software, as it may indicate ransomware pre-positioning. * Be wary of typosquatting attacks in open-source package repositories and verify the authenticity of packages before installation. * Track blockchain activity for potential C2 communications, as this method offers resilience against traditional takedown efforts.

Sources (4)
bleepingcomputer.com
Wednesday, February 11, 2026
Crazy ransomware gang abuses employee monitoring tool in attacks
Infosecurity Magazine
Wednesday, February 25, 2026
Malicious NuGet Package Targets Stripe DevelopersBy Alessandro Mascellino
Securityaffairs.com
Friday, February 27, 2026
Aeternum botnet hides commands in Polygon smart contractsBy Pierluigi Paganini
HackRead
Thursday, March 5, 2026
Pakistan-Linked APT36 Floods Indian Govt Networks With AI-Made ‘Vibeware’By Deeba Ahmed