Google Details Coordinated Cyber Espionage Campaigns Against Global Defense Industrial Base

Google Report: China, Russia, Iran, N. Korea Target Defense Sector with Sophisticated Cyberattacks

HIGH
February 14, 2026
7m read
Threat IntelligenceThreat ActorCyberattack

Related Entities

Threat Actors

APT44 Lazarus Group Volt Typhoon TEMP.VerminNimbus Manticore

Products & Tech

SignalTelegramREDCap

Other

WAVESIGNINFINITEREDChinaIranNorth KoreaRussia

Full Report

Executive Summary

Google's Threat Intelligence Group (GTIG) has published an in-depth report detailing a coordinated and sustained cyber espionage effort against the global Defense Industrial Base (DIB) and associated sectors. The report attributes campaigns to state-sponsored Advanced Persistent Threat (APT) groups from China, Iran, North Korea, and Russia. These actors are employing a wide array of TTPs, from direct social engineering of defense employees to supply chain attacks and exploitation of edge devices. The report provides a granular look at the specific groups involved, their custom malware, and their strategic objectives, which include stealing military technology, gaining intelligence on battlefield deployments, and establishing long-term persistence in sensitive networks.


Threat Overview

The GTIG report identifies four key themes in the ongoing assault on the DIB:

  1. Targeting Battlefield Technology: Actors are focused on entities that develop or deploy technology being used in the Russia-Ukraine war, aiming to steal technical data and operational intelligence.
  2. Social Engineering and Recruitment: Threat groups continue to use sophisticated social engineering, such as fake job offers, to trick employees into compromising their credentials or installing malware.
  3. Exploitation of the Network Edge: Unpatched edge devices (firewalls, VPNs) remain a primary initial access vector for multiple APT groups.
  4. Supply Chain and Manufacturing Sector Attacks: Compromising less-secure manufacturing partners to gain access to the ultimate DIB target.

Notable Threat Actor Activity

  • APT44 (Sandworm) (Russia): Observed in Ukraine attempting to steal data from Signal and Telegram messaging apps on compromised devices using a custom script named WAVESIGN.
  • UNC2970 (Lazarus Group) (North Korea): Continued its 'Operation Dream Job' campaigns against aerospace and defense employees. Notably, this group was also observed using AI for reconnaissance purposes.
  • UNC3236 (Volt Typhoon) (China): Conducted reconnaissance against North American military contractors, focusing on mapping networks and identifying key systems.
  • UNC6508 (China): Exploited a vulnerability in REDCap, a web application for building and managing online surveys and databases, to deploy custom malware named INFINITERED at a U.S. research institution.
  • TEMP.Vermin (UAC-0020) (Russia-Nexus): Deployed malware including VERMONSTER and SPECTRUM.
  • UNC1549 (Nimbus Manticore) (Iran): Active in targeting DIB entities.

Malware Deployed

The report lists a wide range of custom and commodity malware, including WAVESIGN, VERMONSTER, SPECTRUM, FIRMACHAGENT, STALECOOKIE, INFINITERED, MINIBIKE, TWOSTROKE, DEEPROOT, and CRASHPAD.


Technical Analysis

A common thread across these campaigns is a focus on evading modern security controls, particularly Endpoint Detection and Response (EDR) solutions.

Impact Assessment

The coordinated targeting of the DIB poses a direct threat to national security. The potential impact includes:

  • Theft of Intellectual Property: Loss of sensitive military designs, blueprints, and research data.
  • Compromise of Weapon Systems: Potential for adversaries to gain knowledge of vulnerabilities in military hardware and software.
  • Intelligence Gathering: Adversaries can gain insight into military operations, supply chains, and capabilities.
  • Supply Chain Disruption: Compromising manufacturing partners can disrupt the production of critical military components.

Detection & Response

  • Monitor for Social Engineering: Train employees to recognize and report suspicious contact on professional networking sites. Monitor for employees downloading files from untrusted sources related to job offers.
  • Attack Surface Management: Continuously scan for and patch all internet-facing systems, including less common web applications like REDCap.
  • EDR and Threat Hunting: Deploy EDR across all endpoints and proactively hunt for the TTPs mentioned in the report, such as suspicious script execution and access to local application data folders (e.g., for Signal/Telegram).
  • Isolate Sensitive Systems: Air-gap or severely restrict network access to systems containing the most sensitive design and research data.

Mitigation

  1. User Training: Conduct regular, targeted training for DIB employees on the specific social engineering tactics used by these APT groups.
  2. Strict Access Controls: Enforce the principle of least privilege and use Multi-Factor Authentication (MFA) everywhere.
  3. Vendor Risk Management: Rigorously assess the security posture of all partners and suppliers in the supply chain.
  4. Credential Hardening: Implement protections against credential theft, such as Windows Defender Credential Guard.

Timeline of Events

1
February 14, 2026
This article was published

MITRE ATT&CK Mitigations

Train employees, especially those in the DIB, to recognize and report sophisticated social engineering campaigns like 'Operation Dream Job'.

Aggressively patch all internet-facing systems, including both common edge devices and niche web applications like REDCap.

Mapped D3FEND Techniques:

Enforce MFA on all external access points and for access to sensitive internal resources to mitigate the impact of credential theft.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To defend against the social engineering tactics described in the Google report, such as Lazarus Group's 'Operation Dream Job', DIB organizations must implement robust User Behavior Analysis. Security teams should work with HR and use professional networking data to identify high-risk employees (e.g., those with access to sensitive projects who are actively being contacted by recruiters). A UBA system can then be used to baseline the normal behavior of these employees. Any deviation, such as downloading unusual files, running scripts, or attempting to access sensitive data repositories outside their normal project scope, should trigger an immediate alert. This behavioral approach is crucial for detecting the initial compromise of an employee who has been successfully phished, allowing for rapid response before the adversary can establish deep persistence or move laterally.

The exploitation of edge devices and niche applications like REDCap highlights the critical need for continuous Attack Surface Management. DIB organizations must deploy tools that constantly scan their external perimeter from an attacker's perspective. This process should identify all internet-facing hosts and services, including forgotten servers or shadow IT. Once identified, these assets must be run through a vulnerability management program to find and remediate flaws like the one in REDCap. This 'outside-in' view is vital for closing the unknown entry points that APT groups like Volt Typhoon and UNC6508 actively seek out. An effective ASM program reduces the number of available footholds, forcing attackers to use riskier and noisier methods to gain initial access.

Sources & References

Cyber News Roundup – February 13th 2026
Integrity360 (integrity360.com) February 13, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

DIBCyber EspionageAPTSandwormLazarus GroupVolt TyphoonThreat Intelligence

📢 Share This Article

Help others stay informed about cybersecurity threats