The Cybersecurity Defenders Podcast

Russian cyber ops, Sygnia, Ollama & TeamPCP / Intel Chat [#293]

5 snips
Feb 16, 2026
A deep dive into Russian cyber operations targeting defense industry networks and phishing campaigns tied to the war in Ukraine. Examination of an AI-driven scam that cloned 150+ law firm websites to harvest data. Investigation into hundreds of thousands of exposed Ollama LLM hosts and the risks of tool-calling and LLM jacking. Breakdown of TeamPCP’s massive cloud compromises and worm-like propagation across 60,000+ servers.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Geopolitics Drives Targeting Of The Defense Industrial Base

  • Nation-state cyber activity is now tightly integrated with kinetic conflicts and targets the defense industrial base at both tactical and strategic levels.
  • Google GTIG documents Russia, China, North Korea and Iran using targeted phishing, mobile malware, supply-chain lures, and zero-days to reach UAV operators, frontline personnel, and contractors.
ADVICE

Scan For Cloned Law Firm Sites With Reverse Image Search

  • Proactively scan for impersonation and cloned sites using reverse image search and logo reuse checks.
  • Inspect site depth and functionality: most Signia-identified fake law firm sites had one or two pages and broken navigation.
INSIGHT

Widespread OLAMA Deployments Create An LLM Attack Surface

  • Unmanaged OLAMA deployments have created a massive exposed LLM compute surface with over 175,000 hosts globally, many lacking authentication.
  • Almost half advertise tool-calling; exposed instances enable LLM jacking and resale of compute on illicit marketplaces.
Get the Snipd Podcast app to discover more snips from this episode
Get the app