C2-as-a-service with APTs as the customers. Cyberespionage activity by Indian APTs. Gamers under attack. StarLink limits Ukrainian access to its systems. The EU levies new sanctions against \u201cdigital information manipulation.\u201d Ukraine's Security Service takes down money-laundering exchanges. Ben Yelin unpacks fediverse security risks. Our guests are Mike Marty, CEO of The Retired Investigators Guild, & Tom Brennan, executive director of CREST, discussing their efforts on cybercrime investigation and cold case resolution. And Nozomi's OT IoT security report, sees a lot of opportunistic, low-grade whacking at industrial organizations.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/145\n\nSelected reading.\nCloudzy with a Chance of Ransomware: Unmasking Command-and-Control Providers (C2Ps) (Halcyon)\xa0\nAPT Bahamut Targets Individuals with Android Malware Using Spear Messaging - CYFIRMA (CYFIRMA)\xa0\nHackers steal Signal, WhatsApp user data with fake Android chat app (BleepingComputer)\nPatchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor (The Hacker News)\nHackers exploit BleedingPipe RCE to target Minecraft servers, players (BleepingComputer)\xa0\nCall of Duty Self-Spreading Worm Takes Aim at Player Lobbies (Dark Reading)\xa0\nCall of Duty worm malware used to hack players exploits years-old bug \xa0(TechCrunch)\xa0\nElon Musk 'refuses to turn on Starlink' for Crimea drone attack (The Telegraph)\nHow Elon Musk Was Able to Exert Control in Ukraine War (The Street)\nEU strikes Russia again as digital infowar rages on (Cybernews)\xa0\nUkraine Cracks Down on Illicit Financing Network (Gov Info Security)\xa0\nUnpacking the OT & IoT Threat Landscape with Unique Telemetry Data (Nozomi Networks)\xa0\nChina's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure (Dark Reading)\nLearn more about your ad choices. Visit megaphone.fm/adchoices