CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 17:45 25/03/2026 UTC
  • Underground commercialization of premium AI platform access observed in fraud communities Underground markets are actively commercializing access to premium AI platforms such as ChatGPT, Claude, Microsoft Copilot, and Perplexity, offering discounted, bundled, or allegedly unrestricted subscriptions to cybercriminals and fraud actors. Access is obtained through methods including exposed API keys and secrets, credential theft and account takeover, bulk account creation with virtual phone numbers, abuse of trial and promotional programs, shared or resold subscriptions, and resale of developer or API access. Threat actors use these accounts to automate fraudulent content generation, craft personalized social engineering campaigns, and accelerate malicious operations across phishing, impersonation, and automation workflows. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has expanded their multi-vector CanisterWorm campaign to target the LiteLLM PyPI package (versions 1.82.7 and 1.82.8), embedding credential-stealing malware with automatic execution mechanisms that harvested SSH keys, cloud provider credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, and TLS/SSL private keys before exfiltrating data to attacker-controlled infrastructure and establishing persistent backdoors. The compromised versions were removed from PyPI by March 25, 2026, but researchers warn of downstream breach disclosures and follow-on intrusions due to the volume of stolen credentials. The campaign began as a supply-chain attack involving 47 compromised npm packages and the @teale.io/eslint-config variant, leveraging ICP canisters for decentralized C2 and persistence via masqueraded systemd services. It escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and deployment of an infostealer, then pivoted to targeting CI/CD pipelines directly via GitHub Actions workflows (e.g., Checkmarx, Trivy) using stolen credentials. TeamPCP now compromises GitHub Actions workflows and Open VSX extensions to deploy the TeamPCP Cloud stealer, while refining destructive payloads targeting Iranian systems in Kubernetes environments with time-zone/locale-based wipers. Read
  • Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader. Read
  • Massive data breach at PowerSchool exposes 62 million students' personal information In December 2024, a data breach at PowerSchool, a cloud-based software provider for K-12 schools, exposed the personal information of 62 million students and 9.5 million teachers across the U.S., Canada, and other countries. The breach included full names, addresses, phone numbers, passwords, parent information, contact details, Social Security numbers, and medical data. The attacker initially demanded a $2.85 million ransom in Bitcoin. The breach affected 6,505 school districts, including over 880,000 Texans. The Texas Attorney General has filed a lawsuit against PowerSchool for failing to protect sensitive information. In May 2025, an affiliate of the ShinyHunters group attempted to extort school districts individually. In June 2025, Matthew D. Lane pleaded guilty to orchestrating the attack and attempting to extort millions of dollars. In October 2025, Lane was sentenced to four years in prison and ordered to pay $14 million in restitution and a $25,000 fine. The breach was part of a series of attacks on PowerSchool's PowerSource portal, with previous breaches occurring in August and September 2024. In March 2026, Infinite Campus, another K-12 student information system provider, warned of a breach after ShinyHunters claimed to have stolen data from an employee’s Salesforce account. The exposed data was mostly public, but the incident involved extortion attempts and prompted Infinite Campus to disable certain services and scan for compromised data. ShinyHunters has targeted hundreds of Salesforce accounts in recent campaigns, including claims of stealing over 1.5 billion records. Read
  • Kali Linux 2026.1 distribution update introduces eight new tools, theme refresh, and BackTrack mode Kali Linux 2026.1, the first major release of Kali Linux in 2026, has been published with eight new security tools, a comprehensive theme refresh, and a new BackTrack mode in Kali-Undercover. The update includes a kernel upgrade to version 6.18, 25 new packages, and updates to 183 existing packages. The release targets ethical hackers, penetration testers, and cybersecurity professionals, available as a live environment, installable OS, or via Kali NetHunter on supported hardware including Raspberry Pi and Android devices. Read
  • Industrial-scale exploitation of enterprise identities drives shift to identity-based attacks Security researchers report a significant escalation in adversary use of legitimate enterprise identities to conduct large-scale network intrusions, creating an "impersonation crisis" that bypasses traditional defenses focused on perimeter detection. Attackers leverage compromised or fraudulently obtained accounts—via social engineering, MFA bypass kits, brute-force campaigns, or fake employee personas using AI deepfakes—to achieve persistent, policy-level access within victim organizations. Intrusions often remain undetected until post-compromise damage occurs, such as data exfiltration or ransomware deployment, due to the adversary’s ability to operate under valid credentials and administrative privileges. Read
  • FCC Covered List expansion bans foreign-made consumer routers in U.S. market The U.S. Federal Communications Commission (FCC) has expanded its Covered List to prohibit the sale of new consumer-grade routers manufactured outside the United States, citing unacceptable national security risks. The ban targets 'consumer-grade' routers as defined in NIST Internal Report 8425A, intended for residential use and installable by end users, while permitting continued operation of existing routers. Companies with prior FCC authorization for specific foreign-manufactured models may maintain imports of those approved devices. The decision follows a March 20 National Security Determination identifying severe supply-chain vulnerabilities in foreign-made routers, which have been directly implicated in attacks by China-nexus threat actors such as Volt Typhoon, Flax Typhoon, and Salt Typhoon against U.S. critical infrastructure. Exemptions are strictly limited to Department of Defense or Department of Homeland Security drone and surveillance systems, with no blanket exclusions for foreign-made consumer routers. Existing hardware and U.S.-manufactured devices like Starlink routers remain unaffected, though future model availability may decline due to compliance costs and delays. Read
Last updated: 14:15 25/03/2026 UTC
  • Yanluowang Ransomware Initial Access Broker Pleads Guilty Aleksey Olegovich Volkov, a 26-year-old Russian national from St. Petersburg, was sentenced to 81 months in prison for his role as an initial access broker (IAB) facilitating ransomware attacks. Volkov pleaded guilty to multiple charges, including conspiracy to commit computer fraud and money laundering, and must pay at least $9.2 million in restitution to victims. Between July 2021 and November 2022, Volkov breached corporate networks and sold access to ransomware groups, including Yanluowang, resulting in extortion attempts totaling $24 million. He was arrested in Rome in 2024, extradited to the U.S. in 2025, and admitted to working with several major cybercrime groups. Yanluowang, a Russian ransomware operation unmasked in 2022, employed 'triple extortion' tactics and claimed victims such as Cisco and Walmart. Volkov’s activities as an IAB were part of a broader cybercrime supply chain, enabling multiple ransomware-as-a-service (RaaS) groups to accelerate attacks by purchasing network access. Investigators linked Volkov’s identity through digital evidence, including Apple iCloud data and cryptocurrency records, while chat logs and stolen data provided further confirmation of his involvement. His case highlights the interconnected nature of cybercriminal ecosystems, where access brokers, RaaS operators, and affiliates collaborate to maximize financial gain and operational efficiency. Read
  • Tycoon2FA Phishing-as-a-Service Takedown Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that bypassed MFA using adversary-in-the-middle techniques, resumed operations at pre-disruption levels within days of a March 4, 2026 global takedown, despite initial reductions in campaign volumes. The platform, active since August 2023, offered subscription-based access for bypassing multi-factor authentication, targeting major services like Microsoft 365 and Google. It was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally by mid-2025. The primary operator, identified as 'SaaadFridi' and 'Mr_Xaad,' remains at large. The platform’s infrastructure relied on adversary-in-the-middle techniques, AI-generated decoy pages, and short-lived domains to evade detection, while customers employed tactics like ATO Jumping to distribute phishing URLs. The takedown involved Europol’s EC3 and law enforcement from six European countries. Following the disruption, Tycoon2FA rapidly recovered to pre-disruption operational levels, with daily campaign volumes returning to early 2026 levels by March 6. Post-compromise activities included business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links. Old infrastructure remained active after the disruption, while new phishing domains and IP addresses were registered quickly. Operators continued using unchanged TTPs, including compromised domains, legitimate cloud services, and IPv6-based automated logins, underscoring the resilience of the PhaaS model without arrests or physical seizures. Read
  • ThreatsDay Bulletin: Emerging Cyber Threat Trends The ThreatsDay Bulletin continues to highlight the accelerating pace of cyber threats, where attackers rapidly adapt infrastructure shifts and social engineering lures to exploit familiar systems. Recent developments include targeted exploitation of Fortinet FortiGate devices via Ransomware-as-a-Service (RaaS), active abuse of Citrix ADC/Gateway vulnerabilities in production environments, widespread misuse of Microsoft Configuration Manager (MCP) for lateral movement and data theft, and weaponized LiveChat integrations in phishing campaigns. These trends reflect a broader pattern of quiet, cumulative exposure where small tactical changes accumulate undetected until they surface as major incidents, underscoring the need for continuous monitoring and adaptive defense strategies. Read
  • SonicWall MySonicWall Breach Exposes Firewall Configuration Files Marquis Software Solutions has confirmed that its August 2025 ransomware attack exposed the personal and financial data of 672,075 individuals—including names, Social Security numbers, Taxpayer Identification Numbers, and financial account details—after threat actors exploited firewall configuration files stolen from SonicWall’s MySonicWall cloud backup breach. The company, which serves 700+ U.S. banks and credit unions, completed its forensic review in December 2025 and began notifying affected individuals in March 2026, while facing over 36 consumer class-action lawsuits and a self-initiated lawsuit against SonicWall for alleged gross negligence and misrepresentation. Marquis alleges SonicWall’s February 2025 API code change introduced the vulnerability, delayed disclosure by three weeks, and understated the breach’s scope (initially claiming <5% of customers were affected, later confirmed as 100%). The SonicWall incident began with a September 2025 breach of its MySonicWall portal, where attackers accessed AES-256-encrypted credentials, network topology details, and MFA recovery codes for all cloud backup users. This data fueled follow-on attacks, including the Marquis breach and Akira ransomware campaigns bypassing MFA via stolen OTP seeds. SonicWall collaborated with Mandiant to attribute the breach to state-sponsored actors and released remediation tools, but 950+ unpatched SMA1000 appliances remain exposed online. The Marquis lawsuit—seeking damages, indemnification, and legal fees—could set a precedent for vendor liability, as enterprises increasingly pursue legal action against cybersecurity providers for contribution or negligence in third-party breaches. CISA and SonicWall continue to urge firmware updates, credential resets, and MFA enforcement to mitigate ongoing risks. Read
  • ScreenConnect Abused for Network Intrusions by APT Groups Advanced persistent threat (APT) groups and cybercriminals continue to exploit the remote monitoring and management (RMM) tool ScreenConnect for unauthorized system access, leveraging its legitimate features for persistence and lateral movement. A major malvertising campaign active since January 2026 has specifically targeted U.S. tax filers via Google Ads, delivering rogue ScreenConnect installers that deploy a custom EDR-killing driver (HwAudKiller) using a signed Huawei vulnerable driver (HWAuidoOs2Ec.sys) to blind security tools. The attack chain uses commercial cloaking services (Adspect, JustCloakIt) to evade detection and quickly stacks multiple RMM tools (ScreenConnect, FleetDeck Agent) for redundancy. Observed post-compromise activity includes credential dumping via LSASS access and lateral movement with tools like NetExec, aligning with pre-ransomware or initial access broker behavior. Defenders should prioritize monitoring for rogue ScreenConnect installers delivered via malvertising, kernel-mode driver loads from vulnerable Huawei audio drivers, rapid stacking of multiple RMM tools, and use of EDR killers alongside LSASS memory dumps and lateral movement artifacts. Read
  • Russian UNC6353 Uses Coruna and Darksword iOS Exploit Kits Across iOS 13–18.7 Targeting Financial Espionage and Data Theft The dual iOS exploit kit campaigns—Coruna and Darksword—continue to expand, now targeting iPhones running iOS 18.4 through 18.7 with the modular Darksword malware family. Darksword, attributed to the Russian threat actor UNC6353 alongside Coruna, leverages six known and zero-day vulnerabilities to achieve kernel read/write via Safari, enabling rapid exfiltration of cryptocurrency wallets, messages, location history, health data, and system credentials within seconds to minutes before self-wiping. The malware is a professionally engineered JavaScript platform with three documented payload families (GHOSTBLADE, GHOSTKNIFE, GHOSTSABER) used by multiple actors—UNC6353, UNC6748, and Turkish vendor PARS Defense—across Saudi Arabia, Turkey, Malaysia, and Ukraine since at least November 2025. Darksword’s OPSEC failures and use of watering hole attacks mirror Coruna’s tactics, while its ‘hit-and-run’ data theft model signals a shift toward opportunistic financial espionage. Apple has patched all exploited flaws in current iOS releases (18.7.3, 26.2, 26.3.1), and users are advised to upgrade and enable Lockdown Mode if at high risk. CISA has ordered U.S. federal agencies to patch three DarkSword-linked vulnerabilities (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520) by April 3, 2026, under BOD 22-01, while urging all organizations to prioritize fixes due to active exploitation in cryptocurrency theft and cyberespionage campaigns. UNC6353 deploys both exploit kits in watering-hole attacks targeting Ukrainian e-commerce, industrial equipment, and local services websites. Prior context: The Coruna exploit kit, first observed in February 2025, targeted iOS 13.0–17.2.1 with 23 exploits across five chains, used by UNC6353 and UNC6691 in watering hole attacks on Ukrainian and Chinese crypto-related websites. CISA added three Coruna-linked vulnerabilities to its Known Exploited Vulnerabilities catalog and mandated patches by March 26, 2026. Apple backported fixes to older devices, including iOS 15.8.7/16.7.15, addressing vulnerabilities linked to Operation Triangulation and U.S. military contractor L3Harris. Read
  • Optimizely Data Breach After Vishing Attack An ongoing wave of vishing-led breaches attributed to ShinyHunters has claimed a new victim: Aura, a digital safety firm. The attack exposed contact details of nearly 900,000 individuals, stemming from a marketing tool inherited in a 2021 acquisition. ShinyHunters claimed the theft of 12GB of files containing PII and corporate data, releasing it after failed extortion attempts. The company emphasized no SSNs, passwords, or financial data were compromised and is conducting an internal review with law enforcement involvement. Earlier in February, Optimizely disclosed a similar breach following a voice phishing attack that compromised basic business contact information. Both incidents underscore the continued exploitation of vishing tactics by ShinyHunters to gain initial access to organizations, with impacts focused on contact data rather than deeper system compromise. Read

Latest updates

Browse →

Cloud-based Android devices leveraged as dropper accounts for financial fraud

Updated: · First: 25.03.2026 18:05 · 📰 1 src / 1 articles

Cloud phone platforms—remote-access Android environments hosted in data centers—are increasingly used by threat actors to establish and manage dropper accounts for financial fraud. These environments emulate legitimate smartphones, evading traditional device fingerprinting and emulator detection due to realistic hardware identifiers, sensor data, and mobile network characteristics. Fraud losses in the UK attributed to Authorized Push Payment (APP) scams exceeded £485.2 million in 2022, with dropper accounts identified as a significant vector. Cloud phone services, rented at low cost online, allow operators to control multiple virtual devices without physical hardware, enabling scalable abuse. In some cases, pre-verified bank accounts linked to cloud phone devices are resold on darknet markets, transferring both account access and device context to new actors. This undermines banks’ reliance on device recognition for fraud detection, increasing the risk of transaction approval without additional scrutiny.

Industrial-scale exploitation of enterprise identities drives shift to identity-based attacks

Updated: · First: 25.03.2026 17:30 · 📰 1 src / 1 articles

Security researchers report a significant escalation in adversary use of legitimate enterprise identities to conduct large-scale network intrusions, creating an "impersonation crisis" that bypasses traditional defenses focused on perimeter detection. Attackers leverage compromised or fraudulently obtained accounts—via social engineering, MFA bypass kits, brute-force campaigns, or fake employee personas using AI deepfakes—to achieve persistent, policy-level access within victim organizations. Intrusions often remain undetected until post-compromise damage occurs, such as data exfiltration or ransomware deployment, due to the adversary’s ability to operate under valid credentials and administrative privileges.

Emergence of AI-powered attack and defense techniques reshaping cyber threat landscape in 2026

Updated: · First: 25.03.2026 16:40 · 📰 1 src / 1 articles

At RSAC 2026, SANS Institute researchers unveiled five AI-driven attack techniques becoming mainstream in 2026, fundamentally altering the cyber threat landscape. Independent researchers demonstrated AI-generated zero-day exploits at minimal cost ($116 in AI token expenses), breaking historical barriers to zero-day development. Supply chain attacks continued to surge, with malicious packages like the Shai-Hulud worm exposing 14,000 credentials across 487 organizations and a China-affiliated group compromising Notepad++ update infrastructure for six months. Operational Technology (OT) environments face increasing accountability crises due to lack of visibility, where evidence evaporates post-compromise and critical infrastructure incidents result in catastrophic outcomes with unclear attribution. Irresponsible AI deployment in Digital Forensics & Incident Response (DFIR) is generating false confidence and undermining response outcomes. Meanwhile, defenders are adopting autonomous defense frameworks like Protocol SIFT to counter AI-driven attacks, achieving up to 47x faster response times in simulated incidents.

GlassWorm malware targets OpenVSX, VS Code registries

Updated: 25.03.2026 16:26 · First: 20.10.2025 19:13 · 📰 14 src / 33 articles

GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, with the latest iteration leveraging Solana dead drops for C2, a novel browser extension for surveillance, and a shift into the Model Context Protocol (MCP) ecosystem. The campaign now delivers a .NET binary that targets Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data, executes arbitrary code, and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline to perform session surveillance on cryptocurrency platforms like Bybit and harvest extensive browser data. Additionally, threat actors have begun distributing malicious payloads via npm packages impersonating the WaterCrawl MCP server, marking GlassWorm’s first confirmed incursion into the AI-assisted development ecosystem. The GlassWorm campaign remains a persistent supply chain threat impacting multiple ecosystems including npm, PyPI, GitHub, and Open VSX. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. The Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers.

Escalating Threat Landscape Driven by AI-Augmented Identity Compromise and Geopolitically Motivated Attacks

Updated: · First: 25.03.2026 16:15 · 📰 1 src / 1 articles

Cyber threat actors increasingly leverage AI to automate and scale attacks, particularly through identity compromise and advanced social engineering, while geopolitical tensions shape targeting and tactics. Enterprise infrastructures remain vulnerable due to persistent reliance on traditional identity mechanisms and inadequate defenses against evolving attack vectors. The integration of AI into threat operations enhances reconnaissance, malware development, and phishing campaigns, though fully autonomous attack sequences remain largely experimental rather than operational at scale. Defensive strategies must prioritize identity governance and continuous trust validation, with organizations aligning security measures to high-impact assets and geopolitically motivated adversaries.

Underground commercialization of premium AI platform access observed in fraud communities

Updated: · First: 25.03.2026 16:02 · 📰 1 src / 1 articles

Underground markets are actively commercializing access to premium AI platforms such as ChatGPT, Claude, Microsoft Copilot, and Perplexity, offering discounted, bundled, or allegedly unrestricted subscriptions to cybercriminals and fraud actors. Access is obtained through methods including exposed API keys and secrets, credential theft and account takeover, bulk account creation with virtual phone numbers, abuse of trial and promotional programs, shared or resold subscriptions, and resale of developer or API access. Threat actors use these accounts to automate fraudulent content generation, craft personalized social engineering campaigns, and accelerate malicious operations across phishing, impersonation, and automation workflows.

Kali Linux 2026.1 distribution update introduces eight new tools, theme refresh, and BackTrack mode

Updated: · First: 25.03.2026 14:31 · 📰 1 src / 1 articles

Kali Linux 2026.1, the first major release of Kali Linux in 2026, has been published with eight new security tools, a comprehensive theme refresh, and a new BackTrack mode in Kali-Undercover. The update includes a kernel upgrade to version 6.18, 25 new packages, and updates to 183 existing packages. The release targets ethical hackers, penetration testers, and cybersecurity professionals, available as a live environment, installable OS, or via Kali NetHunter on supported hardware including Raspberry Pi and Android devices.

FCC Covered List expansion bans foreign-made consumer routers in U.S. market

Updated: 25.03.2026 14:30 · First: 24.03.2026 22:41 · 📰 3 src / 3 articles

The U.S. Federal Communications Commission (FCC) has expanded its Covered List to prohibit the sale of new consumer-grade routers manufactured outside the United States, citing unacceptable national security risks. The ban targets 'consumer-grade' routers as defined in NIST Internal Report 8425A, intended for residential use and installable by end users, while permitting continued operation of existing routers. Companies with prior FCC authorization for specific foreign-manufactured models may maintain imports of those approved devices. The decision follows a March 20 National Security Determination identifying severe supply-chain vulnerabilities in foreign-made routers, which have been directly implicated in attacks by China-nexus threat actors such as Volt Typhoon, Flax Typhoon, and Salt Typhoon against U.S. critical infrastructure. Exemptions are strictly limited to Department of Defense or Department of Homeland Security drone and surveillance systems, with no blanket exclusions for foreign-made consumer routers. Existing hardware and U.S.-manufactured devices like Starlink routers remain unaffected, though future model availability may decline due to compliance costs and delays.

TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks

Updated: 25.03.2026 14:00 · First: 21.03.2026 09:28 · 📰 5 src / 7 articles

TeamPCP has expanded their multi-vector CanisterWorm campaign to target the LiteLLM PyPI package (versions 1.82.7 and 1.82.8), embedding credential-stealing malware with automatic execution mechanisms that harvested SSH keys, cloud provider credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, and TLS/SSL private keys before exfiltrating data to attacker-controlled infrastructure and establishing persistent backdoors. The compromised versions were removed from PyPI by March 25, 2026, but researchers warn of downstream breach disclosures and follow-on intrusions due to the volume of stolen credentials. The campaign began as a supply-chain attack involving 47 compromised npm packages and the @teale.io/eslint-config variant, leveraging ICP canisters for decentralized C2 and persistence via masqueraded systemd services. It escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and deployment of an infostealer, then pivoted to targeting CI/CD pipelines directly via GitHub Actions workflows (e.g., Checkmarx, Trivy) using stolen credentials. TeamPCP now compromises GitHub Actions workflows and Open VSX extensions to deploy the TeamPCP Cloud stealer, while refining destructive payloads targeting Iranian systems in Kubernetes environments with time-zone/locale-based wipers.

US Cyber Strategy ‘Red Line’ Criteria for Offensive Cyber in Military Context Discussed by Former NSA Directors

Updated: · First: 25.03.2026 13:55 · 📰 1 src / 1 articles

Four former directors of the NSA and US Cyber Command publicly discussed the US government’s offensive cyber strategy, including the definition of a kinetic response ‘red line’ for severe cyberattacks, during a keynote at RSAC 2026 in San Francisco. The panel, moderated by venture capitalist Ted Schlein, addressed the evolution of offensive cyber from a classified concept to a public-facing military capability, the role of the private sector, and the necessity of offensive capabilities for national defense. The discussion followed the release of the Trump administration’s cyber strategy prioritizing offensive cyber and deterrence, and occurred amid a visible decline in US government representation at major cybersecurity conferences.

Sentencing of TA551 Botnet Operator for Ransomware Access Facilitation

Updated: · First: 25.03.2026 13:52 · 📰 1 src / 1 articles

A Russian national, Ilya Angelov, was sentenced to two years imprisonment and fined $100,000 for co-managing the TA551 botnet used to facilitate ransomware attacks against U.S. enterprises. Between 2017 and 2021, Angelov and associates operated the botnet via spam email malware distribution, monetizing access by selling compromised systems to criminal groups including BitPaymer, IcedID operators, TrickBot affiliates, and Lockean ransomware gangs. The group’s activities directly enabled ransomware extortion campaigns impacting 72 U.S. corporations with over $14.17 million in proceeds.

Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS

Updated: · First: 25.03.2026 13:34 · 📰 1 src / 1 articles

An ongoing device code phishing campaign is targeting Microsoft 365 accounts across at least 340 organizations in five countries (U.S., Canada, Australia, New Zealand, Germany) since mid-February 2026. The campaign abuses legitimate OAuth device authorization flows to harvest credentials and establish persistent access tokens, including via a newly identified phishing-as-a-service platform named EvilTokens. Attackers redirect victims through multi-hop chains using Cloudflare Workers, Railway PaaS infrastructure, and legitimate vendor redirect services (Cisco, Trend Micro, Mimecast) to bypass spam filters. Targeted sectors include construction, non-profits, real estate, manufacturing, financial services, healthcare, legal, and government. The technique generates valid OAuth tokens even after password resets, enabling long-term account compromise.

Critical authentication bypass and command injection vulnerabilities patched in TP-Link Archer NX series routers

Updated: · First: 25.03.2026 13:11 · 📰 1 src / 1 articles

TP-Link has released critical security updates for multiple Archer NX series wireless routers to address authentication bypass, command injection, and hardcoded key vulnerabilities. The most severe flaw (CVE-2025-15517) allows unauthenticated attackers to bypass authentication and upload malicious firmware or modify configurations. Additional issues include a hardcoded cryptographic key enabling configuration file decryption and modification (CVE-2025-15605), and two command injection vulnerabilities (CVE-2025-15518, CVE-2025-15519) permitting arbitrary code execution with admin privileges. Users are strongly advised to apply patches immediately due to active exploitation risks and prior incidents of delayed patching affecting similar models.

Malicious Chrome browser extensions exfiltrate AI prompts via API interception and DOM scraping in prompt poaching campaigns

Updated: · First: 25.03.2026 13:00 · 📰 1 src / 1 articles

Security researchers have identified multiple malicious Chrome browser extensions actively engaged in "prompt poaching," a technique that covertly intercepts and exfiltrates users' AI chat conversations to external servers. These extensions monitor open browser tabs, detect loaded AI clients, and collect input/output via API interception or DOM scraping before transmitting harvested prompts to attacker-controlled infrastructure. The campaign affects both impersonated legitimate extensions and previously benign tools that were later weaponized, with threat actors leveraging stolen prompts for identity theft, targeted phishing, or sale on underground forums. Organizations are advised to restrict AI-related browser extension installations and enforce centralized extension management policies to mitigate exposure of sensitive data, intellectual property, or customer information.

Nationwide UK fraud disruption operation leads to 557 arrests and £27.1m in seizures

Updated: · First: 25.03.2026 11:35 · 📰 1 src / 1 articles

A coordinated UK law enforcement crackdown codenamed Operation Henhouse resulted in 557 arrests, 172 voluntary interviews, 249 cease-and-desist notices, £9m in account freezing orders, and £18.1m in cash and asset seizures. The fifth iteration of the operation, led by the National Crime Agency and City of London Police with participation from every UK police force, Regional Organised Crime Unit, Serious Fraud Office, National Trading Standards, and Financial Conduct Authority, targeted both offline and digital fraud including romance fraud, intellectual property crime, and call center scams. Efforts disrupted six overseas fraud call centers, blocked 283 numbers and 6.5 million calls, and recovered high-value assets such as gold bars, designer goods, artwork, and vehicles.

Mario Kart botnet operator sentenced for facilitating ransomware attacks via phishing campaigns

Updated: · First: 25.03.2026 10:47 · 📰 1 src / 1 articles

A Russian national was sentenced to two years in prison for managing the Mario Kart botnet, a phishing infrastructure used to distribute malware that enabled BitPaymer ransomware attacks against 72 U.S. companies. The operator, identified as Ilya Angelov, recruited affiliates, oversaw malware development and distribution, and sold access to infected systems to RaaS affiliates. The botnet operated at scale, infecting up to 3,000 computers daily through spam campaigns that peaked at 700,000 emails per day between 2017 and 2021. The operation generated over $14 million in extortion payments from identified U.S. victims alone, with additional payments linked to botnet access sold to other cybercriminal groups, including the IcedID gang and TrickBot affiliates.

Critical unauthenticated RCE vulnerability in PTC Windchill and FlexPLM disclosed with imminent exploitation risk

Updated: · First: 25.03.2026 01:04 · 📰 1 src / 1 articles

A critical, unauthenticated remote code execution (RCE) vulnerability, tracked as CVE-2026-4681, has been disclosed in PTC Windchill and FlexPLM product lifecycle management (PLM) platforms. The flaw arises from insecure deserialization of trusted data and enables arbitrary code execution without authentication. German federal authorities (BKA) have taken emergency action, dispatching officers to alert organizations nationwide—including some not running affected software—due to credible intelligence of imminent exploitation by a third-party threat actor. The vulnerability affects most supported versions of Windchill and FlexPLM across all critical patch sets (CPS). While no public exploitation has been confirmed, PTC has released detection indicators and mitigation guidance involving Apache/IIS rule configuration to block access to the vulnerable servlet path. Mitigation is recommended for all deployments, with priority on internet-facing systems. If mitigation is infeasible, vendors advise temporary disconnection from the internet or service shutdown.

Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines

Updated: 25.03.2026 00:29 · First: 23.03.2026 15:14 · 📰 4 src / 4 articles

The TeamPCP threat group has expanded its supply chain campaign to compromise the popular LiteLLM Python package on PyPI, publishing malicious versions 1.82.7 and 1.82.8 that deploy the TeamPCP Cloud Stealer infostealer. The attack follows the group’s recent compromise of the Trivy vulnerability scanner and impacts organizations using the library’s LLM gateway functionality. The malicious payload executes upon package import, harvesting extensive credentials (SSH keys, cloud tokens, Kubernetes secrets, cryptocurrency wallets, and .env files) and attempting lateral movement via privileged Kubernetes pod deployment. Persistence is achieved through a disguised systemd service that contacts attacker infrastructure at checkmarx.zone. Exfiltrated data is encrypted and sent to models.litellm.cloud. Both malicious versions have been removed from PyPI, with version 1.82.6 now the latest clean release. TeamPCP’s campaign now spans CI/CD pipelines (Trivy, Checkmarx KICS), container registries (Aqua Security Docker Hub images), and LLM integration tools (LiteLLM), demonstrating industrialized supply chain exploitation with reused tooling and infrastructure. The group claims approximately 500,000 devices were compromised during the LiteLLM attack, though this figure remains unconfirmed. The broader incident highlights persistent risks in supply chain security where compromised security tools enable rapid worm propagation and cascading compromises across cloud-native environments. Key milestones include the initial Trivy compromise on March 19, 2026, the deployment of CanisterWorm and wiper attacks targeting Iran or Farsi-locale systems over March 21–22, 2026, and the expansion to additional targets such as LiteLLM. Security advisories emphasize the critical need for organizations to rotate all exposed credentials and inspect Kubernetes clusters for unauthorized pods, as cascading compromises often stem from unrotated secrets and tokens.

NCSC Urges Immediate Implementation of Vibe Coding Security Safeguards in AI Code-Generation Tools

Updated: · First: 24.03.2026 23:00 · 📰 1 src / 1 articles

The UK’s National Cyber Security Centre (NCSC) has called for immediate development and adoption of security safeguards for AI-assisted software development (vibe coding) to prevent the propagation of vulnerabilities in automatically generated code. Speaking at the RSA Conference on March 24, NCSC CEO Richard Horne emphasized that while vibe coding disrupts traditional manual development—often plagued by vulnerabilities—AI tools must be engineered from inception to produce secure-by-default code. Otherwise, unchecked AI-generated software could amplify cyber-attack surfaces. Horne stressed that the industry must act now to embed security principles into AI code-generation workflows before widespread adoption exacerbates existing risks.

Governance gaps exposed in autonomous AI agent platforms through OpenClaw incidents

Updated: · First: 24.03.2026 20:27 · 📰 1 src / 1 articles

OpenClaw, an open-source autonomous AI agent platform with agent-to-agent social networking capabilities, has demonstrated critical security and governance shortcomings after an agent accidentally deleted user emails, underscoring risks in unsupervised agentic AI systems. The platform has evolved from a chatbot interface into an authoritative automation executional layer capable of triggering file access, API calls, third-party communications, and infrastructure changes across business-critical workflows including revenue operations, IT, HR, procurement, and security. This shift from recommendation to action introduces significant risk when governance frameworks are absent or inadequate. Local deployments of OpenClaw operate as always-running services with persistent credentials and activity logs, often spreading into workflows without enterprise visibility. The OpenClaw Gateway functions as a control plane routing prompts to tools and services using inherited user permissions, creating a potential single chokepoint with enterprise-wide blast radius if compromised. Incidents highlight prompt injection risks where malicious instructions can trigger unauthorized actions through legitimate workflows, supply chain drift where extensions gradually expand permissions without detection, and malware delivery via rogue installers or fake prerequisites.

Firefox 149 integrates free browser-level VPN with 50GB monthly allowance for authenticated users

Updated: · First: 24.03.2026 19:23 · 📰 1 src / 1 articles

Mozilla has integrated a free, built-in VPN feature into Firefox 149 that routes browser traffic through a secure proxy to obscure user IP addresses and location. The service provides up to 50GB of monthly traffic for users with a Mozilla account and will initially roll out to users in the U.S., UK, Germany, and France. The VPN operates at the browser level, differentiating it from Mozilla’s commercial system-wide VPN offering. The feature includes granular controls, such as toggling the VPN on/off and restricting its use to specific websites (up to five) to manage bandwidth. Mozilla states it will collect only technical and interaction data necessary for service maintenance and performance monitoring, with no logging of user content. The routing server is U.S.-based, optimized for location and performance.

ScreenConnect Abused for Network Intrusions by APT Groups

Updated: 24.03.2026 19:05 · First: 13.10.2025 18:45 · 📰 2 src / 2 articles

Advanced persistent threat (APT) groups and cybercriminals continue to exploit the remote monitoring and management (RMM) tool ScreenConnect for unauthorized system access, leveraging its legitimate features for persistence and lateral movement. A major malvertising campaign active since January 2026 has specifically targeted U.S. tax filers via Google Ads, delivering rogue ScreenConnect installers that deploy a custom EDR-killing driver (HwAudKiller) using a signed Huawei vulnerable driver (HWAuidoOs2Ec.sys) to blind security tools. The attack chain uses commercial cloaking services (Adspect, JustCloakIt) to evade detection and quickly stacks multiple RMM tools (ScreenConnect, FleetDeck Agent) for redundancy. Observed post-compromise activity includes credential dumping via LSASS access and lateral movement with tools like NetExec, aligning with pre-ransomware or initial access broker behavior. Defenders should prioritize monitoring for rogue ScreenConnect installers delivered via malvertising, kernel-mode driver loads from vulnerable Huawei audio drivers, rapid stacking of multiple RMM tools, and use of EDR killers alongside LSASS memory dumps and lateral movement artifacts.

Silver Fox APT adapts tooling from ValleyRAT to Python credential stealer in dual-purpose campaigns

Updated: · First: 24.03.2026 18:00 · 📰 1 src / 1 articles

Between late 2025 and early 2026, the Silver Fox intrusion group shifted its operational focus from traditional espionage-style malware to a hybrid model combining state-aligned intelligence collection with financially driven cybercrime. The group targeted finance teams across South and East Asia using tax and payroll-themed phishing lures, evolving delivery methods from malicious PDF attachments and DLL side-loading to SEO poisoning and malicious ads, and ultimately to a custom Python-based credential stealer disguised as a WhatsApp application. Impact includes compromised credentials and sensitive files from organizations in Taiwan, Japan, Malaysia, India, Indonesia, Singapore, Thailand, and the Philippines, with evidence suggesting targeted espionage during tax audit periods and broader financially motivated theft.

Multiple vulnerabilities in Citrix, Git, and GitLab added to CISA KEV catalog

Updated: 24.03.2026 17:15 · First: 26.08.2025 08:55 · 📰 7 src / 10 articles

As of March 24, 2026, Citrix has disclosed two new vulnerabilities in NetScaler ADC and NetScaler Gateway: CVE-2026-3055, a critical memory overread flaw enabling unauthenticated sensitive data leaks, and CVE-2026-4368, a race condition leading to user session mixups. Both vulnerabilities require specific configurations to be exploitable and affect versions 14.1 before 14.1-66.59, 13.1 before 13.1-62.23, and related FIPS/NDcPP builds. While no in-the-wild exploitation has been observed, historical targeting of similar NetScaler flaws underscores the need for urgent patching. The event began in 2024 with the addition of Citrix Session Recording and Git vulnerabilities to the CISA KEV catalog, followed by the inclusion of NetScaler ADC and Gateway flaws in August 2025. In February 2026, CISA added a five-year-old GitLab SSRF flaw (CVE-2021-39935) to the KEV catalog due to active exploitation. The current developments mark a continuation of recurring vulnerabilities in Citrix’s NetScaler platform, reflecting persistent exploitation trends and the criticality of these appliances in enterprise environments. Citrix has since disclosed CVE-2026-3055, a critical out-of-bounds read vulnerability with CVSS 9.3, enabling unauthenticated memory leaks from appliance memory. Exploitation requires the appliance to be configured as a SAML Identity Provider (SAML IDP), affects only customer-managed instances, and remediation includes patched builds (14.1-66.59+, 13.1-62.23+) or Global Deny List signatures for select firmware builds. No in-the-wild exploitation or PoC has been observed as of March 24, 2026.

Microsoft Investigates Multiple Issues in Classic Outlook

Updated: 24.03.2026 17:12 · First: 23.02.2026 21:40 · 📰 3 src / 4 articles

Microsoft has resolved a bug causing synchronization issues for Gmail and Yahoo accounts in classic Outlook, which previously triggered 0x800CCC0F and 0x80070057 errors. The company confirmed the fix was deployed in the Microsoft 365 service, though some users may still encounter temporary sync problems until their OAuth tokens expire. Microsoft continues to investigate additional issues, including "Can't connect to the server" errors when creating groups with EWS enabled and the mouse pointer disappearance bug that affects classic Outlook and other Microsoft 365 apps. Earlier investigations revealed that Microsoft was addressing multiple problems in classic Outlook, including mouse pointer disappearance that also impacted OneNote and other Microsoft 365 apps, as well as synchronization and connection issues with Gmail and Yahoo accounts. Temporary workarounds were provided for these issues while Microsoft worked on permanent fixes.

Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign

Updated: 24.03.2026 16:30 · First: 24.03.2026 14:00 · 📰 2 src / 2 articles

A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader.

Authentication and Device Posture Integration Gaps in Zero Trust Implementations Exposed

Updated: · First: 24.03.2026 16:02 · 📰 1 src / 1 articles

Organizations migrating to Zero Trust frameworks often neglect the critical linkage between user authentication and device trust, leaving hybrid workforces vulnerable to credential theft and session hijacking despite multi-factor authentication (MFA) deployment. The absence of continuous device posture validation enables attackers to exploit stolen tokens or session cookies to bypass identity checks, transforming authenticated sessions into covert access channels. Without real-time device health verification, Zero Trust remains partially implemented, failing to address lateral movement risks associated with compromised endpoints.

Navia Benefit Solutions reports data exposure impacting 2.7 million individuals

Updated: 24.03.2026 16:01 · First: 19.03.2026 22:43 · 📰 2 src / 2 articles

Navia Benefit Solutions confirmed a data breach affecting approximately 2.7 million individuals, with unauthorized access occurring between December 22, 2025, and January 15, 2026. The breach was attributed to a Broken Object Level Authorization (BOLA) vulnerability, and the exposed data includes full names, dates of birth, Social Security Numbers, phone numbers, email addresses, and enrollment details for HRA, FSA, and COBRA programs. No claims or financial information was exposed, but the incident heightened risks of phishing and identity theft. The breach also impacted HackerOne, a bug bounty platform, exposing sensitive data for 287 employees and their dependents, including Social Security numbers, addresses, and plan enrollment details. Navia notified law enforcement, offered 12 months of identity protection services, and sent letters to impacted companies on February 20, 2026. The incident has not been attributed to a specific cybercrime group or ransomware operation.

Keynote at Infosecurity Europe 2026 to feature former Ukrainian Foreign Minister on Russia’s cyber-warfare integration with kinetic operations

Updated: · First: 24.03.2026 16:00 · 📰 1 src / 1 articles

Former Ukrainian Foreign Minister Dr. Dmytro Kuleba will deliver a keynote at Infosecurity Europe 2026 on 3 June 2026, discussing Ukraine’s wartime experiences with synchronized Russian cyber and kinetic attacks. Kuleba’s address, titled ‘Ukraine’s Hybrid War and the New Cyber Frontline,’ will focus on how Russia weaponized telecommunications disruption, disinformation, and electronic warfare in tandem with physical strikes, framing Western enterprises as the new primary battlefield. The session underscores the evolution of cyber conflict into a persistent, high-impact domain requiring enterprise-level resilience amid escalating geopolitical tensions.

Malicious OpenClaw AI Coding Assistant Extension on VS Code Marketplace

Updated: 24.03.2026 16:59 · First: 28.01.2026 19:46 · 📰 9 src / 17 articles

A malicious GitHub campaign, tracked as **"TroyDen's Lure Factory"**, is distributing over **300 Trojanized packages**, including a fake **OpenClaw Docker deployer**, to deliver a LuaJIT-based data-stealing Trojan. The campaign targets developers, gamers, and the general public with lures ranging from AI tools to game cheats, exploiting automated analysis gaps by splitting the payload into two components—a renamed Lua runtime and an encrypted script—that evade detection when analyzed separately. Once executed, the Trojan captures screenshots, performs geolocation, and exfiltrates credentials to a Frankfurt-based C2 server, with a **29,000-year sleep delay** to defeat sandboxes. GitHub was notified on **March 20, 2026**, but at least two lure repositories remain active. This follows a pattern of **supply-chain and social engineering attacks** leveraging OpenClaw’s popularity, including prior incidents like the **Cline npm compromise** (February 2026), **malicious ClawHub skills** pushing info-stealers, and **exposed OpenClaw instances** (40,000+ vulnerable deployments globally). Chinese authorities have restricted OpenClaw usage in state-run enterprises due to its **privileged system access and prompt injection risks**, while threat actors continue to distribute **fake installers** (e.g., Atomic Stealer, Vidar, GhostSocks proxy malware). Users are urged to **verify repository authenticity, isolate AI tools, and audit environments** for unexpected OpenClaw installations.