{
	"id": "2ad49a5b-edb0-459d-b7c4-cca4b3d1343c",
	"created_at": "2026-04-06T00:14:15.870206Z",
	"updated_at": "2026-04-10T13:12:42.92555Z",
	"deleted_at": null,
	"sha1_hash": "38e4ca33a91e9e5e55777e968bbd10c55456d3dc",
	"title": "Secure Communications Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 86645,
	"plain_text": "Secure Communications Blog\r\nBy BlackBerry\r\nArchived: 2026-04-02 12:31:09 UTC\r\nRecommended Reading\r\nBlackBerry Secure Communications Blog\r\nFeb 19, 2026·Articles\r\nThe Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations\r\nMission-certified communications deliver secure, unified support in high-stakes operations.\r\nFeb 11, 2026·Articles\r\nBlackBerry UEM in Action: How BlackBerry UEM Enables Trusted Mobile Operations Across\r\nthe German Federal Government\r\nBlackBerry UEM delivers trusted, compliant device management in Germany.\r\nJan 08, 2026·Articles\r\nSecure Communications in 2026: Predictions About How Trust Will Be Owned, Proven, and\r\nDefended\r\nWhy 2026 marks a break in secure communications: quantum readiness, metadata risk, verified identity, and\r\ndefense‑grade control redefine trust.\r\nFILTER ALL THE LATEST INSIGHTS\r\nShowing 9 results of 210\r\nShowing 9 results of 210\r\nMar 23, 2026Articles\r\nhttps://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries\r\nPage 1 of 3\n\nIntroducing the BlackBerry AtHoc Command Center: A Unified Workspace for Coordinated\r\nOperations\r\nStreamlining real-time awareness and coordinated response.\r\nMar 17, 2026Articles\r\nThe New BlackBerry Work: Making Devices Smarter with Enterprise AI\r\nBlackBerry Work Smart Tools offer productivity without compromise.\r\nMar 11, 2026Articles\r\nEncryption Alone Is Not a Security Strategy\r\nConsumer apps lack identity and device controls, risking sensitive data.\r\nMar 10, 2026Articles\r\nThe Latest Security Vulnerability Exploit Doesn't Break Your Encryption. It Bypasses It.\r\nA zero-day vulnerability exploit shows device compromises can bypass encryption entirely.\r\nFeb 19, 2026Articles\r\nThe Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations\r\nMission-certified communications deliver secure, unified support in high-stakes operations.\r\nFeb 11, 2026Articles\r\nBlackBerry UEM in Action: How BlackBerry UEM Enables Trusted Mobile Operations Across\r\nthe German Federal Government\r\nBlackBerry UEM delivers trusted, compliant device management in Germany.\r\nhttps://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries\r\nPage 2 of 3\n\nJan 13, 2026Articles\r\nVoices Under Siege: The New Frontline of Secure Communications\r\nCyber threats have moved to mobile communications, where identity, metadata exposure, and AI impersonation\r\nundermine trust.\r\nJan 8, 2026Articles\r\nSecure Communications in 2026: Predictions About How Trust Will Be Owned, Proven, and\r\nDefended\r\nWhy 2026 marks a break in secure communications: quantum readiness, metadata risk, verified identity, and\r\ndefense‑grade control redefine trust.\r\nDec 23, 2025Articles\r\nWhen Systems Fail: Resilience, Sovereignty, and Secure Communications\r\nA global cloud outage revealed the limits of centralized redundancy, underscoring that true operational resilience\r\nrequires sovereign communications.\r\nLoad more\r\nSource: https://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries\r\nhttps://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia",
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries"
	],
	"report_names": [
		"unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries"
	],
	"threat_actors": [
		{
			"id": "555e2cac-931d-4ad4-8eaa-64df6451059d",
			"created_at": "2023-01-06T13:46:39.48103Z",
			"updated_at": "2026-04-10T02:00:03.342729Z",
			"deleted_at": null,
			"main_name": "RomCom",
			"aliases": [
				"UAT-5647",
				"Storm-0978"
			],
			"source_name": "MISPGALAXY:RomCom",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "d58052ba-978b-4775-985a-26ed8e64f98c",
			"created_at": "2023-09-07T02:02:48.069895Z",
			"updated_at": "2026-04-10T02:00:04.946879Z",
			"deleted_at": null,
			"main_name": "Tropical Scorpius",
			"aliases": [
				"DEV-0978",
				"RomCom",
				"Storm-0671",
				"Storm-0978",
				"TA829",
				"Tropical Scorpius",
				"UAC-0180",
				"UNC2596",
				"Void Rabisu"
			],
			"source_name": "ETDA:Tropical Scorpius",
			"tools": [
				"COLDDRAW",
				"Cuba",
				"Industrial Spy",
				"PEAPOD",
				"ROMCOM",
				"ROMCOM RAT",
				"SingleCamper",
				"SnipBot"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434455,
	"ts_updated_at": 1775826762,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/38e4ca33a91e9e5e55777e968bbd10c55456d3dc.pdf",
		"text": "https://archive.orkl.eu/38e4ca33a91e9e5e55777e968bbd10c55456d3dc.txt",
		"img": "https://archive.orkl.eu/38e4ca33a91e9e5e55777e968bbd10c55456d3dc.jpg"
	}
}