{
	"id": "d2889264-7757-4893-971d-c471260cd269",
	"created_at": "2026-04-06T00:21:06.346388Z",
	"updated_at": "2026-04-10T03:34:59.947402Z",
	"deleted_at": null,
	"sha1_hash": "ada1cd65aa7a6196298a5e975d3b31099c036ad8",
	"title": "Secure Communications Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 86288,
	"plain_text": "Secure Communications Blog\r\nBy BlackBerry\r\nArchived: 2026-04-05 18:07:53 UTC\r\nRecommended Reading\r\nBlackBerry Secure Communications Blog\r\nFeb 19, 2026·Articles\r\nThe Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations\r\nMission-certified communications deliver secure, unified support in high-stakes operations.\r\nFeb 11, 2026·Articles\r\nBlackBerry UEM in Action: How BlackBerry UEM Enables Trusted Mobile Operations Across\r\nthe German Federal Government\r\nBlackBerry UEM delivers trusted, compliant device management in Germany.\r\nJan 08, 2026·Articles\r\nSecure Communications in 2026: Predictions About How Trust Will Be Owned, Proven, and\r\nDefended\r\nWhy 2026 marks a break in secure communications: quantum readiness, metadata risk, verified identity, and\r\ndefense‑grade control redefine trust.\r\nFILTER ALL THE LATEST INSIGHTS\r\nShowing 9 results of 210\r\nShowing 9 results of 210\r\nMar 23, 2026Articles\r\nhttps://blogs.blackberry.com/en/2020/11/the-costaricto-campaign-cyber-espionage-outsourced\r\nPage 1 of 3\n\nIntroducing the BlackBerry AtHoc Command Center: A Unified Workspace for Coordinated\r\nOperations\r\nStreamlining real-time awareness and coordinated response.\r\nMar 17, 2026Articles\r\nThe New BlackBerry Work: Making Devices Smarter with Enterprise AI\r\nBlackBerry Work Smart Tools offer productivity without compromise.\r\nMar 11, 2026Articles\r\nEncryption Alone Is Not a Security Strategy\r\nConsumer apps lack identity and device controls, risking sensitive data.\r\nMar 10, 2026Articles\r\nThe Latest Security Vulnerability Exploit Doesn't Break Your Encryption. It Bypasses It.\r\nA zero-day vulnerability exploit shows device compromises can bypass encryption entirely.\r\nFeb 19, 2026Articles\r\nThe Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations\r\nMission-certified communications deliver secure, unified support in high-stakes operations.\r\nFeb 11, 2026Articles\r\nBlackBerry UEM in Action: How BlackBerry UEM Enables Trusted Mobile Operations Across\r\nthe German Federal Government\r\nBlackBerry UEM delivers trusted, compliant device management in Germany.\r\nhttps://blogs.blackberry.com/en/2020/11/the-costaricto-campaign-cyber-espionage-outsourced\r\nPage 2 of 3\n\nJan 13, 2026Articles\r\nVoices Under Siege: The New Frontline of Secure Communications\r\nCyber threats have moved to mobile communications, where identity, metadata exposure, and AI impersonation\r\nundermine trust.\r\nJan 8, 2026Articles\r\nSecure Communications in 2026: Predictions About How Trust Will Be Owned, Proven, and\r\nDefended\r\nWhy 2026 marks a break in secure communications: quantum readiness, metadata risk, verified identity, and\r\ndefense‑grade control redefine trust.\r\nDec 23, 2025Articles\r\nWhen Systems Fail: Resilience, Sovereignty, and Secure Communications\r\nA global cloud outage revealed the limits of centralized redundancy, underscoring that true operational resilience\r\nrequires sovereign communications.\r\nLoad more\r\nSource: https://blogs.blackberry.com/en/2020/11/the-costaricto-campaign-cyber-espionage-outsourced\r\nhttps://blogs.blackberry.com/en/2020/11/the-costaricto-campaign-cyber-espionage-outsourced\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"MISPGALAXY",
		"Malpedia",
		"MITRE"
	],
	"references": [
		"https://blogs.blackberry.com/en/2020/11/the-costaricto-campaign-cyber-espionage-outsourced"
	],
	"report_names": [
		"the-costaricto-campaign-cyber-espionage-outsourced"
	],
	"threat_actors": [
		{
			"id": "c72c09b8-81ba-4e6e-9094-cd84ee4bda79",
			"created_at": "2022-10-25T15:50:23.667393Z",
			"updated_at": "2026-04-10T02:00:05.344613Z",
			"deleted_at": null,
			"main_name": "CostaRicto",
			"aliases": [
				"CostaRicto"
			],
			"source_name": "MITRE:CostaRicto",
			"tools": [
				"PowerSploit",
				"SombRAT",
				"PsExec",
				"PS1",
				"CostaBricks"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "b77f9b40-dca7-449d-819e-115cd2295b41",
			"created_at": "2022-10-25T16:07:23.502671Z",
			"updated_at": "2026-04-10T02:00:04.63173Z",
			"deleted_at": null,
			"main_name": "CostaRicto",
			"aliases": [],
			"source_name": "ETDA:CostaRicto",
			"tools": [
				"CostaBricks",
				"PowerSploit",
				"PsExec",
				"SombRAT",
				"nmap"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "115cf618-02a8-42b8-8d25-305292eafedb",
			"created_at": "2023-11-21T02:00:07.396534Z",
			"updated_at": "2026-04-10T02:00:03.478259Z",
			"deleted_at": null,
			"main_name": "CostaRicto",
			"aliases": [],
			"source_name": "MISPGALAXY:CostaRicto",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434866,
	"ts_updated_at": 1775792099,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ada1cd65aa7a6196298a5e975d3b31099c036ad8.pdf",
		"text": "https://archive.orkl.eu/ada1cd65aa7a6196298a5e975d3b31099c036ad8.txt",
		"img": "https://archive.orkl.eu/ada1cd65aa7a6196298a5e975d3b31099c036ad8.jpg"
	}
}