A cyberespionage campaign is targeting industrial organisations in the Asia-Pacific region using the sophisticated FatalRAT malware, reports Kaspersky ICS CERT. The malware, distributed via disguised email, WeChat and Telegram messages, contacts Youdao Cloud Notes to get a list of second-stage loaders to evade detection. It exploits existing software to remain unnoticed, and has capabilities such as system manipulation, data deletion and command executions. A Chinese-speaking threat actor is suspected.

Cleveland Municipal Court remains closed after ‘cyber incident’ – Cleveland 19 News
The Cleveland Municipal Court is closed due to a cyber incident. The court’s operations have been disrupted as a result of this incident, and officials