[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f6tHYUZeaQbZxx1YoDdYDmKd7WFM9gepikuZiHAc4z3o":3},{"article":4,"iocs":44},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":24,"category":25,"article_tags":28},"f6ef6afd-0a14-41b1-bad9-bb1ef8356f3a","⚠️ A Russian-speaking threat actor group is recruiting an Initial Access Broker (IAB) to supply c...","a-russian-speaking-threat-actor-group-is-recruiting-an-initial-access-broker-iab-2b4c69","⚠️ A Russian-speaking threat actor group is recruiting an Initial Access Broker (IAB) to supply corporate network access on an ongoing basis. The group advertises that they operate \"by date, without a locker,\" meaning they exfiltrate data and extort victims without deploying https:\u002F\u002Ft.co\u002Firfr1bBExY","A Russian-speaking threat actor group is actively recruiting an Initial Access Broker (IAB) to provide ongoing corporate network access for data exfiltration and extortion campaigns. The group operates under a 'by date, without a locker' model, meaning they steal and extort data from victims without deploying ransomware. This represents a shift toward pure extortion-focused attacks rather than traditional ransomware deployment.","Russian-speaking threat actor recruits IAB for corporate network access without ransomware deployment.",null,"https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2049554158307680431","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHHF5nclboAAdIpR.jpg","2026-04-29T18:19:24+00:00","2026-04-29T19:00:12.724609+00:00",7,[18,21],{"name":19,"type":20},"Russian-speaking threat actor group","threat_actor",{"name":22,"type":23},"IAB recruitment campaign","campaign","e7b231c8-5f79-4465-8d38-1ef13aea5a14",{"id":24,"icon":11,"name":26,"slug":27},"Threat Intelligence","threat-intelligence",[29,34,39],{"category":30},{"id":31,"icon":11,"name":32,"slug":33},"6cbdd207-aaa1-4176-9534-e156b125e917","Nation-state","nation-state",{"category":35},{"id":36,"icon":11,"name":37,"slug":38},"7d8b5ab8-ea0b-4ced-ae97-ec251b86993a","Ransomware","ransomware",{"category":40},{"id":41,"icon":11,"name":42,"slug":43},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",[45],{"type":43,"value":46,"context":47},"without a locker","Operational model describing data exfiltration and extortion without ransomware deployment"]