CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 18:15 18/03/2026 UTC
  • GlassWorm malware targets OpenVSX, VS Code registries The GlassWorm malware campaign has resurfaced with a significant escalation, adding at least 72 new malicious Open VSX extensions since January 31, 2026. The malware uses invisible Unicode characters to hide malicious code and targets GitHub, NPM, and OpenVSX account credentials, as well as cryptocurrency wallet data. The campaign initially impacted 49 extensions, with an estimated 35,800 downloads, though this figure includes inflated numbers due to bots and visibility-boosting tactics. The Eclipse Foundation has revoked leaked tokens and introduced security measures, but the threat actors have pivoted to GitHub and now returned to OpenVSX with updated command-and-control endpoints. The malware's global reach includes systems in the United States, South America, Europe, Asia, and a government entity in the Middle East. Koi Security has accessed the attackers' server and shared victim data with law enforcement. The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure. The third wave of GlassWorm uses Rust-based implants packaged inside the extensions and targets popular tools and developer frameworks like Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. The GlassWorm campaign now abuses extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery vehicles in later updates. The new extensions mimic widely used developer utilities and feature heavier obfuscation and Solana wallet rotation to evade detection. The campaign also affects 151 GitHub repositories and two npm packages using the same Unicode technique. Additionally, 88 new malicious npm packages were uploaded in three waves between November 2025 and February 2026, using Remote Dynamic Dependencies (RDD) to modify malicious code on the fly. The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py. The earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact. This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL. The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026. The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day. The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model. Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves. The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover. The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method. Read
  • Ubuntu desktop local privilege escalation via snap-confine and systemd-tmpfiles interaction A local privilege escalation (LPE) vulnerability has been disclosed in Ubuntu Desktop 24.04 and later, tracked as CVE-2026-3888, enabling attackers with minimal access to escalate to full root privileges. The flaw results from the interaction between snap-confine and systemd-tmpfiles, where attackers exploit delayed automated cleanup processes (10–30 days) to replace critical directories with malicious payloads. Triggering snap-confine execution of these files achieves root access without requiring user interaction. Impact includes complete system compromise on affected Ubuntu releases using vulnerable snapd versions. Read
  • ShieldGuard malicious browser extension operation dismantled after data harvesting campaign uncovered A cryptocurrency-themed browser extension named ShieldGuard, marketed as a security tool for crypto wallets, was dismantled after researchers discovered it functioned as malware designed to harvest sensitive user data from major crypto platforms and general browsing sessions. The operation employed social media promotion, browser extension listings, and token airdrop incentives to lure users into installing the malicious extension. ShieldGuard targeted Binance, Coinbase, MetaMask, and general browsing activity, capturing wallet addresses, HTML content post-login, session persistence, and enabling remote code execution via a command-and-control (C2) server. Read
  • Refund fraud operationalized as underground service economy targeting major retailers and payment platforms A structured underground market has emerged where threat actors commodify refund fraud techniques as tutorials, operational guides, and "as-a-service" offerings to exploit major retailers and payment platforms. Actors profit by manipulating customer-service processes, return policies, and chargeback systems—leveraging social engineering and knowledge of internal workflows rather than malware or hacking. The schemes target high-volume consumer platforms such as Amazon, PayPal, Apple, eBay, Walmart, Best Buy, and digital payment services, capitalizing on customer-friendly refund policies. Retailers processed approximately $685 billion in returns in 2024, with an estimated $103 billion (15%) attributed to fraudulent activity, compounded by $4 in operational costs per $1 lost. Fraud methods sold online include refund without return, chargeback fraud, goods swapping, empty-box returns, and policy manipulation. The ecosystem lowers barriers to entry, enabling novice and experienced actors alike to participate in scalable refund fraud schemes, with tutorials priced between $50 and $300 and commission-based "refund fraud as a service" models. Read
  • LeakNet ransomware expands operations with ClickFix social engineering and Deno-based in-memory execution LeakNet ransomware has expanded its operations by adopting the ClickFix social engineering tactic delivered through compromised websites, which instruct users to run malicious 'msiexec.exe' commands via fake CAPTCHA checks. The group continues to deploy a Deno-based in-memory loader to execute Base64-encoded JavaScript payloads, fingerprint systems, and stage follow-on malware via polling loops, while maintaining a consistent post-exploitation chain involving DLL sideloading, credential discovery via 'klist', lateral movement via PsExec, and data staging using compromised Amazon S3 buckets. LeakNet first emerged in November 2024, presenting itself as a 'digital watchdog' focused on internet freedom and transparency, and has targeted industrial entities according to Dragos. The group’s shift away from initial access brokers reduces per-victim costs and operational bottlenecks. ReliaQuest also observed a separate intrusion attempt using Microsoft Teams-based phishing leading to a Deno-based loader, suggesting either a broadening of LeakNet’s tactics or adoption by other actors. The operation’s average of three monthly victims may increase as the group scales its new initial access and execution methods. Read
  • Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. The attack chain includes post-exploitation tooling such as custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are being leveraged for ransomware operations and secondary monetization. Read
  • Increased Scanning for PAN-OS GlobalProtect Vulnerability The Interlock ransomware gang has been exploiting a zero-day remote code execution (RCE) vulnerability in Cisco’s Secure Firewall Management Center (FMC) software (CVE-2026-20131) since January 26, 2026, nearly two months before Cisco’s March 4, 2026 patch. The flaw, due to insecure Java deserialization, allowed unauthenticated attackers to execute arbitrary code as root via the web-based management interface. Amazon’s threat intelligence team reported active exploitation in attacks targeting enterprise firewalls, while Cisco initially stated there was no evidence of in-the-wild abuse. The vulnerability’s disclosure underscores the persistent risk of zero-day exploits in critical infrastructure, compounded by Interlock’s prior activities, including links to ClickFix and campaigns deploying the NodeSnake remote access trojan against U.K. universities since 2024. Read
Last updated: 14:30 18/03/2026 UTC
  • Vidar 2.0 Infostealer Emerges as Lumma Stealer Declines Vidar 2.0 has expanded its operations through malvertising campaigns leveraging fake game cheats distributed on GitHub and Reddit. Hundreds of GitHub repositories are being used to deliver the infostealer, with Reddit posts promoting Counter-Strike 2 cheats that redirect to malicious sites. The campaigns employ sophisticated loaders with PowerShell scripts and obfuscated AutoIt payloads, alongside advanced evasion techniques such as Defender exclusions, Themida packing, and Telegram/Steam dead-drop C2 resolvers. The infostealer, first announced on October 6, 2025, by developer "Loadbaks," has evolved into a stealthier and more powerful threat with multithreaded execution, polymorphic builds, and advanced anti-analysis features. Its rising adoption follows law enforcement disruption of rival infostealers Lumma and Rhadamanthys, reshaping the infostealer landscape. Read
  • Veeam Patches Multiple Critical RCE Vulnerabilities in Backup & Replication Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software, including seven new RCE flaws. The latest updates patch vulnerabilities (CVE-2026-21666, CVE-2026-21667, CVE-2026-21668, CVE-2026-21669, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708) that allow low-privileged domain users and Backup Viewers to execute remote code on vulnerable backup servers. Additionally, several high-severity bugs were addressed, which could be exploited to escalate privileges, extract SSH credentials, and manipulate files on Backup Repositories. All vulnerabilities affect earlier versions and have been fixed in versions 12.3.2.4465 and 13.0.1.2067. Veeam has warned admins to upgrade to the latest release promptly, as threat actors often develop exploits post-patch release. Ransomware gangs, including FIN7 and the Cuba ransomware gang, have targeted VBR servers to simplify data theft and block restoration efforts. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks A new infostealer malware named Shamos is targeting Mac devices through ClickFix attacks. The malware, developed by the COOKIE SPIDER group, steals data and credentials from web browsers, Keychain, Apple Notes, and cryptocurrency wallets. The attacks use malvertising and fake GitHub repositories to lure victims into executing shell commands that download and install the malware. Since June 2025, Shamos has attempted infections in over three hundred environments monitored by CrowdStrike. The malware uses anti-VM commands, AppleScript for reconnaissance, and creates persistence through a Plist file. Users are advised to avoid executing unknown commands and to seek help from trusted sources. A new variant of the MacSync stealer, related to Shamos, is distributed through a digitally signed, notarized Swift application, bypassing macOS Gatekeeper checks. This variant uses evasion techniques such as inflating the DMG file with decoy PDFs and performing internet connectivity checks. The malware runs largely in memory and cleans up temporary files after execution, leaving minimal traces behind. The associated developer certificate has been revoked. Three distinct ClickFix campaigns have been identified distributing the MacSync infostealer via fake AI tool installers. The campaigns use various lures, including OpenAI Atlas browser and ChatGPT conversations, to trick users into executing malicious commands. The latest variant of MacSync supports dynamic AppleScript payloads and in-memory execution to evade detection. The shell script retrieves the AppleScript infostealer payload from a hard-coded server and removes evidence of data theft. The malware harvests credentials, files, keychain databases, and cryptocurrency wallet seed phrases. Read
  • Russian FSB-linked Hackers Exploit Cisco Smart Install Vulnerability for Cyber Espionage Static Tundra, a Russian state-sponsored cyber espionage group linked to the FSB's Center 16 unit, has been actively exploiting a seven-year-old vulnerability in Cisco IOS and IOS XE software (CVE-2018-0171) to gain persistent access to target networks. The group has been targeting organizations in telecommunications, higher education, manufacturing, and critical infrastructure sectors across multiple continents. The attacks involve collecting configuration files, deploying custom tools like SYNful Knock, and modifying TACACS+ configurations to achieve long-term access and information gathering. The FBI and Cisco Talos have issued advisories warning about the ongoing campaign, which has been active for over a year and has targeted critical infrastructure sectors in the US and abroad. The group has also increased attacks on Ukraine since the start of the war. The vulnerability allows unauthenticated, remote attackers to execute arbitrary code or trigger DoS conditions. Cisco has advised customers to apply the patch for CVE-2018-0171 or disable Smart Install to mitigate the risk. The group has also targeted networks of US state, local, territorial, and tribal (SLTT) government organizations and aviation entities over the last decade. The threat extends beyond Russia's operations—other state-sponsored actors are likely conducting similar network device compromise campaigns. Additionally, the INC ransomware operation has been targeting healthcare organizations in Oceania, including Australia, New Zealand, and Tonga. The Australian Cyber Security Centre (ACSC), CERT Tonga, and New Zealand's National Cyber Security Centre (NCSC) issued a joint advisory on March 6, 2026, about INC's targeting of critical networks in the region. INC initially focused on the US and the UK but expanded to Australia in the summer of 2024, targeting professional services and healthcare industries. The ACSC responded to 11 INC ransomware attacks in Australia between July 2024 and December 2025, predominantly affecting healthcare or professional services companies. Read
  • Ransomware extortion totals $2.1B from 2022 to 2024, FinCEN reports FinCEN's report reveals that ransomware gangs extorted over $2.1 billion from 2022 to 2024, with a peak in 2023 followed by a decline in 2024 due to law enforcement actions against major gangs like ALPHV/BlackCat and LockBit. The report details 4,194 ransomware incidents, with manufacturing, financial services, and healthcare being the most targeted industries. The top ransomware families, including Akira, ALPHV/BlackCat, and LockBit, were responsible for the majority of attacks and ransom payments, with Bitcoin being the primary payment method. Recently, the U.S. Department of Justice charged Angelo Martino, a former DigitalMint employee, for his involvement in a scheme with the BlackCat (ALPHV) ransomware operation. Martino shared confidential information with BlackCat operators and was directly involved in ransomware attacks alongside accomplices Kevin Tyler Martin and Ryan Goldberg. The defendants operated as BlackCat affiliates, demanding ransom payments and threatening to leak data stolen from victims' networks. Read
  • Privilege Escalation Vulnerability in Linux Kernel Exploited in Ransomware Attacks A high-severity privilege escalation flaw in the Linux kernel (CVE-2024-1086) is being exploited in ransomware attacks. Disclosed in January 2024, the vulnerability allows attackers with local access to escalate privileges to root level. It affects multiple major Linux distributions, including Debian, Ubuntu, Fedora, and Red Hat. The flaw was introduced in February 2014 and fixed in January 2024. Additionally, nine confused deputy vulnerabilities, codenamed CrackArmor, have been discovered in the Linux kernel's AppArmor module. These flaws, existing since 2017, allow unprivileged users to bypass kernel protections, escalate to root, and undermine container isolation guarantees. The vulnerabilities affect Linux kernels since version 4.11 and impact major distributions like Ubuntu, Debian, and SUSE. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed the exploitation of the initial flaw in ransomware campaigns and added it to its Known Exploited Vulnerabilities (KEV) catalog in May 2024. Federal agencies were ordered to secure their systems by June 20, 2024. Mitigations include blocking 'nf_tables', restricting access to user namespaces, or loading the Linux Kernel Runtime Guard (LKRG) module. Qualys Threat Research Unit discovered the CrackArmor flaws, which stem from a 'confused deputy' flaw allowing unprivileged local users to manipulate AppArmor security profiles. Over 12.6 million enterprise Linux systems are affected, and the flaws enable local privilege escalation, denial-of-service attacks, and container isolation bypass. Qualys has developed proof-of-concept exploits but has not publicly released them. Read
  • PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025, delivering the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. In February 2026, a new campaign targeting Ukrainian entities was observed, employing judicial and charity-themed lures to deploy a JavaScript-based backdoor codenamed DRILLAPP. This campaign is likely orchestrated by threat actors linked to Russia and shares overlaps with the prior PluggyApe campaign. The malware is capable of uploading and downloading files, leveraging the microphone, and capturing images through the webcam. The threat actor is believed to be active since at least April 2024. Read

Latest updates

Browse →

ConnectWise ScreenConnect cryptographic signature bypass leading to unauthorized access fixed in version 26.1

Updated: · First: 18.03.2026 20:10 · 📰 1 src / 1 articles

A critical cryptographic signature verification vulnerability in ConnectWise ScreenConnect versions prior to 26.1 allows attackers to extract ASP.NET machine keys and forge authentication tokens, enabling unauthorized access and privilege escalation. The flaw, tracked as CVE-2026-3564, affects both cloud-hosted and on-premises deployments and has been observed being targeted in the wild. Exploitation results in unauthorized session authentication and potential compromise of managed systems accessed via ScreenConnect.

North Korean APTs Leverage AI to Enhance IT Worker Scams

Updated: 18.03.2026 19:26 · First: 06.03.2026 19:49 · 📰 3 src / 3 articles

North Korea's state-linked APTs—particularly Jasper Sleet and Coral Sleet—continue to expand their IT worker scams using AI to fabricate identities, automate social engineering, and deploy malware, while simultaneously diversifying revenue streams to fund weapons programs. OFAC sanctions now confirm the scheme's scale and structure, revealing a multi-tiered network of recruiters, facilitators, IT workers, and collaborators that has infiltrated U.S. and international companies to steal sensitive data and extort victims. The use of AI tools like Faceswap for identity fabrication and Astrill VPN for geographic obfuscation underscores the sophistication of these operations, which are deeply embedded in North Korea's sanctions-evasion and revenue-generation machinery. Initial reporting by Microsoft documented how Jasper Sleet and Coral Sleet leverage AI to research job postings, generate fake resumes, create culturally tailored digital personas, and develop web infrastructure for malicious purposes. These groups use AI coding tools to refine malware and jailbreak LLMs to generate malicious code, complicating detection while enabling long-term persistence as insider threats. The scheme's expansion into malware deployment and extortion activities further increases its impact, with a significant portion of earnings funneled back to North Korea to support its missile programs.

Increased Scanning for PAN-OS GlobalProtect Vulnerability

Updated: 18.03.2026 18:53 · First: 02.10.2025 14:30 · 📰 2 src / 2 articles

The Interlock ransomware gang has been exploiting a zero-day remote code execution (RCE) vulnerability in Cisco’s Secure Firewall Management Center (FMC) software (CVE-2026-20131) since January 26, 2026, nearly two months before Cisco’s March 4, 2026 patch. The flaw, due to insecure Java deserialization, allowed unauthenticated attackers to execute arbitrary code as root via the web-based management interface. Amazon’s threat intelligence team reported active exploitation in attacks targeting enterprise firewalls, while Cisco initially stated there was no evidence of in-the-wild abuse. The vulnerability’s disclosure underscores the persistent risk of zero-day exploits in critical infrastructure, compounded by Interlock’s prior activities, including links to ClickFix and campaigns deploying the NodeSnake remote access trojan against U.K. universities since 2024.

Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access

Updated: · First: 18.03.2026 18:00 · 📰 1 src / 1 articles

A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. The attack chain includes post-exploitation tooling such as custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are being leveraged for ransomware operations and secondary monetization.

Ubuntu desktop local privilege escalation via snap-confine and systemd-tmpfiles interaction

Updated: · First: 18.03.2026 17:45 · 📰 1 src / 1 articles

A local privilege escalation (LPE) vulnerability has been disclosed in Ubuntu Desktop 24.04 and later, tracked as CVE-2026-3888, enabling attackers with minimal access to escalate to full root privileges. The flaw results from the interaction between snap-confine and systemd-tmpfiles, where attackers exploit delayed automated cleanup processes (10–30 days) to replace critical directories with malicious payloads. Triggering snap-confine execution of these files achieves root access without requiring user interaction. Impact includes complete system compromise on affected Ubuntu releases using vulnerable snapd versions.

SonicWall MySonicWall Breach Exposes Firewall Configuration Files

Updated: 18.03.2026 17:32 · First: 17.09.2025 19:23 · 📰 16 src / 26 articles

Marquis Software Solutions has **confirmed** that its **August 2025 ransomware attack** exposed the **personal and financial data of 672,075 individuals**—including names, Social Security numbers, Taxpayer Identification Numbers, and financial account details—after threat actors exploited firewall configuration files stolen from SonicWall’s MySonicWall cloud backup breach. The company, which serves **700+ U.S. banks and credit unions**, completed its forensic review in **December 2025** and began notifying affected individuals in **March 2026**, while facing **over 36 consumer class-action lawsuits** and a self-initiated **lawsuit against SonicWall** for alleged **gross negligence and misrepresentation**. Marquis alleges SonicWall’s **February 2025 API code change** introduced the vulnerability, delayed disclosure by three weeks, and understated the breach’s scope (initially claiming <5% of customers were affected, later confirmed as 100%). The SonicWall incident began with a **September 2025 breach** of its MySonicWall portal, where attackers accessed **AES-256-encrypted credentials, network topology details, and MFA recovery codes** for all cloud backup users. This data fueled follow-on attacks, including the **Marquis breach** and Akira ransomware campaigns bypassing MFA via stolen OTP seeds. SonicWall collaborated with Mandiant to attribute the breach to **state-sponsored actors** and released remediation tools, but **950+ unpatched SMA1000 appliances** remain exposed online. The Marquis lawsuit—seeking damages, indemnification, and legal fees—could set a precedent for **vendor liability**, as enterprises increasingly pursue legal action against cybersecurity providers for contribution or negligence in third-party breaches. CISA and SonicWall continue to urge firmware updates, credential resets, and MFA enforcement to mitigate ongoing risks.

ShieldGuard malicious browser extension operation dismantled after data harvesting campaign uncovered

Updated: · First: 18.03.2026 16:15 · 📰 1 src / 1 articles

A cryptocurrency-themed browser extension named ShieldGuard, marketed as a security tool for crypto wallets, was dismantled after researchers discovered it functioned as malware designed to harvest sensitive user data from major crypto platforms and general browsing sessions. The operation employed social media promotion, browser extension listings, and token airdrop incentives to lure users into installing the malicious extension. ShieldGuard targeted Binance, Coinbase, MetaMask, and general browsing activity, capturing wallet addresses, HTML content post-login, session persistence, and enabling remote code execution via a command-and-control (C2) server.

Refund fraud operationalized as underground service economy targeting major retailers and payment platforms

Updated: · First: 18.03.2026 16:05 · 📰 1 src / 1 articles

A structured underground market has emerged where threat actors commodify refund fraud techniques as tutorials, operational guides, and "as-a-service" offerings to exploit major retailers and payment platforms. Actors profit by manipulating customer-service processes, return policies, and chargeback systems—leveraging social engineering and knowledge of internal workflows rather than malware or hacking. The schemes target high-volume consumer platforms such as Amazon, PayPal, Apple, eBay, Walmart, Best Buy, and digital payment services, capitalizing on customer-friendly refund policies. Retailers processed approximately $685 billion in returns in 2024, with an estimated $103 billion (15%) attributed to fraudulent activity, compounded by $4 in operational costs per $1 lost. Fraud methods sold online include refund without return, chargeback fraud, goods swapping, empty-box returns, and policy manipulation. The ecosystem lowers barriers to entry, enabling novice and experienced actors alike to participate in scalable refund fraud schemes, with tutorials priced between $50 and $300 and commission-based "refund fraud as a service" models.

Coruna and Darksword iOS Exploit Kits Used by Russian Threat Actor UNC6353 Across Multiple iOS Versions

Updated: 18.03.2026 16:02 · First: 04.03.2026 15:28 · 📰 7 src / 7 articles

The Coruna iOS exploit kit campaign has expanded with the emergence of a new, highly sophisticated iOS malware family named Darksword. Targeting iPhones running iOS 18.4 through 18.6.2, Darksword is attributed to the Russian threat actor UNC6353, which is also linked to the earlier Coruna exploit kit. Discovered by Lookout Threat Labs in collaboration with Google’s Threat Intelligence Group and iVerify, Darksword leverages known but patched vulnerabilities to execute kernel read/write attacks via Safari, enabling rapid exfiltration of sensitive data including cryptocurrency wallets, messages, location history, and health data. The malware is designed as a modular, professionally engineered platform with evidence of large language model tools used for development and extensibility. Unlike Coruna, Darksword focuses on immediate data theft and self-wipes temporary files after exfiltration, indicating a shift toward opportunistic financial espionage rather than long-term surveillance. Apple has already patched the exploited vulnerabilities in current iOS releases, and users are advised to upgrade to iOS 26.3.1 and enable Lockdown Mode if at high risk. Prior context: The Coruna exploit kit, first observed in February 2025, targeted iOS versions 13.0 to 17.2.1 with 23 exploits across five chains, used by multiple actors including UNC6353 and UNC6691. It delivered payloads via the PlasmaGrid stager to steal wallet recovery phrases and other sensitive data, and was used in watering hole attacks on Ukrainian and Chinese crypto-related websites. CISA added three Coruna-linked vulnerabilities to its Known Exploited Vulnerabilities catalog, and Apple backported fixes to older devices. The Coruna kit marked a shift from targeted spyware to broader iOS exploitation, including crypto theft, and was linked to U.S. military contractor L3Harris via Operation Zero.

Compromise of Nordstrom's Salesforce-OKTA integration leveraged for cryptocurrency scam distribution

Updated: · First: 18.03.2026 15:55 · 📰 1 src / 1 articles

An attacker compromised a Nordstrom marketing infrastructure path via an Okta SSO to Salesforce integration, then sent fraudulent St. Patrick’s Day cryptocurrency scam emails to Nordstrom customers from the legitimate [email protected] address. The emails urged recipients to rapidly deposit crypto to double the amount within two hours, using grammatical errors and urgency to deceive. Nordstrom confirmed the unauthorized campaign and warned customers that no legitimate Nordstrom communication requests crypto transfers. Some customers reportedly sent funds to attacker-controlled wallet addresses before the company issued a takedown notice.

AI-driven acceleration of exploitation timelines reduces window between vulnerability disclosure and active attacks

Updated: · First: 18.03.2026 15:00 · 📰 1 src / 1 articles

In 2025, threat actors leveraged AI and automation to compress the time between public vulnerability disclosure and exploitation from weeks to days or even minutes, significantly reducing the traditional "predictive window" for defenders. The median time between vulnerability publication and inclusion in CISA’s Known Exploited Vulnerabilities (KEV) catalog decreased from 8.5 days to 5 days, while the mean dropped from 61 days to 28.5 days. The use of AI accelerated reconnaissance, automated decision-making, and industrialized social engineering, enabling rapid weaponization of known weaknesses such as exposed services, weak identity controls, and unpatched edge infrastructure. Confirmed exploitation of high-severity CVEs (CVSS 7–10) rose 105% year-over-year, with deserialization, authentication bypass, and memory corruption flaws most frequently exploited—often against file transfer systems, edge appliances, and collaboration platforms.

Magecart skimmer leverages favicon EXIF steganography in web supply chain attack chain

Updated: · First: 18.03.2026 13:58 · 📰 1 src / 1 articles

A recently observed Magecart skimmer employs a three-stage loader chain that conceals its malicious payload within the EXIF metadata of a dynamically loaded favicon, executing entirely in the browser during checkout without ever residing in the merchant’s source code or repository. The attack abuses third-party CDN-hosted resources (legitimate-looking favicon paths) and leverages JavaScript obfuscation and dynamic script injection to retrieve and decode the payload from binary image data. Stolen payment data is exfiltrated directly from the victim’s browser to attacker-controlled infrastructure. This campaign highlights the operational blind spot of repository-centric static analysis tools, which cannot detect threats injected into third-party assets or embedded in runtime-executed binary metadata. The technique underscores the need for continuous client-side runtime monitoring as a critical control layer for web supply chain attacks.

Unauthenticated Root Access Flaws Disclosed in Multiple IP KVM Vendors

Updated: · First: 18.03.2026 13:42 · 📰 1 src / 1 articles

Nine vulnerabilities across IP KVM devices from four vendors enable unauthenticated attackers to gain root access, execute arbitrary code, or bypass security controls, posing critical risks to connected systems. The flaws span GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and JetKVM, with the most severe allowing unauthenticated root access or arbitrary code execution. Exploitation can undermine Secure Boot, disk encryption, and operating system-level security measures, granting persistent, undetected access to compromised hosts. Researchers highlight systemic issues including missing firmware signature validation, absent authentication, and exposed debug interfaces as recurring themes.

Vidar 2.0 Infostealer Emerges as Lumma Stealer Declines

Updated: 18.03.2026 13:15 · First: 23.10.2025 13:00 · 📰 2 src / 2 articles

Vidar 2.0 has expanded its operations through malvertising campaigns leveraging fake game cheats distributed on GitHub and Reddit. Hundreds of GitHub repositories are being used to deliver the infostealer, with Reddit posts promoting Counter-Strike 2 cheats that redirect to malicious sites. The campaigns employ sophisticated loaders with PowerShell scripts and obfuscated AutoIt payloads, alongside advanced evasion techniques such as Defender exclusions, Themida packing, and Telegram/Steam dead-drop C2 resolvers. The infostealer, first announced on October 6, 2025, by developer "Loadbaks," has evolved into a stealthier and more powerful threat with multithreaded execution, polymorphic builds, and advanced anti-analysis features. Its rising adoption follows law enforcement disruption of rival infostealers Lumma and Rhadamanthys, reshaping the infostealer landscape.

Mesh CSMA Platform Introduces Continuous Attack Path Discovery and Remediation for Critical Assets

Updated: · First: 18.03.2026 12:30 · 📰 1 src / 1 articles

Mesh Security has operationalized Gartner’s Cybersecurity Mesh Architecture (CSMA) by launching a platform that continuously discovers, prioritizes, and eliminates viable multi-hop attack paths to critical assets (Crown Jewels) through unified context across existing security tools. The platform addresses the operational gap where isolated signals—such as misconfigurations, entitlement overreach, or unpatched vulnerabilities—fail to be correlated into actionable attack paths. Mesh CSMA builds an identity-centric Mesh Context Graph™ that maps relationships between users, workloads, services, and data stores, anchoring all risk assessment to business-critical systems. Viable attack paths are dynamically ranked using live threat intelligence, and remediation actions are orchestrated across tools (CSPM, IGA, ZTNA, etc.) without requiring rip-and-replace of existing infrastructure. The solution includes continuous validation of detection gaps, enabling proactive risk reduction across prevention, detection, and response.

Gartner forecasts AI-related incidents to dominate enterprise IR workloads by 2028

Updated: · First: 18.03.2026 11:40 · 📰 1 src / 1 articles

Gartner predicts that by 2028, at least 50% of enterprise incident response efforts will focus on resolving security issues stemming from custom-built AI applications, driven by their rapid deployment without adequate testing and security controls. Security teams currently lack defined processes for handling AI-related incidents, leading to prolonged resolution times and elevated operational overhead. To mitigate risks, Gartner advises integrating security teams early in AI development lifecycles to enforce controls, a strategy termed "shifting left". Concurrently, AI-powered security tools are expected to become critical, with 50% of organizations adopting such platforms within two years to protect third-party AI services and custom-built applications against threats like prompt injection and data misuse.

Ubuntu privilege escalation via snap-confine and systemd-tmpfiles timing attack

Updated: · First: 18.03.2026 10:08 · 📰 1 src / 1 articles

A high-severity vulnerability in default Ubuntu installations (versions 24.04 and later) enables local attackers to escalate privileges to root by exploiting a timing-based interaction between snap-confine and systemd-tmpfiles. Exploitation requires low privileges and no user interaction, but depends on a specific cleanup window (10–30 days) where systemd-tmpfiles removes the /tmp/.snap directory. Attackers can then recreate the directory with malicious payloads that snap-confine bind mounts during sandbox initialization, executing arbitrary code with root privileges.

Background Security Improvements update issued to remediate CVE-2026-20643 WebKit navigation bypass

Updated: 18.03.2026 08:31 · First: 18.03.2026 03:06 · 📰 2 src / 2 articles

Apple’s Background Security Improvements update addressed CVE-2026-20643, a WebKit flaw enabling malicious web content to bypass Same Origin Policy restrictions via the Navigation API. The vulnerability impacted iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2, exposing users to data leakage or spoofing risks. The fix was delivered as a lightweight, out-of-band patch via Apple’s Background Security Improvements mechanism, eliminating the need for a full OS upgrade or device restart. Background Security Improvements updates can be managed via Privacy & Security settings, with options for automatic installation and rollback to baseline OS versions if removed.

Unauthenticated Remote Root Code Execution Vulnerability in GNU InetUtils Telnetd (CVE-2026-32746)

Updated: · First: 18.03.2026 07:06 · 📰 1 src / 1 articles

An unauthenticated remote attacker can execute arbitrary code with root privileges via CVE-2026-32746, a critical out-of-bounds write vulnerability in the GNU InetUtils telnet daemon (telnetd) affecting versions through 2.7. The flaw resides in the LINEMODE Set Local Characters (SLC) suboption handler during the initial Telnet handshake, enabling exploitation before any login prompt appears. Successful exploitation requires only a single connection to port 23 and does not require credentials, user interaction, or special network positioning, leading to potential full system compromise.

Shifting ransomware tactics toward built-in Windows utilities as payment rates decline

Updated: · First: 17.03.2026 23:41 · 📰 1 src / 1 articles

Ransomware operators increasingly rely on native Windows utilities and built-in tooling to evade detection amid declining ransom payments and heightened defensive measures. Initial access frequently leverages stolen credentials (21%) and exploited vulnerabilities in VPNs and firewalls (33%), while lateral movement predominantly uses RDP (85%), SMB, and SSH. Data theft accompanies 77% of attacks, with victim shaming via leak sites rising despite reduced payment rates. The ecosystem’s disruption—driven by law enforcement, crowded actor competition, and improved recovery—has pushed adversaries toward ‘evasion through normalcy,’ reducing reliance on signatured tools like Cobalt Strike Beacon (2% in 2025 vs. 11% in 2024) and Mimikatz (18% in 2025 vs. 20% in 2024).

EU sanctions Chinese and Iranian entities for state-backed cyber operations and influence campaigns

Updated: · First: 17.03.2026 20:41 · 📰 1 src / 1 articles

The Council of the European Union imposed sanctions on three Chinese companies, two Iranian entities, and two individuals for their roles in cyberattacks, botnet operations, and influence campaigns targeting the EU and third countries. The measures include asset freezes and travel bans, targeting entities and individuals involved in compromising over 65,000 devices, critical infrastructure intrusions, SMS service hijacking, and misinformation campaigns during major events. The sanctions align with prior actions by U.S. authorities, which previously linked some entities to state-sponsored threat actors and documented extensive offensive operations.

DNS Exfiltration in AWS Bedrock Code Interpreter

Updated: 17.03.2026 18:39 · First: 16.03.2026 15:00 · 📰 2 src / 2 articles

Security researchers and BeyondTrust demonstrated a DNS-based data exfiltration method in AWS Bedrock AgentCore Code Interpreter's sandbox mode, allowing attackers to establish bidirectional command-and-control channels, obtain interactive reverse shells, and exfiltrate sensitive data via DNS queries despite network isolation restrictions. The technique leverages malicious instructions embedded in files and requires overly permissive IAM roles to access AWS resources such as S3 buckets. AWS confirmed the behavior as intended functionality and updated documentation, recommending migration from sandbox mode to VPC mode for sensitive workloads. BeyondTrust assigned a CVSS score of 7.5 to the issue. The findings highlight architectural challenges in sandbox isolation and underscore the risks of overprivileged IAM roles in AI code execution environments.

Android OS-level manipulation enables bypass of mobile payment security controls via system API abuse

Updated: · First: 17.03.2026 18:30 · 📰 1 src / 1 articles

An Android runtime manipulation technique leveraging the LSPosed framework has been disclosed, enabling attackers to intercept, spoof, or inject data at the OS level to bypass mobile payment protections such as SMS-based 2FA, SIM-binding, and app integrity checks. The attack targets legitimate payment apps without code modification, retaining valid signatures and evading Google Play Protect. Malicious modules like "Digital Lutera" hook system APIs to intercept SMS 2FA tokens, spoof device identities, and manipulate device databases in real time. By combining a compromised victim device with a manipulated attacker-controlled device, fraudsters exploit weakened SIM-binding and backend trust models to authorize unauthorized transactions and reset payment PINs without user awareness.

LeakNet ransomware expands operations with ClickFix social engineering and Deno-based in-memory execution

Updated: 17.03.2026 16:34 · First: 17.03.2026 14:09 · 📰 2 src / 2 articles

LeakNet ransomware has expanded its operations by adopting the ClickFix social engineering tactic delivered through compromised websites, which instruct users to run malicious 'msiexec.exe' commands via fake CAPTCHA checks. The group continues to deploy a Deno-based in-memory loader to execute Base64-encoded JavaScript payloads, fingerprint systems, and stage follow-on malware via polling loops, while maintaining a consistent post-exploitation chain involving DLL sideloading, credential discovery via 'klist', lateral movement via PsExec, and data staging using compromised Amazon S3 buckets. LeakNet first emerged in November 2024, presenting itself as a 'digital watchdog' focused on internet freedom and transparency, and has targeted industrial entities according to Dragos. The group’s shift away from initial access brokers reduces per-victim costs and operational bottlenecks. ReliaQuest also observed a separate intrusion attempt using Microsoft Teams-based phishing leading to a Deno-based loader, suggesting either a broadening of LeakNet’s tactics or adoption by other actors. The operation’s average of three monthly victims may increase as the group scales its new initial access and execution methods.

Security guidance for autonomous AI agents emphasizes identity-first governance

Updated: · First: 17.03.2026 16:02 · 📰 1 src / 1 articles

The rapid adoption of autonomous AI agents requires a fundamental shift from traditional guardrails to identity-first governance models to prevent data exfiltration, destructive actions, and systemic failures. Security frameworks must treat AI agents as first-class identities with explicit ownership, authentication, scoped permissions, and continuous monitoring. Current approaches relying on prompt filtering and output controls are deemed insufficient due to the non-deterministic and adaptive nature of AI agents, which can bypass such constraints over time. The focus shifts to controlling access—limiting systems reach, data access, and executable actions—while enforcing intent-based policies rather than static permissions inherited from human users. Organizations are urged to eliminate 'shadow AI' through continuous discovery of machine identities, tokens, and service accounts to prevent unauthorized agents from operating with default trust.

Font-rendering spoofing bypasses AI assistant input validation via glyph substitution

Updated: · First: 17.03.2026 15:59 · 📰 1 src / 1 articles

A novel attack abuses font-rendering and CSS techniques to present visually distinct malicious commands to end users while hiding them from AI assistants, enabling social-engineering-driven command execution. Attackers craft malicious instructions encoded in custom glyph mappings and concealed via CSS (font size, foreground/background color matching, or near-zero opacity), making the payload invisible to text-based AI parsers while rendering clearly to users. Users visiting a malicious page are tricked into executing the hidden payload (e.g., reverse-shell initiation) under the guise of legitimate rewards. AI assistants analyzing only the DOM or raw HTML receive a sanitized view and incorrectly deem the instructions safe, reinforcing erroneous trust.

Microsoft 365 Copilot app to be automatically installed on Windows devices outside EEA

Updated: 17.03.2026 15:54 · First: 15.09.2025 18:59 · 📰 3 src / 3 articles

Microsoft has reversed its plan to automatically install the Microsoft 365 Copilot app on Windows devices outside the European Economic Area (EEA). The forced rollout, originally scheduled to begin in early December 2025 and complete by mid-December, was halted in March 2026 and temporarily disabled without an official explanation. Existing installations remain unaffected. IT administrators can still opt out of automatic installation via the Apps Admin Center and may use new policies to uninstall Copilot on managed devices. Microsoft initially announced in September 2025 that the Copilot app would integrate AI-powered features across Microsoft 365 suite apps (Word, Excel, PowerPoint) and be added to the Windows Start Menu by default, with completion by mid-November 2025. The app was positioned as a centralized entry point for Copilot experiences, though opt-out controls remained available for administrators.

Windows 11 Access Denied Issue on Samsung Laptops

Updated: 17.03.2026 14:03 · First: 14.03.2026 00:11 · 📰 3 src / 5 articles

Microsoft and Samsung have released recovery guidance to resolve persistent Windows C:\ drive access issues affecting Samsung laptops running Windows 11 versions 25H2 and 24H2. Users experiencing 'Access denied' errors, app failures, or permission-related problems must follow a 29-step procedure to restore default Windows permissions and uninstall the Samsung Galaxy Connect app. The fix reinstates TrustedInstaller ownership of the C:\ drive and normalizes system behavior without modifying personal files. Affected users are advised to contact Samsung Support if issues persist after applying the update.

Escalation of nation state cyber operations targeting UK enterprises in 2025

Updated: · First: 17.03.2026 14:00 · 📰 1 src / 1 articles

Fifty-four percent of UK organizations reported cyber operations attributed to nation state actors in 2025, according to Armis’ 2026 Cyberwarfare Report, representing an increase from 47% in the prior year. Geopolitical tensions are cited as the primary driver, with 80% of UK IT decision-makers stating that escalating international hostilities have heightened the risk of cyber warfare. Nearly all respondents (92%) expressed concern about the potential consequences of a full-scale cyber conflict, and 76% believe state actors possess the capability to disrupt global critical infrastructure.

Organizational Gaps in AI Security Visibility and Expertise Exposed by 2026 Pentera Study

Updated: · First: 17.03.2026 13:30 · 📰 1 src / 1 articles

A 2026 study by Pentera reveals systemic gaps in enterprise AI security as CISOs report limited visibility and reliance on outdated tooling. The survey of 300 US CISOs and senior security leaders highlights that 67% lack comprehensive visibility into AI usage across their organizations, with 48% citing this as a primary obstacle alongside a 50% shortfall in specialized AI security expertise. Only 11% of organizations deploy AI-specific security tools, forcing reliance on legacy controls that fail to address AI-specific attack vectors such as autonomous decision-making and indirect access pathways.