CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 20:30 05/03/2026 UTC
  • VMware Aria Operations RCE Flaw Exploited in Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability, CVE-2026-22719, to its Known Exploited Vulnerabilities catalog, indicating it is being exploited in attacks. The flaw, patched on February 24, 2026, allows unauthenticated attackers to execute arbitrary commands on vulnerable systems. Federal agencies must address the issue by March 24, 2026. The vulnerability impacts VMware Cloud Foundation and VMware vSphere Foundation 9.x.x.x (fixed in version 9.0.2.0) and VMware Aria Operations 8.x (fixed in version 8.18.6). Broadcom has acknowledged reports of exploitation but cannot confirm them independently. A temporary workaround script, 'aria-ops-rce-workaround.sh,' is available for organizations unable to apply patches immediately. Read
  • Tycoon2FA Phishing-as-a-Service Takedown A global operation led by Microsoft and Europol, supported by multiple industry partners, seized infrastructure linked to the Tycoon2FA phishing-as-a-service (PhaaS) operation. Tycoon2FA offered subscription-based services that intercepted live authentication sessions, bypassing multi-factor authentication (MFA) and enabling large-scale attacks on corporate inboxes. The operation resulted in the seizure of over 300 domains associated with Tycoon2FA, which had around 2000 users and used more than 24,000 domains since its launch in August 2023. The primary operator, identified as using the online identities 'SaaadFridi' and 'Mr_Xaad,' remains at large. Tycoon2FA was generating tens of millions of phishing emails each month by mid-2025, reaching more than 60% of all blocked phishing attempts. The platform was sold through Telegram for $120 for 10 days of access or $350 for a month of access to a web-based administration panel, lowering the barrier for low-skilled criminals to launch sophisticated, MFA-bypassing attacks at scale. The platform was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally. Read
  • Ransomware attack disrupts University of Mississippi Medical Center operations The University of Mississippi Medical Center (UMMC) has resumed normal operations nine days after a ransomware attack disrupted IT systems and blocked access to electronic medical records. All clinics statewide have reopened, and UMMC is working to reschedule missed appointments. The attack led to the cancellation of outpatient procedures, ambulatory surgeries, and imaging appointments, but hospital operations continued using downtime procedures. UMMC is investigating with assistance from CISA, the FBI, and the Department of Homeland Security. The attackers have communicated with UMMC, but no ransomware group has claimed responsibility. UMMC operates seven hospitals, 35 clinics, and over 200 telehealth sites statewide, including the state's only organ and bone marrow transplant program, the only children's hospital, the only Level I trauma center, and one of two Telehealth Centers of Excellence in the United States. Read
  • Phobos Ransomware Suspect Arrested in Poland Polish authorities have arrested a 47-year-old man suspected of ties to the Phobos ransomware group. The arrest is part of "Operation Aether," a broader international effort coordinated by Europol. The suspect was found with stolen credentials, credit card numbers, and server access data, which could facilitate ransomware attacks. The suspect faces charges under Article 269b of Poland's Criminal Code, with a maximum prison sentence of five years if found guilty. Operation Aether has targeted Phobos-linked individuals at multiple levels, including backend infrastructure operators and affiliates involved in network intrusions and data encryption. The operation has led to the extradition of a key Phobos administrator to the United States and the seizure of 27 servers in Thailand. A Russian national, Evgenii Ptitsyn, pleaded guilty to a wire fraud conspiracy charge related to his role in administering the Phobos ransomware operation. Ptitsyn was extradited from South Korea in November 2024 and is facing up to 20 years in prison. The Phobos ransomware gang has collected over $39 million from more than 1,000 victims worldwide. Read
  • Microsoft October 2025 Updates Disable USB Input in Windows Recovery Environment Microsoft's October 2025 security updates (KB5066835) initially disabled USB mice and keyboards in the Windows Recovery Environment (WinRE), affecting both client (Windows 11 24H2 and 25H2) and server (Windows Server 2025) platforms. This issue made WinRE unusable for troubleshooting or repairing the OS, prompting users to switch to Bluetooth or PS/2 input devices as a workaround. Microsoft has since released an emergency update (KB5070773) to resolve the issue, which started rolling out on October 21, 2025. This update restores USB functionality in WinRE, allowing users to navigate recovery options. Affected customers can also use touchscreen, PS/2 devices, or USB recovery drives as workarounds. OEMs and enterprises can use PXE in Configuration Manager to install the update, while IT administrators can deploy push-button reset features using Windows ADK and WinPE add-on. Additionally, Microsoft confirmed in February 2026 that the October 2025 KB5068164 update for Windows 10 also broke WinRE. A new update (KB5075039) was released to fix this issue, requiring the WinRE partition to be at least 256MB in size. Read
  • FBI Seizes RAMP Cybercrime Forum The FBI has seized the RAMP cybercrime forum, a platform known for facilitating ransomware operations and other cybercriminal activities. The seizure includes both the forum's Tor site and its clearnet domain, ramp4u[.]io, which now display a seizure notice. The forum was a hub for ransomware gangs to advertise their operations and recruit affiliates. The seizure provides law enforcement with access to a significant amount of data tied to the forum's users, including email addresses, IP addresses, and private messages. This could lead to the identification and potential arrest of threat actors who failed to follow proper operational security (opsec). RAMP was created in 2021 by individuals linked to the now-defunct Babuk ransomware group and was administered by key operators such as Mikhail Matveev (also known as Orange, Wazawaka, and BorisElcin) and Stallman. The forum was a prime hub for various ransomware groups, including LockBit, ALPHV/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant, and RansomHub. Following the seizure, Stallman confirmed there were no plans to rebuild the forum, indicating a significant disruption to the cybercriminal ecosystem. Additionally, the FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals to buy and sell hacking tools and stolen data. The forum had over 142,000 members and more than 215,000 messages between members as of December 2025. The seizure is part of an international joint operation coordinated by Europol, known as 'Operation Leak,' involving law enforcement agencies in 14 countries. The operation included the shutdown of LeakBase's domains, posting seizure banners, and warning members of the seizure. Law enforcement executed search warrants, made arrests, and conducted interviews in multiple countries. The seizure banner notes that the forum's database and all its contents, including IP logs and private messages, will be used for evidentiary purposes in future investigations. The domain nameservers have been switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov. The operation involved around 100 enforcement actions worldwide, including measures against 37 of the most active users of the platforms. LeakBase was active since 2021 and had over 142,000 members, offering access to databases, a market for selling leaks, exploits, and other cybercrime services, and an escrow payment system. Read
  • Critical Zero-Click RCE Vulnerability in FreeScout Helpdesk Platform A critical zero-click remote code execution (RCE) vulnerability (CVE-2026-28289) in FreeScout helpdesk platform allows attackers to hijack mail servers by sending a crafted email. The flaw bypasses a previous fix for another RCE issue (CVE-2026-27636) and enables unauthenticated command execution on the server. FreeScout versions up to 1.8.206 are affected, and immediate patching to version 1.8.207 is recommended. The vulnerability leverages a zero-width space (Unicode U+200B) to bypass security checks, allowing malicious file uploads and subsequent exploitation. Over 1,100 publicly exposed FreeScout instances are at risk, with potential impacts including full server compromise, data breaches, and lateral movement. Ox Security discovered a patch bypass that allowed reproduction of the same RCE on newly updated servers and escalated the attack chain to a zero-click RCE. The PHP-based Laravel framework, on which FreeScout is based, has over 83,000 GitHub stars and around 13,000 publicly exposed servers. Read
Last updated: 16:00 05/03/2026 UTC
  • Visibility Gaps in Patch Management and Vulnerability Remediation Organizations face significant challenges in patch management due to visibility gaps and lack of centralized control, particularly with third-party software. These gaps lead to unpatched vulnerabilities, compliance drift, and increased risk exposure. Modern solutions like Action1 aim to streamline detection, prioritization, and oversight of patch management processes, including third-party applications. Effective vulnerability management requires knowing what needs attention, acting quickly with proper tools, and confirming success. Centralized visibility and control are crucial for maintaining shorter remediation timelines, reducing repeat vulnerabilities, and demonstrating stronger audit readiness. Action1 offers a cloud-native platform that connects all endpoints, identifies missing updates, and provides granular control over patch deployment. It incorporates intelligence for prioritization and ensures visibility and accountability through detailed reporting and compliance dashboards. Read
  • U.S. sanctions cyber scam operations in Southeast Asia The U.S. Department of the Treasury has sanctioned several large cyber scam networks in Southeast Asia, primarily in Burma and Cambodia. These operations, which used forced labor and human trafficking, stole over $10 billion from Americans in 2024, a 66% increase from the previous year. The scams included romance baiting and fake cryptocurrency investments. The sanctions target individuals and entities linked to the Karen National Army (KNA) and various organized crime networks. The U.S. has established a new task force, the Scam Center Strike Force, to disrupt Chinese cryptocurrency scam networks. This task force, supported by the U.S. Attorney's Office, the Department of Justice, the FBI, and the Secret Service, has already seized over $401 million in cryptocurrency and filed forfeiture proceedings for an additional $80 million in stolen funds. The Treasury Department’s Office of Foreign Assets Control has imposed additional sanctions on the Democratic Karen Benevolent Army (DKBA) and related entities. In a recent development, the U.S. Department of Justice (DoJ) seized $61 million worth of Tether linked to pig butchering crypto scams. The confiscated funds were traced to cryptocurrency addresses used for laundering proceeds from cryptocurrency investment scams. Threat actors target individuals by cultivating romantic relationships on dating and social media messaging apps, coercing victims into investing in fraudulent platforms that display fake high returns. Scammers route stolen money through multiple wallets to hide its nature and source. Tether has frozen around $4.2 billion in assets linked to illicit activity, including $250 million related to scam networks since June 2025. Read
  • Trend Micro Apex One Management Console 0-Day Exploited Trend Micro has disclosed and patched two critical vulnerabilities, CVE-2025-71210 and CVE-2025-71211, in its on-premise Apex One Management Console. These vulnerabilities allow for remote code execution (RCE) on vulnerable Windows systems. Trend Micro has released Critical Patch Build 14136 to address these vulnerabilities, which also fixes two high-severity privilege escalation flaws in the Windows agent and four more affecting the macOS agent. The vulnerabilities are due to path traversal weaknesses in the management console and require attackers to have access to it. Previously, Trend Micro disclosed two other critical vulnerabilities, CVE-2025-54948 and CVE-2025-54987, which were actively exploited in the wild. These vulnerabilities allowed for command injection and remote code execution. Trend Micro has released temporary mitigations and is urging users to apply them immediately to protect against potential attacks. Read
  • Texas Sues TV Manufacturers for Alleged Unauthorized Data Collection via ACR Technology Texas Attorney General Ken Paxton has filed lawsuits against Sony, Samsung, LG, Hisense, and TCL Technology Group Corporation for allegedly using Automated Content Recognition (ACR) technology to secretly capture screenshots of users' viewing activity every 500 milliseconds and sell the data without consent. The suits highlight concerns about data access by Chinese companies under China's National Security Law. A Texas court initially issued a temporary restraining order (TRO) against Samsung, prohibiting the company from collecting audio and visual data from Texas consumers' smart TVs. However, the court vacated the TRO the following day, allowing Samsung to continue its data collection practices. The TRO, which was set to extend until January 19, followed allegations that Samsung's ACR enrollment practices are deceptive and violate the Texas Deceptive Trade Practices Act (DTPA). The court also noted that users are pressured into consenting to data collection through dark patterns, making it difficult to fully opt out. The lawsuits allege that the collected data is sold to third parties for ad targeting, violating users' privacy rights. This follows a similar 2017 case against Vizio, which settled for $2.2 million for similar practices. Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs. As part of the agreement, Samsung will revise its privacy disclosures to clearly explain its data collection and processing practices to consumers. Samsung must halt any collection or processing of ACR viewing data without obtaining Texas consumers’ express consent and update its smart TVs to implement clear and conspicuous disclosures and consent screens. Read
  • Starkiller Phishing Kit Bypasses MFA via Proxy-Based Attacks A new phishing kit called Starkiller has emerged, allowing attackers to bypass multi-factor authentication (MFA) by proxying legitimate login pages. The kit is distributed as a subscription-based service on the dark web, offering real-time session monitoring and keylogging capabilities. It mimics login pages of major services like Google, Microsoft, and banks, routing traffic through attacker-controlled infrastructure to steal credentials and authentication tokens. Starkiller uses Docker containers running headless Chrome instances to serve genuine page content, making it difficult for security vendors to detect or block. The toolkit is sold with updates and customer support, posing a significant escalation in phishing infrastructure. The service is part of a broader cybercrime offering by a threat group called Jinkusu, which provides additional features such as email harvesting and campaign analytics. Starkiller integrates URL shorteners such as TinyURL to obscure the destination URL. It uses a headless Chrome instance inside a Docker container to act as a reverse proxy between the target and the legitimate site. The platform centralizes infrastructure management, phishing page deployment, and session monitoring within a single control panel, combining URL masking, session hijacking, and MFA bypass to streamline phishing operations. Read
  • ScarCruft (APT37) Expands Tactics with Ruby Jumper Campaign Targeting Air-Gapped Networks The ScarCruft (APT37) Ruby Jumper campaign, first discovered in December 2025 and detailed in February 2026, marks a significant expansion of tactics to breach air-gapped networks and abuse legitimate cloud services for command-and-control (C2). The campaign deploys a multi-stage infection chain beginning with a malicious LNK file that drops a decoy document (e.g., an Arabic translation of a North Korean article on the Palestine-Israel conflict), an executable payload (RESTLEAF), a PowerShell script, and a batch file. RESTLEAF leverages Zoho WorkDrive for C2—the first known instance of ScarCruft using this service—to fetch shellcode, which then deploys SNAKEDROPPER. This implant installs a Ruby runtime, establishes persistence via a scheduled task (`rubyupdatecheck`) that replaces the RubyGems default file `operating_system.rb`, and drops THUMBSBD and VIRUSTASK, both designed to weaponize removable media (USB drives) for lateral movement into air-gapped systems. THUMBSBD supports keylogging, audio/video surveillance, and file exfiltration, while also creating hidden directories on USB drives to stage operator commands or store execution output. VIRUSTASK focuses on initial access propagation via USB drives, replacing legitimate files with malicious shortcuts that execute the Ruby interpreter when opened. The campaign also delivers FOOTWINE, a reconnaissance tool disguised as an APK file that harvests documents and monitors removable drive activity, and BLUELIGHT, a backdoor that adapts its C2 mode based on network connectivity (direct cloud communication or USB-based staging). This follows earlier ScarCruft operations, including ransomware attacks (July 2025), Operation HanKook Phantom (September 2025), and the Contagious Interview campaign (February 2026), which targeted developers via malicious repositories and job-themed lures. The Ruby Jumper campaign underscores ScarCruft’s expanded focus on air-gapped infiltration, combining cloud abuse with physical media exploitation to evade network isolation and achieve persistent surveillance with minimal forensic traces. Zscaler ThreatLabz confirmed the use of six distinct tools in this campaign, five of which were previously undocumented. Read
  • Ransomware attack disrupts University of Mississippi Medical Center operations The University of Mississippi Medical Center (UMMC) has resumed normal operations nine days after a ransomware attack disrupted IT systems and blocked access to electronic medical records. All clinics statewide have reopened, and UMMC is working to reschedule missed appointments. The attack led to the cancellation of outpatient procedures, ambulatory surgeries, and imaging appointments, but hospital operations continued using downtime procedures. UMMC is investigating with assistance from CISA, the FBI, and the Department of Homeland Security. The attackers have communicated with UMMC, but no ransomware group has claimed responsibility. UMMC operates seven hospitals, 35 clinics, and over 200 telehealth sites statewide, including the state's only organ and bone marrow transplant program, the only children's hospital, the only Level I trauma center, and one of two Telehealth Centers of Excellence in the United States. Read

Latest updates

Browse →

Self-propagating JavaScript worm targets Wikimedia projects

Updated: · First: 05.03.2026 22:42 · 📰 1 src / 1 articles

A self-propagating JavaScript worm exploited a malicious script on Russian Wikipedia, spreading across multiple Wikimedia projects and vandalizing pages. The worm modified user scripts and global JavaScript files, affecting approximately 3,996 pages and 85 user accounts. Wikimedia temporarily restricted editing to contain the attack and revert changes. The incident began when a Wikimedia employee account executed a dormant script, which then propagated through user sessions and global scripts. The worm's persistence mechanisms included modifying user-level and site-wide JavaScript files, allowing it to spread automatically. The injected code also edited random pages to insert hidden JavaScript loaders. Wikimedia has not yet released a detailed post-incident report.

Critical Vulnerability in WordPress User Registration & Membership Plugin Exploited

Updated: · First: 05.03.2026 20:44 · 📰 1 src / 1 articles

A critical vulnerability (CVE-2026-1492) in the WordPress User Registration & Membership plugin, installed on over 60,000 sites, allows attackers to create admin accounts without authentication. This flaw, rated 9.8 in severity, enables full site control, data theft, and malware distribution. The developer has released a patch in version 5.1.3, with the latest version being 5.1.4. Hackers have already attempted to exploit this vulnerability in over 200 attacks in the past 24 hours. Website administrators are urged to update the plugin immediately or disable it if updating is not possible.

U.S. Marshals Service Contractor's Son Arrested for $46M Crypto Theft

Updated: · First: 05.03.2026 20:36 · 📰 1 src / 1 articles

John Daghita, son of a U.S. government contractor and president of Command Services & Support (CMDSS), was arrested on Saint Martin for allegedly stealing $46 million in cryptocurrency from the U.S. Marshals Service (USMS). The arrest followed a joint operation by the FBI and France's Groupe d'Intervention de la Gendarmerie Nationale. Daghita, known online as "Lick," was linked to the theft through blockchain analysis by investigator ZachXBT, who traced funds to wallets associated with Daghita. The stolen funds included assets tied to the 2016 Bitfinex hack. Daghita was reportedly taunting ZachXBT via Telegram, even sending small amounts of stolen funds to the investigator's public wallet address in a "dust attack." Law enforcement seized multiple hard drives, security keys, and an undisclosed amount of U.S. dollars during the arrest.

Rise in AI-Driven Insider Threats Classified as Critical Business Risk

Updated: · First: 05.03.2026 18:00 · 📰 1 src / 1 articles

Mimecast's State of Human Risk Report 2026 highlights a significant increase in insider threats, driven by AI misuse and employee negligence. The report identifies both malicious insiders and negligent employees as critical risks, with 42% of organizations reporting an uptick in such threats. AI tools are being exploited to enhance phishing attacks and facilitate data exfiltration, making insider risk a growing concern for cybersecurity leaders.

Critical Authentication Bypass in Cisco Catalyst SD-WAN Exploited Since 2023

Updated: 05.03.2026 17:22 · First: 25.02.2026 20:01 · 📰 5 src / 6 articles

A critical authentication bypass vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN has been actively exploited in zero-day attacks since at least 2023. The flaw allows remote attackers to compromise controllers and add malicious rogue peers to targeted networks. The vulnerability stems from a peering authentication mechanism that does not work properly, enabling attackers to log in as high-privileged users and manipulate network configurations. Cisco has released specific software updates to address the issue, and CISA has issued an emergency directive requiring federal agencies to patch affected systems by February 27, 2026. Attackers have been found to leverage the built-in update mechanism to stage a software version downgrade and escalate to the root user by exploiting CVE-2022-20775, and have taken steps to clear evidence of the intrusion by purging logs and command history. Additionally, Cisco has flagged two more Catalyst SD-WAN Manager security flaws (CVE-2026-20128 and CVE-2026-20122) as actively exploited in the wild, urging administrators to upgrade vulnerable devices. CVE-2026-20128 is an information disclosure issue affecting the Data Collection Agent (DCA) feature, allowing an authenticated, local attacker to gain DCA user privileges. CVE-2026-20122 is an arbitrary file overwrite bug affecting the API, allowing a remote, authenticated attacker to overwrite arbitrary files and gain elevated privileges. Cisco Talos has linked the attacks exploiting CVE-2026-20127 to UAT-8616, a highly sophisticated threat actor active since at least 2023. Cisco has also released updates to address two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software: CVE-2026-20079 and CVE-2026-20131.

Increase in Zero-Day Exploits in 2025

Updated: · First: 05.03.2026 17:03 · 📰 1 src / 1 articles

Google Threat Intelligence Group (GTIG) reported tracking 90 zero-day vulnerabilities exploited in 2025, a 15% increase from 2024. Nearly half targeted enterprise software and appliances. Memory safety issues accounted for 35% of these exploits. Commercial spyware vendors were the largest users of zero-days, surpassing state-sponsored groups. China-linked espionage groups remained the most active among state actors, while financially motivated actors also increased their use of zero-days. The most targeted enterprise systems included security appliances, networking infrastructure, VPNs, and virtualization platforms. Google recommends reducing attack surfaces, continuous monitoring, and rapid patching to mitigate risks.

2026 Browser Security Report Highlights Enterprise Blind Spots

Updated: · First: 05.03.2026 17:01 · 📰 1 src / 1 articles

The 2026 State of Browser Security Report reveals that browsers have become the most critical yet least protected control point in enterprises. AI-native browsers have shifted from experimental tools to mainstream business platforms, creating significant security blind spots. The report highlights the rapid evolution of browser capabilities, including AI copilots and generative AI tools, which are now integral to daily work tasks. However, enterprise security architectures have not kept pace, leaving a growing gap in visibility and control over sensitive data and user activities. The report also details the widespread use of AI tools within browser sessions, the exposure of sensitive data in 'trusted' apps, and the increasing prevalence of browser-based attacks that bypass traditional security controls.

Latin American Organizations Struggle with Cybersecurity Defenses and Skills Shortage

Updated: 05.03.2026 16:00 · First: 22.01.2026 18:05 · 📰 2 src / 2 articles

Latin American organizations report low confidence in their nations' cyber defenses, with only 13% confident in their country's ability to protect critical infrastructure. The region faces a significant cybersecurity skills gap, with 69% lacking critical personnel and capabilities. Cyberattacks have surged by 53% year-over-year, driven by cybercrime syndicates from Southeast Asia and China. Latin American organizations now face an average of around 3,100 cyber threats per week, nearly double the 1,500 threats faced by US organizations. The lack of skilled professionals and investment in cyber resilience infrastructure hampers the region's digital progress, making it vulnerable to systemic risks. Phishing campaigns are particularly effective, and the healthcare and financial services sectors are heavily targeted.

ContextCrush Vulnerability in Context7 MCP Server

Updated: · First: 05.03.2026 16:00 · 📰 1 src / 1 articles

A critical vulnerability, dubbed ContextCrush, in the Context7 MCP Server allows attackers to inject malicious instructions into AI development tools through trusted documentation channels. The flaw stems from unfiltered 'Custom Rules' that are delivered to AI agents without sanitization. The vulnerability could enable attackers to compromise development environments by executing harmful actions using the permissions of AI coding assistants. The issue was discovered by Noma Labs researchers and patched by Upstash on February 23, 2026.

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

Updated: · First: 05.03.2026 15:44 · 📰 1 src / 1 articles

This week's ThreatsDay Bulletin highlights several significant developments in the cybersecurity landscape. Researchers uncovered new bot scalping tactics targeting DDR5 memory, Samsung TV tracking capabilities, and a substantial privacy fine imposed on Reddit. These updates reflect the evolving threat landscape and the continuous shifts in cybersecurity dynamics.

Preparing for Quantum Computing Threats with Post-Quantum Cryptography

Updated: · First: 05.03.2026 15:13 · 📰 1 src / 1 articles

Organizations are urged to prepare for the future threat of quantum computing, which could break current encryption standards. The 'harvest now, decrypt later' tactic involves attackers collecting encrypted data today to decrypt it later using quantum computers. Security leaders are encouraged to adopt post-quantum cryptography to protect long-term sensitive data. A webinar will discuss practical steps, including hybrid cryptography, to mitigate this emerging risk.

Online gambling ring exploiting Ukrainian women dismantled

Updated: · First: 05.03.2026 14:39 · 📰 1 src / 1 articles

A criminal ring exploited war-displaced Ukrainian women to run an online gambling scheme, laundering nearly €4.75 million. The group targeted vulnerable women from war-torn areas, bringing them to Spain to open bank accounts and credit cards under their names. These accounts were used to place low-odds bets on online gambling platforms, generating steady profits. The operation involved stolen identities from over 5,000 citizens across 17 nationalities. Spanish and Ukrainian authorities arrested 12 suspects, seized numerous devices and vehicles, froze properties worth over €2 million, and blocked accounts holding more than €470,000.

Coruna iOS Exploit Kit Targets iOS 13–17.2.1 with 23 Exploits

Updated: 05.03.2026 14:15 · First: 04.03.2026 15:28 · 📰 3 src / 3 articles

Google's Threat Intelligence Group identified the Coruna exploit kit, targeting iOS versions 13.0 to 17.2.1. The kit includes five exploit chains and 23 exploits, some using non-public techniques. It has been used by multiple threat actors, including government-backed groups and financially motivated actors. The kit was first observed in February 2025 and has since been linked to campaigns involving Russian and Chinese actors. The exploit kit leverages vulnerabilities in WebKit and other components, some of which were patched by Apple but remained undocumented until later. The kit is designed to fingerprint devices and deliver appropriate exploits based on the iOS version. It avoids execution on devices in Lockdown Mode or private browsing. The Coruna exploit kit marks a shift from targeted spyware attacks to broader exploitation of iOS devices, including crypto theft attacks. The kit includes a stager loader called PlasmaGrid, which targets cryptocurrency wallet apps such as MetaMask, Phantom, Exodus, BitKeep, and Uniswap. The exploit kit was used in watering hole attacks targeting iPhone users visiting compromised Ukrainian websites in summer 2025 and on fake Chinese gambling and crypto websites in late 2025. The exploit kit includes a binary loader that deploys the final stage of the attack after the initial browser exploit succeeds. It uses custom encryption and compression methods to deliver payloads and is ineffective against the latest iOS versions.

Iran-linked Dust Specter Targets Iraqi Officials with AI-Assisted Malware

Updated: 05.03.2026 14:01 · First: 03.03.2026 12:30 · 📰 2 src / 2 articles

An Iran-linked cyber threat actor, Dust Specter, has been targeting Iraqi government officials using AI-powered tools and previously undocumented malware. The campaign, detected in January 2026, involves impersonating the Iraqi Ministry of Foreign Affairs and compromising government infrastructure to host malicious payloads. The attack chains include the use of SplitDrop, TwinTask, TwinTalk, and GhostForm malware, with TwinTalk also linked to a previous campaign in July 2025. The campaign employs advanced techniques such as randomly generated URI paths for C2 communication, geofencing, and User-Agent verification. The use of compromised Iraqi government infrastructure and AI-assisted malware development highlights the sophistication of the attack.

Critical Zero-Click RCE Vulnerability in FreeScout Helpdesk Platform

Updated: 05.03.2026 13:00 · First: 04.03.2026 23:51 · 📰 2 src / 2 articles

A critical zero-click remote code execution (RCE) vulnerability (CVE-2026-28289) in FreeScout helpdesk platform allows attackers to hijack mail servers by sending a crafted email. The flaw bypasses a previous fix for another RCE issue (CVE-2026-27636) and enables unauthenticated command execution on the server. FreeScout versions up to 1.8.206 are affected, and immediate patching to version 1.8.207 is recommended. The vulnerability leverages a zero-width space (Unicode U+200B) to bypass security checks, allowing malicious file uploads and subsequent exploitation. Over 1,100 publicly exposed FreeScout instances are at risk, with potential impacts including full server compromise, data breaches, and lateral movement. Ox Security discovered a patch bypass that allowed reproduction of the same RCE on newly updated servers and escalated the attack chain to a zero-click RCE. The PHP-based Laravel framework, on which FreeScout is based, has over 83,000 GitHub stars and around 13,000 publicly exposed servers.

Credential Abuse in Windows Environments Despite MFA

Updated: · First: 05.03.2026 13:00 · 📰 1 src / 1 articles

Organizations often assume multi-factor authentication (MFA) prevents credential-based attacks in Windows environments. However, attackers continue to exploit valid credentials through multiple authentication paths that bypass MFA. These paths include interactive Windows logons, direct RDP access, NTLM authentication, Kerberos ticket abuse, local administrator accounts, SMB authentication, and service accounts. Security teams must address these gaps to reduce credential abuse risks. Tools like Specops Secure Access can enforce MFA for Windows logons, VPN, and RDP connections, while Specops Password Policy helps enforce strong password policies and block compromised passwords.

Critical RADIUS Authentication Flaw in Cisco Secure Firewall Management Center

Updated: 05.03.2026 12:30 · First: 15.08.2025 09:49 · 📰 4 src / 7 articles

Cisco has disclosed and patched a critical vulnerability in the RADIUS subsystem of Secure Firewall Management Center (FMC) Software. The flaw, CVE-2025-20265, allows unauthenticated, remote attackers to execute arbitrary shell commands on affected systems. This vulnerability affects FMC Software versions 7.0.7 and 7.7.0 when RADIUS authentication is enabled for web-based management or SSH. Additionally, Cisco has released security updates to patch two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software: an authentication bypass flaw (CVE-2026-20079) that allows attackers to gain root access to the underlying operating system, and a remote code execution (RCE) vulnerability (CVE-2026-20131) that lets attackers execute arbitrary Java code as root on unpatched devices. Cisco's Product Security Incident Response Team (PSIRT) has no evidence that these flaws are exploited in attacks or that proof-of-concept (PoC) exploit code has been published online. In March 2026, Cisco released a bundled publication containing 25 security advisories detailing vulnerabilities in enterprise networking products, including nine high-severity vulnerabilities in the ASA Firewall, Secure FMC, and Secure FTD appliances. Cisco is not aware of any of these vulnerabilities being exploited in the wild.

FBI Seizes RAMP Cybercrime Forum

Updated: 05.03.2026 11:45 · First: 28.01.2026 19:38 · 📰 5 src / 7 articles

The FBI has seized the RAMP cybercrime forum, a platform known for facilitating ransomware operations and other cybercriminal activities. The seizure includes both the forum's Tor site and its clearnet domain, ramp4u[.]io, which now display a seizure notice. The forum was a hub for ransomware gangs to advertise their operations and recruit affiliates. The seizure provides law enforcement with access to a significant amount of data tied to the forum's users, including email addresses, IP addresses, and private messages. This could lead to the identification and potential arrest of threat actors who failed to follow proper operational security (opsec). RAMP was created in 2021 by individuals linked to the now-defunct Babuk ransomware group and was administered by key operators such as Mikhail Matveev (also known as Orange, Wazawaka, and BorisElcin) and Stallman. The forum was a prime hub for various ransomware groups, including LockBit, ALPHV/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant, and RansomHub. Following the seizure, Stallman confirmed there were no plans to rebuild the forum, indicating a significant disruption to the cybercriminal ecosystem. Additionally, the FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals to buy and sell hacking tools and stolen data. The forum had over 142,000 members and more than 215,000 messages between members as of December 2025. The seizure is part of an international joint operation coordinated by Europol, known as 'Operation Leak,' involving law enforcement agencies in 14 countries. The operation included the shutdown of LeakBase's domains, posting seizure banners, and warning members of the seizure. Law enforcement executed search warrants, made arrests, and conducted interviews in multiple countries. The seizure banner notes that the forum's database and all its contents, including IP logs and private messages, will be used for evidentiary purposes in future investigations. The domain nameservers have been switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov. The operation involved around 100 enforcement actions worldwide, including measures against 37 of the most active users of the platforms. LeakBase was active since 2021 and had over 142,000 members, offering access to databases, a market for selling leaks, exploits, and other cybercrime services, and an escrow payment system.

Phobos Ransomware Suspect Arrested in Poland

Updated: 05.03.2026 10:34 · First: 17.02.2026 13:31 · 📰 2 src / 3 articles

Polish authorities have arrested a 47-year-old man suspected of ties to the Phobos ransomware group. The arrest is part of "Operation Aether," a broader international effort coordinated by Europol. The suspect was found with stolen credentials, credit card numbers, and server access data, which could facilitate ransomware attacks. The suspect faces charges under Article 269b of Poland's Criminal Code, with a maximum prison sentence of five years if found guilty. Operation Aether has targeted Phobos-linked individuals at multiple levels, including backend infrastructure operators and affiliates involved in network intrusions and data encryption. The operation has led to the extradition of a key Phobos administrator to the United States and the seizure of 27 servers in Thailand. A Russian national, Evgenii Ptitsyn, pleaded guilty to a wire fraud conspiracy charge related to his role in administering the Phobos ransomware operation. Ptitsyn was extradited from South Korea in November 2024 and is facing up to 20 years in prison. The Phobos ransomware gang has collected over $39 million from more than 1,000 victims worldwide.

Tycoon2FA Phishing-as-a-Service Takedown

Updated: 05.03.2026 08:51 · First: 04.03.2026 18:00 · 📰 3 src / 3 articles

A global operation led by Microsoft and Europol, supported by multiple industry partners, seized infrastructure linked to the Tycoon2FA phishing-as-a-service (PhaaS) operation. Tycoon2FA offered subscription-based services that intercepted live authentication sessions, bypassing multi-factor authentication (MFA) and enabling large-scale attacks on corporate inboxes. The operation resulted in the seizure of over 300 domains associated with Tycoon2FA, which had around 2000 users and used more than 24,000 domains since its launch in August 2023. The primary operator, identified as using the online identities 'SaaadFridi' and 'Mr_Xaad,' remains at large. Tycoon2FA was generating tens of millions of phishing emails each month by mid-2025, reaching more than 60% of all blocked phishing attempts. The platform was sold through Telegram for $120 for 10 days of access or $350 for a month of access to a web-based administration panel, lowering the barrier for low-skilled criminals to launch sophisticated, MFA-bypassing attacks at scale. The platform was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally.

Bitwarden adds passkey login support for Windows 11

Updated: · First: 05.03.2026 00:34 · 📰 1 src / 1 articles

Bitwarden has introduced support for logging into Windows 11 using passkeys stored in its encrypted vault. This feature enables phishing-resistant authentication by allowing users to log in via a security key option and QR code scan from a mobile device. The feature is available across all Bitwarden plans, including the free tier. To use the feature, users must have Entra ID-joined devices, FIDO2 security key sign-in enabled, and a registered Entra ID passkey stored in their Bitwarden vault. Bitwarden acts as the passkey provider, storing credentials in the user’s synced vault rather than binding them to a single device. This approach enhances security by reducing the risk of credential exposure to phishing attacks.

Microsoft October 2025 Updates Disable USB Input in Windows Recovery Environment

Updated: 04.03.2026 23:03 · First: 20.10.2025 22:06 · 📰 3 src / 6 articles

Microsoft's October 2025 security updates (KB5066835) initially disabled USB mice and keyboards in the Windows Recovery Environment (WinRE), affecting both client (Windows 11 24H2 and 25H2) and server (Windows Server 2025) platforms. This issue made WinRE unusable for troubleshooting or repairing the OS, prompting users to switch to Bluetooth or PS/2 input devices as a workaround. Microsoft has since released an emergency update (KB5070773) to resolve the issue, which started rolling out on October 21, 2025. This update restores USB functionality in WinRE, allowing users to navigate recovery options. Affected customers can also use touchscreen, PS/2 devices, or USB recovery drives as workarounds. OEMs and enterprises can use PXE in Configuration Manager to install the update, while IT administrators can deploy push-button reset features using Windows ADK and WinPE add-on. Additionally, Microsoft confirmed in February 2026 that the October 2025 KB5068164 update for Windows 10 also broke WinRE. A new update (KB5075039) was released to fix this issue, requiring the WinRE partition to be at least 256MB in size.

HungerRush extortion campaign targets restaurant customers

Updated: · First: 04.03.2026 20:44 · 📰 1 src / 1 articles

A threat actor is mass-emailing restaurant patrons using the HungerRush POS platform, claiming to have access to customer and restaurant data. The attacker demands a response from HungerRush or threatens to expose the data. The emails were sent using Twilio SendGrid, a service previously used by HungerRush for legitimate communications. The attacker claims to have access to millions of customer records, including names, emails, passwords, addresses, phone numbers, dates of birth, and credit card information. HungerRush has not confirmed a breach, but customers are advised to be vigilant for potential phishing attempts.

Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting

Updated: 04.03.2026 19:21 · First: 30.06.2025 15:00 · 📰 15 src / 20 articles

Iranian state-sponsored and affiliated cyber threat actors have escalated retaliatory campaigns following the February 28, 2026, joint Israeli-US military strikes (codenamed *Epic Fury* and *Roaring Lion*), with a documented surge of **149 hacktivist DDoS attacks** targeting **110 organizations across 16 countries**—primarily Kuwait (28%), Israel (27.1%), and Jordan (21.5%). Over 70% of this activity was driven by just two groups, **Keymous+ and DieNet**, while pro-Russian actors (Cardinal, Russian Legion) claimed breaches of Israeli military networks, including the Iron Dome system. Concurrently, Iran’s IRGC launched disruptive strikes against **Saudi Aramco and an AWS data center in the U.A.E.**, aiming to inflict global economic pain, and revived old personas (e.g., Cotton Sandstorm’s *Altoufan Team*) to target Bahraini infrastructure. The campaign aligns with Iran’s established playbook of blending espionage, disruption, and psychological operations, leveraging **ransomware-as-a-smokescreen**, destructive wipers, and multi-actor obfuscation. UNC1549 (Nimbus Manticore/Subtle Snail) remained the **fourth most active threat actor in H2 2025**, focusing on defense, aerospace, and telecommunications sectors, while SMS phishing campaigns exploited wartime urgency to deploy mobile surveillance malware via fake *RedAlert* app updates. The UK NCSC and Google’s Threat Intelligence Group (GTIG) continue to warn of heightened risks for organizations with Middle East exposure, emphasizing **DDoS resilience, ICS segmentation, and supply-chain hardening** as critical mitigations. Iranian cryptocurrency exchanges, meanwhile, adjusted operations to manage volatility under sanctions and connectivity constraints, signaling the regime’s reliance on shadow economic infrastructure during conflict.

AI-Enabled Cyberattacks and Hive Mind Analogies in Cybersecurity

Updated: · First: 04.03.2026 19:09 · 📰 1 src / 1 articles

The article draws parallels between the Netflix show Stranger Things and modern cybersecurity threats, highlighting the risks of botnets, APTs, and AI-enabled cyberattacks. It emphasizes the importance of telemetry data, early warning insights, and agentic workflows in defending against these threats. The narrative underscores the need for unified visibility and control to protect enterprise networks from sophisticated attacks.

Global Coalition on Telecoms (GCOT) Publishes 6G Cybersecurity and Resilience Principles

Updated: · First: 04.03.2026 18:30 · 📰 1 src / 1 articles

A coalition of seven governments, including Australia, Canada, Japan, the UK, and the US, along with Finland and Sweden, has launched voluntary cybersecurity and cyber resilience principles for 6G networks. The Global Coalition on Telecoms (GCOT) aims to guide the development of secure and resilient 6G infrastructure, targeting initial commercial rollouts in 2029-2030. The guidelines emphasize containment, confidentiality, integrity, resilience, and regulatory compliance, with support from industry partners like AT&T, BT, Ericsson, and NVIDIA.

Ransomware attack disrupts University of Mississippi Medical Center operations

Updated: 04.03.2026 17:28 · First: 20.02.2026 13:50 · 📰 3 src / 4 articles

The University of Mississippi Medical Center (UMMC) has resumed normal operations nine days after a ransomware attack disrupted IT systems and blocked access to electronic medical records. All clinics statewide have reopened, and UMMC is working to reschedule missed appointments. The attack led to the cancellation of outpatient procedures, ambulatory surgeries, and imaging appointments, but hospital operations continued using downtime procedures. UMMC is investigating with assistance from CISA, the FBI, and the Department of Homeland Security. The attackers have communicated with UMMC, but no ransomware group has claimed responsibility. UMMC operates seven hospitals, 35 clinics, and over 200 telehealth sites statewide, including the state's only organ and bone marrow transplant program, the only children's hospital, the only Level I trauma center, and one of two Telehealth Centers of Excellence in the United States.

Brute Force Attack Reveals Ransomware Infrastructure Network

Updated: · First: 04.03.2026 17:02 · 📰 1 src / 1 articles

A brute force attack on an exposed RDP server led to the discovery of a ransomware infrastructure network. The attack, initially dismissed as routine, uncovered unusual credential-hunting behavior, a web of geo-distributed infrastructure, and a shady VPN service linked to ransomware-as-a-service operations. The investigation revealed a sophisticated network of IP addresses and domain names associated with Hive ransomware and BlackSuite, highlighting the need for thorough incident response beyond traditional methods.

RFP Guide for AI Usage Control and Governance Released

Updated: · First: 04.03.2026 13:30 · 📰 1 src / 1 articles

A new RFP Guide for Evaluating AI Usage Control (AUC) and AI Governance Solutions has been released to help organizations structure their AI security requirements. The guide shifts focus from app proliferation to interaction-level inspection, emphasizing measurable criteria over vague goals. It includes an 8-pillar framework to assess vendor capabilities in AI discovery, contextual awareness, policy governance, real-time enforcement, auditability, architecture fit, deployment, and future-proofing. The guide aims to prevent feature-washing by legacy vendors and ensures enforceable, measurable controls for AI governance.

Lack of Digital Estate Standards Poses Posthumous Deepfake Fraud Risks

Updated: · First: 04.03.2026 12:45 · 📰 1 src / 1 articles

The OpenID Foundation warns of systemic gaps in handling digital accounts of the deceased, which could lead to fraud and exploitation. The absence of global standards for managing devices, email, social media, cryptocurrency, and other accounts after death could be exploited using AI deepfakes for manipulation, disinformation, or profit. The report calls for a coordinated framework to ensure proper access and protection of digital assets post-mortem.