Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Security News
TJS Weekly Security Intelligence Briefing

January 5th TJS Weekly Security Intelligence Briefing

Week of January 5th, 2026
Classification: TLP: Public
Prepared: January 5, 2026

Table of Contents


SECTION A: EXECUTIVE OVERVIEW

For Leadership and Management


A.1 Executive Summary

Risk Posture: ELEVATED

This week’s threat landscape is defined by three operationally significant developments:

  1. MongoDB MongoBleed (CVE-2025-14847) – Critical database vulnerability under active exploitation with verified detection tools available. CISA deadline January 19, 2026.
  2. Google Cloud Phishing Campaign – Sophisticated credential harvesting bypassing email security by abusing legitimate Google infrastructure. 9,400 emails targeting 3,200+ organizations.
  3. Ransomware Operations – Qilin and TridentLocker posted new victims including federal contractor Sedgwick. Two BlackCat operators pleaded guilty January 2.

Bottom Line: MongoDB patching is the highest-priority technical action. Phishing awareness requires immediate user communication. Ransomware defense remains ongoing priority.


A.2 Intelligence Confidence Summary

ThreatConfidenceDetection AvailableIOCs AvailableAction Type
MongoBleed (CVE-2025-14847)HIGH✅ Yes – Tools Included⚠️ PartialIMMEDIATE PATCH + HUNT
Google Cloud PhishingMEDIUM⚠️ Indicators Only⚠️ PartialUSER AWARENESS
Qilin RansomwareMEDIUM⚠️ Generic Rules❌ Vendor-GatedDEFENSE HARDENING
TridentLockerLOW❌ Not Available❌ Not AvailableMONITOR ONLY
Fortinet CVE-2020-12812HIGH✅ Config CheckN/ACONFIGURATION REVIEW

Legend:

  • HIGH: Multiple authoritative sources, verified detection content
  • MEDIUM: Confirmed threat, limited operational intelligence
  • LOW: Emerging threat, insufficient data for action

A.3 Critical Actions by Priority

PriorityActionOwnerDeadlineConfidence
1Patch MongoDB to fixed versionsInfrastructureJan 19, 2026 (CISA)HIGH
2Run MongoBleed detection scanSecurity OpsImmediateHIGH
3User phishing awareness (Google-origin emails)Security AwarenessThis weekMEDIUM
4Fortinet SSL VPN 2FA configuration auditNetwork SecurityThis weekHIGH
5Backup restoration testIT OperationsThis weekHIGH
6January Patch Tuesday preparationIT OperationsJan 14, 2026HIGH

A.4 Framework Compliance Summary

This week’s recommended actions address the following control frameworks:

FrameworkControls AddressedPrimary Categories
CIS Controls v828 controlsVulnerability Management, Access Control, Data Recovery
NIST CSF 2.022 functionsIdentify, Protect, Detect, Respond, Recover
ISO 27001:202224 controlsA.5 (Organizational), A.6 (People), A.8 (Technical)

Detailed mappings in Section D.


SECTION B: THREAT INTELLIGENCE DETAILS

For Security Analysts and Incident Responders


B.1 MongoDB MongoBleed (CVE-2025-14847)

Intelligence Summary

AttributeValue
CVECVE-2025-14847
CVSS8.7 (High)
NicknameMongoBleed
Added to CISA KEVDecember 29, 2025
CISA DeadlineJanuary 19, 2026
Exploitation StatusACTIVE – Confirmed in wild
Detection ConfidenceHIGH

Vulnerability Description

MongoBleed is a heap-memory disclosure vulnerability in MongoDB Server’s zlib compression handling. Unauthenticated attackers can send malformed compressed network packets to leak sensitive data from server memory, including credentials, API keys, and session tokens.

Root Cause: MongoDB returned allocated buffer size instead of actual decompressed data length, exposing adjacent heap memory.

Affected Versions

BranchVulnerableFixed
8.2.x8.2.0 – 8.2.28.2.3
8.0.x8.0.0 – 8.0.168.0.17
7.0.x7.0.0 – 7.0.277.0.28
6.0.x6.0.0 – 6.0.266.0.27
5.0.x5.0.0 – 5.0.315.0.32
4.4.x4.4.0 – 4.4.294.4.30
4.2, 4.0, 3.6All versionsNO PATCH – EOL

MongoDB Atlas: Automatically patched. No customer action required.

MITRE ATT&CK Mapping

Technique IDNameUsage
T1190Exploit Public-Facing ApplicationInitial exploitation of exposed MongoDB

Exposure Data

MetricValueSource
Global vulnerable instances87,000+Censys
Cloud environments affected42%Wiz Research
US instances~20,000Censys
China instances~17,000Censys
Germany instances~8,000Censys

Detection Tools (VERIFIED – READY TO DEPLOY)

Tool 1: MongoBleed Detector (Florian Roth)

Repository: https://github.com/Neo23x0/mongobleed-detector
Author: Florian Roth (Nextron Systems)
Status: Verified, actively maintained, includes real attack test data

# Clone the detector
git clone https://github.com/Neo23x0/mongobleed-detector.git
cd mongobleed-detector
chmod +x mongobleed-detector.sh

# Basic scan of default MongoDB log paths (/var/log/mongodb/*.log*)
./mongobleed-detector.sh

# Scan specific log files
./mongobleed-detector.sh -p /var/log/mongodb/*.log*

# With custom thresholds (adjust for your environment)
# Check ./mongobleed-detector.sh --help for current options
./mongobleed-detector.sh -p /var/log/mongodb/*.log* \
    -t 1440 \
    -c 50 \
    -b 300

Command-Line Options (verify with --help):

OptionDescription
-p, --path <glob>Log path/glob pattern
-t, --time <minutes>Lookback window (default: 4320 = 3 days)
-c, --conn-thresholdConnection count threshold (default: 100)
-b, --burst-thresholdBurst rate per minute (default: 400)
--forensic-dir <path>Analyze multiple hosts from subdirectories

What It Detects:

  • Source IPs with high connection counts but zero metadata events
  • Connection velocity anomalies (legitimate: ~1-10/min, attack: 50,000-100,000/min)
  • Metadata rate analysis (legitimate: ~100%, attack: 0%)

Tool 2: Velociraptor Artifact (Eric Capuano)

Artifact Name: Linux.Detection.CVE202514847.MongoBleed
Author: Eric Capuano (Recon InfoSec)
Documentation: https://blog.ecapuano.com/p/hunting-mongobleed-cve-2025-14847

Detection Logic:

1. Parse MongoDB JSON logs for:
   - Event ID 22943: Client connection
   - Event ID 51800: Client metadata
   - Event ID 22944: Client disconnection

2. Aggregate by source IP within time window

3. Calculate:
   - Metadata rate = metadata_events / connection_events
   - Connection velocity = connections / time_window

4. Alert criteria:
   - Metadata rate < 10% AND connection count > threshold
   - Connection velocity > 1000/minute

Tool 3: Nuclei Template (Wiz Research)

Source: https://www.wiz.io/blog/mongobleed-cve-2025-14847-exploited-in-the-wild-mongodb
Purpose: Validate if MongoDB instance is exploitable (safe, non-exfiltrating check)

id: CVE-2025-14847
info:
  name: CVE-2025-14847 - MongoDB Information Disclosure
  author: Wiz Research
  severity: High
  description: |
    Mismatched length fields in Zlib compressed protocol headers 
    may allow read of uninitialized heap memory by unauthenticated client.
  metadata:
    max-request: 1
  tags: mongodb,memory-leak,network
tcp:
  - host:
    - "{{Hostname}}"
    inputs:
      - data: "2a0000000100000000000000dc070000dd0700003200000002789c636080028144064620050002ca0073"
        type: hex

Log Indicators to Monitor

Log PatternEvent IDMeaning
Burst of connections (>1000/min)22943Potential exploitation
Missing metadata after connection51800 absentAttack signature
Spike in “Slow query” messagesN/AExploitation artifact
“InvalidBSON: incorrect BSON length”N/ABSON parsing errors from attack

Enable Enhanced Logging

mongod --setParameter "logComponentVerbosity={network: 0, command: 1, accessControl: 0, query: 0}" --quiet

Remediation Steps

  1. Immediate: Patch to fixed versions listed above
  2. If patching delayed: Disable zlib compression: # In mongod.confnet: compression: compressors: snappy,zstd # Omit zlib# Or via command linemongod --networkMessageCompressors snappy,zstd
  3. Network controls: Restrict MongoDB port (27017) to trusted IPs only
  4. Post-incident: If previously exposed, rotate all credentials that may have been in memory

Sources

SourceURL
CISA KEVhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog
Wiz Researchhttps://www.wiz.io/blog/mongobleed-cve-2025-14847-exploited-in-the-wild-mongodb
Eric Capuano Detectionhttps://blog.ecapuano.com/p/hunting-mongobleed-cve-2025-14847
Neo23x0 Detectorhttps://github.com/Neo23x0/mongobleed-detector
Bleeping Computerhttps://www.bleepingcomputer.com/news/security/exploited-mongobleed-flaw-leaks-mongodb-secrets-87k-servers-exposed/
The Hacker Newshttps://thehackernews.com/2025/12/mongodb-vulnerability-cve-2025-14847.html

B.2 Google Cloud Application Integration Phishing Campaign

Intelligence Summary

AttributeValue
DisclosedJanuary 2-3, 2026
ResearcherCheck Point Harmony Email Security
Campaign Duration14 days (December 2025)
Emails Sent9,394
Organizations Targeted~3,200
Detection ConfidenceMEDIUM

Attack Methodology

Abuse Vector: Google Cloud Application Integration “Send Email” task – a legitimate workflow automation feature misused to send phishing from Google-owned infrastructure.

Why It Works: Emails originate from noreply-application-integration@google.com, passing SPF, DKIM, and DMARC checks. Traditional email security relies on sender reputation, which Google domains inherently possess.

MITRE ATT&CK Mapping

Technique IDNameUsage
T1566.002Phishing: Spearphishing LinkMalicious links in emails
T1598.003Phishing for Information: Spearphishing LinkCredential harvesting objective
T1078.004Valid Accounts: Cloud AccountsOAuth consent abuse variant reported

Attack Chain

┌─────────────────────────────────────────────────────────────────┐
│ Stage 1: Email Delivery                                         │
│ From: noreply-application-integration@google.com                │
│ Content: Voicemail alert / File access request / Q4 document    │
│ Link: storage.cloud.google.com/...                              │
└─────────────────────────┬───────────────────────────────────────┘
                          ▼
┌─────────────────────────────────────────────────────────────────┐
│ Stage 2: First Redirect                                         │
│ URL: googleusercontent.com                                      │
│ Content: Fake CAPTCHA (blocks automated scanners)               │
└─────────────────────────┬───────────────────────────────────────┘
                          ▼
┌─────────────────────────────────────────────────────────────────┐
│ Stage 3: Credential Harvesting                                  │
│ URL: [Non-Microsoft domain]                                     │
│ Content: Fake Microsoft 365 login page                          │
│ Objective: Harvest M365 credentials                             │
└─────────────────────────────────────────────────────────────────┘

Verified Indicators

Indicator TypeValueStatus
Sender Addressnoreply-application-integration@google.com✅ Verified
Initial Link Domainstorage.cloud.google.com✅ Verified
Redirect Domaingoogleusercontent.com✅ Verified
Final DestinationNon-Microsoft domain (specific URLs not released)⚠️ Not disclosed

Industry Targeting

IndustryPercentage
Manufacturing/Industrial19.6%
Technology/SaaS18.9%
Finance/Banking/Insurance14.8%
Professional Services10.7%
Retail/Consumer9.1%
Other (Media, Education, Healthcare, Energy, Government)23.9%

Detection Recommendations

Email Security:

# Monitor for Application Integration emails with suspicious characteristics
From: *application-integration*@google.com
Contains: Links to storage.cloud.google.com
Content themes: voicemail, file access, permission request, "Q4"

User Awareness Indicators (share with end users):

  • Unexpected voicemail notifications from Google
  • File sharing requests you didn’t initiate
  • Google emails asking you to sign into Microsoft
  • CAPTCHA pages before accessing shared files
  • Any email asking for M365 credentials via Google infrastructure

Post-Click Detection:

# Identity/SIEM alerts to configure
- OAuth consent grants to unfamiliar applications
- Sign-ins from new locations within hours of email delivery
- New Azure AD app permissions
- Impossible travel after credential entry

Limitations

What We HaveWhat We Don’t Have
Sender address patternSpecific phishing URLs
Redirect chain structureFinal harvesting domain names
Industry targeting dataAttacker attribution
Attack flow descriptionDetection signatures

Sources

SourceURL
Check Point Researchhttps://blog.checkpoint.com/research/phishing-campaign-leverages-trusted-google-cloud-automation-capabilities-to-evade-detection
The Hacker Newshttps://thehackernews.com/2026/01/cybercriminals-abuse-google-cloud-email.html
RavenMail Analysishttps://ravenmail.io/blog/phishing-using-google-infra

B.3 Qilin (Agenda) Ransomware

Intelligence Summary

AttributeValue
Also Known AsAgenda
TypeRansomware-as-a-Service (RaaS)
Active Since2022
2025 Victims1,000+ claimed
Detection ConfidenceMEDIUM
IOC AvailabilityVendor-gated (subscription required)

Recent Activity (Week of January 6, 2026)

DateVictimSource
Jan 2, 2026Ellison Educational EquipmentRansomware.live
Jan 2, 2026Farmacia San PabloRansomware.live
Jan 2, 2026Multiple othersRansomware.live

MITRE ATT&CK Mapping (VERIFIED)

Source: MITRE ATT&CK S1242, Rescana, KELA, Qualys

TacticTechnique IDTechnique Name
Initial AccessT1566.001Spearphishing Attachment
T1566.002Spearphishing Link
T1190Exploit Public-Facing Application
ExecutionT1059.001PowerShell
T1204.002User Execution: Malicious File
PersistenceT1547.001Registry Run Keys
T1547.004Winlogon Helper DLL
Privilege EscalationT1548.002Bypass User Account Control
T1134Access Token Manipulation
Defense EvasionT1562.001Disable or Modify Tools
T1070.001Clear Windows Event Logs
T1070.004File Deletion
T1027.013File Obfuscation
Credential AccessT1003.001LSASS Memory
DiscoveryT1087.001Local Account Discovery
T1083File and Directory Discovery
T1018Remote System Discovery
T1135Network Share Discovery
Lateral MovementT1021.002SMB/Windows Admin Shares
T1053.005Scheduled Task
ImpactT1486Data Encrypted for Impact
T1490Inhibit System Recovery

Known Tooling

ToolPurpose
Cobalt StrikeC2, lateral movement
SystemBC RATProxy, persistence
SliverC2Alternative C2 framework
Mimikatz (Themida-packed)Credential dumping
NetExecNetwork enumeration
MeshCentralRemote management
KickidlerLegitimate monitoring tool (abused)

Publicly Available IOCs (Partial)

Source: Compiled from SentinelOne, HHS, Sophos, Blackpoint Cyber, Cyble

# IP Addresses (verify currency before blocking)
194.165.16[.]13
93.115.25[.]139

# Domain (trojanized installer)
rv-tool[.]net

Note: Complete IOC lists require subscription to:

  • KELA Cyber
  • SOCRadar
  • HHS HC3 (healthcare sector)

Generic Detection (SigmaHQ)

These are generic ransomware behaviors, not Qilin-specific:

# PowerShell Download Cradle Detection
title: Suspicious PowerShell Download
logsource:
  product: windows
  category: process_creation
detection:
  selection:
    CommandLine|contains:
      - '.downloadstring('
      - 'Invoke-WebRequest'
      - 'Start-BitsTransfer'
  condition: selection

# Volume Shadow Copy Deletion
title: VSS Deletion Attempt
logsource:
  product: windows
  category: process_creation
detection:
  selection:
    CommandLine|contains|all:
      - 'vssadmin'
      - 'delete'
      - 'shadows'
  condition: selection

# Windows Event Log Clearing
title: Security Log Cleared
logsource:
  product: windows
  service: security
detection:
  selection:
    EventID: 1102
  condition: selection

Defense Priorities

  1. MFA everywhere – Especially RDP, VPN, email
  2. Backup integrity – Test restoration weekly
  3. Network segmentation – Limit lateral movement
  4. Endpoint detection – Monitor for credential dumping, VSS deletion
  5. User training – Phishing remains primary initial access

Sources

SourceURL
MITRE ATT&CKhttps://attack.mitre.org/software/S1242/
Qualys Analysishttps://blog.qualys.com/vulnerabilities-threat-research/2025/06/18/qilin-ransomware-explained-threats-risks-defenses
KELA Profilehttps://www.kelacyber.com/blog/ransomware-threat-actor-profile-qilin/
Darktracehttps://www.darktrace.com/blog/a-busy-agenda-darktraces-detection-of-qilin-ransomware-as-a-service-operator
Ransomware.livehttps://www.ransomware.live/

B.4 TridentLocker Ransomware (Sedgwick Incident)

Intelligence Summary

AttributeValue
Incident DateDecember 31, 2025
VictimSedgwick Government Solutions
Data Claimed3.4 GB
Detection ConfidenceLOW
IOC AvailabilityNOT AVAILABLE

Incident Details

On December 31, 2025, the TridentLocker ransomware group claimed to have attacked Sedgwick Government Solutions, a company providing claims and risk management services to federal agencies including DHS, ICE, CBP, USCIS, Department of Labor, and CISA.

Sedgwick confirmed it is addressing a security incident. The subsidiary is segmented from broader Sedgwick corporate systems.

What We DON’T Have

Missing IntelStatus
IOCsNot publicly available
MITRE ATT&CK mappingNo technical analysis published
Detection rulesNot available
Attack methodologyNot disclosed
File hashesNot available

Monitor for emerging intelligence:

  • Ransomware.live
  • ID Ransomware
  • Bleeping Computer forums
  • Vendor threat intelligence portals

Apply generic ransomware defenses as documented in Qilin section.

Source

SourceURL
The Recordhttps://therecord.media/sedgwick-cyber-incident-ransomware

B.5 Fortinet SSL VPN (CVE-2020-12812)

Intelligence Summary

AttributeValue
CVECVE-2020-12812
Renewed WarningDecember 24, 2025
Exposed Instances9,700+ (January 2, 2026)
Detection ConfidenceHIGH
Issue TypeConfiguration vulnerability (2FA bypass)

Vulnerability Description

CVE-2020-12812 allows attackers to bypass two-factor authentication on FortiOS SSL VPN when LDAP authentication is used with specific configurations. This is a 2020 vulnerability with renewed exploitation activity.

Detection

Configuration Audit – Check FortiOS for vulnerable settings:

  • LDAP authentication enabled
  • 2FA configured but bypassable
  • Review authentication policies

Remediation

  1. Apply current FortiOS patches
  2. Review LDAP authentication configuration
  3. Verify 2FA is correctly enforced
  4. Consider additional authentication controls

Source

SourceURL
The Hacker Newshttps://thehackernews.com/2025/12/fortinet-warns-of-active-exploitation.html

SECTION C: CISA KEV & VULNERABILITY TABLE

Current CISA KEV Items Affecting Stack

CVEProductCVSSExploitationCISA DeadlineAction
CVE-2025-14847MongoDB Server8.7ActiveJan 19, 2026Patch immediately
CVE-2020-12812Fortinet FortiOS9.8ActiveOngoingConfig review

SECTION D: CONTROL FRAMEWORK MAPPING

For GRC, Compliance, and Audit Teams

D.1 This Week’s Activities → Control Alignment

MongoDB Patching (CVE-2025-14847)

FrameworkControl IDControl Name
CIS 187.1Establish and Maintain a Vulnerability Management Process
CIS 187.2Establish and Maintain a Remediation Process
CIS 187.4Perform Automated Application Patch Management
NIST CSFID.RA-01Asset vulnerabilities are identified and documented
NIST CSFPR.PS-02Software is maintained, replaced, and removed
NIST CSFRS.MI-02Incidents are mitigated
ISO 27001A.8.8Management of technical vulnerabilities
ISO 27001A.8.9Configuration management

Phishing Awareness Training

FrameworkControl IDControl Name
CIS 1814.1Establish and Maintain a Security Awareness Program
CIS 1814.2Train Workforce Members to Recognize Social Engineering
CIS 1814.3Train Workforce on Authentication Best Practices
NIST CSFPR.AT-01All users are informed and trained
NIST CSFPR.AT-02Privileged users understand roles
ISO 27001A.6.3Information security awareness, education and training

Backup Testing (Ransomware Preparedness)

FrameworkControl IDControl Name
CIS 1811.1Establish and Maintain a Data Recovery Process
CIS 1811.2Perform Automated Backups
CIS 1811.3Protect Recovery Data
CIS 1811.4Establish and Maintain an Isolated Instance of Recovery Data
CIS 1811.5Test Data Recovery
NIST CSFPR.DS-11Backups of data are created, protected, maintained, and tested
NIST CSFRC.RP-01Recovery plan is executed during or after a cybersecurity incident
ISO 27001A.8.13Information backup
ISO 27001A.5.29Information security during disruption

Fortinet Configuration Review

FrameworkControl IDControl Name
CIS 184.1Establish and Maintain a Secure Configuration Process
CIS 186.3Require MFA for Externally-Exposed Applications
CIS 186.4Require MFA for Remote Network Access
NIST CSFPR.AA-01Identities and credentials are issued, managed, verified, revoked
NIST CSFPR.AA-03Users, devices, and other assets are authenticated
ISO 27001A.8.5Secure authentication
ISO 27001A.8.20Networks security

D.2 Control Coverage Summary

MitigationCIS ControlsNIST CSFISO 27001
MongoDB Patching7.1, 7.2, 7.4ID.RA, PR.PS, RS.MIA.8.8, A.8.9
Phishing Awareness14.1, 14.2, 14.3PR.ATA.6.3
Backup Testing11.1-11.5PR.DS, RC.RPA.8.13, A.5.29
Fortinet Review4.1, 6.3, 6.4PR.AAA.8.5, A.8.20

SECTION E: DETECTION TOOLKIT SUMMARY

Quick Reference for Security Operations

E.1 Ready-to-Deploy Tools

ThreatToolSourceCommand
MongoBleedmongobleed-detectorNeo23x0./mongobleed-detector.sh or -p /var/log/mongodb/*.log*
MongoBleedVelociraptor ArtifactEric CapuanoLinux.Detection.CVE202514847.MongoBleed
MongoBleedNuclei TemplateWiz Researchnuclei -t cve-2025-14847.yaml -u mongodb://target:27017

E.2 Log Queries

MongoDB Exploitation Indicators

# NOTE: For reliable detection, use the verified Neo23x0 tool:
# ./mongobleed-detector.sh --data-dir /var/log/mongodb/
#
# For manual log review, search for Event ID patterns:

# Find connection events (Event ID 22943)
grep '"id":22943' /var/log/mongodb/mongod.log | tail -50

# Find metadata events (Event ID 51800) - should match connections
grep '"id":51800' /var/log/mongodb/mongod.log | tail -50

# Search for BSON parsing errors (exploitation artifact)
grep "InvalidBSON" /var/log/mongodb/mongod.log

# Search for slow query spikes
grep "Slow query" /var/log/mongodb/mongod.log | wc -l

Generic Ransomware Indicators (Windows)

# NOTE: Event ID 4688 requires "Audit Process Creation" with command-line logging enabled
# Check policy: auditpol /get /subcategory:"Process Creation"
# Enable: Group Policy > Audit Policy > Detailed Tracking > Audit Process Creation

# Check for VSS deletion attempts (requires command-line auditing)
Get-WinEvent -FilterHashtable @{LogName='Security';ID=4688} -ErrorAction SilentlyContinue | 
  Where-Object {$_.Message -like "*vssadmin*delete*shadows*"}

# Check for security log clearing (Event ID 1102)
Get-WinEvent -FilterHashtable @{LogName='Security';ID=1102} -ErrorAction SilentlyContinue

# Check for suspicious PowerShell (requires PowerShell Script Block Logging)
Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-PowerShell/Operational';ID=4104} -ErrorAction SilentlyContinue |
  Where-Object {$_.Message -like "*downloadstring*" -or $_.Message -like "*Invoke-WebRequest*"}

SECTION F: INTELLIGENCE GAPS & RECOMMENDATIONS

F.1 What This Briefing Provides

Verified detection tools with working code
MITRE ATT&CK mappings confirmed by multiple sources
Honest confidence assessments
Source URLs for all claims
Framework compliance mappings

F.2 What This Briefing Does NOT Provide

Complete IOC lists for Qilin (requires vendor subscription)
TridentLocker technical analysis (not yet available)
Specific phishing URLs (not released by Check Point)
Sigma rules specific to Qilin (generic rules only)
YARA rules (not applicable or not publicly available)

To fill gaps, consider:

VendorCoverageURL
KELA CyberRansomware IOCs, dark web monitoringhttps://www.kelacyber.com
SOCRadarThreat intelligence, IOC feedshttps://socradar.io
VirusTotal EnterpriseIOC enrichment, huntinghttps://www.virustotal.com
HHS HC3Healthcare-specific ransomware intelhttps://www.hhs.gov/hc3

SECTION G: UPCOMING EVENTS

DateEventAction Required
Jan 14, 2026Microsoft Patch TuesdayPrepare test environments
Jan 19, 2026CISA KEV deadline (MongoDB)Complete patching
OngoingRansomware monitoringDaily victim tracking

SECTION H: SOURCES

Primary Sources

CategorySourceURL
VulnerabilityCISA KEVhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog
DetectionNeo23x0 MongoBleed Detectorhttps://github.com/Neo23x0/mongobleed-detector
DetectionEric Capuano Bloghttps://blog.ecapuano.com/p/hunting-mongobleed-cve-2025-14847
DetectionWiz Researchhttps://www.wiz.io/blog/mongobleed-cve-2025-14847-exploited-in-the-wild-mongodb
PhishingCheck Point Researchhttps://blog.checkpoint.com/research/phishing-campaign-leverages-trusted-google-cloud-automation-capabilities-to-evade-detection
RansomwareRansomware.livehttps://www.ransomware.live
RansomwareThe Recordhttps://therecord.media
RansomwareMITRE ATT&CKhttps://attack.mitre.org/software/S1242/
AnalysisThe Hacker Newshttps://thehackernews.com
AnalysisBleeping Computerhttps://www.bleepingcomputer.com
AnalysisSecurityWeekhttps://www.securityweek.com
FrameworksCIS Controlshttps://www.cisecurity.org/controls
FrameworksNIST CSFhttps://www.nist.gov/cyberframework
FrameworksISO 27001https://www.iso.org/standard/27001

Document Version: 1.0
Prepared: January 5, 2026
Classification: Public
Next Update: January 13, 2026


Author

Tech Jacks Solutions

Leave a comment

Your email address will not be published. Required fields are marked *