Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Analyzing TAX#TRIDENT: Fake Indian Tax Lures Pivot Across ZIP, VBS, Stego and PHP-Wrapped VBS Delivery

Securonix Threat Research tracks TAX#TRIDENT, an active fake Indian Income Tax-themed campaign that uses three delivery paths to reach Windows endpoints. The campaign starts with fake tax assessment lures and then moves victims toward ZIP files, VBScript downloaders, or PHP-looking web endpoints that actually return script content.

Rethinking Threat Intelligence with the Threat Research Agent

Modern security teams are not lacking data. They are drowning in it. Threat intelligence feeds, indicators, campaigns, internal detections, and investigation artifacts are constantly growing in volume and complexity. Yet when analysts need answers, they are often forced to manually search, pivot, correlate, and interpret across multiple data points. This creates a familiar problem: too much data, not enough clarity.

From Threat Awareness to Proof: Closing the Exposure Validation Gap in the Modern SOC

For most organizations, answering these questions is slow, manual, and difficult to defend. Analysts must interpret threat reports, build SIEM queries, run retroactive searches, and validate findings under pressure. The result is delayed answers, inconsistent processes, and limited confidence at the executive level. This is the gap between threat awareness and proof of exposure. It is where operational risk and board-level scrutiny converge.

VENOMOUS#HELPER: Dual-RMM Phishing Campaign Leveraging JWrapper-Packaged SimpleHelp and ScreenConnect for Silent Remote Access

Phishing campaigns leveraging remote management tools is nothing new. Securonix Threat Research has conducted in-depth dynamic analysis of an ongoing phishing campaign targeting multiple vectors, active since at least April 2025. The campaign has impacted over 80 organizations, predominantly in the United States, spanning multiple sectors. This campaign leverages vendor-signed Remote Monitoring and Management (RMM) software to establish silent, persistent access.