<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cti on aksnk / notes</title><link>https://blog.aksnk.com/tags/cti/</link><description>Recent content in Cti on aksnk / notes</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Thu, 07 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.aksnk.com/tags/cti/index.xml" rel="self" type="application/rss+xml"/><item><title>Fake portals everywhere [1] — Autopsy of a FedEx phishing kit</title><link>https://blog.aksnk.com/posts/colisrelay-regularisation-phishing-autopsie/</link><pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate><guid>https://blog.aksnk.com/posts/colisrelay-regularisation-phishing-autopsie/</guid><description>&lt;blockquote&gt;
&lt;p&gt;This note and the investigation it builds on were carried out by &lt;strong&gt;Sinclair M.&lt;/strong&gt; and &lt;strong&gt;Axel K.&lt;/strong&gt;, students in the Intelligence and Cyberthreats major at Oteria. The article is available on &lt;a href="https://sinclair-moulager.com"&gt;sinclair-moulager.com&lt;/a&gt; and &lt;a href="https://blog.aksnk.com"&gt;blog.aksnk.com&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;figure&gt;&lt;img src="https://blog.aksnk.com/images/colisrelay/1_poisson.png"
 alt="Symbolic illustration of phishing"&gt;
&lt;/figure&gt;

&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Phishing is a technique that consists in tricking a victim by impersonating a legitimate source in order to harvest personal — sometimes sensitive — information.&lt;/p&gt;
&lt;p&gt;In 2026, it has become relevant to talk about a &lt;strong&gt;phishing ecosystem&lt;/strong&gt;, a notion echoed for example by &lt;a href="https://fr.flare.io/learn/resources/phishing-kits-economy-cybercrime"&gt;Flare&lt;/a&gt;, which describes &lt;em&gt;&amp;ldquo;a mature underground industry&amp;rdquo;&lt;/em&gt; made up of specialised actors who have moved phishing from a &lt;em&gt;&amp;ldquo;simple technique&amp;rdquo;&lt;/em&gt; to a &lt;em&gt;&amp;ldquo;service&amp;rdquo;&lt;/em&gt;.&lt;/p&gt;</description></item><item><title>Storm-1516 — Anatomy of the Russian Information Operation</title><link>https://blog.aksnk.com/posts/storm-1516-mode-operatoire-informationnel-russe/</link><pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate><guid>https://blog.aksnk.com/posts/storm-1516-mode-operatoire-informationnel-russe/</guid><description>&lt;h2 id="context-and-scope-of-the-report"&gt;Context and scope of the report&lt;/h2&gt;
&lt;p&gt;Against a backdrop of war returning to Europe and the intensification of foreign hybrid operations targeting Western democracies, France set up &lt;strong&gt;VIGINUM&lt;/strong&gt; in 2021. Placed under the authority of the SGDSN&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;, the service is tasked with detecting, qualifying, and documenting foreign digital interference threatening the integrity of public debate.&lt;/p&gt;
&lt;p&gt;In May 2025, VIGINUM published an analysis of the Russian information operation &lt;strong&gt;Storm-1516&lt;/strong&gt;, active since at least August 2023. The report describes its main characteristics and the risks it poses to French-speaking and European information spaces.&lt;/p&gt;</description></item></channel></rss>