It's been a busy 24 hours in the cyber world with significant updates on supply chain attacks affecting developers and marketing SDKs, alongside new warnings about AI agent vulnerabilities. Let's dive in:

AppsFlyer SDK Spreads Crypto Stealer ⚠️

- The AppsFlyer Web SDK was compromised, delivering malicious JavaScript that hijacked cryptocurrency transactions by replacing legitimate wallet addresses with attacker-controlled ones.
- AppsFlyer confirmed a domain registrar incident on March 10, 2026, which temporarily exposed a segment of customer websites to unauthorised code, though their mobile SDK was unaffected.
- Organisations using the SDK should review telemetry for suspicious API requests, consider downgrading to known-good versions, and investigate potential compromises, as the full scope is still under investigation.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/

GlassWorm Escalates Supply Chain Attacks 🛡️

- The GlassWorm campaign has significantly escalated, now abusing extensionPack and extensionDependencies in Open VSX extensions to turn benign-appearing packages into transitive delivery vehicles for malware.
- Researchers discovered at least 72 new malicious Open VSX extensions targeting developers, mimicking popular utilities and AI coding assistants, often using invisible Unicode characters to hide payloads.
- The campaign retains hallmarks like avoiding Russian locales and using Solana transactions for C2 resilience, but now features heavier obfuscation, rotating Solana wallets, and potentially uses LLMs to generate convincing cover commits for malicious injections in GitHub and npm.

📰 The Hacker News | https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html

OpenClaw AI Agent Flaws Pose Major Risks 🔒

- China's CNCERT has warned about significant security flaws in the OpenClaw open-source AI agent, stemming from weak default configurations and its privileged system access.
- Risks include prompt injection attacks (indirect and cross-domain), where malicious instructions can trick the agent into leaking sensitive data, even via messaging app link previews without user clicks.
- Other concerns involve inadvertent data deletion, malicious skills from repositories like ClawHub, and exploitation of recently disclosed vulnerabilities, leading to potential data exfiltration or system paralysis.

📰 The Hacker News | https://thehackernews.com/2026/03/openclaw-ai-agent-flaws-could-enable-prompt-injection-and-data-exfiltration/

#CyberSecurity #SupplyChainAttack #Malware #CryptoStealer #AI #PromptInjection #Vulnerabilities #InfoSec #ThreatIntelligence #DeveloperSecurity #WebSecurity

AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code

The AppsFlyer Web SDK was temporarily hijacked this week with malicious code used to steal cryptocurrency in a supply-chain attack.

BleepingComputer

Infostealer infection exposed a DPRK-linked cyber operation.
Key findings:
• Polyfill.io supply-chain attack linked to actor
• Infiltration of crypto exchange Gate.us
• Crypto laundering via Telegram bots
• Espionage targeting Japan’s NIMS
Follow TechNadu for cybersecurity threat intelligence updates.

Source: https://www.hudsonrock.com/blog/6262

#InfoSec #ThreatIntel #CyberEspionage #SupplyChainAttack

History teaches us the FBI is pretty good tracing people running manual DDoS attacks. To actually pull this off without getting busted, you'd need some angry engineers

There are plenty right now. With Google forcing mandatory verification and closing AOSP, many open-source devs feel cornered. They'd be the perfect candidates to slip a 'Trojan horse' right into their apps on the stores, maybe hidden inside a compromised open-source library. Devs could claim they just 'imported a library' without knowing it was poisoned

It's a supply chain attack: plausible deniability for the coders too. Users would just be 'victims' of malware, so no one gets arrested and age check and chat control will be unusable

I'm not an engineer though, so maybe I'm missing something. Just a thought for more elevated minds..

#SupplyChainAttack #CyberResistance #TrojanHorse #DDosTrojanHorse #DataPoisoning #STASI #ChatControl #AgeCheck #Privacy #DDos
#DigitalDisobedience #KGB #VirusTrojanHorse #DDosTrojanHorse

The Art of Deception: Why Phishing Remains the Predominant Threat to Enterprise Security

2,781 words, 15 minutes read time.

The Evolution of Social Engineering in a Hyper-Connected World

The digital landscape of 2026 presents a paradox where the most sophisticated technological defenses are frequently circumvented by the oldest trick in the book: deception. Phishing remains the primary initial access vector for cyber adversaries, not because of a lack of technical security, but because it targets the most unpredictable component of any network—the human user. Analyzing the 2025 Verizon Data Breach Investigations Report (DBIR) reveals that while vulnerability exploitation has surged, the human element still contributes to approximately 60% of all confirmed breaches. This persistence is rooted in the strategic shift from mass-scale, poorly drafted “spray and pray” emails to highly targeted, technologically augmented social engineering campaigns.

Modern phishing has transcended the era of obvious grammatical errors and generic “Nigerian Prince” solicitations, evolving into a streamlined industry known as Phishing-as-a-Service (PhaaS). This model allows even low-skilled threat actors to deploy professional-grade attack infrastructure, including pixel-perfect clones of corporate login portals and automated delivery systems. Consequently, the volume of reported phishing and spoofing incidents has reached staggering heights, with the FBI’s Internet Crime Complaint Center (IC3) documenting nearly 200,000 complaints in the last year alone. As these attacks become more subtle, often utilizing non-traditional channels like QR codes (Quishing) and SMS (Smishing), the boundary between legitimate communication and malicious intent continues to blur.

The stakes of failing to identify these scams have never been higher for the modern enterprise. Business Email Compromise (BEC), a specialized and highly lucrative form of phishing, accounted for nearly $2.8 billion in adjusted losses in the most recent reporting cycle, with a median loss of $50,000 per incident. These figures underscore a critical reality: phishing is no longer just an IT nuisance but a significant financial and operational risk. By understanding the psychological hooks and technical mechanics that drive these attacks, organizations can move beyond basic awareness and toward a posture of informed resilience.

The Anatomy of Deception: Why Human Psychology is the Ultimate Vulnerability

The efficacy of phishing lies in its ability to hijack the brain’s fast, instinctive decision-making processes, often referred to as “System 1” thinking. Attackers meticulously craft lures that trigger specific psychological responses—most notably urgency, fear, and respect for authority—to bypass the critical evaluation that would otherwise flag a message as suspicious. When a user receives an alert claiming their “payroll account has been suspended” or an “urgent invoice is past due,” the resulting stress response narrows their cognitive focus. This “amygdala hijack” prioritizes immediate action over logical verification, leading users to click links or provide credentials before their rational mind can intervene.

Furthermore, the principle of authority is a cornerstone of successful social engineering, as evidenced by the increasing frequency of executive impersonation. By spoofing the identity of a high-ranking official or a trusted third-party vendor, attackers leverage the social pressure to comply with requests from the top down. This tactic was notably exploited in the 2023 MGM Resorts breach, where attackers used basic reconnaissance from professional networking sites to impersonate an employee. By calling the IT help desk and projecting an authoritative yet distressed persona, the threat actors successfully manipulated support staff into resetting credentials, granting them administrative access to the entire environment.

Beyond immediate emotional triggers, cybercriminals exploit cognitive biases such as the “illusion of truth” and “pattern recognition.” We are conditioned to trust familiar interfaces; therefore, when an attacker presents a login screen that perfectly mimics a Microsoft 365 or Google Workspace portal, our brains subconsciously validate the request based on visual consistency. This reliance on “surface-level” legitimacy is what makes modern phishing so dangerous. Even as users become more skeptical, the sheer volume of digital notifications creates “decision fatigue,” increasing the likelihood that a malicious request will eventually slip through during a moment of distraction or high workload.

Analyzing the Technical Mechanics of Modern Phishing Frameworks

While the psychological lure gets the user to the “door,” modern technical frameworks ensure the door is wide open for the attacker. One of the most significant advancements in recent years is the rise of Adversary-in-the-Middle (AiTM) phishing. Unlike traditional phishing, which simply harvests a username and password, AiTM attacks deploy a proxy server between the user and the legitimate service. This allows the attacker to intercept not just the credentials, but also the Multi-Factor Authentication (MFA) session cookie in real-time. By the time the user has successfully “logged in” to the fake site, the attacker has already hijacked their active session, effectively rendering traditional SMS or app-based MFA obsolete.

The industrialization of these techniques through Phishing-as-a-Service (PhaaS) has fundamentally changed the threat landscape by lowering the cost and complexity of launching a campaign. These platforms provide attackers with sophisticated kits that include evasion features, such as “cloaking,” which shows legitimate content to security crawlers while displaying the phishing page to the intended victim. Additionally, many kits now feature dynamic branding, where the phishing page automatically adjusts its logos and background images based on the recipient’s email domain. This level of automation ensures that every lure feels personalized and legitimate, significantly increasing the conversion rate of the attack.

Furthermore, attackers are increasingly moving away from traditional email links to bypass automated Secure Email Gateways (SEGs). The surge in “Quishing”—phishing via QR codes—exploits a blind spot in many security stacks, as QR codes are often embedded as images that traditional link-scanners cannot easily parse. When a user scans a code on their mobile device, they are often moved off the protected corporate network and onto a personal cellular connection, where endpoint security may be weaker or non-existent. This multi-channel approach, combining email, mobile devices, and proxy infrastructure, demonstrates that phishing has evolved into a sophisticated technical discipline that requires equally sophisticated, layered defenses.

Case Study: The Ripple Effects of a High-Profile Credential Harvest

The devastating potential of modern phishing is perhaps best illustrated by the 2022 breach of Twilio, a major communications platform. This incident serves as a masterclass in how a single, well-executed smishing (SMS phishing) campaign can compromise a global technology provider. The attackers sent text messages to numerous employees, claiming their passwords had expired or their accounts required urgent attention. These messages contained links to URLs that utilized deceptive keywords like “twilio-okta” and “twilio-sso,” directing users to a landing page that perfectly mimicked the company’s actual sign-in portal. By leveraging the inherent trust users place in mobile notifications—which often bypass the scrutiny applied to traditional emails—the threat actors successfully harvested the corporate credentials of several employees.

Once the initial credentials were secured, the attackers did not simply stop at account access; they moved laterally through the environment to escalate their privileges. This specific campaign, attributed to a group known as “Oktapus,” was part of a broader coordinated effort that targeted over 130 organizations. By gaining a foothold in Twilio’s internal systems, the attackers were able to access the data of a limited number of customers and, more alarmingly, the internal console used by support staff. This allowed them to view sensitive account information and, in some cases, intercept one-time passwords (OTPs) intended for downstream users. The Twilio case highlights that the “initial click” is merely the tip of the spear, serving as the catalyst for a much deeper, more systemic compromise of the supply chain.

Analyzing the aftermath of such a breach reveals the immense operational and reputational costs associated with credential harvesting. Twilio was forced to undergo a massive incident response effort, notifying affected customers and re-securing thousands of employee accounts. Furthermore, the breach demonstrated that even tech-savvy employees at a major communications firm are not immune to sophisticated social engineering. The “Oktapus” campaign succeeded because it targeted the intersection of mobile convenience and corporate security protocols. It underscores the reality that in the modern threat landscape, the security of an entire organization often rests on the split-second decision of a single individual responding to a seemingly routine notification on their smartphone.

Identifying Sophisticated Red Flags: Beyond the Misspelled Subject Line

As cybercriminals refine their craft, the “red flags” of a phishing attempt have shifted from obvious linguistic errors to subtle technical anomalies that require a more discerning eye. One of the most prevalent techniques in contemporary phishing is typosquatting or “look-alike” domains, where an attacker registers a domain name that is nearly identical to a legitimate one. For example, an attacker might use “https://www.google.com/search?q=rnicrosoft.com” (using ‘r’ and ‘n’ to mimic an ‘m’) or “google-support.security” to deceive a hurried user. These deceptive URLs are often hidden behind hyperlinked text or buried within a long string of redirects, making them difficult to spot without hovering over the link to inspect the actual destination.

Advanced phishing analysis now requires an understanding of email headers and the underlying infrastructure of digital communication. A sophisticated lure might appear to come from a trusted colleague, but a closer look at the “Reply-To” field or the “Return-Path” in the email header often reveals a completely different, unauthorized address. Furthermore, attackers frequently use “URL padding” or “character encoding” to hide the malicious nature of a link. By including a legitimate domain at the beginning of a long URL string followed by hundreds of hyphens and then the actual malicious destination, attackers take advantage of the fact that many mobile browsers truncate long URLs, showing only the “safe” portion to the user.

The emergence of QR code phishing, or “Quishing,” has added a physical dimension to these digital threats. Because QR codes are essentially “black box” URLs—meaning the destination is invisible until the code is scanned—they are an ideal delivery mechanism for malicious content. Attackers place these codes on physical posters, in PDF attachments, or even on fake “multi-factor authentication” prompts. When scanned, these codes often lead to AiTM proxy sites designed to harvest session tokens. Spotting these scams requires a shift in mindset: users must treat every unsolicited QR code with the same level of suspicion as an unexpected .exe attachment. The absence of traditional email markers like “suspicious sender” makes these attacks particularly effective at bypassing standard mental filters.

The Infrastructure of Defense: Technical Controls to Mitigate Human Error

Relying solely on user education is a recipe for failure; a robust cybersecurity posture requires technical “guardrails” that reduce the impact of inevitable human mistakes. The first line of defense in the email ecosystem is the implementation of a rigorous DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy. When combined with SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail), DMARC allows organizations to specify how receiving mail servers should handle messages that fail authentication. By moving to a “p=reject” policy, an organization can effectively prevent unauthorized third parties from spoofing their domain, ensuring that only legitimate, signed emails ever reach a recipient’s inbox.

Beyond email authentication, the industry is moving toward “phishing-resistant” Multi-Factor Authentication as the ultimate technical solution to credential theft. Traditional MFA methods, such as SMS codes or “push” notifications, are increasingly vulnerable to interception or “MFA fatigue” attacks, where a user is bombarded with prompts until they inadvertently approve one. FIDO2-compliant hardware security keys, such as YubiKeys, eliminate this risk by utilizing public-key cryptography. In a FIDO2 workflow, the security key will only authenticate with the specific domain it was registered to. If a user is tricked into visiting a phishing site, the hardware key will recognize that the domain does not match and will refuse to provide the credentials, effectively neutralizing even the most convincing AiTM attack.

Finally, the integration of AI-driven “Computer Vision” and “Natural Language Processing” (NLP) into Secure Email Gateways (SEGs) provides a dynamic layer of protection. These modern tools don’t just look for known malicious links; they analyze the sentiment and intent of an email. If a message from an external sender uses high-pressure language (“Action Required Immediately”) or mimics the visual style of a known brand without proper authentication, the system can automatically flag the message, strip the links, or move it to a secure sandbox. By automating the detection of “intent” rather than just “indicators,” organizations can stay ahead of the rapidly changing tactics used by Phishers-as-a-Service.

Institutional Resilience: Moving from “Awareness” to “Security Culture”

The historical approach to phishing—characterized by once-a-year compliance videos and “gotcha” style simulations—has largely failed to produce lasting behavioral change. To build true institutional resilience, organizations must shift from a model of passive awareness to a proactive “security culture” that treats every employee as a sensor in a distributed network. Research from the NIST “Phish Scale” suggests that when simulations are too difficult or punitive, they create “security fatigue,” leading users to ignore even legitimate security alerts. Conversely, an effective culture incentivizes the reporting of suspicious emails through a “no-fault” policy, where a user who clicks a link but immediately reports it is praised for their transparency rather than reprimanded for their mistake.

A critical component of this culture is the implementation of a streamlined reporting pipeline, often facilitated by a “Report Phishing” button directly within the email client. When a user flags a message, it should trigger an automated workflow that correlates the report against other identical messages across the entire organization. This “crowdsourced” intelligence allows security teams to identify a campaign in its infancy, pulling malicious emails from all inboxes before a second user has the chance to interact with them. This transition from a reactive stance (cleaning up after a breach) to a protective stance (neutralizing a threat based on a single user’s report) is what separates resilient organizations from those that remain perpetually vulnerable.

Furthermore, the language of security within an organization must evolve to reflect the sophistication of modern threats. Instead of simply telling employees to “look for typos,” training should focus on the context of requests. Employees should be empowered to verify out-of-band requests—such as a sudden change in vendor wire instructions or an urgent request for sensitive HR data—through a secondary, trusted channel like a known phone number or a verified internal chat. By codifying these “human-in-the-loop” verification steps into standard operating procedures, the organization creates a friction point that social engineering tactics struggle to overcome, regardless of how technically perfect the phishing lure may be.

Conclusion: The Constant Vigilance Required for Modern Digital Hygiene

The battle against phishing is not a technical problem to be “solved,” but a persistent risk to be managed through a strategy of Defense in Depth. As we have explored, the convergence of high-level psychological manipulation and advanced technical frameworks like AiTM and PhaaS means that no single control—whether it be an email filter or a training seminar—is sufficient on its own. A modern defense-in-depth posture must integrate hardened email authentication protocols (DMARC/SPF), phishing-resistant hardware (FIDO2), and a robust, supportive security culture. This multi-layered approach ensures that even when one layer is bypassed, subsequent controls are in place to prevent a single click from escalating into a catastrophic data breach.

Looking ahead, the role of Generative AI in phishing will only increase the speed and scale of these attacks. Large Language Models (LLMs) allow threat actors to generate perfectly composed, contextually relevant lures in any language, effectively eliminating the “poor grammar” red flag that has served as a primary detection method for decades. In this environment, the “Zero Trust” philosophy—never trust, always verify—must extend beyond the network architecture and into the daily habits of every digital citizen. Vigilance is no longer an optional skill for IT professionals; it is a fundamental requirement for anyone navigating the modern web.

Ultimately, the goal of understanding phishing 101 is to move from a state of fear to a state of informed confidence. By recognizing the psychological triggers used by attackers and understanding the technical safeguards available, individuals and organizations can reclaim the upper hand. Cybersecurity is a shared responsibility, and while the tactics of the adversary will continue to evolve, the principles of skeptical inquiry, technical hardening, and rapid reporting remain our most effective weapons. In a world where the next threat is only one click away, the most powerful security tool remains an informed and empowered mind.

Call to Action

If this breakdown helped you think a little clearer about the threats out there, don’t just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if there’s a topic you want me to tackle next. Stay sharp out there.

D. Bryan King

Sources

Disclaimer:

The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.

Related Posts

#adversaryInTheMiddle #AiTMAttacks #BEC #businessEmailCompromise #CISA #cookieTheft #corporateSecurity #credentialHarvesting #cyberHygiene #cyberResilience #cyberRisk #cybersecurity #dataBreach #digitalHygiene #DKIM #DMARC #emailAuthentication #emailSecurity #executiveImpersonation #FIDO2 #hardwareSecurityKeys #humanElement #IAM #identityAndAccessManagement #identityTheft #incidentResponse #informationSecurity #infosec #lookAlikeDomains #MFABypass #MITREATTCK #networkSecurity #NISTSecurity #PhaaS #phishing101 #phishingAnalysis #phishingPrevention #phishingRedFlags #phishingSimulation #phishingAsAService #phishingResistantMFA #QRCodePhishing #quishing #secureEmailGateway #SecurityAwarenessTraining #SEG #sessionHijacking #smishing #socialEngineering #spearPhishing #SPF #supplyChainAttack #threatIntelligence #threatLandscape #typosquatting #VerizonDBIR #whaling #YubiKey #zeroTrust

Good morning, cyber pros! ☕ It's been a busy 24 hours with some critical zero-day warnings, new insights into nation-state influence operations, and a few notable breaches. Let's dive into the details:

Recent Breaches: Medical, Retail, and Sports Hit 🚨

- Medical device manufacturer UFP Technologies confirmed a cyber incident on 14 February, leading to data theft and potential destruction, though primary IT systems remain operational.
- French football club Olympique de Marseille reported an "attempted cyberattack" after a threat actor leaked samples claiming 400,000 individuals' data and 2,050 Drupal CMS accounts were stolen.
- European DIY retailer ManoMano disclosed a data breach affecting 38 million customers, stemming from a compromised third-party customer service provider, exposing names, emails, phone numbers, and communications.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/

Critical Zero-Days and RCE Flaws Under the Spotlight ⚠️

- Five Eyes agencies and CISA issued urgent warnings about two Cisco Catalyst SD-WAN zero-days (CVE-2026-20127, CVSS 10.0; CVE-2022-20775, CVSS 7.8) actively exploited since 2023 by a "highly sophisticated threat actor" UAT-8616 to gain root access on critical infrastructure.
- Check Point discovered multiple RCE and API key theft vulnerabilities in Anthropic's Claude Code, stemming from malicious configuration files in repositories, highlighting new supply chain risks in AI-driven development.
- A critical RCE flaw (CVE-2026-21902, CVSS 10.0) in Juniper Networks PTX Series routers allows unauthenticated root code execution due to an exposed internal service; immediate patching or access restriction is advised.
- Trend Micro patched two critical RCE path traversal flaws (CVE-2025-71210, CVE-2025-71211) in Apex One management console, allowing unprivileged code execution if the console is externally exposed.
- Previously harmless Google API keys, when exposed client-side, can now authenticate to Gemini AI, potentially allowing attackers to access private data and incur significant usage charges.

🤫 CyberScoop | https://cyberscoop.com/cisco-zero-days-cisa-emergency-directive-five-eyes/
📰 The Hacker News | https://thehackernews.com/2026/02/cisco-sd-wan-zero-day-cve-2026-20127.html
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/five_eyes_cisco_sdwan/
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/clade_code_cves/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-critical-apex-one-rce-vulnerabilities/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/

Evolving Threat Actor TTPs: AI, Supply Chain, and Social Engineering 🛡️

- A coordinated campaign is targeting software developers with fake Next.js job interview repositories, using multiple execution triggers (VS Code, npm run dev, backend startup) to deliver in-memory JavaScript backdoors for RCE and data exfiltration.
- OpenAI reported nation-state actors, including a CCP-linked individual and a Russian group ("Operation No Bell"), are using ChatGPT for politically motivated influence operations, from drafting smear campaigns to generating geopolitical articles.
- A malicious NuGet package, StripeApi.Net, was discovered typosquatting the legitimate Stripe.net library, designed to steal Stripe API tokens from unsuspecting developers while maintaining application functionality.
- The cybercrime group Scattered Lapsus$ Hunters (SLSH) is actively recruiting women for vishing calls to IT helpdesks, aiming to enhance social engineering effectiveness by leveraging different voice profiles.
- Google disrupted a China-linked cyberespionage campaign (UNC2814) active since 2017, targeting telcos and governments in 42 countries, using a new Gridtide backdoor and abusing Google Sheets for C2 communications.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/fake-nextjs-job-interview-tests-backdoor-developers-devices/
📰 The Hacker News | https://thehackernews.com/2026/02/fake-nextjs-repos-target-developers.html
👁️ Dark Reading | https://www.darkreading.com/cyberattacks-data-breaches/chinese-police-chatgpt-smear-japan-pm-takaichi
📰 The Hacker News | https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/scattered_lapsus_hunters_female_recruits/
🗞️ The Record | https://therecord.media/google-disrupts-china-linked-cyberespionage-campaign-spanning-dozens-of-countries

Ransomware Trends and AI's Double-Edged Sword 📊

- Despite a 50% surge in ransomware attacks, the payment rate dropped to a record low of 28% in 2025, though the median ransom paid significantly increased to $59,556, indicating a shift in victim behaviour and attacker tactics.
- Veracode's report highlights a growing "security debt," with 82% of companies having unresolved vulnerabilities for over a year, suggesting that the rapid pace of AI-driven development is creating more flaws than can be fixed, making comprehensive security "unattainable."
- The UK government has implemented a new Vulnerability Monitoring Service, significantly reducing the median fix time for critical public sector vulnerabilities from 50 to 8 days, addressing long-standing issues with digital defences.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/ransomware-payment-rate-drops-to-record-low-despite-attack-surge/
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/veracode_security_ai/
🗞️ The Record | https://therecord.media/united-kingdom-vulnerability-scanning-cyber

FTC Clarifies COPPA for Age Verification 🔒

- The Federal Trade Commission (FTC) issued a policy statement clarifying that it will not enforce COPPA against companies using age verification technologies, provided strict conditions are met regarding data use, retention, notice, and security.
- This aims to encourage the adoption of age verification tools without fear of COPPA violations, with the FTC planning a broader review of the COPPA Rule to address this area.

🗞️ The Record | https://therecord.media/ftc-says-it-wont-enforce-coppa-age-verification

#CyberSecurity #ThreatIntelligence #ZeroDay #RCE #Vulnerability #APT #NationState #SupplyChainAttack #SocialEngineering #AI #Ransomware #DataBreach #DataPrivacy #InfoSec #CyberAttack #IncidentResponse

Medical device maker UFP Technologies warns of data stolen in cyberattack

American manufacturer of medical devices, UFP Technologies, has disclosed that a cybersecurity incident has compromised its IT systems and data.

BleepingComputer

The XZ supply chain attack episode from @veritasium

This episode discusses the history, sequence of events and an explanation of the attack along with some speculation as to the threat actor involved.

https://youtu.be/aoag03mSuXQ [52' 59"]

#XZ #SupplyChainAttack #InfoSec #APT

The Internet Was Weeks Away From Disaster and No One Knew

YouTube

📢⚠️ Hackers hid a #PulsarRAT inside a PNG image and slipped it into NPM using a typosquatted package. The malware uses steganography, process hollowing, and AV evasion to gain full system control.

Read: https://hackread.com/hackers-pulsar-rat-png-images-npm-supply-chain-attack/

#CyberSecurity #Malware #SupplyChainAttack #NPM

Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack

Cybersecurity researchers at Veracode reveal a typosquatting attack that disguises Pulsar RAT as images to bypass Windows security and antivirus programs.

Hackread - Cybersecurity News, Data Breaches, AI and More

Supply chain alert:
Cline CLI v2.3.0 was published with a compromised npm token.

It auto-installed OpenClaw via a hidden postinstall script.

~4,000 downloads in 8 hours.
No malware - but unauthorized execution in dev environments.

Are AI agents in CI/CD pipelines becoming the next major trust boundary risk?

Source: https://thehackernews.com/2026/02/cline-cli-230-supply-chain-attack.html

Follow @technadu for independent cybersecurity reporting.
Join the discussion below.

#CyberSecurity #SupplyChainAttack #AIsecurity #OpenSource #DevSecOps #Infosec #SoftwareSecurity

It's been a packed 24 hours in the cyber world, with a flurry of recent breaches, critical vulnerabilities under active exploitation, and fascinating new threat research emerging. We're also seeing important updates on the evolving threat landscape, regulatory clarity, and significant law enforcement actions. Let's dive in:

Recent Cyber Attacks and Breaches ⚠️

- The University of Mississippi Medical Center (UMMC) has shut down all clinics statewide following a ransomware attack, with officials confirming communication with the attackers and CISA/FBI assistance.
- Japanese semiconductor test equipment supplier Advantest is dealing with a ransomware attack that impacted several systems, highlighting the ongoing targeting of the lucrative semiconductor industry.
- Wynn Resorts, the Las Vegas casino giant, is reportedly the latest victim of ShinyHunters, who claim to have stolen over 800,000 employee records, including Social Security numbers, and are demanding a $1.5 million Bitcoin ransom.
- The French Ministry of Finance disclosed a data breach affecting 1.2 million accounts in its national bank account registry (FICOBA), where stolen civil servant credentials led to the exposure of bank account details, physical addresses, and tax IDs.
- Ukraine's central bank reported a supply-chain attack on a contractor supporting its collectible coin online store, exposing customer registration data but not core banking systems or financial details.
- The FBI issued a flash alert on ATM jackpotting, noting over 700 incidents in 2025 with losses exceeding $20 million, primarily using Ploutus malware to exploit physical and software vulnerabilities to dispense cash without authorisation.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/
🗞️ The Record | https://therecord.media/leading-japanese-semiconductor-supplier-ransomware
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/20/shinyhunters_wynn_resorts/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/data-breach-at-french-bank-registry-impacts-12-million-accounts/
🗞️ The Record | https://therecord.media/hackers-breach-ukraine-national-bank-contractor
🗞️ The Record | https://therecord.media/fbi-atm-jackpotting-2025-report

Actively Exploited Vulnerabilities 🛡️

- CISA has ordered federal agencies to patch a maximum-severity Dell RecoverPoint for Virtual Machines bug (CVE-2026-22769) within three days, as it's been actively exploited since mid-2024 by suspected China-nexus operators.
- The BeyondTrust Remote Support RCE flaw (CVE-2026-1731) is now being actively exploited in ransomware attacks, with CISA adding it to its KEV catalog and urging immediate patching for self-hosted instances.
- A supply chain attack poisoned the npm package for Cline (an AI coding tool), silently installing the OpenClaw AI framework on approximately 4,000 systems after an attacker exploited a prompt injection vulnerability to steal an npm publish token.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/20/cisa_dell_vulnerability/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/
🌑 Dark Reading | https://www.darkreading.com/application-security/supply-chain-attack-openclaw-cline-users

New Threat Research and Tradecraft 🧠

- Proofpoint researchers uncovered "TrustConnect," a fake RMM vendor that actually sells a remote access trojan (RATaaS), complete with a legitimate EV code-signing certificate and distributed via phishing campaigns, with ties to Redline infostealer customers.
- ESET has identified "PromptSpy," the first known Android malware to use generative AI (Google Gemini) at runtime to adapt its persistence mechanisms across different devices, while also functioning as spyware with VNC capabilities.
- The "Starkiller" phishing-as-a-service (PhaaS) kit is gaining traction for its ability to bypass MFA by proxying actual login pages in real-time, stealing credentials and session tokens, and evading traditional phishing detection methods.
- MIT CSAIL's 2025 AI Agent Index highlights a concerning lack of safety disclosures and standards from AI agent developers, with most relying on a few foundation models, creating complex dependencies that are difficult to evaluate.
- Wiz researchers revealed that virtually every major AI platform they targeted was vulnerable, emphasising that infrastructure security across the five layers of the AI stack (training, inference, application, cloud, hardware) is more critical than prompt injection concerns, with issues like the "Pickle" format allowing arbitrary code execution.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/19/rmm_rat_trustconnect/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/
🌑 Dark Reading | https://www.darkreading.com/threat-intelligence/starkiller-phishing-kit-mfa
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/20/ai_agents_abound_unbound_by/
🌑 Dark Reading | https://www.darkreading.com/application-security/lessons-ai-hacking-model-every-layer-risky

Threat Landscape Commentary 🌍

- Dutch intelligence warns that Russia is intensifying its hybrid attacks (cyberattacks, sabotage, disinformation) across Europe, signalling preparation for a prolonged confrontation with the West and an increased risk tolerance.
- A report from Intel 471 indicates that Latin America's cybersecurity maturity is lagging behind its rapidly escalating threat landscape, with a 78% increase in ransomware breaches in 2025 and the region becoming a central hub for cybercrime.

🗞️ The Record | https://therecord.media/russia-cyberattacks-europe-warfare
🌑 Dark Reading | https://www.darkreading.com/threat-intelligence/latin-americas-cyber-maturity-lags-threat-landscape

Regulatory Developments ⚖️

- The UK's Information Commissioner's Office (ICO) has won a significant legal battle against DSG Retail, with the Court of Appeal confirming that payment card details (even without cardholder names) constitute "personal data" from the data controller's perspective, upholding a £500,000 fine for a 2017 breach.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/20/ico_wins_battle_in_protracted_fight/

Law Enforcement Actions 🚨

- A Ukrainian national, Oleksandr Didenko, has been sentenced to five years in prison for facilitating North Korea's remote IT worker scheme, which involved stealing US identities and creating fraudulent accounts to funnel hundreds of thousands of dollars to the regime.
- A Romanian hacker, Catalin Dragomir, pleaded guilty to breaching Oregon's Department of Emergency Management in 2021 and selling access for $3,000 in Bitcoin, facing up to seven years in prison for this and other hacks.

🤫 CyberScoop | https://cyberscoop.com/doj-ukrainian-north-korea-remote-worker-scheme-facilitator-sentenced/
🗞️ The Record | https://therecord.media/romanian-hacker-faces-7-years-oregon-breach

#CyberSecurity #ThreatIntelligence #Ransomware #DataBreach #Vulnerability #ZeroDay #RCE #SupplyChainAttack #Malware #RATaaS #Phishing #MFA #AI #AIsecurity #HybridWarfare #LawEnforcement #DataPrivacy #InfoSec

Mississippi medical center closes all clinics after ransomware attack

The University of Mississippi Medical Center (UMMC) closed all its clinic locations statewide on Thursday following a ransomware attack.

BleepingComputer

Alright team, it's been a packed 24 hours in the cyber world! We've got updates on some serious breaches, evolving malware, critical vulnerabilities, and a fair bit of regulatory action. Let's dive in:

Recent Cyber Attacks & Breaches 🚨

- Japanese semiconductor supplier Advantest is responding to a ransomware attack that impacted several company systems, highlighting a trend of increased targeting of industrial organisations.
- Criminals stole over $20 million in 2025 through ATM jackpotting, using malware like Ploutus to force cash dispensing, a cyber-physical attack on the rise.
- Abu Dhabi Finance Week inadvertently exposed passport details and other identity information of approximately 700 VIP attendees, including former British Prime Minister David Cameron, due to an unprotected cloud storage system.
- A supply chain attack on the `cline` npm package for an AI coding tool silently installed the OpenClaw AI framework on users' systems, exploiting a prompt injection vulnerability.
- A Ukrainian national was sentenced to five years in prison for facilitating a North Korean scheme to hire remote IT workers at US companies, funnelling funds to North Korea's munitions programs.
- Microsoft 365 Copilot had a bug that allowed it to summarise confidential emails from Sent Items and Drafts, bypassing Data Loss Prevention (DLP) policies, which has since been fixed.
- Polish authorities have detained a 47-year-old man suspected of ties to the Phobos ransomware group, part of Europol's ongoing Operation Aether.
- A Nigerian man was sentenced to eight years for using Warzone RAT to hack Massachusetts tax firms, stealing client data and filing over 1,000 fraudulent returns for $1.3 million.

🗞️ The Record | https://therecord.media/leading-japanese-semiconductor-supplier-ransomware
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/19/crims_atm_jackpotting/
🌑 Dark Reading | https://www.darkreading.com/cyber-risk/abu-dhabi-finance-week-leaked-vip-passport-details
🌑 Dark Reading | https://www.darkreading.com/application-security/supply-chain-attack-openclaw-cline-users
🤫 CyberScoop | https://cyberscoop.com/doj-ukrainian-north-korea-remote-worker-scheme-facilitator-sentenced/
📰 The Hacker News | https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms/

New Threat Research & Tradecraft 🔬

- ESET discovered PromptSpy, the first Android malware to use generative AI (Google Gemini) to adapt its persistence across different devices by interpreting UI elements. It functions as spyware, offering remote control, screen recording, and credential interception.
- Proofpoint uncovered "TrustConnect," a fake Remote Monitoring and Management (RMM) vendor selling a Remote Access Trojan (RAT) as a service (RATaaS), using a legitimate code-signing certificate and an AI-generated website to appear credible. RMM abuse surged 277% in 2025.
- "Starkiller" is a sophisticated Phishing-as-a-Service (PhaaS) tool that bypasses MFA by proxying legitimate login pages in real-time, stealing credentials and session tokens. Threat actors are also using device code vishing with legitimate Microsoft OAuth flows to compromise Microsoft Entra accounts, bypassing MFA.
- Chinese state-backed Volt Typhoon remains active and embedded in US critical infrastructure, aiming to pre-position for destructive attacks. SYLVANITE, another group, gains initial access to OT systems across various sectors before handing off to Volt Typhoon.
- North Korea's "Contagious Interview" campaign now includes a MetaMask backdoor, a lightweight JavaScript component, to steal wallet passwords from IT professionals in cryptocurrency, Web3, and AI sectors.
- LockBit 5.0 ransomware has evolved, now targeting Windows, Linux, ESXi, and Proxmox with advanced evasion techniques. "ClickFix" campaigns continue to use nested obfuscation and typosquatting (e.g., fake Homebrew sites) to deliver info-stealers and RATs like Matanbuchus 3.0, AstarionRAT, and Cuckoo Stealer.
- Kerberos delegation has been found to apply to machine accounts, not just human users, posing a significant risk if adversaries leverage it for Domain Administrator-equivalent privileges.
- Threat actors are weaponising inadvertently exposed vulnerable training applications (e.g., OWASP Juice Shop) in cloud environments to plant web shells and cryptocurrency miners. Atlassian Jira Cloud trials are also being abused for automated spam campaigns.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/19/genai_malware_android/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/19/rmm_rat_trustconnect/
🌑 Dark Reading | https://www.darkreading.com/threat-intelligence/starkiller-phishing-kit-mfa
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/
🗞️ The Record | https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure
📰 The Hacker News | https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html

Vulnerabilities & Active Exploitation ⚠️

- CISA has ordered federal agencies to patch a maximum-severity hardcoded-credential vulnerability (CVE-2026-22769) in Dell RecoverPoint within three days, as it's been actively exploited since mid-2024 by Chinese group UNC6201.
- Critical Ivanti Endpoint Manager Mobile (EPMM) flaws (CVE-2026-1281, CVE-2026-1340) are being actively exploited to deploy reverse shells, web shells, and malware like Nezha and cryptocurrency miners.
- A critical (CVSS 9.3) unauthenticated RCE flaw (CVE-2026-2329) in Grandstream GXP1600 series VoIP phones allows remote attackers to gain root privileges and silently eavesdrop on calls.
- Microsoft patched a high-severity privilege escalation (CVE-2026-26119) in Windows Admin Center, allowing an authenticated attacker to elevate privileges over a network.
- OpenSSL fixed a stack buffer overflow (CVE-2025-15467) that could lead to Remote Code Execution (RCE) under certain conditions in its Cryptographic Message Syntax data processing.
- Researchers discovered 16 vulnerabilities in Foxit and Apryse PDF tools, potentially enabling account takeover, session hijacking, data exfiltration, and arbitrary JavaScript execution.
- CISA added an actively exploited GitLab Server-Side Request Forgery (SSRF) vulnerability (CVE-2021-22175) to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to patch by March 11.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping/
📰 The Hacker News | https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html
📰 The Hacker News | https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html

Threat Landscape Commentary 🌐

- MIT CSAIL's 2025 AI Agent Index highlights that AI agents are becoming more capable but lack consensus on behaviour and safety standards. Most developers prioritise features over safety, and many agents ignore `robots.txt`, indicating traditional web protocols are insufficient.
- The proliferation of IoT devices in homes and offices presents significant security risks, with many lacking sufficient security features and storing unencrypted data at rest. Enterprises should segment IoT devices on separate networks and use dedicated accounts to prevent lateral movement.
- Google blocked over 1.75 million apps from the Play Store in 2025 due to policy violations, leveraging generative AI for improved detection. However, new research warns that LLM-generated passwords are fundamentally insecure due to their predictable nature.
- Dragos reports a sharp rise in ransomware groups targeting industrial organisations, with a 49% increase in 2025, impacting 3,300 industrial entities globally.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/20/ai_agents_abound_unbound_by/
🌑 Dark Reading | https://www.darkreading.com/iot/connected-compromised-iot-devices-turn-threats
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/google-blocked-over-175-million-play-store-app-submissions-in-2025/
📰 The Hacker News | https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html

Regulatory Issues & National Security ⚖️

- The UK government plans to mandate online platforms remove non-consensual intimate images within 48 hours, treating them with the same severity as child sexual abuse material (CSAM) and terrorism content, with significant fines for non-compliance.
- Texas is suing TP-Link for deceptive marketing and alleged Chinese hacking risks, claiming its products, despite "Made in Vietnam" labels, rely on Chinese components and could be compelled to share user data with the CCP. Poland has also banned Chinese-made vehicles with data-recording technology from military facilities due to similar national security concerns.
- Following the 2024 Change Healthcare attack, HHS is focusing heavily on identifying and mitigating security risks from third-party vendors in the health sector, recognising their potential for outsized impact.
- West Virginia has sued Apple, alleging iCloud facilitates CSAM distribution and storage, citing Apple's decision to abandon CSAM detection tools and its significantly lower reporting numbers compared to other tech giants.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/19/uk_intimate_images_online/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/texas-sues-tp-link-over-chinese-hacking-risks-user-deception/
📰 The Hacker News | https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html
🤫 CyberScoop | https://cyberscoop.com/hhs-burrows-into-identifying-risks-to-health-sector-from-third-party-vendors/
🗞️ The Record | https://therecord.media/apple-csam-west-virginia-lawsuit

Government Cybersecurity Initiatives 🏛️

- The US State Department is pushing for unified public-private sector efforts to transition to quantum-resistant encryption by 2035, emphasising that these long-term plans must outlive political leadership cycles to counter nation-state data harvesting.
- The Trump administration aims to accelerate the secure implementation of AI for cyber defence (detection, diversion, deception) while ensuring it doesn't expand the attack surface. This includes promoting US AI cybersecurity standards and strengthening the cyber workforce by consolidating existing training initiatives.

🤫 CyberScoop | https://cyberscoop.com/post-quantum-state-department-transition-plans-outlive-leadership-cycles/
🤫 CyberScoop | https://cyberscoop.com/trump-administration-ai-cybersecurity-oncd-strategy/

#CyberSecurity #ThreatIntelligence #Ransomware #Malware #Vulnerabilities #ZeroDay #ActiveExploitation #AI #Phishing #MFA #SupplyChainAttack #IoT #CriticalInfrastructure #NationalSecurity #DataPrivacy #RegulatoryCompliance #InfoSec #CyberAttack #IncidentResponse

Leading Japanese semiconductor supplier responding to ransomware attack

The company said it detected unusual activity within its IT environment on Sunday and activated incident response protocols and isolated the impacted systems.