01 Cold Open: The Week Everything Broke at Once0:00
0:00
Chapters
01Cold Open: The Week Everything Broke at Once
02Sponsor
03Attribution Deep Dive: UNC4736 and Drift
04The Drift Heist: Six Months of Tradecraft
05Two DPRK Units, One Week
06FortiClient EMS: Two Pre-Auth Vulns
07The Four-Hour CISO Playbook
08The Financial Reckoning
09Regulatory Landmines
10npm Broken Trust Model
11Five Threat Actors, One Week
12ICS, Identity, and Standing Watch
13Synthesis: The Unifying Pattern
Speakers
ModeratorIntelGeopoliticalCryptoSupplyThreatDefenseIndustryRegulatoryIcsIdentity
▶01Cold Open: The Week Everything Broke at Once00:00
HalilTwo North Korean units. One week. Two hundred eighty-five million dollars stolen. The entire npm JavaScript ecosystem at risk. And Fortinet's endpoint management platform leaking admin access to anyone who asked.
HalilWelcome to CyberDaily Threatcast. I'm Halil Öztürkci. Let's get into it.
HalilToday we're covering three major threat clusters that converged in the same seventy-two hour window. First: the Drift Protocol heist. Two hundred eighty-five million dollars, attributed to North Korea's UNC4736 — that's Mandiant's tracking name for a North Korean crypto theft unit. This wasn't a smart contract bug. This was a six-month human intelligence operation.
HalilSecond: Fortinet FortiClient EMS — that's endpoint management software that controls security on every device in an enterprise fleet. Two pre-authentication vulnerabilities, exploited in the wild, twenty-eight hundred exposed instances.
HalilThird: the npm supply chain. Thirty-six malicious packages. The Axios library — a hundred million weekly downloads — briefly backdoored. And a major attribution error in today's briefing that we're correcting live.
HalilWith me today: Lena Hartmann on intelligence attribution. Alex Mercer on the technical threat picture. James Okafor on defensive response. Elena Rossi on geopolitical implications. Viktor Petrov on the money trail. Pierre Lefevre on financial exposure. Sofia Andersen on regulatory obligations. Tomas Ilic on the supply chain. And several others joining as we go.
HalilLena — the Drift attribution. The briefing says medium-high confidence on UNC4736. I want to know how solid that really is.
▶02Sponsor02:38
HalilThis episode is brought to you by Blue Cortex AI and Tarhy — their autonomous SOC platform. Here's what Tarhy does: it pulls alerts from your EDR stack — Defender, CrowdStrike, Cortex XDR, SentinelOne — and its AI agents triage every single one, around the clock. Not just pattern matching. Multi-step reasoning, cross-event correlation, MITRE ATT&CK mapping, and a confidence-scored verdict — all in about three minutes. And here's the thing that matters: their Neural Timeline shows you exactly how the AI reached each decision. No black box. The results speak for themselves — sixty to seventy percent fewer false positives, eighty percent faster time to verdict. If your SOC is drowning in five thousand alerts a day, Tarhy can save twenty-five hundred analyst hours a month. Check them out at bluecortex.ai.
▶03Attribution Deep Dive: UNC4736 and Drift03:47
LenaMedium-high confidence. And it's defensible. The evidence chain has three legs.
LenaFirst: on-chain continuity. Elliptic and TRM Labs confirmed fund flows from Drift wallets tie directly to addresses used in the October 2024 Radiant Capital hack — that was fifty-three million dollars, same staging patterns, same bridging behavior.
LenaSecond: persona reuse. The quant trading firm disguise they used at Drift conferences shows identifiable links to Radiant — same tradecraft, same targeting methodology.
LenaThird: the technical signature. Six-month timeline, in-person meetings across multiple countries, malicious TestFlight app, VS Code exploitation. That's Golden Chollima tradecraft as defined by CrowdStrike — an offshoot of Labyrinth Chollima.
HalilSo the April second Ledger CTO assessment — just 'resembles' DPRK tactics — that was early caution, not contradiction?
LenaExactly. The CTI community went from 'resembles' on April second to 'linked' on April fifth as Drift released their internal forensics. The evolution matters. Initial caution was warranted.
HalilNow — the briefing also attributes the React2Shell credential harvesting campaign to LAPSUS$. You flagged that as wrong.
LenaCompletely wrong. These are two distinct, non-overlapping operations. Cisco Talos tracks React2Shell as UAT-10608 — UAT stands for Unknown Adversary Tracker, their placeholder for unclassified clusters.
LenaUAT-10608 exploits CVE-2025-55182 in Next.js, deploys the NEXUS Listener malware, and compromised seven hundred sixty-six hosts in twenty-four hours via automated scanning. Purely technical. No social engineering.
LenaLAPSUS$ is separately confirmed at AstraZeneca and French government targets. Social engineering, extortion, onion site data auctions. Completely different TTPs. The briefing conflated them and that needs to be corrected.
HalilNoted. Correction stands. UAT-10608 is criminal, unattributed. LAPSUS$ is a separate operation. Different threat models, different response postures.
▶04The Drift Heist: Six Months of Tradecraft05:57
HalilElena — walk us through what this operation actually looked like on the ground. Because this isn't hacking in the traditional sense.
Dr.No, it isn't. UNC4736 built a cover identity, allocated state capital for credibility, and groomed targets for six months across multiple continents. That's Operational Tradecraft 101 from any competent intelligence service.
Dr.The one million dollar seed deposit as a trust signal is particularly telling. The DPRK worldview is shaped by scarcity. Deploying seven figures as bait capital signals this was budgeted as strategic, not opportunistic.
HalilViktor, the money. Once they had access — what happened in those twelve minutes?
ViktorIt was surgical. They exploited Solana's durable nonce feature — pre-signed transactions weeks in advance that could execute later. They minted a fake token called CVT with five hundred dollars in artificial liquidity, wash-traded it up, then used compromised multisig keys to list it as valid collateral.
ViktorThey lifted USDC borrowing limits from twenty-five million to five hundred million. Thirty-one transactions. Twelve minutes. Done.
HalilWas this oracle manipulation?
ViktorThat's the important distinction. The oracle wasn't technically compromised. They manipulated price discovery for their fake token. But the root cause is human compromise — they social-engineered two Security Council signers into approving those durable nonces. This is not a code failure. It's an operational security failure.
HalilAnd recovery odds?
ViktorOver two hundred thirty million in USDC was bridged from Solana to Ethereum via Circle's CCTP in a hundred transactions immediately post-exploit. Circle had a six-hour window to freeze it and didn't. Those funds are now on Ethereum and much harder to intercept.
ViktorIf this is confirmed DPRK — and Lena says it is — expect less than five percent recovery. Bybit, one point five billion dollars earlier this year? Effectively zero. DPRK operators avoid KYC exchanges. They use non-compliant OTC desks, peer-to-peer markets, nested services.
Dr.And the timing matters geopolitically. April first, 2026. Heightened US-ROK-Japan trilateral coordination on DPRK cyber sanctions. This operation is also a message: you can harden your code, but you cannot harden your humans.
▶05Two DPRK Units, One Week08:52
HalilHere's what I want the panel to sit with. We have UNC4736 hitting Drift on April first. And UNC1069 — a separate North Korean unit — compromising the Axios npm package on March thirty-first using AI deepfake social engineering. Same week. Different bureaus. Is that coordination?
LenaDifferent bureaus, parallel timelines, no shared infrastructure. I found no technical indicators linking them operationally. Different C2 infrastructure, different initial access vectors, different monetization models.
LenaUNC4736 steals funds directly. UNC1069 steals credentials for lateral movement and downstream supply chain access. Both target crypto and developer ecosystems, but this is convergent criminal tradecraft — not shared command and control.
Dr.I'd push back slightly on that framing. Bureau-level coordination doesn't require shared infrastructure. Two units receiving parallel tasking from the same quarterly directive — both targeting developer and crypto ecosystems — that is coordination at the organizational level.
LenaFair. I'd call it tasking seasonality. Q1 budget cycles, fiscal year pressure. Both units responding to the same national mandate to generate hard currency. The temporal proximity is organizational, not operational.
HalilTomas — UNC1069 didn't just hit Axios. They targeted Lodash and Fastify maintainers too, using AI deepfake calls and fake Slack workspaces. What's the blast radius if Lodash had been compromised?
TomasCatastrophic. Lodash — that's a JavaScript utility library — clocks over a hundred thirty-seven million weekly downloads. But it's not just direct consumers. Lodash sits in the transitive dependency path of virtually every major JavaScript framework: React, Angular, Express, Next.js.
TomasIf UNC1069 had successfully planted WAVESHAPER.V2 — that's the backdoor they deployed against Axios — in Lodash with the same postinstall script technique, you're talking about every React application, every enterprise SaaS platform, every government web portal that touches Node.js.
AlexAnd the detection gap is brutal. The Strapi packages — thirty-six malicious npm plugins targeting a specific crypto platform — were uploaded over thirteen hours before SafeDep caught them. npm's native scanning doesn't detect novel patterns during the upload window. Postinstall scripts execute immediately on install.
TomasLess than five percent of organizations would have caught those pre-installation. You'd need dependency pinning by hash, automated SCA scanning before installation, runtime build sandboxing, and behavioral analysis of postinstall scripts. Most orgs have maybe one of those.
▶06FortiClient EMS: Two Pre-Auth Vulns11:17
HalilAlex — FortiClient EMS. CVE-2026-35616, pre-auth API bypass, CVSS score nine point one. Six days of zero-day exploitation before a patch. How hard is this to exploit?
AlexTrivial. This is spray-and-pray territory. The API bypass is 'improper access control' — in plain English, the API forgot to check if you're supposed to be there at all.
AlexIf it's been exploited since March thirty-first, weaponized code is almost certainly circulating in closed channels. Actors don't waste zero-days on test runs.
HalilAnd there's a second vulnerability. CVE-2026-21643.
AlexPre-auth SQL injection. CVSS score nine point eight. Twenty-eight hundred to four thousand exposed instances confirmed via FOFA and Hunter scanning. Public proof-of-concept confirmed. This one hits a different code path — the init constants API endpoint — but achieves the same result: admin-level access without credentials.
HalilJames — blast radius. What does admin EMS access actually mean?
JamesThis is the crown jewel scenario. EMS admin API access lets you push malicious configurations to every managed endpoint, execute remote commands across the entire fleet, exfiltrate endpoint inventories, security policies, and certificates.
JamesThink of it this way: EMS is designed to manage thousands of endpoints. Compromise EMS and you've effectively compromised every endpoint it touches. It's the master key to the kingdom.
AlexThe two vulns hit consecutive version ranges — seven four four for the SQLi, seven four five and seven four six for the API bypass. Same product, same timeframe. Could an actor use them sequentially? Absolutely. If you fail the API bypass against a later version, drop to the SQLi against an older one. Hedge betting.
JamesAnd the six-day zero-day window — March thirty-first to April fifth — is enough time for broad reconnaissance and selective exploitation. Any organization running internet-facing FortiClient EMS on those versions should treat themselves as compromised until logs prove otherwise.
HalilJames, what do organizations look for in those logs?
JamesIn the HTTP logs, hunt for the Site header containing SQL keywords — SELECT, UNION, double-dash. In EMS audit logs, look for unauthenticated API calls returning two hundred OK. In the admin logs, any new admin account creation or policy changes during that window. And check your database error logs for malformed queries.
▶07The Four-Hour CISO Playbook14:03
HalilJames — a CISO woke up to this briefing. It's eight AM Monday. They have four hours. What do they do, in order?
JamesHour one: confirm FortiClient EMS internet exposure. If you have versions seven four four through seven four six with any public-facing interface — block it at the firewall edge now. Stop the bleeding before anything else.
JamesHour two: deploy virtual patch rules for EMS at the WAF layer, and start forensic hunting on logs from March thirty-first through April fifth. You're looking for those log artifacts I just described.
JamesHour three: if you're in government or defense — deploy Pawn Storm mitigations. That's the APT28 — Russia's military intelligence — Windows zero-day chain. CVE-2026-21513 and CVE-2026-21509. Enable application whitelisting to block Office applications spawning mshta.exe or rundll32.exe. Exploit code is public.
JamesHour four: confirm your patch testing pipeline for an overnight push to FortiClient EMS version seven four seven. Don't push untested patches to production — but you need that pipeline moving now.
HalilChrome CVE-2026-5281. WebGPU use-after-free. EPSS score eighty-six point six percent — that's the probability of exploitation in the wild within thirty days, already active. Fourth Chrome zero-day of 2026. Auto-update rollout could take days. What's the interim?
JamesDisable WebGPU via enterprise Chrome policy. Set WebGPUEnabled to zero in the registry under Google Chrome policies. For ninety percent of enterprise workloads this breaks nothing — WebGPU is primarily browser-based machine learning and experimental graphics. Flag your ML development teams first, then push.
JamesFor forced update on ten thousand plus endpoints: Chrome Enterprise Cloud Management is your fastest path. Enable Force Relaunch After Update in the Admin Console. Set the auto-update check interval to fifteen minutes instead of the default twelve hours. Do not rely on WSUS — too slow for a zero-day.
HalilTarget deployment?
JamesNinety percent of endpoints on version 146.0.7680.178 by end of day Tuesday. That's your goal.
▶08The Financial Reckoning17:08
HalilPierre — put a number on the damage. All three clusters.
PierreFour point nine billion dollars combined. Across three vectors in seventy-two hours. Let me break it down.
PierreDrift Protocol: six hundred twenty-three point five million in total ecosystem impact. Direct theft is two hundred eighty-five million. But the protocol's total value locked collapsed from five hundred fifty million to twenty-four million. Twenty interconnected DeFi protocols — including Perena, Project Zero, Reflect Money — halted operations. DRIFT token down twenty-one percent.
HalilFortiClient EMS?
PierreOne point eight five billion. Using IBM's breach cost baseline of four point six eight million per incident, adjusted upward for privilege infrastructure — EMS compromise is worse than a typical breach because it propagates across the entire endpoint fleet. Modelling a forty percent compromise rate across the exposed instance universe gets you to roughly six hundred organizations at an average of three point one million each.
HalilAnd Axios?
PierreTwo point four billion in downstream cascade damage. The three-hour compromise window maps to roughly one point eight million downloads. Thirty percent enterprise-sourced — that's five hundred forty thousand enterprise installations exposed. Of those, about eighty-one thousand actually executed the malicious postinstall hooks.
PierreAt twenty-nine thousand five hundred dollars average direct damage per compromised workstation — credential rotation, incident response, forensics — that's two point four billion. Add build pipeline shutdowns and long-term tooling investments and you're approaching two point eight billion realized.
HalilThe three-hour window was off-peak. Weekend timing. Does your math hold?
PierreActually, Monday morning CI/CD pipelines run hot — automated builds kicking off the week. The weekend timing affects human developer installs, not automated systems. The pipeline exposure is real. The order of magnitude survives scrutiny.
▶09Regulatory Landmines19:21
HalilSofia — three regulatory questions. Start with OFAC. The Drift funds are on Ethereum now. What's the liability for any exchange or bridge operator that touches them?
Dr.The exposure is significant and it applies even to unknowing participants. OFAC's guidance on crypto extends sanctions liability to any entity that facilitates transactions with sanctioned addresses — including exchanges, wallets, and service providers.
Dr.The gray area is scienter — must you know you're processing DPRK-linked funds? OFAC's October 2023 guidance on mixers says willful blindness counts. If you have the tools to detect sanctions risk and choose not to use them, you're exposed.
Dr.BitGo's twenty twenty-two settlement is the reference case — twelve million dollars for inadequate compliance programs. For exchanges: freeze any assets tied to the flagged on-chain addresses. Document your transaction monitoring decisions now. OFAC investigations look at whether you had reason to know.
HalilFortiClient EMS victims — when does the notification clock start?
Dr.Under NIS2 in the EU, twenty-four hours from when you have reasonable assurance of a significant incident — not forensic confirmation. James says treat any exposed unpatched instance as compromised. That's your trigger point.
Dr.Under SEC cyber disclosure rules in the US, four business days from materiality determination. If you ran vulnerable FortiClient EMS between March thirty-first and April fifth and haven't assessed your exposure, you may already be behind the disclosure clock.
Dr.For healthcare organizations under HIPAA — sixty days from discovery, defined as when you knew or reasonably should have known. The public confirmation of exploitation on April fifth may have started that clock for you whether you know it or not.
HalilAnd the Strapi packages — Tomas flagged hardcoded credentials targeting a specific production hostname. What does that imply legally?
Dr.The legal inference chain is significant. Hardcoded credentials targeting a specific platform's configuration means the attackers had prior knowledge of internal architecture. That knowledge doesn't materialize from thin air.
Dr.If a twenty twenty-four or early twenty twenty-five breach compromised configuration files but wasn't recognized as notifiable at the time — and the discovery that this data enabled a subsequent attack arrives now — that could trigger retroactive notification obligations under GDPR Article thirty-three. Delayed disclosure compounds the exposure.
▶10npm Broken Trust Model21:44
HalilTomas — npm. UNC1069 didn't just target Axios. They targeted Lodash, Fastify, and other major package maintainers using AI deepfakes. What does npm need to do structurally to prevent this?
TomasThe brutal truth is that npm is critical infrastructure with a hundred ninety-five billion annual package downloads, and its security model assumes trusted individual maintainers won't be compromised by nation-state actors using AI deepfakes. That assumption is broken.
TomasFirst fix: mandatory trusted publishing with OpenID Connect. No more long-lived npm tokens. Every publish must originate from a verified CI/CD pipeline with identity federation. Axios is implementing this now in their post-mortem.
TomasSecond: publish delays for high-impact packages. Any package above ten million weekly downloads should have a two-hour mandatory delay with automated behavioral analysis. The Axios compromise was caught within three hours — but the window exists because packages go live immediately.
AlexThe postinstall script execution is the fundamental design flaw. UNC1069's payload ran with full user privileges the moment anyone did npm install. That's not a configuration problem — that's architecture.
TomasExactly. Deno has a permission model where scripts can't execute system calls without explicit approval. npm needs something equivalent — opt-out sandboxing for postinstall scripts at minimum.
TomasAnd mandatory signing with Sigstore — every package needs attestable provenance linking back to verified commit SHA and build environment. This doesn't prevent compromise, but it creates an audit trail that makes post-compromise detection minutes faster instead of hours.
HalilWhat about the hardware security key bypass? You mentioned UNC1069 circumvented two-factor authentication via session hijacking after RAT deployment.
TomasThat's why hardware-bound credentials matter. Once WAVESHAPER.V2 is running on the maintainer's machine, it can hijack live sessions. A FIDO2 hardware key — where the credential is physically bound to the device — makes that much harder. Software-based two-factor is not sufficient against nation-state RATs.
▶11Five Threat Actors, One Week26:21
HalilElena — step back. This week: Pawn Storm hitting government infrastructure with Windows zero-days, two DPRK units hitting crypto and supply chains, UAT-10608 harvesting credentials across seven hundred sixty-six hosts, LAPSUS$ hitting AstraZeneca. Five distinct threat actors in seventy-two hours. Is this meaningful convergence or am I pattern-matching noise?
Dr.Both. And the distinction matters. Let me separate the threads.
Dr.Pawn Storm — that's APT28, Russia's GRU military intelligence — is strategically timed. September twenty-twenty-five preparation, January twenty-twenty-six escalation. The timing correlates with battlefield developments, not other cyber actors. That's campaign architecture.
Dr.The two DPRK operations are resource convergence, not timing coordination. Same quarterly directive to generate hard currency through crypto exploitation. UNC4736 and UNC1069 may share reporting lines within North Korea, but they're parallel programs, not a joint operation.
LenaThat tracks with what I'm seeing on the infrastructure side. No shared C2, no overlapping tooling. Same national mandate, different operational teams.
Dr.UAT-10608 is criminal noise. Lumped into this week by reporting coincidence, not operational coordination. And LAPSUS$ — brand co-opting by opportunists at this point.
HalilSo thirty percent reporting artifact?
Dr.My breakdown: thirty percent reporting artifact, forty percent organizational convergence within DPRK, thirty percent temporal exploitation of defender capacity. State actors study the same defense industry reports. They know when incident response teams are saturated.
Dr.They're not coordinating with each other. They're coordinating against us. I call it temporal blurring — not conspiracy, but convergent evolution toward weaponizing defender bandwidth.
HalilWhich is a more disturbing conclusion in some ways. No master plan to detect. Just rational adversaries independently discovering that this week is a good week to operate.
Dr.Correct. And that means the defensive answer isn't better threat intelligence on actor coordination. It's building response capacity that doesn't saturate.
▶12ICS, Identity, and Standing Watch29:24
HalilBefore we close — two standing watch items that didn't make the critical list but belong in this conversation. Sara, CISA dropped seven ICS advisories in a single day on April second. That's unusual volume.
SaraSeven advisories in one day is a signal, not background noise. We've got CVE-2026-27663 and CVE-2024-27664 hitting Siemens SICAM 8 products — those are RTU controllers and substation equipment that run power distribution automation globally.
SaraForget data theft for a minute. SICAM 8 running in a substation isn't just infrastructure — it keeps phase angles balanced, load flows stable. Remote exploitation via resource exhaustion or out-of-bounds write through XML parsing? That's frequency instability. That's protection relay misoperations. Cascade failures in the worst case.
SaraAnd patch cycles in critical infrastructure don't match disclosure velocity. Siemens has patches for SICAM 8 version 26.10, but you cannot take a substation offline for a firmware update during peak load. Most OT operators I know are two to three years behind on patch management. Virtual patching at the network layer and anomaly detection on IEC 61850 traffic is the realistic interim.
HalilMarcus — identity. You've been watching the session theft trend. Quick summary for the audience.
MarcusAttackers have shifted from credential theft to session theft — and most organizations are blind to the transition. Obsidian Security's data shows forty thousand token theft incidents daily in Microsoft environments, accounting for thirty-one percent of Microsoft 365 breaches in twenty twenty-five.
MarcusTokens are bearer credentials. Possession equals access. Refresh tokens survive password resets. You can rotate the user's password and the attacker maintains persistence if you didn't revoke the token.
MarcusThe immediate fix: shrink token lifetimes. Access tokens measured in hours, not days. Enable Continuous Access Evaluation — that's Microsoft Entra's real-time risk checking — on every session you have. And if you can't deploy FIDO2 hardware keys this quarter, at minimum audit your refresh token policies and implement sign-in risk policies that require step-up authentication when location anomalies occur.
HalilThe UNC1069 Axios attack illustrates exactly this — they used the WAVESHAPER.V2 RAT to hijack live sessions after initial access. The credential itself was never stolen. The session was.
MarcusThat's the pattern. Organizations detect the phishing email. They completely miss the token replay that happens three days later. Different tooling catches different things. Most SIEM deployments aren't tuned for anomalous token use from expected locations.
▶13Synthesis: The Unifying Pattern33:13
HalilLet me pull the threads together. Because there's a unifying pattern across everything we covered today — and it's not vulnerabilities. It's trust.
HalilUNC4736 didn't exploit a smart contract. They exploited a vetted business relationship. Six months of conference meetings, a million dollars in deposited capital, trust carefully built and then weaponized. The multisig signer wasn't hacked — they were convinced.
HalilUNC1069 didn't find a zero-day in Axios's code. They found a single human maintainer and used AI-generated deepfake video calls to impersonate trusted colleagues. The package manager itself wasn't broken — the trust model was.
HalilFortiClient EMS didn't fail because of sophisticated attack infrastructure. The API simply forgot to check authentication. Twenty-eight hundred organizations trusted that their endpoint management console was locked down. It wasn't.
HalilThe key findings. One: two distinct North Korean units — UNC4736 and UNC1069 — executed parallel operations against crypto and developer infrastructure in the same seventy-two hour window. Different bureaus, no shared infrastructure, same strategic objective. This is nation-state campaign synchronization, not opportunistic crime.
HalilTwo: any organization running FortiClient EMS versions seven four four through seven four six with internet exposure should treat themselves as compromised until logs prove otherwise. Patch to seven four seven now. Notification clocks under NIS2 and SEC disclosure rules may already be running.
HalilThree: the briefing incorrectly attributed UAT-10608 to LAPSUS$. These are distinct operations with distinct TTPs and distinct threat models. The correction matters for how you respond.
HalilFour: npm's single-maintainer trust model is a structural vulnerability now being actively exploited by nation-state actors. The Strapi packages, the Axios compromise, the Lodash and Fastify targeting — this is systematic, not scattered.
HalilThe action list. Patch FortiClient EMS to seven four seven today — treat any unpatched internet-facing instance as compromised and start forensic review. Force Chrome to version 146.0.7680.178 across all managed endpoints — disable WebGPU as interim mitigation. Audit npm dependencies for malicious Strapi packages and compromised Axios versions — any match means full credential rotation and CI/CD secret regeneration.
HalilFor DeFi and fintech: audit every external partnership from the past twelve months, especially quantitative trading firms met at conferences. Review multisig signer configurations. Exchanges and bridge operators must screen for OFAC-flagged Drift Protocol addresses — strict liability doesn't care whether you knew.
HalilFor government SOCs: deploy Pawn Storm mitigations for the Windows zero-day chain now. Exploit code is public. Assume active targeting and heightened monitoring until Microsoft patches are validated.
HalilWhat we're watching tomorrow: whether the Drift funds start moving through new mixer infrastructure overnight — Viktor has an alert set. Any new FortiClient EMS exploitation indicators as more organizations discover they were in the zero-day window. And whether UNC1069's targeting of Lodash and Fastify maintainers produces any confirmed secondary compromises.
HalilFour point nine billion dollars. Seventy-two hours. The perimeter isn't where the attacks are landing. They're landing in your vetted partners, your trusted packages, your endpoint management consoles. Build for that threat model.
HalilThat's it for today's CyberDaily Threatcast. Stay safe. See you tomorrow. Thanks to Blue Cortex AI for sponsoring today's episode. Autonomous SOC, real reasoning, no black box. bluecortex.ai.
Episodes
Tue28Apr
Grid in the Crosshairs: Cisco SD-WAN, Gemini CLI, and Two Deadlines Expiring Today
Sun26Apr
Correction Day: The LAPSUS$ Claim Falls Apart, Signal Phishing Is Real
Sat25Apr
Pay or Leak: The 48-Hour Clock, Two CVEs You Must Patch, and DeFi's Governance Confession
Fri24Apr
Shai-Hulud: The Worm That Ate the Pipeline
Thu23Apr
Autonomous Worm, Unseizable C2, and 19 Million Stolen Identities
Wed22Apr
Mythos Breached, Supply Chain Burning, Patch Everything Now
Tue21Apr
Cisco's 48-Hour Clock, Vercel's Roblox Problem, and France's Identity Meltdown
Mon20Apr
Trust Is the Vulnerability
Sun19Apr
Two Hundred Million in Bad Debt and the AI That Finds Zero-Days
Sat18Apr
RedSun Rising: Defender Becomes the Attacker
Fri17Apr
Nation-State Supply Chains, Iran's PLC Gambit, and the AI Exploit Machine
Thu16Apr
The Machine That Hacks Itself: Mythos, TeamPCP, and the Credential Apocalypse
Wed15Apr
Three Crises, One Tuesday
Tue14Apr
North Korea, Snowflake, and the Signing Cert That Shouldn't Have Been There
Sun12Apr
3,891 PLCs, No Zero-Day Required
Sat11Apr
The 24-Hour Exploit Window
Fri10Apr
Zero-Day April: Sandworm, Handala, and the AI Exploit Machine
Thu9Apr
Four Point Six Billion Reasons to Patch Today
Thu9Apr
Phase Transition: AI Zero-Days, Iranian PLCs, and the FBI's Unprecedented Move
Tue7Apr
Convergence: Five Threats, One Nightmare Blueprint
Tue7Apr
The Stryker Paradigm: When Your MDM Becomes a Weapon
Tue7Apr
Convergence Without Coordination
Mon6Apr
The Six-Month Handshake: DPRK's $285M Social Engineering Masterclass
Mon6Apr
The $4.9 Billion Week: North Korea's Twin Strikes & Fortinet's Worst Day
NOW PLAYING