• Skip to primary navigation
  • Skip to main content
  • Skip to footer
lab52

lab52

The threat intelligence division of S2 Grupo

  • Home
  • Faq
  • Blog
  • About
  • Contact

Trends in Radio Frequency Spectrum Activity and Its Impact on the Geopolitical Landscape

May 14, 2026

Although it is true that the terrestrial, maritime, air, space, and cyberspace domains are the usual focus of analysis, the radio frequency spectrum also reflects the current geopolitical tensions. Within it, states systematically employ capabilities related to influence, interference, and command and control. LAB52 has SIGINT acquisition capabilities in the radio frequency spectrum, which have […]

Dex

EasterBunny: advanced espionage artifacts attributed to APT29

May 06, 2026

During 2019, as part of the results of S2 Grupo’s incident management service, LAB52 gained access to a set of artifacts—and a large amount of evidence collected during the incident—which made it possible to conduct an exhaustive investigation linking the highly sophisticated campaign to APT29. Starting in November 2025, the information about these artifacts was […]

Er1c_C

DRILLAPP: new backdoor targeting Ukrainian entities with possible links to Laundry Bear

March 13, 2026

LAB52, the intelligence team at S2 Group, has identified a new campaign targeting Ukrainian entities, attributed to actors linked to Russia. The campaign, observed during February 2026, employs various judicial and charity themed lures to deploy a JavaScript‑based backdoor that runs through the Edge browser and has been named DRILLAPP by LAB52. This artifact enables […]

3722304989

PlugX Meeting Invitation via MSBuild and GDATA

February 26, 2026

In relation to the latest variant of the PlugX RAT executed by STATICPLUGIN analyzed by IIJ-SECT, LAB52 aims to complement this information with additional observed deployment activity and encryption characteristics in samples analyzed by this team. PlugX PlugX is a long-running Remote Access Trojan (RAT) that has been consistently linked to multiple China-aligned threat actors […]

10ba

Operation MacroMaze: new APT28 campaign using basic tooling and legit infrastructure

February 13, 2026

Overview LAB52 has been monitoring a campaign dubbed “Operation MacroMaze”, which, based on its characteristics, can be attributed to APT28, also known as Fancy Bear, Forest Blizzard or FROZENLAKE. The campaign has been active at least since late September 2025 through January 2026, targeting specific entities in Western and Central Europe. The campaign relies on […]

Dio

The GRU illegals

February 08, 2026

Illegals are intelligence officers operating abroad under false identities and nationalities, without the protection of diplomatic immunity. Posing as ordinary citizens of other countries, these officers maintain fake identities, spending years building normal lives while spying. In front of other spies, these officers have no diplomatic protection: if they are discovered, they go to prison. […]

BigBoss

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 16
  • Go to Next Page »

Footer

Copyright &copy Lab52 2019 by S2 Grupo | Legal notice | Cookie policy | Privacy policy