An image of the WRAITH logo and the Threat Report for May 2026

WRAITH Threat Report | Enterprise Edition | May 2026

From Initial Access to Impact: What This Month’s Attacks Reveal

Your board wants to know if you could withstand a targeted attack. Your SOC is managing an alert backlog. Your last red team report is already three months old.

 

This is the reality for most enterprise security leaders. Accountable for resilience every hour of the day, but validating it at fixed points in time.

 

We are launching the WRAITH Monthly Threat Report to address exactly that. Each month we examine real intrusions, identify the patterns that connect them, and draw out what they mean for how mature organisations test and defend against real-world attacks.

 

This month, three cases stood out. The patterns across them are worth exploring.

This Month’s Real-World Cases

Case 1: Apache ActiveMQ Exploit Leads to LockBit Ransomware

 

Implication: Eviction is not the same as remediation. When an attacker leaves, what they found does not leave with them. Credentials, mapped environments and identified weaknesses persist long after the incident is closed. For security teams focused on closing the immediate incident, this case is a reminder that the clock does not reset when the attacker disappears.

 

Case 2: Cat’s Got Your Files, Lynx Ransomware

Implication: This attack did not start with a vulnerability. It started with a username and a password. For organisations investing heavily in perimeter controls and patch management, this case highlights a harder question: how well do you understand who has valid access to your environment, and what they could do with it? Identity is not a secondary concern. In many attacks, it is the primary entry point.

Case 3: From a Single Click: Lunar Spider and a Near Two-Month Intrusion

 

Implication: This case challenges a common assumption. If nothing has visibly broken, nothing is wrong. Nearly two months of undetected access is not unusual for organised threat groups operating with patience and clear objectives. For security teams whose detection capability has only ever been tested in scheduled exercises, this raises a practical question: would you know if someone was already in your environment right now?

 

Key Patterns Across This Month’s Attacks

Three cases. Three different entry points. The same underlying behaviours running through all of them.

These are not isolated incidents or edge cases. They are consistent patterns observed across different threat groups, different sectors and different entry points.

Attackers behave like operators, not scripts.

Why This Matters for Enterprise Security Teams

Most enterprise organisations invest in penetration testing, red team engagements and vulnerability scanning. These are valuable. But they share a fundamental limitation. They are point-in-time.

 

A penetration test tells you what your environment looked like during a defined window. A red team engagement ends when the clock runs out, often before the full impact of access has been explored. A vulnerability scan identifies weaknesses in isolation, without showing how they combine into a real attack path.

 

Consider what that means against the cases above.

This is not a criticism of those tools. They serve a purpose. But they were not designed to validate how an organisation performs under sustained, adaptive pressure. And that is precisely what the cases above represent.

 

The question is no longer simply “are we vulnerable?” It is: “how would we perform under sustained attack?”

How WRAITH Addresses This

The answer is not more testing. It is different testing. Most continuous security testing platforms rely on automated scans. Useful for finding known vulnerabilities, but not for uncovering the kinds of risks described above.

 

WRAITH is human-led. Experienced red team operators work continuously against your environment, adapting in real time like a genuine attacker would. Campaigns are unannounced, intelligence-led and evolve based on what operators uncover over weeks and months.

 

That matters because the most dangerous attack patterns cannot be replicated by automation. Patience cannot be scripted. Neither can the judgement to know when to move, when to wait and when to stay quiet. The result is a clear, evidence-based view of how your organisation would perform under sustained attack, across identity, lateral movement, detection and response.

 

The most dangerous attacks are not the ones that hit fast. They are the ones that stay.

Contact us..

Related Articles