CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 07:45 29/04/2026 UTC
  • VECT 2.0 Ransomware Operation Degrades to Irreversible Data Destruction Due to Critical Encryption Flaw The VECT 2.0 ransomware variant has been confirmed as an irreversible data wiper due to a critical nonce-handling flaw that discards decryption metadata for 75% of affected files, ensuring recovery is impossible regardless of ransom payment. The operation, structured as a ransomware-as-a-service scheme with a $250 Monero affiliate fee (waived for Commonwealth of Independent States actors), has grown through partnerships with BreachForums and TeamPCP, the latter of which provides access to victims compromised in recent supply-chain attacks. Analysts emphasize that negotiating with actors offers no path to file recovery and that the malware's threshold of 128KB ensures nearly all enterprise and user files are targeted. Read
  • Robinhood account creation process exploited to deliver phishing emails via email injection Threat actors abused a flaw in Robinhood’s account creation onboarding process to inject arbitrary HTML into legitimate registration emails, enabling the delivery of convincing phishing messages. Starting April 26, 2026, Robinhood customers received emails from [email protected] with a subject line ‘Your recent login to Robinhood’ warning of an ‘Unrecognized Device Linked to Your Account’. The emails included fake IP addresses, partial phone numbers, and a ‘Review Activity Now’ button that led to a phishing domain. The attack leveraged improperly sanitized device metadata fields during account registration to embed HTML into the Device: field of confirmation emails, creating a fake alert within otherwise legitimate messages. Attackers exploited Gmail’s dot aliasing feature to register accounts using variations of real email addresses, which Robinhood treated as distinct accounts while Gmail directed emails to the intended recipient. Robinhood has confirmed the incident was not a breach and has remediated the flaw by removing the Device: field from account creation emails. Read
  • Medtronic corporate network breach exposes over 9 million records, confirmed by vendor Medical device manufacturer Medtronic confirmed a breach of its corporate IT systems after the ShinyHunters extortion group claimed to have stolen over 9 million records containing personally identifiable information (PII) and terabytes of corporate data. Medtronic states there is no impact to medical products, patient safety, customer networks, manufacturing, distribution, financial reporting, or its ability to meet patient needs, and notes its networks are segmented. The company is investigating whether personal data was accessed and will notify affected individuals if confirmed. MiniMed, Medtronic's diabetes-focused subsidiary, reported its own IT systems were not affected. The threat actor listed Medtronic on its leak site on April 17, setting a ransom deadline of April 21, and was later removed from the site, which may indicate payment. Medtronic’s corporate IT, product, manufacturing, and distribution networks are segmented, and customer hospital networks remain separate and independently managed by customers’ IT teams. Read
  • Lua-based Fast16 sabotaging filesystem driver targeting Iranian nuclear program discovered pre-Stuxnet Fast16, a Lua-based sabotage malware with a kernel-mode filesystem driver (fast16.sys), predates Stuxnet by at least five years, with confirmed activity dating to 2005. Designed to target Windows 2000/XP systems, Fast16 intercepts and modifies executable code at the filesystem level via a boot-start driver, enabling systematic corruption of high-precision mathematical computations in engineering and scientific software suites (LS-DYNA 970, PKPM, MOHID). The malware’s modular 'wormlet' payload architecture and embedded Lua 5.0 VM represent an early example of state-sponsored sabotage targeting national infrastructure, rewriting the history of cyber weapons. While obsolete on modern systems, its attack vector remains theoretically relevant for contemporary high-precision calculation environments. Read
  • LofyGang Returns with Minecraft-Themed LofyStealer Campaign Targeting Gamers The Brazilian cybercrime group LofyGang has re-emerged after a three-year hiatus with a targeted campaign against Minecraft players using a new infostealer named LofyStealer (also tracked as GrabBot). The campaign leverages a trojanized Minecraft hack tool called 'Slinky' to deliver the stealer, which masquerades as the official game’s icon to deceive victims, particularly young users familiar with the gaming ecosystem. Once executed, LofyStealer (chromelevator.exe) is deployed in memory and harvests sensitive data from multiple browsers, including stored passwords, cookies, tokens, credit card details, and International Bank Account Numbers (IBANs). The exfiltrated data is sent to a command-and-control (C2) server located at 24.152.36[.]241. The group’s tactics have evolved to include a malware-as-a-service (MaaS) model with free and premium tiers, alongside a custom builder (Slinky Cracked) for payload delivery. This shift marks a significant departure from their historical focus on JavaScript supply chain attacks, such as npm package typosquatting and dependency hijacking, which previously targeted Discord tokens and gaming-related credentials. Read
  • Intermittent Outlook.com authentication failures during ongoing service degradation Microsoft has attributed the ongoing Outlook.com service degradation—causing intermittent authentication failures, unexpected sign-outs, and "too many requests" errors—to a recently introduced change and confirmed service health returned to normal around 7 PM UTC on April 27, 2026. The incident began impacting users worldwide on April 27, 2026, with Microsoft investigating client sign-in scenarios and labeling the event as a service degradation. Outage monitoring platforms received thousands of user reports, but no root cause, regional scope, or affected user count has been disclosed. Microsoft provided mitigation steps for iPhone users to re-enter credentials via the iOS Mail app to restore Outlook and Hotmail access. A prior Exchange Online outage in March 2026 similarly disrupted mailbox and calendar access across multiple protocols. Read
  • GitHub CVE-2026-3854 remote code execution flaw via crafted git push A critical command injection vulnerability, tracked as CVE-2026-3854 with a CVSS score of 8.7, was disclosed in GitHub.com and GitHub Enterprise Server that allowed authenticated users with push access to achieve remote code execution via a single "git push" command. The flaw stemmed from inadequate sanitization of user-supplied push option values, which were incorporated into internal service headers during git push operations. By injecting crafted push option values containing semicolons, an attacker could manipulate internal metadata and bypass sandboxing protections, ultimately executing arbitrary commands as the git user. Due to GitHub's multi-tenant architecture, exploitation of this vulnerability on GitHub.com could enable cross-tenant access, allowing an attacker to read repositories across multiple organizations on shared storage nodes. Read
Last updated: 07:45 29/04/2026 UTC
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment. Read
  • U.S. sanctions cyber scam operations in Southeast Asia The U.S. Department of the Treasury has sanctioned additional entities in Cambodia, including Senator Kok An, for operating large-scale cryptocurrency fraud networks embedded within scam compounds, including casinos and commercial buildings. These networks defrauded Americans of at least $10 billion in 2024 through romance baiting and fake investment platforms, with financial losses reaching millions per victim. The sanctions target 29 individuals and organizations and are coordinated with the Department of Justice, FBI, and Secret Service. Recent enforcement actions include the seizure of 503 fraudulent domains, disruption of a messaging app used for human trafficking recruitment, and criminal charges against operators in Burma and Cambodia. The U.S. has escalated efforts to dismantle these operations, which are linked to widespread human trafficking, physical abuse, and casino-based money laundering. The sanctions block U.S.-based assets and prohibit transactions with designated parties, aiming to disrupt the financial and operational infrastructure sustaining these cyber-enabled fraud networks. Read
  • Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines Supply chain compromise in the Trivy vulnerability scanner triggered the CanisterWorm propagation across CI/CD pipelines, now expanding to additional open-source ecosystems and involving multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) and Cisco confirming collaboration and horizontal movement across cloud environments. A new npm supply chain malware campaign discovered on April 24, 2026, shows self-propagating worm-like behavior via @automagik/genie and pgserve packages, stealing credentials and spreading across developer ecosystems while using Internet Computer Protocol (ICP) canisters for command and control. The malware shares technical similarities with prior TeamPCP campaigns, including post-install scripts and canister-based infrastructure, potentially indicating ongoing evolution of the threat actor's tactics or a new campaign leveraging established infrastructure. The Axios NPM package compromise via malicious versions 0.27.5 and 0.28.0 delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with attribution disputes suggesting either TeamPCP involvement or North Korean actor UNC1069 (Google's Threat Intelligence Group). Cisco's internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories including proprietary AI product code and customer data from banks, BPOs, and US government agencies. Multiple AWS keys were abused across a subset of Cisco's cloud accounts, with multiple threat actors participating in the breach. Read
  • Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach The extortion group ShinyHunters has expanded its campaign tied to the Anodot breach, claiming unauthorized access to Vimeo’s systems and threatening to leak data unless a ransom is paid. The attack leverages authentication tokens stolen from Anodot to compromise downstream victims, including Vimeo and Rockstar Games. Vimeo confirmed that exposed data included email addresses, technical data, video titles, and metadata, but excluded video content, credentials, and payment information. Operations remained unaffected, and Vimeo disabled Anodot integration and launched an investigation with law enforcement. Rockstar Games previously acknowledged a limited breach linked to the same third-party incident, with ShinyHunters leaking approximately 78.6 million records of internal analytics data. The compromised datasets included in-game revenue metrics, player behavior tracking, and Zendesk support analytics, with Rockstar asserting no operational impact. Read
  • Pre-authenticated RCE in Marimo exploited within 10 hours of advisory A pre-authenticated remote code execution (RCE) vulnerability in Marimo, tracked as CVE-2026-39987 (CVSS 9.3), was exploited in the wild within hours of public disclosure, enabling attackers to gain full PTY shells on exposed instances via the unauthenticated /terminal/ws WebSocket endpoint. The flaw, affecting Marimo versions prior to 0.23.0, initially led to rapid, human-driven exploitation campaigns focused on credential theft. Recent attacks have expanded to deploy a new NKAbuse malware variant hosted on Hugging Face Spaces, using typosquatted repositories to evade detection and establish persistent remote access. Additional exploitation activity includes sophisticated lateral movement, such as reverse-shell techniques and database enumeration, indicating a shift toward multi-stage attacks beyond initial credential harvesting. GitHub assessed the flaw with a critical CVSS score of 9.3, and Marimo developers confirmed impact on instances deployed as editable notebooks or exposed via --host 0.0.0.0 in edit mode. This event is distinct from the LMDeploy SSRF flaw (CVE-2026-33626), which was exploited within 12 hours of disclosure to conduct internal network reconnaissance via SSRF, targeting cloud metadata services, Redis, and MySQL instances. Read
  • North Korean Threat Actor BlueNoroff Targets Web3 Sector BlueNoroff, a financially motivated sub-cluster of the Lazarus Group, has expanded its long-running SnatchCrypto campaign with a large-scale cyber theft operation targeting over 100 cryptocurrency organizations across more than 20 countries. The campaign, detected in January 2026 and attributed with high confidence by Arctic Wolf Labs, used sophisticated social engineering tactics including typosquatted Zoom/Teams links, fake Calendly invites, and ClickFix-style clipboard attacks to deploy multi-stage malware chains. The group maintained persistent access for 66 days in some cases, exfiltrated live camera feeds to fuel AI-enhanced deepfake lures, and deployed advanced infrastructure including PowerShell C2 implants and AES-encrypted browser payloads. BlueNoroff remains North Korea's primary financial cybercrime unit, operating since at least 2014 and infamous for the 2016 Bangladesh Bank heist where $81 million was stolen. The group's evolving tactics demonstrate a shift from traditional financial targets to comprehensive data acquisition in the Web3 sector, including supply chain attack preparation. Read
  • Murky Panda, Genesis Panda, Glacial Panda Cloud and Telecom Intrusions Chinese state-sponsored hacking groups Murky Panda (Silk Typhoon), Genesis Panda, and Glacial Panda have escalated cloud and telecom espionage operations targeting government, technology, academic, legal, and professional services entities in North America, as well as broader international sectors. Murky Panda (Silk Typhoon) exploits trusted cloud relationships, zero-day vulnerabilities, and internet-facing appliances to breach enterprise networks and telecom infrastructure. They compromise Microsoft cloud solution providers to gain Global Administrator rights across downstream tenants, deploy web shells (e.g., neo-reGeorg, China Chopper) for persistence, and use trojanized components like CloudedHope (a Golang-based RAT) and ShieldSlide (OpenSSH backdoor). Recent developments include the extradition of Silk Typhoon affiliate Xu Zewei to the U.S. to face charges for conducting cyberespionage on behalf of China's MSS, with operations dating back to 2020–2021 targeting COVID-19 research data and exploiting Microsoft Exchange zero-days. Read

Latest updates

Browse →

VECT 2.0 Ransomware Operation Degrades to Irreversible Data Destruction Due to Critical Encryption Flaw

Updated: 29.04.2026 00:25 · First: 28.04.2026 17:01 · 📰 2 src / 2 articles

The VECT 2.0 ransomware variant has been confirmed as an irreversible data wiper due to a critical nonce-handling flaw that discards decryption metadata for 75% of affected files, ensuring recovery is impossible regardless of ransom payment. The operation, structured as a ransomware-as-a-service scheme with a $250 Monero affiliate fee (waived for Commonwealth of Independent States actors), has grown through partnerships with BreachForums and TeamPCP, the latter of which provides access to victims compromised in recent supply-chain attacks. Analysts emphasize that negotiating with actors offers no path to file recovery and that the malware's threshold of 128KB ensures nearly all enterprise and user files are targeted.

Active exploitation of pre-authentication SQL injection in LiteLLM proxy gateways

Updated: · First: 29.04.2026 00:07 · 📰 1 src / 1 articles

A critical pre-authentication SQL injection vulnerability in the LiteLLM open-source LLM gateway proxy is being actively exploited by threat actors to access and modify sensitive data stored in the proxy's database. The flaw, tracked as CVE-2026-42208, allows unauthenticated attackers to send specially crafted Authorization headers to any LLM API route, enabling read and write access to database contents. Given LiteLLM's role as a middleware layer for managing API keys, credentials, and environment secrets across major providers (e.g., OpenAI, Anthropic, Bedrock), successful exploitation can lead to unauthorized access to credentials and configuration data. The vulnerability arises from insecure string concatenation during API key verification and has been addressed in LiteLLM version 1.83.7 via parameterized queries. Widespread exploitation began approximately 36 hours after public disclosure on April 24, 2026.

Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach

Updated: 28.04.2026 22:04 · First: 13.04.2026 23:08 · 📰 2 src / 2 articles

The extortion group ShinyHunters has expanded its campaign tied to the Anodot breach, claiming unauthorized access to Vimeo’s systems and threatening to leak data unless a ransom is paid. The attack leverages authentication tokens stolen from Anodot to compromise downstream victims, including Vimeo and Rockstar Games. Vimeo confirmed that exposed data included email addresses, technical data, video titles, and metadata, but excluded video content, credentials, and payment information. Operations remained unaffected, and Vimeo disabled Anodot integration and launched an investigation with law enforcement. Rockstar Games previously acknowledged a limited breach linked to the same third-party incident, with ShinyHunters leaking approximately 78.6 million records of internal analytics data. The compromised datasets included in-game revenue metrics, player behavior tracking, and Zendesk support analytics, with Rockstar asserting no operational impact.

GitHub CVE-2026-3854 remote code execution flaw via crafted git push

Updated: · First: 28.04.2026 21:19 · 📰 1 src / 1 articles

A critical command injection vulnerability, tracked as CVE-2026-3854 with a CVSS score of 8.7, was disclosed in GitHub.com and GitHub Enterprise Server that allowed authenticated users with push access to achieve remote code execution via a single "git push" command. The flaw stemmed from inadequate sanitization of user-supplied push option values, which were incorporated into internal service headers during git push operations. By injecting crafted push option values containing semicolons, an attacker could manipulate internal metadata and bypass sandboxing protections, ultimately executing arbitrary commands as the git user. Due to GitHub's multi-tenant architecture, exploitation of this vulnerability on GitHub.com could enable cross-tenant access, allowing an attacker to read repositories across multiple organizations on shared storage nodes.

LofyGang Returns with Minecraft-Themed LofyStealer Campaign Targeting Gamers

Updated: · First: 28.04.2026 20:39 · 📰 1 src / 1 articles

The Brazilian cybercrime group LofyGang has re-emerged after a three-year hiatus with a targeted campaign against Minecraft players using a new infostealer named LofyStealer (also tracked as GrabBot). The campaign leverages a trojanized Minecraft hack tool called 'Slinky' to deliver the stealer, which masquerades as the official game’s icon to deceive victims, particularly young users familiar with the gaming ecosystem. Once executed, LofyStealer (chromelevator.exe) is deployed in memory and harvests sensitive data from multiple browsers, including stored passwords, cookies, tokens, credit card details, and International Bank Account Numbers (IBANs). The exfiltrated data is sent to a command-and-control (C2) server located at 24.152.36[.]241. The group’s tactics have evolved to include a malware-as-a-service (MaaS) model with free and premium tiers, alongside a custom builder (Slinky Cracked) for payload delivery. This shift marks a significant departure from their historical focus on JavaScript supply chain attacks, such as npm package typosquatting and dependency hijacking, which previously targeted Discord tokens and gaming-related credentials.

Enterprise AI Governance Framework Webinar Scheduled for April 28, 2026

Updated: · First: 28.04.2026 18:29 · 📰 1 src / 1 articles

A live webinar scheduled for April 28, 2026, at 1PM ET will present a structured approach to governing AI adoption in enterprises amid rising concerns over "Shadow AI" practices. The session aims to address security, ethical, and compliance risks stemming from unchecked AI tool adoption, while proposing a scalable governance framework to transition from fragmented usage to controlled, enterprise-wide deployment.

TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks

Updated: 28.04.2026 17:50 · First: 21.03.2026 09:28 · 📰 12 src / 19 articles

TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment.

Robinhood account creation process exploited to deliver phishing emails via email injection

Updated: 28.04.2026 17:49 · First: 28.04.2026 02:11 · 📰 2 src / 2 articles

Threat actors abused a flaw in Robinhood’s account creation onboarding process to inject arbitrary HTML into legitimate registration emails, enabling the delivery of convincing phishing messages. Starting April 26, 2026, Robinhood customers received emails from [email protected] with a subject line ‘Your recent login to Robinhood’ warning of an ‘Unrecognized Device Linked to Your Account’. The emails included fake IP addresses, partial phone numbers, and a ‘Review Activity Now’ button that led to a phishing domain. The attack leveraged improperly sanitized device metadata fields during account registration to embed HTML into the Device: field of confirmation emails, creating a fake alert within otherwise legitimate messages. Attackers exploited Gmail’s dot aliasing feature to register accounts using variations of real email addresses, which Robinhood treated as distinct accounts while Gmail directed emails to the intended recipient. Robinhood has confirmed the incident was not a breach and has remediated the flaw by removing the Device: field from account creation emails.

Deprecation of TLS 1.0 and TLS 1.1 for Exchange Online POP3/IMAP4 access

Updated: · First: 28.04.2026 16:18 · 📰 1 src / 1 articles

Microsoft will fully deprecate support for legacy TLS versions 1.0 and 1.1 for POP3 and IMAP4 connections to Exchange Online starting July 2026, requiring TLS 1.2 or later for continued access. The change aims to mitigate risks associated with outdated cryptographic protocols that no longer meet modern security standards. Most users are expected to remain unaffected as current traffic predominantly uses TLS 1.2 or higher, but organizations relying on legacy endpoints or non-compliant clients may face connectivity failures or require updates to custom/embedded systems.

Ransomware groups 0APT and KryBit engage in retaliatory data leaks disrupting operations

Updated: · First: 28.04.2026 16:00 · 📰 1 src / 1 articles

A retaliatory cyber conflict between the ransomware groups 0APT and KryBit resulted in mutual data leaks exposing operational details, infrastructure, and fabricated victim claims. The incident began in late March 2026 when 0APT leaked KryBit’s administrative panel, personnel data, and negotiation records, prompting KryBit to retaliate by stealing 0APT’s operational data and defacing its leak site. Both groups now face operational disruption, requiring infrastructure rebuilds, while Everest Group remains unaffected but exposed. The event highlights escalating instability within the ransomware ecosystem driven by credibility erosion and financial pressure.

Structured OPSEC Framework for Large-Scale Carding Operations Revealed in Underground Forum

Updated: · First: 28.04.2026 15:50 · 📰 1 src / 1 articles

A threat actor has publicly detailed a three-tier operational security (OPSEC) framework designed to sustain high-volume carding operations while evading detection, emphasizing compartmentalization, identity isolation, and advanced evasion techniques. The framework separates infrastructure into public, operational, and extraction layers, each with distinct controls to minimize exposure and forensic traceability. Common operational failures—such as identity reuse, weak fingerprinting evasion, and poor stage separation—are explicitly identified as primary causes of compromise. Advanced techniques including time-delayed triggers, behavioral randomization, and dead man’s switches are integrated to enhance resilience. The methodology reflects a shift in cybercriminal operations toward long-term sustainability, where OPSEC is treated as a competitive advantage over technical sophistication.

Extradition of Chinese National Tied to Silk Typhoon Cyber Espionage Campaign

Updated: · First: 28.04.2026 15:30 · 📰 1 src / 1 articles

A Chinese national accused of conducting state-sponsored cyber intrusions under the Silk Typhoon (Hafnium) campaign has been extradited to the U.S. to face charges related to espionage activities targeting American organizations and COVID-19 research between February 2020 and June 2021. Xu Zewei, 34, allegedly carried out intrusions under the direction of China’s Ministry of State Security (MSS) while operating through a private contractor, Shanghai Powerock Network Co. Ltd., to obscure state involvement. The campaign leveraged Microsoft Exchange Server vulnerabilities and targeted universities, researchers, and private sector entities, with data exfiltration focused on vaccine research, policy communications, and sensitive intellectual property.

PhantomRPC Local Privilege Escalation in Windows RPC Mechanism Exploited via Impersonation Abuse

Updated: · First: 28.04.2026 14:31 · 📰 1 src / 1 articles

A novel local privilege escalation technique named PhantomRPC has been disclosed, leveraging architectural weaknesses in the Windows Remote Procedure Call (RPC) mechanism to escalate privileges to SYSTEM level across all supported Windows versions. The attack abuses legitimate Windows impersonation mechanisms and RPC server impersonation without runtime verification, allowing attackers to deploy malicious RPC endpoints that mimic legitimate services such as TermService or DHCP Client. Exploitation requires prior compromise of a privileged service account or user context, and can be triggered via scheduled system calls, user actions, or automatic service behavior. The vulnerability introduces a broad attack surface due to the widespread use of RPC in Windows system components and applications.

Misrendered Windows RDP security warnings due to multi-monitor scaling in April 2026 update

Updated: · First: 28.04.2026 12:51 · 📰 1 src / 1 articles

Microsoft disclosed a rendering defect in newly introduced Remote Desktop (RDP) security warnings on Windows systems after the April 2026 cumulative updates. Affected systems fail to render warning dialog text and controls correctly when using multiple monitors with different display scaling settings, resulting in overlapping text, misplaced buttons, and reduced usability or complete loss of interaction capability. The issue occurs on all supported Windows versions and persists across Windows 11, Windows 10, and Windows Server installations that include the April 2026 security updates.

Intermittent Outlook.com authentication failures during ongoing service degradation

Updated: 28.04.2026 11:37 · First: 27.04.2026 15:03 · 📰 2 src / 2 articles

Microsoft has attributed the ongoing Outlook.com service degradation—causing intermittent authentication failures, unexpected sign-outs, and "too many requests" errors—to a recently introduced change and confirmed service health returned to normal around 7 PM UTC on April 27, 2026. The incident began impacting users worldwide on April 27, 2026, with Microsoft investigating client sign-in scenarios and labeling the event as a service degradation. Outage monitoring platforms received thousands of user reports, but no root cause, regional scope, or affected user count has been disclosed. Microsoft provided mitigation steps for iPhone users to re-enter credentials via the iOS Mail app to restore Outlook and Hotmail access. A prior Exchange Online outage in March 2026 similarly disrupted mailbox and calendar access across multiple protocols.

NCSC guidance warns against common SOC performance metrics, advocates time-to-detect/respond focus

Updated: · First: 28.04.2026 11:30 · 📰 1 src / 1 articles

The UK National Cyber Security Centre (NCSC) highlighted that many conventional SOC performance metrics—such as ticket volume, closure time, or detection rule counts—are misleading and can incentivize counterproductive behavior. The agency emphasized that only metrics tied to timeliness of attack detection and response (TTD/TTR) reliably reflect SOC effectiveness. Misaligned metrics risk driving analysts toward rapid false-positive triage rather than meaningful threat investigation.

North Korean Threat Actor BlueNoroff Targets Web3 Sector

Updated: 28.04.2026 11:00 · First: 03.11.2025 14:56 · 📰 2 src / 2 articles

BlueNoroff, a financially motivated sub-cluster of the Lazarus Group, has expanded its long-running SnatchCrypto campaign with a large-scale cyber theft operation targeting over 100 cryptocurrency organizations across more than 20 countries. The campaign, detected in January 2026 and attributed with high confidence by Arctic Wolf Labs, used sophisticated social engineering tactics including typosquatted Zoom/Teams links, fake Calendly invites, and ClickFix-style clipboard attacks to deploy multi-stage malware chains. The group maintained persistent access for 66 days in some cases, exfiltrated live camera feeds to fuel AI-enhanced deepfake lures, and deployed advanced infrastructure including PowerShell C2 implants and AES-encrypted browser payloads. BlueNoroff remains North Korea's primary financial cybercrime unit, operating since at least 2014 and infamous for the 2016 Bangladesh Bank heist where $81 million was stolen. The group's evolving tactics demonstrate a shift from traditional financial targets to comprehensive data acquisition in the Web3 sector, including supply chain attack preparation.

Medtronic corporate network breach exposes over 9 million records, confirmed by vendor

Updated: 28.04.2026 09:35 · First: 27.04.2026 16:50 · 📰 2 src / 2 articles

Medical device manufacturer Medtronic confirmed a breach of its corporate IT systems after the ShinyHunters extortion group claimed to have stolen over 9 million records containing personally identifiable information (PII) and terabytes of corporate data. Medtronic states there is no impact to medical products, patient safety, customer networks, manufacturing, distribution, financial reporting, or its ability to meet patient needs, and notes its networks are segmented. The company is investigating whether personal data was accessed and will notify affected individuals if confirmed. MiniMed, Medtronic's diabetes-focused subsidiary, reported its own IT systems were not affected. The threat actor listed Medtronic on its leak site on April 17, setting a ransom deadline of April 21, and was later removed from the site, which may indicate payment. Medtronic’s corporate IT, product, manufacturing, and distribution networks are segmented, and customer hospital networks remain separate and independently managed by customers’ IT teams.

GlassWorm malware targets OpenVSX, VS Code registries

Updated: 28.04.2026 00:41 · First: 20.10.2025 19:13 · 📰 17 src / 36 articles

GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, now leveraging Solana dead drops for C2, a novel browser extension for surveillance, and the Model Context Protocol (MCP) ecosystem. The campaign delivers a .NET binary targeting Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline for session surveillance on cryptocurrency platforms like Bybit and harvests extensive browser data. Recent innovations include a Zig-compiled dropper embedded within an Open VSX extension named 'specstudio.code-wakatime-activity-tracker' masquerading as WakaTime, which installs platform-specific Node.js native addons compiled from Zig code to stealthily infect all IDEs on a developer's machine. This dropper downloads a malicious VS Code extension (.VSIX) named 'floktokbok.autoimport' from an attacker-controlled GitHub account, which impersonates a legitimate extension with over 5 million installs and installs silently across all detected IDEs, avoiding execution on Russian systems and communicating with the Solana blockchain for C2. A new large-scale social engineering campaign has emerged, distributing fake VS Code security alerts posted in GitHub Discussions to automate posts across thousands of repositories using low-activity accounts, triggering GitHub email notifications with fake vulnerability advisories containing realistic CVE references. Links redirect victims through a cookie-driven chain to drnatashachinn[.]com, where a JavaScript reconnaissance payload profiles targets before delivering additional malicious payloads. This operation represents a coordinated, large-scale effort targeting developers. GlassWorm remains a persistent supply chain threat impacting npm, PyPI, GitHub, and Open VSX ecosystems. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers. A new wave of the GlassWorm campaign targets the OpenVSX ecosystem with 73 "sleeper" extensions that activate after updates, delivering malware to developers. Six extensions have already been activated, while the remainder remain dormant or suspicious. The campaign leverages thin loaders that fetch secondary VSIX packages or platform-specific modules at runtime, marking a shift in the group's tactics to evade detection by avoiding direct malware embedding in initial uploads. The extensions mimic legitimate listings using identical icons and near-identical names to deceive developers. Developers who installed these extensions are advised to rotate all secrets and perform a full system clean-up.

Operation of fraudulent cellular base stations for SMS phishing in Greater Toronto Area disrupted

Updated: · First: 27.04.2026 23:00 · 📰 1 src / 1 articles

Three individuals were arrested in Canada for operating "SMS blaster" devices in the Greater Toronto Area, which masquerade as legitimate cellular towers to deliver phishing SMS messages to nearby mobile devices. The devices exploited automatic cell reselection to intercept and force connections, enabling direct SMS delivery without requiring phone numbers. Targets received fraudulent texts appearing to originate from trusted entities such as banks or government agencies, directing them to credential-harvesting websites. The operation spanned multiple months and locations, with rogue towers moved via vehicles to maximize coverage. Police estimate 13 million instances of mobile network entrapment occurred, and devices disconnected victims from their legitimate networks, impairing emergency service access during incidents.

Murky Panda, Genesis Panda, Glacial Panda Cloud and Telecom Intrusions

Updated: 27.04.2026 22:56 · First: 22.08.2025 14:06 · 📰 4 src / 4 articles

Chinese state-sponsored hacking groups Murky Panda (Silk Typhoon), Genesis Panda, and Glacial Panda have escalated cloud and telecom espionage operations targeting government, technology, academic, legal, and professional services entities in North America, as well as broader international sectors. Murky Panda (Silk Typhoon) exploits trusted cloud relationships, zero-day vulnerabilities, and internet-facing appliances to breach enterprise networks and telecom infrastructure. They compromise Microsoft cloud solution providers to gain Global Administrator rights across downstream tenants, deploy web shells (e.g., neo-reGeorg, China Chopper) for persistence, and use trojanized components like CloudedHope (a Golang-based RAT) and ShieldSlide (OpenSSH backdoor). Recent developments include the extradition of Silk Typhoon affiliate Xu Zewei to the U.S. to face charges for conducting cyberespionage on behalf of China's MSS, with operations dating back to 2020–2021 targeting COVID-19 research data and exploiting Microsoft Exchange zero-days.

Social media scam losses exceed $2.1B in 2025 as Meta deploys anti-scam tools

Updated: · First: 27.04.2026 19:27 · 📰 1 src / 1 articles

Americans reported over $2.1 billion in losses to social media scams in 2025, an eightfold increase since 2020, according to the U.S. Federal Trade Commission (FTC). Nearly one in three Americans who reported financial losses to scams were contacted via social media, with Facebook accounting for the highest losses compared to other platforms or traditional contact methods such as email or text messages. Scammers exploited social media platforms to target victims globally at low cost, leveraging account hacks, data mining from user posts, and legitimate advertising tools to refine targeting by demographics and interests.

Malicious PyPI package elementary-data 0.23.3 backdoored via GitHub Actions workflow injection

Updated: · First: 27.04.2026 18:17 · 📰 1 src / 1 articles

An attacker injected malicious code into the elementary-data PyPI package (version 0.23.3, 1.1M monthly downloads) to distribute an infostealer targeting developer credentials and cryptocurrency wallets. The compromise stemmed from a GitHub Actions script injection flaw exploited via a malicious comment in a pull request, which triggered workflow execution under the project’s GITHUB_TOKEN. This enabled the attacker to forge a signed commit and tag (v0.23.3), triggering the legitimate release pipeline to publish the backdoored package to PyPI and a malicious Docker image to GitHub Container Registry. The infostealer, delivered via elementary.pth, targeted SSH keys, Git credentials, cloud provider secrets, Kubernetes/Docker/CI secrets, .env files, developer tokens, cryptocurrency wallet files (Bitcoin, Litecoin, Dogecoin, Zcash, Dash, Monero, Ripple), system data, and logs. Exposure occurred through unpinned version installations and Docker image pulls (tags 0.23.3 and :latest).

U.S. sanctions cyber scam operations in Southeast Asia

Updated: 27.04.2026 18:00 · First: 09.09.2025 23:25 · 📰 5 src / 9 articles

The U.S. Department of the Treasury has sanctioned additional entities in Cambodia, including Senator Kok An, for operating large-scale cryptocurrency fraud networks embedded within scam compounds, including casinos and commercial buildings. These networks defrauded Americans of at least $10 billion in 2024 through romance baiting and fake investment platforms, with financial losses reaching millions per victim. The sanctions target 29 individuals and organizations and are coordinated with the Department of Justice, FBI, and Secret Service. Recent enforcement actions include the seizure of 503 fraudulent domains, disruption of a messaging app used for human trafficking recruitment, and criminal charges against operators in Burma and Cambodia. The U.S. has escalated efforts to dismantle these operations, which are linked to widespread human trafficking, physical abuse, and casino-based money laundering. The sanctions block U.S.-based assets and prohibit transactions with designated parties, aiming to disrupt the financial and operational infrastructure sustaining these cyber-enabled fraud networks.

Commercial data harvesting disclosed in widely deployed browser extensions across streaming, ad blocking, and enterprise tools

Updated: · First: 27.04.2026 16:30 · 📰 1 src / 1 articles

More than 80 widely used browser extensions, collectively installed millions of times, disclose in their privacy policies that they collect and sell user data. The extensions span categories including streaming utilities, ad blockers, and enterprise tools, and rely on broad legal language to commercialize data without hidden tactics. LayerX Security analysis of 6,666 policies confirmed 82 extensions engaged in commercial data sharing, including a network of 24 streaming extensions reaching 800,000 users that package viewing behavior, preferences, and inferred demographics for third parties.

Lua-based Fast16 sabotaging filesystem driver targeting Iranian nuclear program discovered pre-Stuxnet

Updated: 27.04.2026 16:09 · First: 27.04.2026 12:10 · 📰 2 src / 2 articles

Fast16, a Lua-based sabotage malware with a kernel-mode filesystem driver (fast16.sys), predates Stuxnet by at least five years, with confirmed activity dating to 2005. Designed to target Windows 2000/XP systems, Fast16 intercepts and modifies executable code at the filesystem level via a boot-start driver, enabling systematic corruption of high-precision mathematical computations in engineering and scientific software suites (LS-DYNA 970, PKPM, MOHID). The malware’s modular 'wormlet' payload architecture and embedded Lua 5.0 VM represent an early example of state-sponsored sabotage targeting national infrastructure, rewriting the history of cyber weapons. While obsolete on modern systems, its attack vector remains theoretically relevant for contemporary high-precision calculation environments.

Laundering operator sentenced for role in $230M crypto heist and RICO conspiracy

Updated: · First: 27.04.2026 16:01 · 📰 1 src / 1 articles

A 22-year-old U.S. national was sentenced to 70 months in prison for laundering at least $3.5 million of funds stolen in a $230 million cryptocurrency heist. The theft targeted a Genesis exchange creditor in August 2024 via phone-number spoofing and customer-support impersonation, resulting in the compromise of 2FA and remote access to private keys. Stolen funds were layered through mixers, exchanges, peel chains, and VPNs with accomplices, financing lavish spending including private jets, high-end vehicles, luxury residences, nightclub outings, and designer goods.

Escalating deepfake voice social engineering attacks drive multi-million-dollar losses amid absence of verification protocols

Updated: · First: 27.04.2026 16:00 · 📰 1 src / 1 articles

Since early 2024, threat actors have deployed AI-generated voice clones in real-time telephone and videoconference calls to impersonate executives and colleagues, bypassing existing technical controls and inducing victims to authorize high-value wire transfers. Attacks leveraged only three seconds of publicly available audio—often from corporate recordings or social media—to create convincing replicas using free, offline tools. Incidents surged 680% year-over-year in 2025, with over 100,000 documented cases in the United States alone and global documented fraud losses exceeding $2.19 billion. Organizations that prevented financial losses relied on enforced verification steps—such as pre-stored callback numbers, verbal passcodes, and mandatory pauses before acting—rather than technical detection.

Rising threat from autonomous LLM-driven exploitation amid persistent human validation gaps

Updated: · First: 27.04.2026 16:00 · 📰 1 src / 1 articles

Security experts warn that large language models (LLMs) like Anthropic’s Mythos and OpenAI’s GPT-5.5 are accelerating autonomous offensive capabilities, enabling rapid discovery and exploitation of vulnerabilities at scale across platforms and infrastructure. While LLM-driven tools can autonomously generate exploits, chain attack sequences, and adapt mid-engagement, their practical effectiveness remains limited by human validation requirements. Human expertise is still essential to assess exploitability, determine real-world impact, and filter false positives, creating a widening gap between discovery and exploitable outcomes. Defenders face an escalating challenge as the time from vulnerability discovery to exploitation drops from months to hours, necessitating immediate shifts to proactive security practices such as shifting left, multilayer defenses, and rapid patching to mitigate the threat.

Cybersecurity workforce dissatisfaction trends amid persistent underinvestment despite rising demand

Updated: · First: 27.04.2026 14:40 · 📰 1 src / 1 articles

A global survey of technology professionals indicates persistent dissatisfaction within cybersecurity teams, with over 75% not receiving pay raises in the past year and only 45% expecting increases in the next 12 months. Despite high-profile cyber incidents in 2025 affecting major sectors such as automotive and healthcare, only 22% of organizations increased cybersecurity investment, exacerbating workforce attrition risks amid sustained demand for security skills.