Individual Economists

Activist Judge Blocks Key Parts Of Trump EO On Verifying Citizenship To Vote

Zero Hedge -

Activist Judge Blocks Key Parts Of Trump EO On Verifying Citizenship To Vote

A federal judge on Friday blocked key provisions of President Trump's executive order that requires proof of US citizenship for voter registration. 

Signed on March 25, Executive Order 14248 directs the Election Assistance Commission to require in its national mail voter registration form that voters provide documentary proof of US citizenship, such as a passport. The order also directs federal officials to take measures to prevent illegal immigrants and other noncitizens from voting in federal elections. 

The commission, established by Congress in 2002, helps local officials administer elections. 

On Friday, 82-year-old US District Judge Colleen Kollar-Kotelly (Clinton) - who was previously presiding judge of the Foreign Intelligence Surveillance Court - ruled that provisions requiring citizenship verification "are inconsistent with the constitutional separation of powers and cannot lawfully be implemented."

Kollar-Kotelly said that the US Constitution "does not allow the President to impose unilateral changes to federal election procedures," insisting that the framers gave power over election rules "to the parts of our government that they believed would be most responsive to the will of the people: first to the States, and then, in some instances, to Congress."

"They assigned no role at all to the President," she added. 

She also struck down part of the executive order directing heads of various federal agencies to "assess citizenship" before giving the federal form to "enrollees of public assistance programs," adding that the National Voter Registration Act requires agencies to give said form to those receiving their services. 

The preliminary ruling applies to three separate lawsuits brought by plaintiffs; League of United Latin American Citizens, League of Women Voters Education Fund, and the Democratic Party.

About That Judge... Judge Colleen Kollar-Kotelly

Judge Kollar-Kotelly is an unabashed left-wing, pro-surveillance state, anti 2A activist. Her father worked in US foreign assistance programs in Mexico, Ecuador and Venezuela in the 1950s. In 2004, she issued a FISA court order allowing the NSA to continue spying on domestic metadata. In 2009 she issued a ruling blocking visitors to national parks from carrying concealed weapons, and in 2016 she denied a preliminary injunction against Washington DC's ban on concealed carry permits. In 2017, she blocked the enforcement of Trump's ban on transgenders in the military.

In 2024, Kollar-Kotelly sentenced a woman to 57 months in prison and three years of supervised released under the FACE Act for blocking access to an abortion clinic, and sentenced another woman (Paula Harlow) to two years in federal prison and 36 months of supervised release for the same thing. She also found a J6 protester, Dominic Box, guilty on six charges. Box was pardoned by Trump before he could be sentenced. 

Kollar-Kotelly notably criticized Trump over blanket pardons for those involved in the January 6th incident. 

More recently, she issued an order blocking the IRS from sharing taxpayer information with ICE.

Tyler Durden Sat, 01/31/2026 - 12:15

Over 185,000 Americans In The South Remain Without Power After Ice Storm

Zero Hedge -

Over 185,000 Americans In The South Remain Without Power After Ice Storm

Authored by Jacki Thrapp via The Epoch Times,

Over 185,000 Americans were without power nearly one week after a deadly winter storm swept through two-thirds of the country.

States that faced ongoing power outages included Mississippi, Tennessee, Louisiana, and Texas.

The northern part of Mississippi had the most outages with nearly 80,000 utility customers in the dark as of 5 p.m. ET.

Officials at the North East Mississippi Electric Power Association said they weren’t sure when the lights would be back.

“I’m not quite prepared to give a real good estimate of when you might get power,” General Manager Keith Hayward said in a Jan. 29 video posted on X.

Tennessee experienced the second largest number of outages in the United States. The majority of affected customers resided in the heart of Nashville.

Davidson County, which covers a section of Nashville, had over 60,000 people without power as of 5 p.m ET, which is 85 percent of the outages reported in the state.

Nashville Electric Service said that the ice storm was worse than they expected and added that the provider has never had to deal with damage from a system like Winter Storm Fern.

“When we look at the trees that have exploded, when we drive around the community and are still working to get this restoration done, we have to see how severe this was,” said Brent Baker, Nashville Electric Service chief operations officer during a press conference on Jan. 29.

The delays restoring power have caused multiple groups and agencies to step up and help residents impacted.

Soldiers with the Tennessee Army National Guard’s 212th Engineer Company were called out to the streets of Nashville to remove debris and assist with road clearance on Friday.

Churches in the area started booking hotel rooms for people without power.

Trees are coated with ice as over 200,000 people in the Nashville area woke up without power on Jan. 25, 2026. Jacki Thrapp/The Epoch Times

Louisiana had over 32,000 outages by 5 p.m. ET.

“I have been in Washington, D.C., working side by side with [federal and local officials] to secure the resources and support Louisiana needs,” Gov. Jeff Landry (R-La.) wrote in an X post on Jan. 30.

“With more severe winter weather hitting our state, I am cutting my trip short and heading home now to continue leading our response efforts on the ground. Please remember to stay safe and stay warm!”

The National Weather Service is predicting a widespread storm will slam the East again this weekend.

“A rapidly deepening storm centered just off the North Carolina coast Friday night through Saturday night will produce widespread heavy snow and wind from the southern Appalachians across the Carolinas and southern Virginia,” the agency posted on X Jan. 29.

Tyler Durden Sat, 01/31/2026 - 11:40

Connecticut School Cancels Event With Education Secretary Over Political Pressure

Zero Hedge -

Connecticut School Cancels Event With Education Secretary Over Political Pressure

Authored by Jonathan Turley,

We have long discussed how educators are instilling viewpoint intolerance in students from the earliest grades. The latest example is the cancellation of a visit to McKinley Elementary School in Fairfield, Connecticut, by Secretary of Education Linda McMahon.

The students had the opportunity to speak and interact with a cabinet member, but the school cancelled the event due to political opposition from parents.

Reports indicated that the visit, part of McMahon’s “History Rocks” tour in celebration of the 250th anniversary of the Declaration of Independence, was cancelled due to a campaign by parents.

The parents rose up after McKinley Principal Christine Booth wrote them saying that the school was

“proud to offer this unique opportunity and… unforgettable experience for our McKinley students. Students will enjoy a dynamic, interactive assembly that brings American history and civic learning to life through fun, game show style activities, hands-on participation, and even prizes. This high energy experience is designed to spark curiosity, celebrate our country’s story, and make learning memorable for our students.”

Fairfield Superintendent of Schools Michael Testani folded immediately under the political pressure rather than stand firm that the school is a place for different ideas and voices:

“Following this evening’s announcement about the Secretary of Education’s planned visit to McKinley on Friday, we heard from many families who expressed concerns and shared that they were considering keeping their children home. Due to these circumstances, the Secretary of Education’s visit to Fairfield has been canceled.”

Those “circumstances” were the combination of political pressure from parents and a lack of principle by school officials.

These parents and officials have taught these students a terrible lesson: they should not be exposed to opposing views or speakers.

They are raising a generation of speech-phobics that reflects their own intolerance and bias.

Tyler Durden Sat, 01/31/2026 - 10:30

MiB: Kate Burke, Allspring Global Investments, CEO

The Big Picture -

 

 

This week, I speak with Kate Burke, chief executive officer of Allspring Global Investments and director on the Board of Directors at Allspring Global Investments. The firm manages over $635 billion dollars primarily in fixed income (and equity) assets for institutions. About two-thirds of Allspring’s $635 billion is on its fixed income platform, which includes their liquidity (money market) business; equity is about 20% of the assets.

We discuss her career at AllianceBernstein, including the transition from Chief Talent Officer to CEO, and her move to Allspring. We also discuss her asset management philosophy, and the firm’s long term relationship with Wells Fargo, which is its largest client, with a focus on money market, defined benefits, and institutional management business.

A list of her current reading/favorite books is here; A transcript of our conversation is available here Tuesday.

You can stream and download our full conversation, including any podcast extras, on Apple Podcasts, SpotifyYouTube, and Bloomberg. All of our earlier podcasts on your favorite pod hosts can be found here.

Be sure to check out our Masters in Business next week with Bob Moser, CEO and founder of Prime Group Holdings, a private investor in unique real estate holdings. They created Prime Storage, one of the largest, privately-held self-storage brands in the world, with over 19 million rentable square feet of space and 255 locations across 28 states and the U.S. Virgin Islands. The firm has acquired over $10 billion in real estate assets.

 

 

 

Current Reading

 

 

 

The post MiB: Kate Burke, Allspring Global Investments, CEO appeared first on The Big Picture.

Latest Epstein Emails Reveal Bill Gates Slipped Wife Antibiotics For STD He Got From Russian Hookers

Zero Hedge -

Latest Epstein Emails Reveal Bill Gates Slipped Wife Antibiotics For STD He Got From Russian Hookers

Democrats thought that the firehose release of Epstein files would "finally" bring down Trump. Instead, not only is that not happening (one can argue the latest batch of docs further cements Trump's claim that he had distanced himself far enough from Esptein in recent decades as this admission from Epstein himself to his favorite scribe Michael Wolff reveals), but it is taking down Democratic "thought titans", each one bigger than the next: first it was Larry Summers, then Bill Clinton, now it's Bill Gates.

In what can only be described as the latest chapter in the never-ending saga of elite depravity, the DOJ coughed up over three million pages of Jeffrey Epstein's sordid files – a treasure trove of smut, scandal, and schadenfreude that puts the spotlight squarely back on billionaire vaccine-pusher and Microsoft mogul Bill Gates. Released on Friday, these documents include draft emails from Epstein to himself, painting a picture of Gates as a man entangled in extramarital escapades involving "Russian girls," desperate pleas for antibiotics to hide an STD from his then-wife Melinda, and even bizarre anatomical descriptions that no one asked for. Gates' camp, predictably, is screaming "fake news" from the rooftops, but let's dive into the dirt and see if this smells like another cover-up in the making.

According to the newly unsealed emails, drafted in July18, 2013 but unclear if ever sent, Epstein rants about Gates severing ties with him, accusing the tech titan of hypocrisy after allegedly benefiting from his seedy network. "To add insult to injury you then subsequently with tears in your eyes, implore me to please delete the emails regarding your std, your request that I provide you with antibiotics that you can surreptitiously give to Melinda, and the description of your penis," Epstein reportedly wrote in one typo-riddled tirade. He went on to claim he helped Gates "deal with consequences of sex with Russian girls," implying Epstein played pimp in these alleged trysts. The only question for the FBI: were they underage?

Epstein, ever the aggrieved party in his own mind, positions himself as the jilted enabler who got Gates out of jams, only to be ghosted when the heat got too hot. "I have been caught up in a severe marital dispute between Melinda and Bill," he laments in another note, adding that Gates asked him to partake in "things that have ranged from the morally inappropriate to the ethically unsound" and "potentially over the line into illegal." This comes amid Epstein's supposed resignation from roles tied to the Gates Foundation and BG3, Gates' think tank.

And what's this?

A spokesperson for Gates didn't mince words in response: "These claims – from a proven, disgruntled liar – are absolutely absurd and completely false." Fair enough, but let's not forget Gates has been tap-dancing around his Epstein ties for years. He once called those dinners with the pedophile financier a "huge mistake" in a 2021 CNN interview, downplaying them as mere fundraising schmoozes.

Flashback to our 2019 exposé: "Bill Gates Was Much Closer To Jeffrey Epstein Than He Initially Let On," where we detailed Gates' flights on Epstein's infamous 'Lolita Express', yes, after Epstein's 2008 conviction for soliciting a minor. Then there was "Why Did Bill Gates Fly On Epstein's 'Lolita Express' After Pedophile's Prison Stint?" And who could forget this 2023 bombshell: "Bill Gates 'Blackmailed' By Jeffrey Epstein Over Affair With Russian Bridge Player," revealing Epstein's alleged leverage over Gates' fling with Mila Antonova, a young Russian card shark introduced by none other than Epstein himself. That story tied into reports of Epstein paying for Antonova's coding classes, only to later dangle the affair as blackmail fodder when Gates balked at a shady investment scheme.

Bill Gates

The Russian angle keeps popping up like a persistent virus, no pun intended. In our 2021 piece "'Furious' Melinda Gates Warned Bill Over Jeffrey Epstein Escapades," we highlighted how Melinda was reportedly livid about Bill's cozying up to Epstein, with meetings starting as early as 2011 and contributing to their 2021 divorce. Fast-forward to last year's "Go Talk To Bill Gates About Me": How JP Morgan Enabled Jeffrey Epstein's Crimes, Snagged Netanyahu Meeting," which exposed Epstein name-dropping Gates to JPMorgan execs as a reference, further entangling the billionaire in Epstein's web of influence-peddling.

This latest DOJ dump - which also drags in figures like former UK ambassador Lord Peter Mandelson (Epstein allegedly sent money to his husband post-prison), Prince Andrew (invited to the Palace amid fresh dirt), and even photos of Epstein hobnobbing with Trump, Clinton, and Gates - feels like the establishment's reluctant confession booth. Deputy AG Todd Blanche announced the release more than a month after a December 19, 2025, deadline set by the Epstein Files Transparency Act, with much of it redacted or already public. But the Gates emails? Fresh meat for the conspiracy mill.

As we noted in "There Is No Epstein List, But We Got Names," the real scandal isn't a mythical "client list" - it's the web of enablers and elites who skated free. Gates' name keeps surfacing alongside heavyweights like Ehud Barak, Les Wexner, and Glenn Dubin, all fingered in past allegations. And let's not overlook our recent "Never-Before-Seen Photos Inside Jeffrey Epstein's Creepy Mansion," which included a framed $1 bill scrawled with Gates' handwriting: "I was wrong!" – prophetic, perhaps?

And while in "A Contrarian Take On The Epstein Case," we questioned whether the whole blackmail ring was overhyped, these new emails suggest otherwise: Epstein wasn't just a pervert; he was a grudge-holding chronicler of the powerful's peccadilloes. Gates may dismiss this as the ravings of a "disgruntled liar," but in the face of this new 'release' added to his history with Epstein, the denials ring hollow.

The question remains: How much longer can Gates play the philanthropist card - or rather how much longer will the world allow him to - while his Epstein skeletons keep rattling? Even Larry Summers was forced to exit polite society stage left after his batch of revelations hit last year.

As markets digest this elite drama, keep an eye on Microsoft stock – because if there's one thing we've learned, it's that scandals like these have a way of infecting even the bluest of blue chips. Stay tuned; this rabbit hole just got deeper.

Tyler Durden Sat, 01/31/2026 - 09:56

Don Lemon Arrested By Federal Authorities Over Minnesota Church Protest

Zero Hedge -

Don Lemon Arrested By Federal Authorities Over Minnesota Church Protest

Update: 1535ET: Lemon has been charged with two counts, according to the unsealed grand jury indictment:

COUNT 1: 18 U.S.C. § 241 - Conspiracy Against Right of Religious Freedom at Place of Worship

COUNT 2: 18 U.S.C. § 248(a) (b), § §2(a) - FACE Act: Injure, Intimidate, and Interfere with Exercise of Right of Religious Freedom at a Place of Worship.

*  *  *

Former CNN anchor Don Lemon was arrested by federal authorities late Thursday night on charges that he violated federal law when he entered the Cities Church in St. Paul, Minnesota and shoved a microphone in people's faces to livestream reactions after activists stormed the church on Jan. 18. 

The protesters, chanting "ICE Out!" - interrupted services because one of its pastors is also an official with Immigration and Customs Enforcement (ICE).

Lemon originally faced charges related to allegedly violating federal laws protecting religious exercise/houses of worship (e.g., the FACE Act or 18 U.S.C. § 241 conspiracy to deprive civil rights) by interfering with the church service.

Lemon's attorney, Abbe Lowell, said his client was taken into custody by federal agents Thursday night in Los Angeles while he was covering the Grammy awards. He is expected to make his first court appearance there. 

Lemon insists that while he was tipped off ahead of time about the demonstration, he did not know they would disrupt the service.

"Don has been a journalist for 30 years, and his constitutionally protected work in Minneapolis was no different than what he has always done," said Lowell. "The First Amendment exists to protect journalists whose role it is to shine light on the truth and hold those in power accountable."

The DOJ originally sought to charge eight people over the incident, including Lemon, citing a law that protects people seeking to participate in a service in a house of worship - however a magistrate judge whose wife reportedly works in AG Keith Ellison's office only approved charges against three people, rejecting the evidence against Lemon and others as insufficient. 

Despite the denials, a federal grand jury returned an indictment against Lemon. Looks like the party is over, for now. 

Tyler Durden Sat, 01/31/2026 - 09:28

Neil Young Encounters The Most Boomer Leftist Problem Imaginable

Zero Hedge -

Neil Young Encounters The Most Boomer Leftist Problem Imaginable

Authored by Steve Watson via Modernity.News,

Aging rocker Neil Young has encountered perhaps the most boomer of leftist boomer issues, and of course it’s all President Trump’s fault.

He can no longer use his ancient flip phone because orange man bad.

In a rambling post on his website, Young details his epic struggle to ditch Verizon service, convinced that every dollar he spends fuels a “Trump Fascist regime.”

It’s peak boomer leftist TDS paranoia, where everyday consumer choices somehow morph into grand acts of resistance.

Young kicks off his diatribe with the revelation that his flip phone bears the Verizon logo. “Mornin’ folks….It’s a new day….a big day for my Flip phone. I noticed it says VERIZON on it. Of course I can’t use a Verizon phone. Verizon is a supporter of TRUMP with big $!” he writes, as if discovering a hidden swastika etched into the device. 

He floats the idea of switching to T-Mobile, only to immediately shoot it down. “I’m going to see if I can just drop Verizon and move to T-Mobile,” he muses, before adding, “But wait….T-MOBILE donated to TRUMP’s Ballroom, which has gone from 200 million to 400 million suddenly. Where is that money going? There is no accounting. So T-Mobile is apparently out.” 

The “ballroom” obsession is particularly unhinged; Young fixates on the White House renovation project, questioning “What favors? What companies are donating? Why?” as if uncovering a vast conspiracy. 

The absurdity escalates when Young realizes he’s typing on an Apple computer. “HEY THIS IS AN APPLE COMPUTER!—— I have to stop and re-assess. No more upgrades! That feeds Apple, Apple supports ‘The Regime’ with donations,” he exclaims.

He even calls his business manager mid-rant to halt any future Apple spending, decrying CEO Tim Cook for “kissing ass” at a White House event. 

Young then threatens to sue Apple if his computer stops working without upgrades, expressing a desire to cling to current versions of Pages and FaceTime because he likes them as they are and doesn’t want them to change.

It’s a hilarious snapshot of boomer tech illiteracy colliding with political zealotry—refusing modern conveniences to own the MAGA crowd.

Young ties it all back to his broader crusade, referencing a list of companies “backing the Fascist Trump Regime” on his website’s editorial page. 

“One by one, I am cancelling all contact with each of them. This is not easy, but the alternative – me giving money I got from you, for my music, to the Regime that backed the illegal killings of two Americans. That can’t happen,” he declares.

Young’s rants are getting more and more loony. As we previously covered, he pulled his music from Spotify in 2022 to protest Joe Rogan’s supposed “COVID disinformation,” only to slink back two years later when the pandemic froth died down.

Rogan mocked him mercilessly: “Great to know you got some ethics.” 

Now, Young’s Trump fixation has seeped into his music too—his recent songs obsess over the former president, and one of his latest videos is bizarrely fixated on White House renovation footage, as seen in this clip where he rails against the ballroom like it’s Watergate 2.0.

Young ends his post pondering his record label, Warner Brothers, hinting at more boycotts to come. “I’ll keep you posted folks,” he signs off, as if anyone’s waiting breathlessly for updates on his flip phone saga. 

Trump Derangement Syndrome has turned Young into a caricature, boycotting his way into irrelevance. Meanwhile, real Americans are focused on freedom, not phantom fascist ballrooms. 

If Young wants to live in the Stone Age to spite conservative Americans, that’s his prerogative—but it’s a stark reminder of how the left’s obsessions with Trump blind them to actual threats to freedom like tech censorship and surveillance overreach.

Your support is crucial in helping us defeat mass censorship. Please consider donating via Locals or check out our unique merch. Follow us on X @ModernityNews.

Tyler Durden Sat, 01/31/2026 - 09:20

Iran Hits Back At EU: Designates European Armies As 'Terrorist Entities'

Zero Hedge -

Iran Hits Back At EU: Designates European Armies As 'Terrorist Entities'

Iran is saying two can play at the West's game: on Friday the secretary of Iran's Supreme National Security Council blasted the EU's decision to designate the Islamic Revolutionary Guard Corps (IRGC) as a "terrorist organization," warning that Europe's own militaries would now be viewed through the same lens.

"The European Union certainly knows that… the armies of countries that have participated in the European Union's recent resolution against the Islamic Revolutionary Guard Corps are considered terrorist entities," Ali Larijani wrote in a post on X. He added bluntly: "Therefore, the consequences of that shall be borne by the European countries that undertook such an action."

NurPhoto

However, there's probably nothing in the way of European military assets for the Islamic Republic to sanction, so this 'action' by Tehran will remain largely symbolic. Iran does have assets held in various places of Europe though.

EU foreign ministers agreed on Thursday to formally classify the IRGC as a "terrorist organization" and urged member states to implement the designation without delay - after a few longtime holdouts flipped.

Among those recently changing their stance include France, Spain, and Italy - but apparently the recent deadly protests, and Trump's pressure, had an impact.

One bit of irony is that the West has over the past year removed its designation of Syria's Hayat Tahrir al-Sham (HTS), after Jolani took over Damascus. HTS is literally the founding al-Qaeda group in Syria.

The IRGC stands accused by the West of directing Iran's crackdown of domestic unrest, after economic-driven protests took over town and city streets this month. 

Thousands died, but Iran officials have pointed to armed saboteurs being mixed in among the peaceful demonstrators, leading to mayhem and a high death toll.

The United States, Canada, and Australia had already blacklisted the IRGC, while Germany and the Netherlands have for years pressed the rest of the EU to follow suit.

But Tehran sees the Guard Corps as part of, or also chief safeguard of the nation's security and military. It is envisioned as 'protecting' the 'Islamic Revolution' since 1979. In the past, some countries even gave top IRGC officials diplomatic credentials.

Tyler Durden Sat, 01/31/2026 - 08:45

Muslim Leaders In Italian City Demand Removal Of Plastic Pig From Deli Shop Window

Zero Hedge -

Muslim Leaders In Italian City Demand Removal Of Plastic Pig From Deli Shop Window

Via Remix News,

A plastic pig displayed in the window of a newly opened delicatessen on the Piazza dei Signori in the Italian city of Padua has triggered a local controversy after a senior representative of the city’s Muslim community called for its removal, arguing that it is offensive and inappropriate.

The pig, placed in the window of the deli Mortadella… e Non Solo, is used to advertise the shop’s sandwiches and cured meats, which are primarily made from pork.

According to Il Giornale, Salim El Mauoed, the regional vice president of Padua’s Muslim community, urged both the shop’s owners and local authorities to intervene, describing the display as “in bad taste” and offensive to Muslims who pass through the area.

There is no legal basis requiring the business to remove the display.

The pig imagery is a central part of the shop’s branding and appears not only in the window but also in its logo, promotional materials, and merchandise shared publicly on social media.

El Mauoed’s request has drawn criticism from some politicians and residents, who argue that it amounts to interference with lawful commercial activity and undermines the principle of civil coexistence.

They contend that living together in a pluralistic society necessarily involves accepting visible expressions of different cultures, religions, and dietary traditions, particularly when those expressions are neither targeted nor discriminatory.

Il Giornale reports that some members of the local Muslim community believe symbols seen as contrary to Islamic religious precepts should be avoided in shared urban spaces.

Others, however, have warned that removing a legal and commonplace commercial symbol risks establishing a precedent in which religious objections could reshape long-established customs and everyday practices.

The newspaper also notes that the deli employs Muslim staff, some of whom have publicly defended the display, saying the plastic pig simply reflects the nature of the business and is not intended to offend anyone.

The pig remains on display for now.

Read more here...

Tyler Durden Sat, 01/31/2026 - 08:10

Ukraine Moves To Purge Dostoevsky & Tolstoy From Public Mention

Zero Hedge -

Ukraine Moves To Purge Dostoevsky & Tolstoy From Public Mention

In the latest escalation of Ukraine's cultural purge and targeting of all things Russian, Ukraine's Institute of National Memory has this month formally branded the famed classic Russian authors Fyodor Dostoevsky and Leo Tolstoy as vectors of "Russian imperial propaganda".

This has included a call from the body which operates under the Cabinet of Ministers of Ukraine for all streets, monuments, and public institutions bearing their names be wiped from the map.

Image via Union of Orthodox Journalist-Ukraine

According to Interfax, commenting on the ruling, "the assignment of their names to geographical objects, names of legal entities and objects of property rights, objects of toponymy, as well as the establishment of monuments and memorial signs in their honor in Ukraine was the embodiment of Russification - Russian imperial policy aimed at imposing the use of the Russian language, promoting Russian culture as superior compared to other national languages ​​and cultures, displacing the Ukrainian language from use, and narrowing the Ukrainian cultural and information space."

In a January 20 statement, the Institute of National Memory's 'expert commission' claimed the literary legacy of both writers is "directly connected to the glorification of Russian imperial policy." The Ukrainian officials also asserted there are signs of "Ukrainophobia" in their books.

The move was met with complete silence in Western media, and the story has gone almost completely overlooked, despite Dostoevsky and Tolstoy having long been widely studied and appreciated across the globe, and in American colleges, literary programs, theaters - and among common avid readers.

Their works, from The Brothers Karamazov to the massive War and Peace have done much to shape Western culture and higher education in the 150 years of the works' existence. 

And yet the Ukrainian government-linked institute now claims the historic prominence of Dostoevsky and Tolstoy across Ukraine was not because it is literary art with universal appeal, but somehow part of a long-running Russification campaign designed to marginalize the Ukrainian language and culture.

Ukraine has in essence just labeled two of the world's greatest historical authors, which far pre-date both the modern Russian Federation and Soviet Union of the 20th century, as 'propaganda'.

The following is an actual line from the original Interfax report: "The head of the UINP, Oleksandr Alferov, states that local authorities need to check the names of their streets with these lists."

Tyler Durden Sat, 01/31/2026 - 07:35

Next-Level Spying: How China Read The West's Wiretaps For Years

Zero Hedge -

Next-Level Spying: How China Read The West's Wiretaps For Years

Authored by Shanaka Anslem Perera via Substack,

The four trillion dollars in institutional capital positioned for stable UK-China relations rests on an assumption that died in a Chengdu server room sometime around 2019. The assumption is that espionage between major powers operates within understood boundaries, that telecommunications infrastructure is contested but not compromised, that the surveillance systems Western governments built to watch their citizens cannot be turned around to watch them. The assumption has been falsified. What follows is the complete mechanism of how China’s Ministry of State Security achieved persistent access to the private communications of three British Prime Ministers’ closest advisers, the phones of a US President-elect, and the wiretap systems that were supposed to catch them doing it. The positioning implications are immediate. The framework is permanent.

On January 26, 2026, The Telegraph disclosed that Chinese hackers had penetrated right into the heart of Downing Street, compromising mobile communications of senior officials across the Johnson, Truss, and Sunak administrations. The story was buried on page seven, treated as a technology curiosity. It was, in fact, a solvency event for the Western intelligence alliance. Not because phones were hacked, which happens, but because of how they were hacked: by weaponizing the very surveillance infrastructure that Western governments mandated for their own intelligence agencies. The Communications Assistance for Law Enforcement Act in the United States and the Investigatory Powers Act in the United Kingdom require telecommunications carriers to build backdoors into their networks for court-ordered wiretapping. Chinese state hackers found those backdoors. And walked through them.

The intelligence value is almost impossible to overstate. For approximately four years, operators linked to the MSS’s Chengdu bureau had the capability to see not just who British officials were calling, but whom the FBI was investigating, which Chinese operatives were under surveillance, what the United States knew about Beijing’s activities, and when counterintelligence was getting close. They could geolocate millions of individuals. They could record phone calls at will. They compromised the surveillance of their own surveillers, achieving the counterintelligence equivalent of reading the other side’s playbook while the game was in progress.

What follows is the institutional playbook. The positions are already being built.

The Backdoor That Swung Both Ways

The story of Salt Typhoon is not fundamentally a story about hacking. It is a story about architecture. Specifically, it is a story about what happens when governments mandate that their surveillance systems include single points of failure, then assume those points will only fail in their favor.

In 1994, the United States Congress passed the Communications Assistance for Law Enforcement Act, requiring telecommunications carriers to design their networks with built-in capabilities for government wiretapping. The law emerged from FBI concerns that digital switching technology would render traditional surveillance impossible. CALEA’s solution was elegant in its naivety: force every carrier to build a standardized interface through which law enforcement could access communications pursuant to court order. The interface would be secure because it would be secret, protected by access controls, audited by compliance regimes. No adversary would find it because no adversary would know to look.

Twenty-two years later, the United Kingdom enacted the Investigatory Powers Act 2016, colloquially known as the Snooper’s Charter. It went further than CALEA, mandating that technology companies retain communications data and provide access mechanisms for intelligence agencies. The architecture was the same: centralized access points designed for authorized users, protected by the assumption that authorized users would be the only ones using them.

Salt Typhoon was the adversarial audit that the system failed.

The Chinese operators did not need to hack individual phones, which would have been noisy and detectable. They did not need to intercept communications in transit, which would have required breaking encryption. They hacked the wiretap system itself. Once inside the CALEA infrastructure at AT&T, Verizon, and Lumen Technologies, they had access to everything the FBI had access to: call metadata showing who contacted whom and when, geolocation data derived from cell tower triangulation, the actual content of unencrypted calls and texts, and most devastatingly, the database of active surveillance requests. They could see whom the United States government was watching. They could see if they themselves were being watched.

The vulnerability was not a bug in the architecture. It was the architecture.

For decades, cryptographers and privacy advocates warned that there is no such thing as a backdoor only good guys can use. A vulnerability is a vulnerability. If it exists, a sufficiently motivated and resourced adversary will find it. The NSA and GCHQ and FBI dismissed these warnings as theoretical, academic, disconnected from operational reality. Law enforcement’s access needs are legitimate. But Salt Typhoon demonstrated empirically that the risks of mandated backdoors extend to everyone, including the governments that mandated them.

The irony approaches the unbearable. As Salt Typhoon was being discovered in late 2024, the UK government was pressuring Apple to weaken iMessage encryption under the Investigatory Powers Act. The argument was the same one that produced CALEA: law enforcement needs access, and carefully controlled access can be kept secure. Apple reportedly disabled certain features for UK users rather than comply. At precisely the same moment, as The Telegraph would later reveal, Chinese operators were reading communications from the heart of Downing Street through the access points the UK government had mandated.

The technical community has a name for this: the security paradox. Systems designed to enable surveillance become targets for adversary surveillance. The more access points you create for your own agencies, the more attack surface you expose to foreign agencies. The debate between security and privacy was always a false binary. The real tradeoff was between surveillability by your government and surveillability by everyone’s government.

Salt Typhoon collapsed that tradeoff into a single devastating data point.

The Kill Chain That Cannot Be Killed

Understanding what happened requires understanding how telecommunications networks actually function, not how they appear in policy documents.

A modern telecom network is not a monolithic system but a layered architecture spanning edge devices that connect to the public internet, core routing infrastructure that moves packets between networks, administrative systems that manage configurations and access, billing and customer data platforms, and lawful intercept systems that process surveillance requests. Each layer has its own attack surface. Salt Typhoon targeted the layer that matters most: the edge devices that control everything else.

The primary intrusion vector was a pair of vulnerabilities in Cisco IOS XE, the operating system running on millions of enterprise routers and switches worldwide. CVE-2023-20198, with a perfect 10.0 CVSS severity score, allowed an unauthenticated remote attacker to create an administrator account with Level 15 privileges, the highest access level on Cisco devices. CVE-2023-20273 enabled command injection that elevated those privileges to root access on the underlying Linux operating system. Chain them together and an attacker can create a god-mode account on any exposed Cisco device, then execute arbitrary code with full system control.

The vulnerabilities were disclosed in October 2023. Cisco issued patches. Many telecommunications operators delayed patching due to operational constraints that made rapid remediation nearly impossible.

This dynamic is not incompetence, though it resembles incompetence. Telecommunications infrastructure operates under pressures that create structural patch delays. These networks run 24 hours a day, 365 days a year. Downtime is measured in lost revenue and regulatory penalties. Patching a core router requires scheduling maintenance windows, testing updates in lab environments, coordinating with interconnected carriers, and accepting the risk that the patch itself introduces instability. For many operators, the calculation becomes: known theoretical vulnerability versus certain operational disruption. They chose the theoretical vulnerability. Salt Typhoon chose them.

Recorded Future’s Insikt Group documented the campaign exploiting over one thousand Cisco devices globally between December 2024 and January 2025. But the truly alarming finding was that attackers also exploited CVE-2018-0171, a vulnerability in Cisco Smart Install that had been patched seven years earlier. Some devices in critical telecommunications infrastructure had not been updated since 2018. The attack surface was not the frontier of zero-day exploitation. It was the accumulated technical debt of an industry that treated security as a cost center.

Once inside, Salt Typhoon deployed a sophisticated persistence mechanism designed to survive exactly the remediation attempts carriers would eventually undertake. The primary implant, documented by Trend Micro researchers under the name GhostSpider, operated entirely in memory without touching disk, evading traditional antivirus that scans for malicious files. It used DLL hijacking to execute within the context of legitimate processes, bypassing application whitelisting. Communications with command-and-control servers were encrypted and disguised as normal HTTPS traffic, blending with legitimate web activity.

The deeper persistence came from Demodex, a kernel-mode rootkit that modified the Windows operating system at its lowest level. Demodex hooked into system calls to hide its own processes, network connections, and registry entries from administrators running diagnostic commands. An operator investigating a compromised system would see nothing amiss because the rootkit was filtering what they could see. The malware achieved what the cybersecurity industry calls god-mode persistence: invisibility so complete that the only certain remediation is physical hardware replacement.

On Cisco devices specifically, the attackers exploited the Guest Shell, a Linux container environment designed for running legitimate management scripts. By injecting malicious code into this trusted container, they achieved persistence that survived standard reboots and even operating system reimaging. The infection lived below the level that normal administrators could access. It was not hiding in the house. It had become part of the foundation.

The operational sophistication extended to exfiltration. Salt Typhoon deployed a custom tool called JumbledPath that enabled packet capture across multiple network hops while simultaneously clearing logs and disabling logging along the capture path. They could intercept traffic without leaving forensic evidence of the interception. They modified Access Control Lists on compromised switches to explicitly permit their command-and-control IP addresses, ensuring their backdoors remained reachable even as security teams updated firewall rules. They created Generic Routing Encapsulation tunnels to route stolen data through compromised infrastructure, making the exfiltration appear as legitimate network traffic.

According to Cisco Talos analysis, the average dwell time before discovery was 393 days. One environment showed attackers maintaining presence for over three years. Three years of access to telecommunications infrastructure that carries the communications of governments, corporations, and private citizens. Three years of watching the watchers.

Inside the Chengdu Hacker-for-Hire Marketplace

Attribution in cyber operations is notoriously difficult. Attackers route through compromised infrastructure in multiple countries, use commodity malware available to any buyer, and deliberately plant false flags suggesting different national origins. The intelligence community has learned hard lessons about premature attribution.

Salt Typhoon attribution does not suffer these ambiguities. It is among the most thoroughly documented cases of state-sponsored cyber operations in the public record.

The US Treasury Department sanctioned Sichuan Juxinhe Network Technology Co., Ltd. on January 17, 2025, identifying it as a Chengdu-based cybersecurity company with direct involvement in the Salt Typhoon cyber group. The language was unusually specific for a sanctions designation, which typically uses more cautious phrasing. Treasury stated that the Ministry of State Security has maintained strong ties with multiple computer network exploitation companies, including Sichuan Juxinhe. The implication was unmistakable: this was not a rogue actor tangentially connected to Chinese intelligence. This was an MSS operation executed through contractor infrastructure.

Chengdu has emerged as the primary hub of China’s offensive cyber contractor ecosystem, a distinction it shares with no other Chinese city to the same degree. The reasons are structural. Sichuan University and Chengdu University of Information Technology produce a steady pipeline of computer science graduates with the technical skills offensive operations require. The provincial government offers tax incentives for high-tech enterprises that attract cybersecurity firms. The MSS’s Chengdu bureau has historically been aggressive in recruiting and contracting local talent. The result is a geographic concentration of capability that the intelligence community has tracked for over a decade.

Sichuan Juxinhe is not an isolated entity but part of an interconnected ecosystem. Treasury’s designation also referenced Beijing Huanyu Tianqiong Information Technology Co., Ltd. and Sichuan Zhixin Ruijie Network Technology Co., Ltd. as associated entities. These firms share corporate registration patterns, overlapping personnel, and technical infrastructure in ways that suggest coordinated rather than independent operation.

The ecosystem became dramatically more visible in February 2024, when over five hundred internal documents from i-SOON (Sichuan Anxun Information Technology Co., Ltd.) appeared on GitHub in one of the most significant leaks of Chinese cyber operations ever recorded. The documents revealed a hacker-for-hire marketplace where private firms bid on government contracts to compromise specific targets. Price lists showed costs for different levels of access. Marketing materials advertised tools for hacking Twitter, Gmail, WeChat, and Telegram. Target lists included governments in India, Thailand, Vietnam, South Korea, and NATO member states. The operational picture was unmistakable: China’s cyber espionage apparatus operates significantly through private contractors who compete for MSS and PLA business.

The i-SOON leak provided a Rosetta Stone for understanding how Salt Typhoon operates. Domain registration patterns used by i-SOON matched those observed in Salt Typhoon infrastructure. Malware families overlapped. The corporate relationship between i-SOON and other Chengdu firms explained how capabilities and targeting information might flow between ostensibly separate entities.

The UK government reached the same conclusion. On December 9, 2025, Foreign Secretary Yvette Cooper announced sanctions against Integrity Technology Group and Sichuan Anxun Information Technology (i-SOON) for activities against the UK and its allies that impact our collective security. The 13-nation joint advisory released in August 2025 explicitly attributed the campaign to MSS-linked private contractors, co-signed by agencies from the United States, United Kingdom, Australia, Canada, New Zealand, Germany, Japan, and five other nations.

The evidence supporting attribution is overwhelming: convergent technical indicators across multiple intelligence services, targeting patterns aligned with MSS priorities rather than financial motivation, sanctions from two G7 governments naming specific companies, a leaked document trove revealing operational details, and multi-national intelligence consensus among powers with no incentive to coordinate false attribution.

Chinese Foreign Ministry spokesperson Guo Jiakun dismissed the allegations as unfounded and irresponsible smears and slanders, claiming China stands against hacking and fights such activities in accordance with the law. Chinese state media advanced the counter-narrative that Salt Typhoon accusations represent US efforts to secure congressional appropriations rather than genuine intelligence findings. The Global Times characterized the accusations as a farce of US smear tactics against China.

These denials represent diplomatic necessities. They do not survive contact with the documented evidence.

The Crown Jewels: Three Prime Ministers’ Inner Circles Exposed

The targeting profile of Salt Typhoon reveals strategic intent far beyond conventional espionage.

In the United States, nine telecommunications carriers have been confirmed compromised: Verizon, AT&T, T-Mobile, Lumen Technologies, Spectrum (Charter Communications), Consolidated Communications, Windstream, Viasat, and at least one additional unnamed provider. Senator Mark Warner, chairman of the Senate Intelligence Committee, characterized it as the worst telecom hack in our nation’s history. The scope comparison is instructive. SolarWinds, the Russian supply chain compromise discovered in December 2020, affected approximately 18,000 organizations with deep penetration of roughly 100. Salt Typhoon compromised over 200 companies across 80 countries.

The data accessed falls into two categories with very different strategic implications.

The first category is bulk metadata: call detail records showing who contacted whom, when, and for how long, plus geolocation data derived from cell tower connections. Former Deputy National Security Advisor Anne Neuberger confirmed that attackers gained capabilities to geolocate millions of individuals. Metadata reveals patterns invisible in content alone. If a senior Treasury official calls a specific BP executive three times in one night before a North Sea oil announcement, Beijing knows the policy shift before the Cabinet does. Mapping communication networks reveals the actual decision-making structure of governments, which often differs substantially from organizational charts.

The second category is targeted content interception. Fewer than 100 individuals had actual call content and text messages directly compromised, but those individuals included Donald Trump, JD Vance, and senior staff from the Harris campaign during the 2024 presidential election. Congressional staff from the House China Committee, Foreign Affairs Committee, Armed Services Committee, and Intelligence Committee were accessed in breaches detected in December 2025, according to the Financial Times. The targeting was not random. It was surgical.

The United Kingdom penetration, disclosed by The Telegraph on January 26, 2026, reached right into the heart of Downing Street. The National Cyber Security Centre confirmed observing a cluster of activity targeting UK infrastructure since 2021. Aides to Prime Ministers Boris Johnson, Liz Truss, and Rishi Sunak had their communications compromised across a three-year period that included the COVID-19 pandemic response, the Ukraine war’s escalation, and critical UK-China trade negotiations.

Whether the Prime Ministers’ personal devices were directly compromised remains publicly unclear. The distinction may matter less than it appears. In a telecom network intrusion, attackers do not need to compromise individual devices. They compromise the network itself, intercepting communications as they transit carrier infrastructure. The Prime Minister’s phone may have been perfectly secure. The calls it made were not.

The strategic timing compounds the damage. The 2021-2024 window included decisions on Huawei’s role in UK 5G infrastructure, the AUKUS security pact formation, Hong Kong sanctions policy, and bilateral trade negotiations with Beijing. Chinese intelligence had real-time visibility into British decision-making during discussions where China’s interests were directly at stake. The information asymmetry is staggering.

Australia was similarly targeted. ASIO Director-General Mike Burgess confirmed in November 2025 that Salt Typhoon attempted to access Australia’s critical infrastructure, including telecommunications networks. Canada experienced confirmed breach of at least one unnamed telecom in February 2025. The campaign extended beyond the Five Eyes core: a South African provider was reportedly compromised via Cisco platforms, Southeast Asian telecoms detected new malware variants, and European telecommunications organizations identified intrusion attempts as late as October 2025.

The counterintelligence implications are the most damaging aspect, though the least publicly discussed.

By accessing CALEA systems, Salt Typhoon operators could see the database of active wiretap requests. They knew whom the FBI was investigating. If MSS operatives in the United States were under surveillance, Beijing could pull them out before arrests occurred. If FBI investigations were approaching sensitive Chinese assets, Beijing could warn them. If counterintelligence operations were building cases against Chinese technology companies or influence operations, Beijing could see the evidence accumulating.

This is the counterintelligence nightmare: your surveillance apparatus becomes the adversary’s intelligence source. The FBI was not just failing to catch Chinese spies. It was showing China exactly where to find its exposed spies before the FBI could catch them.

The Hidden Correlation That Risk Models Never Saw

Systems approaching critical transitions exhibit a distinctive signature that financial risk models systematically miss. Surface metrics remain stable while underlying pressure accumulates. Correlations appear benign precisely because the stress is building uniformly across connected components. Then the transition happens not gradually but all at once, in a cascade that propagates faster than response mechanisms can activate.

The physics of phase transitions describes the phenomenon with precision. Water remains liquid as it cools, molecules slowing gradually, temperature dropping predictably. Then at exactly zero degrees Celsius, the system reorganizes instantaneously into a crystalline structure. The transition is discontinuous. Nothing in the gradual cooling predicted the sudden restructuring.

Salt Typhoon’s propagation through global telecommunications followed this pattern. The Global Cyber Alliance documented 72 million attack attempts from China-origin IP addresses against telecommunications infrastructure worldwide between August 2023 and August 2025. The number is not the important part. The distribution is. Rather than concentrating on a few high-value targets, the campaign probed systematically across the entire internet-facing surface of telecom networks in 80 countries. When one vector failed, others succeeded. The attack percolated through the network of networks, finding paths of least resistance through unpatched devices, legacy systems, and accumulated technical debt.

The 80-country spread was not a bug or scope creep. It was the exploitation of network topology itself. Telecommunications providers interconnect through peering relationships, shared vendors, inherited trust, and common infrastructure. Compromising one provider creates pivot points into connected providers. The attackers did not need to breach 80 countries independently. They needed to breach enough nodes that cascade dynamics carried the compromise further.

Financial risk models trained on historical correlations would have seen nothing unusual in the period before disclosure. Telecom stocks moved with normal volatility. Cybersecurity spending followed typical budget cycles. The correlation stability that risk managers found reassuring was measuring the pressure building uniformly, not the probability of release.

The parallel to credit markets before 2008 is instructive though imprecise. Mortgage-backed securities showed stable correlations because they were all exposed to the same underlying risk. The stability was the warning, not the comfort. When housing prices turned, the correlation snapped to one and everything moved together. The diversification that looked protective turned out to be concentration disguised.

Salt Typhoon exposed a similar hidden correlation in critical infrastructure. The assumption was that a breach of Verizon had no implications for BT, that American vulnerabilities were American problems, that European telecoms operated in a separate risk regime. The assumption was wrong. The same Cisco devices run everywhere. The same CALEA architecture creates the same vulnerability everywhere its analogues exist. The same contractor ecosystem targets everyone with the same tooling. The diversification across carriers and jurisdictions was illusory. They were all one network.

Five Eyes Fractures Under Pressure

The Five Eyes intelligence alliance, comprising the United States, United Kingdom, Canada, Australia, and New Zealand, represents the deepest and most institutionalized intelligence-sharing arrangement among Western democracies. Its origins in World War II signals intelligence cooperation have evolved into comprehensive collaboration on technical collection, analysis, and counterintelligence. Salt Typhoon tested this architecture as nothing has since its formation.

The initial response demonstrated the alliance’s coordination capabilities. The December 2024 Enhanced Visibility and Hardening Guidance for Communications Infrastructure was the first joint Five Eyes response to the breach. The August 2025 advisory expanded to 13 nations, co-sealed by 22 agencies attributing the campaign to specific Chinese companies with unprecedented multinational consensus. The coordination was real and consequential.

But the fractures were also visible.

UK officials pointedly stated that had American regulations matched British standards, we would have found it faster, we would have contained it faster. The criticism was technically accurate. The UK’s Telecommunications Security Act 2021 imposed security obligations on carriers that exceed CALEA requirements. But the same UK government pursuing those regulations was simultaneously pressuring Apple to weaken encryption under the Investigatory Powers Act, replicating exactly the architectural vulnerability that Salt Typhoon exploited. The internal contradiction was not resolved so much as ignored.

The regulatory divergence reflects deeper philosophical disagreements that Salt Typhoon intensified without settling. The FBI and CISA’s December 2024 recommendation that Americans use end-to-end encrypted messaging applications represented an extraordinary acknowledgment that carrier networks cannot be trusted. Yet both agencies have historically sought encryption backdoors for law enforcement access. The cognitive dissonance remained unaddressed: advocating for encryption to protect against foreign adversaries while seeking to weaken encryption for domestic law enforcement.

The FCC’s regulatory response exemplified the policy incoherence. In January 2025, the Commission proposed mandatory cybersecurity requirements including role-based access controls, multi-factor authentication, and vulnerability patching for telecommunications carriers. Then-Chairwoman Jessica Rosenworcel stated: In light of the vulnerabilities exposed by Salt Typhoon, we need to take action. In November 2025, the reconstituted FCC voted 2-1 to revoke those rules. Chairman Brendan Carr argued for an agile and collaborative approach over regulatory mandates. Commissioner Anna Gomez dissented: This FCC today is leaving Americans less protected than they were the day this breach was discovered.

The Cyber Safety Review Board investigation, established to provide an authoritative post-mortem on Salt Typhoon, was terminated in January 2025 when the incoming administration dismissed all members before their investigation concluded. The official lessons learned process stopped before identifying lessons.

Intelligence sharing itself became contested. Reports emerged in 2025 that DNI Tulsi Gabbard barred sharing certain intelligence with Five Eyes partners. While some former officials characterized concerns as faux outrage, noting that withholding occurs routinely, others warned of a chilling effect on critical intelligence sharing at precisely the moment coordination mattered most.

From a Chinese perspective, as expressed by state media and diplomatic channels, the sanctions and coordinated Western response represent political escalation that unnecessarily heightens tensions and contradicts stated commitments to engagement. Beijing has consistently framed the accusations as evidence of anti-China bias in Western intelligence assessments rather than legitimate security concerns.

Salt Typhoon revealed that even the world’s most sophisticated intelligence alliance, facing the world’s most aggressive cyber adversary, operates with fundamental coordination failures, regulatory incoherence, and philosophical contradictions that compound rather than contain the damage.

Why Hardware Must Replace Software

The most alarming aspect of Salt Typhoon is not what happened but what continues to happen.

CISA Executive Assistant Director Jeff Greene stated plainly: We cannot say with certainty that the adversary has been evicted, because we still don’t know the scope of what they’re doing. Senator Maria Cantwell’s December 2025 assessment was equally stark: Telecom companies infiltrated in the attack have failed to prove the Chinese hackers have been eradicated from their networks.

AT&T and Verizon announced in January 2025 that they had successfully expelled the attackers from their networks, with Mandiant providing independent verification. The claims met immediate skepticism from government officials and security experts. The skepticism has not been resolved. When Senator Cantwell demanded documentation, the carriers could not provide evidence that Chinese hackers had been fully removed.

The technical reasons for persistent access are well understood.

Salt Typhoon’s persistence mechanisms, including GRE tunnels on network devices, Demodex kernel rootkits, and modified authentication server configurations, can survive standard remediation procedures. The attackers’ average dwell time of 393 days before detection, with some environments compromised for over three years, demonstrates operational security sufficient to reestablish access even after apparent eviction. If the attackers anticipated discovery, they likely created backup persistence mechanisms that remediation teams have not found.

Read the rest here and consider subscribing

Tyler Durden Sat, 01/31/2026 - 07:00

Pages