๐Ÿ”ฅ CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March

https://therecord.media/cisa-us-agency-breached-cisco-vulnerability-backdoor

#cisco #firestarter #backdoor #CVE202520333 #CVE202520362

CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March

CISA said the unnamed department was infected with malware called โ€œFIRESTARTERโ€ that allowed the hackers to return to the Cisco device in March without re-exploiting the original vulnerabilities.

CVE-2026-7413: Persistent undocumented backdoor access with Yarbo

Yarbo ๋กœ๋ด‡ ํŽŒ์›จ์–ด v2.3.9์— ๋ฌธ์„œํ™”๋˜์ง€ ์•Š์€ ์˜๊ตฌ ๋ฐฑ๋„์–ด๊ฐ€ ๋ฐœ๊ฒฌ๋˜์–ด ์›๊ฒฉ์—์„œ ์ธ์ฆ ์—†์ด ๋ฃจํŠธ ๊ถŒํ•œ ์‰˜ ์ ‘๊ทผ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ์ด ๋ฐฑ๋„์–ด๋Š” ์‚ฌ์šฉ์ž ์„ค์ •์œผ๋กœ ๋น„ํ™œ์„ฑํ™”ํ•  ์ˆ˜ ์—†์œผ๋ฉฐ ๊ณต์žฅ ์ดˆ๊ธฐํ™”๋‚˜ ํŽŒ์›จ์–ด ์—…๋ฐ์ดํŠธ ํ›„์—๋„ ๋‚จ์•„ ์žˆ์–ด ์‹ฌ๊ฐํ•œ ๋ณด์•ˆ ์œ„ํ˜‘์„ ์ดˆ๋ž˜ํ•ฉ๋‹ˆ๋‹ค. CVE-2026-7413์€ CVSS 7.2์ ์˜ ๋†’์€ ์œ„ํ—˜๋„๋กœ ํ‰๊ฐ€๋˜๋ฉฐ, ๊ด€๋ จ ์ทจ์•ฝ์ ๋“ค๊ณผ ๊ฒฐํ•ฉ ์‹œ ๋กœ๋ด‡ ์ „์ฒด ํ•จ๋Œ€์— ๋Œ€ํ•œ ๋ฌด๋‹จ ์ œ์–ด์™€ ๋ฐ์ดํ„ฐ ๋…ธ์ถœ์ด ๊ฐ€๋Šฅํ•ด์ง‘๋‹ˆ๋‹ค. ๊ณต๊ธ‰์—…์ฒด๋Š” ๋ฐฑ๋„์–ด ์ œ๊ฑฐ์™€ ์ธ์ฆ ๋ฉ”์ปค๋‹ˆ์ฆ˜ ๊ฐœ์„ , ํŽŒ์›จ์–ด ์—…๋ฐ์ดํŠธ ์‹œ ์™„์ „ ์ œ๊ฑฐ๋ฅผ ์กฐ์น˜ํ•ด์•ผ ํ•˜๋ฉฐ, ์ž„์‹œ๋กœ ๋„คํŠธ์›Œํฌ ์ฐจ๋‹จ ๋ฐ ๋ชจ๋‹ˆํ„ฐ๋ง์ด ๊ถŒ๊ณ ๋ฉ๋‹ˆ๋‹ค.

https://takeonme.org/cves/cve-2026-7413/

#security #firmware #backdoor #iot #vulnerability

CVE-2026-7413

CVE-2026-7413: Persistent undocumented backdoor access in Yarbo robot firmware v2.3.9 AHA! has discovered an issue affecting Yarbo robot firmware v2.3.9. This disclosure follows AHA!โ€™s standard disclosure policy. Any questions about this disclosure should be directed to [email protected]. Affected products Yarbo robot firmware v2.3.9 (April, 2026) Executive summary A hidden, persistent backdoor was found in Yarbo firmware v2.3.9 that provides remote, unauthenticated (or weakly authenticated) access to privileged functionality. The backdoor is undocumented, cannot be disabled via user-facing settings, and survives factory reset and ordinary firmware updates.

AHA!

Donuts and Beagles: Fake Claude site spreads backdoor

A fraudulent website impersonating Anthropic's Claude AI platform has been distributing a previously undocumented backdoor called Beagle through malvertising campaigns. The attack begins when victims download a fictitious tool named Claude-Pro Relay from claude-pro[.]com, delivered as a 505 MB ZIP archive. The infection chain utilizes DLL sideloading, exploiting a signed G DATA antivirus updater to load malicious code. The technique mirrors PlugX delivery methods but deploys different payloads. Beagle supports eight commands including shell execution, file transfer, and directory listing, communicating with C2 servers using AES encryption. Related samples dating to February 2026 have been identified, with some variants delivering AdaptixC2 framework. Additional domains impersonated security vendors like Trellix, CrowdStrike, and SentinelOne. The infrastructure spans Cloudflare for distribution and Alibaba Cloud for command and control.

Pulse ID: 69fcc63f1dce161fc2f8380c
Pulse Link: https://otx.alienvault.com/pulse/69fcc63f1dce161fc2f8380c
Pulse Author: AlienVault
Created: 2026-05-07 17:05:03

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Cloud #CrowdStrike #CyberSecurity #Encryption #InfoSec #Malvertising #OTX #OpenThreatExchange #PlugX #SentinelOne #SideLoading #Trellix #ZIP #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

MuddyWater usa il ransomware Chaos come falsa bandiera: lโ€™Iran maschera lo spionaggio di Stato da cybercrime

Il gruppo APT iraniano MuddyWater ha condotto un'operazione di cyberspionaggio mascherandola da attacco ransomware Chaos. Rapid7 rivela come Microsoft Teams sia stato usato per rubare credenziali e bypassare l'MFA, con il vero obiettivo di esfiltrazione dati e persistenza a lungo termine: non l'estorsione finanziaria.

https://insicurezzadigitale.com/muddywater-usa-il-ransomware-chaos-come-falsa-bandiera-liran-maschera-lo-spionaggio-di-stato-da-cybercrime/

From Venture Beat: "One command turns any open-source repo into an #AI #agent #backdoor. #OpenClaw proved no supply-chain scanner has a detection category for it"

#Security #OpenSource

https://venturebeat.com/security/one-command-open-source-repo-ai-agent-backdoor-openclaw-supply-chain-scanner

Un nuovo malware Linux punta dove fa piรน male
#quasarlinux รจ il nuovo nome da tenere d'occhio nel panorama #malware I ricercatori lo descrivono come un impianto modulare per sistemi #linux capace di combinare #backdoor #rootkit e furto di credenziali. Il bersaglio non รจ un utente generico:sono ambienti DevOps, repository, server di build e macchine che spesso hanno accesso a segreti molto piรน preziosi di un singolo account
#UnoLinux #gnulinux #gnulinuxitalia #linuxitalia

https://www.tomshw.it/hardware/malware-linux-sviluppatori-quasar

Un nuovo malware Linux punta dove fa piรน male

Quasar Linux combina rootkit, backdoor e furto credenziali per colpire workstation di sviluppo e ambienti DevOps con rischio supply chain.

Tom's Hardware

๐Ÿšจ NEWS: Allarme Daemon Tools: Un Attacco alla Supply Chain Ha Compromesso il Popolare Software per Dischi Virtuali

Ecco i punti chiave in breve:
๐Ÿ’ก Un grave attacco informatico mirato alla supply chain ha colpito Daemon Tools, il noto software per emulare unitร  CD e DVD virtuali, compromettendone gli aggiornamenti per oltre un...

๐Ÿš€ LINK: https://meteoraweb.com/news/allarme-daemon-tools-un-attacco-alla-supply-chain-ha-compromesso-il-popolare-software-per-dischi-virtuali

#malware #sicurezza #supplyChain #attaccoInformatico #backdoor

DAEMON Tools installers were trojanized in a supply-chain attack, delivering a backdoor to thousands of systems worldwide since April 8 ๐ŸŒ
The malware affected versions 12.5.0.2421โ€“12.5.0.2434, targeting high-value organizations and enabling remote code execution via compromised binaries ๐Ÿ›ก๏ธ

๐Ÿ”— https://www.bleepingcomputer.com/news/security/daemon-tools-trojanized-in-supply-chain-attack-to-deploy-backdoor/

#TechNews #Daemon #DAEMONTools #Malware #Security #Microsoft #Windows #Backdoor #Attack #Threat #CyberSecurity #Software #InfoSec #Hacking #Safety #Digital #Computing #Protection

DAEMON Tools trojanized in supply-chain attack to deploy backdoor

Hackers trojanized installers for the DAEMON Tools software and since April 8, delivered a backdoor to thousands of systems that downloaded the product from the official website.

BleepingComputer

๐Ÿšจ NEWS: La Minaccia Gemella: Supply Chain e Dati degli Studenti nel Mirino dei Cybercriminali

Ecco i punti chiave in breve:
๐Ÿ’ก Il panorama della cybersecurity globale vive un momento di tensione senza precedenti. Due distinti attacchi informatici, resi noti nelle ultime ore, delineano una strategia aggress...

๐Ÿš€ LINK: https://meteoraweb.com/news/la-minaccia-gemella-supply-chain-e-dati-degli-studenti-nel-mirino-dei-cybercriminali

#sicurezzaInformatica #supplyChain #attaccoInformatico #backdoor #datiStudenti

Popular DAEMON Tools software compromised

Since April 8, 2026, installers of DAEMON Tools software have been compromised with malicious payloads distributed through the legitimate website. Versions 12.5.0.2421 to 12.5.0.2434 contain trojaned binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with legitimate developer certificates. The attack has affected thousands of systems across over 100 countries, though advanced payloads were selectively deployed to approximately a dozen machines in government, scientific, manufacturing, and retail organizations. Initial infection establishes backdoor communications to typosquatted domains, followed by deployment of an information collector for system profiling. Targeted systems receive additional implants including a minimalistic backdoor and QUIC RAT. Chinese-language strings found in malicious components suggest a Chinese-speaking threat actor. The attack remains active at time of publication, demonstrating sophisticated supply chain compromise techniques comparable to the 2023 3CX ...

Pulse ID: 69f9fd6e0328f7a1be1faa20
Pulse Link: https://otx.alienvault.com/pulse/69f9fd6e0328f7a1be1faa20
Pulse Author: AlienVault
Created: 2026-05-05 14:23:42

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Chinese #CyberSecurity #Government #InfoSec #Mac #Manufacturing #Nim #OTX #OpenThreatExchange #RAT #SupplyChain #Trojan #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange