CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 17:15 21/03/2026 UTC
  • Aisuru botnet conducts record-breaking DDoS attacks, targeting U.S. ISPs and Microsoft Azure The Aisuru/Kimwolf botnet ecosystem has reached a critical disruption milestone after a multi-national law enforcement operation led by the U.S. Department of Justice (DoJ), alongside Canadian and German authorities, successfully dismantled the command-and-control (C2) infrastructure of four interconnected botnets—AISURU, Kimwolf, JackSkid, and Mossad—on March 20, 2026. This court-authorized takedown, supported by 18+ tech firms (including Akamai, Cloudflare, Google, AWS, and Oracle), targeted the botnets’ 3 million+ infected devices (including 2 million+ Android TVs, routers, DVRs, and IoT cameras), which had been weaponized to launch record-breaking DDoS attacks (e.g., 31.4 Tbps in November 2025) and hyper-volumetric campaigns averaging 3 Bpps, 4 Tbps, and 54 Mrps. The botnets’ cybercrime-as-a-service model enabled operators to sell access to compromised devices for DDoS extortion, residential proxy monetization, and lateral movement in corporate/government networks, with hundreds of thousands of attack commands issued across sectors like telecom, gaming, IT, and critical infrastructure. The disruption severed C2 communications, aiming to prevent further infections and eliminate the botnets’ ability to launch future attacks, including those targeting U.S. Department of Defense (DoD) networks. Despite this first major law enforcement strike, persistent infections and operator evasion tactics (e.g., ENS-based C2, decentralized proxy abuse) underscore the ongoing challenge of full eradication. Prior milestones include the botnets’ accidental Sybil attack on the I2P anonymity network (February 2026), their exploitation of residential proxy networks (IPIDEA) for internal network infiltration (January 2026), and Google’s takedown of IPIDEA (January 29, 2026), which reduced millions of proxy exit nodes. The DoJ’s action follows a year of escalating hyper-volumetric attacks, including Cloudflare’s mitigation of 47.1 million DDoS attacks in 2025 (a 100% YoY increase) and Akamai’s reports of attacks exceeding 30 Tbps/14 Bpps. While the operation marks a significant blow to the botnets’ operational capacity, their adaptive resilience and global scale of infections demand continued vigilance. Read
  • Takedown of fraudulent CSAM distribution scam platform "Alice with Violence CP" An international law enforcement operation, codenamed Operation Alice, dismantled a fraudulent dark web platform advertising non-existent child sexual abuse material (CSAM) and cybercrime-as-a-service offerings. The platform, operated by a 35-year-old suspect based in China, lured approximately 10,000 users into paying between EUR 17 and EUR 250 in Bitcoin (totaling roughly $400,000) for advertised CSAM packages that were never delivered. The scam used previews of claimed CSAM to deceive victims into entering personal details and completing payments. The takedown involved the seizure of 287 servers across jurisdictions, with 105 servers located in Germany, and resulted in an international arrest warrant issued for the platform's operator. Read
  • Tag poisoning in Trivy GitHub Actions repositories delivers cloud-native infostealer payload Attackers compromised two official Trivy-related GitHub Actions repositories—aquasecurity/trivy-action and aquasecurity/setup-trivy—by force-pushing 75 version tags to malicious commits hosting a Python-based infostealer. The payload targets CI/CD runners to harvest developer secrets including SSH keys, cloud provider credentials, Kubernetes tokens, and cryptocurrency wallet keys. The incident follows a prior Trivy supply-chain compromise in February–March 2026 and highlights sustained abuse of compromised credentials to poison tag references without requiring Git-level exploitation. Read
  • Self-propagating CanisterWorm leverages ICP canisters and npm packages for decentralized supply chain compromise A previously undocumented self-spreading supply chain worm, dubbed CanisterWorm, is propagating across 47 npm packages via compromised developer accounts, enabling decentralized command and control (C2) through Internet Computer Protocol (ICP) canisters. The malware leverages postinstall hooks to deploy Python backdoors that retrieve C2 URLs from tamper-proof ICP canisters, facilitating resilient, updatable payload delivery and persistent system compromise. Initial attacks involved manual propagation using stolen npm tokens, but a subsequent variant in @teale.io/eslint-config automatically harvests tokens and self-propagates without user interaction, escalating the threat to a fully automated supply chain worm. The ICP canister infrastructure supports dynamic C2 URL updates, enabling rapid retooling of the attack chain, including a dormant state triggered by YouTube links. The scope includes 28 packages in @EmilGroup, 16 in @opengov, @teale.io/eslint-config, @airtm/uuid-base32, and @pypestream/floating-ui-dom, with persistence achieved via masquerading systemd services. The operation is attributed to the cloud-focused cybercriminal group TeamPCP, following an initial compromise of Trivy scanner releases via stolen credentials. Read
  • Langflow unauthenticated RCE vulnerability (CVE-2026-33017) exploited within 20 hours of disclosure Within 20 hours of the public disclosure of an unauthenticated remote code execution vulnerability in Langflow (CVE-2026-33017), threat actors began exploiting exposed instances to execute arbitrary Python code, harvest credentials, and potentially compromise connected databases and software supply chains. The vulnerability, assigned a CVSS score of 9.3, requires no authentication and can be triggered via a single HTTP POST request to the /api/v1/build_public_tmp/{flow_id}/flow endpoint, where attacker-controlled data is passed to an unsandboxed exec() call. The flaw affects all versions of Langflow prior to and including 1.8.1, with a fix available in development version 1.9.0.dev8. It was discovered by security researcher Aviral Srivastava and reported on February 26, 2026. Sysdig observed the first exploitation attempts within 20 hours of the March 17, 2026 advisory, despite the absence of a public proof-of-concept. Attackers rapidly progressed from automated scanning to staged payload delivery and credential harvesting, including extraction of environment variables, configuration files, and database contents. The incident underscores the accelerating timeline of vulnerability weaponization, where attackers now routinely exploit flaws within hours of disclosure, far outpacing typical patching timelines for defenders. Read
  • Critical unauthenticated RCE vulnerability in Oracle Identity Manager and Web Services Manager patched Oracle released an emergency security update addressing CVE-2026-21992, a critical unauthenticated remote code execution (RCE) vulnerability affecting Oracle Identity Manager and Oracle Web Services Manager. The flaw, with a CVSS v3.1 score of 9.8, allows remote exploitation over HTTP without authentication or user interaction, posing significant risk to exposed enterprise systems. Affected versions include Oracle Identity Manager 12.2.1.4.0, 14.1.2.1.0, and Oracle Web Services Manager 12.2.1.4.0, 14.1.2.1.0. Oracle strongly recommends immediate patching due to the vulnerability's low attack complexity and potential for widespread exploitation. The NIST NVD characterizes the flaw as "easily exploitable" and warns it may lead to full compromise of susceptible instances. As of this update, Oracle has not observed active exploitation of CVE-2026-21992 in the wild, though CISA previously added a similar Oracle Identity Manager pre-authenticated RCE flaw (CVE-2025-61757, CVSS 9.8) to its Known Exploited Vulnerabilities (KEV) catalog in November 2025, underscoring the pattern of high-risk, pre-auth RCE flaws in these products. Read
  • CISA Adds Apple WebKit, Kernel, Craft CMS, and Laravel Livewire Flaws to KEV Catalog CISA added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog on March 21, 2026, requiring federal agencies to patch them by April 3, 2026. The vulnerabilities include three Apple issues (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520), a critical Craft CMS flaw (CVE-2025-32432), and a Laravel Livewire issue (CVE-2025-54068), all under active exploitation. The Apple flaws are linked to the DarkSword iOS exploit kit, while the Craft CMS and Laravel Livewire bugs are tied to campaigns by MuddyWater and other threat actors. Exploitation of CVE-2025-32432 as a zero-day since February 2025 has been attributed to intrusion set Mimo (aka Hezb), deploying cryptocurrency miners and residential proxyware. CVE-2025-54068 is associated with Iranian state-sponsored group MuddyWater (aka Boggy Serpens), which has targeted diplomatic, energy, maritime, and financial sectors globally. Read
Last updated: 17:00 21/03/2026 UTC
  • Windows 11 Access Denied Issue on Samsung Laptops Microsoft and Samsung have released recovery guidance to resolve persistent Windows C:\ drive access issues affecting Samsung laptops running Windows 11 versions 25H2 and 24H2. Users experiencing 'Access denied' errors, app failures, or permission-related problems must follow a 29-step procedure to restore default Windows permissions and uninstall the Samsung Galaxy Connect app. The fix reinstates TrustedInstaller ownership of the C:\ drive and normalizes system behavior without modifying personal files. Affected users are advised to contact Samsung Support if issues persist after applying the update. Read
  • ThreatsDay Bulletin: Emerging Cyber Threat Trends The ThreatsDay Bulletin continues to highlight the accelerating pace of cyber threats, where attackers rapidly adapt infrastructure shifts and social engineering lures to exploit familiar systems. Recent developments include targeted exploitation of Fortinet FortiGate devices via Ransomware-as-a-Service (RaaS), active abuse of Citrix ADC/Gateway vulnerabilities in production environments, widespread misuse of Microsoft Configuration Manager (MCP) for lateral movement and data theft, and weaponized LiveChat integrations in phishing campaigns. These trends reflect a broader pattern of quiet, cumulative exposure where small tactical changes accumulate undetected until they surface as major incidents, underscoring the need for continuous monitoring and adaptive defense strategies. Read
  • SonicWall MySonicWall Breach Exposes Firewall Configuration Files Marquis Software Solutions has confirmed that its August 2025 ransomware attack exposed the personal and financial data of 672,075 individuals—including names, Social Security numbers, Taxpayer Identification Numbers, and financial account details—after threat actors exploited firewall configuration files stolen from SonicWall’s MySonicWall cloud backup breach. The company, which serves 700+ U.S. banks and credit unions, completed its forensic review in December 2025 and began notifying affected individuals in March 2026, while facing over 36 consumer class-action lawsuits and a self-initiated lawsuit against SonicWall for alleged gross negligence and misrepresentation. Marquis alleges SonicWall’s February 2025 API code change introduced the vulnerability, delayed disclosure by three weeks, and understated the breach’s scope (initially claiming <5% of customers were affected, later confirmed as 100%). The SonicWall incident began with a September 2025 breach of its MySonicWall portal, where attackers accessed AES-256-encrypted credentials, network topology details, and MFA recovery codes for all cloud backup users. This data fueled follow-on attacks, including the Marquis breach and Akira ransomware campaigns bypassing MFA via stolen OTP seeds. SonicWall collaborated with Mandiant to attribute the breach to state-sponsored actors and released remediation tools, but 950+ unpatched SMA1000 appliances remain exposed online. The Marquis lawsuit—seeking damages, indemnification, and legal fees—could set a precedent for vendor liability, as enterprises increasingly pursue legal action against cybersecurity providers for contribution or negligence in third-party breaches. CISA and SonicWall continue to urge firmware updates, credential resets, and MFA enforcement to mitigate ongoing risks. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks A new infostealer malware named Shamos is targeting Mac devices through ClickFix attacks. The malware, developed by the COOKIE SPIDER group, steals data and credentials from web browsers, Keychain, Apple Notes, and cryptocurrency wallets. The attacks use malvertising and fake GitHub repositories to lure victims into executing shell commands that download and install the malware. Since June 2025, Shamos has attempted infections in over three hundred environments monitored by CrowdStrike. The malware uses anti-VM commands, AppleScript for reconnaissance, and creates persistence through a Plist file. Users are advised to avoid executing unknown commands and to seek help from trusted sources. A new variant of the MacSync stealer, related to Shamos, is distributed through a digitally signed, notarized Swift application, bypassing macOS Gatekeeper checks. This variant uses evasion techniques such as inflating the DMG file with decoy PDFs and performing internet connectivity checks. The malware runs largely in memory and cleans up temporary files after execution, leaving minimal traces behind. The associated developer certificate has been revoked. Three distinct ClickFix campaigns have been identified distributing the MacSync infostealer via fake AI tool installers. The campaigns use various lures, including OpenAI Atlas browser and ChatGPT conversations, to trick users into executing malicious commands. The latest variant of MacSync supports dynamic AppleScript payloads and in-memory execution to evade detection. The shell script retrieves the AppleScript infostealer payload from a hard-coded server and removes evidence of data theft. The malware harvests credentials, files, keychain databases, and cryptocurrency wallet seed phrases. Read
  • Russian UNC6353 Uses Coruna and Darksword iOS Exploit Kits Across iOS 13–18.7 Targeting Financial Espionage and Data Theft The Coruna and Darksword dual iOS exploit kit campaigns continue to expand, now targeting iPhones running iOS 18.4 through 18.7 with the modular Darksword malware family. Darksword, attributed to the Russian threat actor UNC6353 alongside Coruna, leverages six known and zero-day vulnerabilities to achieve kernel read/write via Safari, enabling rapid exfiltration of cryptocurrency wallets, messages, location history, health data, and system credentials within seconds to minutes before self-wiping. The malware is a professionally engineered JavaScript platform with three documented payload families (GHOSTBLADE, GHOSTKNIFE, GHOSTSABER) used by multiple actors—UNC6353, UNC6748, and Turkish vendor PARS Defense—across Saudi Arabia, Turkey, Malaysia, and Ukraine since at least November 2025. Darksword’s OPSEC failures (unobfuscated code, plainly named components) and use of watering hole attacks mirror Coruna’s tactics, while its ‘hit-and-run’ data theft model signals a shift toward opportunistic financial espionage. Apple has patched all exploited flaws in current iOS releases (18.7.3, 26.2, 26.3.1), and users are advised to upgrade and enable Lockdown Mode if at high risk. Prior context: The Coruna exploit kit, first observed in February 2025, targeted iOS 13.0–17.2.1 with 23 exploits across five chains, used by UNC6353 and UNC6691 in watering hole attacks on Ukrainian and Chinese crypto-related websites. CISA added three Coruna-linked vulnerabilities to its Known Exploited Vulnerabilities catalog and mandated patches by March 26, 2026. Apple backported fixes to older devices, including iOS 15.8.7/16.7.15, addressing vulnerabilities linked to Operation Triangulation and U.S. military contractor L3Harris. Read
  • Privilege Escalation Vulnerability in Linux Kernel Exploited in Ransomware Attacks A high-severity privilege escalation flaw in the Linux kernel (CVE-2024-1086) is being exploited in ransomware attacks. Disclosed in January 2024, the vulnerability allows attackers with local access to escalate privileges to root level. It affects multiple major Linux distributions, including Debian, Ubuntu, Fedora, and Red Hat. The flaw was introduced in February 2014 and fixed in January 2024. Additionally, nine confused deputy vulnerabilities, codenamed CrackArmor, have been discovered in the Linux kernel's AppArmor module. These flaws, existing since 2017, allow unprivileged users to bypass kernel protections, escalate to root, and undermine container isolation guarantees. The vulnerabilities affect Linux kernels since version 4.11 and impact major distributions like Ubuntu, Debian, and SUSE. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed the exploitation of the initial flaw in ransomware campaigns and added it to its Known Exploited Vulnerabilities (KEV) catalog in May 2024. Federal agencies were ordered to secure their systems by June 20, 2024. Mitigations include blocking 'nf_tables', restricting access to user namespaces, or loading the Linux Kernel Runtime Guard (LKRG) module. Qualys Threat Research Unit discovered the CrackArmor flaws, which stem from a 'confused deputy' flaw allowing unprivileged local users to manipulate AppArmor security profiles. Over 12.6 million enterprise Linux systems are affected, and the flaws enable local privilege escalation, denial-of-service attacks, and container isolation bypass. Qualys has developed proof-of-concept exploits but has not publicly released them. Read
  • PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025, delivering the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. In February 2026, a new campaign targeting Ukrainian entities was observed, employing judicial and charity-themed lures to deploy a JavaScript-based backdoor codenamed DRILLAPP. This campaign is likely orchestrated by threat actors linked to Russia and shares overlaps with the prior PluggyApe campaign. The malware is capable of uploading and downloading files, leveraging the microphone, and capturing images through the webcam. The threat actor is believed to be active since at least April 2024. Read

Latest updates

Browse →

Tag poisoning in Trivy GitHub Actions repositories delivers cloud-native infostealer payload

Updated: 21.03.2026 19:30 · First: 20.03.2026 19:47 · 📰 2 src / 2 articles

Attackers compromised two official Trivy-related GitHub Actions repositories—aquasecurity/trivy-action and aquasecurity/setup-trivy—and backdoored Trivy v0.69.4 releases, distributing a Python-based infostealer that harvests wide-ranging CI/CD and developer secrets. The payload executes in GitHub Actions runners and Trivy binaries, remaining active for up to 12 hours in Actions tags and three hours in the malicious release. The actors leveraged compromised credentials from a prior March incident and added persistence via systemd services, while also linking to a follow-up npm campaign using the CanisterWorm self-propagating worm. The incident traces to a credential compromise initially disclosed in early March 2026, which was not fully contained and enabled subsequent tag and release manipulations. Safe releases are now available and mitigation includes pinning Actions to full SHA hashes, blocking exfiltration endpoints, and rotating all affected secrets.

Android Advanced Flow mechanism introduced for secure APK sideloading of unverified applications

Updated: · First: 21.03.2026 16:18 · 📰 1 src / 1 articles

Google is introducing Advanced Flow, a one-time, multi-step process for Android power users to sideload APKs from unverified developers while reducing the risk of malware or scam installations. Scheduled for an August rollout, the mechanism requires users to enable Developer Mode, confirm they are not under coercion, restart and reauthenticate, wait 24 hours, and then verify legitimacy before installing unverified apps. A persistent warning will be displayed during and after installation. The initiative aims to balance Android’s openness with enhanced protection against social engineering tactics that exploit urgency to bypass security controls. Global financial losses from scams exceeded $442 billion in the prior year, according to the Global Anti-Scam Alliance (GASA).

Abuse of Microsoft Azure Monitor alerting system in callback phishing campaigns

Updated: · First: 21.03.2026 16:09 · 📰 1 src / 1 articles

Threat actors are abusing Microsoft Azure Monitor’s alerting functionality to deliver callback phishing emails that impersonate Microsoft Security Team billing alerts. The emails are sent via Azure’s legitimate platform using the [email protected] address and pass SPF, DKIM, and DMARC checks, increasing their credibility. Attackers craft alerts with phishing messages in the description field, targeting users with fake unauthorized charge warnings to prompt urgent callback to fraudulent support numbers. The campaign leverages easily triggered alert rules tied to billing, invoice, payment, and resource-related events, forwarding emails to victim lists while preserving original Microsoft headers and authentication results to bypass spam filters.

Active Spyware Campaigns Targeting High-Value Signal and WhatsApp Users

Updated: 21.03.2026 15:17 · First: 25.11.2025 08:42 · 📰 8 src / 12 articles

The FBI has directly attributed ongoing Signal and WhatsApp phishing campaigns to Russian Intelligence Services-affiliated threat actors, confirming the compromise of thousands of accounts globally and emphasizing that the attacks primarily target high-value individuals such as current and former U.S. government officials, military personnel, political figures, and journalists. The campaign bypasses end-to-end encryption by hijacking accounts through sophisticated social engineering, including impersonating support services and tricking users into sharing verification codes or scanning malicious QR codes to link attacker-controlled devices to accounts. The campaign was first flagged by CISA in late 2025 and has since been confirmed by German, Dutch, and now U.S. intelligence agencies. Targets include high-ranking politicians, military officers, diplomats, and investigative journalists across Germany and Europe, with additional confirmed targeting in the U.S. and other regions. Attackers gain access to private messages, contact lists, and group chats, enabling them to impersonate victims and launch further phishing campaigns. Signal has emphasized it will never initiate contact to request verification codes or PINs, and both Signal and WhatsApp users are advised to regularly review linked devices and avoid sharing verification codes. Russia-aligned threat clusters such as Star Blizzard, UNC5792 (aka UAC-0195), and UNC4221 (aka UAC-0185) have been associated with similar tactics, and the FBI’s attribution underscores the state-sponsored nature of these operations targeting sensitive communications. French authorities have also warned of a surge in similar campaigns targeting government officials, journalists, and business leaders. Recent FBI and CISA guidance clarifies that victims who share verification codes lose account access while attackers gain monitoring and impersonation capabilities, whereas those who scan malicious QR codes enable attackers to link devices and silently access all past and future messages without the victim losing access unless explicitly removed from the app settings.

Critical unauthenticated RCE vulnerability in Oracle Identity Manager and Web Services Manager patched

Updated: 21.03.2026 12:24 · First: 20.03.2026 20:48 · 📰 2 src / 2 articles

Oracle released an emergency security update addressing CVE-2026-21992, a critical unauthenticated remote code execution (RCE) vulnerability affecting Oracle Identity Manager and Oracle Web Services Manager. The flaw, with a CVSS v3.1 score of 9.8, allows remote exploitation over HTTP without authentication or user interaction, posing significant risk to exposed enterprise systems. Affected versions include Oracle Identity Manager 12.2.1.4.0, 14.1.2.1.0, and Oracle Web Services Manager 12.2.1.4.0, 14.1.2.1.0. Oracle strongly recommends immediate patching due to the vulnerability's low attack complexity and potential for widespread exploitation. The NIST NVD characterizes the flaw as "easily exploitable" and warns it may lead to full compromise of susceptible instances. As of this update, Oracle has not observed active exploitation of CVE-2026-21992 in the wild, though CISA previously added a similar Oracle Identity Manager pre-authenticated RCE flaw (CVE-2025-61757, CVSS 9.8) to its Known Exploited Vulnerabilities (KEV) catalog in November 2025, underscoring the pattern of high-risk, pre-auth RCE flaws in these products.

CISA Adds Apple WebKit, Kernel, Craft CMS, and Laravel Livewire Flaws to KEV Catalog

Updated: · First: 21.03.2026 10:25 · 📰 1 src / 1 articles

CISA added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog on March 21, 2026, requiring federal agencies to patch them by April 3, 2026. The vulnerabilities include three Apple issues (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520), a critical Craft CMS flaw (CVE-2025-32432), and a Laravel Livewire issue (CVE-2025-54068), all under active exploitation. The Apple flaws are linked to the DarkSword iOS exploit kit, while the Craft CMS and Laravel Livewire bugs are tied to campaigns by MuddyWater and other threat actors. Exploitation of CVE-2025-32432 as a zero-day since February 2025 has been attributed to intrusion set Mimo (aka Hezb), deploying cryptocurrency miners and residential proxyware. CVE-2025-54068 is associated with Iranian state-sponsored group MuddyWater (aka Boggy Serpens), which has targeted diplomatic, energy, maritime, and financial sectors globally.

Self-propagating CanisterWorm leverages ICP canisters and npm packages for decentralized supply chain compromise

Updated: · First: 21.03.2026 09:28 · 📰 1 src / 1 articles

A previously undocumented self-spreading supply chain worm, dubbed CanisterWorm, is propagating across 47 npm packages via compromised developer accounts, enabling decentralized command and control (C2) through Internet Computer Protocol (ICP) canisters. The malware leverages postinstall hooks to deploy Python backdoors that retrieve C2 URLs from tamper-proof ICP canisters, facilitating resilient, updatable payload delivery and persistent system compromise. Initial attacks involved manual propagation using stolen npm tokens, but a subsequent variant in @teale.io/eslint-config automatically harvests tokens and self-propagates without user interaction, escalating the threat to a fully automated supply chain worm. The ICP canister infrastructure supports dynamic C2 URL updates, enabling rapid retooling of the attack chain, including a dormant state triggered by YouTube links. The scope includes 28 packages in @EmilGroup, 16 in @opengov, @teale.io/eslint-config, @airtm/uuid-base32, and @pypestream/floating-ui-dom, with persistence achieved via masquerading systemd services. The operation is attributed to the cloud-focused cybercriminal group TeamPCP, following an initial compromise of Trivy scanner releases via stolen credentials.

Takedown of fraudulent CSAM distribution scam platform "Alice with Violence CP"

Updated: · First: 20.03.2026 19:19 · 📰 1 src / 1 articles

An international law enforcement operation, codenamed Operation Alice, dismantled a fraudulent dark web platform advertising non-existent child sexual abuse material (CSAM) and cybercrime-as-a-service offerings. The platform, operated by a 35-year-old suspect based in China, lured approximately 10,000 users into paying between EUR 17 and EUR 250 in Bitcoin (totaling roughly $400,000) for advertised CSAM packages that were never delivered. The scam used previews of claimed CSAM to deceive victims into entering personal details and completing payments. The takedown involved the seizure of 287 servers across jurisdictions, with 105 servers located in Germany, and resulted in an international arrest warrant issued for the platform's operator.

Beast Ransomware Group\'s Toolset Disclosed via Misconfigured Server in German Cloud

Updated: · First: 20.03.2026 18:31 · 📰 1 src / 1 articles

A misconfigured server hosted by a German cloud provider was discovered containing the complete toolset of a Beast ransomware group affiliate, exposing the group\'s tactics, techniques, and procedures (TTPs). The server contained reconnaissance, network mapping, credential theft, exfiltration, persistence, and lateral movement tools. Analysis of the toolset reveals significant overlap with other ransomware gangs, including the use of dual-use utilities such as AnyDesk, Mega, and batch scripts aimed at disrupting backups and security processes. The exposure provides defenders with actionable intelligence on mitigations and detection strategies against ransomware operations.

Langflow unauthenticated RCE vulnerability (CVE-2026-33017) exploited within 20 hours of disclosure

Updated: 20.03.2026 17:15 · First: 20.03.2026 12:20 · 📰 2 src / 2 articles

Within 20 hours of the public disclosure of an unauthenticated remote code execution vulnerability in Langflow (CVE-2026-33017), threat actors began exploiting exposed instances to execute arbitrary Python code, harvest credentials, and potentially compromise connected databases and software supply chains. The vulnerability, assigned a CVSS score of 9.3, requires no authentication and can be triggered via a single HTTP POST request to the /api/v1/build_public_tmp/{flow_id}/flow endpoint, where attacker-controlled data is passed to an unsandboxed exec() call. The flaw affects all versions of Langflow prior to and including 1.8.1, with a fix available in development version 1.9.0.dev8. It was discovered by security researcher Aviral Srivastava and reported on February 26, 2026. Sysdig observed the first exploitation attempts within 20 hours of the March 17, 2026 advisory, despite the absence of a public proof-of-concept. Attackers rapidly progressed from automated scanning to staged payload delivery and credential harvesting, including extraction of environment variables, configuration files, and database contents. The incident underscores the accelerating timeline of vulnerability weaponization, where attackers now routinely exploit flaws within hours of disclosure, far outpacing typical patching timelines for defenders.

Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access

Updated: 20.03.2026 17:09 · First: 18.03.2026 18:00 · 📰 2 src / 2 articles

A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. Cisco issued its first advisory for CVE-2026-20131 on March 4, 2026, and Amazon Threat Intelligence confirmed active exploitation by Interlock starting in late January. CISA added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and ordered federal agencies to patch by March 22, 2026, under BOD 22-01. Post-exploitation tooling includes custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are leveraged for ransomware operations and secondary monetization.

Iran-linked destructive cyber campaign tactics and mitigation strategies against wiper attacks

Updated: · First: 20.03.2026 16:01 · 📰 1 src / 1 articles

An Iran-linked threat cluster tracked as Handala (and Void Manticore) executed a destructive wiper campaign against Stryker in March 2026 that erased tens of thousands of devices across 79 countries, disrupting manufacturing, order processing, and logistics for a Fortune 500 medical technology vendor. Unlike financially motivated ransomware, these attacks aim to create operational chaos and real-world consequences by deploying wipers via legitimate administrative tools and tunneling mechanisms to maximize lateral movement and simultaneous wiping. The event underscores a broader shift where geopolitical conflicts increasingly translate into destructive cyber operations against critical infrastructure and supply chains, requiring defenders to prioritize containment, identity controls, and administrative-path restrictions over traditional perimeter defenses.

Android sideloading protection update introduces 24-hour delay for unverified developer installs

Updated: · First: 20.03.2026 12:57 · 📰 1 src / 1 articles

Google announced a mandatory 24-hour wait period for installing apps from unverified developers on Android as part of a new advanced flow for sideloading, effective August 2026. The policy change aims to reduce malware distribution and scams by delaying installation until users confirm intent via biometric authentication or PIN after a device restart, complicating attacker persistence. Exceptions apply to ADB-based installs and verified developer channels. The move follows Google’s 2025 developer verification mandate requiring all apps on certified Android devices to be registered by verified developers to improve threat actor identification. In parallel, Google introduced limited distribution accounts for hobbyist developers and students, enabling app sharing with up to 20 devices without government ID or fees. The update arrives amid rising Android malware threats, with 17 malware families—including new variants like SURXRAT and TaxiSpy RAT—actively targeting users in Turkey, Italy, and other regions for device takeover and financial fraud.

Increased reliance on behavioral analytics required amid AI-enabled cyber attack escalation

Updated: · First: 20.03.2026 12:00 · 📰 1 src / 1 articles

Cybercriminals are increasingly leveraging artificial intelligence (AI) to enhance phishing campaigns, automate credential abuse, and obfuscate malicious activities by mimicking legitimate user behavior, thereby evading traditional rule-based and signature-based detection mechanisms. This shift necessitates the evolution of behavioral analytics from static pattern monitoring to dynamic, identity-centric risk modeling that identifies subtle behavioral inconsistencies in real time, particularly in the context of compromised credentials and privileged access misuse. The integration of AI into attack methodologies reduces reliance on malware delivery vectors and increases the scalability and stealth of social engineering, credential abuse, and adaptive malware campaigns.

UK teens targeted by radicalization into cybercrime via toxic online ecosystems

Updated: · First: 20.03.2026 11:40 · 📰 1 src / 1 articles

The UK National Crime Agency (NCA) warns that adolescents are being systematically radicalized into cybercrime through exploitative online platforms and recommendation algorithms. The director general of the NCA, Graeme Biggar, highlighted how ‘toxic online spaces’ reshape crime by accelerating its global reach, increasing harm, and blurring boundaries between cybercrime, terrorism, and sexual exploitation. He emphasized that technology is no longer merely a tool but an active driver of criminal ecosystems, with platforms failing to address responsibility for algorithmic radicalization. Biggar also noted a rise in UK-based sophisticated social engineering attacks combining malware with human manipulation, alongside escalating investment scams, sextortion, and sadistic exploitation. Despite these threats, he cited enforcement successes such as the LockBit takedown, a 27% rise in fraud convictions, and sustained child sexual abuse arrest rates.

Guilty plea in $10M AI-generated music streaming fraud scheme

Updated: · First: 20.03.2026 11:33 · 📰 1 src / 1 articles

North Carolina musician Michael Smith pleaded guilty to orchestrating a $10M fraud scheme involving the artificial inflation of streaming royalties on major platforms including Spotify, Apple Music, Amazon Music, and YouTube Music. Using AI-generated music and automated bots, Smith bypassed anti-fraud controls by leveraging over 1,000 bot accounts and VPNs to stream songs billions of times between 2017 and 2024. The operation yielded more than $10M in illicit royalties diverted from legitimate artists and rights holders.

Unauthenticated Remote Code Execution and Account Takeover via Magento PolyShell File Upload Flaw

Updated: · First: 20.03.2026 11:30 · 📰 1 src / 1 articles

A critical unrestricted file upload vulnerability in Magento’s REST API, dubbed PolyShell by Sansec, enables unauthenticated attackers to upload arbitrary executable files disguised as images and achieve remote code execution (RCE) or account takeover via stored cross-site scripting (XSS). The flaw impacts all Magento Open Source and Adobe Commerce versions up to 2.4.9-alpha2 by leveraging the custom cart item option handling in the REST API, which writes uploaded files to the server’s `pub/media/custom_options/quote/` directory. Depending on web server configuration, this can lead to RCE through PHP execution or stored XSS via malicious payloads in file metadata. No evidence of active exploitation has been observed.

Aisuru botnet conducts record-breaking DDoS attacks, targeting U.S. ISPs and Microsoft Azure

Updated: 20.03.2026 10:05 · First: 02.09.2025 18:52 · 📰 20 src / 37 articles

The **Aisuru/Kimwolf botnet ecosystem** has reached a **critical disruption milestone** after a **multi-national law enforcement operation** led by the **U.S. Department of Justice (DoJ)**, alongside **Canadian and German authorities**, successfully **dismantled the command-and-control (C2) infrastructure** of four interconnected botnets—**AISURU, Kimwolf, JackSkid, and Mossad**—on **March 20, 2026**. This **court-authorized takedown**, supported by **18+ tech firms** (including Akamai, Cloudflare, Google, AWS, and Oracle), targeted the botnets’ **3 million+ infected devices** (including **2 million+ Android TVs, routers, DVRs, and IoT cameras**), which had been weaponized to launch **record-breaking DDoS attacks** (e.g., **31.4 Tbps in November 2025**) and **hyper-volumetric campaigns** averaging **3 Bpps, 4 Tbps, and 54 Mrps**. The botnets’ **cybercrime-as-a-service model** enabled operators to sell access to compromised devices for **DDoS extortion, residential proxy monetization, and lateral movement in corporate/government networks**, with **hundreds of thousands of attack commands** issued across sectors like **telecom, gaming, IT, and critical infrastructure**. The disruption **severed C2 communications**, aiming to **prevent further infections** and **eliminate the botnets’ ability to launch future attacks**, including those targeting **U.S. Department of Defense (DoD) networks**. Despite this **first major law enforcement strike**, **persistent infections and operator evasion tactics** (e.g., **ENS-based C2, decentralized proxy abuse**) underscore the **ongoing challenge of full eradication**. Prior milestones include the botnets’ **accidental Sybil attack on the I2P anonymity network** (February 2026), their **exploitation of residential proxy networks (IPIDEA)** for internal network infiltration (January 2026), and **Google’s takedown of IPIDEA** (January 29, 2026), which reduced millions of proxy exit nodes. The DoJ’s action follows a **year of escalating hyper-volumetric attacks**, including **Cloudflare’s mitigation of 47.1 million DDoS attacks in 2025** (a **100% YoY increase**) and **Akamai’s reports of attacks exceeding 30 Tbps/14 Bpps**. While the operation marks a **significant blow to the botnets’ operational capacity**, their **adaptive resilience** and **global scale of infections** demand continued vigilance.

Microsoft account sign-in failures triggered by KB5079473 Windows 11 update

Updated: · First: 20.03.2026 09:33 · 📰 1 src / 1 articles

Microsoft reports that the March Windows 11 KB5079473 cumulative update disrupts sign-in operations for Microsoft accounts across multiple applications, including Teams, OneDrive, Microsoft Edge, Excel, Word, and Microsoft 365 Copilot. The issue causes affected systems to display an error message falsely indicating a lack of internet connectivity even when a device is online. The disruption primarily impacts consumer Microsoft accounts and not Entra ID (formerly Azure Active Directory) authentication used in enterprise environments.

Former data analyst convicted for $2.5M extortion of Brightly Software leveraging internal data access

Updated: · First: 20.03.2026 08:57 · 📰 1 src / 1 articles

A former data analyst contractor for Brightly Software (formerly SchoolDude) was found guilty of extorting the company for $2.5 million using stolen payroll and corporate data after his contract was not renewed. The individual, Cameron Curry (alias "Loot"), exploited his legitimate access to sensitive employee information to threaten data leaks and SEC reporting unless paid. The extortion campaign, which included threats to release PII and false claims about financial discrepancies, led to a Bitcoin payment of $7,540. Curry faces up to 12 years in prison for six counts of interstate extortion. Separately, Brightly disclosed a separate data breach in May 2023 impacting nearly 3 million SchoolDude customers, though this incident was unrelated to Curry’s actions.

Architectural risks in Model Context Protocol (MCP) integration enabling indirect prompt injection and tool poisoning

Updated: · First: 19.03.2026 23:54 · 📰 1 src / 1 articles

LLM-powered applications integrating the Model Context Protocol (MCP) face architectural-level risks that current security controls cannot mitigate via patching or configuration. The integration enables LLMs to autonomously execute actions (e.g., accessing enterprise data, triggering workflows, calling APIs) based on user prompts, removing the human review step inherent to traditional LLM responses. Adversaries can exploit inherent limitations in MCP and LLMs—such as the inability to distinguish content from instructions—via indirect prompt injection or tool poisoning to trigger malicious workflows (e.g., exfiltrating data, sending emails) without user awareness. Mitigations focus on operational controls rather than patches, including least-privilege MCP server permissions, traffic logging, behavioral baselines, and metadata scanning for malicious instructions.

Navia Benefit Solutions reports data exposure impacting 2.7 million individuals

Updated: · First: 19.03.2026 22:43 · 📰 1 src / 1 articles

Navia Benefit Solutions disclosed a data breach affecting approximately 2.7 million individuals, with unauthorized access detected between December 22, 2025, and January 15, 2026. The company became aware of suspicious activity on January 23, 2026, and initiated an investigation. Exposed data includes full names, dates of birth, Social Security Numbers, phone numbers, email addresses, and enrollment details for various benefits programs (HRA, FSA, COBRA). No claims or financial details were exposed, but the leaked data poses risks for phishing and social engineering campaigns. Navia has notified law enforcement and offered affected individuals 12 months of identity protection services via Kroll.

Unauthenticated remote code execution flaw in Magento and Adobe Commerce via PolyShell polyglot uploads

Updated: · First: 19.03.2026 22:01 · 📰 1 src / 1 articles

A critical unauthenticated remote code execution vulnerability named PolyShell has been disclosed in all supported versions of Magento Open Source and Adobe Commerce (version 2). The flaw stems from the REST API improperly processing file uploads in custom cart item options, enabling attackers to upload and execute polyglot files that act as both images and scripts. Depending on server configuration, this can result in remote code execution or account takeover via stored cross-site scripting. Adobe has released a fix only in the alpha release of version 2.4.9, leaving production deployments vulnerable. Exploitation attempts are expected to accelerate following public disclosure. Impact is high due to the widespread use of Magento/Adobe Commerce in e-commerce, the absence of authentication requirements, and the potential for mass compromise of storefronts.

Speagle malware leverages compromised Cobra DocGuard servers and infrastructure to exfiltrate sensitive data

Updated: · First: 19.03.2026 21:16 · 📰 1 src / 1 articles

A newly identified malware family, Speagle, has been observed hijacking the legitimate Cobra DocGuard document security platform to surreptitiously collect and exfiltrate sensitive data from infected systems. The malware abuses Cobra DocGuard’s client-server architecture and compromised servers to blend malicious communications with legitimate traffic, ensuring stealth during exfiltration. Speagle specifically targets systems where Cobra DocGuard is installed, indicating deliberate selection of victims, likely for intelligence collection or industrial espionage purposes. The operational infrastructure overlaps with prior documented abuses of Cobra DocGuard in 2022–2023, suggesting a pattern of exploiting trusted software in supply chain attacks.

Mass exploitation of signed vulnerable drivers by 54 EDR killer tools via BYOVD technique

Updated: · First: 19.03.2026 20:52 · 📰 1 src / 1 articles

Security vendors have identified 54 distinct EDR killer tools that abuse Bring Your Own Vulnerable Driver (BYOVD) techniques by exploiting 34 vulnerable, signed drivers to disable endpoint detection and response (EDR) solutions. The tools are deployed primarily by ransomware groups, affiliates, and underground service providers to neutralize security controls before executing file-encrypting malware. Attackers gain kernel-mode privileges (Ring 0) to terminate EDR processes, disable protection mechanisms, and tamper with kernel callbacks, thereby undermining endpoint defenses through abuse of Microsoft’s driver trust model.

Google Advances Quantum-Resistant HTTPS Certificates with Merkle Tree Certificates

Updated: 19.03.2026 20:19 · First: 02.03.2026 13:33 · 📰 4 src / 4 articles

Google is advancing Merkle Tree Certificates (MTCs) to secure Chrome’s HTTPS connections against quantum computing threats, with deployment underway in three phases. MTCs use compact Merkle Tree proofs to reduce bandwidth usage, improve performance, and simplify certificate transparency. Experimental testing with real internet traffic by Google and Cloudflare shows MTCs are faster than classical chains and post-quantum alternatives. Chrome plans to integrate MTCs into its Root Store by 2027, with a feasibility study underway, public deployment in Q1 2027, and the introduction of the Chrome Quantum-resistant Root Store in Q3 2027. MTCs reduce certificate sizes to approximately 840 bytes per page load, compared to 14.7 KB for post-quantum methods like ML-DSA, and require no additional action from website managers beyond server software updates.

North Korean Hackers Steal $2 Billion in Cryptocurrency in 2025

Updated: 19.03.2026 19:08 · First: 07.10.2025 20:02 · 📰 6 src / 9 articles

North Korean state-sponsored hackers, primarily the Lazarus Group and its Bluenoroff (APT38) subgroup, continue to aggressively target cryptocurrency-adjacent entities to fund the regime’s illicit activities. As of March 2026, confirmed thefts in 2025 exceeded $2 billion, with cumulative losses since 2017 surpassing $6.75 billion. Recent attacks now include e-commerce platforms like Bitrefill, where North Korean operators compromised employee devices to steal cryptocurrency and gift-card inventory. Investigations increasingly reveal sophisticated persistence, cross-chain laundering, and multi-vector social engineering, alongside new enforcement actions targeting facilitators in the U.S. Prior milestones include the record-setting Bybit breach in February 2025 ($1.5B), multiple exchange compromises (e.g., Upbit, BitoPro), and the conviction of five individuals for aiding North Korean IT worker fraud schemes that generated over $2.2M for the regime. North Korean hackers also continue to refine laundering pathways—employing mixers, bridges, obscure blockchains, and custom tokens—over approximately 45-day cycles. U.S. authorities have sought forfeiture of $15M in stolen crypto linked to APT38 and are dismantling ancillary networks used to funnel revenue to Pyongyang.

Iranian Hacktivist Group Claims Wiper Attack on Stryker

Updated: 19.03.2026 18:14 · First: 11.03.2026 18:20 · 📰 5 src / 5 articles

The Iranian hacktivist group Handala, linked to Iran's Ministry of Intelligence and Security (MOIS), conducted a targeted data-wiping attack against Stryker, a global medical technology company, on March 11, 2026. The attack disrupted over 200,000 systems across 79 countries, with Stryker confirming global disruption to its Microsoft environment and prioritizing restoration of supply-chain systems. Handala claimed responsibility, citing retaliation for a U.S. missile strike, and used Microsoft Intune to issue remote wipe commands, affecting nearly 80,000 devices. The FBI subsequently seized two Handala data leak sites under a U.S. court warrant, disrupting the group's digital infrastructure. Stryker’s operations, particularly in Ireland, suffered severe disruption with over 5,000 workers sent home, and employees reverted to manual workflows during the outage. Handala, active since late 2023, has targeted Israeli organizations historically but expanded operations in alignment with Iranian state interests. Investigators, including Microsoft DART and Palo Alto Unit 42, found no evidence of data exfiltration despite Handala’s claims, and Stryker emphasized the incident was not a ransomware attack. The FBI’s domain seizures mark a significant law enforcement response to Handala’s destructive operations.

Gentlemen Ransomware Exploits Vulnerable Driver to Disable Security Software

Updated: 19.03.2026 18:00 · First: 11.09.2025 23:42 · 📰 3 src / 5 articles

The Gentlemen ransomware group, active since summer 2025, continues to evolve its tactics while leveraging a ransomware-as-a-service (RaaS) model. The group employs dual extortion, targeting Windows, Linux, and ESXi environments, with initial access often gained through exploitation of exposed FortiGate VPN devices. Affiliates use PowerShell and WMI for lateral movement, deploy anti-forensic tools, and target backup/security systems to maximize impact. The group is known for advanced evasion techniques, including BYOVD attacks via CVE-2025-7771 in the ThrottleStop driver, tailored to disable specific security vendors' products. The gang emerged from a dispute within the Qilin RaaS ecosystem and rapidly established itself using existing tooling. Its attacks have targeted critical infrastructure, including Romania's Oltenia Energy Complex on December 26, 2025, where documents were encrypted and multiple applications (ERP, email, document management) were temporarily disabled. The company cooperated with authorities and restored systems from backups. The group uses PowerRun.exe and Allpatch2.exe for privilege escalation and ransom notes with the .7mtzhh extension. While the National Energy System was not jeopardized, the incident is still under assessment for potential data theft. The group has added nearly four dozen victims to its leak site but has not yet listed Oltenia Energy Complex, likely due to ongoing negotiations.

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog

Updated: 19.03.2026 16:55 · First: 23.01.2026 17:24 · 📰 4 src / 4 articles

CISA added the stored cross-site scripting (XSS) vulnerability CVE-2025-66376 in Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog on March 18, 2026. The flaw, patched in early November 2025, allows unauthenticated attackers to execute arbitrary JavaScript via malicious HTML emails, enabling session hijacking and data theft in compromised Zimbra environments. CISA ordered U.S. federal agencies to patch the flaw by April 1, 2026 under BOD 22-01 and encouraged all organizations to apply mitigations promptly. Russian state-sponsored threat group APT28 (Fancy Bear, Strontium), linked to Russia's military intelligence service (GRU), is actively exploiting CVE-2025-66376 in attacks targeting Ukrainian government entities, including the Ukrainian State Hydrology Agency, as part of a phishing campaign codenamed Operation GhostMail. The attack chain relies on malicious HTML email bodies with obfuscated JavaScript payloads that execute silently in vulnerable Zimbra webmail sessions to harvest credentials, session tokens, 2FA codes, saved passwords, and mailbox contents dating back 90 days, with data exfiltrated over DNS and HTTPS. This exploitation follows prior Russian campaigns against Zimbra infrastructure, including operations by Winter Vivern (since February 2023) and APT29 (Cozy Bear, Midnight Blizzard) in October 2024.