The creators of the WailingCrab malware have updated its C2 communication tactics and are targeting more regions globally. The backdoor component of the malware now communicates via MQTT, a lightweight IoT messaging protocol, making it harder for security teams to detect malicious activity. The redevelopers have also ceased using a single centralized MQTT “topic,” instead communicating through client-specific topics, limiting the visibility of the malware’s activities.

Signature Healthcare in Brockton hit by cybersecurity incident – boston.com
Signature Healthcare in Brockton hit by cybersecurity incident boston.com


![[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk [Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk](https://i3.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRHgJL0SczODx5PAnF85b8b0mRpiOOkIQdOWvhivyXu6H8UeZKH9ZUdaeW5IuU59q2hjMNioQWQ5vk1Km8yinGGc8GA079qvhTtFsp9PV76Kmp-3lpKh2zi3vgd_-6dFcOI6i1YHs7VkJ-p-HvOEuOwkjooBVSvYFOrVqXqNhZShZy3IUeD6BVHVvUIj50/s1700-e365/webinar-cerby.jpg?w=0&resize=0,0&ssl=1)