OP_1

OPERATIONAL OVERVIEW // SESSION_8842

COMMAND CENTER

Lat/Long

47.3769° N, 8.5417° E

Timestamp

2026-03-21 T 00:13:27.8Z

radar

ATTACK SURFACE DISCOVERY

EXPOSED ASSETS

1,402

DNS ANOMALIES

14

SCAN_ACTIVE: 94.22.108.XX/24

NETWORK TOPOLOGY VISUALIZATION

RENDER_ENGINE: SPATIAL_CIPHER_V2
visibility

DARK WEB MONITORING

[21:04:12] LEAKED_CREDENTIALS

DOMAIN: health-node.ch

DB Dump: 4.2k entries found in BREACH_X

[20:58:44] FORUM_CHATTER

USER: x0_dark_phantom

Selling zero-day for specific Swiss industrial gateway...

[20:42:01] LEAKED_CREDENTIALS

DOMAIN: global-fin.ch

Hash format: BCrypt - Severity: High

[19:12:33] CRITICAL_ALERT

DOMAIN: CIPHER_PROX_01

Brute force detected on admin endpoint

[18:04:12] FORUM_CHATTER

USER: Dread_Market

Ransomware group recruiting operators in DACH region

fingerprint

THREAT ACTOR TRACKING

2 ACTIVE PROFILES
person_off

LAZARUS GROUP

CRITICAL

ORIGIN: DPRK | TARGETS: FINANCE, ENERGY

Activity Heatmap (7D)

person_off

APT28 (FANCY BEAR)

HIGH

ORIGIN: RU | TARGETS: GOV, DEFENSE

Activity Heatmap (7D)

security

VULNERABILITY INTELLIGENCE

CVE-IDCVSS SCOREEXPLOITABILITYREMEDIATION STATUS
CVE-2024-340010.0CRITICAL / PUBLIC EXPLOIT
UNPATCHED
CVE-2023-458668.1HIGH / POCC AVAILABLE
IN_PROGRESS
CVE-2024-218879.1CRITICAL / WEAPONIZED
UNPATCHED
CVE-2024-29847.5MEDIUM / NO EXPLOIT
PENDING_TRIAGE
CVE-2023-64486.8MEDIUM / THEORETICAL
RESOLVED

Network Nodes

12,402

hub

Data Ingress

2.4 GB/s

download

Active Threats

42

warning

Swiss Core Load

14%

memory