CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 18:30 20/03/2026 UTC
  • Aisuru botnet conducts record-breaking DDoS attacks, targeting U.S. ISPs and Microsoft Azure The Aisuru/Kimwolf botnet ecosystem has reached a critical disruption milestone after a multi-national law enforcement operation led by the U.S. Department of Justice (DoJ), alongside Canadian and German authorities, successfully dismantled the command-and-control (C2) infrastructure of four interconnected botnets—AISURU, Kimwolf, JackSkid, and Mossad—on March 20, 2026. This court-authorized takedown, supported by 18+ tech firms (including Akamai, Cloudflare, Google, AWS, and Oracle), targeted the botnets’ 3 million+ infected devices (including 2 million+ Android TVs, routers, DVRs, and IoT cameras), which had been weaponized to launch record-breaking DDoS attacks (e.g., 31.4 Tbps in November 2025) and hyper-volumetric campaigns averaging 3 Bpps, 4 Tbps, and 54 Mrps. The botnets’ cybercrime-as-a-service model enabled operators to sell access to compromised devices for DDoS extortion, residential proxy monetization, and lateral movement in corporate/government networks, with hundreds of thousands of attack commands issued across sectors like telecom, gaming, IT, and critical infrastructure. The disruption severed C2 communications, aiming to prevent further infections and eliminate the botnets’ ability to launch future attacks, including those targeting U.S. Department of Defense (DoD) networks. Despite this first major law enforcement strike, persistent infections and operator evasion tactics (e.g., ENS-based C2, decentralized proxy abuse) underscore the ongoing challenge of full eradication. Prior milestones include the botnets’ accidental Sybil attack on the I2P anonymity network (February 2026), their exploitation of residential proxy networks (IPIDEA) for internal network infiltration (January 2026), and Google’s takedown of IPIDEA (January 29, 2026), which reduced millions of proxy exit nodes. The DoJ’s action follows a year of escalating hyper-volumetric attacks, including Cloudflare’s mitigation of 47.1 million DDoS attacks in 2025 (a 100% YoY increase) and Akamai’s reports of attacks exceeding 30 Tbps/14 Bpps. While the operation marks a significant blow to the botnets’ operational capacity, their adaptive resilience and global scale of infections demand continued vigilance. Read
  • North Korean Hackers Steal $2 Billion in Cryptocurrency in 2025 North Korean state-sponsored hackers, primarily the Lazarus Group and its Bluenoroff (APT38) subgroup, continue to aggressively target cryptocurrency-adjacent entities to fund the regime’s illicit activities. As of March 2026, confirmed thefts in 2025 exceeded $2 billion, with cumulative losses since 2017 surpassing $6.75 billion. Recent attacks now include e-commerce platforms like Bitrefill, where North Korean operators compromised employee devices to steal cryptocurrency and gift-card inventory. Investigations increasingly reveal sophisticated persistence, cross-chain laundering, and multi-vector social engineering, alongside new enforcement actions targeting facilitators in the U.S. Prior milestones include the record-setting Bybit breach in February 2025 ($1.5B), multiple exchange compromises (e.g., Upbit, BitoPro), and the conviction of five individuals for aiding North Korean IT worker fraud schemes that generated over $2.2M for the regime. North Korean hackers also continue to refine laundering pathways—employing mixers, bridges, obscure blockchains, and custom tokens—over approximately 45-day cycles. U.S. authorities have sought forfeiture of $15M in stolen crypto linked to APT38 and are dismantling ancillary networks used to funnel revenue to Pyongyang. Read
  • UK teens targeted by radicalization into cybercrime via toxic online ecosystems The UK National Crime Agency (NCA) warns that adolescents are being systematically radicalized into cybercrime through exploitative online platforms and recommendation algorithms. The director general of the NCA, Graeme Biggar, highlighted how ‘toxic online spaces’ reshape crime by accelerating its global reach, increasing harm, and blurring boundaries between cybercrime, terrorism, and sexual exploitation. He emphasized that technology is no longer merely a tool but an active driver of criminal ecosystems, with platforms failing to address responsibility for algorithmic radicalization. Biggar also noted a rise in UK-based sophisticated social engineering attacks combining malware with human manipulation, alongside escalating investment scams, sextortion, and sadistic exploitation. Despite these threats, he cited enforcement successes such as the LockBit takedown, a 27% rise in fraud convictions, and sustained child sexual abuse arrest rates. Read
  • Takedown of fraudulent CSAM distribution scam platform "Alice with Violence CP" An international law enforcement operation, codenamed Operation Alice, dismantled a fraudulent dark web platform advertising non-existent child sexual abuse material (CSAM) and cybercrime-as-a-service offerings. The platform, operated by a 35-year-old suspect based in China, lured approximately 10,000 users into paying between EUR 17 and EUR 250 in Bitcoin (totaling roughly $400,000) for advertised CSAM packages that were never delivered. The scam used previews of claimed CSAM to deceive victims into entering personal details and completing payments. The takedown involved the seizure of 287 servers across jurisdictions, with 105 servers located in Germany, and resulted in an international arrest warrant issued for the platform's operator. Read
  • Langflow unauthenticated RCE vulnerability (CVE-2026-33017) exploited within 20 hours of disclosure Within 20 hours of the public disclosure of an unauthenticated remote code execution vulnerability in Langflow (CVE-2026-33017), threat actors began exploiting exposed instances to execute arbitrary Python code, harvest credentials, and potentially compromise connected databases and software supply chains. The vulnerability, assigned a CVSS score of 9.3, requires no authentication and can be triggered via a single HTTP POST request to the /api/v1/build_public_tmp/{flow_id}/flow endpoint, where attacker-controlled data is passed to an unsandboxed exec() call. The flaw affects all versions of Langflow prior to and including 1.8.1, with a fix available in development version 1.9.0.dev8. It was discovered by security researcher Aviral Srivastava and reported on February 26, 2026. Sysdig observed the first exploitation attempts within 20 hours of the March 17, 2026 advisory, despite the absence of a public proof-of-concept. Attackers rapidly progressed from automated scanning to staged payload delivery and credential harvesting, including extraction of environment variables, configuration files, and database contents. The incident underscores the accelerating timeline of vulnerability weaponization, where attackers now routinely exploit flaws within hours of disclosure, far outpacing typical patching timelines for defenders. Read
  • Iran-linked destructive cyber campaign tactics and mitigation strategies against wiper attacks An Iran-linked threat cluster tracked as Handala (and Void Manticore) executed a destructive wiper campaign against Stryker in March 2026 that erased tens of thousands of devices across 79 countries, disrupting manufacturing, order processing, and logistics for a Fortune 500 medical technology vendor. Unlike financially motivated ransomware, these attacks aim to create operational chaos and real-world consequences by deploying wipers via legitimate administrative tools and tunneling mechanisms to maximize lateral movement and simultaneous wiping. The event underscores a broader shift where geopolitical conflicts increasingly translate into destructive cyber operations against critical infrastructure and supply chains, requiring defenders to prioritize containment, identity controls, and administrative-path restrictions over traditional perimeter defenses. Read
  • Increased reliance on behavioral analytics required amid AI-enabled cyber attack escalation Cybercriminals are increasingly leveraging artificial intelligence (AI) to enhance phishing campaigns, automate credential abuse, and obfuscate malicious activities by mimicking legitimate user behavior, thereby evading traditional rule-based and signature-based detection mechanisms. This shift necessitates the evolution of behavioral analytics from static pattern monitoring to dynamic, identity-centric risk modeling that identifies subtle behavioral inconsistencies in real time, particularly in the context of compromised credentials and privileged access misuse. The integration of AI into attack methodologies reduces reliance on malware delivery vectors and increases the scalability and stealth of social engineering, credential abuse, and adaptive malware campaigns. Read
Last updated: 16:00 20/03/2026 UTC
  • ThreatsDay Bulletin: Emerging Cyber Threat Trends The ThreatsDay Bulletin continues to highlight the accelerating pace of cyber threats, where attackers rapidly adapt infrastructure shifts and social engineering lures to exploit familiar systems. Recent developments include targeted exploitation of Fortinet FortiGate devices via Ransomware-as-a-Service (RaaS), active abuse of Citrix ADC/Gateway vulnerabilities in production environments, widespread misuse of Microsoft Configuration Manager (MCP) for lateral movement and data theft, and weaponized LiveChat integrations in phishing campaigns. These trends reflect a broader pattern of quiet, cumulative exposure where small tactical changes accumulate undetected until they surface as major incidents, underscoring the need for continuous monitoring and adaptive defense strategies. Read
  • SonicWall MySonicWall Breach Exposes Firewall Configuration Files Marquis Software Solutions has confirmed that its August 2025 ransomware attack exposed the personal and financial data of 672,075 individuals—including names, Social Security numbers, Taxpayer Identification Numbers, and financial account details—after threat actors exploited firewall configuration files stolen from SonicWall’s MySonicWall cloud backup breach. The company, which serves 700+ U.S. banks and credit unions, completed its forensic review in December 2025 and began notifying affected individuals in March 2026, while facing over 36 consumer class-action lawsuits and a self-initiated lawsuit against SonicWall for alleged gross negligence and misrepresentation. Marquis alleges SonicWall’s February 2025 API code change introduced the vulnerability, delayed disclosure by three weeks, and understated the breach’s scope (initially claiming <5% of customers were affected, later confirmed as 100%). The SonicWall incident began with a September 2025 breach of its MySonicWall portal, where attackers accessed AES-256-encrypted credentials, network topology details, and MFA recovery codes for all cloud backup users. This data fueled follow-on attacks, including the Marquis breach and Akira ransomware campaigns bypassing MFA via stolen OTP seeds. SonicWall collaborated with Mandiant to attribute the breach to state-sponsored actors and released remediation tools, but 950+ unpatched SMA1000 appliances remain exposed online. The Marquis lawsuit—seeking damages, indemnification, and legal fees—could set a precedent for vendor liability, as enterprises increasingly pursue legal action against cybersecurity providers for contribution or negligence in third-party breaches. CISA and SonicWall continue to urge firmware updates, credential resets, and MFA enforcement to mitigate ongoing risks. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks A new infostealer malware named Shamos is targeting Mac devices through ClickFix attacks. The malware, developed by the COOKIE SPIDER group, steals data and credentials from web browsers, Keychain, Apple Notes, and cryptocurrency wallets. The attacks use malvertising and fake GitHub repositories to lure victims into executing shell commands that download and install the malware. Since June 2025, Shamos has attempted infections in over three hundred environments monitored by CrowdStrike. The malware uses anti-VM commands, AppleScript for reconnaissance, and creates persistence through a Plist file. Users are advised to avoid executing unknown commands and to seek help from trusted sources. A new variant of the MacSync stealer, related to Shamos, is distributed through a digitally signed, notarized Swift application, bypassing macOS Gatekeeper checks. This variant uses evasion techniques such as inflating the DMG file with decoy PDFs and performing internet connectivity checks. The malware runs largely in memory and cleans up temporary files after execution, leaving minimal traces behind. The associated developer certificate has been revoked. Three distinct ClickFix campaigns have been identified distributing the MacSync infostealer via fake AI tool installers. The campaigns use various lures, including OpenAI Atlas browser and ChatGPT conversations, to trick users into executing malicious commands. The latest variant of MacSync supports dynamic AppleScript payloads and in-memory execution to evade detection. The shell script retrieves the AppleScript infostealer payload from a hard-coded server and removes evidence of data theft. The malware harvests credentials, files, keychain databases, and cryptocurrency wallet seed phrases. Read
  • Russian UNC6353 Uses Coruna and Darksword iOS Exploit Kits Across iOS 13–18.7 Targeting Financial Espionage and Data Theft The Coruna and Darksword dual iOS exploit kit campaigns continue to expand, now targeting iPhones running iOS 18.4 through 18.7 with the modular Darksword malware family. Darksword, attributed to the Russian threat actor UNC6353 alongside Coruna, leverages six known and zero-day vulnerabilities to achieve kernel read/write via Safari, enabling rapid exfiltration of cryptocurrency wallets, messages, location history, health data, and system credentials within seconds to minutes before self-wiping. The malware is a professionally engineered JavaScript platform with three documented payload families (GHOSTBLADE, GHOSTKNIFE, GHOSTSABER) used by multiple actors—UNC6353, UNC6748, and Turkish vendor PARS Defense—across Saudi Arabia, Turkey, Malaysia, and Ukraine since at least November 2025. Darksword’s OPSEC failures (unobfuscated code, plainly named components) and use of watering hole attacks mirror Coruna’s tactics, while its ‘hit-and-run’ data theft model signals a shift toward opportunistic financial espionage. Apple has patched all exploited flaws in current iOS releases (18.7.3, 26.2, 26.3.1), and users are advised to upgrade and enable Lockdown Mode if at high risk. Prior context: The Coruna exploit kit, first observed in February 2025, targeted iOS 13.0–17.2.1 with 23 exploits across five chains, used by UNC6353 and UNC6691 in watering hole attacks on Ukrainian and Chinese crypto-related websites. CISA added three Coruna-linked vulnerabilities to its Known Exploited Vulnerabilities catalog and mandated patches by March 26, 2026. Apple backported fixes to older devices, including iOS 15.8.7/16.7.15, addressing vulnerabilities linked to Operation Triangulation and U.S. military contractor L3Harris. Read
  • Privilege Escalation Vulnerability in Linux Kernel Exploited in Ransomware Attacks A high-severity privilege escalation flaw in the Linux kernel (CVE-2024-1086) is being exploited in ransomware attacks. Disclosed in January 2024, the vulnerability allows attackers with local access to escalate privileges to root level. It affects multiple major Linux distributions, including Debian, Ubuntu, Fedora, and Red Hat. The flaw was introduced in February 2014 and fixed in January 2024. Additionally, nine confused deputy vulnerabilities, codenamed CrackArmor, have been discovered in the Linux kernel's AppArmor module. These flaws, existing since 2017, allow unprivileged users to bypass kernel protections, escalate to root, and undermine container isolation guarantees. The vulnerabilities affect Linux kernels since version 4.11 and impact major distributions like Ubuntu, Debian, and SUSE. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed the exploitation of the initial flaw in ransomware campaigns and added it to its Known Exploited Vulnerabilities (KEV) catalog in May 2024. Federal agencies were ordered to secure their systems by June 20, 2024. Mitigations include blocking 'nf_tables', restricting access to user namespaces, or loading the Linux Kernel Runtime Guard (LKRG) module. Qualys Threat Research Unit discovered the CrackArmor flaws, which stem from a 'confused deputy' flaw allowing unprivileged local users to manipulate AppArmor security profiles. Over 12.6 million enterprise Linux systems are affected, and the flaws enable local privilege escalation, denial-of-service attacks, and container isolation bypass. Qualys has developed proof-of-concept exploits but has not publicly released them. Read
  • PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025, delivering the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. In February 2026, a new campaign targeting Ukrainian entities was observed, employing judicial and charity-themed lures to deploy a JavaScript-based backdoor codenamed DRILLAPP. This campaign is likely orchestrated by threat actors linked to Russia and shares overlaps with the prior PluggyApe campaign. The malware is capable of uploading and downloading files, leveraging the microphone, and capturing images through the webcam. The threat actor is believed to be active since at least April 2024. Read
  • Optimizely Data Breach After Vishing Attack An ongoing wave of vishing-led breaches attributed to ShinyHunters has claimed a new victim: Aura, a digital safety firm. The attack exposed contact details of nearly 900,000 individuals, stemming from a marketing tool inherited in a 2021 acquisition. ShinyHunters claimed the theft of 12GB of files containing PII and corporate data, releasing it after failed extortion attempts. The company emphasized no SSNs, passwords, or financial data were compromised and is conducting an internal review with law enforcement involvement. Earlier in February, Optimizely disclosed a similar breach following a voice phishing attack that compromised basic business contact information. Both incidents underscore the continued exploitation of vishing tactics by ShinyHunters to gain initial access to organizations, with impacts focused on contact data rather than deeper system compromise. Read

Latest updates

Browse →

Takedown of fraudulent CSAM distribution scam platform "Alice with Violence CP"

Updated: · First: 20.03.2026 19:19 · 📰 1 src / 1 articles

An international law enforcement operation, codenamed Operation Alice, dismantled a fraudulent dark web platform advertising non-existent child sexual abuse material (CSAM) and cybercrime-as-a-service offerings. The platform, operated by a 35-year-old suspect based in China, lured approximately 10,000 users into paying between EUR 17 and EUR 250 in Bitcoin (totaling roughly $400,000) for advertised CSAM packages that were never delivered. The scam used previews of claimed CSAM to deceive victims into entering personal details and completing payments. The takedown involved the seizure of 287 servers across jurisdictions, with 105 servers located in Germany, and resulted in an international arrest warrant issued for the platform's operator.

Beast Ransomware Group\'s Toolset Disclosed via Misconfigured Server in German Cloud

Updated: · First: 20.03.2026 18:31 · 📰 1 src / 1 articles

A misconfigured server hosted by a German cloud provider was discovered containing the complete toolset of a Beast ransomware group affiliate, exposing the group\'s tactics, techniques, and procedures (TTPs). The server contained reconnaissance, network mapping, credential theft, exfiltration, persistence, and lateral movement tools. Analysis of the toolset reveals significant overlap with other ransomware gangs, including the use of dual-use utilities such as AnyDesk, Mega, and batch scripts aimed at disrupting backups and security processes. The exposure provides defenders with actionable intelligence on mitigations and detection strategies against ransomware operations.

Langflow unauthenticated RCE vulnerability (CVE-2026-33017) exploited within 20 hours of disclosure

Updated: 20.03.2026 17:15 · First: 20.03.2026 12:20 · 📰 2 src / 2 articles

Within 20 hours of the public disclosure of an unauthenticated remote code execution vulnerability in Langflow (CVE-2026-33017), threat actors began exploiting exposed instances to execute arbitrary Python code, harvest credentials, and potentially compromise connected databases and software supply chains. The vulnerability, assigned a CVSS score of 9.3, requires no authentication and can be triggered via a single HTTP POST request to the /api/v1/build_public_tmp/{flow_id}/flow endpoint, where attacker-controlled data is passed to an unsandboxed exec() call. The flaw affects all versions of Langflow prior to and including 1.8.1, with a fix available in development version 1.9.0.dev8. It was discovered by security researcher Aviral Srivastava and reported on February 26, 2026. Sysdig observed the first exploitation attempts within 20 hours of the March 17, 2026 advisory, despite the absence of a public proof-of-concept. Attackers rapidly progressed from automated scanning to staged payload delivery and credential harvesting, including extraction of environment variables, configuration files, and database contents. The incident underscores the accelerating timeline of vulnerability weaponization, where attackers now routinely exploit flaws within hours of disclosure, far outpacing typical patching timelines for defenders.

Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access

Updated: 20.03.2026 17:09 · First: 18.03.2026 18:00 · 📰 2 src / 2 articles

A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. Cisco issued its first advisory for CVE-2026-20131 on March 4, 2026, and Amazon Threat Intelligence confirmed active exploitation by Interlock starting in late January. CISA added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and ordered federal agencies to patch by March 22, 2026, under BOD 22-01. Post-exploitation tooling includes custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are leveraged for ransomware operations and secondary monetization.

Iran-linked destructive cyber campaign tactics and mitigation strategies against wiper attacks

Updated: · First: 20.03.2026 16:01 · 📰 1 src / 1 articles

An Iran-linked threat cluster tracked as Handala (and Void Manticore) executed a destructive wiper campaign against Stryker in March 2026 that erased tens of thousands of devices across 79 countries, disrupting manufacturing, order processing, and logistics for a Fortune 500 medical technology vendor. Unlike financially motivated ransomware, these attacks aim to create operational chaos and real-world consequences by deploying wipers via legitimate administrative tools and tunneling mechanisms to maximize lateral movement and simultaneous wiping. The event underscores a broader shift where geopolitical conflicts increasingly translate into destructive cyber operations against critical infrastructure and supply chains, requiring defenders to prioritize containment, identity controls, and administrative-path restrictions over traditional perimeter defenses.

Android sideloading protection update introduces 24-hour delay for unverified developer installs

Updated: · First: 20.03.2026 12:57 · 📰 1 src / 1 articles

Google announced a mandatory 24-hour wait period for installing apps from unverified developers on Android as part of a new advanced flow for sideloading, effective August 2026. The policy change aims to reduce malware distribution and scams by delaying installation until users confirm intent via biometric authentication or PIN after a device restart, complicating attacker persistence. Exceptions apply to ADB-based installs and verified developer channels. The move follows Google’s 2025 developer verification mandate requiring all apps on certified Android devices to be registered by verified developers to improve threat actor identification. In parallel, Google introduced limited distribution accounts for hobbyist developers and students, enabling app sharing with up to 20 devices without government ID or fees. The update arrives amid rising Android malware threats, with 17 malware families—including new variants like SURXRAT and TaxiSpy RAT—actively targeting users in Turkey, Italy, and other regions for device takeover and financial fraud.

Increased reliance on behavioral analytics required amid AI-enabled cyber attack escalation

Updated: · First: 20.03.2026 12:00 · 📰 1 src / 1 articles

Cybercriminals are increasingly leveraging artificial intelligence (AI) to enhance phishing campaigns, automate credential abuse, and obfuscate malicious activities by mimicking legitimate user behavior, thereby evading traditional rule-based and signature-based detection mechanisms. This shift necessitates the evolution of behavioral analytics from static pattern monitoring to dynamic, identity-centric risk modeling that identifies subtle behavioral inconsistencies in real time, particularly in the context of compromised credentials and privileged access misuse. The integration of AI into attack methodologies reduces reliance on malware delivery vectors and increases the scalability and stealth of social engineering, credential abuse, and adaptive malware campaigns.

UK teens targeted by radicalization into cybercrime via toxic online ecosystems

Updated: · First: 20.03.2026 11:40 · 📰 1 src / 1 articles

The UK National Crime Agency (NCA) warns that adolescents are being systematically radicalized into cybercrime through exploitative online platforms and recommendation algorithms. The director general of the NCA, Graeme Biggar, highlighted how ‘toxic online spaces’ reshape crime by accelerating its global reach, increasing harm, and blurring boundaries between cybercrime, terrorism, and sexual exploitation. He emphasized that technology is no longer merely a tool but an active driver of criminal ecosystems, with platforms failing to address responsibility for algorithmic radicalization. Biggar also noted a rise in UK-based sophisticated social engineering attacks combining malware with human manipulation, alongside escalating investment scams, sextortion, and sadistic exploitation. Despite these threats, he cited enforcement successes such as the LockBit takedown, a 27% rise in fraud convictions, and sustained child sexual abuse arrest rates.

Guilty plea in $10M AI-generated music streaming fraud scheme

Updated: · First: 20.03.2026 11:33 · 📰 1 src / 1 articles

North Carolina musician Michael Smith pleaded guilty to orchestrating a $10M fraud scheme involving the artificial inflation of streaming royalties on major platforms including Spotify, Apple Music, Amazon Music, and YouTube Music. Using AI-generated music and automated bots, Smith bypassed anti-fraud controls by leveraging over 1,000 bot accounts and VPNs to stream songs billions of times between 2017 and 2024. The operation yielded more than $10M in illicit royalties diverted from legitimate artists and rights holders.

Unauthenticated Remote Code Execution and Account Takeover via Magento PolyShell File Upload Flaw

Updated: · First: 20.03.2026 11:30 · 📰 1 src / 1 articles

A critical unrestricted file upload vulnerability in Magento’s REST API, dubbed PolyShell by Sansec, enables unauthenticated attackers to upload arbitrary executable files disguised as images and achieve remote code execution (RCE) or account takeover via stored cross-site scripting (XSS). The flaw impacts all Magento Open Source and Adobe Commerce versions up to 2.4.9-alpha2 by leveraging the custom cart item option handling in the REST API, which writes uploaded files to the server’s `pub/media/custom_options/quote/` directory. Depending on web server configuration, this can lead to RCE through PHP execution or stored XSS via malicious payloads in file metadata. No evidence of active exploitation has been observed.

Aisuru botnet conducts record-breaking DDoS attacks, targeting U.S. ISPs and Microsoft Azure

Updated: 20.03.2026 10:05 · First: 02.09.2025 18:52 · 📰 20 src / 37 articles

The **Aisuru/Kimwolf botnet ecosystem** has reached a **critical disruption milestone** after a **multi-national law enforcement operation** led by the **U.S. Department of Justice (DoJ)**, alongside **Canadian and German authorities**, successfully **dismantled the command-and-control (C2) infrastructure** of four interconnected botnets—**AISURU, Kimwolf, JackSkid, and Mossad**—on **March 20, 2026**. This **court-authorized takedown**, supported by **18+ tech firms** (including Akamai, Cloudflare, Google, AWS, and Oracle), targeted the botnets’ **3 million+ infected devices** (including **2 million+ Android TVs, routers, DVRs, and IoT cameras**), which had been weaponized to launch **record-breaking DDoS attacks** (e.g., **31.4 Tbps in November 2025**) and **hyper-volumetric campaigns** averaging **3 Bpps, 4 Tbps, and 54 Mrps**. The botnets’ **cybercrime-as-a-service model** enabled operators to sell access to compromised devices for **DDoS extortion, residential proxy monetization, and lateral movement in corporate/government networks**, with **hundreds of thousands of attack commands** issued across sectors like **telecom, gaming, IT, and critical infrastructure**. The disruption **severed C2 communications**, aiming to **prevent further infections** and **eliminate the botnets’ ability to launch future attacks**, including those targeting **U.S. Department of Defense (DoD) networks**. Despite this **first major law enforcement strike**, **persistent infections and operator evasion tactics** (e.g., **ENS-based C2, decentralized proxy abuse**) underscore the **ongoing challenge of full eradication**. Prior milestones include the botnets’ **accidental Sybil attack on the I2P anonymity network** (February 2026), their **exploitation of residential proxy networks (IPIDEA)** for internal network infiltration (January 2026), and **Google’s takedown of IPIDEA** (January 29, 2026), which reduced millions of proxy exit nodes. The DoJ’s action follows a **year of escalating hyper-volumetric attacks**, including **Cloudflare’s mitigation of 47.1 million DDoS attacks in 2025** (a **100% YoY increase**) and **Akamai’s reports of attacks exceeding 30 Tbps/14 Bpps**. While the operation marks a **significant blow to the botnets’ operational capacity**, their **adaptive resilience** and **global scale of infections** demand continued vigilance.

Microsoft account sign-in failures triggered by KB5079473 Windows 11 update

Updated: · First: 20.03.2026 09:33 · 📰 1 src / 1 articles

Microsoft reports that the March Windows 11 KB5079473 cumulative update disrupts sign-in operations for Microsoft accounts across multiple applications, including Teams, OneDrive, Microsoft Edge, Excel, Word, and Microsoft 365 Copilot. The issue causes affected systems to display an error message falsely indicating a lack of internet connectivity even when a device is online. The disruption primarily impacts consumer Microsoft accounts and not Entra ID (formerly Azure Active Directory) authentication used in enterprise environments.

Former data analyst convicted for $2.5M extortion of Brightly Software leveraging internal data access

Updated: · First: 20.03.2026 08:57 · 📰 1 src / 1 articles

A former data analyst contractor for Brightly Software (formerly SchoolDude) was found guilty of extorting the company for $2.5 million using stolen payroll and corporate data after his contract was not renewed. The individual, Cameron Curry (alias "Loot"), exploited his legitimate access to sensitive employee information to threaten data leaks and SEC reporting unless paid. The extortion campaign, which included threats to release PII and false claims about financial discrepancies, led to a Bitcoin payment of $7,540. Curry faces up to 12 years in prison for six counts of interstate extortion. Separately, Brightly disclosed a separate data breach in May 2023 impacting nearly 3 million SchoolDude customers, though this incident was unrelated to Curry’s actions.

Architectural risks in Model Context Protocol (MCP) integration enabling indirect prompt injection and tool poisoning

Updated: · First: 19.03.2026 23:54 · 📰 1 src / 1 articles

LLM-powered applications integrating the Model Context Protocol (MCP) face architectural-level risks that current security controls cannot mitigate via patching or configuration. The integration enables LLMs to autonomously execute actions (e.g., accessing enterprise data, triggering workflows, calling APIs) based on user prompts, removing the human review step inherent to traditional LLM responses. Adversaries can exploit inherent limitations in MCP and LLMs—such as the inability to distinguish content from instructions—via indirect prompt injection or tool poisoning to trigger malicious workflows (e.g., exfiltrating data, sending emails) without user awareness. Mitigations focus on operational controls rather than patches, including least-privilege MCP server permissions, traffic logging, behavioral baselines, and metadata scanning for malicious instructions.

Navia Benefit Solutions reports data exposure impacting 2.7 million individuals

Updated: · First: 19.03.2026 22:43 · 📰 1 src / 1 articles

Navia Benefit Solutions disclosed a data breach affecting approximately 2.7 million individuals, with unauthorized access detected between December 22, 2025, and January 15, 2026. The company became aware of suspicious activity on January 23, 2026, and initiated an investigation. Exposed data includes full names, dates of birth, Social Security Numbers, phone numbers, email addresses, and enrollment details for various benefits programs (HRA, FSA, COBRA). No claims or financial details were exposed, but the leaked data poses risks for phishing and social engineering campaigns. Navia has notified law enforcement and offered affected individuals 12 months of identity protection services via Kroll.

Unauthenticated remote code execution flaw in Magento and Adobe Commerce via PolyShell polyglot uploads

Updated: · First: 19.03.2026 22:01 · 📰 1 src / 1 articles

A critical unauthenticated remote code execution vulnerability named PolyShell has been disclosed in all supported versions of Magento Open Source and Adobe Commerce (version 2). The flaw stems from the REST API improperly processing file uploads in custom cart item options, enabling attackers to upload and execute polyglot files that act as both images and scripts. Depending on server configuration, this can result in remote code execution or account takeover via stored cross-site scripting. Adobe has released a fix only in the alpha release of version 2.4.9, leaving production deployments vulnerable. Exploitation attempts are expected to accelerate following public disclosure. Impact is high due to the widespread use of Magento/Adobe Commerce in e-commerce, the absence of authentication requirements, and the potential for mass compromise of storefronts.

Speagle malware leverages compromised Cobra DocGuard servers and infrastructure to exfiltrate sensitive data

Updated: · First: 19.03.2026 21:16 · 📰 1 src / 1 articles

A newly identified malware family, Speagle, has been observed hijacking the legitimate Cobra DocGuard document security platform to surreptitiously collect and exfiltrate sensitive data from infected systems. The malware abuses Cobra DocGuard’s client-server architecture and compromised servers to blend malicious communications with legitimate traffic, ensuring stealth during exfiltration. Speagle specifically targets systems where Cobra DocGuard is installed, indicating deliberate selection of victims, likely for intelligence collection or industrial espionage purposes. The operational infrastructure overlaps with prior documented abuses of Cobra DocGuard in 2022–2023, suggesting a pattern of exploiting trusted software in supply chain attacks.

Mass exploitation of signed vulnerable drivers by 54 EDR killer tools via BYOVD technique

Updated: · First: 19.03.2026 20:52 · 📰 1 src / 1 articles

Security vendors have identified 54 distinct EDR killer tools that abuse Bring Your Own Vulnerable Driver (BYOVD) techniques by exploiting 34 vulnerable, signed drivers to disable endpoint detection and response (EDR) solutions. The tools are deployed primarily by ransomware groups, affiliates, and underground service providers to neutralize security controls before executing file-encrypting malware. Attackers gain kernel-mode privileges (Ring 0) to terminate EDR processes, disable protection mechanisms, and tamper with kernel callbacks, thereby undermining endpoint defenses through abuse of Microsoft’s driver trust model.

Google Advances Quantum-Resistant HTTPS Certificates with Merkle Tree Certificates

Updated: 19.03.2026 20:19 · First: 02.03.2026 13:33 · 📰 4 src / 4 articles

Google is advancing Merkle Tree Certificates (MTCs) to secure Chrome’s HTTPS connections against quantum computing threats, with deployment underway in three phases. MTCs use compact Merkle Tree proofs to reduce bandwidth usage, improve performance, and simplify certificate transparency. Experimental testing with real internet traffic by Google and Cloudflare shows MTCs are faster than classical chains and post-quantum alternatives. Chrome plans to integrate MTCs into its Root Store by 2027, with a feasibility study underway, public deployment in Q1 2027, and the introduction of the Chrome Quantum-resistant Root Store in Q3 2027. MTCs reduce certificate sizes to approximately 840 bytes per page load, compared to 14.7 KB for post-quantum methods like ML-DSA, and require no additional action from website managers beyond server software updates.

North Korean Hackers Steal $2 Billion in Cryptocurrency in 2025

Updated: 19.03.2026 19:08 · First: 07.10.2025 20:02 · 📰 6 src / 9 articles

North Korean state-sponsored hackers, primarily the Lazarus Group and its Bluenoroff (APT38) subgroup, continue to aggressively target cryptocurrency-adjacent entities to fund the regime’s illicit activities. As of March 2026, confirmed thefts in 2025 exceeded $2 billion, with cumulative losses since 2017 surpassing $6.75 billion. Recent attacks now include e-commerce platforms like Bitrefill, where North Korean operators compromised employee devices to steal cryptocurrency and gift-card inventory. Investigations increasingly reveal sophisticated persistence, cross-chain laundering, and multi-vector social engineering, alongside new enforcement actions targeting facilitators in the U.S. Prior milestones include the record-setting Bybit breach in February 2025 ($1.5B), multiple exchange compromises (e.g., Upbit, BitoPro), and the conviction of five individuals for aiding North Korean IT worker fraud schemes that generated over $2.2M for the regime. North Korean hackers also continue to refine laundering pathways—employing mixers, bridges, obscure blockchains, and custom tokens—over approximately 45-day cycles. U.S. authorities have sought forfeiture of $15M in stolen crypto linked to APT38 and are dismantling ancillary networks used to funnel revenue to Pyongyang.

Iranian Hacktivist Group Claims Wiper Attack on Stryker

Updated: 19.03.2026 18:14 · First: 11.03.2026 18:20 · 📰 5 src / 5 articles

The Iranian hacktivist group Handala, linked to Iran's Ministry of Intelligence and Security (MOIS), conducted a targeted data-wiping attack against Stryker, a global medical technology company, on March 11, 2026. The attack disrupted over 200,000 systems across 79 countries, with Stryker confirming global disruption to its Microsoft environment and prioritizing restoration of supply-chain systems. Handala claimed responsibility, citing retaliation for a U.S. missile strike, and used Microsoft Intune to issue remote wipe commands, affecting nearly 80,000 devices. The FBI subsequently seized two Handala data leak sites under a U.S. court warrant, disrupting the group's digital infrastructure. Stryker’s operations, particularly in Ireland, suffered severe disruption with over 5,000 workers sent home, and employees reverted to manual workflows during the outage. Handala, active since late 2023, has targeted Israeli organizations historically but expanded operations in alignment with Iranian state interests. Investigators, including Microsoft DART and Palo Alto Unit 42, found no evidence of data exfiltration despite Handala’s claims, and Stryker emphasized the incident was not a ransomware attack. The FBI’s domain seizures mark a significant law enforcement response to Handala’s destructive operations.

Gentlemen Ransomware Exploits Vulnerable Driver to Disable Security Software

Updated: 19.03.2026 18:00 · First: 11.09.2025 23:42 · 📰 3 src / 5 articles

The Gentlemen ransomware group, active since summer 2025, continues to evolve its tactics while leveraging a ransomware-as-a-service (RaaS) model. The group employs dual extortion, targeting Windows, Linux, and ESXi environments, with initial access often gained through exploitation of exposed FortiGate VPN devices. Affiliates use PowerShell and WMI for lateral movement, deploy anti-forensic tools, and target backup/security systems to maximize impact. The group is known for advanced evasion techniques, including BYOVD attacks via CVE-2025-7771 in the ThrottleStop driver, tailored to disable specific security vendors' products. The gang emerged from a dispute within the Qilin RaaS ecosystem and rapidly established itself using existing tooling. Its attacks have targeted critical infrastructure, including Romania's Oltenia Energy Complex on December 26, 2025, where documents were encrypted and multiple applications (ERP, email, document management) were temporarily disabled. The company cooperated with authorities and restored systems from backups. The group uses PowerRun.exe and Allpatch2.exe for privilege escalation and ransom notes with the .7mtzhh extension. While the National Energy System was not jeopardized, the incident is still under assessment for potential data theft. The group has added nearly four dozen victims to its leak site but has not yet listed Oltenia Energy Complex, likely due to ongoing negotiations.

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog

Updated: 19.03.2026 16:55 · First: 23.01.2026 17:24 · 📰 4 src / 4 articles

CISA added the stored cross-site scripting (XSS) vulnerability CVE-2025-66376 in Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog on March 18, 2026. The flaw, patched in early November 2025, allows unauthenticated attackers to execute arbitrary JavaScript via malicious HTML emails, enabling session hijacking and data theft in compromised Zimbra environments. CISA ordered U.S. federal agencies to patch the flaw by April 1, 2026 under BOD 22-01 and encouraged all organizations to apply mitigations promptly. Russian state-sponsored threat group APT28 (Fancy Bear, Strontium), linked to Russia's military intelligence service (GRU), is actively exploiting CVE-2025-66376 in attacks targeting Ukrainian government entities, including the Ukrainian State Hydrology Agency, as part of a phishing campaign codenamed Operation GhostMail. The attack chain relies on malicious HTML email bodies with obfuscated JavaScript payloads that execute silently in vulnerable Zimbra webmail sessions to harvest credentials, session tokens, 2FA codes, saved passwords, and mailbox contents dating back 90 days, with data exfiltrated over DNS and HTTPS. This exploitation follows prior Russian campaigns against Zimbra infrastructure, including operations by Winter Vivern (since February 2023) and APT29 (Cozy Bear, Midnight Blizzard) in October 2024.

Mobile Banking Malware Campaigns Expand to 1,243 Financial Brands Across 90 Countries

Updated: · First: 19.03.2026 16:30 · 📰 1 src / 1 articles

A significant escalation in mobile banking malware campaigns is targeting 1,243 financial brands across 90 countries, with attacks now predominantly originating from compromised user devices. These campaigns leverage 34 active malware families affecting apps with over three billion cumulative downloads, marking a shift to industrialized, large-scale operations that evolve faster than traditional banking defenses. Mobile banking has become the dominant consumer channel, with 54% of users relying on apps for account management, increasing exposure to risk. Malicious activity has surged, including a 56% rise in Android banking trojan attacks in 2025 and a 271% increase in unique malware packages to 255,090. Online fraud rose 21% between 2024 and 2025, with one in 20 verification attempts flagged as fraudulent, and 80% of fraud now occurring through online or mobile platforms.

ThreatsDay Bulletin: Emerging Cyber Threat Trends

Updated: 19.03.2026 16:25 · First: 18.12.2025 15:10 · 📰 3 src / 3 articles

The ThreatsDay Bulletin continues to highlight the accelerating pace of cyber threats, where attackers rapidly adapt infrastructure shifts and social engineering lures to exploit familiar systems. Recent developments include targeted exploitation of Fortinet FortiGate devices via Ransomware-as-a-Service (RaaS), active abuse of Citrix ADC/Gateway vulnerabilities in production environments, widespread misuse of Microsoft Configuration Manager (MCP) for lateral movement and data theft, and weaponized LiveChat integrations in phishing campaigns. These trends reflect a broader pattern of quiet, cumulative exposure where small tactical changes accumulate undetected until they surface as major incidents, underscoring the need for continuous monitoring and adaptive defense strategies.

Privilege Escalation Risks via Weak Password Reset Processes and Mitigations

Updated: · First: 19.03.2026 16:00 · 📰 1 src / 1 articles

Organizations face persistent privilege escalation risks through insecure password reset workflows when attackers exploit weaker controls in reset pathways compared to primary authentication. Attackers leverage compromised low-privilege accounts, social engineering against helpdesks, token interception, or abuse of over-permissioned administrators to elevate access. These paths allow adversaries to move laterally and gain control of higher-value accounts while appearing as legitimate users. The impact includes unauthorized administrative access, persistent network presence, and potential domain compromise. Securing reset processes is critical as they often bypass hardened login defenses and represent a critical attack surface for privilege escalation.

Critical Path Traversal in Ubiquiti UniFi Network Application Enables Account Takeover

Updated: · First: 19.03.2026 15:00 · 📰 1 src / 1 articles

A critical severity vulnerability, CVE-2026-22557, in Ubiquiti’s UniFi Network Application (versions 10.1.85 and earlier) allows remote attackers on the local network to execute path traversal attacks and gain unauthorized access to system files. This can be exploited to hijack user accounts without privileges or user interaction, enabling full account takeover in low-complexity attacks. The flaw impacts UniFi Network Application deployments, including those managed via UniFi Cloud Gateway, switches, access points, and gateways. Ubiquiti has addressed the issue in versions 10.1.89 and later. A second vulnerability, an authenticated NoSQL injection flaw, was also patched, enabling privilege escalation for authenticated attackers.

Perseus Android Banking Malware Leveraging Accessibility Services for Real-Time Device Takeover and Note Monitoring

Updated: · First: 19.03.2026 14:43 · 📰 1 src / 1 articles

A new Android malware family named Perseus is actively distributed in the wild, enabling device takeover (DTO) and financial fraud. Built on the foundations of Cerberus and Phoenix, Perseus leverages Accessibility-based remote sessions to monitor and interact with infected devices in real time, with a strong regional focus on Turkey and Italy. The malware monitors note-taking applications to extract high-value personal or financial information, expanding traditional credential theft tactics.

Microsoft Intune administrative control weaknesses exploited in Stryker breach leading to mass device wipes

Updated: · First: 19.03.2026 13:02 · 📰 1 src / 1 articles

A pro-Palestinian hacktivist group named Handala (also tracked as Handala Hack Team, Hatef, or Hamsa) compromised Microsoft Intune administrative controls at Stryker Corporation, a U.S.-based medical technology firm, on March 11, 2026. The attackers created a new Global Administrator account after breaching an existing administrator credential, stole approximately 50 terabytes of data, and executed device wipes across nearly 80,000 systems via Intune’s built-in wipe command. The incident follows Microsoft’s hardening guidance for Intune published days after the breach, which CISA subsequently mandated for all U.S. organizations to mitigate similar risks. The attack highlights the risks of excessive administrative privileges and insufficient privileged access hygiene in cloud-based endpoint management platforms.

Ceros AI Trust Layer introduced to monitor and control Anthropic's Claude Code autonomous coding agent

Updated: · First: 19.03.2026 12:58 · 📰 1 src / 1 articles

A new AI Trust Layer named Ceros, developed by Beyond Identity, has been introduced to provide real-time visibility, runtime policy enforcement, and cryptographic audit trails for Anthropic’s Claude Code autonomous coding agent. Ceros operates directly on developers’ local machines, capturing device context, process ancestry, tool invocations, and MCP server interactions before any network-layer security tool can detect activity. The solution addresses a critical security gap where Claude Code operates with inherited developer permissions and executes actions autonomously, leaving no audit trail in existing enterprise security infrastructures.