Case Studies

We recommend that you also do your own research using a variety of resources

Smartphone screen displaying a text message conversation with the words "Lets begin." in a red speech bubble.

Careless Whisper

Security researchers showed that delivery receipts (not read receipts) can be abused as a side-channel to infer whether a target’s device is active and to build behavioral patterns over time, without visible messages or notifications to the target.

Read More

A glowing, cracked Apple logo displays on a computer screen, with digital red lines and circuitry patterns in the background, creating a futuristic, cyber-security themed visual.

AMOS

Hack using ChatGPT and Grok links that involved tricking AI chatbots into generating malicious, step-by-step guides for common tasks then publishing these deceptive conversations as Google search results.

Once a user approves these prompts, it focuses on stealing high-value data like browser sessions/credentials, macOS Keychain data, and crypto wallet info. Useful for account takeover and fraud.

Read More

Atomic macOS Stealer
Smartphone screen displaying a message notification: 'You Have a New Match!' with a fiery heart icon.

The Match Group breach, disclosed in late January 2026, involved the cybercrime group ShinyHunters claiming responsibility for stealing over 10 million records from platforms including Hinge, OkCupid, and Match.com.

The attack was executed through a vishing (voice phishing) campaign that compromised an employee's Okta Single Sign-On (SSO) credentials, granting access to internal systems and the mobile analytics platform AppsFlyer.

Read More

Match Group Breach

Love & Extortion

A metallic puzzle piece illuminated by red light and sparks.

A long-running Chinese-linked threat actor operation that compromised over 8.8 million users across Google Chrome, Microsoft Edge, and Mozilla Firefox between 2019 and 2026 through malicious browser extensions. The campaign operated through three distinct but interconnected attacks: ShadyPanda, GhostPoster, The Zoom Stealer.

Patience was key. Once the extensions were approved, they remained benign for years, accumulating millions of installs and "Verified" badges, before being remotely activated. This bypassed browser marketplace review processes entirely.

The operation demonstrates a nation-state-level capability, with dynamic, real-time data exfiltration and long-term strategic targeting of corporate intelligence.

Read More

ShadyPanda, GhostPoster, The Zoom Stealer

DarkSpectre