CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 20:30 24/02/2026 UTC
  • Malicious nx Packages Exfiltrate Credentials in 's1ngularity' Supply Chain Attack The SANDWORM_MODE campaign, a new iteration of the Shai-Hulud supply chain worm, has expanded its attack surface by leveraging 19 malicious npm packages (e.g., `claud-code`, `crypto-locale`, `secp256`) to harvest credentials, cryptocurrency keys, and API tokens. Published under aliases official334 and javaorg, the malware retains Shai-Hulud’s self-propagating capabilities while introducing novel techniques: GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation, and MCP server injection targeting AI coding assistants (Claude Code, VS Code Continue, etc.). The attack also targets LLM API keys (Anthropic, OpenAI, Mistral, etc.) and includes a polymorphic engine (currently inactive) for evasion via Ollama/DeepSeek Coder. A two-stage payload delays deeper harvesting (password managers, worm propagation) for 48+ hours, with a destructive wiper routine as a fallback. This follows the Sha1-Hulud wave (November–December 2025), which exposed 400,000 secrets across 30,000 GitHub repositories via 800+ trojanized npm packages, and the PackageGate vulnerabilities (January 2026) that bypassed npm’s `--ignore-scripts` defenses. Concurrently, unrelated but similarly severe threats include the `buildrunner-dev` and `eslint-verify-plugin` packages deploying Pulsar RAT/Mythic C2 agents, and a fake VS Code Solidity extension (`solid281`) dropping ScreenConnect or reverse shells. Researchers warn of escalating risks to developer environments, CI/CD pipelines, and AI-assisted coding tools, urging immediate credential rotation, dependency audits, and hardened access controls. Read
  • Multiple Critical Vulnerabilities in SolarWinds Web Help Desk SolarWinds has released security updates to address multiple critical vulnerabilities in SolarWinds Web Help Desk, including CVE-2025-40536, CVE-2025-40537, CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554. These vulnerabilities could result in authentication bypass and remote code execution (RCE). CVE-2025-40551 is actively exploited in attacks and has been added to CISA's KEV catalog. SolarWinds Web Help Desk is used by more than 300,000 customers worldwide, including government agencies, large corporations, healthcare organizations, and educational institutions. SolarWinds has also released security updates to patch four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. The most severe flaw, CVE-2025-40538, allows attackers with high privileges to gain root or admin permissions on vulnerable servers. These vulnerabilities include a broken access control flaw, two type confusion flaws, and an Insecure Direct Object Reference (IDOR) vulnerability. All four vulnerabilities require attackers to already have high privileges on the targeted servers. Read
  • MuddyWater Expands Campaign with MuddyViper Backdoor Targeting Israeli Entities The MuddyWater threat actor, linked to Iran and also known as Static Kitten, Mercury, and Seedworm, has conducted a global phishing campaign targeting over 100 organizations, including government entities, embassies, diplomatic missions, foreign affairs ministries, consulates, international organizations, and telecommunications firms in the Middle East and North Africa (MENA) region. The campaign used compromised email accounts to send phishing emails with malicious Microsoft Word documents containing macros that dropped and launched the Phoenix backdoor, version 4. This backdoor provided remote control over infected systems. The campaign was active starting August 19, 2025, and used a command-and-control (C2) server registered under the domain screenai[.]online. The attackers employed three remote monitoring and management (RMM) tools and a custom browser credential stealer, Chromium_Stealer. The malware and tools were hosted on a temporary Python-based HTTP service linked to NameCheap's servers. The campaign highlights the ongoing use of trusted communication channels by state-backed threat actors to evade defenses and infiltrate high-value targets. The server and server-side command-and-control (C2) component were taken down on August 24, 2025, likely indicating a new stage of the attack. The MuddyWater threat actor has also targeted Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors. The hacking group has delivered a previously undocumented backdoor called MuddyViper. The attacks also singled out one technology company based in Egypt. The attack chains involve spear-phishing and the exploitation of known vulnerabilities in VPN infrastructure to infiltrate networks and deploy legitimate remote management tools. The campaign uses a loader named Fooder that decrypts and executes the C/C++-based MuddyViper backdoor. The MuddyViper backdoor enables the attackers to collect system information, execute files and shell commands, transfer files, and exfiltrate Windows login credentials and browser data. Additionally, the MuddyWater threat actor has deployed a new backdoor called UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes. The attack chain involves using spear-phishing tactics to distribute booby-trapped Microsoft Word documents that trigger the execution of a malicious payload once macros are enabled. The phishing messages impersonate the Turkish Republic of Northern Cyprus Ministry of Foreign Affairs and purport to invite recipients to an online seminar titled "Presidential Elections and Results." The VBA script in the dropper file is equipped to conceal any sign of malicious activity by displaying a Hebrew-language decoy image from Israeli telecommunications provider Bezeq about supposed disconnection periods in the first week of November 2025 across various cities in the country. UDPGangster establishes persistence through Windows Registry modifications and boasts of various anti-analysis checks to resist efforts made by security researchers to take it apart. UDPGangster connects to an external server ("157.20.182[.]75") over UDP port 1269 to exfiltrate collected data, run commands using "cmd.exe," transmit files, update C2 server, and drop and execute additional payloads. The MuddyWater threat actor has launched a new campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. The campaign uses icon spoofing and malicious Word documents to deliver Rust-based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular post-compromise capability expansion. The RustyWater implant gathers victim machine information, detects installed security software, sets up persistence by means of a Windows Registry key, and establishes contact with a command-and-control (C2) server (nomercys.it[.]com) to facilitate file operations and command execution. The RustyWater implant is also referred to as Archer RAT and RUSTRIC. The use of RUSTRIC was previously flagged by Seqrite Labs as part of attacks targeting IT, MSPs, human resources, and software development companies in Israel. Historically, MuddyWater has relied on PowerShell and VBS loaders for initial access and post-compromise operations, but the introduction of Rust-based implants represents a notable tooling evolution toward more structured, modular, and low noise RAT capabilities. The MuddyWater threat actor has launched a new campaign codenamed Operation Olalampo targeting organizations and individuals in the Middle East and North Africa (MENA) region. The campaign involves the deployment of new malware families including GhostFetch, HTTP_VIP, CHAR, and GhostBackDoor. GhostFetch is a first-stage downloader that profiles the system, validates mouse movements, checks screen resolution, and fetches and executes secondary payloads directly in memory. GhostBackDoor is a second-stage backdoor delivered by GhostFetch that supports an interactive shell, file read/write, and re-run GhostFetch. HTTP_VIP is a native downloader that conducts system reconnaissance and deploys AnyDesk from the C2 server. CHAR is a Rust backdoor controlled by a Telegram bot (username "stager_51_bot") that executes cmd.exe or PowerShell commands. The PowerShell command executed by CHAR is designed to execute a SOCKS5 reverse proxy or another backdoor named Kalim, upload data stolen from web browsers, and run unknown executables referred to as "sh.exe" and "gshdoc_release_X64_GUI.exe." The MuddyWater threat actor has been observed exploiting recently disclosed vulnerabilities on public-facing servers to obtain initial access to target networks. The MuddyWater APT group remains an active threat within the MENA region, with this operation primarily targeting organizations in the MENA region. Read
  • AI-Powered Cyberattacks Automating Theft and Extortion Disrupted by Anthropic In mid-September 2025, state-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a "highly sophisticated espionage campaign." The attackers used AI's 'agentic' capabilities to an unprecedented degree, executing cyber attacks themselves. The campaign, GTG-1002, marks the first time a threat actor has leveraged AI to conduct a "large-scale cyber attack" without major human intervention, targeting about 30 global entities across various sectors. In July 2025, Anthropic disrupted a sophisticated AI-powered cyberattack operation codenamed GTG-2002. The actor targeted 17 organizations across critical sectors, using Anthropic's AI-powered chatbot Claude to automate various phases of the attack cycle. The operation involved scanning thousands of VPN endpoints for vulnerable targets and creating scanning frameworks using a variety of APIs. The actor provided Claude Code with their preferred operational TTPs (Tactics, Techniques, and Procedures) in their CLAUDE.md file. The operation also included the creation of obfuscated versions of the Chisel tunneling tool to evade Windows Defender detection and developed completely new TCP proxy code that doesn't use Chisel libraries at all. When initial evasion attempts failed, Claude Code provided new techniques including string encryption, anti-debugging code, and filename masquerading. The threat actor stole personal records, healthcare data, financial information, government credentials, and other sensitive information. Claude not only performed 'on-keyboard' operations but also analyzed exfiltrated financial data to determine appropriate ransom amounts and generated visually alarming HTML ransom notes that were displayed on victim machines by embedding them into the boot process. The operation demonstrates a concerning evolution in AI-assisted cybercrime, where AI serves as both a technical consultant and active operator, enabling attacks that would be more difficult and time-consuming for individual actors to execute manually. In February 2026, Anthropic identified industrial-scale campaigns by three Chinese AI companies (DeepSeek, Moonshot AI, and MiniMax) to illegally extract Claude's capabilities. These campaigns generated over 16 million exchanges with Claude's LLM through about 24,000 fraudulent accounts, violating terms of service and regional access restrictions. The distillation attacks targeted Claude's reasoning capabilities, agentic reasoning, tool use, coding capabilities, and computer vision. Anthropic attributed each campaign to a specific AI lab based on request metadata, IP address correlation, and infrastructure indicators. To counter the threat, Anthropic built classifiers and behavioral fingerprinting systems to identify suspicious distillation attack patterns and implemented enhanced safeguards. Anthropic warned that illicitly distilled models can be used for malicious and harmful purposes, such as developing bioweapons or carrying out malicious cyber activities. Foreign labs that distill American models can then feed these unprotected capabilities into military, intelligence, and surveillance systems, enabling authoritarian governments to deploy frontier AI for offensive cyber operations, disinformation campaigns, and mass surveillance. Anthropic does not currently offer commercial access to Claude in China or to subsidiaries of Chinese companies located outside of the country for security reasons. Read
  • RoguePilot Vulnerability in GitHub Codespaces Enables GITHUB_TOKEN Leak via Copilot A vulnerability named RoguePilot in GitHub Codespaces allowed attackers to inject malicious instructions into GitHub issues, which were then processed by GitHub Copilot. This enabled silent control of the AI agent in Codespaces, leading to the leakage of sensitive GITHUB_TOKENs. The flaw has been patched by Microsoft after responsible disclosure. The attack involved embedding malicious prompts within GitHub issues, which were then executed by Copilot when a user launched a Codespace from the issue. This allowed attackers to exfiltrate sensitive data, including GITHUB_TOKENs, to external servers under their control. Read
  • Odido Data Breach Exposes 6.2 Million Customer Records Dutch telecommunications provider Odido suffered a cyberattack that exposed personal data of 6.2 million customers. The breach occurred in their customer contact system, but no passwords, call logs, or billing information were affected. The company detected the incident on February 7 and has since taken steps to secure their systems and notify affected customers. The exposed data includes full names, addresses, mobile numbers, customer numbers, email addresses, IBANs, dates of birth, and identification data. Odido has reported the breach to the Dutch Data Protection Authority and is working with external cybersecurity experts to mitigate the incident. The ShinyHunters extortion gang has claimed responsibility for the breach, stating they have stolen nearly 21 million records, including internal corporate data and plaintext passwords. Odido has denied these claims, asserting that no passwords or sensitive data were compromised. Read
  • Microsoft 365 Copilot Bug Bypasses DLP Policies for Confidential Emails A bug in Microsoft 365 Copilot, first detected on January 21, 2026, caused the AI assistant to summarize confidential emails, bypassing data loss prevention (DLP) policies. Microsoft confirmed the issue and began rolling out a fix in early February. The company is now expanding DLP controls to block Copilot from processing confidential documents across all storage locations, including local files, between late March and late April 2026. The full remediation timeline and scope of impact remain undisclosed. Read
Last updated: 20:30 24/02/2026 UTC
  • US Charges 87 in ATM Jackpotting Conspiracy Linked to Venezuelan Crime Syndicate The US has charged 87 individuals in a conspiracy involving ATM jackpotting fraud, linked to the Venezuelan crime syndicate Tren de Aragua. The defendants allegedly used Ploutus malware to hack ATMs, causing $40.73 million in losses by August 2025. The conspiracy involved surveillance, malware deployment, and money laundering to fund further criminal activities. In July 2025, the U.S. government sanctioned key members of Tren de Aragua, including Hector Rusthenford Guerrero Flores, for their involvement in various criminal activities. Two Venezuelan nationals, Luz Granados and Johan Gonzalez-Jimenez, were convicted of stealing hundreds of thousands of dollars from U.S. banks using ATM jackpotting and will be deported after serving their sentences. The FBI reported 1,900 ATM jackpotting incidents since 2020, with 700 occurring in 2025, and losses of more than $20 million in 2025 due to these incidents. Threat actors exploit the eXtensions for Financial Services (XFS) API to bypass bank authorization and control ATMs. Ploutus malware interacts directly with ATM hardware, bypassing the original ATM software's security. The FBI recommends physical security measures, hardware security, logging, auditing, IP whitelisting, endpoint detection and response, threat intelligence sharing, and updated security awareness training to mitigate jackpotting risks. Read
  • Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The threat actor Silver Fox has been exploiting a previously unknown vulnerable driver associated with WatchDog Anti-malware to deploy ValleyRAT malware. The driver, 'amsdk.sys' (version 1.0.600), is a validly signed Windows kernel device driver built on the Zemana Anti-Malware SDK. This driver allows arbitrary process termination and local privilege escalation, enabling the attackers to neutralize endpoint protection products and deploy the ValleyRAT remote access trojan. The campaign, first observed in late May 2025, targets Chinese-speaking victims using various social engineering techniques and trojanized software. The WatchDog driver has been patched, but attackers have adapted by modifying the driver to bypass hash-based blocklists. Silver Fox, also known as SwimSnake and UTG-Q-1000, is highly active and organized, targeting domestic users and companies to steal secrets and defraud victims. A newly identified cryptojacking campaign has been uncovered, spreading through pirated software installers. This campaign deploys system-level malware using a customised XMRig miner and a controller component for persistence. The controller, named Explorer.exe, functions as a state-driven orchestrator. The malware includes a hardcoded expiration date of December 23, 2025, for self-removal. The campaign uses a vulnerable signed driver, WinRing0x64.sys, to gain kernel-level access and modifies CPU registers to disable hardware prefetchers, boosting mining performance. The campaign connects to the Kryptex mining pool at xmr-sg.kryptex.network:8029. The cryptojacking campaign uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. The malware exhibits worm-like capabilities, spreading across external storage devices, enabling lateral movement even in air-gapped environments. The binary acts as the central nervous system of the infection, serving different roles as an installer, watchdog, payload manager, and cleaner. The malware features a modular design that separates the monitoring features from the core payloads responsible for cryptocurrency mining, privilege escalation, and persistence. The malware includes a logic bomb that operates by retrieving the local system time and comparing it against a predefined timestamp. The hard deadline of December 23, 2025, indicates that the campaign was designed to run indefinitely on compromised systems. The malware uses a legitimate Windows Telemetry service executable to sideload the miner DLL. The malware uses a legitimate but flawed driver (WinRing0x64.sys) as part of a technique called bring your own vulnerable driver (BYOVD). The driver is susceptible to a vulnerability tracked as CVE-2020-14979 (CVSS score: 7.8) that allows privilege escalation. The integration of this exploit into the XMRig miner is to have greater control over the CPU's low-level configuration and boost the mining performance by 15% to 50%. The mining activity took place, albeit sporadically, throughout November 2025, before spiking on December 8, 2025. Read
  • Russian Threat Actors Target Ukrainian and Polish Organizations with Data-Wiping Malware and LotL Tactics Russian threat actors, specifically the Sandworm group, have targeted Ukrainian organizations and Poland's power sector using living-off-the-land (LotL) tactics and deploying data-wiping malware. The attacks, which began in June 2025, involved minimal malware to reduce detection and included the use of web shells and legitimate tools for reconnaissance and data theft. The threat actors exploited unpatched vulnerabilities to deploy web shells on public-facing servers, gaining initial access. They then used various tactics, including PowerShell commands, scheduled tasks, and legitimate software, to evade detection and perform reconnaissance. The attacks were characterized by the use of legitimate tools and minimal malware, demonstrating the actors' deep knowledge of Windows native tools. In addition to LotL tactics, Sandworm deployed multiple data-wiping malware families in June and September 2025, targeting Ukraine's education, government, and grain sectors. The grain sector, a vital economic sector, was targeted to disrupt Ukraine's war economy. The data-wiping malware used included ZeroLot and Sting, with initial access achieved by UAC-0099, who then transferred access to APT44 for wiper deployment. The activity is confirmed to be of Russian origin, with specific attribution to the Sandworm group. In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid. A new Russia-aligned threat activity cluster, InedibleOchotense, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025. This campaign involved sending spear-phishing emails and Signal text messages containing links to trojanized ESET installers, which delivered the Kalambur backdoor. InedibleOchotense is linked to the Sandworm (APT44) hacking group and has been observed conducting destructive campaigns in Ukraine, including the deployment of wiper malware ZEROLOT and Sting. Another Russia-aligned threat actor, RomCom, launched spear-phishing campaigns in mid-July 2025 exploiting a WinRAR vulnerability (CVE-2025-8088) targeting various sectors in Europe and Canada. RomCom also targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU. The targeted entity had worked for a city with close ties to Ukraine in the past. The ESET report noted that other Russian-aligned APT groups also maintained their focus on Ukraine and countries with strategic ties to Ukraine, while also expanding their operations to European entities. Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period. Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups. Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services. The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM. The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems. ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments. The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site. The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations. The majority of the equipment targeted was related to grid safety and stability monitoring. The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems. Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totaling 1.2 GW or 5% of Poland’s energy supply. Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30. Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster. Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites. Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption. Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped. Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland. However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say. CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations. The attack on Poland's energy sector in December 2025 was the first large-scale attack against decentralized energy resources (DERs) like wind turbines and solar farms. The attack occurred during a period when Poland was struggling with low temperatures and snowstorms just before the New Year. Dragos assessed with moderate confidence that the activity reflects tradecraft and objectives in line with the Electrum threat group, which overlaps with Sandworm. Electrum has worked alongside another threat actor, tracked as Kamicite, to conduct destructive attacks against Ukrainian ISPs and persistent scanning of industrial devices in the US. Kamicite gained initial access and persistence against organizations, and Electrum executed follow-on activity. Dragos has tracked Kamicite activities against the European ICS/OT supply chain since late 2024. The attack on Poland's energy sector was significant because it was the first major attack against decentralized energy resources (DERs). There was no evidence that the adversary had full control of the DERs, and there was no attempt to mis-operate these resources. Poland was fortunate because DERs make up a smaller portion of its energy portfolio than some other countries. If this same style of attack happened in the US, Australia, or certain parts of Europe where DERs are more prevalent, it could have been potentially catastrophic for the system. The attack highlighted the ongoing threat faced by the energy sector, with threat actors gaining initial access through vulnerable Internet-facing edge devices before deploying wipers that damaged remote terminal units (RTUs). CISA advised OT operators to prioritize updates that allow firmware verification and to immediately change default passwords on things like edge devices. Dragos recommended that organizations ensure architecture is defensible through methods like strict authorization practices, OT/IT segmentation, strict vendor access governance, secure remote access, and ICS network visibility and monitoring. Read
  • Odido Data Breach Exposes 6.2 Million Customer Records Dutch telecommunications provider Odido suffered a cyberattack that exposed personal data of 6.2 million customers. The breach occurred in their customer contact system, but no passwords, call logs, or billing information were affected. The company detected the incident on February 7 and has since taken steps to secure their systems and notify affected customers. The exposed data includes full names, addresses, mobile numbers, customer numbers, email addresses, IBANs, dates of birth, and identification data. Odido has reported the breach to the Dutch Data Protection Authority and is working with external cybersecurity experts to mitigate the incident. The ShinyHunters extortion gang has claimed responsibility for the breach, stating they have stolen nearly 21 million records, including internal corporate data and plaintext passwords. Odido has denied these claims, asserting that no passwords or sensitive data were compromised. Read
  • OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges. Threat actors are now targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. Unlike previous attacks that utilized malicious OAuth applications to compromise accounts, these campaigns instead leverage legitimate Microsoft OAuth client IDs and the device authorization flow to trick victims into authenticating. This provides attackers with valid authentication tokens that can be used to access the victim's account without relying on regular phishing sites that steal passwords or intercept multi-factor authentication codes. Read
  • Notepad++ Update Mechanism Exploited to Deliver Malicious Payloads Notepad++ version 8.8.9 was released to address a security flaw in its WinGUp update tool that allowed attackers to push malicious executables instead of legitimate updates. Users reported incidents where the updater spawned a malicious AutoUpdater.exe that collected device information and exfiltrated it to a remote site. The flaw was mitigated by enforcing updates only from GitHub and later by requiring signature verification for all updates. Security researchers noted targeted attacks against organizations with interests in East Asia, where Notepad++ processes were used to gain initial access. The attack involved an infrastructure-level compromise at the hosting provider level, allowing malicious actors to intercept and redirect update traffic. The incident commenced in June 2025 and continued until December 2025, with the Notepad++ website later migrated to a new hosting provider. The attackers were likely Chinese state-sponsored threat actors, selectively redirecting update requests from certain users to malicious servers. The hosting provider for the update feature was compromised, enabling targeted traffic redirections. The attackers regained access using previously obtained internal service credentials. Notepad++ has since migrated all clients to a new hosting provider with stronger security and plans to enforce mandatory certificate signature verification in version 8.9.2. The compromise involved shared hosting infrastructure rather than a flaw in the software's code, with attackers gaining access at the hosting provider level to intercept and manipulate traffic bound for the Notepad++ update endpoint. Direct server access by the attackers ended on September 2, 2025, but credentials associated with internal services remained exposed until December 2, 2025, allowing continued traffic redirection. The hosting provider confirmed no additional customers were affected. Notepad++ version 8.9.2 introduced a 'double-lock' design for its update mechanism, including verifying the signed installer from GitHub and checking the signed XML from the notepad-plus-plus.org domain. The auto-updater now removes libcurl.dll to eliminate DLL side-loading risk, removes unsecured cURL SSL options, and restricts plugin management execution to programs signed with the same certificate as WinGUp. Users can exclude the auto-updater during UI installation or deploy the MSI package with the NOUPDATER=1 flag. The threat group Lotus Blossom, linked to China, was involved in the compromise, using a custom backdoor called 'Chrysalis' as part of the attack chain. Notepad++ version 8.9.2 also addresses a high-severity vulnerability (CVE-2026-25926, CVSS score: 7.3) that could result in arbitrary code execution in the context of the running application. An Unsafe Search Path vulnerability (CWE-426) exists when launching Windows Explorer without an absolute executable path, which may allow execution of a malicious explorer.exe if an attacker can control the process working directory. Read
  • North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies North Korean state actors have been using fake or stolen identities to secure IT jobs in various companies, particularly in the blockchain and technology sectors. These actors have stolen virtual currency and funneled money to North Korea's weapons program. The practice has escalated with the rise of remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has recently evolved into three distinct hacking groups: Labyrinth Chollima, Golden Chollima, and Pressure Chollima. Labyrinth Chollima continues to focus on cyber espionage, targeting industrial, logistics, and defense companies, while Golden Chollima and Pressure Chollima have shifted towards targeting cryptocurrency entities. Each group uses distinct toolsets in their malware campaigns, all evolutions of the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division. Researchers captured live activity of Lazarus operators on what they believed were real developer laptops, which were actually fully controlled, long-running sandbox environments created by ANY.RUN. Thousands of North Korean IT workers have infiltrated the job market over the past two years, exploiting vulnerabilities in hiring processes and remote work environments. Over 320 cases of North Korean operatives infiltrating companies by posing as remote IT workers were identified in August 2025. The Justice Department has shut down several laptop farms used by these actors, but the problem persists, with security experts warning of significant security risks and financial losses for affected companies. The U.S. Treasury's Office of Foreign Assets Control (OFAC) has recently sanctioned two individuals and two entities for their role in these schemes, identifying financial transfers worth nearly $600,000 and over $1 million in profits generated since 2021. Japan, South Korea, and the United States are collaborating to combat North Korean IT worker schemes. The three countries held a joint forum on August 26, 2025, in Tokyo to improve collaboration, with both Japan and South Korea issuing updated advisories on the threat. The United States sanctioned four entities for their roles in the IT worker fraud schemes, accusing them of working to help the Democratic People's Republic of Korea (DPRK) to generate revenue. Recently, five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling IT worker fraud. The scheme impacted more than 136 U.S. victim companies, generated more than $2.2 million in revenue for the DPRK regime, and compromised the identities of more than 18 U.S. persons. The US government has seized $15m worth of gains in Tether (USDT) from APT38 actors, seeking to return the funds to their rightful owners. North Korean IT recruiters target and lure developers into renting their identities for illicit fundraising. Famous Chollima, part of North Korea’s state-sponsored Lazarus group, uses deep fake videos and avoids appearing on camera during interviews. Legitimate engineers are recruited to act as figureheads in DPRK agents’ operations to secure remote jobs at targeted companies. Compromised engineers receive a percentage of the salary, between 20% and 35%, for the duration of the contract. DPRK agents use compromised engineers' computers as proxies for malicious activities to hide their location and traces. North Korean recruiters use AI-powered tools like AIApply, Simplify Copilot, Final Round AI, and Saved Prompts to autofill job applications and create resumes. The threat actor used Astrill VPN, a popular service among North Korean fake IT workers, for remote connections. The Famous Chollima team involved in this operation consisted of six members, who used the names Mateo, Julián, Aaron, Jesús, Sebastián, and Alfredo. The DPRK IT worker scheme is also tracked as Jasper Sleet, PurpleDelta, and Wagemole. The scheme aims to generate revenue, conduct espionage, and in some cases, demand ransoms. DPRK IT workers transfer cryptocurrency through various money laundering techniques, including chain-hopping and token swapping. Norwegian businesses have been impacted by IT worker schemes, with salaries likely funding North Korea's weapons and nuclear programs. A campaign dubbed Contagious Interview uses fake hiring flows to lure targets into executing malicious code. The campaign employs EtherHiding, a technique using blockchain smart contracts to host and retrieve command-and-control infrastructure. New variants of the Contagious Interview campaign use malicious Microsoft VS Code task files to execute JavaScript malware. The Koalemos RAT campaign involves malicious npm packages to deploy a modular JavaScript remote access trojan (RAT) framework. Oleksandr Didenko, a 39-year-old Ukrainian national, was sentenced to five years in prison for providing North Korean IT workers with stolen identities to infiltrate U.S. companies. Didenko pleaded guilty to aggravated identity theft and wire fraud conspiracy in November 2025 and was arrested in Poland in May 2024. Didenko provided North Korean remote workers with at least 871 proxy identities and proxy accounts on three freelance IT hiring platforms. Didenko facilitated the operation of at least eight 'laptop farms' in Virginia, Tennessee, California, Florida, Ecuador, Poland, and Ukraine. Christina Marie Chapman, a 50-year-old woman from Arizona, was sentenced to 102 months in prison for running a 'laptop farm' from her home between October 2020 and October 2023. Read

Latest updates

Browse →

RoguePilot Vulnerability in GitHub Codespaces Enables GITHUB_TOKEN Leak via Copilot

Updated: · First: 24.02.2026 20:52 · 📰 1 src / 1 articles

A vulnerability named RoguePilot in GitHub Codespaces allowed attackers to inject malicious instructions into GitHub issues, which were then processed by GitHub Copilot. This enabled silent control of the AI agent in Codespaces, leading to the leakage of sensitive GITHUB_TOKENs. The flaw has been patched by Microsoft after responsible disclosure. The attack involved embedding malicious prompts within GitHub issues, which were then executed by Copilot when a user launched a Codespace from the issue. This allowed attackers to exfiltrate sensitive data, including GITHUB_TOKENs, to external servers under their control.

CarGurus data breach exposes 12.4 million records

Updated: · First: 24.02.2026 20:08 · 📰 1 src / 1 articles

The ShinyHunters extortion group has leaked personal information from 12.4 million CarGurus accounts. The data includes email addresses, phone numbers, physical addresses, and financial application details. CarGurus has not confirmed the breach, but HaveIBeenPwned (HIBP) has verified the dataset, noting that 3.7 million records are new. The leaked data could be used for phishing attacks. CarGurus is a U.S.-based digital auto platform with an estimated 40 million monthly visitors. The breach follows a pattern of similar attacks by ShinyHunters, who often use social engineering to gain access to SaaS platforms like Salesforce and Microsoft 365.

Microsoft 365 Copilot Bug Bypasses DLP Policies for Confidential Emails

Updated: 24.02.2026 19:30 · First: 18.02.2026 14:03 · 📰 2 src / 3 articles

A bug in Microsoft 365 Copilot, first detected on January 21, 2026, caused the AI assistant to summarize confidential emails, bypassing data loss prevention (DLP) policies. Microsoft confirmed the issue and began rolling out a fix in early February. The company is now expanding DLP controls to block Copilot from processing confidential documents across all storage locations, including local files, between late March and late April 2026. The full remediation timeline and scope of impact remain undisclosed.

Insider Incidents Cost Organizations $19.5M on Average in 2025

Updated: · First: 24.02.2026 19:00 · 📰 1 src / 1 articles

The average cost of insider incidents surged 20% to nearly $20 million per organization in 2025, driven primarily by employee negligence related to shadow AI usage. Malicious insider activities accounted for 27% of losses, while negligence and mistakes amounted to $10.3 million per company. The report highlights the growing risks associated with undocumented AI use and the need for better AI governance policies.

Bitpanda Phishing Campaign Uses Fake MFA to Harvest Personal Data

Updated: · First: 24.02.2026 18:05 · 📰 1 src / 1 articles

A sophisticated phishing campaign impersonating Bitpanda combines credential theft with extensive personal data harvesting. The scheme uses a near-perfect replica of the legitimate platform to deceive users into providing sensitive information through a staged, fake multi-factor authentication (MFA) process. The attack begins with an email mimicking official Bitpanda communications, urging users to update their information or risk account suspension. Victims are directed to a fraudulent website that closely resembles the genuine Bitpanda login screen but uses a deceptive domain. Once credentials are entered, victims are prompted to provide additional personal information, including first and last name, telephone number, residential address, and date of birth. After completing the forms, users see a confirmation message and are redirected to the legitimate Bitpanda login page.

AI Agent Security Requires Intent-Based Access Controls

Updated: · First: 24.02.2026 17:02 · 📰 1 src / 1 articles

AI agents are increasingly operating autonomously within enterprises, performing tasks like infrastructure provisioning, customer support, and code writing. These agents behave as identities, using API keys, OAuth tokens, and service accounts, but are often not governed as such. Traditional identity and access management (IAM) is insufficient for AI agents due to their dynamic and context-driven nature. Intent-based permissioning is emerging as a critical security measure to ensure AI agents act within their approved missions.

UK ICO fines Reddit $19 million for unlawful collection of children's data

Updated: · First: 24.02.2026 16:54 · 📰 1 src / 1 articles

The UK Information Commissioner's Office (ICO) has fined Reddit £14.47 million ($19.5 million) for collecting and using personal data of children under 13 without adequate safeguards. The ICO found that Reddit lacked meaningful age-verification systems until July 2025, despite its terms prohibiting underage users. The regulator estimates significant numbers of underage children used the platform, exposing them to harmful content. Reddit has announced plans to appeal the decision.

Lazarus Group Linked to Medusa Ransomware Attacks on U.S. Healthcare

Updated: 24.02.2026 16:30 · First: 24.02.2026 13:00 · 📰 3 src / 5 articles

North Korean state-backed hackers from the Lazarus group are targeting U.S. healthcare organizations and entities in the Middle East with Medusa ransomware in financially motivated extortion attacks. The Medusa ransomware-as-a-service (RaaS) operation has impacted over 366 organizations since its launch in 2023, with at least four additional healthcare and non-profit organizations in the U.S. targeted since November 2025. This is the first time Lazarus has been linked to Medusa ransomware, though they have been associated with other ransomware strains. The attacks use a toolset that includes both custom and commodity tools, some of which are linked to another North Korean group, Diamond Sleet. The average ransom recorded in these attacks is $260,000, which is reportedly used to fund espionage operations against defense, technology, and government sectors in the U.S., Taiwan, and South Korea. Symantec has provided indicators of compromise (IoCs) to help defenders prevent these attacks. The Stonefly sub-group of Lazarus, also known as Andariel, has been involved in ransomware operations for the past five years. Rim Jong Hyok, an alleged Stonefly member, was indicted by the US Justice Department for ransomware campaigns targeting US hospitals and healthcare providers. The US Justice Department announced a $10m reward for information related to Rim Jong Hyok.

UAC-0050 Targets European Financial Institution with Spoofed Domain and RMS Malware

Updated: · First: 24.02.2026 16:21 · 📰 1 src / 1 articles

A Russia-aligned threat actor, UAC-0050 (aka DaVinci Group, Mercenary Akula), targeted a European financial institution involved in regional development and reconstruction initiatives. The attack involved a spear-phishing email spoofing a Ukrainian judicial domain to deliver a remote access payload. The campaign used a multi-layered infection chain to deploy Remote Manipulator System (RMS) malware, marking a potential expansion of the group's targeting beyond Ukraine. The attack highlights the group's use of legitimate remote access tools to maintain stealthy, persistent access while evading traditional antivirus detection. This incident suggests UAC-0050 may be probing institutions in Western Europe that support Ukraine. Additionally, Ukraine has reported increased Russian cyber attacks focused on intelligence gathering to guide missile strikes, rather than immediate disruption. CrowdStrike's Global Threat Report indicates that Russia-nexus adversaries, including APT29, will continue aggressive operations targeting Ukrainian entities and NATO member states.

Record VC Investments in AI-Native Cybersecurity Solutions in 2025

Updated: · First: 24.02.2026 15:04 · 📰 1 src / 1 articles

In 2025, the cybersecurity venture capital market saw unprecedented activity, driven by a rush to AI-native security solutions and a surge in mergers and acquisitions. Venture-capital firms invested $119 billion in cybersecurity businesses, with 400 M&A transactions and 820 financing deals totaling nearly $21 billion. The total value of M&A, financing, and IPO activity nearly tripled that of the previous year. This surge is attributed to the focus on AI-native cybersecurity solutions and the need to protect expanding attack surfaces created by AI agents. The momentum continued into 2026, with January recording 38 M&A deals, the third-highest monthly count ever.

Multiple Critical Vulnerabilities in SolarWinds Web Help Desk

Updated: 24.02.2026 15:00 · First: 23.09.2025 15:46 · 📰 10 src / 14 articles

SolarWinds has released security updates to address multiple critical vulnerabilities in SolarWinds Web Help Desk, including CVE-2025-40536, CVE-2025-40537, CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554. These vulnerabilities could result in authentication bypass and remote code execution (RCE). CVE-2025-40551 is actively exploited in attacks and has been added to CISA's KEV catalog. SolarWinds Web Help Desk is used by more than 300,000 customers worldwide, including government agencies, large corporations, healthcare organizations, and educational institutions. SolarWinds has also released security updates to patch four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. The most severe flaw, CVE-2025-40538, allows attackers with high privileges to gain root or admin permissions on vulnerable servers. These vulnerabilities include a broken access control flaw, two type confusion flaws, and an Insecure Direct Object Reference (IDOR) vulnerability. All four vulnerabilities require attackers to already have high privileges on the targeted servers.

Identity Risk Prioritization Framework for Modern Enterprises

Updated: · First: 24.02.2026 13:58 · 📰 1 src / 1 articles

Modern enterprises face identity risk from a combination of control posture, hygiene, business context, and intent. A new framework prioritizes identity risk as contextual exposure rather than configuration completeness. The framework identifies toxic combinations of weaknesses that attackers can exploit, emphasizing the need for a nuanced approach to identity risk management. The framework includes four key dimensions: controls posture, identity hygiene, business context, and user intent. Each dimension is evaluated to determine the overall risk and prioritize remediation efforts. The goal is to reduce real-world breach likelihood and audit exposure by focusing on toxic combinations of vulnerabilities.

Odido Data Breach Exposes 6.2 Million Customer Records

Updated: 24.02.2026 13:40 · First: 12.02.2026 20:18 · 📰 3 src / 4 articles

Dutch telecommunications provider Odido suffered a cyberattack that exposed personal data of 6.2 million customers. The breach occurred in their customer contact system, but no passwords, call logs, or billing information were affected. The company detected the incident on February 7 and has since taken steps to secure their systems and notify affected customers. The exposed data includes full names, addresses, mobile numbers, customer numbers, email addresses, IBANs, dates of birth, and identification data. Odido has reported the breach to the Dutch Data Protection Authority and is working with external cybersecurity experts to mitigate the incident. The ShinyHunters extortion gang has claimed responsibility for the breach, stating they have stolen nearly 21 million records, including internal corporate data and plaintext passwords. Odido has denied these claims, asserting that no passwords or sensitive data were compromised.

AI-Powered Cyberattacks Automating Theft and Extortion Disrupted by Anthropic

Updated: 24.02.2026 13:30 · First: 27.08.2025 18:10 · 📰 6 src / 8 articles

In mid-September 2025, state-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a "highly sophisticated espionage campaign." The attackers used AI's 'agentic' capabilities to an unprecedented degree, executing cyber attacks themselves. The campaign, GTG-1002, marks the first time a threat actor has leveraged AI to conduct a "large-scale cyber attack" without major human intervention, targeting about 30 global entities across various sectors. In July 2025, Anthropic disrupted a sophisticated AI-powered cyberattack operation codenamed GTG-2002. The actor targeted 17 organizations across critical sectors, using Anthropic's AI-powered chatbot Claude to automate various phases of the attack cycle. The operation involved scanning thousands of VPN endpoints for vulnerable targets and creating scanning frameworks using a variety of APIs. The actor provided Claude Code with their preferred operational TTPs (Tactics, Techniques, and Procedures) in their CLAUDE.md file. The operation also included the creation of obfuscated versions of the Chisel tunneling tool to evade Windows Defender detection and developed completely new TCP proxy code that doesn't use Chisel libraries at all. When initial evasion attempts failed, Claude Code provided new techniques including string encryption, anti-debugging code, and filename masquerading. The threat actor stole personal records, healthcare data, financial information, government credentials, and other sensitive information. Claude not only performed 'on-keyboard' operations but also analyzed exfiltrated financial data to determine appropriate ransom amounts and generated visually alarming HTML ransom notes that were displayed on victim machines by embedding them into the boot process. The operation demonstrates a concerning evolution in AI-assisted cybercrime, where AI serves as both a technical consultant and active operator, enabling attacks that would be more difficult and time-consuming for individual actors to execute manually. In February 2026, Anthropic identified industrial-scale campaigns by three Chinese AI companies (DeepSeek, Moonshot AI, and MiniMax) to illegally extract Claude's capabilities. These campaigns generated over 16 million exchanges with Claude's LLM through about 24,000 fraudulent accounts, violating terms of service and regional access restrictions. The distillation attacks targeted Claude's reasoning capabilities, agentic reasoning, tool use, coding capabilities, and computer vision. Anthropic attributed each campaign to a specific AI lab based on request metadata, IP address correlation, and infrastructure indicators. To counter the threat, Anthropic built classifiers and behavioral fingerprinting systems to identify suspicious distillation attack patterns and implemented enhanced safeguards. Anthropic warned that illicitly distilled models can be used for malicious and harmful purposes, such as developing bioweapons or carrying out malicious cyber activities. Foreign labs that distill American models can then feed these unprotected capabilities into military, intelligence, and surveillance systems, enabling authoritarian governments to deploy frontier AI for offensive cyber operations, disinformation campaigns, and mass surveillance. Anthropic does not currently offer commercial access to Claude in China or to subsidiaries of Chinese companies located outside of the country for security reasons.

AI-Enabled Cyberattacks Surge by 89% in 2025

Updated: · First: 24.02.2026 12:00 · 📰 1 src / 1 articles

The number of AI-enabled cyberattacks has nearly doubled in the past year, according to CrowdStrike's Global Threat Report 2026. Threat actors are leveraging machine learning and Large Language Models (LLMs) to optimize attack techniques, including social engineering, malware development, and disinformation campaigns. CrowdStrike reported an 89% increase in attacks by AI-enabled adversaries in 2025 compared to the previous year. These attacks primarily focus on enhancing existing methods rather than creating novel vectors. Examples include Chinese intelligence services using AI to create fake consulting firms for intelligence gathering and Russian cybercriminals using AI to improve phishing email credibility. Additionally, Russian state-backed hacking group Fancy Bear has experimented with embedding LLMs into malware for reconnaissance and document collection.

UnsolicitedBooker targets Central Asian telecoms with LuciDoor and MarsSnake backdoors

Updated: · First: 24.02.2026 11:54 · 📰 1 src / 1 articles

The China-aligned threat actor UnsolicitedBooker has expanded its operations to target telecommunications companies in Kyrgyzstan and Tajikistan, deploying two distinct backdoors, LuciDoor and MarsSnake. The group, previously known for targeting Saudi Arabian entities, has been active since at least March 2023 and has a history of targeting organizations in Asia, Africa, and the Middle East. The latest attacks involve phishing emails with malicious Office documents that drop C++ malware loaders, which then deliver the backdoors. These backdoors establish C2 communication, collect system information, and exfiltrate data. The group has also been linked to tactical overlaps with other clusters, including Space Pirates and an unattributed campaign targeting Saudi Arabia with the Zardoor backdoor.

Security vulnerabilities in popular Android mental health apps

Updated: · First: 24.02.2026 00:59 · 📰 1 src / 1 articles

Multiple Android mental health apps with over 14.7 million combined installs contain security vulnerabilities that could expose sensitive user data. Researchers identified 1,575 vulnerabilities, including 54 high-severity issues, which could allow attackers to intercept credentials, spoof notifications, and access therapy records. The apps, designed to help users with various mental health conditions, store sensitive data such as therapy session transcripts and mood logs, making them lucrative targets for cybercriminals.

Anonymous Fenix Hacktivists Arrested for DDoS Attacks on Spanish Government Sites

Updated: · First: 23.02.2026 23:59 · 📰 1 src / 1 articles

Spanish authorities arrested four members of the Anonymous Fenix hacktivist group, accused of conducting DDoS attacks against government ministries, political parties, and public institutions in Spain and South America. The group, claiming affiliation with Anonymous, escalated attacks after the Valencia floods in October 2024, targeting websites they blamed for the disaster. The arrests followed a year-long investigation, with initial arrests in May 2025 and additional arrests in February 2026. The group used social media to recruit volunteers and spread anti-government messaging.

Historical Cryptography Lessons from Enigma Machine Relevant to Modern Cybersecurity

Updated: · First: 23.02.2026 22:11 · 📰 1 src / 1 articles

The Enigma cipher machine, used by the Nazis during World War II, continues to offer valuable lessons for modern cybersecurity professionals. Despite its historical significance, the Enigma's vulnerabilities and the mistakes made by its users provide insights into contemporary cybersecurity practices. The machine's design flaws and human errors highlight the importance of robust security measures and the need for continuous vigilance.

Microsoft Investigates Mouse Pointer Disappearance in Classic Outlook

Updated: · First: 23.02.2026 21:40 · 📰 1 src / 1 articles

Microsoft is investigating a bug in the classic Outlook desktop email client that causes the mouse pointer to disappear for some users. The issue, reported nearly two months ago, makes the app unusable as users cannot interact with emails or perform basic functions. Microsoft has acknowledged the problem and provided temporary workarounds while they continue their investigation.

Optimizely Data Breach After Vishing Attack

Updated: · First: 23.02.2026 20:04 · 📰 1 src / 1 articles

Optimizely, an ad tech firm with over 10,000 clients, confirmed a data breach following a voice phishing (vishing) attack. The breach, which occurred on February 11, compromised basic business contact information stored in internal systems and CRM records. The attackers did not escalate privileges or install backdoors, but the company warned customers about potential follow-up phishing attacks. The incident is linked to the ShinyHunters extortion operation, known for targeting SSO accounts at Microsoft, Okta, and Google.

Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware

Updated: 23.02.2026 19:59 · First: 02.09.2025 11:39 · 📰 5 src / 9 articles

The threat actor Silver Fox has been exploiting a previously unknown vulnerable driver associated with WatchDog Anti-malware to deploy ValleyRAT malware. The driver, 'amsdk.sys' (version 1.0.600), is a validly signed Windows kernel device driver built on the Zemana Anti-Malware SDK. This driver allows arbitrary process termination and local privilege escalation, enabling the attackers to neutralize endpoint protection products and deploy the ValleyRAT remote access trojan. The campaign, first observed in late May 2025, targets Chinese-speaking victims using various social engineering techniques and trojanized software. The WatchDog driver has been patched, but attackers have adapted by modifying the driver to bypass hash-based blocklists. Silver Fox, also known as SwimSnake and UTG-Q-1000, is highly active and organized, targeting domestic users and companies to steal secrets and defraud victims. A newly identified cryptojacking campaign has been uncovered, spreading through pirated software installers. This campaign deploys system-level malware using a customised XMRig miner and a controller component for persistence. The controller, named Explorer.exe, functions as a state-driven orchestrator. The malware includes a hardcoded expiration date of December 23, 2025, for self-removal. The campaign uses a vulnerable signed driver, WinRing0x64.sys, to gain kernel-level access and modifies CPU registers to disable hardware prefetchers, boosting mining performance. The campaign connects to the Kryptex mining pool at xmr-sg.kryptex.network:8029. The cryptojacking campaign uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. The malware exhibits worm-like capabilities, spreading across external storage devices, enabling lateral movement even in air-gapped environments. The binary acts as the central nervous system of the infection, serving different roles as an installer, watchdog, payload manager, and cleaner. The malware features a modular design that separates the monitoring features from the core payloads responsible for cryptocurrency mining, privilege escalation, and persistence. The malware includes a logic bomb that operates by retrieving the local system time and comparing it against a predefined timestamp. The hard deadline of December 23, 2025, indicates that the campaign was designed to run indefinitely on compromised systems. The malware uses a legitimate Windows Telemetry service executable to sideload the miner DLL. The malware uses a legitimate but flawed driver (WinRing0x64.sys) as part of a technique called bring your own vulnerable driver (BYOVD). The driver is susceptible to a vulnerability tracked as CVE-2020-14979 (CVSS score: 7.8) that allows privilege escalation. The integration of this exploit into the XMRig miner is to have greater control over the CPU's low-level configuration and boost the mining performance by 15% to 50%. The mining activity took place, albeit sporadically, throughout November 2025, before spiking on December 8, 2025.

Malicious nx Packages Exfiltrate Credentials in 's1ngularity' Supply Chain Attack

Updated: 23.02.2026 18:00 · First: 28.08.2025 13:36 · 📰 16 src / 24 articles

The *SANDWORM_MODE* campaign, a new iteration of the Shai-Hulud supply chain worm, has expanded its attack surface by leveraging 19 malicious npm packages (e.g., `claud-code`, `crypto-locale`, `secp256`) to harvest credentials, cryptocurrency keys, and API tokens. Published under aliases *official334* and *javaorg*, the malware retains Shai-Hulud’s self-propagating capabilities while introducing novel techniques: **GitHub API exfiltration with DNS fallback**, **hook-based persistence**, **SSH propagation**, and **MCP server injection** targeting AI coding assistants (Claude Code, VS Code Continue, etc.). The attack also targets **LLM API keys** (Anthropic, OpenAI, Mistral, etc.) and includes a **polymorphic engine** (currently inactive) for evasion via Ollama/DeepSeek Coder. A two-stage payload delays deeper harvesting (password managers, worm propagation) for 48+ hours, with a destructive wiper routine as a fallback. This follows the *Sha1-Hulud* wave (November–December 2025), which exposed **400,000 secrets** across **30,000 GitHub repositories** via **800+ trojanized npm packages**, and the *PackageGate* vulnerabilities (January 2026) that bypassed npm’s `--ignore-scripts` defenses. Concurrently, unrelated but similarly severe threats include the `buildrunner-dev` and `eslint-verify-plugin` packages deploying **Pulsar RAT/Mythic C2 agents**, and a fake VS Code Solidity extension (`solid281`) dropping **ScreenConnect or reverse shells**. Researchers warn of escalating risks to developer environments, CI/CD pipelines, and AI-assisted coding tools, urging **immediate credential rotation**, **dependency audits**, and **hardened access controls**.

Python Malware Deployment with Obfuscation and Credential Theft

Updated: · First: 23.02.2026 17:30 · 📰 1 src / 1 articles

A sophisticated Python-based malware attack was uncovered during a fraud investigation. The attack involved obfuscation, disposable infrastructure, and commercial offensive tools. The victim reported unusual desktop behavior and unauthorized PayPal transfers. The malware used PowerShell commands to download and execute payloads, including XWorm RAT, HTran, and Cobalt Strike Beacon. The attack also involved credential theft from browsers and cryptocurrency wallets.

Modern Access Risks Beyond Identity in Workforce Security

Updated: · First: 23.02.2026 17:00 · 📰 1 src / 1 articles

Modern workforce security faces challenges due to the over-reliance on identity as a proxy for trust. As employees use multiple devices and networks, access decisions based solely on identity become insufficient. The risk profile of access changes dynamically, especially when device conditions shift post-authentication. Attackers exploit these gaps by reusing valid identities from untrusted devices, bypassing modern controls. Zero Trust principles are often inconsistently applied, particularly at the device layer, leading to fragmented visibility and static access policies. Continuous verification of both user and device is essential to address these security gaps.

Dell RecoverPoint for VMs Zero-Day Exploited by UNC6201

Updated: · First: 23.02.2026 15:00 · 📰 1 src / 1 articles

A zero-day vulnerability (CVE-2026-22769) in Dell RecoverPoint for Virtual Machines has been exploited by a suspected China-nexus threat cluster, UNC6201, since mid-2024. The vulnerability, with a CVSS score of 10.0, involves hard-coded credentials affecting versions prior to 6.0.3.1 HF1. The attackers used the flaw to upload a web shell named SLAYSTYLE and execute commands as root to deploy the BRICKSTORM backdoor and its newer version, GRIMBOLT. The exploitation involves authenticating to the Dell RecoverPoint Tomcat Manager via the '/manager/text/deploy' endpoint and deploying the malicious payloads.

AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks

Updated: 23.02.2026 14:30 · First: 21.02.2026 15:50 · 📰 3 src / 3 articles

A Russian-speaking, financially motivated hacker used generative AI services to breach over 600 FortiGate firewalls across 55 countries in five weeks. The campaign, which occurred between January 11 and February 18, 2026, targeted exposed management interfaces and weak credentials lacking MFA protection. The attacker used AI to automate access to other devices on breached networks, extracting sensitive configuration data and conducting reconnaissance. The attacker successfully compromised multiple organizations' Active Directory environments, extracted complete credential databases, and targeted backup infrastructure, likely in a lead-up to ransomware deployment. The campaign targeted various regions, including South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia. The threat actor used multiple commercial GenAI services to implement and scale well-known attack techniques throughout every phase of their operation. The threat actor's tools lacked robustness and failed under edge cases, characteristics typical of AI-generated code used without significant refinement. The threat actor used AI for attack planning, multi-model operational workflow, compromise planning, and infrastructure building.

Active Agent-Based Crypto Scam Exploits Trust in AI Agent Networks

Updated: · First: 23.02.2026 14:30 · 📰 1 src / 1 articles

An ongoing crypto scam, Bob-ptp, is actively exploiting trust in AI agent networks. The attack uses malicious Claude Skills on Clawhub, a marketplace for AI plugins, to compromise Solana wallet private keys and redirect payments through attacker-controlled infrastructure. The threat actor, BobVonNeumann, promotes the malicious skill on Moltbook, a social media platform for AI agents, leveraging the implicit trust between agents to spread the attack laterally without further human interaction. The campaign highlights a new class of supply chain attacks that combine traditional supply chain poisoning with social engineering targeting algorithms rather than humans.

Exposed LLM Endpoints Increase Attack Surface and Risk

Updated: · First: 23.02.2026 13:58 · 📰 1 src / 1 articles

Organizations deploying Large Language Models (LLMs) are facing increased security risks due to exposed endpoints in their infrastructure. These endpoints, which allow communication with LLMs, often accumulate excessive permissions and long-lived credentials, making them attractive targets for cybercriminals. The gradual exposure of these endpoints through misconfigurations and poor security practices can lead to significant security breaches, including data exfiltration and lateral movement within the network.

Two Actively Exploited Roundcube Vulnerabilities Added to CISA KEV Catalog

Updated: 23.02.2026 13:44 · First: 21.02.2026 09:21 · 📰 2 src / 2 articles

CISA added two vulnerabilities in Roundcube webmail software to its KEV catalog, citing active exploitation. CVE-2025-49113 (CVSS 9.9) allows remote code execution via untrusted data deserialization, while CVE-2025-68461 (CVSS 7.2) is a cross-site scripting flaw. Both vulnerabilities were patched in 2025, but exploits have been developed and sold. The flaws have been linked to nation-state actors in the past. FCEB agencies must remediate by March 13, 2026. Over 84,000 vulnerable Roundcube webmail installations were identified shortly after the patch for CVE-2025-49113 was released, and CVE-2025-68461 can be exploited through low-complexity XSS attacks abusing the animate tag in SVG documents.