CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 16:30 08/04/2026 UTC
  • Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting Iranian state-sponsored and affiliated cyber threat actors have formalized a cyber-kinetic war doctrine, integrating digital reconnaissance with physical strikes following the February 28, 2026, joint US-Israel military operation (Epic Fury). New research confirms Iran’s systematic compromise of Hikvision and Dahua IP cameras across Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and Lebanon—exploiting five patched but widely unpatched vulnerabilities to enable real-time battle damage assessment and missile-targeting support. Check Point Research assesses this activity as a predictive indicator of kinetic strikes, mirroring tactics used during the June 2025 Israel-Iran conflict. As of April 2026, Iranian APT actors have escalated direct targeting of U.S. critical infrastructure, focusing on Rockwell/Allen-Bradley PLCs in Government Services, Water and Wastewater Systems, and Energy sectors. The joint FBI/CISA/NSA advisory warns of financial losses, operational disruptions, and malicious manipulation of HMI/SCADA displays, with confirmed extraction of PLC project files. This follows prior CyberAv3ngers (IRGC-linked) campaigns that compromised 75 Unitronics PLCs in 2023–2024. In parallel, pro-Iranian hacktivist group Handala wiped 80,000 devices on U.S. medical giant Stryker’s network in March 2026, signaling a shift toward destructive hybrid operations blending state-backed and proxy activity. The campaign extends beyond surveillance: pro-Iranian actors breached Jordan’s Silos and Supply General Company via phishing, while IRGC-linked groups conducted limited but targeted ICS/SCADA attacks and DDoS campaigns against UAE/Bahrain government entities. CrowdStrike and Flashpoint warn of escalating hybrid tactics, including propaganda operations, data center missile strikes, and hacktivist proxies (e.g., Russian Legion) expanding targets to US-based critical infrastructure. Pay2Key, an Iranian-linked ransomware group active since 2020, has re-emerged in March 2026 with enhanced evasion capabilities, targeting a US healthcare provider in a three-hour encryption blitz that leveraged TeamViewer, credential harvesting (Mimikatz/LaZagne), and backup enumeration—raising concerns about its strategic destruction motives amid geopolitical tensions. Read
  • Operational Disruption at Signature Healthcare Following Suspected Cybersecurity Incident Signature Healthcare in Brockton, Massachusetts, has diverted ambulances due to a suspected cybersecurity incident causing significant operational disruptions. Brockton Hospital, a 200-bed community facility, and Signature Medical Group’s 15 locations remained partially operational, with emergency and walk-in services open but ambulance traffic redirected. The incident, detected on Monday, triggered down-time procedures to maintain patient care and safety. Chemotherapy infusion services were canceled, prescriptions could not be filled at retail pharmacies, and patients faced delays across medical group practices. The attackers’ motives and whether ransomware was involved remain unconfirmed. Read
  • Indirect prompt injection in Grafana AI rendering enables silent data exfiltration A novel attack chain dubbed GrafanaGhost exploits indirect prompt injection via Grafana's AI rendering components to silently extract sensitive enterprise data. The exploit is triggered when manipulated inputs—crafted via image tags, protocol-relative URLs, and the "INTENT" keyword—bypass domain validation and AI guardrails, enabling stealthy real-time transmission of financial metrics, infrastructure health data, and customer records. Grafana Labs has patched the vulnerability in its Markdown component’s image renderer, though the company disputes claims of zero-click operation, asserting exploitation required substantial user interaction and AI warnings. Read
  • Identification of key leadership behind GandCrab and REvil ransomware operations by German authorities German Federal Police (BKA) announced the identification of two Russian nationals, Daniil Maksimovich Shchukin (31) and Anatoly Sergeevitsch Kravchuk (43), as the leaders of the GandCrab and REvil ransomware operations spanning from at least early 2019 to July 2021. The duo, with Shchukin operating under aliases UNKN/UNKNOWN on cybercrime forums, is linked to at least 130 extortion cases targeting German companies, including 25 victims who paid $2.2 million in ransoms, while total financial damage exceeded $40 million. Authorities believe both individuals are now in Russia and have requested public assistance, including entries on the EU’s Most Wanted portal. BKA has released images of the suspects to aid tracking efforts. The operations under Shchukin and Kravchuk followed the GandCrab model, which launched in early 2018 and reportedly earned $2 billion in ransom payments before its leader retired in June 2019. REvil, emerging afterward, adopted GandCrab’s affiliate structure, public leak sites, and data auctions, targeting high-profile victims such as Texas local governments, Acer, and the Kaseya supply-chain compromise affecting approximately 1,500 downstream victims. Following the Kaseya attack, REvil took a two-month operational break during which law enforcement infiltrated their infrastructure, leading to disruptions. In January 2022, Russian authorities arrested over a dozen REvil members, who were released in 2025 after serving time for carding-related charges. Read
  • GPUBreach attack leverages GDDR6 Rowhammer to escalate privileges and compromise systems via NVIDIA driver flaws Researchers from the University of of Toronto demonstrated the GPUBreach attack, a new Rowhammer-based technique that corrupts GDDR6 GPU page tables to grant unprivileged CUDA kernels arbitrary read/write access to GPU memory. The vulnerability is chained with memory-safety flaws in the NVIDIA driver to escalate privileges from an unprivileged context to full system compromise—including root shell access—without disabling IOMMU or relying on prior GPU Rowhammer research. The attack bypasses IOMMU protection by corrupting trusted driver state via GPU-controlled memory, making it effective even on systems with hardware memory isolation enabled. Demonstrated on NVIDIA RTX A6000 GPUs with GDDR6 memory, the technique enables cross-process data exposure, cryptographic key leakage, manipulation of ML processes (reducing accuracy from 80% to 0%), and extraction of sensitive data such as LLM weights. While ECC mitigation exists, it may fail to detect multiple bit-flips, leaving systems exposed. The research is scheduled for presentation at the 47th IEEE Symposium on Security & Privacy in 2026 and follows NVIDIA’s November 2025 notification of related risks. Read
  • Consumer-grade GPUs outperform AI accelerators in password cracking benchmarks Benchmarking tests comparing flagship AI accelerators (Nvidia H200, AMD MI300X) and a consumer GPU (Nvidia RTX 5090) revealed that consumer-grade hardware significantly outperforms AI accelerators in raw password cracking performance across multiple hashing algorithms (MD5, NTLM, bcrypt, SHA-256, SHA-512). The RTX 5090 achieved higher hash rates than both the H200 and MI300X in all tested algorithms, despite being an order of magnitude less expensive. Historical comparisons with older consumer GPUs (e.g., 2017 Nvidia GTX 1080 rigs) showed similar or superior cracking performance to current AI accelerators. The findings underscore that password cracking capability is not dependent on specialized or high-cost hardware, highlighting the importance of strong password policies and credential monitoring to mitigate brute-force and credential-stuffing risks. Read
  • Claude Mythos uncovers thousands of zero-days across major systems via Project Glasswing Anthropic’s frontier AI model, Claude Mythos Preview, has autonomously discovered and remediated thousands of high-severity zero-day vulnerabilities across major operating systems, web browsers, and software libraries through Project Glasswing, a consortium involving AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and Anthropic. The initiative leverages Mythos Preview’s advanced agentic coding and reasoning capabilities—developed without explicit cybersecurity training—to identify long-standing flaws such as a 27-year-old OpenBSD denial-of-service vulnerability and a 16-year-old FFmpeg flaw. Anthropic has reported and patched these vulnerabilities while committing $100 million in usage credits and $4 million in donations to support open-source security efforts. The project aims to safely deploy Mythos-class models at scale, though concerns persist about potential malicious exploitation by threat actors. Read
Last updated: 13:30 08/04/2026 UTC
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS A rapidly escalating device code phishing campaign continues to target Microsoft 365 accounts across at least 340 organizations in multiple countries since mid-February 2026, with attacks surging 37.5 times in early 2026 compared to baseline levels at the start of March. The campaign abuses legitimate OAuth device authorization flows to harvest credentials and establish persistent access tokens, primarily via the EvilTokens PhaaS platform and at least 10 other competing phishing kits (e.g., VENOM, DOCUPOLL, SHAREFILE). These attacks now incorporate advanced features such as anti-bot evasion techniques, multi-hop redirect chains leveraging legitimate vendor services, and SaaS-themed lures impersonating business content (e.g., DocuSign, SharePoint, Adobe Acrobat). The EvilTokens platform, sold over Telegram, has democratized device code phishing, enabling low-skilled cybercriminals to execute attacks that grant persistent access to victim accounts, including email, files, Teams data, and SSO impersonation capabilities. The campaign’s global reach extends to at least 10 countries, with sectors including construction, non-profits, real estate, manufacturing, financial services, healthcare, legal, and government being targeted. Mitigation efforts focus on disabling the device code flow via conditional access policies and monitoring for anomalous authentication events. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, compromising trusted PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) to deliver credential-stealing malware that harvests SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. The malware exfiltrates stolen data to attacker-controlled infrastructure and establishes persistent backdoors, with evidence linking TeamPCP to the Vectr ransomware group for follow-on operations. The campaign began as a supply-chain attack involving 47 compromised npm packages and escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and direct targeting of CI/CD pipelines via GitHub Actions workflows (e.g., Checkmarx, Trivy). Recent compromises of LiteLLM and Telnyx demonstrate rapid iteration and maturation of supply-chain attack methodology, while destructive payloads targeting Iranian systems in Kubernetes environments (e.g., time-zone/locale-based wipers) highlight the group’s geopolitical alignment. The LiteLLM compromise specifically turned developer endpoints into systematic credential harvesting operations, with malware activating during installation/updates and cascading through transitive dependencies (e.g., dspy, opik) to affect organizations that never directly used LiteLLM. Read
  • Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency A financially motivated North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman through a two-week social engineering campaign involving cloned personas, fake Slack workspaces, and deceptive Microsoft Teams meetings. The attackers published malicious axios versions v1.14.1 and v0.30.4 containing plain-crypto-js as a dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack was part of an industrialized social engineering campaign targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building, matured attacker tooling, and convincing delivery mechanisms. The blast radius of compromised packages like axios—downloaded over 100 million times weekly—amplifies the impact, with similar campaigns observed against cryptocurrency founders, venture capital executives, and other developers. Malicious packages were swiftly removed, but the incident underscores the evolving threat model where traditional social engineering now scales through supply chain compromises. Read
  • Russian UNC6353 Uses Coruna and Darksword iOS Exploit Kits Across iOS 13–18.7 Targeting Financial Espionage and Data Theft Apple has expanded security updates for iOS 18.7.7 and iPadOS 18.7.7 to protect devices still running iOS 18 from the DarkSword exploit kit, without requiring full OS upgrades. This follows continued exploitation of DarkSword since July 2025 across multiple countries, with attacks leveraging six vulnerabilities to deploy data-stealing malware like GhostBlade, GhostKnife, and GhostSaber through watering hole attacks on compromised websites. The campaign remains linked to Russian threat actor UNC6353 and associated groups including UNC6748 and Turkish vendor PARS Defense, with Coruna and Darksword exploit kits now confirmed as closely related frameworks sharing origins in the 2019–2023 Operation Triangulation campaign. Coruna has evolved from a precision espionage tool into a mass-exploitation framework with 23 exploits across five chains, while Darksword targets iOS 18.4–18.7 and has been publicly leaked on GitHub. Apple has patched all exploited flaws in recent releases (18.7.3, 26.2, 26.3.1), and CISA has mandated federal agencies patch three DarkSword-linked vulnerabilities (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520) by April 3, 2026. The commoditization of these iOS exploitation tools elevates risk to end-users globally. Read
  • Qilin Ransomware Campaign: German Political Party and Endpoint Compromises Qilin ransomware has been linked to a high-profile data theft incident targeting Die Linke, a major German political party with 123,000 members and 64 seats in the Bundestag. The group stole sensitive internal party data and personal information of headquarters employees, though the membership database was reportedly unaffected. Die Linke attributed the attack to Qilin, describing them as Russian-speaking cybercriminals with financial and political motivations, and suggested the incident may be part of hybrid warfare operations. The initial investigation focused on a Huntress Labs endpoint compromise where a rogue ScreenConnect instance was used to deploy malicious files and attempt disabling Windows Defender before ransomware deployment. Qilin operates as a ransomware-as-a-service (RaaS) variant with affiliates following diverse attack patterns. Read
  • Microsoft Investigates Multiple Issues in Classic Outlook Microsoft has resolved a bug causing email delivery issues for some Classic Outlook users sending via Outlook.com, which previously prevented messages from reaching intended recipients and triggered 0x80070005-0x0004dc-0x000524 non-delivery reports. The issue primarily affected users with Outlook profiles linked to Exchange accounts or those with Exchange Online mail contacts sharing SMTP addresses. Microsoft deployed a server-side fix on April 3, 2026, though some users may still encounter temporary issues until OAuth tokens expire. Earlier investigations revealed that Microsoft was addressing multiple problems in classic Outlook, including mouse pointer disappearance that also impacted OneNote and other Microsoft 365 apps, synchronization and connection issues with Gmail and Yahoo accounts, and "Can't connect to the server" errors when creating groups with EWS enabled. Temporary workarounds were provided for these issues while Microsoft worked on permanent fixes. Read
  • Metro4Shell RCE Flaw Exploited in React Native CLI npm Package Threat actors are actively exploiting a critical remote code execution (RCE) flaw (CVE-2025-11953, CVSS 9.8) in the Metro Development Server within the @react-native-community/cli npm package, enabling unauthenticated OS command execution. Exploits deliver a PowerShell script that disables Microsoft Defender exclusions and downloads a Rust-based binary with anti-analysis features from an attacker-controlled host. The attacks, first observed on December 21, 2025, originate from multiple IP addresses and indicate operational use rather than experimental probing. A separate campaign is exploiting React2Shell (CVE-2025-55182), a pre-authentication RCE flaw in React Server Components (RSCs) affecting Next.js applications, for large-scale credential theft. This campaign, attributed to UAT-10608, uses the NEXUS Listener automated tool to harvest credentials, SSH keys, cloud tokens, and environment secrets from at least 766 compromised hosts across multiple industries and regions. Attackers leverage automated scanning to identify vulnerable deployments and deploy NEXUS Listener for post-exploitation data collection and further malicious activity. Read

Latest updates

Browse →

Unauthenticated RCE Vulnerability in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197)

Updated: 08.04.2026 20:26 · First: 08.04.2026 12:15 · 📰 2 src / 2 articles

A high-severity unauthenticated remote code execution (RCE) vulnerability (CVE-2026-34197) was discovered in Apache ActiveMQ Classic, affecting versions prior to 5.19.4 and all versions from 6.0.0 to 6.2.3. The flaw permits attackers to execute arbitrary OS commands by abusing the Jolokia management API's addNetworkConnector function to fetch remote Spring XML files during broker initialization. Researchers uncovered the vulnerability using Anthropic’s Claude AI, which identified 80% of the exploit path in approximately 10 minutes with minimal human input. Horizon3’s Naveen Sunkavally reported the issue to Apache on March 22, 2026, and it was patched on March 30, 2026. Exploitation indicators include ActiveMQ broker logs showing internal VM transport connections with brokerConfig=xbean:http:// query parameters and warnings about configuration problems indicating payload execution. The flaw builds on a prior issue (CVE-2024-32114), which removed authentication requirements in versions 6.0.0-6.1.1, while other versions require default credentials (admin:admin). Despite the availability of the newer Artemis branch, ActiveMQ Classic remains widely deployed in enterprise, web backends, government, and Java-based corporate systems.

Consumer-grade GPUs outperform AI accelerators in password cracking benchmarks

Updated: · First: 08.04.2026 17:00 · 📰 1 src / 1 articles

Benchmarking tests comparing flagship AI accelerators (Nvidia H200, AMD MI300X) and a consumer GPU (Nvidia RTX 5090) revealed that consumer-grade hardware significantly outperforms AI accelerators in raw password cracking performance across multiple hashing algorithms (MD5, NTLM, bcrypt, SHA-256, SHA-512). The RTX 5090 achieved higher hash rates than both the H200 and MI300X in all tested algorithms, despite being an order of magnitude less expensive. Historical comparisons with older consumer GPUs (e.g., 2017 Nvidia GTX 1080 rigs) showed similar or superior cracking performance to current AI accelerators. The findings underscore that password cracking capability is not dependent on specialized or high-cost hardware, highlighting the importance of strong password policies and credential monitoring to mitigate brute-force and credential-stuffing risks.

Operational Disruption at Signature Healthcare Following Suspected Cybersecurity Incident

Updated: · First: 08.04.2026 15:31 · 📰 1 src / 1 articles

Signature Healthcare in Brockton, Massachusetts, has diverted ambulances due to a suspected cybersecurity incident causing significant operational disruptions. Brockton Hospital, a 200-bed community facility, and Signature Medical Group’s 15 locations remained partially operational, with emergency and walk-in services open but ambulance traffic redirected. The incident, detected on Monday, triggered down-time procedures to maintain patient care and safety. Chemotherapy infusion services were canceled, prescriptions could not be filled at retail pharmacies, and patients faced delays across medical group practices. The attackers’ motives and whether ransomware was involved remain unconfirmed.

Masjesu DDoS botnet campaign expands with multi-architecture payload targeting global IoT devices

Updated: · First: 08.04.2026 14:49 · 📰 1 src / 1 articles

The Masjesu DDoS botnet has been operationally active since at least 2023, infecting IoT devices worldwide to launch multi-vector DDoS attacks exceeding hundreds of gigabytes in volume. The botnet’s operator advertises services on Telegram, targeting both Chinese and English-speaking users, and maintains a multi-architecture malware payload capable of infecting devices running i386, MIPS, ARM, SPARC, PPC, 68K, and AMD64. Masjesu primarily spreads via vulnerabilities in D-Link, GPON, Huawei home gateways, MVPower DVRs, Netgear routers, and UPnP-enabled devices, with the highest concentration of infected devices observed in Vietnam, Brazil, India, Iran, Kenya, and Ukraine.

Claude Mythos uncovers thousands of zero-days across major systems via Project Glasswing

Updated: 08.04.2026 14:30 · First: 08.04.2026 12:16 · 📰 2 src / 2 articles

Anthropic’s frontier AI model, Claude Mythos Preview, has autonomously discovered and remediated thousands of high-severity zero-day vulnerabilities across major operating systems, web browsers, and software libraries through Project Glasswing, a consortium involving AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and Anthropic. The initiative leverages Mythos Preview’s advanced agentic coding and reasoning capabilities—developed without explicit cybersecurity training—to identify long-standing flaws such as a 27-year-old OpenBSD denial-of-service vulnerability and a 16-year-old FFmpeg flaw. Anthropic has reported and patched these vulnerabilities while committing $100 million in usage credits and $4 million in donations to support open-source security efforts. The project aims to safely deploy Mythos-class models at scale, though concerns persist about potential malicious exploitation by threat actors.

Gartner’s Identity Visibility and Intelligence Platforms framework introduced to address enterprise IAM visibility gaps exposing identity dark matter

Updated: · First: 08.04.2026 14:30 · 📰 1 src / 1 articles

Gartner has formally introduced the Identity Visibility and Intelligence Platform (IVIP) as a critical "System of Systems" within the Identity Fabric framework to address the growing attack surface caused by undetected identity activity across fragmented enterprise environments. Research from Orchid Security indicates that 46% of enterprise identity activity occurs outside centralized IAM visibility, creating significant blind spots in security posture. IVIP platforms are positioned at Layer 5 of the Identity Fabric, providing continuous discovery, unified telemetry, and AI-driven behavioral intelligence to convert identity dark matter—including local accounts, over-permissioned machine identities, and shadow IT—into actionable security oversight. The IVIP model emphasizes outcome-driven metrics, automated remediation, and AI agent governance to reduce identity-related risk and shrink the operational gap between documented policy and real-world access patterns.

APT28 DNS hijacking campaigns via compromised SOHO routers observed in 2025–2026 targeting credential theft

Updated: 08.04.2026 13:03 · First: 07.04.2026 18:30 · 📰 3 src / 3 articles

APT28 (GRU GTsSS Military Unit 26165) has conducted opportunistic DNS hijacking campaigns since at least August 2025 by compromising small office/home office (SOHO) routers—primarily TP-Link models such as WR841N—to redirect victim traffic through attacker-controlled DNS servers and steal credentials. The campaign peaked in December 2025, compromising over 18,000 networks, including 200 organizations and 5,000 consumer devices, and specifically targeted government agencies such as ministries of foreign affairs, law enforcement, and third-party email providers. TP-Link routers were likely exploited via CVE-2023-50224 to retrieve credentials, which were used in adversary-in-the-middle attacks against browser sessions and desktop applications to harvest credentials for web and email services. APT28 operates a persistent infrastructure of VPSs repurposed as malicious DNS servers, receiving DNS requests from exploited routers and enabling opportunistic triage to identify high-value targets. Microsoft reported this is the first time APT28 has used DNS hijacking at scale to support post-compromise adversary-in-the-middle (AiTM) attacks on TLS connections against Microsoft Outlook on the web domains, intercepting OAuth authentication tokens after successful MFA authentication without requiring additional malware on compromised routers. On April 7, 2026, US authorities dismantled APT28’s US-based DNS hijacking network as part of ‘Operation Masquerade,’ neutralizing compromised routers across 23 states. The operation, led by the FBI and authorized by a court, reset DNS settings on affected TP-Link routers to restore legitimate DNS resolvers from ISPs without impacting functionality or collecting user content. The FBI is working with ISPs to notify affected users and urges router owners to replace outdated devices, update firmware, and verify DNS settings to prevent further exploitation.

Server-side Bing update regression disrupts Windows 11 23H2 Start Menu search functionality

Updated: · First: 08.04.2026 10:00 · 📰 1 src / 1 articles

A server-side Bing update distributed by Microsoft on April 6, 2026, introduced a regression that broke the Start Menu search feature for a subset of Windows 11 23H2 users. Impacted systems exhibited blank search results that appeared functional but returned no data. Microsoft identified the root cause as a problematic server-side Bing update aimed at improving search performance and rolled back the change the same day. The fix is being gradually distributed to affected devices via Windows release health updates.

Unauthenticated remote code execution vulnerability in Ninja Forms File Uploads plugin exploited in the wild

Updated: · First: 08.04.2026 01:03 · 📰 1 src / 1 articles

A critical vulnerability in the Ninja Forms File Uploads premium WordPress add-on (CVE-2026-0740) is being actively exploited to achieve unauthenticated remote code execution. The flaw allows attackers to upload arbitrary files, including malicious PHP scripts, by bypassing file type validation and abusing path traversal due to lack of sanitization. With over 90,000 active installations and severe technical implications, exploitation can lead to full server compromise, web shell deployment, and site takeover. The issue affects Ninja Forms File Upload versions up to 3.3.26 and carries a CVSS score of 9.8, reflecting its high severity and immediate exploitability.

2025 U.S. cybercrime losses reach nearly $21bn with AI-enabled fraud, cryptocurrency scams, and critical infrastructure targeting highlighted

Updated: 07.04.2026 23:41 · First: 07.04.2026 15:00 · 📰 2 src / 2 articles

In 2025, U.S. cyber-enabled crime losses rose to nearly $21 billion, a 26% increase from 2024, with the FBI’s IC3 receiving over 1 million complaints. Cryptocurrency fraud dominated financial losses at over $11 billion across 181,565 cases, while phishing (191,000 cases) and investment scams (72,000) remained the most frequent complaint types. Americans over 60 were disproportionately affected, suffering $7.7 billion in losses—a 37% increase from the prior year. AI-enabled fraud, encompassing voice cloning, deepfakes, and synthetic profiles, accounted for $893 million in losses across 22,300 complaints. The FBI reported critical infrastructure sectors—including healthcare, manufacturing, financial services, information technology, and government facilities—as the most targeted. In response, the agency conducted 3,900 Financial Fraud Kill Chain interventions, freezing $679 million of $1.16 billion attempted thefts, and launched Operation Level Up to proactively alert 3,780 potential cryptocurrency investment fraud victims, 78% of whom were unaware of the scam.

Medusa ransomware campaigns by Storm-1175 exploit N-days and zero-days at rapid pace

Updated: · First: 07.04.2026 23:15 · 📰 1 src / 1 articles

Storm-1175, a financially motivated cybercrime group tracked by Microsoft Threat Intelligence, is conducting high-velocity Medusa ransomware campaigns that exploit both known vulnerabilities (N-days) and zero-days within days or even hours of disclosure. The group targets exposed perimeter assets in healthcare, education, professional services, and finance sectors across Australia, the United Kingdom, and the United States. Attack chains typically progress from initial exploitation to data exfiltration and Medusa deployment within 24 hours to a few days, outpacing organizational patching timelines and necessitating immediate patch prioritization upon release.

Indirect prompt injection in Grafana AI rendering enables silent data exfiltration

Updated: 07.04.2026 22:52 · First: 07.04.2026 17:00 · 📰 2 src / 2 articles

A novel attack chain dubbed GrafanaGhost exploits indirect prompt injection via Grafana's AI rendering components to silently extract sensitive enterprise data. The exploit is triggered when manipulated inputs—crafted via image tags, protocol-relative URLs, and the "INTENT" keyword—bypass domain validation and AI guardrails, enabling stealthy real-time transmission of financial metrics, infrastructure health data, and customer records. Grafana Labs has patched the vulnerability in its Markdown component’s image renderer, though the company disputes claims of zero-click operation, asserting exploitation required substantial user interaction and AI warnings.

Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting

Updated: 07.04.2026 21:02 · First: 30.06.2025 15:00 · 📰 18 src / 25 articles

Iranian state-sponsored and affiliated cyber threat actors have **formalized a cyber-kinetic war doctrine**, integrating digital reconnaissance with physical strikes following the February 28, 2026, joint US-Israel military operation (*Epic Fury*). New research confirms Iran’s systematic compromise of **Hikvision and Dahua IP cameras** across Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and Lebanon—exploiting **five patched but widely unpatched vulnerabilities** to enable **real-time battle damage assessment and missile-targeting support**. Check Point Research assesses this activity as a **predictive indicator of kinetic strikes**, mirroring tactics used during the June 2025 Israel-Iran conflict. **As of April 2026, Iranian APT actors have escalated direct targeting of U.S. critical infrastructure**, focusing on **Rockwell/Allen-Bradley PLCs** in Government Services, Water and Wastewater Systems, and Energy sectors. The joint FBI/CISA/NSA advisory warns of **financial losses, operational disruptions, and malicious manipulation of HMI/SCADA displays**, with confirmed extraction of PLC project files. This follows prior CyberAv3ngers (IRGC-linked) campaigns that compromised **75 Unitronics PLCs** in 2023–2024. In parallel, **pro-Iranian hacktivist group Handala wiped 80,000 devices** on U.S. medical giant Stryker’s network in March 2026, signaling a shift toward **destructive hybrid operations** blending state-backed and proxy activity. The campaign extends beyond surveillance: **pro-Iranian actors breached Jordan’s Silos and Supply General Company via phishing**, while IRGC-linked groups conducted **limited but targeted ICS/SCADA attacks** and **DDoS campaigns against UAE/Bahrain government entities**. CrowdStrike and Flashpoint warn of escalating hybrid tactics, including **propaganda operations, data center missile strikes, and hacktivist proxies** (e.g., Russian Legion) expanding targets to US-based critical infrastructure. **Pay2Key**, an Iranian-linked ransomware group active since 2020, has **re-emerged in March 2026 with enhanced evasion capabilities**, targeting a US healthcare provider in a three-hour encryption blitz that leveraged TeamViewer, credential harvesting (Mimikatz/LaZagne), and backup enumeration—raising concerns about its **strategic destruction motives** amid geopolitical tensions.

Active exploitation of maximum-severity code injection flaw in Flowise AI agent builder (CVE-2025-59528, CVSS 10.0)

Updated: 07.04.2026 20:02 · First: 07.04.2026 08:56 · 📰 2 src / 2 articles

Threat actors are actively exploiting CVE-2025-59528, a maximum-severity (CVSS 10.0) code injection vulnerability in Flowise, an open-source AI agent builder platform. The flaw allows unauthenticated remote code execution via the CustomMCP node, which parses user-supplied mcpServerConfig strings without sanitization, enabling execution of arbitrary JavaScript code with full Node.js runtime privileges. Successful exploitation grants attackers access to dangerous modules (e.g., child_process, fs), leading to full system compromise, arbitrary command execution, file system access, and sensitive data exfiltration. VulnCheck’s Canary network has detected early-stage exploitation of the flaw, originating from a single Starlink IP address. Between 12,000 and 15,000 Flowise instances remain exposed online, creating a significant and opportunistic attack surface for mass scanning and exploitation attempts. The vendor addressed the issue in versions 3.0.6 and later; users are advised to upgrade to at least 3.0.6 or the current 3.1.1.

GPUBreach attack leverages GDDR6 Rowhammer to escalate privileges and compromise systems via NVIDIA driver flaws

Updated: 07.04.2026 18:05 · First: 07.04.2026 00:44 · 📰 2 src / 2 articles

Researchers from the University of of Toronto demonstrated the GPUBreach attack, a new Rowhammer-based technique that corrupts GDDR6 GPU page tables to grant unprivileged CUDA kernels arbitrary read/write access to GPU memory. The vulnerability is chained with memory-safety flaws in the NVIDIA driver to escalate privileges from an unprivileged context to full system compromise—including root shell access—without disabling IOMMU or relying on prior GPU Rowhammer research. The attack bypasses IOMMU protection by corrupting trusted driver state via GPU-controlled memory, making it effective even on systems with hardware memory isolation enabled. Demonstrated on NVIDIA RTX A6000 GPUs with GDDR6 memory, the technique enables cross-process data exposure, cryptographic key leakage, manipulation of ML processes (reducing accuracy from 80% to 0%), and extraction of sensitive data such as LLM weights. While ECC mitigation exists, it may fail to detect multiple bit-flips, leaving systems exposed. The research is scheduled for presentation at the 47th IEEE Symposium on Security & Privacy in 2026 and follows NVIDIA’s November 2025 notification of related risks.

RSAC 2026 highlights accelerated AI-driven transformation of cybersecurity operations

Updated: · First: 07.04.2026 17:57 · 📰 1 src / 1 articles

At RSAC 2026, industry leaders emphasized the unprecedented speed of AI integration into cybersecurity workflows, reshaping defensive and offensive capabilities faster than anticipated. Organizations are now predominantly in reactive mode, with threat actors leveraging AI more effectively than defenders' adoption rates. The event also highlighted persistent challenges in authentication and software vulnerabilities, underscoring the need for historical lessons in addressing modern threats. Informa TechTarget’s cybersecurity portfolio brands (Dark Reading, Cybersecurity Dive, TechTarget SearchSecurity) demonstrated a coordinated "360-degree" coverage strategy to address the fragmented yet interconnected needs of CISOs, SOC managers, and risk professionals. Analysts noted the industry’s 20-year evolution from fewer than a dozen vendors to over 4,000, with threats escalating from rudimentary social engineering to ransomware capable of disrupting critical infrastructure. Quantum computing was framed as a future concern rather than an immediate crisis, with experts describing it as a manageable evolution rather than a disruptive inflection point.

Structural limitations of automated penetration testing tools leading to coverage gaps in enterprise validation

Updated: · First: 07.04.2026 17:01 · 📰 1 src / 1 articles

Automated penetration testing tools often deliver initial high-value findings but degrade into reporting stale, repetitive issues by the fourth or fifth execution, revealing a structural limitation known as the Proof-of-Concept (PoC) Cliff. This pattern stems from the deterministic, chained nature of automated tools, which exhaust exploitable paths within their fixed scope and fail to validate security controls such as firewalls, EDR, WAF, or SIEM in real adversary scenarios. As a result, organizations experience a widening Validation Gap where reported findings do not reflect actual control effectiveness, leaving critical attack surfaces unassessed and creating false confidence in security posture.

ComfyUI cryptomining botnet campaign leverages exposed instances via custom nodes and ComfyUI-Manager for RCE

Updated: · First: 07.04.2026 15:46 · 📰 1 src / 1 articles

An opportunistic cryptomining and proxy botnet campaign is actively recruiting over 1,000 internet-exposed ComfyUI instances—an open-source Stable Diffusion platform—via remote code execution (RCE) exploits against unauthenticated deployments and ComfyUI-Manager installations. The attack chain begins with a Python-based scanner that enumerates cloud IP ranges for vulnerable ComfyUI instances, identifying those with custom node families that accept raw Python code execution or ComfyUI-Manager installations. Successful exploitation installs malware that mines Monero and Conflux, and adds compromised hosts to the Hysteria V2 botnet, all managed through a Flask-based C2 dashboard. The operation includes sophisticated persistence mechanisms, competitor botnet sabotage, and evidence-clearing techniques, indicating a technically competent yet opportunistic actor targeting widely deployed AI inference services for financial gain.

Storm-1175 ransomware operations leveraging n-day and zero-day exploits in Medusa campaigns

Updated: · First: 07.04.2026 13:02 · 📰 1 src / 1 articles

Storm-1175, a financially motivated cybercrime group, has conducted high-tempo Medusa ransomware attacks over the past three years by exploiting both n-day and zero-day vulnerabilities during the patch gap between disclosure and remediation. The actor primarily targets exposed perimeter assets, achieving initial access via web shells or remote access payloads and deploying ransomware within one to six days. Victims include healthcare, education, professional services, and finance sectors across Australia, the UK, and the US. Since 2023, Storm-1175 has weaponized at least 16 vulnerabilities, including the zero-day CVE-2025-10035 in GoAnywhere Managed File Transfer, exploited one week prior to public disclosure.

Critical Fortinet Vulnerabilities: FortiCloud SSO Bypass and FortiClientEMS SQLi Patched

Updated: 07.04.2026 12:26 · First: 09.12.2025 20:36 · 📰 18 src / 49 articles

Fortinet has released **emergency patches** for **CVE-2026-35616**, a critical **pre-authentication API access bypass** in FortiClient EMS 7.4.5/7.4.6, enabling unauthenticated attackers to execute arbitrary code via crafted requests. The flaw, described by Defused as a **zero-day vulnerability**, has been **actively exploited in the wild** since at least late March 2026, prompting CISA to add it to its **Known Exploited Vulnerabilities (KEV) catalog** on April 6, 2026, with a patching deadline of **April 9, 2026**, for U.S. federal agencies. Federal and private-sector organizations are urged to apply hotfixes immediately or upgrade to **FortiClientEMS 7.4.7** upon release. This follows the **active exploitation of CVE-2026-21643**, a critical SQL injection (CVSS 9.8) in FortiClientEMS, also under attack since late March. Nearly **1,000–2,000 FortiClient EMS instances** remain exposed online, primarily in the U.S. and Europe, with Shadowserver tracking ongoing scans. Fortinet warns that compromising EMS infrastructure allows attackers to **push malicious updates to endpoints**, escalating risks of ransomware, espionage, or destructive attacks. Earlier in 2026, Fortinet addressed **CVE-2026-24858**, a critical FortiCloud SSO authentication bypass (CVSS 9.4) exploited to hijack admin accounts and exfiltrate configurations from **over 25,000 exposed devices**. CISA mandated patches for federal agencies by **January 30, 2026**, while Fortinet temporarily disabled FortiCloud SSO to mitigate zero-day attacks. Organizations are advised to **disable FortiCloud SSO until patches are applied**, restrict management interface access, and treat compromised systems as fully breached—requiring credential rotation and configuration restoration.

Identification of key leadership behind GandCrab and REvil ransomware operations by German authorities

Updated: 07.04.2026 02:54 · First: 07.04.2026 02:54 · 📰 2 src / 2 articles

German Federal Police (BKA) announced the identification of two Russian nationals, Daniil Maksimovich Shchukin (31) and Anatoly Sergeevitsch Kravchuk (43), as the leaders of the GandCrab and REvil ransomware operations spanning from at least early 2019 to July 2021. The duo, with Shchukin operating under aliases UNKN/UNKNOWN on cybercrime forums, is linked to at least 130 extortion cases targeting German companies, including 25 victims who paid $2.2 million in ransoms, while total financial damage exceeded $40 million. Authorities believe both individuals are now in Russia and have requested public assistance, including entries on the EU’s Most Wanted portal. BKA has released images of the suspects to aid tracking efforts. The operations under Shchukin and Kravchuk followed the GandCrab model, which launched in early 2018 and reportedly earned $2 billion in ransom payments before its leader retired in June 2019. REvil, emerging afterward, adopted GandCrab’s affiliate structure, public leak sites, and data auctions, targeting high-profile victims such as Texas local governments, Acer, and the Kaseya supply-chain compromise affecting approximately 1,500 downstream victims. Following the Kaseya attack, REvil took a two-month operational break during which law enforcement infiltrated their infrastructure, leading to disruptions. In January 2022, Russian authorities arrested over a dozen REvil members, who were released in 2025 after serving time for carding-related charges.

AI-enabled supply chain campaign abuses GitHub Actions pull_request_target triggers

Updated: · First: 07.04.2026 00:38 · 📰 1 src / 1 articles

A threat actor leveraged AI-assisted automation to orchestrate a large-scale supply chain attack against open source repositories on GitHub by exploiting the pull_request_target workflow trigger in GitHub Actions. The campaign, codenamed prt-scan, began on March 11 and spanned six waves executed via six coordinated GitHub accounts, resulting in at least two compromised NPM packages out of over 450 exploitation attempts. The actor primarily targeted repositories with the pull_request_target trigger, which automatically runs workflows in the main repository when a pull request is submitted from an untrusted fork, granting workflows full repository permissions and access to secrets. Successful intrusions predominantly exposed ephemeral GitHub credentials for workflows, though broader implications highlight the facilitation of low-sophistication attackers to scale supply chain attacks rapidly.

Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency

Updated: 06.04.2026 23:55 · First: 01.04.2026 12:00 · 📰 2 src / 2 articles

A financially motivated North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman through a two-week social engineering campaign involving cloned personas, fake Slack workspaces, and deceptive Microsoft Teams meetings. The attackers published malicious axios versions v1.14.1 and v0.30.4 containing plain-crypto-js as a dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack was part of an industrialized social engineering campaign targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building, matured attacker tooling, and convincing delivery mechanisms. The blast radius of compromised packages like axios—downloaded over 100 million times weekly—amplifies the impact, with similar campaigns observed against cryptocurrency founders, venture capital executives, and other developers. Malicious packages were swiftly removed, but the incident underscores the evolving threat model where traditional social engineering now scales through supply chain compromises.

BlueHammer Windows local privilege escalation zero-day exploit leaked

Updated: · First: 06.04.2026 22:19 · 📰 1 src / 1 articles

Exploit code for an unpatched Windows privilege escalation vulnerability, tracked as BlueHammer, has been publicly released by a disgruntled security researcher. The flaw enables local attackers to escalate privileges to SYSTEM or elevated administrator levels, allowing full system compromise. Microsoft has not issued a patch, classifying the issue as a zero-day. The exploit combines a TOCTOU (time-of-check to time-of-use) and path confusion, granting access to the Security Account Manager (SAM) database to extract local account password hashes. The leak follows frustration with Microsoft’s Security Response Center (MSRC) over disclosure handling, with the researcher citing insufficient response as the trigger for public disclosure. The PoC code contains reliability issues, particularly on Windows Server platforms.

Microsoft Investigates Multiple Issues in Classic Outlook

Updated: 06.04.2026 22:19 · First: 23.02.2026 21:40 · 📰 4 src / 5 articles

Microsoft has resolved a bug causing email delivery issues for some Classic Outlook users sending via Outlook.com, which previously prevented messages from reaching intended recipients and triggered 0x80070005-0x0004dc-0x000524 non-delivery reports. The issue primarily affected users with Outlook profiles linked to Exchange accounts or those with Exchange Online mail contacts sharing SMTP addresses. Microsoft deployed a server-side fix on April 3, 2026, though some users may still encounter temporary issues until OAuth tokens expire. Earlier investigations revealed that Microsoft was addressing multiple problems in classic Outlook, including mouse pointer disappearance that also impacted OneNote and other Microsoft 365 apps, synchronization and connection issues with Gmail and Yahoo accounts, and "Can't connect to the server" errors when creating groups with EWS enabled. Temporary workarounds were provided for these issues while Microsoft worked on permanent fixes.

Microsoft Support and Recovery Assistant utility deprecated in Windows updates

Updated: · First: 06.04.2026 20:45 · 📰 1 src / 1 articles

Microsoft has deprecated and removed the Support and Recovery Assistant (SaRA) command-line utility from all supported Windows versions starting March 10, 2026. The tool, which automated diagnostic tests for Office, Microsoft 365, Outlook, and Windows systems, has been superseded by the Get Help command-line tool, which offers similar capabilities with enhanced security infrastructure. The deprecation affects Windows 7 through Windows 11 systems and requires IT administrators to migrate from SaRA to the recommended GetHelpCmd.exe tool for endpoint troubleshooting. The transition is positioned as a security hardening measure to protect enterprise environments.

Storm-1175 Medusa ransomware affiliate exploits n-days and zero-days in rapid, multi-vector intrusions

Updated: · First: 06.04.2026 19:56 · 📰 1 src / 1 articles

Storm-1175, a China-based cybercriminal affiliate deploying Medusa ransomware, has escalated attacks by weaponizing n-day and zero-day vulnerabilities in rapid succession, often within days or even hours of discovery. The group targets exposed perimeter assets across multiple sectors—including healthcare, education, professional services, and finance—in Australia, the United Kingdom, and the United States. Exploitation chains involve initial access via chained vulnerabilities, followed by credential theft, persistence mechanisms such as new user account creation, deployment of remote monitoring tools, and security software disablement, culminating in Medusa ransomware deployment.

Drift Protocol administrative takeover and $285 million loss via Security Council manipulation on Solana

Updated: 06.04.2026 19:35 · First: 02.04.2026 22:03 · 📰 3 src / 3 articles

Drift Protocol’s April 1, 2026, $285 million loss was the culmination of a six-month in-person social engineering campaign, where North Korea-linked threat actors (UNC4736, a.k.a. AppleJeus/Labyrinth Chollima) infiltrated the ecosystem by posing as a quantitative trading firm at crypto conferences. The attackers compromised contributors via malicious code repositories (exploiting VSCode/Cursor vulnerabilities) and fraudulent TestFlight wallet applications, enabling them to hijack Security Council multisig controls. Post-takeover, they deployed the CarbonVote Token as collateral, removed withdrawal limits, and drained funds across deposits and trading accounts within minutes. Drift has frozen all protocol functions, flagged attacker wallets globally, and is collaborating with intelligence firms (Elliptic, TRM Labs) and law enforcement to trace and recover stolen assets. On-chain analysis confirms North Korean involvement, aligning with prior state-sponsored campaigns targeting crypto infrastructure.

Metro4Shell RCE Flaw Exploited in React Native CLI npm Package

Updated: 06.04.2026 18:31 · First: 03.02.2026 16:00 · 📰 2 src / 2 articles

Threat actors are actively exploiting a critical remote code execution (RCE) flaw (CVE-2025-11953, CVSS 9.8) in the Metro Development Server within the @react-native-community/cli npm package, enabling unauthenticated OS command execution. Exploits deliver a PowerShell script that disables Microsoft Defender exclusions and downloads a Rust-based binary with anti-analysis features from an attacker-controlled host. The attacks, first observed on December 21, 2025, originate from multiple IP addresses and indicate operational use rather than experimental probing. A separate campaign is exploiting React2Shell (CVE-2025-55182), a pre-authentication RCE flaw in React Server Components (RSCs) affecting Next.js applications, for large-scale credential theft. This campaign, attributed to UAT-10608, uses the NEXUS Listener automated tool to harvest credentials, SSH keys, cloud tokens, and environment secrets from at least 766 compromised hosts across multiple industries and regions. Attackers leverage automated scanning to identify vulnerable deployments and deploy NEXUS Listener for post-exploitation data collection and further malicious activity.

Credential exposure risk amplified by infostealer campaigns necessitates continuous dark web monitoring beyond MFA and EDR

Updated: · First: 06.04.2026 17:02 · 📰 1 src / 1 articles

Organizations relying on periodic breach checks, MFA, and EDR remain vulnerable to credential theft via infostealers. Stolen credentials, including session tokens and cookies, bypass authentication controls and enable rapid enterprise network access. In 2025, 4.17 billion compromised credentials were observed, with infostealers like LummaC2, Rhadamanthys, and Atomic macOS Stealer (AMOS) evading legacy defenses. Credential-related breaches now average $4.81–4.88 million per incident, underscoring the need for continuous, forensic-grade monitoring and automated response.