Threatcast

Cisco's 48-Hour Clock, Vercel's Roblox Problem, and France's Identity Meltdown

12 scenes9 speakersBriefing
01 Cold Open: Three Clocks Running0:00
0:00
Chapters
01Cold Open: Three Clocks Running
02Sponsor — Blue Cortex AI
03Cisco SD-WAN: The Chain That Hands You the Keys
04The Legal Line: Who Is Actually Bound by the CISA Deadline?
05Vercel: The Roblox Cheat That Broke a Dev Platform
06The OAuth Problem: Shadow Auth Is the New Shadow IT
07KelpDAO: Correcting the Record on Attribution and the Technical Vector
08KelpDAO: The DVN Config That Cost $290M and What You Do About It
09France ANTS: Nineteen Million Citizens, Third Breach This Quarter
10France ANTS: GDPR Clocks, Regulatory Exposure, and What Comes Next
11Krayin CRM: CVSS 10.0, Public PoC, Active Shodan Recon
12Synthesis: What You Do in the Next 48 Hours
Speakers
HalilAlexJamesDr.LenaPierreDr.ViktorDr.
01Cold Open: Three Clocks Running00:00
HalilA CISA emergency directive. Forty-eight hours. Active exploitation. And the initial access vector for one of the biggest developer platform breaches this year was a Roblox cheat download.
HalilWelcome to CyberDaily Threatcast. I'm Halil Öztürkci. Let's get into it.
HalilFour major stories today. We are going to cover all of them — but let me tell you where I'm putting the urgency.
HalilFirst: Cisco Catalyst SD-WAN Manager. Three CVEs chaining to full admin control, no workarounds, active exploitation by a threat actor called UAT-8616, and a federal patch deadline of April twenty-third. That is today plus two.
HalilSecond: the Vercel breach. We ran a scene on this yesterday. But the initial access vector is now confirmed — and it changes everything about the risk model. A Roblox cheat download. A Lumma Stealer infection. One over-permissioned OAuth token. And suddenly ShinyHunters is inside one of the most-used deployment platforms on the internet.
HalilThird: France. Nineteen million citizens. Third government identity system compromised this quarter. Pierre has a number on the exposure that will make your board sit up straight.
HalilAnd fourth — we are correcting the record on KelpDAO. The Lazarus attribution? Our panel is calling it premature. And the technical description in most briefings is flat wrong. We will get into that.
HalilLet's start with the Cisco chain. Alex, how bad is this?
02Sponsor — Blue Cortex AI01:57
HalilThis episode is brought to you by Blue Cortex AI and Tarhy — their autonomous SOC platform. Here's what Tarhy does: it pulls alerts from your EDR stack — Defender, CrowdStrike, Cortex XDR, SentinelOne — and its AI agents triage every single one, around the clock. Not just pattern matching. Multi-step reasoning, cross-event correlation, MITRE ATT&CK mapping, and a confidence-scored verdict — all in about three minutes. And here's the thing that matters: their Neural Timeline shows you exactly how the AI reached each decision. No black box. The results speak for themselves — sixty to seventy percent fewer false positives, eighty percent faster time to verdict. If your SOC is drowning in five thousand alerts a day, Tarhy can save twenty-five hundred analyst hours a month. Check them out at bluecortex.ai.
03Cisco SD-WAN: The Chain That Hands You the Keys03:05
AlexBad. Genuinely bad. If I'm running a red team and I find a Cisco SD-WAN Manager exposed to the internet, I am using this chain. Full stop.
HalilWalk us through it. What are we talking about?
AlexThree CVEs. CVE 2026-20133 — unauthenticated info disclosure. That's your entry point. No credentials needed.
AlexYou pivot to CVE 2026-20128 — recoverable password storage. You're pulling credential files from the system.
AlexThen CVE 2026-20122 — arbitrary file overwrite plus privilege escalation. You now have full admin control.
HalilAnd this is what UAT-8616 is actively running?
AlexConfirmed. CISA has it in the Known Exploited Vulnerabilities catalog. Exploitation was first confirmed in March. The April twenty-third deadline is actually generous.
JamesAnd here is what makes it really nasty — you don't just get the SD-WAN Manager. You get to reconfigure the entire SD-WAN fabric.
AlexExactly. Traffic redirection. Pivot to every WAN-connected site. The blast radius is your whole wide-area network.
JamesCisco is explicit: no workarounds exist. So James — what do you actually do if you cannot patch by tomorrow?
HalilJames, that's the question. What's the forty-eight-hour plan?
JamesStep one: move vManage behind a bastion host. If it's internet-facing right now, that is your only job in the next hour. Isolate first, patch questions later.
JamesStep two: audit every vManage API account. Any read-only account is a pivot candidate. Suspend non-essential API users immediately.
JamesStep three: firewall rules. Management plane access — jump hosts only, SOC and admin network IPs only. Nothing else.
AlexAnd the patch target is version 20.18 plus. Version matrix varies by train — 20.9.8.2, 20.12.5.3, 20.15.4.2, 20.18.2.1. Check your branch.
JamesAfter you patch — and I want to be clear, this is a post-patch step, not instead of patching — hunt for CVE 2026-20128 indicators. Check the credential files in slash opt slash cisco slash sdwan. Look for world-readable permissions. That is your dwell-time detection.
HalilSofia, federal agencies have a binding deadline. Private sector — what's the actual legal exposure?
04The Legal Line: Who Is Actually Bound by the CISA Deadline?05:50
Dr.Black-letter answer: Emergency Directive 26-03 is binding only for Federal Civilian Executive Branch agencies. That is the statutory scope under 44 U.S.C. section 3553.
Dr.Private sector, state and local government, federal contractors — the directive is advisory. CISA explicitly urges all organizations to apply the same remediation, but they have no standalone enforcement mechanism against private entities.
HalilSo a private company can just — ignore it?
Dr.Legally? Yes. Practically? Not if you're a federal contractor. FAR 52.204-21 and DFARS 252.204-7012 often incorporate CISA directives by reference. If you are a major contractor or critical infrastructure operator under Presidential Policy Directive 21, you face indirect compliance pressure.
Dr.And of course — active exploitation is confirmed. The legal question is separate from the security question. No one is going to tell their board 'we didn't patch because the deadline didn't technically apply to us' after a breach.
JamesRight. The liability argument alone should drive it. You know about active exploitation. You know about the advisory. You didn't act. That is not a defensible position in an IR deposition.
HalilAgreed. Patch or isolate. The legal nuance doesn't change the operational imperative.
AlexPatch now. Stop reading. Patch now.
05Vercel: The Roblox Cheat That Broke a Dev Platform07:32
HalilWe covered the Vercel breach yesterday. Today we have the confirmed initial access vector — and it changes the risk model significantly. Lena, set the timeline.
LenaFebruary 2026. A Context.ai employee downloads a Roblox cheat program. That binary is Lumma Stealer — an infostealer that harvests browser session tokens, saved credentials, and OAuth tokens.
LenaWhat gets stolen: AWS credentials. Google Workspace OAuth tokens. And critically — Context.ai had an OAuth integration with Google Workspace with 'Allow All' scope permissions.
HalilThat scope is the pivot point?
LenaThat scope is the pivot point. The attacker uses the stolen OAuth token to authenticate as Context.ai's integration. From there, they have access to Vercel employees' Workspace environments. Environment variable enumeration follows.
AlexAnd environment variables in developer infrastructure are credential goldmines. Supabase tokens, Datadog API keys, Authkit configs — all sitting in plaintext. All lifted from one browser compromise.
JamesThis is what I keep saying. The human factor isn't secondary. A Roblox cheat download is now the initial access to a multi-million dollar breach. We cannot patch our way out of that.
PierreAnd Pierre had a question yesterday that I think is critical here — the dwell time. June 2024 initial access, April 2026 disclosure. That is nearly twenty-two months.
HalilPierre, you flagged this. What does twenty-two months of dwell time do to your exposure model?
PierreIt blows it open. My assumption is that most exposed credentials were static secrets. Developers rotate API keys when something breaks, not on a schedule. Twenty-two months? You are looking at long-lived tokens that touched production systems.
PierreMy total exposure model sits at one hundred eighty million dollars. Vercel direct costs — forensics with Mandiant, customer notification, infrastructure hardening — that's twenty-five to thirty-five million. Customer credential rotation cascade for three to five thousand enterprise accounts, average fifteen thousand per customer remediation — fifty million. Reputational and revenue impact on a platform growing eighty percent year over year — sixty million. And downstream third-party exposure, especially crypto projects using Vercel with high treasury risk — thirty-five million.
AlexVercel called it 'quite limited.' That is classic CYA language.
PierreClassic. And the worst case — if we see confirmed crypto treasury drainage from projects running on Vercel — that number goes past four hundred million.
06The OAuth Problem: Shadow Auth Is the New Shadow IT10:40
HalilJames, you said this incident fundamentally changes how you think about the attack surface. Specifically — OAuth grants.
JamesYeah. So — look, the Context.ai OAuth grant wasn't reviewed by security. It wasn't on any asset inventory. It had 'Allow All' permissions. This is shadow IT plus shadow authentication.
JamesDavid Lindner at Contrast Security put it perfectly: no exploit, no zero-day. Just an unsanctioned AI tool, an over-permissioned OAuth grant, and a gaming cheat download.
HalilArjun, you have been tracking AI tool proliferation as an attack surface. How common is this 'Allow All' problem?
Dr.Extremely common. And I mean that. The market incentive for AI productivity tools is to request maximum OAuth scope on onboarding — it reduces friction, it makes the demo impressive. Security review is a speed bump they try to skip.
Dr.Most organizations have dozens of these integrations they do not know about. Think of OAuth grants like SQL injection, except the parser is your identity provider — and there is no formal grammar defining what 'Allow All' actually means in practice until something goes wrong.
JamesAnd that's exactly why the immediate action here is not technical. It's inventory. Go audit your Google Workspace and Microsoft 365 OAuth authorizations right now. If you don't recognize an app, revoke it.
LenaAnd block unapproved AI tool integrations at the IdP level going forward. This cannot be a post-incident fix every time.
HalilWhat about the endpoint side? The Lumma Stealer infection came from a personal device, presumably.
JamesThat is the harder problem. Personal device hygiene is now your enterprise perimeter. You can pour millions into network controls — if an employee downloads malware on their gaming laptop and that device touches corporate credentials via browser session stores, you're done.
JamesPractical answer: conditional access policies, browser profile separation between personal and work contexts, and infostealer detection on any developer endpoint that touches production secrets.
Dr.And I'd add — the threat is not going to shrink. Lumma Stealer is actively developed, actively distributed through gaming and crack communities. This is a repeatable playbook.
07KelpDAO: Correcting the Record on Attribution and the Technical Vector13:23
HalilKelpDAO. Two hundred ninety million dollars. We have covered this story two days running. Today's panel is walking back some of what's been reported. Lena — what is wrong with the briefing?
LenaTwo things are wrong. The technical description and the attribution confidence.
LenaOn the technical side: this was not smart contract code exploitation. Multiple sources confirm it was infrastructure-layer targeting. RPC node poisoning against KelpDAO's one-of-one DVN configuration — that is a decentralized verifier network, the trust layer for cross-chain messages — combined with a DDoS against backup verifiers to force failover to malicious nodes.
HalilLayerZero said the protocol itself was not compromised.
LenaCorrect. This is a misconfiguration exploit. The distinction matters enormously for remediation. If you're a DeFi protocol operator hearing 'smart contract exploit,' you go audit your contracts. The actual fix is your DVN configuration.
HalilAnd on Lazarus attribution?
LenaLow-to-moderate confidence. LayerZero used the phrase 'possibly linked' to North Korea's Lazarus Group and its TraderTraitor subunit. That is a very different statement than confirmed attribution.
LenaI see no new on-chain wallet clustering data published since yesterday. The attribution is behavioral inference from LayerZero's own security team — the TTPs are consistent with Lazarus, but consistent is not confirmed.
HalilViktor, you have been watching the on-chain movement. Where does the money stand?
ViktorArbitrum froze seventy-one million. The rest — roughly two hundred nineteen million — is already in the laundering pipeline. Standard layering through cross-chain bridges and mixers.
ViktorI want to be clear on Lena's attribution point: the wallet clustering that tied Ronin Bridge and Harmony Horizon to DPRK infrastructure was granular, published, independently verified. What we have on KelpDAO is not that. Not yet.
LenaExactly. The briefing should have flagged this as suspected, not stated. Attribution confidence matters — it shapes regulatory response, sanctions pressure, and diplomatic signaling. Premature attribution on two hundred ninety million dollars has consequences.
08KelpDAO: The DVN Config That Cost $290M and What You Do About It15:55
HalilRegardless of who did it — the configuration failure is the story for operators. What is a DVN and why does a one-of-one setup get you drained?
AlexSo a DVN — decentralized verifier network — is LayerZero's trust mechanism for cross-chain message validation. When you send assets across chains, verifiers confirm the transaction is legitimate.
AlexA one-of-one configuration means you have a single verifier. You compromise that one node, every cross-chain message you send gets confirmed as legitimate — including fake ones draining the treasury.
ViktorTwo hundred ninety million dollars for a config file that said one instead of three.
HalilHmm.
LenaAnd this is why the 'smart contract exploit' framing is dangerous. You can audit your Solidity code forever. The attack surface was the trust model, not the code.
AlexThe fix is straightforward: minimum two-of-three DVN verification. Require majority consensus before any cross-chain message is honored. This is the action item regardless of attribution.
JamesAnd if you are operating any LayerZero bridge, audit your DVN configuration today. Not this week. Today.
ViktorThe irony is that LayerZero explicitly supports multi-verifier configurations. KelpDAO chose the single-verifier setup. This was an opt-in to maximum risk.
HalilPierre — the briefing claimed third Lazarus crypto op this year. Does the financial pattern still support that framing, even with the attribution uncertainty?
PierreThe financial pattern is consistent with DPRK operational tempo — large, fast, infrastructure-layer targeting of DeFi bridges. But Lena is right: consistent is not confirmed. I would not put 'Lazarus' in a board report without independent wallet clustering evidence.
09France ANTS: Nineteen Million Citizens, Third Breach This Quarter18:03
HalilFrance. The ANTS breach — that is the Agence Nationale des Titres Sécurisés, France's national secure document agency — nineteen million records. Passports, ID cards, driving licenses. And this is the third French government identity system this quarter.
HalilPierre, you have a number. What is the exposure?
PierreFourteen billion euros. That is my total identity fraud exposure estimate for the nineteen million records.
HalilWalk us through the math.
PierreCNIL data shows nine hundred fifteen euros average loss per identity fraud victim in France. Government-certified identity data is premium-tier material — it bypasses standard KYC checks. I apply a one-point-five multiplier for verified government credentials. Nineteen million records times seven hundred forty euro baseline times one-point-five. You get fourteen billion.
PierreAnd remember — FICOBA with one-point-two million bank accounts went in January. ÉduConnect in early April. Criminals now have cross-referenced financial, education, and identity data. The fraud infrastructure writes itself.
LenaThe dark web listing is already up. The breach3d handle, open forum, DM for pricing. This is not sophisticated targeted intelligence collection. This is financially motivated exploitation of a system that was not hardened.
HalilElena, you put forward a thesis earlier that the timing correlates with France's Ukraine posture. You revised that. Where do you land?
Dr.I revised the operational claim. I maintain the structural observation. This is primarily systemic security debt being exploited by financially-motivated criminals — the dark web sales pattern, the multiple amateur-sounding threat actor names, the open forum listings — that is not Moscow tradecraft.
Dr.But — and this is what I am keeping — the post-breach intelligence landscape changes regardless of who did the stealing. Nineteen million government-verified identities on dark web markets for years. France is leading Europe's Ukraine response. Any adversary investing in institutional delegitimization of European governments benefits from this data existing in the wild.
LenaThe theft is criminal. The signal value of the stolen data is geopolitical. Those are not mutually exclusive.
Dr.Exactly. Multiple things can be true.
10France ANTS: GDPR Clocks, Regulatory Exposure, and What Comes Next20:47
HalilSofia — ANTS is a government agency. They hold passport data. What are their notification obligations and what does enforcement look like?
Dr.Under GDPR Article 33(1), ANTS must notify CNIL within seventy-two hours of becoming aware of a breach presenting risk to individuals' rights and freedoms. Passport data qualifies as special category — it enables administrative impersonation and financial fraud across French government systems. The risk threshold is clearly met.
Dr.The criminal complaint to the Paris prosecutor is a separate procedural step. It does not discharge GDPR notification obligations. Both run in parallel.
HalilAnd enforcement? France's CNIL has teeth?
Dr.The January 2026 France Travail precedent is directly applicable. CNIL fined Pôle Emploi five million euros for comparable security failures affecting forty-three million records. Public entities in France face a maximum ten million euro cap rather than the four percent global turnover standard — but the enforcement pattern is consistent.
Dr.And I want to flag Article 226-17-1 of the French Penal Code: non-timely notification carries up to five years imprisonment and three hundred thousand euros in fines. ANTS' legal exposure here is substantial.
JamesWhat does this mean practically for organizations that have French citizen data in their systems? If any of those ANTS credentials are used to authenticate to your services—
Dr.Treat all ANTS credential data as fully compromised. If you process French citizen identity data and share any authentication surface with ANTS portal credentials, you have an independent breach notification analysis to do.
JamesMFA resets and credential rotation for any accounts sharing credentials with the ANTS portal. Now, not when the formal notification arrives.
LenaAnd monitor for synthetic identity fraud indicators across your KYC processes. This data is good enough to open bank accounts and secure loans. Your identity verification systems need to be on alert.
11Krayin CRM: CVSS 10.0, Public PoC, Active Shodan Recon23:05
HalilBefore we close — there is a fourth item from today's briefing that I do not want to bury. Krayin CRM. CVE 2026-38526. CVSS score ten point zero. Alex.
AlexYeah, so — CVSS ten is not a score I throw around. This one earns it. Authenticated arbitrary file upload leading to remote code execution. Any authenticated user. Any internet-facing instance.
HalilPublic PoC is out?
AlexPublic PoC is out and Shodan queries are circulating. That combination means automated scanning is already running against exposed instances.
JamesHonest question — how many organizations are running Krayin CRM at enterprise scale?
AlexSmaller footprint than Cisco SD-WAN, yes. But the internet-facing attack surface is real, the PoC is public, and CVSS ten means you patch or you pull it offline. There is no middle ground.
JamesInterim mitigation if you cannot patch immediately: WAF rules blocking file upload to the affected endpoint. Not a fix — a delay while you get the patch in.
AlexAnd validate the vendor patch status before you trust it. The briefing flagged a source URL mismatch on this one — confirm the patch is legitimate before deploying.
HalilIf you are running Krayin CRM — restrict external access now, verify vendor patch authenticity, and apply WAF file upload restrictions as a bridge. Clear enough?
AlexClear enough.
12Synthesis: What You Do in the Next 48 Hours24:46
HalilLet me pull the threads together.
HalilOne: Cisco SD-WAN. CVE 2026-20133, 20128, 20122. Active exploitation by UAT-8616. CISA deadline April twenty-third. Patch to version 20.18 plus. If you cannot patch in time — vManage behind a bastion host, API accounts suspended, firewall rules to jump hosts only. No workarounds exist.
HalilTwo: Vercel. The confirmed attack chain is Roblox cheat download, Lumma Stealer, stolen OAuth token, enterprise pivot. Your action item is your OAuth grant inventory. If you do not recognize an app, revoke it. Block unapproved AI tool integrations at the IdP level. Conditional access and browser profile separation on developer endpoints.
HalilThree: KelpDAO. The attribution is premature — low-to-moderate confidence, not confirmed Lazarus. The technical vector was DVN misconfiguration, not smart contract exploitation. If you operate any LayerZero bridge, audit your DVN configuration today. Minimum two-of-three verifier requirement.
HalilFour: France ANTS. Nineteen million citizens, fourteen billion euros in estimated fraud exposure, third French government identity system this quarter. Treat ANTS credentials as fully compromised. MFA resets, credential rotation, synthetic identity monitoring on your KYC stack.
HalilFive: Krayin CRM. CVSS ten, public PoC, Shodan recon active. Pull it offline or WAF-restrict file upload while you verify and apply the patch.
HalilThe theme today is trust failures. Trust in a single DVN verifier. Trust in an OAuth token no one reviewed. Trust in government identity infrastructure that was never adequately hardened. Trust in a CVSS score when the PoC is already public.
HalilWhat we are watching tomorrow: downstream customer impact from the Vercel exposure window, any new on-chain forensics that would either confirm or refute the Lazarus attribution on KelpDAO, and whether France's CNIL formally opens an enforcement investigation against ANTS.
HalilThat is it for today's CyberDaily Threatcast. Stay safe. See you tomorrow. Thanks to Blue Cortex AI for sponsoring today's episode. Autonomous SOC, real reasoning, no black box. bluecortex.ai.
Episodes
Tue28Apr
Grid in the Crosshairs: Cisco SD-WAN, Gemini CLI, and Two Deadlines Expiring Today
30:4311 sc
Sun26Apr
Correction Day: The LAPSUS$ Claim Falls Apart, Signal Phishing Is Real
29:2910 sc
Sat25Apr
Pay or Leak: The 48-Hour Clock, Two CVEs You Must Patch, and DeFi's Governance Confession
29:1912 sc
Fri24Apr
Shai-Hulud: The Worm That Ate the Pipeline
30:5411 sc
Thu23Apr
Autonomous Worm, Unseizable C2, and 19 Million Stolen Identities
31:5413 sc
Wed22Apr
Mythos Breached, Supply Chain Burning, Patch Everything Now
28:4313 sc
Tue21Apr
Cisco's 48-Hour Clock, Vercel's Roblox Problem, and France's Identity Meltdown
28:5112 sc
NOW PLAYING
Mon20Apr
Trust Is the Vulnerability
29:5112 sc
Sun19Apr
Two Hundred Million in Bad Debt and the AI That Finds Zero-Days
29:1210 sc
Sat18Apr
RedSun Rising: Defender Becomes the Attacker
28:1011 sc
Fri17Apr
Nation-State Supply Chains, Iran's PLC Gambit, and the AI Exploit Machine
33:1812 sc
Thu16Apr
The Machine That Hacks Itself: Mythos, TeamPCP, and the Credential Apocalypse
31:4111 sc
Wed15Apr
Three Crises, One Tuesday
31:0413 sc
Tue14Apr
North Korea, Snowflake, and the Signing Cert That Shouldn't Have Been There
31:1012 sc
Sun12Apr
3,891 PLCs, No Zero-Day Required
33:1412 sc
Sat11Apr
The 24-Hour Exploit Window
30:5411 sc
Fri10Apr
Zero-Day April: Sandworm, Handala, and the AI Exploit Machine
39:3413 sc
Thu9Apr
Four Point Six Billion Reasons to Patch Today
38:4213 sc
Thu9Apr
Phase Transition: AI Zero-Days, Iranian PLCs, and the FBI's Unprecedented Move
32:3011 sc
Tue7Apr
Convergence: Five Threats, One Nightmare Blueprint
49:2813 sc
Tue7Apr
The Stryker Paradigm: When Your MDM Becomes a Weapon
30:5810 sc
Tue7Apr
Convergence Without Coordination
34:2513 sc
Mon6Apr
The Six-Month Handshake: DPRK's $285M Social Engineering Masterclass
31:2713 sc
Mon6Apr
The $4.9 Billion Week: North Korea's Twin Strikes & Fortinet's Worst Day
46:4713 sc