State-aligned and financially motivated threat actors continue to intensify targeted intrusion campaigns across multiple regions. In one such operation, the group GrayCharlie has been leveraging phishing lures and weaponized downloads to deploy the NetSupport RAT, enabling persistent remote access and control over infected systems. Meanwhile, the Iranian-linked MuddyWater collective has rolled out Operation Olalampo, relying on bespoke backdoors and carefully crafted spear-phishing emails to infiltrate high-value regional targets. Adding to the wave of espionage activity, the UnsolicitedBooker campaign is focusing on Central Asian government entities, using tailored phishing messages and custom malware to extract sensitive intelligence. Continue reading further.