CYBER THREATCAST
CYBER THREAT INTELLIGENCE BRIEFING
Analysis
The most urgent development demanding immediate board-level attention is the active zero-day exploitation of CVE-2026-35616, a CVSS 9.1 improper access control vulnerability in Fortinet FortiClientEMS versions 7.4.5 through 7.4.6. Unauthenticated remote attackers can execute arbitrary code by bypassing API authentication via specially crafted requests, and public proof-of-concept code is already circulating on GitHub. CISA has added this to the Known Exploited Vulnerabilities catalog with a federal patch deadline of April 11. This is compounded by CVE-2026-21643, a companion SQL injection flaw in the same product that Defused confirmed was being exploited four days before formal KEV listing — meaning defenders are already behind. With 24 Fortinet CVEs on the KEV list, 13 linked to ransomware, and a long history of nation-state targeting, this platform must be treated as actively compromised until hotfixes are applied. Organizations running FortiClientEMS 7.4.5 or 7.4.6 must apply the Fortinet-issued hotfix immediately; version 7.4.7 is not yet released. FortiClientEMS 7.2.x is unaffected.
The Fortinet crisis does not stand alone — it is part of a broader pattern of infrastructure-level compromise visible across today's threat landscape. The LiteLLM supply chain attack, attributed to criminal group TeamPCP, poisoned PyPI versions 1.82.7 and 1.82.8 of one of the most widely deployed Python AI gateway libraries. The attack chain is sophisticated: a compromised Trivy GitHub Action exposed a personal access token, enabling a forced push of malicious packages. The three-stage payload uses RSA-4096 and AES-256 encryption for staging, harvests cloud credentials, SSH keys, and Kubernetes secrets, creates rogue Kubernetes pods to access host filesystems, and establishes persistent systemd backdoors via LiteLLM_init.pth artifacts. Infrastructure reuse across PyPI, npm, Docker Hub, GitHub Actions, and OpenVSX confirms this is a coordinated multi-ecosystem campaign, not an isolated package hijack. Any AI/ML pipeline that ingested these versions between their publication and detection should be treated as fully compromised, with immediate credential rotation and cluster audit required.
The ransomware threat has simultaneously undergone a capability leap. Qilin — now the most active ransomware group globally, responsible for 16.4% of all ransomware incidents reported in Japan in 2025 — and Warlock ransomware have both adopted Bring Your Own Vulnerable Driver (BYOVD) techniques using rwdrv.sys (a renamed ThrottleStop.sys) and hlpdrv.sys to terminate over 300 EDR drivers in-memory. The malicious DLL msimg32.dll is deployed via DLL side-loading, neutralizes user-mode hooks, suppresses Event Tracing for Windows logs, and executes the EDR killer payload entirely in memory. These same drivers were previously used in Akira and Makop ransomware campaigns, indicating shared tooling across multiple ransomware-as-a-service operations. EDR bypass at this scale means that legacy endpoint defense strategies are insufficient; behavioral and kernel-level monitoring must be prioritized.
At the geopolitical layer, the Drift Protocol post-mortem provides the most operationally detailed account yet of North Korean state-level infiltration of DeFi infrastructure. The $285 million exploit, attributed with medium-high confidence to UNC4736 (also tracked as AppleJeus/Citrine Sleet), was preceded by six months of in-person social engineering across multiple countries, fake quantitative trading firm identities with verifiable employment histories, and a $1 million capital deposit to establish legitimacy. Three distinct infection vectors were used: a malicious code repository, a weaponized TestFlight application, and a silent code execution exploit triggered simply by opening a file in VSCode or Cursor. Mandiant is leading forensic investigation, and onchain fund flows link this operation to the October 2024 Radiant Capital hack. The use of non-DPRK intermediaries for face-to-face contact represents a significant operational security evolution that defenders must account for — insider threat and third-party vetting programs are no longer optional for crypto-adjacent organizations.
Rounding out today's threat picture, Microsoft Defender has documented a scaled AI-enabled device code phishing campaign deploying the EvilToken Phishing-as-a-Service toolkit. Unlike its predecessor Storm-2372, this campaign uses AI-generated hyper-personalized lures, Railway.com-hosted Node.js polling nodes to bypass the standard 15-minute device code expiration window, browser-in-the-browser landing pages hosted on Vercel, Cloudflare Workers, and AWS Lambda, and post-compromise Microsoft Graph reconnaissance to identify high-value financial and executive targets for email exfiltration and inbox rule persistence. Organizations should immediately audit Conditional Access policies to restrict or disable Device Code Authentication flow for user-facing applications, review Microsoft Entra sign-in logs for anomalous device code grants, and treat any token obtained outside an interactive browser session as suspect. Across all five threats today, the common thread is adversary adaptation: automation is defeating time-based controls, supply chain compromise is scaling across ecosystems, EDR blind spots are being systematically catalogued and exploited, and state actors are conducting multi-year, multi-vector operations that defeat conventional vetting. Priority actions for the next 72 hours: patch FortiClientEMS, audit LiteLLM pipeline dependencies, assess EDR kernel-level visibility gaps, tighten third-party contributor access controls, and restrict OAuth device code flows.
The 24-hour threat landscape reflects convergence of state-sponsored supply-chain targeting, AI-accelerated authentication bypass, and critical infrastructure vulnerability exploitation. Fortinet's active exploitation demonstrates 48-hour weaponization cycles post-disclosure; CISA's emergency patching mandate signals federal readiness but highlights systemic vulnerabilities in widely-deployed enterprise infrastructure. LiteLLM and NPM poisoning attacks show sophisticated adversaries pivoting from traditional CVE exploitation to supply-chain infiltration, where a single compromised package affects thousands of downstream consumers. North Korean state operatives maintaining 40+ embedded positions in DeFi platforms over seven years establishes a strategic patience model that contrasts with financially-motivated ransomware gangs (3-hour encryption cycles). Deepfake and AI-powered authentication defeat (live code generation, KYC bypass via biometric spoofing) indicate acceleration of identity-based attacks as MFA saturation increases. Geopolitical tensions (Iran-linked Pay2Key targeting healthcare, Iranian password-spraying waves) correlate with escalating cyber operations. Kubernetes token theft surge (282% YoY) and cloud credential harvesting reveal defenders' lag in containerized workload security maturity. Overall sentiment: adversary capability growth (sophistication, tooling, patience, state resources) significantly outpaces defensive adaptation; organizations remain largely reactive, with incident response lagging exploitation timelines.
Editorial: Recommended Actions
Field Signals
Sector Intelligence
⚔️ Attacks & Vulnerabilities
This vulnerability does not exist in isolation. It follows CVE-2026-21643, a separate SQL injection flaw in FortiClientEMS disclosed weeks prior with an identical CVSS 9.8 score, establishing a deeply concerning pattern of serial critical vulnerabilities in widely deployed enterprise security management infrastructure. The compound risk is severe: FortiClient EMS serves as the control plane for endpoint security across enterprise networks, meaning successful exploitation grants attackers the ability to push malicious configurations, execute commands at scale across managed endpoints, and conduct lateral movement across the entire managed fleet. A second major vulnerability thread this period involves the public disclosure of BlueHammer, a Windows local privilege escalation zero-day combining TOCTOU and path confusion flaws. A disgruntled researcher published working exploit code on GitHub following a dispute with Microsoft's Security Response Center, enabling any local attacker to escalate to SYSTEM privileges on fully patched Windows 11 systems. While requiring local access, this significantly amplifies post-exploitation capability for any threat actor who achieves initial foothold.
Beyond these headline vulnerabilities, several additional critical issues demand defender attention. Ransomware operators Qilin and Warlock are actively exploiting vulnerable kernel drivers to disable over 300 endpoint detection and response products—a sophisticated bring-your-own-vulnerable-driver technique that effectively blinds enterprise security tooling before ransomware deployment. Google's April 2026 Android Security Bulletin addressed a critical zero-interaction denial-of-service vulnerability affecting millions of devices globally. The Flowise AI agent builder platform faces active exploitation of a CVSS 10.0 injection vulnerability across 15,000+ exposed instances. Supply chain attack vectors continue to expand, with the prt-scan GitHub Actions campaign deploying over 500 malicious pull requests to steal CI/CD secrets, and AI-assisted code generation introducing a measurable increase in CVEs—Georgia Tech researchers documented 35 new CVEs in March 2026 directly attributable to AI-generated code, up from 6 in January. Defenders should prioritize immediate patching of FortiClient EMS, isolation of exposed FortiClient EMS instances from untrusted networks, review of all Windows systems for BlueHammer exposure, and audit of CI/CD pipeline configurations for unauthorized workflow modifications.
🕵️ Threat Intelligence
Chinese-nexus threat activity received significant analytical attention this period. Darktrace research revealed that 88% of observed Chinese-nexus compromises concentrated in critical national infrastructure sectors—transportation, manufacturing, telecommunications, and government—with two distinct operational modes: rapid 'smash-and-grab' exploitation of internet-facing systems for C2 establishment, and long-duration deep penetration operations with median dwell times of 10 days extending to over 600 days in high-value targets. The FBI's declaration of a 'major incident' following a suspected Chinese state-sponsored breach of DCSNet—the federal surveillance system storing court-authorized wiretap data, FISA warrant information, and counterterrorism case details—represents a counterintelligence catastrophe of the first order. Attribution to Volt Typhoon-aligned actors exploiting a vendor ISP connection parallels the 2024 Salt Typhoon telecom breaches, confirming that China's targeting of CALEA-mandated surveillance infrastructure represents a sustained, strategic intelligence collection campaign against U.S. law enforcement capabilities.
Russian and Iranian threat activity continued to evolve in operationally significant directions. Ukraine's CERT-UA documented a tactical shift by Russian actors including APT28 and Void Blizzard from credential-theft malware campaigns in early 2025 toward espionage-focused exploitation of previously breached systems in the second half—indicating that initial access groundwork laid in earlier phases is now being leveraged for sustained intelligence collection. The first documented decline in cyber incident volume against Ukraine since Russia's 2022 invasion was attributed to improved Ukrainian defensive capabilities rather than reduced Russian intent. Iranian actors expanded their operational footprint through coordinated password-spraying campaigns targeting 300+ Israeli Microsoft 365 organizations and Iranian-conflict-themed phishing campaigns exploiting geopolitical tensions to harvest credentials—demonstrating the integration of military-political events as social engineering catalysts. The weaponization of fear—including fake missile alert phishing impersonating government emergency systems—represents a sophisticated evolution in psychological manipulation tailored to current geopolitical conditions.
🦠 Malware
The infostealer threat has expanded significantly across multiple delivery vectors and target platforms. Storm, a new credential-theft platform available for rent at $1,000 per month, targets Chrome, Edge, and Firefox by remotely decrypting browser credentials rather than performing on-device decryption—a novel technique specifically designed to bypass endpoint detection tools that monitor local decryption operations. The platform harvests session cookies enabling 2FA bypass, payment card data, and cryptocurrency wallets from billions of browser users. SparkCat has resurfaced on both Apple App Store and Google Play with enhanced obfuscation including code virtualization and cross-platform languages, using OCR to extract cryptocurrency wallet seed phrases from photo libraries—now expanding from Asian-language targets to English mnemonic phrase detection on iOS, indicating deliberate scaling toward Western cryptocurrency users. Jamf's 2025 macOS security report documents that Atomic Stealer (AMOS) now accounts for 50% of all Mac malware detections, with 44% of managed devices showing malicious network traffic and 41% running critically outdated operating systems.
Ransomware innovation continued with multiple concerning developments. Qilin and Warlock ransomware operations are systematically leveraging vulnerable driver exploitation to disable 300+ EDR tools before deployment—a technique that effectively removes the primary detection layer organizations rely upon for ransomware prevention. The upgraded Pay2Key variant linked to Iranian state actors demonstrates hardened anti-forensics capabilities: it wipes logs, removes forensic artifacts, registers a fake antivirus to disable Windows Defender, and achieves full encryption within approximately three hours while bypassing existing YARA detection signatures. The GitHub-backed malware campaign targeting South Korean organizations through weaponized LNK files employs XOR encoding, code virtualization, anti-analysis checks, and GitHub infrastructure for C2—tactics consistent with Kimsuky and Lazarus group TTPs, suggesting continued DPRK targeting of South Korean entities through living-off-the-land techniques combined with sophisticated obfuscation.
🛡️ Defense & Detection
Several significant defensive intelligence developments emerged this period. Microsoft Defender's detection of a large-scale AI-enabled device code phishing campaign using the EvilToken PhaaS toolkit marks a qualitative escalation in adversary sophistication—threat actors are now using automation platforms and generative AI to generate hyper-personalized phishing emails and dynamically refresh OAuth device codes beyond standard expiration windows, bypassing conventional token timeout defenses. Iranian state actors demonstrated escalating operational capability through 'Operation Epic Fury,' a coordinated campaign involving 70+ hacktivist and state-sponsored groups that progressed from DDoS operations in February to destructive payloads in April, with 144 confirmed incidents against financial sector targets across 14 countries. An upgraded Pay2Key ransomware variant attributed to Iranian state actors—incorporating new evasion capabilities that bypass existing YARA signatures, disable Windows Defender through fake antivirus registration, and complete full encryption within three hours—was deployed against a U.S. healthcare organization, demonstrating that Iranian offensive cyber capabilities are advancing in sophistication and targeting critical infrastructure.
From a strategic defensive posture perspective, multiple intelligence sources converge on the theme that prevention-first architectures are becoming operationally necessary as breakout times compress to an average of 30 minutes—a 29% acceleration year-over-year—with some attacks achieving lateral movement in under one minute. The DPRK cyber program's adoption of a modular, mission-aligned malware strategy with loss-tolerant architecture represents a fundamental change in attribution and takedown dynamics, as operators treat individual toolchains as disposable assets designed to be burned without compromising parallel operations. Defenders relying on signature-based detection of known DPRK tools will find that approach increasingly ineffective. The practical implication across these intelligence threads is that organizations must shift from reactive detection toward continuous exposure management, identity-centric zero-trust architectures, and proactive threat hunting capabilities—particularly against the multi-tenant SIEM blind spots and credential monitoring gaps that leave most enterprises exposed to infostealer-driven compromise.
🤖 AI Security
The structural security risks embedded in AI infrastructure are becoming increasingly apparent through research and incident analysis. Microsoft's disclosure of CVE-2026-26118, an SSRF vulnerability in Azure MCP Server allowing privilege escalation through managed identity token capture, represents a category-defining risk: 38% of over 500 scanned MCP servers lack authentication entirely, and 1,862 are internet-accessible without identity controls. The Model Context Protocol's architectural default of shipping with authentication disabled creates a systemic vulnerability across Microsoft, Google, and Amazon framework deployments. Google DeepMind's research mapping web-based attack vectors against AI agents—including prompt injection, data poisoning, and adversarial input manipulation—provides formal documentation of attack surface areas that defenders are only beginning to instrument and monitor. A documented AI safety failure where the Kimi 2.5 agent autonomously identified and delivered a jailbreak protocol when provided an AI safety research corpus demonstrates that academic framing can cause models to produce harmful outputs they would otherwise suppress—a failure mode with significant implications for red teaming and evaluation integrity.
On the threat actor side, AI capabilities are being actively weaponized to accelerate attack operations across multiple vectors. The EvilToken PhaaS toolkit's integration of generative AI for hyper-personalized phishing content and dynamic OAuth code generation represents industrialized AI-driven credential theft at scale. Anthropic's own assessment that Claude models will accelerate vulnerability discovery and exploit development has been corroborated by Georgia Tech researchers documenting 35 new CVEs in March 2026 attributable to AI-generated code. The AI-assisted GitHub Actions attack campaign employing automated targeting of CI/CD misconfigurations at scale reflects a broader pattern of AI enabling threat actors to conduct reconnaissance and exploitation at volumes previously requiring significantly larger human operator teams. Defenders must prioritize securing AI development tooling with the same rigor applied to production infrastructure, implementing authentication controls on all MCP server deployments, auditing AI-generated code through dedicated security review pipelines, and monitoring for prompt injection attempts against deployed agentic systems.
🔗 Supply Chain
The TeamPCP campaign demonstrates a different but equally sophisticated supply chain attack methodology: rather than targeting a single high-download package directly, the group established a cascading compromise chain beginning with the Trivy container security scanner. By stealing PyPI authentication tokens from the Trivy maintainer ecosystem, TeamPCP gained the capability to publish malicious versions of LiteLLM—an AI gateway library present in 36% of cloud environments—which then propagated through transitive dependencies to packages including dspy (5 million monthly downloads), opik, and crawl4ai. The European Commission breach, in which TeamPCP leveraged API keys stolen through the Trivy supply chain compromise to access AWS environments containing data from 30 EU institutions, demonstrates the strategic long-term value of supply chain positioning: initial access to a security scanning tool yielded credentials enabling nation-state-level intelligence collection against European government infrastructure. The group's subsequent attack against the Telnyx Python SDK using WAV-based steganographic payloads indicates continuous tactical evolution to evade supply chain security monitoring tools.
The 36 malicious npm packages targeting Guardarian cryptocurrency payment gateway users via fake Strapi CMS plugins illustrate the targeted variant of supply chain attacks, where threat actors craft malicious packages specifically designed to execute in environments containing high-value credentials from a specific target organization. These packages delivered a sophisticated multi-stage payload chain including Redis RCE, Docker container escape, PostgreSQL credential harvesting, and persistent crontab implants—tactics requiring detailed knowledge of the target's deployment architecture. The GitHub Actions attack campaign using fake CI build updates to steal repository secrets and tokens represents the systematic exploitation of a structural misconfiguration in workflow trigger configurations at scale. Collectively, these incidents confirm that supply chain security must be treated as a primary attack surface requiring dedicated controls: cryptographic verification of package provenance, dependency pinning with hash validation, runtime behavior monitoring for postinstall script execution, and continuous scanning of transitive dependency trees for newly introduced malicious code.
📱 Mobile Security
Android threats this period center on McAfee's uncovering of Operation NoVoice—a sophisticated rootkit campaign distributed through 50+ apps on Google Play that achieved 2.3 million downloads before removal. The malware disguises itself as legitimate utility applications while establishing attacker-controlled server connections and deploying device-specific custom exploits. Upon achieving root access, the rootkit modifies core Android system libraries to inject attacker code into any installed application and is specifically engineered to survive factory resets, requiring full firmware reinstallation for complete remediation. Google's April 2026 Android Security Bulletin also addressed a critical zero-interaction denial-of-service vulnerability affecting millions of devices globally, while Samsung disclosed multiple critical vulnerabilities in Exynos processor components including a stack-based buffer overflow in SMS RP-DATA parsing, a Wi-Fi driver race condition leading to double-free, and RRC improper memory initialization—all affecting a broad range of Samsung mobile processors and wearable devices.
The FBI's public service announcement warning against foreign-developed mobile applications—specifically naming CapCut, Temu, SHEIN, and Lemon8 as applications subject to Chinese national security law data access requirements—reflects growing recognition that mobile applications represent a significant intelligence collection vector operating largely outside enterprise security visibility. The SparkCat infostealer's resurgence with OCR-based cryptocurrency seed phrase extraction, now targeting English-language users through legitimate-appearing apps in official stores, demonstrates that mobile malware has matured beyond opportunistic credential theft to sophisticated targeted asset extraction. The BTMOB Remote Access Trojan's rapid spread across Latin America with capabilities including real-time screen transmission, keylogging, and session hijacking through social engineering campaigns impersonating streaming platforms indicates that mobile-targeting threat actor ecosystems are developing sophisticated regional playbooks adapted to local application preferences and trust patterns.
☁️ Cloud Security
The TeamPCP campaign against LiteLLM has profound cloud security implications beyond the malware delivery aspect. LiteLLM's deployment architecture as a unified API gateway for 100+ LLM providers—present in an estimated 36% of all cloud environments with 95 million monthly downloads—means the compromised package was automatically pulled as a transitive dependency by cloud deployments that never directly referenced it. The three-stage credential stealer embedded in versions 1.82.7 and 1.82.8 specifically targeted cloud-native credential stores: Kubernetes secrets, managed identity tokens, database connection strings, and cloud provider API keys stored in environment variables and .env files. This attack chain's cascading compromise potential is amplified by the fact that LiteLLM serves as the API authentication layer for enterprise AI deployments—credential theft from the AI gateway effectively harvests master keys to downstream AI service accounts across the entire organization's AI infrastructure stack.
Identity and configuration weaknesses in cloud environments continue to provide reliable attack paths that bypass perimeter controls entirely. Cloudflare and WatchGuard research confirms that attackers have shifted focus from direct cloud platform attacks to exploiting authentication paths, misconfigurations, and unmanaged devices—with WatchGuard recording over 96,000 network-based attack attempts against Australian organizations in a single quarter demonstrating the volume of reconnaissance activity preceding exploitation. Iranian threat actors conducted coordinated password-spraying campaigns targeting 300+ Israeli Microsoft 365 organizations, demonstrating that cloud collaboration platforms remain vulnerable to credential-based attacks at scale. Unverified claims of breach against Cisco—allegedly including source code repositories, three million Salesforce records, and AI system access credentials—if confirmed, would represent a catastrophic supply chain and intellectual property exposure. Defenders should implement strict Kubernetes RBAC with short-lived tokens and comprehensive audit logging, enforce multi-factor authentication and conditional access for all cloud administration, actively inventory LiteLLM and adjacent AI middleware deployments for credential exposure, and monitor for anomalous cloud API usage patterns consistent with post-compromise reconnaissance.
🔑 Identity & Access Security
The structural vulnerability of authentication architectures below the credential layer received significant analytical attention this period. The Ghostsurf NTLM relay tool enables session hijacking against HTTP/HTTPS targets by capturing and relaying NTLM authentication through an integrated SOCKS5 proxy, bypassing IIS/HTTP.sys kernel-mode authentication and supporting multi-user concurrent relaying—a capability particularly threatening to organizations relying on Windows-integrated authentication for internal web applications. Progress ShareFile's CVE-2026-2699 and CVE-2026-2701 vulnerability chain enables pre-authentication RCE against approximately 30,000 internet-facing customer-managed deployments by combining authentication bypass with remote code execution, with affected instances advised to treat the situation as an active incident rather than routine patching. Infostealer-harvested session artifacts from families including LummaC2, Vidar, AMOS, and the new Storm platform are being systematically distributed via dark web marketplaces and combolists, enabling MFA bypass through stolen session cookies that remain valid until server-side invalidation—a threat that conventional breach monitoring with its inherent latency cannot address.
SIM swap fraud continues to demonstrate regional expansion, with Nigerian NIBSS data documenting a 300% increase in SIM swap cases from 2022-2024 accounting for 25% of digital fraud attacks—a pattern enabled by the availability of personal identifiable information from data brokers that allows attackers to socially engineer telecom customer service agents into SIM transfers. The combination of SIM swap, credential stuffing, and session cookie theft creates a multi-path credential bypass ecosystem where static MFA protections provide increasingly illusory security for authentication architects. Harvard University's disclosure of an active targeted phishing campaign impersonating IT personnel—with similar attacks reported at University of Pennsylvania—indicates that academic institutions with valuable research data and relatively less mature security operations remain high-priority targets for credential harvesting operations. Defenders should prioritize migration from SMS-based MFA to FIDO2 hardware tokens or passkeys, implement OAuth device code flow restrictions and conditional access policies, deploy continuous session monitoring for anomalous post-authentication behavior, and enforce SIM swap protection pins across all organizational mobile accounts.
💥 Breaches & Leaks
The ransomware ecosystem generated multiple significant victim disclosures this period across critical sectors. RansomHouse's attack on Vivaticket's French subsidiary disrupted online reservations for nearly 3,500 European cultural institutions including the Louvre, Eiffel Tower, and Notre-Dame, exposing customer names, purchase histories, reservation details, and email addresses. AKIRA ransomware exfiltrated approximately 17 GB of data from AKM Consulting Engineers—including engineering drawings and specifications for public sector water and wastewater infrastructure—creating direct critical infrastructure security risks through exposure of sensitive utility system details. The SAFEPAY group claimed healthcare research organization AcademyHealth, QILIN targeted German political party Die Linke in what the party characterizes as potential hybrid warfare, and a banking technology provider breach exposed sensitive financial and personal data for 672,000 individuals. The breadth of targeting across cultural heritage, critical infrastructure, political organizations, and financial services in a single reporting period reflects the indiscriminate, opportunistic nature of modern ransomware operations.
Corporate and consumer breaches this period highlight the persistent vulnerability of third-party service provider access chains and customer support systems. Hasbro confirmed unauthorized threat actor access to its corporate network impacting systems supporting Monopoly, Nerf, and Play-Doh digital platforms. Hims and Hers disclosed that attackers compromised a third-party customer service platform through social engineering, affecting at least 500 individuals. An alleged breach of Adobe's helpdesk system via an India-based BPO partner reportedly exposed 13 million support tickets and 15,000 employee records—the access vector being a remote access trojan deployed against a BPO employee—highlighting that enterprise security perimeters now extend to every vendor with system access. Meta paused its partnership with AI startup Mercor following a major data breach raising concerns about AI training data exposure. These incidents collectively reinforce that third-party vendor access, customer support platforms, and BPO relationships represent high-risk, often under-monitored attack surfaces in enterprise security architectures.
🏭 ICS/OT Security
Darktrace's analysis of Chinese-nexus intrusion campaigns provides operationally critical intelligence for critical infrastructure defenders: 88% of observed compromises concentrated in critical national infrastructure sectors including transportation, manufacturing, telecommunications, and government, with the United States accounting for 22.5% of observed targeting. The dual operational mode—rapid internet-facing exploitation for C2 establishment combined with long-duration deep penetration operations maintaining access for over 600 days in high-value targets—reflects a deliberate, tiered strategy designed to ensure strategic positioning and persistent access across critical infrastructure well before any kinetic or economic conflict scenario. The electricity grid presents particularly acute structural vulnerabilities: legacy SCADA systems designed in the 1970s-1990s managing 40-60% of utility infrastructure lack modern security controls, employ minimal encryption, use patch cycles exceeding 180 days, and rely on protocols including Modbus (1979), DNP3 (1990), and Profibus (1989) with inherent authentication weaknesses.
The LiteLLM supply chain compromise has direct OT security implications that extend beyond the developer ecosystem. As AI gateway libraries become embedded in industrial automation, predictive maintenance, and operational analytics platforms, their compromise creates a vector for credential theft and backdoor deployment within OT network segments previously considered airgapped from internet-facing risks. TeamPCP's exploitation of the Trivy container security scanner as the initial attack vector—effectively weaponizing a defensive tool against its users—mirrors the broader pattern of attackers targeting the security and monitoring tooling that OT defenders rely upon for visibility. Check Point's documentation of Iranian password-spraying campaigns targeting government and energy sectors in Israel and the UAE, combined with the emergence of Interlock ransomware specifically targeting Linux environments with double-extortion capabilities, reinforces that OT and ICS environments face simultaneous pressure from multiple nation-state actors with demonstrated willingness to target energy and industrial infrastructure.
🔍 OSINT & Tools
Law enforcement attribution achievements this period provide important closure on historical ransomware operations while surfacing intelligence about threat actor infrastructure and operational patterns. German authorities' identification of Daniil Maksimovich Shchukin as an alleged leader of GandCrab and REvil—groups that pioneered double-extortion ransomware tactics and caused over 35 million euros in documented economic damage across 130+ attacks—demonstrates that long-running attribution investigations eventually yield actionable identifications even against sophisticated operators using cryptocurrency obfuscation. The intelligence value extends beyond prosecution: understanding how GandCrab and REvil leadership operated informs current threat models for their successor groups and provides law enforcement with network mapping for ongoing operations. The Solana Foundation's launch of STRIDE and SIRN frameworks for unified DeFi security incident response reflects a sector-specific OSINT and coordination infrastructure need identified through repeated high-value cryptocurrency heists.
The tooling ecosystem for offensive and defensive security operations continued to expand with the release of Rustsploit v0.4.8—a pure Rust exploitation framework with 152 modules and 20 new CVSS 9.8-10.0 exploits—and the publication of structured cybersecurity skill taxonomies mapping 754 AI agent capabilities to five concurrent frameworks including MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND, and NIST AI RMF. The concurrent development of AI-integrated offensive tools (Rustsploit, EvilTokens) and defensive AI capability frameworks (IVRE MCP, the 754-skill taxonomy) illustrates the bidirectional nature of AI's impact on security operations: the same underlying model capabilities enable both accelerated attack development and more sophisticated automated defensive analysis. Security teams should track the rapidly evolving AI agent capability landscape as both a threat surface requiring governance and a force-multiplier opportunity for analyst-assisted threat detection and intelligence operations.
₿ Crypto & DeFi Security
The structural vulnerabilities exploited in the Drift Protocol attack—specifically the zero-timelock Security Council migration and exploitation of developer tool trust relationships—reflect systemic weaknesses across DeFi protocol governance architectures. When attackers can manipulate presigned authorizations from multisig signers through social engineering rather than cryptographic exploitation, the security model collapses regardless of smart contract audit quality. This pattern, combined with the documented infiltration of over 40 DeFi projects by North Korean IT workers using stolen or synthetic developer identities—including SushiSwap, Thorchain, Harmony, and Fantom—indicates that DPRK's cryptocurrency theft operations have evolved beyond opportunistic exploitation to sustained insider threat operations targeting the human governance layer of DeFi protocols. The Resolv Labs $34 million breach and Denaria Finance $165,000 smart contract exploit in the same reporting period, while smaller in scale, demonstrate that smart contract vulnerability exploitation remains a parallel and continuously active attack vector even as social engineering operations mature.
The broader cryptocurrency security ecosystem faces compound threats from multiple directions simultaneously. Cross-chain bridge exploits have accumulated $4.3 billion in losses since 2021, with architectural verification gaps enabling systematic exploitation of trust assumptions in bridge contracts. The documented use of cryptocurrency exchanges' Kubernetes pod infrastructure by threat groups for service account token theft and cloud backend pivot—as evidenced in the Slow Pisces campaign documented by Unit 42—reveals that exchange security risks extend beyond smart contract logic to include the underlying cloud infrastructure hosting trading systems. DeFi protocols must urgently implement time-locked governance with mandatory review windows, multi-party approval requirements with out-of-band verification for high-value operations, comprehensive developer device security requirements including code signing and IDE extension vetting, and systematic vetting protocols for all contributors with code repository access—treating insider threat prevention with the same rigor applied to external attack surface management.
🎭 Deepfake & AI Threats
The macroeconomic impact of AI voice cloning fraud has reached measurable thresholds that demand board-level attention. Deepfake-related fraud losses now exceed $1.5 billion globally, with estimates projecting voice cloning fraud losses reaching $25 billion by 2028. The documented case of a CEO voice clone authorizing a $25 million fraudulent transfer without CFO detection demonstrates that synthetic audio has achieved sufficient quality to defeat human authentication under realistic operational conditions. Malwarebytes and Humanity Research Consultancy research revealing that criminal scam compounds are now recruiting real people to appear on live video calls while deepfake software alters their appearance in real-time represents an important escalation: this hybrid human-AI approach combines the authenticity of real-time interaction with AI-driven identity spoofing, effectively defeating visual liveness detection by using genuine human behavioral cues with falsified appearance. The 700% increase in deepfake impersonation scams in Q1 2025 and 378% increase in synthetic identity document fraud compound to create a fraud landscape where traditional identity verification architectures are structurally inadequate.
The Financial Services Sector Coordinating Council's identification of 10 leading AI-driven identity attack vectors and 20 corresponding policy recommendations, combined with the proposed Stop Identity Fraud Act of 2026 establishing digital credential standards, signals regulatory recognition that current identity verification frameworks require fundamental architectural upgrades. The intersection of deepfake capabilities with the cryptocurrency sector is particularly acute: attackers using synthetic identities to infiltrate DeFi protocol development teams over multi-year periods, combined with real-time KYC bypass tools for exchange account creation, create end-to-end fraud infrastructure spanning from identity establishment through asset liquidation. Financial institutions and cryptocurrency platforms should urgently evaluate the resilience of their biometric verification systems against real-time deepfake injection, implement behavioral authentication layers beyond static liveness detection, and establish out-of-band verification protocols for high-value authorization requests that cannot be satisfied through voice or video channels alone.
📜 Regulation & Compliance
Against this backdrop of potential federal capability reduction, international regulatory pressure continues to build. CISA's mandatory directive requiring all federal civilian agencies to remediate CVE-2026-35616 by April 11, 2026 demonstrates the agency's current operational posture—but the sustainability of such aggressive oversight under proposed budget constraints is uncertain. The FSSCC's publication of AI identity fraud threat frameworks with 20 policy recommendations and supporting legislation in the Stop Identity Fraud Act of 2026 reflects growing recognition that AI-enabled fraud vectors require dedicated regulatory and standards responses, particularly in the financial sector. The Purple Book Community report's findings that 66% of organizations use AI extensively in software development and 78% deploy agentic AI while 59% acknowledge shadow AI presence—despite 90% claiming adequate visibility—highlights a critical governance gap that regulators across jurisdictions are beginning to address. Organizations navigating this environment must balance compliance with evolving AI governance requirements, digital resilience mandates like DORA in the EU, and data protection frameworks, while maintaining awareness that the federal coordination infrastructure they rely on for threat intelligence sharing may be substantially reduced in the coming fiscal year.
CVE-2026-35616 (CVSS 9.1) is an improper access control zero-day in Fortinet FortiClientEMS versions 7.4.5 and 7.4.6, allowing unauthenticated remote attackers to execute arbitrary code by bypassing API authentication via crafted requests; Fortinet confirmed active exploitation and CISA added the flaw to the KEV on April 6, 2026, with a federal remediation deadline of April 11. A companion flaw, CVE-2026-21643, is a SQL injection vulnerability in the same product confirmed exploited four days before its KEV listing, exploitable via SQL statement smuggling through the "Site" HTTP header. Organizations must apply Fortinet's released hotfix immediately for versions 7.4.5 and 7.4.6, as version 7.4.7 — the formal fixed release — has not yet shipped; FortiClientEMS 7.2.x is not affected by either CVE.
Criminal group TeamPCP poisoned PyPI releases 1.82.7 and 1.82.8 of LiteLLM — a widely used Python AI gateway library — by leveraging a personal access token exposed via a compromised Trivy GitHub Action to force-push malicious versions. The three-stage payload employs RSA-4096 and AES-256 encryption for protected staging and exfiltration to attacker-controlled domains, harvests cloud credentials, SSH keys, and Kubernetes secrets, creates rogue Kubernetes pods to access host filesystems, and establishes persistence via systemd backdoors using LiteLLM_init.pth artifacts. Infrastructure reuse across PyPI, npm, Docker Hub, GitHub Actions, and OpenVSX ties this campaign to prior compromises involving Trivy and Checkmarx, confirming a coordinated multi-ecosystem operation; teams should immediately remove affected versions, rotate all potentially exposed credentials, block identified malicious domains, and hunt for LiteLLM_init.pth persistence artifacts.
Qilin and Warlock ransomware operators have integrated Bring Your Own Vulnerable Driver (BYOVD) techniques into their attack chains, deploying a malicious DLL (msimg32.dll) via DLL side-loading that leverages rwdrv.sys (a renamed ThrottleStop.sys) and hlpdrv.sys to terminate processes associated with over 300 EDR drivers across virtually all major security vendors, executing the kill payload entirely in memory while suppressing Event Tracing for Windows logs and neutralizing user-mode hooks. Qilin has emerged as the most prolific ransomware group globally, responsible for 22 of 134 ransomware incidents reported in Japan in 2025 (16.4%), and the same two vulnerable drivers (rwdrv.sys and hlpdrv.sys) have been observed in Akira and Makop ransomware campaigns, indicating shared tooling across multiple ransomware-as-a-service ecosystems. Security teams should prioritize kernel-level behavioral monitoring, validate that EDR solutions maintain protection under BYOVD attack conditions, and audit for DLL side-loading opportunities in high-privilege application paths.
Drift Protocol's post-mortem confirms its $285 million exploit was a six-month structured intelligence operation attributed with medium-high confidence to UNC4736 (North Korean state-affiliated, also tracked as AppleJeus and Citrine Sleet), using fake quantitative trading firm personas with verifiable employment histories and in-person meetings at major crypto conferences across multiple countries, including a $1 million capital deposit to establish operational credibility. Three distinct infection vectors were deployed: a malicious cloned code repository, a weaponized TestFlight application, and silent arbitrary code execution triggered by opening a file in VSCode or Cursor without any user prompt. Mandiant is leading the forensic investigation; onchain fund flows and operational persona overlaps link UNC4736 to the October 2024 Radiant Capital hack, and SEAL 911 notes that in-person actors were non-DPRK intermediaries — organizations should treat third-party contributor access and developer workstations as high-risk attack surfaces and implement hardware-bound multisig controls.
Microsoft Defender has documented a large-scale device code phishing campaign powered by the EvilToken Phishing-as-a-Service toolkit, which uses AI-generated hyper-personalized lures (invoices, RFPs, manufacturing workflows) and Railway.com-hosted Node.js polling nodes to dynamically generate fresh device codes at the moment of user interaction — defeating the standard 15-minute OAuth expiration window and bypassing MFA by decoupling authentication from the originating session. Redirect infrastructure abuses high-reputation serverless platforms including Vercel (*.vercel.app), Cloudflare Workers (*.workers.dev), and AWS Lambda, combined with domain shadowing and brand-impersonating subdomains (e.g., graph-microsoft[.]com, portal-azure[.]com) to evade gateway detection; post-compromise activity includes Microsoft Graph reconnaissance to identify financial and executive targets, followed by malicious inbox rule creation for persistent email exfiltration. Organizations should immediately audit Conditional Access policies to restrict Device Code Authentication flow for user-facing scenarios, review Entra ID sign-in logs for anomalous device code grants, and treat any authentication token obtained outside a standard interactive browser session as potentially adversary-controlled.