CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 09:15 28/04/2026 UTC
  • Unauthorized access detected in Itron’s internal IT systems impacting utility technology provider An unauthorized third party gained access to internal systems at Itron, Inc., a U.S.-based utility technology provider specializing in energy and water resource management, on April 13, 2026. Itron disclosed the incident in an SEC filing and activated its cybersecurity response plan, engaging external advisors and notifying law enforcement. The unauthorized activity was blocked with no subsequent activity observed, and operations continued with no material disruption. The company serves more than 8,000 customers across 100 countries but reported no impact to hosted customer systems. The attacker’s motivation and whether any customer or sensitive information was compromised remains unclear. Itron does not expect significant operational impact and expects a substantial portion of incident-related costs to be covered by insurance. Itron operates across critical infrastructure sectors, including electricity grids, water distribution, and gas networks, and is evaluating potential legal and regulatory notifications as part of its ongoing investigation. Read
  • Social media scam losses exceed $2.1B in 2025 as Meta deploys anti-scam tools Americans reported over $2.1 billion in losses to social media scams in 2025, an eightfold increase since 2020, according to the U.S. Federal Trade Commission (FTC). Nearly one in three Americans who reported financial losses to scams were contacted via social media, with Facebook accounting for the highest losses compared to other platforms or traditional contact methods such as email or text messages. Scammers exploited social media platforms to target victims globally at low cost, leveraging account hacks, data mining from user posts, and legitimate advertising tools to refine targeting by demographics and interests. Read
  • Robinhood account creation process exploited to deliver phishing emails via email injection Threat actors abused a flaw in Robinhood’s account creation onboarding process to inject arbitrary HTML into legitimate registration emails, enabling the delivery of convincing phishing messages. Starting April 26, 2026, Robinhood customers received emails from [email protected] with a subject line ‘Your recent login to Robinhood’ and content warning of an ‘Unrecognized Device Linked to Your Account’. The emails included fake IP addresses, partial phone numbers, and a ‘Review Activity Now’ button that led to a phishing domain, robinhood[.]casevaultreview[.]com. The attack leveraged improperly sanitized device metadata fields during account registration to embed HTML into the Device: field of confirmation emails, creating a fake alert within an otherwise legitimate email. No system or customer data breach occurred, and Robinhood has remediated the flaw by removing the Device: field from account creation emails. Read
  • Operation of fraudulent cellular base stations for SMS phishing in Greater Toronto Area disrupted Three individuals were arrested in Canada for operating "SMS blaster" devices in the Greater Toronto Area, which masquerade as legitimate cellular towers to deliver phishing SMS messages to nearby mobile devices. The devices exploited automatic cell reselection to intercept and force connections, enabling direct SMS delivery without requiring phone numbers. Targets received fraudulent texts appearing to originate from trusted entities such as banks or government agencies, directing them to credential-harvesting websites. The operation spanned multiple months and locations, with rogue towers moved via vehicles to maximize coverage. Police estimate 13 million instances of mobile network entrapment occurred, and devices disconnected victims from their legitimate networks, impairing emergency service access during incidents. Read
  • NCSC guidance warns against common SOC performance metrics, advocates time-to-detect/respond focus The UK National Cyber Security Centre (NCSC) highlighted that many conventional SOC performance metrics—such as ticket volume, closure time, or detection rule counts—are misleading and can incentivize counterproductive behavior. The agency emphasized that only metrics tied to timeliness of attack detection and response (TTD/TTR) reliably reflect SOC effectiveness. Misaligned metrics risk driving analysts toward rapid false-positive triage rather than meaningful threat investigation. Read
  • Medtronic corporate network breach exposes over 9 million records, confirmed by vendor Medical device manufacturer Medtronic confirmed a breach of its corporate IT systems after the ShinyHunters extortion group claimed to have stolen over 9 million records containing personally identifiable information (PII) and terabytes of corporate data. Medtronic states there is no impact to medical products, patient safety, customer networks, manufacturing, distribution, financial reporting, or its ability to meet patient needs, and notes its networks are segmented. The company is investigating whether personal data was accessed and will notify affected individuals if confirmed. MiniMed, Medtronic's diabetes-focused subsidiary, reported its own IT systems were not affected. The threat actor listed Medtronic on its leak site on April 17, setting a ransom deadline of April 21, and was later removed from the site, which may indicate payment. Medtronic’s corporate IT, product, manufacturing, and distribution networks are segmented, and customer hospital networks remain separate and independently managed by customers’ IT teams. Read
  • Malicious PyPI package elementary-data 0.23.3 backdoored via GitHub Actions workflow injection An attacker injected malicious code into the elementary-data PyPI package (version 0.23.3, 1.1M monthly downloads) to distribute an infostealer targeting developer credentials and cryptocurrency wallets. The compromise stemmed from a GitHub Actions script injection flaw exploited via a malicious comment in a pull request, which triggered workflow execution under the project’s GITHUB_TOKEN. This enabled the attacker to forge a signed commit and tag (v0.23.3), triggering the legitimate release pipeline to publish the backdoored package to PyPI and a malicious Docker image to GitHub Container Registry. The infostealer, delivered via elementary.pth, targeted SSH keys, Git credentials, cloud provider secrets, Kubernetes/Docker/CI secrets, .env files, developer tokens, cryptocurrency wallet files (Bitcoin, Litecoin, Dogecoin, Zcash, Dash, Monero, Ripple), system data, and logs. Exposure occurred through unpinned version installations and Docker image pulls (tags 0.23.3 and :latest). Read
Last updated: 06:45 28/04/2026 UTC
  • Unauthenticated RCE Vulnerability in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197) CVE-2026-34197, an unauthenticated RCE vulnerability in Apache ActiveMQ Classic via the Jolokia API, remains actively exploited with at least 6,400 exposed servers vulnerable. The flaw affects versions prior to 5.19.4 and 6.0.0 to 6.2.3, with patched releases issued on March 30, 2026. Discovered by Horizon3’s Naveen Sunkavally using AI assistance, the vulnerability chain enables attackers to execute arbitrary OS commands by abusing the Jolokia API’s addNetworkConnector function. CISA added the flaw to its Known Exploited Vulnerabilities Catalog on April 16, 2026, and ordered FCEB agencies to remediate by April 30, 2026 under BOD 22-01. Exploitation indicators include broker logs showing vm:// transport connections with brokerConfig=xbean:http:// query parameters and configuration warnings. Shadowserver reports over 7,500 exposed ActiveMQ servers, with recent data showing 6,400 still vulnerable, concentrated in Asia, North America, and Europe. Read
  • U.S. sanctions cyber scam operations in Southeast Asia The U.S. Department of the Treasury has sanctioned additional entities in Cambodia, including Senator Kok An, for operating large-scale cryptocurrency fraud networks embedded within scam compounds, including casinos and commercial buildings. These networks defrauded Americans of at least $10 billion in 2024 through romance baiting and fake investment platforms, with financial losses reaching millions per victim. The sanctions target 29 individuals and organizations and are coordinated with the Department of Justice, FBI, and Secret Service. Recent enforcement actions include the seizure of 503 fraudulent domains, disruption of a messaging app used for human trafficking recruitment, and criminal charges against operators in Burma and Cambodia. The U.S. has escalated efforts to dismantle these operations, which are linked to widespread human trafficking, physical abuse, and casino-based money laundering. The sanctions block U.S.-based assets and prohibit transactions with designated parties, aiming to disrupt the financial and operational infrastructure sustaining these cyber-enabled fraud networks. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has continued to escalate its multi-vector CanisterWorm campaign into a geopolitically targeted operation, leveraging compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and now Checkmarx KICS tooling to deliver credential-stealing malware that harvests SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. The group’s most recent compromise involves the Checkmarx KICS analysis tool, where attackers pushed malicious Docker images to the official "checkmarx/kics" repository (overwriting v2.1.20 and introducing v2.1.21), alongside infected VS Code and Open VSX extensions that executed a hidden MCP addon to fetch and deploy multi-stage credential theft malware. The attack targeted data processed by KICS—including GitHub tokens, cloud provider credentials, npm tokens, SSH keys, and environment variables—encrypted and exfiltrated it to audit.checkmarx[.]cx, a domain designed to impersonate legitimate Checkmarx infrastructure. While TeamPCP publicly claimed the attack, researchers noted insufficient evidence beyond pattern-based correlations to confidently attribute the breach. The malicious timeframe for the Docker image compromise lasted from 2026-04-22 14:17:59 UTC to 15:41:31 UTC before affected tags were restored to legitimate digests. The campaign began as a supply-chain attack involving 47 compromised npm packages and escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and direct targeting of CI/CD pipelines via GitHub Actions workflows (e.g., Checkmarx, Trivy). Recent compromises of LiteLLM and Telnyx demonstrate rapid iteration and maturation of supply-chain attack methodology, while destructive payloads targeting Iranian systems in Kubernetes environments (e.g., time-zone/locale-based wipers) highlight the group’s geopolitical alignment. The LiteLLM compromise specifically turned developer endpoints into systematic credential harvesting operations, with malware activating during installation/updates and cascading through transitive dependencies (e.g., dspy, opik) to affect organizations that never directly used LiteLLM. A coordinated attack on Checkmarx ecosystems has been discovered, including malicious images pushed to the official "checkmarx/kics" Docker Hub repository (v2.1.20, alpine overwritten; v2.1.21 introduced) and infected Visual Studio Code extensions (1.17.0, 1.19.0) that executed remote addons via Bun without user consent. The malware collected and exfiltrated sensitive data from infrastructure-as-code scans, exposing credentials in Terraform, CloudFormation, or Kubernetes configurations. Techniques and exfiltration infrastructure (e.g., ICP canister cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0.io) resemble TeamPCP's CanisterWorm operations, though attribution remains unconfirmed. The Docker Hub repository has been archived, and affected organizations must remediate potentially compromised secrets. Read
  • Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines Supply chain compromise in the Trivy vulnerability scanner triggered the CanisterWorm propagation across CI/CD pipelines, now expanding to additional open-source ecosystems and involving multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) and Cisco confirming collaboration and horizontal movement across cloud environments. A new npm supply chain malware campaign discovered on April 24, 2026, shows self-propagating worm-like behavior via @automagik/genie and pgserve packages, stealing credentials and spreading across developer ecosystems while using Internet Computer Protocol (ICP) canisters for command and control. The malware shares technical similarities with prior TeamPCP campaigns, including post-install scripts and canister-based infrastructure, potentially indicating ongoing evolution of the threat actor's tactics or a new campaign leveraging established infrastructure. The Axios NPM package compromise via malicious versions 0.27.5 and 0.28.0 delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with attribution disputes suggesting either TeamPCP involvement or North Korean actor UNC1069 (Google's Threat Intelligence Group). Cisco's internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories including proprietary AI product code and customer data from banks, BPOs, and US government agencies. Multiple AWS keys were abused across a subset of Cisco's cloud accounts, with multiple threat actors participating in the breach. Read
  • Ransomware extortion totals $2.1B from 2022 to 2024, FinCEN reports FinCEN's report reveals that ransomware gangs extorted over $2.1 billion from 2022 to 2024, with a peak in 2023 followed by a decline in 2024 due to law enforcement actions against major gangs like ALPHV/BlackCat and LockBit. The report details 4,194 ransomware incidents, with manufacturing, financial services, and healthcare being the most targeted industries. The top ransomware families, including Akira, ALPHV/BlackCat, and LockBit, were responsible for the majority of attacks and ransom payments, with Bitcoin being the primary payment method. A former ransomware negotiator, Angelo Martino, has pleaded guilty to conspiring with BlackCat (ALPHV) operators to extort U.S. companies in 2023. Martino, along with accomplices Kevin Tyler Martin and Ryan Goldberg, deployed BlackCat ransomware, shared confidential victim information to maximize ransom demands, and laundered illicit proceeds. Authorities seized $10 million in assets from Martino, and his co-defendants pleaded guilty in December 2025. Read
  • Pre-authenticated RCE in Marimo exploited within 10 hours of advisory A pre-authenticated remote code execution (RCE) vulnerability in Marimo, tracked as CVE-2026-39987 (CVSS 9.3), was exploited in the wild within hours of public disclosure, enabling attackers to gain full PTY shells on exposed instances via the unauthenticated /terminal/ws WebSocket endpoint. The flaw, affecting Marimo versions prior to 0.23.0, initially led to rapid, human-driven exploitation campaigns focused on credential theft. Recent attacks have expanded to deploy a new NKAbuse malware variant hosted on Hugging Face Spaces, using typosquatted repositories to evade detection and establish persistent remote access. Additional exploitation activity includes sophisticated lateral movement, such as reverse-shell techniques and database enumeration, indicating a shift toward multi-stage attacks beyond initial credential harvesting. GitHub assessed the flaw with a critical CVSS score of 9.3, and Marimo developers confirmed impact on instances deployed as editable notebooks or exposed via --host 0.0.0.0 in edit mode. This event is distinct from the LMDeploy SSRF flaw (CVE-2026-33626), which was exploited within 12 hours of disclosure to conduct internal network reconnaissance via SSRF, targeting cloud metadata services, Redis, and MySQL instances. Read
  • PhantomCard Android Trojan Targets Brazilian Banking Customers via NFC Relay Attacks A new variant of the NGate malware family is leveraging a trojanized version of the HandyPay NFC relay app to capture payment card data and PINs from Brazilian Android users since November 2025. The malicious HandyPay app is distributed via phishing domains impersonating a Brazilian lottery site and a Google Play listing for a card protection tool. Once installed, the app relays NFC payment card data to attacker-controlled devices, enabling fraudulent contactless transactions and ATM withdrawals. Unlike earlier NGate variants that relied on open-source tools like NFCGate, this campaign uses a modified version of HandyPay to avoid detection and requires minimal permissions beyond default payment app status. PhantomCard and related NFC relay malware families have expanded their tactics in Brazil, with NGate variants now using trojanized HandyPay to exfiltrate stolen NFC data to attacker-controlled email addresses. The malware is distributed via fake apps like 'Proteção Cartão' on fake Google Play pages and through fake lottery scams via WhatsApp. ESET researchers attribute the shift from NFCGate to HandyPay to cost and evasion benefits, as HandyPay is significantly cheaper and does not require special permissions. Evidence suggests the malicious code may have been partially generated using generative AI tools, indicated by emoji markers in debug logs. Read

Latest updates

Browse →

Misrendered Windows RDP security warnings due to multi-monitor scaling in April 2026 update

Updated: · First: 28.04.2026 12:51 · 📰 1 src / 1 articles

Microsoft disclosed a rendering defect in newly introduced Remote Desktop (RDP) security warnings on Windows systems after the April 2026 cumulative updates. Affected systems fail to render warning dialog text and controls correctly when using multiple monitors with different display scaling settings, resulting in overlapping text, misplaced buttons, and reduced usability or complete loss of interaction capability. The issue occurs on all supported Windows versions and persists across Windows 11, Windows 10, and Windows Server installations that include the April 2026 security updates.

Intermittent Outlook.com authentication failures during ongoing service degradation

Updated: 28.04.2026 11:37 · First: 27.04.2026 15:03 · 📰 2 src / 2 articles

Microsoft has attributed the ongoing Outlook.com service degradation—causing intermittent authentication failures, unexpected sign-outs, and "too many requests" errors—to a recently introduced change and confirmed service health returned to normal around 7 PM UTC on April 27, 2026. The incident began impacting users worldwide on April 27, 2026, with Microsoft investigating client sign-in scenarios and labeling the event as a service degradation. Outage monitoring platforms received thousands of user reports, but no root cause, regional scope, or affected user count has been disclosed. Microsoft provided mitigation steps for iPhone users to re-enter credentials via the iOS Mail app to restore Outlook and Hotmail access. A prior Exchange Online outage in March 2026 similarly disrupted mailbox and calendar access across multiple protocols.

NCSC guidance warns against common SOC performance metrics, advocates time-to-detect/respond focus

Updated: · First: 28.04.2026 11:30 · 📰 1 src / 1 articles

The UK National Cyber Security Centre (NCSC) highlighted that many conventional SOC performance metrics—such as ticket volume, closure time, or detection rule counts—are misleading and can incentivize counterproductive behavior. The agency emphasized that only metrics tied to timeliness of attack detection and response (TTD/TTR) reliably reflect SOC effectiveness. Misaligned metrics risk driving analysts toward rapid false-positive triage rather than meaningful threat investigation.

North Korean Threat Actor BlueNoroff Targets Web3 Sector

Updated: 28.04.2026 11:00 · First: 03.11.2025 14:56 · 📰 2 src / 2 articles

BlueNoroff, a financially motivated sub-cluster of the Lazarus Group, has expanded its long-running SnatchCrypto campaign with a large-scale cyber theft operation targeting over 100 cryptocurrency organizations across more than 20 countries. The campaign, detected in January 2026 and attributed with high confidence by Arctic Wolf Labs, used sophisticated social engineering tactics including typosquatted Zoom/Teams links, fake Calendly invites, and ClickFix-style clipboard attacks to deploy multi-stage malware chains. The group maintained persistent access for 66 days in some cases, exfiltrated live camera feeds to fuel AI-enhanced deepfake lures, and deployed advanced infrastructure including PowerShell C2 implants and AES-encrypted browser payloads. BlueNoroff remains North Korea's primary financial cybercrime unit, operating since at least 2014 and infamous for the 2016 Bangladesh Bank heist where $81 million was stolen. The group's evolving tactics demonstrate a shift from traditional financial targets to comprehensive data acquisition in the Web3 sector, including supply chain attack preparation.

Medtronic corporate network breach exposes over 9 million records, confirmed by vendor

Updated: 28.04.2026 09:35 · First: 27.04.2026 16:50 · 📰 2 src / 2 articles

Medical device manufacturer Medtronic confirmed a breach of its corporate IT systems after the ShinyHunters extortion group claimed to have stolen over 9 million records containing personally identifiable information (PII) and terabytes of corporate data. Medtronic states there is no impact to medical products, patient safety, customer networks, manufacturing, distribution, financial reporting, or its ability to meet patient needs, and notes its networks are segmented. The company is investigating whether personal data was accessed and will notify affected individuals if confirmed. MiniMed, Medtronic's diabetes-focused subsidiary, reported its own IT systems were not affected. The threat actor listed Medtronic on its leak site on April 17, setting a ransom deadline of April 21, and was later removed from the site, which may indicate payment. Medtronic’s corporate IT, product, manufacturing, and distribution networks are segmented, and customer hospital networks remain separate and independently managed by customers’ IT teams.

Robinhood account creation process exploited to deliver phishing emails via email injection

Updated: · First: 28.04.2026 02:11 · 📰 1 src / 1 articles

Threat actors abused a flaw in Robinhood’s account creation onboarding process to inject arbitrary HTML into legitimate registration emails, enabling the delivery of convincing phishing messages. Starting April 26, 2026, Robinhood customers received emails from [email protected] with a subject line ‘Your recent login to Robinhood’ and content warning of an ‘Unrecognized Device Linked to Your Account’. The emails included fake IP addresses, partial phone numbers, and a ‘Review Activity Now’ button that led to a phishing domain, robinhood[.]casevaultreview[.]com. The attack leveraged improperly sanitized device metadata fields during account registration to embed HTML into the Device: field of confirmation emails, creating a fake alert within an otherwise legitimate email. No system or customer data breach occurred, and Robinhood has remediated the flaw by removing the Device: field from account creation emails.

GlassWorm malware targets OpenVSX, VS Code registries

Updated: 28.04.2026 00:41 · First: 20.10.2025 19:13 · 📰 17 src / 36 articles

GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, now leveraging Solana dead drops for C2, a novel browser extension for surveillance, and the Model Context Protocol (MCP) ecosystem. The campaign delivers a .NET binary targeting Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline for session surveillance on cryptocurrency platforms like Bybit and harvests extensive browser data. Recent innovations include a Zig-compiled dropper embedded within an Open VSX extension named 'specstudio.code-wakatime-activity-tracker' masquerading as WakaTime, which installs platform-specific Node.js native addons compiled from Zig code to stealthily infect all IDEs on a developer's machine. This dropper downloads a malicious VS Code extension (.VSIX) named 'floktokbok.autoimport' from an attacker-controlled GitHub account, which impersonates a legitimate extension with over 5 million installs and installs silently across all detected IDEs, avoiding execution on Russian systems and communicating with the Solana blockchain for C2. A new large-scale social engineering campaign has emerged, distributing fake VS Code security alerts posted in GitHub Discussions to automate posts across thousands of repositories using low-activity accounts, triggering GitHub email notifications with fake vulnerability advisories containing realistic CVE references. Links redirect victims through a cookie-driven chain to drnatashachinn[.]com, where a JavaScript reconnaissance payload profiles targets before delivering additional malicious payloads. This operation represents a coordinated, large-scale effort targeting developers. GlassWorm remains a persistent supply chain threat impacting npm, PyPI, GitHub, and Open VSX ecosystems. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers. A new wave of the GlassWorm campaign targets the OpenVSX ecosystem with 73 "sleeper" extensions that activate after updates, delivering malware to developers. Six extensions have already been activated, while the remainder remain dormant or suspicious. The campaign leverages thin loaders that fetch secondary VSIX packages or platform-specific modules at runtime, marking a shift in the group's tactics to evade detection by avoiding direct malware embedding in initial uploads. The extensions mimic legitimate listings using identical icons and near-identical names to deceive developers. Developers who installed these extensions are advised to rotate all secrets and perform a full system clean-up.

Operation of fraudulent cellular base stations for SMS phishing in Greater Toronto Area disrupted

Updated: · First: 27.04.2026 23:00 · 📰 1 src / 1 articles

Three individuals were arrested in Canada for operating "SMS blaster" devices in the Greater Toronto Area, which masquerade as legitimate cellular towers to deliver phishing SMS messages to nearby mobile devices. The devices exploited automatic cell reselection to intercept and force connections, enabling direct SMS delivery without requiring phone numbers. Targets received fraudulent texts appearing to originate from trusted entities such as banks or government agencies, directing them to credential-harvesting websites. The operation spanned multiple months and locations, with rogue towers moved via vehicles to maximize coverage. Police estimate 13 million instances of mobile network entrapment occurred, and devices disconnected victims from their legitimate networks, impairing emergency service access during incidents.

Murky Panda, Genesis Panda, Glacial Panda Cloud and Telecom Intrusions

Updated: 27.04.2026 22:56 · First: 22.08.2025 14:06 · 📰 4 src / 4 articles

Chinese state-sponsored hacking groups Murky Panda (Silk Typhoon), Genesis Panda, and Glacial Panda have escalated cloud and telecom espionage operations targeting government, technology, academic, legal, and professional services entities in North America, as well as broader international sectors. Murky Panda (Silk Typhoon) exploits trusted cloud relationships, zero-day vulnerabilities, and internet-facing appliances to breach enterprise networks and telecom infrastructure. They compromise Microsoft cloud solution providers to gain Global Administrator rights across downstream tenants, deploy web shells (e.g., neo-reGeorg, China Chopper) for persistence, and use trojanized components like CloudedHope (a Golang-based RAT) and ShieldSlide (OpenSSH backdoor). Recent developments include the extradition of Silk Typhoon affiliate Xu Zewei to the U.S. to face charges for conducting cyberespionage on behalf of China's MSS, with operations dating back to 2020–2021 targeting COVID-19 research data and exploiting Microsoft Exchange zero-days.

Social media scam losses exceed $2.1B in 2025 as Meta deploys anti-scam tools

Updated: · First: 27.04.2026 19:27 · 📰 1 src / 1 articles

Americans reported over $2.1 billion in losses to social media scams in 2025, an eightfold increase since 2020, according to the U.S. Federal Trade Commission (FTC). Nearly one in three Americans who reported financial losses to scams were contacted via social media, with Facebook accounting for the highest losses compared to other platforms or traditional contact methods such as email or text messages. Scammers exploited social media platforms to target victims globally at low cost, leveraging account hacks, data mining from user posts, and legitimate advertising tools to refine targeting by demographics and interests.

Malicious PyPI package elementary-data 0.23.3 backdoored via GitHub Actions workflow injection

Updated: · First: 27.04.2026 18:17 · 📰 1 src / 1 articles

An attacker injected malicious code into the elementary-data PyPI package (version 0.23.3, 1.1M monthly downloads) to distribute an infostealer targeting developer credentials and cryptocurrency wallets. The compromise stemmed from a GitHub Actions script injection flaw exploited via a malicious comment in a pull request, which triggered workflow execution under the project’s GITHUB_TOKEN. This enabled the attacker to forge a signed commit and tag (v0.23.3), triggering the legitimate release pipeline to publish the backdoored package to PyPI and a malicious Docker image to GitHub Container Registry. The infostealer, delivered via elementary.pth, targeted SSH keys, Git credentials, cloud provider secrets, Kubernetes/Docker/CI secrets, .env files, developer tokens, cryptocurrency wallet files (Bitcoin, Litecoin, Dogecoin, Zcash, Dash, Monero, Ripple), system data, and logs. Exposure occurred through unpinned version installations and Docker image pulls (tags 0.23.3 and :latest).

U.S. sanctions cyber scam operations in Southeast Asia

Updated: 27.04.2026 18:00 · First: 09.09.2025 23:25 · 📰 5 src / 9 articles

The U.S. Department of the Treasury has sanctioned additional entities in Cambodia, including Senator Kok An, for operating large-scale cryptocurrency fraud networks embedded within scam compounds, including casinos and commercial buildings. These networks defrauded Americans of at least $10 billion in 2024 through romance baiting and fake investment platforms, with financial losses reaching millions per victim. The sanctions target 29 individuals and organizations and are coordinated with the Department of Justice, FBI, and Secret Service. Recent enforcement actions include the seizure of 503 fraudulent domains, disruption of a messaging app used for human trafficking recruitment, and criminal charges against operators in Burma and Cambodia. The U.S. has escalated efforts to dismantle these operations, which are linked to widespread human trafficking, physical abuse, and casino-based money laundering. The sanctions block U.S.-based assets and prohibit transactions with designated parties, aiming to disrupt the financial and operational infrastructure sustaining these cyber-enabled fraud networks.

Commercial data harvesting disclosed in widely deployed browser extensions across streaming, ad blocking, and enterprise tools

Updated: · First: 27.04.2026 16:30 · 📰 1 src / 1 articles

More than 80 widely used browser extensions, collectively installed millions of times, disclose in their privacy policies that they collect and sell user data. The extensions span categories including streaming utilities, ad blockers, and enterprise tools, and rely on broad legal language to commercialize data without hidden tactics. LayerX Security analysis of 6,666 policies confirmed 82 extensions engaged in commercial data sharing, including a network of 24 streaming extensions reaching 800,000 users that package viewing behavior, preferences, and inferred demographics for third parties.

Lua-based Fast16 sabotaging filesystem driver targeting Iranian nuclear program discovered pre-Stuxnet

Updated: 27.04.2026 16:09 · First: 27.04.2026 12:10 · 📰 2 src / 2 articles

Fast16, a Lua-based sabotage malware with a kernel-mode filesystem driver (fast16.sys), predates Stuxnet by at least five years, with confirmed activity dating to 2005. Designed to target Windows 2000/XP systems, Fast16 intercepts and modifies executable code at the filesystem level via a boot-start driver, enabling systematic corruption of high-precision mathematical computations in engineering and scientific software suites (LS-DYNA 970, PKPM, MOHID). The malware’s modular 'wormlet' payload architecture and embedded Lua 5.0 VM represent an early example of state-sponsored sabotage targeting national infrastructure, rewriting the history of cyber weapons. While obsolete on modern systems, its attack vector remains theoretically relevant for contemporary high-precision calculation environments.

Laundering operator sentenced for role in $230M crypto heist and RICO conspiracy

Updated: · First: 27.04.2026 16:01 · 📰 1 src / 1 articles

A 22-year-old U.S. national was sentenced to 70 months in prison for laundering at least $3.5 million of funds stolen in a $230 million cryptocurrency heist. The theft targeted a Genesis exchange creditor in August 2024 via phone-number spoofing and customer-support impersonation, resulting in the compromise of 2FA and remote access to private keys. Stolen funds were layered through mixers, exchanges, peel chains, and VPNs with accomplices, financing lavish spending including private jets, high-end vehicles, luxury residences, nightclub outings, and designer goods.

Escalating deepfake voice social engineering attacks drive multi-million-dollar losses amid absence of verification protocols

Updated: · First: 27.04.2026 16:00 · 📰 1 src / 1 articles

Since early 2024, threat actors have deployed AI-generated voice clones in real-time telephone and videoconference calls to impersonate executives and colleagues, bypassing existing technical controls and inducing victims to authorize high-value wire transfers. Attacks leveraged only three seconds of publicly available audio—often from corporate recordings or social media—to create convincing replicas using free, offline tools. Incidents surged 680% year-over-year in 2025, with over 100,000 documented cases in the United States alone and global documented fraud losses exceeding $2.19 billion. Organizations that prevented financial losses relied on enforced verification steps—such as pre-stored callback numbers, verbal passcodes, and mandatory pauses before acting—rather than technical detection.

Rising threat from autonomous LLM-driven exploitation amid persistent human validation gaps

Updated: · First: 27.04.2026 16:00 · 📰 1 src / 1 articles

Security experts warn that large language models (LLMs) like Anthropic’s Mythos and OpenAI’s GPT-5.5 are accelerating autonomous offensive capabilities, enabling rapid discovery and exploitation of vulnerabilities at scale across platforms and infrastructure. While LLM-driven tools can autonomously generate exploits, chain attack sequences, and adapt mid-engagement, their practical effectiveness remains limited by human validation requirements. Human expertise is still essential to assess exploitability, determine real-world impact, and filter false positives, creating a widening gap between discovery and exploitable outcomes. Defenders face an escalating challenge as the time from vulnerability discovery to exploitation drops from months to hours, necessitating immediate shifts to proactive security practices such as shifting left, multilayer defenses, and rapid patching to mitigate the threat.

Cybersecurity workforce dissatisfaction trends amid persistent underinvestment despite rising demand

Updated: · First: 27.04.2026 14:40 · 📰 1 src / 1 articles

A global survey of technology professionals indicates persistent dissatisfaction within cybersecurity teams, with over 75% not receiving pay raises in the past year and only 45% expecting increases in the next 12 months. Despite high-profile cyber incidents in 2025 affecting major sectors such as automotive and healthcare, only 22% of organizations increased cybersecurity investment, exacerbating workforce attrition risks amid sustained demand for security skills.

Unauthorized access detected in Itron’s internal IT systems impacting utility technology provider

Updated: 27.04.2026 14:18 · First: 26.04.2026 17:22 · 📰 2 src / 2 articles

An unauthorized third party gained access to internal systems at Itron, Inc., a U.S.-based utility technology provider specializing in energy and water resource management, on April 13, 2026. Itron disclosed the incident in an SEC filing and activated its cybersecurity response plan, engaging external advisors and notifying law enforcement. The unauthorized activity was blocked with no subsequent activity observed, and operations continued with no material disruption. The company serves more than 8,000 customers across 100 countries but reported no impact to hosted customer systems. The attacker’s motivation and whether any customer or sensitive information was compromised remains unclear. Itron does not expect significant operational impact and expects a substantial portion of incident-related costs to be covered by insurance. Itron operates across critical infrastructure sectors, including electricity grids, water distribution, and gas networks, and is evaluating potential legal and regulatory notifications as part of its ongoing investigation.

BlackFile extortion group escalates vishing campaigns with identity theft and data theft targeting retail and hospitality sectors

Updated: 27.04.2026 11:15 · First: 24.04.2026 21:26 · 📰 2 src / 2 articles

Since February 2026, the BlackFile extortion group (aliases: CL-CRI-1116, UNC6671, Cordial Spider) has conducted sustained vishing-driven credential theft and data exfiltration campaigns against retail and hospitality organizations. The group impersonates IT helpdesk staff using spoofed VoIP numbers and fraudulent Caller ID Names, often combined with antidetect browsers and residential proxies to avoid detection. Stolen credentials are used to register attacker-controlled devices and bypass MFA, enabling escalation to executive accounts via internal directory scraping. Data is exfiltrated through legitimate Salesforce and SharePoint API functions and web interfaces, targeting files containing terms such as 'confidential' and 'SSN'. Extortion demands, typically seven-figure sums, are delivered via compromised employee email accounts or randomly generated Gmail addresses, with additional harassment including swatting attempts against executives. Security researchers from Unit 42 and RH-ISAC have linked BlackFile to the activity cluster CL-CRI-1116 and noted overlaps with the loosely affiliated collective 'The Com'.

Windows Insider Program restructured with Experimental and Beta channels to improve transparency and feature access

Updated: · First: 25.04.2026 20:07 · 📰 1 src / 1 articles

Microsoft announced a restructuring of the Windows Insider Program to simplify its channel architecture and address long-standing feedback about transparency and feature accessibility. The program now consists of two primary channels: Experimental (replacing Dev and Canary) and Beta. Experimental targets users focused on testing experimental features, while Beta provides immediate access to features listed in release notes. Microsoft cites frustrations with gradual feature rollouts and lack of clarity around channel selection as key drivers for this change.

Multi-actor campaigns abuse Microsoft Teams for initial access and data theft

Updated: 25.04.2026 18:07 · First: 10.03.2026 00:50 · 📰 3 src / 3 articles

A phishing campaign targeting financial and healthcare organizations uses Microsoft Teams to impersonate IT staff and trick victims into granting remote access via Quick Assist, deploying the A0Backdoor malware. The campaign, linked to the BlackBasta ransomware group, uses sophisticated TTPs including digitally signed MSI installers, DNS MX-based C2 communication, and DLL sideloading with legitimate Microsoft binaries. A separate intrusion attributed to UNC6692 leverages Microsoft Teams social engineering to deploy the 'Snow' malware suite—comprising a browser extension, tunneler, and backdoor—for credential theft and domain takeover, with post-compromise activities including reconnaissance, lateral movement via pass-the-hash, and exfiltration of Active Directory assets. The A0Backdoor campaign involves multi-stage attack chains beginning with external Teams chats impersonating IT staff to initiate Quick Assist sessions, followed by reconnaissance, DLL sideloading with signed applications, lateral movement via WinRM, and targeted exfiltration using Rclone. The Snow intrusion contrasts this approach with a modular malware suite (SnowBelt, SnowBasin, SnowGlaze), WebSocket-based C2, SOCKS proxy capabilities, and exfiltration via LimeWire, indicating distinct actor goals and tooling.

ADT data breach attributed to ShinyHunters via vishing and Okta compromise

Updated: · First: 25.04.2026 01:53 · 📰 1 src / 1 articles

Home security provider ADT detected and confirmed an intrusion on April 20, 2026, leading to the theft of customer and prospective customer data by the ShinyHunters extortion group. The attackers accessed ADT’s Salesforce instance after compromising an employee’s Okta SSO account via voice phishing (vishing). Stolen data included names, phone numbers, addresses, and in a small subset of cases, dates of birth and partial Social Security or Tax ID numbers. No payment or authentication data was accessed, and ADT states customer security systems remained unaffected. ShinyHunters threatened to leak the data—claiming over 10 million records—unless a ransom is paid by April 27, 2026.

CISA Emergency Directive 25-03: Mitigation of Cisco ASA Zero-Day Vulnerabilities

Updated: 24.04.2026 23:34 · First: 25.09.2025 15:00 · 📰 16 src / 36 articles

The **Firestarter malware**, a custom backdoor linked to the **UAT-4356** threat actor (associated with the **ArcaneDoor campaign**), continues to persist on **Cisco Firepower and Secure Firewall devices** running ASA or FTD software **even after firmware updates and security patches**. CISA and the U.K. NCSC confirmed that the malware enables **remote access and control** by threat actors, with persistence mechanisms that survive reboots and patching. The adversary initially exploited **CVE-2025-20333** (missing authorization) and **CVE-2025-20362** (buffer overflow) to deploy **Line Viper**—a user-mode shellcode loader used to extract credentials and configuration details—before installing Firestarter for long-term access. CISA’s updated **Emergency Directive 25-03** now requires Federal Civilian Executive Branch (FCEB) agencies to **identify vulnerable Firepower and Secure Firewall devices**, collect forensic evidence, and apply vendor-provided mitigations. Over **30,000 devices remain exposed globally**, despite prior patching efforts, with some organizations **incorrectly applying updates** and leaving systems vulnerable. Cisco’s advisory details Firestarter’s persistence via **LINA process hooking**, modification of boot files (e.g., `CSP_MOUNT_LIST`), and memory-resident shellcode triggered by crafted WebVPN requests. Mitigation requires **device reimaging** or, as a last resort, a **cold restart** (with risks of corruption). Administrators are urged to verify compromises using the command `show kernel process | include lina_cs`. The campaign reflects a broader trend of **multi-platform exploitation**, with UAT-4356 also linked to zero-day attacks on **Citrix Bleed 2 (CVE-2025-5777)** and **Cisco ISE (CVE-2025-20337)**, deploying custom malware like **‘IdentityAuditAction’** for persistence. The indiscriminate yet sophisticated targeting suggests a **highly resourced actor** with access to advanced tools or non-public vulnerability intelligence.

Windows Update policy changes reduce forced restarts and improve user control

Updated: · First: 24.04.2026 23:08 · 📰 1 src / 1 articles

Microsoft is introducing several Windows Update policy and interface changes to reduce disruptions from forced restarts and improve user control over update timing. The changes include new pause controls, separated update-related shutdown/restart options, clearer device-specific driver labeling, and consolidation of multiple update types into a single monthly restart. These updates are designed to address user feedback about workflow interruptions and limited control over when updates are installed. The features are initially available to Windows Insiders in the Dev and Experimental channels, with broader deployment planned.

Microsoft Introduces Phishing-Resistant Passkeys for Windows Sign-Ins

Updated: 24.04.2026 21:13 · First: 10.03.2026 17:27 · 📰 2 src / 2 articles

Microsoft is rolling out passkey support for Microsoft Entra on Windows devices, enabling phishing-resistant passwordless authentication via Windows Hello. The feature is opt-in and will be available in public preview from mid-March through late April 2026 for worldwide tenants, with government cloud environments following in mid-April through mid-May and general availability expected by mid-June 2026. The update extends passwordless sign-in to unmanaged Windows devices—including corporate, personal, and shared devices—addressing a previous security gap where these devices relied on password-based authentication. The passkeys are device-bound and cryptographically secured, preventing theft via phishing or malware, and are stored in the Windows Hello container for authentication via face, fingerprint, or PIN. Admin controls via Conditional Access and Authentication Methods policies enable IT administrators to manage access across different device ownership scenarios.

Privilege escalation vulnerability in PackageKit (CVE-2026-41651) enables root access via PackageKit daemon

Updated: · First: 24.04.2026 20:28 · 📰 1 src / 1 articles

A local privilege escalation vulnerability in the PackageKit daemon, tracked as CVE-2026-41651, allows unauthenticated users to execute arbitrary package installation or removal commands, leading to full root access on affected Linux systems. The flaw has existed for approximately 12 years in PackageKit versions up to 1.3.4 and impacts default installations across multiple major Linux distributions. Deutsche Telekom’s Red Team discovered the issue through authentication bypass in command handling, particularly in 'pkcon install' operations on Fedora systems. No public exploit code or technical details have been released to facilitate patching. The flaw carries a CVSS score of 8.8 (Medium severity) due to its high impact on confidentiality, integrity, and availability.

US disrupts Myanmar-based scam compound and sanctions Southeast Asian financial fraud network

Updated: · First: 24.04.2026 19:48 · 📰 1 src / 1 articles

US authorities executed a coordinated enforcement action targeting a Myanmar-based scam compound linked to a broader Southeast Asian financial fraud network. The operation included sanctions against 29 individuals, the seizure of a Telegram channel with 6,000+ followers, and the takedown of over 500 .com domains tied to fake investment sites. Two Chinese nationals were criminally charged for managing operations that forced trafficked workers to conduct phone-based social engineering attacks targeting US citizens. The network’s infrastructure and workforce were traced to a compound seized by Burmese forces in November 2025 near the Thai border, revealing a multi-stage scam operation involving deceptive recruitment, coercion, and fraudulent financial schemes.

Unauthorized Access to Anthropic’s Claude Mythos via Third-Party Vendor Portal

Updated: · First: 24.04.2026 17:31 · 📰 1 src / 1 articles

Unauthorized individuals accessed Anthropic’s Claude Mythos through a third-party vendor environment, exploiting an exposed interface designed for testing advanced AI capabilities. The incident highlights risks associated with third-party vendor integrations and the potential for misconfigured or inadequately secured AI testing interfaces to be leveraged for unauthorized access. No evidence of data exfiltration or operational disruption has been confirmed as of publication.

DORA enforcement expands to mandate phishing-resistant MFA and privileged credential vaulting in EU financial sector

Updated: · First: 24.04.2026 17:10 · 📰 1 src / 1 articles

The Digital Operational Resilience Act (DORA) has enforced Article 9 requirements since January 17, 2025, establishing credential security as a binding financial risk control for EU financial institutions. Stolen credentials remain the leading initial access vector, accounting for 22% of breaches and costing the sector an average of $5.56 million per incident. DORA’s Article 9(4)(c) mandates least-privilege access, while Article 9(4)(d) requires strong authentication mechanisms, including phishing-resistant standards such as FIDO2/WebAuthn, and cryptographic key protection. Institutions failing to meet these controls face supervisory consequences, with mandatory incident reporting timelines under Article 19 triggered by credential-based breaches. Vendor credential security now falls under the same compliance perimeter, as demonstrated by high-profile breaches leveraging third-party access.