“Sometimes,” explains Sood, “unexpected trade deals happen between nations, involving billions and billions of dollars in import or export. There’s a lot of money to be made for a nation’s economy through trade. India, for example, is raising its defense budget by 4% this year, and there are many nations that would like to know what they intend to do with the money.”Aryaka’s analysis of the Persistence Tribe campaigns serves two purposes. Firstly, it provides deep analytical insight into the type of tools used in this new global trade war, and secondly it highlights that politically adversarial nation states are no longer the primary ‘enemy’. Friendly nations will increasingly target other friendly countries and their potential rival companies seeking nothing more (nor less) than economic advantage in trade and tariff wars.The combination of nation state attacks caused by the continuing geo-political tensions together with growing economic attacks from elite groups such as Persistence Tribe, suggests we can expect more nation state attacks in the future. And the analyses of the GETA, ARES, and DESK RATs, with their focus on persistence and stealth, highlights the difficulties cybersecurity practitioners will face in the future.Related:Cyber Insights 2026: Cyberwar and Rising Nation State ThreatsRelated:Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android DevicesRelated:‘Stanley’ Malware Toolkit Enables Phishing via Website SpoofingRelated:Hugging Face Abused to Deploy Android RAT
Aryaka’s analysis of the Persistence Tribe campaigns serves two purposes. Firstly, it provides deep analytical insight into the type of tools used in this new global trade war, and secondly it highlights that politically adversarial nation states are no longer the primary ‘enemy’. Friendly nations will increasingly target other friendly countries and their potential rival companies seeking nothing more (nor less) than economic advantage in trade and tariff wars.The combination of nation state attacks caused by the continuing geo-political tensions together with growing economic attacks from elite groups such as Persistence Tribe, suggests we can expect more nation state attacks in the future. And the analyses of the GETA, ARES, and DESK RATs, with their focus on persistence and stealth, highlights the difficulties cybersecurity practitioners will face in the future.Related:Cyber Insights 2026: Cyberwar and Rising Nation State ThreatsRelated:Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android DevicesRelated:‘Stanley’ Malware Toolkit Enables Phishing via Website SpoofingRelated:Hugging Face Abused to Deploy Android RAT
The combination of nation state attacks caused by the continuing geo-political tensions together with growing economic attacks from elite groups such as Persistence Tribe, suggests we can expect more nation state attacks in the future. And the analyses of the GETA, ARES, and DESK RATs, with their focus on persistence and stealth, highlights the difficulties cybersecurity practitioners will face in the future.Related:Cyber Insights 2026: Cyberwar and Rising Nation State ThreatsRelated:Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android DevicesRelated:‘Stanley’ Malware Toolkit Enables Phishing via Website SpoofingRelated:Hugging Face Abused to Deploy Android RAT
Related:Cyber Insights 2026: Cyberwar and Rising Nation State ThreatsRelated:Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android DevicesRelated:‘Stanley’ Malware Toolkit Enables Phishing via Website SpoofingRelated:Hugging Face Abused to Deploy Android RAT
Related:Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android DevicesRelated:‘Stanley’ Malware Toolkit Enables Phishing via Website SpoofingRelated:Hugging Face Abused to Deploy Android RAT
Related:‘Stanley’ Malware Toolkit Enables Phishing via Website SpoofingRelated:Hugging Face Abused to Deploy Android RAT
Related:Hugging Face Abused to Deploy Android RAT
Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.
Attendees will walk away with guidance for how to build robust identity defenses, unify them under a consistent security model, and ensure business operations move quickly without compromise.
SecurityWeek’s 2026 Ransomware Summit will discuss a roadmap for defending the enterprise, from mitigating root causes to mastering recovery, giving security teams the critical insights needed to navigate and neutralize today’s ransomware extortion threats.
Source: SecurityWeek