WW.ALL.BRN.EM.__.OTHER.None.__.ALL.X-Labs_Newsletter_monthly.2026
All / Brand

Leveraging AI? It’s Time to Understand Growing Threats.

As AI becomes a key driver of business innovation, it introduces new vulnerabilities, particularly in the form of shadow AI and cyber threats. Discover how Forcepoint customers interact with AI to better understand its usage and how they are mitigating these risks.

February Briefing
January Briefing
2025 Briefing


The more AI The more AI applications,
the stronger the need for web security policies

interface

Medium-sized businesses 

Number of AI applications: 20
Deployed web policies for AI: 5

interface

 Large businesses  

Number of AI applications: 40
Deployed web policies for AI: 8

interface

Mid-level enterprises 

Number of AI applications: 67
Deployed web policies for AI: 12

interface

Large-scale enterprises   

Number of AI applications: 93
Deployed web policies for AI: 17

January Briefing

#1: Phantom Stealer attachment-based campaign

Activity Dates:  7 January – 26 January 2026  

Targeted Sectors: Businesses, Governments and Banks

Volume: 3,000+

Targeted Location(s): United Kingdom, India and Pakistan

  • Attack Chain: Email - > HTML-> ZIP - > BAT -> PS1 → Process Injection
  • Phantom Stealer attacks were already surging in frequency and sophistication, and were still active as of January 2026.
  • Delivered via a malicious HTML attachment disguised as a B2B payment invoices.
  • Email has HTML Smug attachment which contains embedded Base64 stream and JavaScript code. Once user opens HTML, it downloads a ZIP file that contains a BAT file. BAT further drops PowerShell and performs process injection targeting .Net processes.
  • It scans nearby Wi‑Fi networks and displays detailed information.
  • It launches Firefox and Chrome browsers with security and resource‑related restrictions disabled, while forcing it to use a temporary custom profile.
  • Uses SMTP to exfiltrate data.

Subject Lines Used:

  • Confirm your account
  • Re: REVISED Purchase Order
  • Payment Confirmation Copy

Sample email:

Phantom Stealer attachment-based campaign

Hashes:

  • 2F2E13A9B4B1177705A2F7137382E4B35EA06645 - HTML
  • a91b5ddca78598e1e85bf7f1fbc855be879cf726 - BAT
  • 4585a1b23eb51277056ec26926ac316788c23b45 - EXE

SMTP C2s:

  • mail[.]grupomaspaq[.]com
  • mail[.]poskirantekstil[.]com
  • eraqron[.]shop
IOCs
Protection Statement

Forcepoint customers are protected against this threat at the following stages of attack:

  • Stage 2 (Lure) - Malicious emails are blocked by Cloud rules. Archive attachments are detected by Yara.
  • Stage 4 (Dropper File) - The dropper files are added to Forcepoint malicious database and are blocked.
  • Stage 5 (Call Home) - Blocked C&C URLs 
 

February Briefing

#1: Epstein files email bait-and-switch campaign

Activity Dates:  February 17  

Targeted Sectors: Businesses

Volume: 3

Targeted Location(s): United States

    • Spammers are using a sensational and trendy subject line, such as ‘Found your name in Epstein Files’, to lure recipients into opening their emails. The body then includes an apology like ‘Apologies for the unexpected subject line — I just wanted to make sure this caught your attention.’ The rest of the message shifts into sales oriented questions and promotional content.
    • Email claims to come from unduitham.com, but is actually sent via Salesforce Marketing Cloud bulk mail infrastructure (*.mta.salesforce.com, *.bnc.salesforce.com).
    • Header contains X-SFDC-EmailCategory: apiMassMail X-SFDC-EmailCategory: apiMassMail
    • Catchy subject: No legitimate communication would use mass-mail delivery with a personal, urgent, alarmist subject line.

Sample email:

Epstein files email bait-and-switch campaign
 
IOCs
Protection Statement

Forcepoint customers are protected against this threat at the following stages of attack:

    • Stage 2 (Lure) - Spam emails are blocked by Cloud rules
 

#2: Free web hosting redirect campaign

Activity Dates:  February 20  

Targeted Sectors:  General

Volume: 3

Targeted Location(s):  Ukraine

  • Campaign uses catchy name, an obfuscated JavaScript loader that reconstructs hidden code at runtime to perform browser redirects or load external resources
  • Web pages containing Ukraine name and hosted on Weebly site
    • hxxp://fundsukraine[.]weebly[.]com
    • hxxp://ukrainenewsletter[.]weebly[.]com
    • hxxp://ukrainearts[.]weebly[.]com
  • The content of pages appears to be generic, non-Ukraine related blog posts, mainly about gaming, tech topics and other unrelated material.
  • But code contains obfuscated JavaScript redirector used on SEOspam pages to secretly forward visitors to a malicious secondstage site. 

Ukraine campaign sample page 1:

Ukraine campaign sample page 1

Ukraine campaign sample page 2:

Ukraine campaign sample page 2

Ukraine campaign sample page 3:

Ukraine campaign sample page 3
 
IOCs

URLs:

  • hxxp://fundsukraine[.]weebly[.]com
  • hxxp://ukrainenewsletter[.]weebly[.]com
hxxp://ukrainearts[.]weebly[.]com 
Protection Statement

Forcepoint customers are protected against this threat at the following stages of attack:

  • URL blocked by Real Time Scanning (Live RTSS)
 

Why Securing AI Matters for Your Organization

AI brings tremendous value, but its risks cannot be ignored. Hence, organizations leveraging AI must ensure their data, applications, and infrastructure are secure to protect against the rising tide of cyber threats.

 

Steps You Can Take Today

  • Audit your AI usage to understand potential vulnerabilities.
  • Implement robust web security policies to mitigate risks.
  • Partner with Forcepoint for AI-driven security solutions that protect your business at every stage of an attack.

Want to know more about how Forcepoint secures your AI usage and keeps your organization safe?