{
	"id": "3c9149ad-24de-4919-9e16-8db70fbcb232",
	"created_at": "2026-04-06T00:21:02.581441Z",
	"updated_at": "2026-04-10T03:35:20.32864Z",
	"deleted_at": null,
	"sha1_hash": "2eb74f8727ef32926863b1cb24be90dd92f503e3",
	"title": "Secure Communications Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 86227,
	"plain_text": "Secure Communications Blog\r\nBy BlackBerry\r\nArchived: 2026-04-05 16:32:31 UTC\r\nRecommended Reading\r\nBlackBerry Secure Communications Blog\r\nFeb 19, 2026·Articles\r\nThe Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations\r\nMission-certified communications deliver secure, unified support in high-stakes operations.\r\nFeb 11, 2026·Articles\r\nBlackBerry UEM in Action: How BlackBerry UEM Enables Trusted Mobile Operations Across\r\nthe German Federal Government\r\nBlackBerry UEM delivers trusted, compliant device management in Germany.\r\nJan 08, 2026·Articles\r\nSecure Communications in 2026: Predictions About How Trust Will Be Owned, Proven, and\r\nDefended\r\nWhy 2026 marks a break in secure communications: quantum readiness, metadata risk, verified identity, and\r\ndefense‑grade control redefine trust.\r\nFILTER ALL THE LATEST INSIGHTS\r\nShowing 9 results of 210\r\nShowing 9 results of 210\r\nMar 23, 2026Articles\r\nhttps://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia\r\nPage 1 of 3\n\nIntroducing the BlackBerry AtHoc Command Center: A Unified Workspace for Coordinated\r\nOperations\r\nStreamlining real-time awareness and coordinated response.\r\nMar 17, 2026Articles\r\nThe New BlackBerry Work: Making Devices Smarter with Enterprise AI\r\nBlackBerry Work Smart Tools offer productivity without compromise.\r\nMar 11, 2026Articles\r\nEncryption Alone Is Not a Security Strategy\r\nConsumer apps lack identity and device controls, risking sensitive data.\r\nMar 10, 2026Articles\r\nThe Latest Security Vulnerability Exploit Doesn't Break Your Encryption. It Bypasses It.\r\nA zero-day vulnerability exploit shows device compromises can bypass encryption entirely.\r\nFeb 19, 2026Articles\r\nThe Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations\r\nMission-certified communications deliver secure, unified support in high-stakes operations.\r\nFeb 11, 2026Articles\r\nBlackBerry UEM in Action: How BlackBerry UEM Enables Trusted Mobile Operations Across\r\nthe German Federal Government\r\nBlackBerry UEM delivers trusted, compliant device management in Germany.\r\nhttps://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia\r\nPage 2 of 3\n\nJan 13, 2026Articles\r\nVoices Under Siege: The New Frontline of Secure Communications\r\nCyber threats have moved to mobile communications, where identity, metadata exposure, and AI impersonation\r\nundermine trust.\r\nJan 8, 2026Articles\r\nSecure Communications in 2026: Predictions About How Trust Will Be Owned, Proven, and\r\nDefended\r\nWhy 2026 marks a break in secure communications: quantum readiness, metadata risk, verified identity, and\r\ndefense‑grade control redefine trust.\r\nDec 23, 2025Articles\r\nWhen Systems Fail: Resilience, Sovereignty, and Secure Communications\r\nA global cloud outage revealed the limits of centralized redundancy, underscoring that true operational resilience\r\nrequires sovereign communications.\r\nLoad more\r\nSource: https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia\r\nhttps://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia",
		"ETDA"
	],
	"references": [
		"https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia"
	],
	"report_names": [
		"blind-eagle-apt-c-36-targets-colombia"
	],
	"threat_actors": [
		{
			"id": "98b22fd7-bf1b-41a6-b51c-0e33a0ffd813",
			"created_at": "2022-10-25T15:50:23.688973Z",
			"updated_at": "2026-04-10T02:00:05.390055Z",
			"deleted_at": null,
			"main_name": "APT-C-36",
			"aliases": [
				"APT-C-36",
				"Blind Eagle"
			],
			"source_name": "MITRE:APT-C-36",
			"tools": [
				"Imminent Monitor"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "be597b07-0cde-47bc-80c3-790a8df34af4",
			"created_at": "2022-10-25T16:07:23.407484Z",
			"updated_at": "2026-04-10T02:00:04.58656Z",
			"deleted_at": null,
			"main_name": "Blind Eagle",
			"aliases": [
				"APT-C-36",
				"APT-Q-98",
				"AguilaCiega",
				"G0099"
			],
			"source_name": "ETDA:Blind Eagle",
			"tools": [
				"AsyncRAT",
				"BitRAT",
				"Bladabindi",
				"BlotchyQuasar",
				"Imminent Monitor",
				"Imminent Monitor RAT",
				"Jorik",
				"LimeRAT",
				"Remcos",
				"RemcosRAT",
				"Remvio",
				"Socmer",
				"Warzone",
				"Warzone RAT",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "bd43391b-b835-4cb3-839a-d830aa1a3410",
			"created_at": "2023-01-06T13:46:38.925525Z",
			"updated_at": "2026-04-10T02:00:03.147197Z",
			"deleted_at": null,
			"main_name": "APT-C-36",
			"aliases": [
				"Blind Eagle"
			],
			"source_name": "MISPGALAXY:APT-C-36",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434862,
	"ts_updated_at": 1775792120,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2eb74f8727ef32926863b1cb24be90dd92f503e3.pdf",
		"text": "https://archive.orkl.eu/2eb74f8727ef32926863b1cb24be90dd92f503e3.txt",
		"img": "https://archive.orkl.eu/2eb74f8727ef32926863b1cb24be90dd92f503e3.jpg"
	}
}