CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 20:30 26/02/2026 UTC
  • Scarcruft (APT37) Ransomware Campaign Targets South Korea The Contagious Interview campaign has expanded its tactics with three new execution paths for delivering in-memory JavaScript malware via malicious Next.js repositories, as detailed in a February 2026 Microsoft report. The campaign now uses (1) auto-execution via VS Code’s `tasks.json` (triggered by `runOn: "folderOpen"`), (2) build-time payloads embedded in modified libraries (e.g., `jquery.min.js`) activated during `npm run dev`, and (3) server startup scripts that exfiltrate environment variables and fetch attacker-controlled code. These methods converge on a memory-resident JavaScript payload that profiles hosts, registers with a C2 server for a unique `instanceId`, and deploys a second-stage controller for persistent access, discovery, and exfiltration—all while minimizing disk traces. This evolution follows earlier waves, including malicious VS Code projects (January 2026) and EtherRAT’s exploitation of React2Shell (December 2025), but introduces greater operational resilience through alternative staging infrastructure (GitHub gists, URL shorteners, blockchain-based NFT contracts) and multi-platform payloads (Node.js, Python, and npm dependencies like `eslint-validator`). The campaign continues to target cryptocurrency/Web3 developers and global tech sectors, leveraging job-themed lures, fraudulent IT worker networks (WageMole), and collaboration with North Korea’s financial fraud ecosystem. GitLab’s recent ban of 131 accounts tied to the campaign—along with the discovery of a $1.64M revenue-tracking project—highlights the operation’s structured, enterprise-scale coordination, blending espionage, financial theft, and persistent access brokerage. Read
  • UNC2814 Campaign Targeting Telecom and Government Networks A suspected Chinese threat actor, tracked as UNC2814, has conducted a global espionage campaign since at least 2017, targeting telecom and government networks. The campaign has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more. The actor deployed a new C-based backdoor named GRIDTIDE, which abuses the Google Sheets API for command-and-control (C2) operations. The initial access vector is unknown, but previous exploits involved flaws in web servers and edge systems. GRIDTIDE performs host reconnaissance and supports commands for executing bash commands, uploading, and downloading files. Google, Mandiant, and partners disrupted the campaign by terminating associated Google Cloud projects and disabling known infrastructure. Organizations impacted by GRIDTIDE were notified, and support was offered to clean the infections. Google expects UNC2814 to resume activity using new infrastructure in the near future. Read
  • Trend Micro Apex One Management Console 0-Day Exploited Trend Micro has disclosed and patched two critical vulnerabilities, CVE-2025-71210 and CVE-2025-71211, in its on-premise Apex One Management Console. These vulnerabilities allow for remote code execution (RCE) on vulnerable Windows systems. Trend Micro has released Critical Patch Build 14136 to address these vulnerabilities, which also fixes two high-severity privilege escalation flaws in the Windows agent and four more affecting the macOS agent. The vulnerabilities are due to path traversal weaknesses in the management console and require attackers to have access to it. Previously, Trend Micro disclosed two other critical vulnerabilities, CVE-2025-54948 and CVE-2025-54987, which were actively exploited in the wild. These vulnerabilities allowed for command injection and remote code execution. Trend Micro has released temporary mitigations and is urging users to apply them immediately to protect against potential attacks. Read
  • Ransomware Payment Rate Declines Amid Rising Attacks The percentage of ransomware victims paying threat actors dropped to 28% in 2025, the lowest recorded, despite a 50% increase in attacks. Total on-chain payments reached $820 million, with projections exceeding $900 million. Factors like improved incident response, regulatory scrutiny, and law enforcement actions contributed to the decline. The median ransom payment surged by 368%, indicating larger payouts from fewer victims. The number of active extortion groups rose to 85, with notable attacks on Jaguar Land Rover, Marks & Spencer, and DaVita Inc. The U.S. remained the most targeted country. The ransomware payment rate has been declining for four consecutive years, and the average price for network access declined from $1,427 in Q1 2023 to $439 in Q1 2026. Read
  • Microsoft Rolls Out Windows Backup for Organizations Microsoft has expanded the Windows Backup for Organizations feature to support more enterprise devices. The first sign-in restore experience now allows users to restore settings and Microsoft Store apps on first login to a new or reimaged Windows 11 device, extending support to hybrid-managed environments, multi-user device setups, and Windows 365 Cloud PCs. Originally announced in October 2025, Windows Backup for Organizations is designed to simplify backups and facilitate the transition to Windows 11. The feature is available for Entra-joined devices after installing the September 2025 Windows Monthly Cumulative Update. It backs up Windows settings, preferences, and Microsoft Store-installed apps on Windows 10 and Windows 11 systems, and restores them on Windows 11 PCs during device setup. Data is stored in the Exchange Online cloud, with encryption and strict access controls. The feature must be enabled by IT administrators via backup and restore policy settings. Read
  • ManoMano Data Breach Affects 38 Million Customers via Third-Party Service Provider ManoMano, a European DIY e-commerce platform, disclosed a data breach impacting 38 million customers. The breach occurred in January 2026 due to unauthorized access to a third-party customer service provider. Exposed data includes full names, email addresses, phone numbers, and customer service communications. No account passwords were compromised. The company has taken steps to secure its environment and notified relevant authorities and affected customers. The breach was claimed by an individual using the alias 'Indra' on a hacker forum, alleging the theft of 37.8 million user accounts and thousands of support tickets. The compromised service provider is reportedly a Tunis-based customer support firm that suffered a Zendesk breach. Read
  • Critical Juniper Networks PTX Router Vulnerability (CVE-2026-21902) A critical vulnerability (CVE-2026-21902) in Juniper Networks' Junos OS Evolved, affecting PTX Series routers, allows unauthenticated remote code execution with root privileges. The flaw stems from incorrect permission assignment in the 'On-Box Anomaly Detection' framework, which is exposed over an external port by default. Successful exploitation could lead to full router takeover. The issue impacts versions before 25.4R1-S1-EVO and 25.4R2-EVO, with fixes available in newer versions. Juniper Networks has not observed active exploitation as of the advisory's publication. Read
Last updated: 16:00 26/02/2026 UTC
  • US Charges 87 in ATM Jackpotting Conspiracy Linked to Venezuelan Crime Syndicate The US has charged 87 individuals in a conspiracy involving ATM jackpotting fraud, linked to the Venezuelan crime syndicate Tren de Aragua. The defendants allegedly used Ploutus malware to hack ATMs, causing $40.73 million in losses by August 2025. The conspiracy involved surveillance, malware deployment, and money laundering to fund further criminal activities. In July 2025, the U.S. government sanctioned key members of Tren de Aragua, including Hector Rusthenford Guerrero Flores, for their involvement in various criminal activities. Two Venezuelan nationals, Luz Granados and Johan Gonzalez-Jimenez, were convicted of stealing hundreds of thousands of dollars from U.S. banks using ATM jackpotting and will be deported after serving their sentences. The FBI reported 1,900 ATM jackpotting incidents since 2020, with 700 occurring in 2025, and losses of more than $20 million in 2025 due to these incidents. Threat actors exploit the eXtensions for Financial Services (XFS) API to bypass bank authorization and control ATMs. Ploutus malware interacts directly with ATM hardware, bypassing the original ATM software's security. The FBI recommends physical security measures, hardware security, logging, auditing, IP whitelisting, endpoint detection and response, threat intelligence sharing, and updated security awareness training to mitigate jackpotting risks. Read
  • Unauthenticated Remote Code Execution in Grandstream GXP1600 VoIP Phones A critical vulnerability (CVE-2026-2329) in Grandstream GXP1600 series VoIP phones allows unauthenticated remote code execution (RCE) with root privileges. The flaw, a stack-based buffer overflow, stems from the device's web-based API service. The vulnerability affects multiple GXP1600 models and has been addressed in firmware version 1.0.7.81. Exploiting this flaw could enable attackers to extract stored credentials, intercept phone calls, and eavesdrop on VoIP conversations. The issue was discovered by Rapid7 researcher Stephen Fewer and demonstrated via a Metasploit exploit module. The exploitation process involves writing multiple null bytes to construct a return-oriented programming (ROP) chain, allowing attackers to silently eavesdrop on communications. Read
  • Starkiller Phishing Kit Bypasses MFA via Proxy-Based Attacks A new phishing kit called Starkiller has emerged, allowing attackers to bypass multi-factor authentication (MFA) by proxying legitimate login pages. The kit is distributed as a subscription-based service on the dark web, offering real-time session monitoring and keylogging capabilities. It mimics login pages of major services like Google, Microsoft, and banks, routing traffic through attacker-controlled infrastructure to steal credentials and authentication tokens. Starkiller uses Docker containers running headless Chrome instances to serve genuine page content, making it difficult for security vendors to detect or block. The toolkit is sold with updates and customer support, posing a significant escalation in phishing infrastructure. The service is part of a broader cybercrime offering by a threat group called Jinkusu, which provides additional features such as email harvesting and campaign analytics. Read
  • Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The threat actor Silver Fox has been exploiting a previously unknown vulnerable driver associated with WatchDog Anti-malware to deploy ValleyRAT malware. The driver, 'amsdk.sys' (version 1.0.600), is a validly signed Windows kernel device driver built on the Zemana Anti-Malware SDK. This driver allows arbitrary process termination and local privilege escalation, enabling the attackers to neutralize endpoint protection products and deploy the ValleyRAT remote access trojan. The campaign, first observed in late May 2025, targets Chinese-speaking victims using various social engineering techniques and trojanized software. The WatchDog driver has been patched, but attackers have adapted by modifying the driver to bypass hash-based blocklists. Silver Fox, also known as SwimSnake and UTG-Q-1000, is highly active and organized, targeting domestic users and companies to steal secrets and defraud victims. A newly identified cryptojacking campaign has been uncovered, spreading through pirated software installers. This campaign deploys system-level malware using a customised XMRig miner and a controller component for persistence. The controller, named Explorer.exe, functions as a state-driven orchestrator. The malware includes a hardcoded expiration date of December 23, 2025, for self-removal. The campaign uses a vulnerable signed driver, WinRing0x64.sys, to gain kernel-level access and modifies CPU registers to disable hardware prefetchers, boosting mining performance. The campaign connects to the Kryptex mining pool at xmr-sg.kryptex.network:8029. The cryptojacking campaign uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. The malware exhibits worm-like capabilities, spreading across external storage devices, enabling lateral movement even in air-gapped environments. The binary acts as the central nervous system of the infection, serving different roles as an installer, watchdog, payload manager, and cleaner. The malware features a modular design that separates the monitoring features from the core payloads responsible for cryptocurrency mining, privilege escalation, and persistence. The malware includes a logic bomb that operates by retrieving the local system time and comparing it against a predefined timestamp. The hard deadline of December 23, 2025, indicates that the campaign was designed to run indefinitely on compromised systems. The malware uses a legitimate Windows Telemetry service executable to sideload the miner DLL. The malware uses a legitimate but flawed driver (WinRing0x64.sys) as part of a technique called bring your own vulnerable driver (BYOVD). The driver is susceptible to a vulnerability tracked as CVE-2020-14979 (CVSS score: 7.8) that allows privilege escalation. The integration of this exploit into the XMRig miner is to have greater control over the CPU's low-level configuration and boost the mining performance by 15% to 50%. The mining activity took place, albeit sporadically, throughout November 2025, before spiking on December 8, 2025. Read
  • Scarcruft (APT37) Ransomware Campaign Targets South Korea The Contagious Interview campaign has expanded its tactics with three new execution paths for delivering in-memory JavaScript malware via malicious Next.js repositories, as detailed in a February 2026 Microsoft report. The campaign now uses (1) auto-execution via VS Code’s `tasks.json` (triggered by `runOn: "folderOpen"`), (2) build-time payloads embedded in modified libraries (e.g., `jquery.min.js`) activated during `npm run dev`, and (3) server startup scripts that exfiltrate environment variables and fetch attacker-controlled code. These methods converge on a memory-resident JavaScript payload that profiles hosts, registers with a C2 server for a unique `instanceId`, and deploys a second-stage controller for persistent access, discovery, and exfiltration—all while minimizing disk traces. This evolution follows earlier waves, including malicious VS Code projects (January 2026) and EtherRAT’s exploitation of React2Shell (December 2025), but introduces greater operational resilience through alternative staging infrastructure (GitHub gists, URL shorteners, blockchain-based NFT contracts) and multi-platform payloads (Node.js, Python, and npm dependencies like `eslint-validator`). The campaign continues to target cryptocurrency/Web3 developers and global tech sectors, leveraging job-themed lures, fraudulent IT worker networks (WageMole), and collaboration with North Korea’s financial fraud ecosystem. GitLab’s recent ban of 131 accounts tied to the campaign—along with the discovery of a $1.64M revenue-tracking project—highlights the operation’s structured, enterprise-scale coordination, blending espionage, financial theft, and persistent access brokerage. Read
  • Odido Data Breach Exposes 6.2 Million Customer Records Dutch telecommunications provider Odido suffered a cyberattack that exposed personal data of 6.2 million customers. The breach occurred in their customer contact system, but no passwords, call logs, or billing information were affected. The company detected the incident on February 7 and has since taken steps to secure their systems and notify affected customers. The exposed data includes full names, addresses, mobile numbers, customer numbers, email addresses, IBANs, dates of birth, and identification data. Odido has reported the breach to the Dutch Data Protection Authority and is working with external cybersecurity experts to mitigate the incident. The ShinyHunters extortion gang has claimed responsibility for the breach, stating they have stolen nearly 21 million records, including internal corporate data and plaintext passwords. Odido has denied these claims, asserting that no passwords or sensitive data were compromised. Read
  • North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies North Korean state actors have been using fake or stolen identities to secure IT jobs in various companies, particularly in the blockchain and technology sectors. These actors have stolen virtual currency and funneled money to North Korea's weapons program. The practice has escalated with the rise of remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has recently evolved into three distinct hacking groups: Labyrinth Chollima, Golden Chollima, and Pressure Chollima. Labyrinth Chollima continues to focus on cyber espionage, targeting industrial, logistics, and defense companies, while Golden Chollima and Pressure Chollima have shifted towards targeting cryptocurrency entities. Each group uses distinct toolsets in their malware campaigns, all evolutions of the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division. Researchers captured live activity of Lazarus operators on what they believed were real developer laptops, which were actually fully controlled, long-running sandbox environments created by ANY.RUN. Thousands of North Korean IT workers have infiltrated the job market over the past two years, exploiting vulnerabilities in hiring processes and remote work environments. Over 320 cases of North Korean operatives infiltrating companies by posing as remote IT workers were identified in August 2025. The Justice Department has shut down several laptop farms used by these actors, but the problem persists, with security experts warning of significant security risks and financial losses for affected companies. The U.S. Treasury's Office of Foreign Assets Control (OFAC) has recently sanctioned two individuals and two entities for their role in these schemes, identifying financial transfers worth nearly $600,000 and over $1 million in profits generated since 2021. Japan, South Korea, and the United States are collaborating to combat North Korean IT worker schemes. The three countries held a joint forum on August 26, 2025, in Tokyo to improve collaboration, with both Japan and South Korea issuing updated advisories on the threat. The United States sanctioned four entities for their roles in the IT worker fraud schemes, accusing them of working to help the Democratic People's Republic of Korea (DPRK) to generate revenue. Recently, five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling IT worker fraud. The scheme impacted more than 136 U.S. victim companies, generated more than $2.2 million in revenue for the DPRK regime, and compromised the identities of more than 18 U.S. persons. The US government has seized $15m worth of gains in Tether (USDT) from APT38 actors, seeking to return the funds to their rightful owners. North Korean IT recruiters target and lure developers into renting their identities for illicit fundraising. Famous Chollima, part of North Korea’s state-sponsored Lazarus group, uses deep fake videos and avoids appearing on camera during interviews. Legitimate engineers are recruited to act as figureheads in DPRK agents’ operations to secure remote jobs at targeted companies. Compromised engineers receive a percentage of the salary, between 20% and 35%, for the duration of the contract. DPRK agents use compromised engineers' computers as proxies for malicious activities to hide their location and traces. North Korean recruiters use AI-powered tools like AIApply, Simplify Copilot, Final Round AI, and Saved Prompts to autofill job applications and create resumes. The threat actor used Astrill VPN, a popular service among North Korean fake IT workers, for remote connections. The Famous Chollima team involved in this operation consisted of six members, who used the names Mateo, Julián, Aaron, Jesús, Sebastián, and Alfredo. The DPRK IT worker scheme is also tracked as Jasper Sleet, PurpleDelta, and Wagemole. The scheme aims to generate revenue, conduct espionage, and in some cases, demand ransoms. DPRK IT workers transfer cryptocurrency through various money laundering techniques, including chain-hopping and token swapping. Norwegian businesses have been impacted by IT worker schemes, with salaries likely funding North Korea's weapons and nuclear programs. A campaign dubbed Contagious Interview uses fake hiring flows to lure targets into executing malicious code. The campaign employs EtherHiding, a technique using blockchain smart contracts to host and retrieve command-and-control infrastructure. New variants of the Contagious Interview campaign use malicious Microsoft VS Code task files to execute JavaScript malware. The Koalemos RAT campaign involves malicious npm packages to deploy a modular JavaScript remote access trojan (RAT) framework. Oleksandr Didenko, a 39-year-old Ukrainian national, was sentenced to five years in prison for providing North Korean IT workers with stolen identities to infiltrate U.S. companies. Didenko pleaded guilty to aggravated identity theft and wire fraud conspiracy in November 2025 and was arrested in Poland in May 2024. Didenko provided North Korean remote workers with at least 871 proxy identities and proxy accounts on three freelance IT hiring platforms. Didenko facilitated the operation of at least eight 'laptop farms' in Virginia, Tennessee, California, Florida, Ecuador, Poland, and Ukraine. Christina Marie Chapman, a 50-year-old woman from Arizona, was sentenced to 102 months in prison for running a 'laptop farm' from her home between October 2020 and October 2023. Read

Latest updates

Browse →

Google API Keys Expose Gemini AI Data

Updated: · First: 26.02.2026 22:55 · 📰 1 src / 1 articles

Google API keys, previously considered harmless, now expose Gemini AI data due to a privilege escalation. Researchers found nearly 3,000 exposed keys across various sectors, including Google itself. These keys can authenticate to Gemini AI and access private data, potentially leading to significant financial losses for victims.

Aeternum Botnet Adopts Polygon Blockchain for Command and Control

Updated: 26.02.2026 20:00 · First: 26.02.2026 18:00 · 📰 2 src / 3 articles

The Aeternum botnet loader has shifted its command-and-control (C2) operations to the Polygon blockchain, eliminating traditional central servers. This move makes it harder for authorities and security firms to disrupt the botnet by seizing infrastructure. The botnet uses smart contracts on the blockchain to issue commands, which are publicly recorded and immutable. Aeternum is a native C++ loader available in x32 and x64 builds. Operators manage infections via a web dashboard that allows them to select a smart contract, choose a command type, and specify a payload URL. Commands are written to the blockchain as transactions and are accessible to bots querying over 50 remote procedure call endpoints. The botnet's use of blockchain-based C2 complicates traditional takedown strategies, as there is no central infrastructure to seize. Commands stored on-chain are permanent and globally accessible, making proactive DDoS mitigation more critical. The threat actor LenAI has attempted to sell the entire Aeternum toolkit for $10,000, claiming a lack of time for support and involvement in another project. LenAI is also behind a second crimeware solution called ErrTraffic.

Trend Micro Apex One Management Console 0-Day Exploited

Updated: 26.02.2026 19:58 · First: 11.08.2025 14:53 · 📰 2 src / 3 articles

Trend Micro has disclosed and patched two critical vulnerabilities, CVE-2025-71210 and CVE-2025-71211, in its on-premise Apex One Management Console. These vulnerabilities allow for remote code execution (RCE) on vulnerable Windows systems. Trend Micro has released Critical Patch Build 14136 to address these vulnerabilities, which also fixes two high-severity privilege escalation flaws in the Windows agent and four more affecting the macOS agent. The vulnerabilities are due to path traversal weaknesses in the management console and require attackers to have access to it. Previously, Trend Micro disclosed two other critical vulnerabilities, CVE-2025-54948 and CVE-2025-54987, which were actively exploited in the wild. These vulnerabilities allowed for command injection and remote code execution. Trend Micro has released temporary mitigations and is urging users to apply them immediately to protect against potential attacks.

ManoMano Data Breach Affects 38 Million Customers via Third-Party Service Provider

Updated: · First: 26.02.2026 19:35 · 📰 1 src / 1 articles

ManoMano, a European DIY e-commerce platform, disclosed a data breach impacting 38 million customers. The breach occurred in January 2026 due to unauthorized access to a third-party customer service provider. Exposed data includes full names, email addresses, phone numbers, and customer service communications. No account passwords were compromised. The company has taken steps to secure its environment and notified relevant authorities and affected customers. The breach was claimed by an individual using the alias 'Indra' on a hacker forum, alleging the theft of 37.8 million user accounts and thousands of support tickets. The compromised service provider is reportedly a Tunis-based customer support firm that suffered a Zendesk breach.

Critical Juniper Networks PTX Router Vulnerability (CVE-2026-21902)

Updated: · First: 26.02.2026 18:42 · 📰 1 src / 1 articles

A critical vulnerability (CVE-2026-21902) in Juniper Networks' Junos OS Evolved, affecting PTX Series routers, allows unauthenticated remote code execution with root privileges. The flaw stems from incorrect permission assignment in the 'On-Box Anomaly Detection' framework, which is exposed over an external port by default. Successful exploitation could lead to full router takeover. The issue impacts versions before 25.4R1-S1-EVO and 25.4R2-EVO, with fixes available in newer versions. Juniper Networks has not observed active exploitation as of the advisory's publication.

Olympique Marseille confirms cyberattack after data leak

Updated: · First: 26.02.2026 18:11 · 📰 1 src / 1 articles

Olympique de Marseille, a French football club, confirmed an attempted cyberattack after a threat actor claimed to have breached the club's systems earlier in February 2026. The attacker leaked a sample of allegedly stolen data, including information on 400,000 individuals, on a hacking forum. The club reassured that no banking details or passwords were compromised and advised fans to remain vigilant against phishing attempts. The threat actor claims the stolen database contains names, addresses, email addresses, mobile phone numbers, and order information, as well as details on 2,050 Drupal CMS accounts, including 34 staff members and 1,770 contributors and moderators. The club has reported the incident to the French data protection authority (CNIL) and filed a complaint.

UAT-10027 Campaign Targets U.S. Education and Healthcare with Dohdoor Backdoor

Updated: · First: 26.02.2026 17:17 · 📰 1 src / 1 articles

A previously undocumented threat activity cluster, tracked as UAT-10027, has been targeting U.S. education and healthcare sectors since at least December 2025. The campaign delivers a new backdoor named Dohdoor, which uses DNS-over-HTTPS (DoH) for command-and-control (C2) communications. The initial access vector is suspected to involve social engineering phishing techniques, leading to the execution of a PowerShell script that downloads and runs a malicious DLL. The backdoor is launched via DLL side-loading using legitimate Windows executables. The threat actor hides C2 servers behind Cloudflare infrastructure to evade detection. Dohdoor also unhooks system calls to bypass endpoint detection and response (EDR) solutions. While there are tactical similarities to Lazarus Group malware, the victimology differs from typical Lazarus targets.

Darktrace Detects 32 Million Phishing Emails in 2025 as Identity Attacks Surge

Updated: · First: 26.02.2026 17:00 · 📰 1 src / 1 articles

Darktrace detected over 32 million high-confidence phishing emails in 2025, indicating a significant rise in identity-driven cyber threats. The report highlights the increasing sophistication of phishing tactics, including the use of newly created domains, malicious QR codes, and novel social engineering techniques. Identity compromise has overtaken vulnerability exploitation as the primary entry vector, with attackers leveraging stolen credentials and hijacked tokens to gain access. The report also reveals regional and sector-specific trends, with the Americas accounting for 47% of global security events and manufacturing being a major target for ransomware.

Increased Speed and Sophistication in Cyber Threats

Updated: · First: 26.02.2026 16:28 · 📰 1 src / 1 articles

Cyber threats are evolving with increased speed and sophistication, blending into everyday activities such as ads, meeting invites, and software updates. Attackers are exploiting small gaps, delayed patches, misplaced trust, and rushed clicks to establish control more quickly and make cleanup harder.

Ransomware Payment Rate Declines Amid Rising Attacks

Updated: 26.02.2026 16:00 · First: 26.02.2026 16:00 · 📰 2 src / 2 articles

The percentage of ransomware victims paying threat actors dropped to 28% in 2025, the lowest recorded, despite a 50% increase in attacks. Total on-chain payments reached $820 million, with projections exceeding $900 million. Factors like improved incident response, regulatory scrutiny, and law enforcement actions contributed to the decline. The median ransom payment surged by 368%, indicating larger payouts from fewer victims. The number of active extortion groups rose to 85, with notable attacks on Jaguar Land Rover, Marks & Spencer, and DaVita Inc. The U.S. remained the most targeted country. The ransomware payment rate has been declining for four consecutive years, and the average price for network access declined from $1,427 in Q1 2023 to $439 in Q1 2026.

87% of Organizations Have Exploitable Software Vulnerabilities in Production

Updated: · First: 26.02.2026 16:00 · 📰 1 src / 1 articles

A report by DataDog reveals that 87% of organizations have at least one exploitable software vulnerability in production, affecting 40% of all services. Vulnerabilities are most common in Java (59%), .NET (47%), and Rust (40%) services. Only 18% of critical dependency vulnerabilities remain critical after adjusting severity scores with runtime and CVE context. The report also highlights risks at both ends of the software lifecycle, including outdated dependencies and rapid adoption of new library versions.

UK ICO Transitions to Board-Run Model Under Data (Use and Access) Act 2025

Updated: · First: 26.02.2026 16:00 · 📰 1 src / 1 articles

The UK Information Commissioner's Office (ICO) is transitioning from a single-leader model to a board-run structure under the Data (Use and Access) Act 2025 (DUAA). This change aims to meet the agency's growing workload and bring diverse expertise to data protection. The shift will introduce new governance, investigatory powers, and secondary duties, including promoting innovation and competition. The ICO will also expand its Data Essentials training scheme for SMEs. Paul Arnold, the first CEO of the new ICO structure, and John Edwards, the current Information Commissioner, announced the changes at the IAPP Intensive London event on February 25, 2026. The transition is expected to be fully materialized within the next few weeks.

Microsoft Rolls Out Windows Backup for Organizations

Updated: 26.02.2026 15:04 · First: 09.10.2025 17:56 · 📰 2 src / 3 articles

Microsoft has expanded the Windows Backup for Organizations feature to support more enterprise devices. The first sign-in restore experience now allows users to restore settings and Microsoft Store apps on first login to a new or reimaged Windows 11 device, extending support to hybrid-managed environments, multi-user device setups, and Windows 365 Cloud PCs. Originally announced in October 2025, Windows Backup for Organizations is designed to simplify backups and facilitate the transition to Windows 11. The feature is available for Entra-joined devices after installing the September 2025 Windows Monthly Cumulative Update. It backs up Windows settings, preferences, and Microsoft Store-installed apps on Windows 10 and Windows 11 systems, and restores them on Windows 11 PCs during device setup. Data is stored in the Exchange Online cloud, with encryption and strict access controls. The feature must be enabled by IT administrators via backup and restore policy settings.

UNC2814 Campaign Targeting Telecom and Government Networks

Updated: 26.02.2026 14:09 · First: 25.02.2026 19:00 · 📰 3 src / 3 articles

A suspected Chinese threat actor, tracked as UNC2814, has conducted a global espionage campaign since at least 2017, targeting telecom and government networks. The campaign has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more. The actor deployed a new C-based backdoor named GRIDTIDE, which abuses the Google Sheets API for command-and-control (C2) operations. The initial access vector is unknown, but previous exploits involved flaws in web servers and edge systems. GRIDTIDE performs host reconnaissance and supports commands for executing bash commands, uploading, and downloading files. Google, Mandiant, and partners disrupted the campaign by terminating associated Google Cloud projects and disabling known infrastructure. Organizations impacted by GRIDTIDE were notified, and support was offered to clean the infections. Google expects UNC2814 to resume activity using new infrastructure in the near future.

Harvest Now, Decrypt Later: Urgent Need for Post-Quantum Cryptography Migration

Updated: · First: 26.02.2026 14:06 · 📰 1 src / 1 articles

Organizations are urged to prepare for the imminent threat of quantum computing by adopting Post-Quantum Cryptography (PQC) to secure long-term sensitive data. The 'Harvest Now, Decrypt Later' (HNDL) strategy employed by adversaries highlights the vulnerability of current encryption methods against future quantum-enabled decryption attacks. A structured approach to PQC migration is outlined, emphasizing the need for immediate action, strategic planning, and continuous monitoring to ensure data security against evolving threats.

CISA Updates RESURGE Malware Analysis, Reveals Advanced Evasion Techniques

Updated: · First: 26.02.2026 14:00 · 📰 1 src / 1 articles

CISA has released an updated Malware Analysis Report (MAR) on RESURGE, a sophisticated malware that exploits vulnerabilities to establish stealthy SSH-based command-and-control access. The malware can remain dormant on compromised Ivanti Connect Secure devices, evading routine detection. The updated analysis highlights RESURGE's advanced network-level evasion techniques, including forged TLS certificates and cryptographic methods, posing an ongoing threat to affected networks. CISA emphasizes the importance of using the provided indicators of compromise (IOCs) and detection signatures to identify and mitigate RESURGE, urging organizations to implement the recommended actions.

New York sues Valve over illegal gambling via game loot boxes

Updated: · First: 26.02.2026 13:44 · 📰 1 src / 1 articles

New York Attorney General Letitia James has filed a lawsuit against Valve Corporation, alleging that the company promotes illegal gambling through loot boxes in its games. The lawsuit claims that Valve's loot box features violate state gambling laws by offering random virtual prizes that can be exchanged for real money, similar to slot machines. The lawsuit targets loot box features in Counter-Strike 2, Team Fortress 2, and Dota 2, which allow players to pay for virtual containers with randomly selected items. The lawsuit highlights the potential harm to children, as they may be drawn into loot box purchases to win rare items and boost social status within gaming communities. The market for Counter-Strike weapon skins has ballooned into a multibillion-dollar economy, with individual items sometimes fetching prices over $1 million. Valve is accused of skewing the odds of winning rare items to make them more valuable, and the lawsuit seeks to permanently bar Valve from operating loot box features in New York, require Valve to return all profits generated by the practice, and impose fines for the alleged violations.

Scarcruft (APT37) Ransomware Campaign Targets South Korea

Updated: 26.02.2026 12:35 · First: 14.08.2025 03:00 · 📰 20 src / 23 articles

The **Contagious Interview campaign** has **expanded its tactics** with **three new execution paths** for delivering in-memory JavaScript malware via **malicious Next.js repositories**, as detailed in a February 2026 Microsoft report. The campaign now uses (1) **auto-execution via VS Code’s `tasks.json`** (triggered by `runOn: "folderOpen"`), (2) **build-time payloads embedded in modified libraries** (e.g., `jquery.min.js`) activated during `npm run dev`, and (3) **server startup scripts** that exfiltrate environment variables and fetch attacker-controlled code. These methods converge on a **memory-resident JavaScript payload** that profiles hosts, registers with a C2 server for a unique `instanceId`, and deploys a **second-stage controller** for persistent access, discovery, and exfiltration—all while minimizing disk traces. This evolution follows earlier waves, including **malicious VS Code projects (January 2026)** and **EtherRAT’s exploitation of React2Shell (December 2025)**, but introduces **greater operational resilience** through **alternative staging infrastructure** (GitHub gists, URL shorteners, blockchain-based NFT contracts) and **multi-platform payloads** (Node.js, Python, and npm dependencies like `eslint-validator`). The campaign continues to target **cryptocurrency/Web3 developers** and **global tech sectors**, leveraging **job-themed lures**, **fraudulent IT worker networks (WageMole)**, and **collaboration with North Korea’s financial fraud ecosystem**. GitLab’s recent ban of **131 accounts** tied to the campaign—along with the discovery of a **$1.64M revenue-tracking project**—highlights the operation’s **structured, enterprise-scale coordination**, blending **espionage, financial theft, and persistent access brokerage**.

Malicious StripeApi.Net NuGet Package Exfiltrates Stripe API Tokens

Updated: · First: 26.02.2026 12:09 · 📰 1 src / 1 articles

A malicious NuGet package named StripeApi.Net was discovered impersonating the legitimate Stripe.net library. The package, uploaded on February 16, 2026, mimicked the official Stripe.net package to steal Stripe API tokens from developers. The package was removed before causing significant damage. This marks a shift in targeting from cryptocurrency to financial services.

Critical Authentication Bypass in Cisco Catalyst SD-WAN Exploited Since 2023

Updated: 26.02.2026 08:13 · First: 25.02.2026 20:01 · 📰 2 src / 2 articles

A critical authentication bypass vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN has been actively exploited in zero-day attacks since at least 2023. The flaw allows remote attackers to compromise controllers and add malicious rogue peers to targeted networks. The vulnerability stems from a peering authentication mechanism that does not work properly, enabling attackers to log in as high-privileged users and manipulate network configurations. Cisco has released specific software updates to address the issue, and CISA has issued an emergency directive requiring federal agencies to patch affected systems by February 27, 2026. Attackers have been found to leverage the built-in update mechanism to stage a software version downgrade and escalate to the root user by exploiting CVE-2022-20775, and have taken steps to clear evidence of the intrusion by purging logs and command history.

ChatGPT Misuse by Nation-State Actors for Malware Development and Influence Operations

Updated: 26.02.2026 02:00 · First: 08.10.2025 10:16 · 📰 2 src / 3 articles

OpenAI has disrupted multiple activity clusters misusing its ChatGPT AI tool for cyberattacks, including nation-state actors from Russia, North Korea, and China. These actors have used ChatGPT to develop malware, conduct phishing campaigns, and engage in influence operations. The Russian threat actor developed a remote access trojan (RAT) and credential stealer, while the North Korean group created malware and command-and-control (C2) infrastructure. The Chinese group, UNK_DropPitch, generated phishing content and tooling for routine tasks. Additionally, Chinese law enforcement used ChatGPT to draft and edit reports on smear campaigns against Chinese dissidents and Japanese Prime Minister Sanae Takaichi. OpenAI also blocked accounts used for scams, influence operations, and surveillance, including networks from Cambodia, Myanmar, Nigeria, and individuals linked to Chinese government entities.

UFP Technologies Cyberattack Results in Data Theft

Updated: · First: 26.02.2026 01:02 · 📰 1 src / 1 articles

UFP Technologies, a medical device manufacturer, disclosed a cyberattack that compromised its IT systems and resulted in data theft. The incident, detected on February 14, affected billing and label-making functions. While the threat actor was removed, some data was stolen or destroyed. The nature of the malware is unclear, but ransomware or a wiper attack is suspected. UFP Technologies has not confirmed the exfiltration of personal information or received ransom demands.

PCI Security Standards Council Highlights Accelerating Threats to Payment Systems

Updated: · First: 25.02.2026 21:15 · 📰 1 src / 1 articles

The PCI Security Standards Council (PCI SSC) released its first annual report, emphasizing the increasing sophistication and speed of threats targeting payment systems. The report underscores the need for global coordination, education, and collaboration to advance payment security across various sectors. Threat actors are increasingly targeting payment cards, point-of-sale systems, and processing systems through methods like skimming, jackpotting, and credential theft. The council's initiatives aim to secure mobile, data, device, software, and card products by updating standards and compliance requirements.

Claude Code Vulnerabilities Enable Remote Code Execution and API Key Theft

Updated: · First: 25.02.2026 19:00 · 📰 1 src / 1 articles

Multiple vulnerabilities in Anthropic's Claude Code AI-powered coding assistant allow remote code execution and API key exfiltration. The flaws exploit configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables. Three vulnerabilities were identified, with fixes released in versions 1.0.87, 1.0.111, and 2.0.65. Exploitation could lead to arbitrary code execution, data exfiltration, and unauthorized access to AI infrastructure. The vulnerabilities highlight the risks associated with AI-powered tools that execute commands and initiate network communication autonomously.

Increased Exploitation of Unauthenticated Vulnerabilities and AI-Enhanced Attack Techniques

Updated: · First: 25.02.2026 18:16 · 📰 1 src / 1 articles

IBM X-Force's 2025 Threat Intelligence Index reveals that 56% of tracked vulnerabilities required no authentication before exploitation. The report highlights the growing threat of infostealer credential theft, with 300,000 ChatGPT credentials discovered on the dark web. AI is being weaponized by attackers to find weak access points, create deepfakes, and exploit agentic AI systems, expanding the blast radius of compromises. Supply chain attacks have quadrupled over the last five years, with criminals and state-sponsored actors adopting advanced techniques, blurring the lines between their tactics.

SonicWall MySonicWall Breach Exposes Firewall Configuration Files

Updated: 25.02.2026 17:54 · First: 17.09.2025 19:23 · 📰 14 src / 24 articles

Marquis Software Solutions has **filed a lawsuit** against SonicWall, alleging **gross negligence and misrepresentation** in the handling of its MySonicWall cloud backup breach, which directly enabled a **ransomware attack** disrupting 74 U.S. banks in August 2025. The lawsuit reveals that SonicWall introduced a **security gap via an API code change in February 2025**, allowing unauthorized access to firewall configuration backups—including AES-256-encrypted credentials and MFA scratch codes. Marquis, whose firewall was fully patched and MFA-enabled, confirms attackers exploited this stolen data to bypass defenses, contradicting earlier assumptions about unpatched devices. The breach exposed **personal and financial data** of Marquis’ clients, triggering **over 36 consumer class-action lawsuits** and prompting Marquis to seek damages, indemnification, and legal fees. The SonicWall incident began as a targeted compromise of its MySonicWall portal, initially reported in September 2025 as affecting fewer than 5% of customers but later revised to confirm **all cloud backup users** were impacted. Stolen configuration files—containing credentials, network topology, and encrypted secrets—fueled follow-on attacks, including the **Marquis ransomware breach** (January 2026 disclosure) and Akira ransomware campaigns abusing OTP seeds to bypass MFA. SonicWall collaborated with Mandiant to attribute the breach to **state-sponsored actors** and released remediation tools, but the Marquis lawsuit underscores the **long-tail risks** of exposed backup data, even post-containment. Over **950 unpatched SMA1000 appliances** remain exposed online, while CISA and SonicWall urge firmware updates, credential resets, and MFA enforcement.

ShinyHunters and Scattered Spider Collaboration

Updated: 25.02.2026 17:06 · First: 12.08.2025 15:00 · 📰 27 src / 74 articles

The **ShinyHunters and Scattered Spider collaboration**, operating under the **Scattered Lapsus$ Hunters (SLH) alliance**, has escalated its extortion and social engineering tactics in **early 2026** by **recruiting women for vishing attacks** targeting IT help desks, offering **$500–$1,000 per successful call** alongside pre-written scripts. This calculated evolution aims to exploit psychological biases and bypass traditional attacker profiles, increasing the success rate of impersonation and credential harvesting. The group continues to combine **technical intrusions** with **psychological harassment, swatting, and media manipulation** to coerce payments, while leveraging **legitimate services, residential proxies, and tunneling tools** (e.g., Ngrok, Luminati) to evade detection. The alliance’s latest developments include the **ShinySp1d3r RaaS platform**, **Zendesk phishing campaigns**, and **targeted intrusions against financial sectors**, demonstrating a **multi-pronged expansion** in both **technical sophistication** and **psychological warfare**. Their tactics now involve **recruiting diverse social engineering operatives**, deploying **virtual machines for post-exploitation reconnaissance**, and exploiting **cloud APIs (e.g., Microsoft Graph)** to access Azure environments. Despite law enforcement arrests and shutdown claims, SLH remains a **high-risk, low-trust threat actor**, with **no guarantee of data deletion** post-payment and a pattern of **rebranding to evade pressure**. Victims are advised to **refuse engagement** beyond a firm "no payment" stance, as compliance only fuels further escalation and harassment.

OpenClaw Automation Framework Faces Supply Chain Security Risks

Updated: · First: 25.02.2026 17:01 · 📰 1 src / 1 articles

OpenClaw, an AI-powered automation framework, has gained significant attention due to its potential security risks, particularly in its plugin ecosystem. The framework allows users to manage emails, schedules, and system tasks through modular 'skills' that can be installed from a marketplace called ClawHub. Security researchers have identified critical vulnerabilities, including remote code execution and credential theft, which have led to discussions across security research feeds, Telegram channels, and underground forums. While the framework has not yet been fully weaponized for mass exploitation, the supply chain risks associated with its plugin ecosystem are real and pose a significant threat.

44% Increase in Public-Facing Application Exploits Driven by AI

Updated: · First: 25.02.2026 16:30 · 📰 1 src / 1 articles

IBM X-Force reports a 44% surge in cyberattacks targeting public-facing applications, primarily due to missing authentication controls and AI-enabled vulnerability scanning. Vulnerability exploitation led to 40% of incidents in 2025, while active ransomware and extortion groups grew by 49%, with publicly disclosed victim counts rising by 12%. AI is accelerating attacker operations, including reconnaissance and advanced ransomware attacks.

Broken Triage Processes Increase Security Risks and Operational Costs

Updated: · First: 25.02.2026 16:30 · 📰 1 src / 1 articles

Ineffective triage processes in security operations centers (SOCs) are leading to increased business risks, including missed SLAs, higher costs per case, and more opportunities for real threats to evade detection. Five key issues—lack of real evidence, dependency on analyst seniority, delays in triage, over-escalation, and manual work—are identified as major contributors to these problems. High-performing teams are addressing these issues by leveraging execution evidence early in the triage process, using interactive sandboxes to validate behavior and reduce uncertainty. The use of sandboxes like ANY.RUN allows teams to see the full attack chain quickly, leading to faster, evidence-backed decisions. This approach reduces the cost per case, minimizes missed threats, and ensures consistent triage outcomes across shifts. Additionally, it helps in shrinking the time-to-decision, reducing escalation volumes, and increasing Tier 1 capacity by automating repetitive tasks.