Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
LilacSquid Strikes: New Cyber Espionage Group Targets US, Europe, and Asia
LilacSquid, a new cyber espionage threat actor, has been targeting sectors in the U.S., Europe, and Asia since 2021. They use tools like MeshAgent and PurpleInk for long-term data theft. Cisco Talos researcher Asheer Malhotra notes similarities with North Korean APT groups, including tactics and…

Hot Take:
Move over Squid Game! LilacSquid is the new villain in town, and it’s not here to play games—unless your data is up for grabs. With a penchant for espionage and a toolbox that would make a Swiss Army knife blush, this cyber-squid is spreading its tentacles across the globe. Time to batten down the hatches and sharpen those firewalls, people!
Key Points:
- New cyber espionage threat actor named LilacSquid targets multiple sectors globally.
- Campaign aims for long-term access to victim organizations to steal data.
- Utilizes open-source tools and custom malware like PurpleInk and InkLoader.
- Methods include exploiting known vulnerabilities and compromised RDP credentials.
- Shares tactics with North Korean APT groups, including the infamous Lazarus Group.