Old tactics are proving just as dangerous as new ones in today’s threat landscape. A recently identified Linux botnet known as SSHStalker is exploiting exposed SSH services and relying on legacy IRC-based C2 infrastructure. In parallel, the RU-linked APT group ChainReaver has been orchestrating sophisticated, multi-stage intrusion campaigns that blend phishing, bespoke loaders, and durable persistence techniques to infiltrate government and enterprise environments. Moreover, researchers uncovered a manipulation effort dubbed “0APT,” in which threat actors deliberately exaggerated victim impact and planted misleading artifacts to distort attribution and shape threat intelligence narratives. Keep reading further.