Alan Grant | SOC Analyst | 2 February 2026
Welcome to Fortian’s January 2026 cyber environment update!
January 2026 highlighted how closely cyber activity continues to track broader political, economic and social pressures. State-linked cyber operations tied to conflict in Europe and domestic unrest in Iran remained prominent, while long-running espionage activity against government and telecommunications environments continued to surface. At the same time, cybercriminal groups continued to demonstrate how effective social engineering and identity abuse have become, enabling large-scale data theft without the need for sophisticated technical exploits.
Rising European geopolitical tensions and cyber risk. The broader geopolitical landscape in Europe, particularly in the context of Russia’s ongoing war in Ukraine and an intensification of hybrid threat activity, continues to elevate cyber-related risks across the region. State-aligned hacking groups and their proxies are operating in an environment where offensive cyber activity is being used to exert pressure without crossing conventional military thresholds, driving heightened defensive postures among EU and NATO members and prompting renewed strategic focus on active cyber defence and deterrence.
Iranian Cyber Activity Intensifies Amid Domestic Unrest. In January 2026, researchers reported a suspected Iran-linked cyber espionage campaign, dubbed RedKitten, targeting human rights organisations and individuals documenting protest activity and alleged abuses inside Iran. The campaign emerged against a backdrop of sustained domestic unrest, heavy security crackdowns, and renewed restrictions on internet and communications access, as authorities sought to control information flows and suppress dissent. Rather than focusing on financial gain, the activity appears aimed at surveillance, intimidation and intelligence collection, consistent with Iran’s historical use of cyber operations to monitor activists and diaspora groups during periods of internal instability. (The Hacker News)
Salt Typhoon and the UK. Reporting in late January suggests that suspected China-linked actors associated with the “Salt Typhoon” campaign conducted a long-running espionage operation that extended beyond US telecommunications providers and into the UK government, with phones used by Downing Street staff allegedly compromised over several years. The campaign reported provided access to messages and metadata, but also, alarmingly, the reported ability intercept and record phone calls on demand, signalling a level of access that would enable real-time intelligence collection against senior political decision-makers. UK authorities have been notably circumspect in their public commentary, neither fully confirming nor detailing the scope of the compromise, while Chinese officials have categorically denied involvement. (Telegraph)
EU Moves to Phase Out “High-Risk” Technology Suppliers. The European Commission has proposed revisions to the EU Cybersecurity Act that would enable the phased removal of “high-risk” technology suppliers from critical infrastructure across 18 sectors. Although no companies were explicitly named, the proposal is widely understood to target Chinese vendors. Under the plan, mobile operators would have up to 36 months to remove affected components after a high-risk supplier list is finalised, with similar timelines expected for fixed and satellite networks. If adopted, the changes are likely to further accelerate global technology decoupling and raise compliance and assurance expectations for organisations operating in or supplying into Europe.
Huawei and China’s foreign ministry have strongly criticised the proposal, describing it as protectionist and legally questionable under World Trade Organisation principles. Industry groups have warned that compliance could cost billions of euros. The proposal still requires negotiation with EU member states and the European Parliament before becoming law. (Reuters)
ShinyHunters expands attack campaigns. January 2026, the ShinyHunters cybercrime group significantly escalated its extortion-led data theft campaigns, leaning heavily on social engineering and identity-layer compromise rather than software exploits.
These developments reinforce a broader shift toward high-impact social engineering and identity abuse, where compromising the enterprise identity plane provides scalable access to SaaS ecosystems and large, monetisable data sets.
IPIDEA disruption. Google’s Threat Intelligence Group has disrupted a major residential proxy network known as IPIDEA, which routed internet traffic through large numbers of consumer devices to help cybercriminals and other actors hide the origin of malicious activity.
Russian Anonymous Marketplace (RAMP) disruption. Federal law enforcement, including the FBI and Department of Justice, seized both clearnet and dark-web domains of the Russian Anonymous Marketplace (RAMP), a major cybercrime forum used by ransomware affiliates, malware developers and initial access brokers. The domain now redirects to official seizure notices, disrupting an important underground marketplace, though historical patterns suggest that new forums will quickly emerge to replace it. (Bleeping computer)
ASIC Key Issues Outlook. In its Key Issues Outlook 2026 published on 27 January, the Australian Securities and Investments Commission (ASIC) outlined some of the major shifts shaping Australia’s financial system and highlighted that, amongst other issues, cyber-attacks, data breaches, and weaknesses in operational resilience and crisis management now pose material risks to market confidence and consumer protection. (ASIC)
Victorian Department of Education. All Victorian government schools and their students have been impacted by a breach of a Department of Education student database accessed via a compromised school network. Exposed data is understood to include student names, school-issued email addresses, encrypted passwords, school names, and year levels. The Department has initiated mass password resets, notified schools, temporarily disabled affected systems, and engaged cyber experts and government agencies. Authorities state there is no evidence the data has been publicly released. (ITNews)
Prosura. Prosura, an Australian rental-car excess insurer, confirmed attackers breached its internal systems, exfiltrated customer data, and are now selling records linked to approximately 300,000 individuals. Exposed information reportedly includes personal details, policy data, and identity documents, creating elevated risk of identity theft, phishing, and fraud. Customer portals were taken offline, and regulators were notified. (Cyber News Centre)
Regis Resources. Regis Resources confirmed a cyber intrusion after a subsidiary appeared on the Lynx ransomware group’s leak site. A forensic investigation reportedly found no evidence of data exfiltration, no ransom demand, and no operational or commercial impact. Authorities have been notified. (Cyber Daily)
n8n Workflow Automation Platform RCE
VMware vCenter Server Heap Overflow
Fortinet FortiCloud SSO Authentication Bypass Added to KEV
The ShinyHunters activity seen in January reinforces that many high-impact breaches now stem from social engineering and identity abuse rather than technical vulnerabilities. By tricking staff into approving or handing over SSO access, attackers can gain legitimate entry that bypasses traditional security controls.
For Australian organisations, this highlights the growing concentration of risk in identity platforms and SaaS ecosystems. A single compromised account can provide broad access across cloud services, customer data and internal systems, turning what appears to be a low-level incident into a material breach, particularly where staff are not well prepared to recognise social engineering.
The campaign also demonstrates the limits of MFA when vishing and helpdesk manipulation are in play.
Australian organisations should focus on both strong identity monitoring with targeted training and awareness for high-risk roles, checking escalation pathways for unusual access requests, and regular testing of access and support workflows against realistic social engineering scenarios.
Request a consultation with one of our security specialists today or sign up to receive our monthly newsletter via email.
Get in touch Sign up!