John Hultquist's Avatar

John Hultquist

@hultquist

Mandiant Intelligence at Google. CYBERWARCON and SLEUTHCON founder. Johns Hopkins professor. Army vet.

9,696
Followers
309
Following
220
Posts
04.05.2023
Joined
Posts Following

Latest posts by John Hultquist @hultquist

Preview
Expect Iran to Launch Cyber-Attacks Globally, Warns Google John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more

Today I went to RUSI and @hultquist.bsky.social told me his thoughts about what to expect from Iranian cyber operations in the near future...

Essentially, while tactics won't suddenly change, he believes the attacks will have a much wider scope...

www.infosecurity-magazine.com/news/iran-cy...

02.03.2026 16:56 👍 8 🔁 6 💬 1 📌 1
Preview
Disrupting the GRIDTIDE Global Cyber Espionage Campaign | Google Cloud Blog GTIG, Mandiant, and partners took action to disrupt a global espionage campaign from a suspected PRC-nexus cyber espionage group.

Huge props to Mandiant Threat Defense who were instrumental in unravelling this thing. More details in our blog: 2/x cloud.google.com/blog/topics/...

25.02.2026 15:06 👍 14 🔁 0 💬 0 📌 0
Post image

Google Threat Intelligence Group took down a massive, longterm intrusion campaign into global telcos and government. This PRC-nexus actor built a vast surveillance tool across 42 confirmed countries and another 20 suspected countries. 1/x

25.02.2026 15:06 👍 77 🔁 25 💬 3 📌 1

As for Russian intent, the recent incident in Poland is a stark reminder that the motivation is stronger than ever. I don’t think they are going to be bashful about deploying these capabilities, especially when they’re so easily deniable. 4/x

05.02.2026 13:01 👍 8 🔁 0 💬 0 📌 0

I’m most concerned about DDOS attacks, which have been en vogue lately with hacktivist groups with Russian government ties. DDOS attacks are generally temporary, but when timed right, they can be quite powerful. 3/x

05.02.2026 13:01 👍 3 🔁 0 💬 1 📌 0

The goal is to take some of the shine off the Games, and by extension its participants, and generally that’s best done by disrupting the complex and carefully orchestrated event. Attacks on critical infrastructure like transit are precedented. So are attacks on the broadcast. 2/x

05.02.2026 13:01 👍 2 🔁 0 💬 1 📌 0

The conditions are absolutely ripe for cyberattacks on the Winter Games. In addition to historic precedent like Sandworm’s attempted disruption of the Pyeongchang opening ceremonies, Russian sabotage and cyberattack in Europe right now is reaching fever pitch. 1/x

05.02.2026 13:01 👍 6 🔁 1 💬 1 📌 0
Notepad++ Hijacked by State-Sponsored Hackers | Notepad++

Notepad++ compromised in supply chain attack from June to December 2025 by “likely Chinese state-sponsored actor”. notepad-plus-plus.org/news/hijacke...

02.02.2026 11:50 👍 17 🔁 8 💬 1 📌 2

"The actor Poland has identified is notable for a lengthy history of digging into global critical infrastructure while holding back on actual attacks," @hultquist.bsky.social says. "If they have finally pulled the trigger, that would be a major departure from over a decade of restraint."

30.01.2026 19:06 👍 2 🔁 1 💬 0 📌 0

Perhaps most disconcerting is that if this is Berserk Bear/Dragonfly/Isotope/FSB, then they are now in play. Their ops were notable by the fact that they have not carried out an attack. Especially disconcerting considering the decade of quiet intrusions they have carried out. 3/x

30.01.2026 14:02 👍 5 🔁 0 💬 0 📌 0

Russian cyberattacks in Europe have been slowly ramping up, just like physical sabotage. They are boiling the frog, ratcheting up pressure while avoiding major blowback. There will be more incidents. I’m particularly concerned about the Winter Olympics. 2/x

30.01.2026 14:02 👍 2 🔁 0 💬 1 📌 0

Poland releases details on December’s cyberattack on their energy infrastructure, noting similarities to prior FSB activity. The wiper has been attributed by others to Sandworm (GRU). Attribution is definitely not super clear yet. 1/x cert.pl/uploads/docs...

30.01.2026 14:02 👍 9 🔁 4 💬 2 📌 0
Post image

Ready to put your analysis skills to the test? Join us on Nov 18 (pre-CYBERWARCON) for a Synapse challenge using a real-world scenario. There will be snacks and limited-edition challenge coins! vertex.link/events/cyber...

06.11.2025 18:13 👍 10 🔁 5 💬 0 📌 1
Post image

Meet our speaker: Kevin Hoganson! He leverages a broad skill set across cyber threat intelligence, digital forensics & incident response.

His talk highlights commercial spyware actors' cleanup of forensic artifacts which prevents meaningful analysis of mobile device infections.

www.cyberwarcon.com

30.10.2025 15:59 👍 6 🔁 1 💬 0 📌 0
Video thumbnail

Tickets are almost sold out. Nerds.

www.cyberwarcon.com

30.10.2025 15:36 👍 11 🔁 5 💬 1 📌 3
Post image

Meet our speaker Dlshad Othman!

He has fifteen+ years of experience in threat intelligence, and has built a career at the intersection of cybersecurity and geopolitics.

He will be joining David Magnotti for their talk "Ping First, Boom Second", which will focus on Iranian cyber threat groups.

24.10.2025 13:04 👍 10 🔁 4 💬 0 📌 0

If you’ve been laid off from a cyber threat intel position, and you want a ticket to CYBERWARCON, please reach out.

23.10.2025 13:27 👍 25 🔁 23 💬 0 📌 0
Preview
AI-Powered Adversaries Require AI-Driven Defenses OPINION — The use of artificial intelligence by adversaries has been the subject of exhaustive speculation. No one doubts that the technology will be abused by criminals and state actors, but it can b...

An opinion piece I wrote for Cipher Brief on the next wave of AI threats. The speed and scale of this activity will change the nature of cybersecurity. In order to compete with adversary use of this technology we must adopt it wholeheartedly into defense. www.thecipherbrief.com/ai-cyberatta...

22.10.2025 19:33 👍 11 🔁 7 💬 0 📌 0
Post image

Meet our speaker Caleb Marquis!

His work played a central role in the landmark indictment of North Korean hacker Rim Jong Hyok. He has received the FBI Medal of Excellence and the Department of Justice Attorney General Award for Distinguished Service.

22.10.2025 19:00 👍 3 🔁 2 💬 1 📌 0
Post image

We're excited to have Eric Kerr join us at CYBERWARCON! His talk, "From Hacker to Help Desk: The Surprising Story of a North Korean Cyber Operator", will cover the activities of Andariel, a North Korean hacking group that steals military & nuclear technology from US & South Korean defense networks.

22.10.2025 17:28 👍 5 🔁 2 💬 1 📌 0
Post image

We're proud to announce Ruarigh Thornton is joining us this year at CYBERWARCON! Head of Research and Disruption at PGI, with experience in threats including counter espionage, hostile state information operations + more. He has led 100+ digital investigations.

www.cyberwarcon.com

17.10.2025 14:49 👍 1 🔁 2 💬 0 📌 0

I won’t be at CYBERWARCON this year so I need someone to give @hultquist.bsky.social a hard time for me. I don’t yet know why he deserves this, but I’m sure a reason will present itself between now and then. The man never disappoints in the shenanigans and tomfoolery department.

08.10.2025 18:54 👍 5 🔁 1 💬 1 📌 0
Preview
Oil Into The Fire — CYBERWARCON

Have you ever wanted to see two terminally online nerds really (and I mean *really*) get into the SVR deep lore while continuing the eternal goal of making 2016 last forever?

Gosh does @cyberwarcon.bsky.social have a talk for you!

08.10.2025 18:09 👍 44 🔁 8 💬 2 📌 3

CYBERWARCON is gooooooooo! This year’s agenda is live! Thank you submitters.

08.10.2025 16:18 👍 13 🔁 5 💬 1 📌 0
Post image

Announcing this year's CYBERWARCON speaker lineup and agenda! We've got some fantastic talks this year, and more will be announced soon.

Don't miss your chance to register now! Thank you everyone who submitted to the CFP. The selection was a truly grueling process!

08.10.2025 16:08 👍 10 🔁 5 💬 0 📌 1

What's that?

www.cyberwarcon.com/oil-into-the...

08.10.2025 14:59 👍 20 🔁 5 💬 1 📌 2
Preview
Brickstorm malware powering ‘next-level’ Chinese cyberespionage campaign Mandiant and Google have identified “Brickstorm,” a sophisticated, suspected China-linked hacking campaign targeting U.S. tech firms, legal organizations, and BPOs. The operation often goes undetected...

🚨🚨🚨 Google released a report on "Brickstorm" this morning — a next-level, suspected China-linked campaign targeting U.S. firms. Ultra-stealthy, 400+ day dwell times, focus on stealing IP, finding zero-days, and focused on long-term cyberespionage. cyberscoop.com/chinese-cybe...

24.09.2025 14:03 👍 68 🔁 48 💬 8 📌 1

We are expecting several organizations who use this tool and actively hunt for this threat will find that this actor has been active in their networks for some time.

24.09.2025 14:43 👍 25 🔁 6 💬 1 📌 1
Preview
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors | Google Cloud Blog BRICKSTORM is a stealthy backdoor used by suspected China-nexus actors for long-term espionage.

We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/...

24.09.2025 14:31 👍 21 🔁 13 💬 0 📌 5