GRU operators masquerade as Ukrainian telecommunications providers. Another video game maker is compromised to spread malware. Noberus may be a successor to Darkside and BlackMatter ransomware. Robert M.\xa0Lee from Dragos explains Crown Jewel analysis. Our guest is Nathan Hunstad from Code42 with thoughts on insider risk events. Threat actors have their insider threats, too.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/183\n\nSelected reading.\nRussia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine (Recorded Future)\nRussian Cyberspies Targeting Ukraine Pose as Telecoms Providers (SecurityWeek)\nShadowy Russian Cell Phone Companies Are Cropping Up in Ukraine (WIRED)\nCISA Alert AA22-264A \u2013 Iranian state actors conduct cyber operations against the government of Albania. (CyberWire)\nIranian State Actors Conduct Cyber Operations Against the Government of Albania (CISA)\n2K Games says hacked help desk targeted players with malware (BleepingComputer)\n2K Games helpdesk hacked to spread malware to players (TechRadar)\nRockstar parent company hacked again as 2K Support sends users malware (Dexerto)\n\u2018Grand Theft Auto VI\u2019 leak is Rockstar\u2019s nightmare, YouTubers\u2019 dream (Washington Post)\nNoberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics (Symantec)\xa0\nLockBit ransomware builder leaked online by \u201cangry developer\u201d (BleepingComputer)\xa0\nLearn more about your ad choices. Visit megaphone.fm/adchoices