Back to News
Security NewsHighIncidentunauthorized access

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

UnknownMar 3, 2026(16 days ago)

Threat actors impersonated IT support to deploy Havoc C2 framework, potentially leading to data exfiltration or ransomware attacks across multiple organizations.

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from

Related News

Get Personalized Alerts

Track vendors and receive alerts when security incidents affect your supply chain.

What We Monitor

Security Incidents

Data breaches, ransomware, and unauthorized access

Vulnerabilities

CVEs and vendor security advisories

Compliance Updates

Regulatory changes and certification news

Legal News

Privacy laws and enforcement actions

Vendor Directory

Browse our directory of SaaS vendors with security documentation and compliance information.