<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Krebs on Security</title>
	<atom:link href="https://krebsonsecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://krebsonsecurity.com</link>
	<description>In-depth security news and investigation</description>
	<lastBuildDate>Wed, 13 May 2026 10:43:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.2</generator>
	<item>
		<title>Patch Tuesday, May 2026 Edition</title>
		<link>https://krebsonsecurity.com/2026/05/patch-tuesday-may-2026-edition/</link>
					<comments>https://krebsonsecurity.com/2026/05/patch-tuesday-may-2026-edition/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Tue, 12 May 2026 21:46:45 +0000</pubDate>
				<category><![CDATA[Latest Warnings]]></category>
		<category><![CDATA[The Coming Storm]]></category>
		<category><![CDATA[Time to Patch]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[Chris Goettl]]></category>
		<category><![CDATA[Firefox 150]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Ivanti]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Mozilla]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[Project Glasswing]]></category>
		<category><![CDATA[Rapid7]]></category>
		<category><![CDATA[sans internet storm center]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73582</guid>

					<description><![CDATA[Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers -- including Apple, Google, Microsoft, Mozilla and Oracle -- fixing near record volumes of security bugs, and/or quickening the tempo of their patch releases.]]></description>
										<content:encoded><![CDATA[<p>Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers &#8212; including <strong>Apple</strong>, <strong>Google</strong>, <strong>Microsoft</strong>, <strong>Mozilla</strong> and <strong>Oracle</strong> &#8212; fixing near record volumes of security bugs, and/or quickening the tempo of their patch releases.</p>
<p>As it does on the second Tuesday of every month, Microsoft today released software updates to address at least 118 security vulnerabilities in its various <strong>Windows</strong> operating systems and other products. Remarkably, this is the first Patch Tuesday in nearly two years that Microsoft is not shipping any fixes to deal with emergency zero-day flaws that are already being exploited. Nor have any of the flaws fixed today been previously disclosed (potentially giving attackers a heads up in how to exploit the weakness).</p>
<p>Sixteen of the vulnerabilities earned Microsoft&#8217;s most-dire &#8220;critical&#8221; label, meaning malware or miscreants could abuse these bugs to seize remote control over a vulnerable Windows device with little or no help from the user. <strong>Rapid7</strong> has done much of the heavy lifting in identifying some of the more concerning critical weaknesses this month, including:<span id="more-73582"></span></p>
<ul>
<li><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41089" target="_blank" rel="noopener">CVE-2026-41089</a>: A critical stack-based buffer overflow in Windows Netlogon that offers an attacker SYSTEM privileges on the domain controller. No privileges or user interaction are required, and attack complexity is low. Patches are available for all versions of Windows Server from 2012 onwards.</li>
<li><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41096" target="_blank" rel="noopener">CVE-2026-41096</a>: A critical RCE in the Windows DNS client implementation worthy of attention despite Microsoft assessing exploitation as less likely.</li>
<li><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41103" target="_blank" rel="noopener">CVE-2026-41103</a>: A critical elevation of privilege vulnerability that allows an unauthorized attacker to impersonate an existing user by presenting forged credentials, thus bypassing Entra ID. Microsoft expects that exploitation is more likely.</li>
</ul>
<p>May&#8217;s Patch Tuesday is a welcome respite from April, which saw Microsoft <a href="https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/" target="_blank" rel="noopener">fix a near-record 167 security flaws</a>. Microsoft was among a few dozen tech giants given access to a &#8220;<strong>Project Glasswing</strong>,&#8221; a much-hyped AI capability developed by <strong>Anthropic</strong> that appears quite effective at unearthing security vulnerabilities in code.</p>
<p>Apple, another early participant in Project Glasswing, typically fixes an average of 20 vulnerabilities each time it ships a security update for iOS devices, said <strong>Chris Goettl</strong>, vice president of product management at <strong>Ivanti</strong>. On May 11, Apple shipped updates to address at least 52 vulnerabilities and backported the changes all the way to iPhone 6s and iOS 15.</p>
<p>Last month, Mozilla released <strong>Firefox 150</strong>, which resolved <a href="https://arstechnica.com/ai/2026/04/mozilla-anthropics-mythos-found-271-zero-day-vulnerabilities-in-firefox-150/" target="_blank" rel="noopener">a whopping 271 vulnerabilities</a> that were reportedly discovered during the Glasswing evaluation.</p>
<p>&#8220;Since Firefox 150.0.0 released, they have been on a more aggressive weekly cadence for security updates including the release of Firefox 150.0.3 on May Patch Tuesday resolving between three to five CVEs in each release,&#8221; Goettl said.</p>
<p>The software giant Oracle likewise recently increased its patch pace in response to their work with Glasswing. In its most recent quarterly patch update, Oracle addressed at least 450 flaws, including <a href="https://www.securityweek.com/oracle-patches-450-vulnerabilities-with-april-2026-cpu/" target="_blank" rel="noopener">more than 300 fixes for remotely exploitable, unauthenticated flaws</a>. But at the end of April, Oracle announced it was switching to a monthly update cycle for critical security issues.</p>
<p>On May 8, Google started rolling out updates to its Chrome browser that <a href="https://www.forbes.com/sites/daveywinder/2026/05/08/critical-new-google-security-update-127-chrome-security-vulnerabilities-confirmed/" target="_blank" rel="noopener">fixed an astonishing 127 security flaws</a> (up from just 30 the previous month). Chrome automagically downloads available security updates, but installing them requires fully restarting the browser.</p>
<p>If you encounter any weirdness applying the updates from Microsoft or any other vendor mentioned here, feel free to sound off in the comments below. Meantime, if you haven&#8217;t backed up your data and/or drive lately, doing that <em>before</em> updating is generally sound advice. For a more granular look at the Microsoft updates released today, checkout <a href="https://isc.sans.edu/forums/diary/Microsoft%20May%202026%20Patch%20Tuesday/32980/" target="_blank" rel="noopener">this inventory</a> by the <strong>SANS Internet Storm Center</strong>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/05/patch-tuesday-may-2026-edition/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Canvas Breach Disrupts Schools &#038; Colleges Nationwide</title>
		<link>https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/</link>
					<comments>https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Fri, 08 May 2026 02:58:46 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Ne'er-Do-Well News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Canvas hack]]></category>
		<category><![CDATA[Charles Carmakal]]></category>
		<category><![CDATA[Cloudskope]]></category>
		<category><![CDATA[Dipan Mann]]></category>
		<category><![CDATA[Instructure hack]]></category>
		<category><![CDATA[Mandiant Consulting]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Steve Proud]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73563</guid>

					<description><![CDATA[An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service's login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions.]]></description>
										<content:encoded><![CDATA[<p>An ongoing data extortion attack targeting the widely-used education technology platform <strong>Canvas</strong> disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service&#8217;s login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions.</p>
<div id="attachment_73565" style="width: 706px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73565" decoding="async" class="size-full wp-image-73565" src="https://krebsonsecurity.com/wp-content/uploads/2026/05/shinyhunters-instructure-canvas.png" alt="" width="696" height="704" /><p id="caption-attachment-73565" class="wp-caption-text">A screenshot shared by a reader showing the extortion message that was shown on the Canvas login page today.</p></div>
<p>Canvas parent firm <strong>Instructure</strong> responded to today&#8217;s defacement attacks by disabling the platform, which is used by thousands of schools, universities and businesses to manage coursework and assignments, and to communicate with students.</p>
<p>Instructure acknowledged a data breach earlier this week, after the cybercrime group <strong>ShinyHunters</strong> claimed responsibility and said they would leak data on tens of millions of students and faculty unless paid a ransom. The stated deadline for payment was initially set at May 6, but it was later pushed back to May 12.</p>
<p>In <a href="https://status.instructure.com/incidents/9wm4knj2r64z" target="_blank" rel="noopener">a statement</a> on May 6, Instructure said the investigation so far shows the stolen information includes &#8220;certain identifying information of users at affected institutions, such as names, email addresses, and student ID numbers, as well as as messages among users.&#8221; The company said it found no evidence the breached data included more sensitive information, such as passwords, dates of birth, government identifiers or financial information.</p>
<p>The May 6 update stated that Canvas was fully operational, and that Instructure was not seeing any ongoing unauthorized activity on their platform. &#8220;At this stage, we believe the incident has been contained,&#8221; Instructure wrote.</p>
<p>However, by mid-day on Thursday, May 7, students and faculty at dozens of schools and universities were flooding social media sites with comments saying that a ransom demand from ShinyHunters had replaced the usual Canvas login page. Instructure responded by pulling Canvas offline and replacing the portal with the message, &#8220;Canvas is currently undergoing scheduled maintenance. Check back soon.&#8221;</p>
<p>&#8220;We anticipate being up soon, and will provide updates as soon as possible,&#8221; reads the current message on Instructure&#8217;s <a href="https://status.instructure.com/incidents/m88d7ymwpzpy" target="_blank" rel="noopener">status page</a>.</p>
<p>While the data stolen by ShinyHunters may or may not contain particularly sensitive information (ShinyHunters claims it includes several billion private messages among students and teachers, as well as names, phone numbers and email addresses), this attack could hardly have come at a worse time for Instructure: Many of the affected schools and universities are in the middle of final exams, and a prolonged outage could be highly damaging for the company.</p>
<p>The extortion message that greeted countless Canvas users today advised the affected schools to negotiate their own ransom payments to prevent the publication of their data &#8212; regardless of whether Instructure decides to pay.</p>
<p>&#8220;ShinyHunters has breached Instructure (again),&#8221; the extortion message read. &#8220;Instead of contacting us to resolve it they ignored us and did some &#8216;security patches.'&#8221;</p>
<p>A source close to the investigation who was not authorized to speak to the press told KrebsOnSecurity that a number of universities have already approached the cybercrime group about paying. The same source also pointed out that the ShinyHunters data leak blog no longer lists Instructure among its current extortion victims, and that the samples of data stolen from Canvas customers were removed as well. Data extortion groups like ShinyHunters will typically only remove victims from their leak sites after receiving an extortion payment or after a victim agrees to negotiate.</p>
<p><strong>Dipan Mann</strong>, founder and CEO of the security firm <strong>Cloudskope</strong>, slammed Instructure for referring to today&#8217;s outage as a &#8220;scheduled maintenance&#8221; event on its status page. Mann said Shiny Hunters first demonstrated they&#8217;d breached Instructure on May 1, prompting Instructure&#8217;s Chief Information Security Officer <strong>Steve Proud</strong> to declare the following day that the incident had been contained. But Mann said today&#8217;s attack is at least the third time in the past eight months that Instructure has been breached by ShinyHunters.</p>
<p>In a blog post today, Mann noted that in September 2025, ShinyHunters released thousands of internal University of Pennsylvania files — donor records, internal memos, and other confidential materials — through what the Daily Pennsylvanian and other outlets later determined was, in part, a Canvas/Instructure-mediated access path.</p>
<p>&#8220;Penn was the named victim,&#8221; Mann <a href="https://www.cloudskope.com/insights/post/instructure-canvas-ransomware-attack-hits-universities-2026" target="_blank" rel="noopener">wrote</a>. &#8220;Instructure was the mechanism. The incident was treated as a Penn-specific story by most of the national press and quietly handled by Instructure as a customer-specific matter. That framing was wrong then. It is dramatically more wrong in light of the May 2026 events, which now look like the planned escalation of an attack pattern that ShinyHunters had been working against Instructure&#8217;s environment for at least eight months prior. The September 2025 Penn breach was the proof of concept. The May 1, 2026 incident was the production run. The May 7, 2026 recompromise was ShinyHunters demonstrating publicly that the May 2 &#8216;containment&#8217; did not happen.&#8221;<span id="more-73563"></span></p>
<p>In February, a ShinyHunters spokesperson told <em>The Daily Pennsylvanian</em> that Penn <a href="https://www.thedp.com/article/2026/02/penn-hack-donor-data-ransom-one-million-shinyhunters-gse-emai" target="_blank" rel="noopener">failed to pay a $1 million ransom demand</a>. On March 5, ShinyHunters published 461 megabytes worth of data stolen from Penn, including thousands of files such as donor records and internal memos.</p>
<p>ShinyHunters is a prolific and fluid cybercriminal group that specializes in data theft and extortion. They typically gain access to companies through voice phishing and social engineering attacks that often involve impersonating IT personnel or other trusted members of a targeted organization.</p>
<p>Last month, ShinyHunters relieved the home security giant <strong>ADT</strong> of personal information on 5.5 million customers. The extortion group <a href="https://www.bleepingcomputer.com/news/security/home-security-giant-adt-data-breach-affects-55-million-people/" target="_blank" rel="noopener">told BleepingComputer</a> they breached the company by compromising an employee&#8217;s Okta single sign-on account in a voice phishing attack that enabled access to ADT&#8217;s Salesforce instance. BleepingComputer says ShinyHunters recently has taken credit for a number of extortion attacks against high-profile organizations, including Medtronic, Rockstar Games, McGraw Hill, 7-Eleven and the cruise line operator Carnival.</p>
<p>The attack on Canvas customers is just one of several major cybercrime campaigns being launched by ShinyHunters at the moment, said <strong>Charles Carmakal</strong>, chief technology officer at the Google-owned <strong>Mandiant Consulting</strong>. Carmakal declined to comment specifically on the Canvas breach, but said &#8220;there are multiple concurrent and discrete ShinyHunters intrusion and extortion campaigns happening right now.&#8221;</p>
<p>Cloudskope&#8217;s Mann said what happens next depends largely on whether Instructure&#8217;s customers — the universities, K-12 districts, and education ministries paying for Canvas — choose to apply pressure or absorb the breach quietly.</p>
<p>&#8220;The history of education-vendor incidents suggests the path of least resistance is the second one,&#8221; he concluded.</p>
<p><strong>Update, May 8, 11:05 a.m. ET:</strong> Instructure has published <a href="https://www.instructure.com/incident_update" target="_blank" rel="noopener">an incident update page</a> that includes more information about the breach. Instructure said its Canvas portal is functioning normally again, and that the hackers exploited an issue related to Free-for-Teacher accounts.</p>
<p>&#8220;This is the same issue that led to the unauthorized access the prior week,&#8221; Instructure wrote. &#8220;As a result, we have made the difficult decision to temporarily shut down Free-for-Teacher accounts. These accounts have been a core part of our platform, and we&#8217;re committed to resolving the issues with these accounts.&#8221;</p>
<p>Instructure said affected organizations were notified on May 6.</p>
<p>&#8220;If your organization is affected, Instructure will contact your organization’s primary contacts directly,&#8221; the update states. &#8220;Please don&#8217;t rely on third-party lists or social media posts naming potentially affected organizations as those lists aren&#8217;t verified. Instructure will confirm validated information through direct outreach to all affected organizations.&#8221;</p>
<p><strong>Update, May 11, 10:16 p.m. ET:</strong> Instructure posted <a href="https://www.instructure.com/incident_update" target="_blank" rel="noopener">an update</a> saying they paid their extortionists in exchange for a promise to destroy the stolen data. &#8220;The data was returned to us,&#8221; the update reads. &#8220;We received digital confirmation of data destruction (shred logs). We have been informed that no Instructure customers will be extorted as a result of this incident, publicly or otherwise.&#8221;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/feed/</wfw:commentRss>
			<slash:comments>53</slash:comments>
		
		
			</item>
		<item>
		<title>Anti-DDoS Firm Heaped Attacks on Brazilian ISPs</title>
		<link>https://krebsonsecurity.com/2026/04/anti-ddos-firm-heaped-attacks-on-brazilian-isps/</link>
					<comments>https://krebsonsecurity.com/2026/04/anti-ddos-firm-heaped-attacks-on-brazilian-isps/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 14:04:26 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[DDoS-for-Hire]]></category>
		<category><![CDATA[Internet of Things (IoT)]]></category>
		<category><![CDATA[Web Fraud 2.0]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Erick Nascimento]]></category>
		<category><![CDATA[Huge Networks]]></category>
		<category><![CDATA[mirai]]></category>
		<category><![CDATA[TP-Link Archer AX21]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73488</guid>

					<description><![CDATA[A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm's chief executive says the malicious activity resulted from a security breach and was likely the work of a competitor trying to tarnish his company's public image.]]></description>
										<content:encoded><![CDATA[<p>A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm&#8217;s chief executive says the malicious activity resulted from a security breach and was likely the work of a competitor trying to tarnish his company&#8217;s public image.</p>
<div id="attachment_73511" style="width: 773px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73511" decoding="async" loading="lazy" class="size-full wp-image-73511" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/tpllink-ax21.png" alt="" width="763" height="513" /><p id="caption-attachment-73511" class="wp-caption-text">An Archer AX21 router from TP-Link. Image: tp-link.com.</p></div>
<p>For the past several years, security experts have tracked a series of massive DDoS attacks originating from Brazil and solely targeting Brazilian ISPs. Until recently, it was less than clear who or what was behind these digital sieges. That changed earlier this month when a trusted source who asked to remain anonymous shared a curious file archive that was exposed in an open directory online.</p>
<p>The exposed archive contained several Portuguese-language malicious programs written in Python. It also included the private <a href="https://www.sectigo.com/blog/what-is-an-ssh-key" target="_blank" rel="noopener">SSH authentication keys</a> belonging to the CEO of <strong>Huge Networks</strong>, a Brazilian ISP that primarily offers DDoS protection to other Brazilian network operators.</p>
<p>Founded in Miami, Fla. in 2014, Huge Networks&#8217;s operations are centered in Brazil. The company originated from protecting game servers against DDoS attacks and evolved into an ISP-focused DDoS mitigation provider. It does not appear in any public abuse complaints and is not associated with any known <a href="https://krebsonsecurity.com/category/ddos-for-hire/" target="_blank" rel="noopener">DDoS-for-hire services</a>.</p>
<p>Nevertheless, the exposed archive shows that a Brazil-based threat actor maintained root access to Huge Networks infrastructure and built a powerful DDoS botnet by routinely mass-scanning the Internet for insecure Internet routers and unmanaged <a title="http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm" href="http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm" target="_blank" rel="noopener">domain name system (DNS)</a> servers on the Web that could be enlisted in attacks.</p>
<p>DNS is what allows Internet users to reach websites by typing familiar domain names instead of the associated IP addresses. Ideally, DNS servers only provide answers to machines within a trusted domain. But so-called &#8220;DNS reflection&#8221; attacks rely on DNS servers that are (mis)configured to accept queries from anywhere on the Web. Attackers can send spoofed DNS queries to these servers so that the request appears to come from the target’s network. That way, when the DNS servers respond, they reply to the spoofed (targeted) address.</p>
<p>By taking advantage of an extension to the DNS protocol that enables large DNS messages, botmasters can dramatically boost the size and impact of a reflection attack &#8212; crafting DNS queries so that the responses are much bigger than the requests. For example, an attacker could compose a DNS request of less than 100 bytes, prompting a response that is 60-70 times as large. This amplification effect is especially pronounced when the perpetrators can query many DNS servers with these spoofed requests from tens of thousands of compromised devices simultaneously.</p>
<div id="attachment_73544" style="width: 718px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73544" decoding="async" loading="lazy" class="size-full wp-image-73544" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/dnsamp.png" alt="A DNS amplification attack, illustrated. It shows an attacker on the left, sending malicious commands to a number of bots to the immediate right, which then make spoofed DNS queries with the source address as the target's IP address." width="708" height="363" /><p id="caption-attachment-73544" class="wp-caption-text">A DNS amplification and reflection attack, illustrated. Image: veracara.digicert.com.</p></div>
<p>The exposed file archive includes <a href="https://krebsonsecurity.com/wp-content/uploads/2026/04/bash-hist.txt" target="_blank" rel="noopener">a command-line history</a> showing exactly how this attacker built and maintained a powerful botnet by scouring the Internet for <strong>TP-Link Archer AX21</strong> routers. Specifically, the botnet seeks out TP-Link devices that remain vulnerable to <a href="https://www.tp-link.com/us/support/faq/3643/" target="_blank" rel="noopener">CVE-2023-1389</a>, an unauthenticated command injection vulnerability that was patched back in April 2023.</p>
<p>Malicious domains in the exposed Python attack scripts included DNS lookups for <a href="https://www.virustotal.com/gui/domain/hikylover.st/community" target="_blank" rel="noopener">hikylover[.]st</a>, and <a href="https://bazaar.abuse.ch/sample/946709926db4a2c9a7768af3c6e621dfa79e6fd32560fb72fb2231528f19e0df/#intel" target="_blank" rel="noopener">c.loyaltyservices[.]lol</a>, both domains that have been flagged in the past year as control servers for an Internet of Things (IoT) botnet powered by a <a href="https://en.wikipedia.org/wiki/Mirai_(malware)" target="_blank" rel="noopener">Mirai malware</a> variant.</p>
<p>The leaked archive shows the botmaster coordinated their scanning from a Digital Ocean server that has been <a href="https://www.abuseipdb.com/check/174.138.89.122" target="_blank" rel="noopener">flagged for abusive activity hundreds of times</a> in the past year. The Python scripts invoke multiple Internet addresses assigned to Huge Networks that were used to identify targets and execute DDoS campaigns. The attacks were strictly limited to Brazilian IP address ranges, and the scripts show that each selected IP address prefix was attacked for 10-60 seconds with four parallel processes per host before the botnet moved on to the next target.</p>
<p>The archive also shows these malicious Python scripts relied on private SSH keys belonging to Huge Networks&#8217;s CEO, <strong>Erick Nascimento</strong>. Reached for comment about the files, Mr. Nascimento said he did not write the attack programs and that he didn&#8217;t realize the extent of the DDoS campaigns until contacted by KrebsOnSecurity.</p>
<p>&#8220;We received and notified many Tier 1 upstreams regarding very very large DDoS attacks against small ISPs,&#8221; Nascimento said. &#8220;We didn&#8217;t dig deep enough at the time, and what you sent makes that clear.&#8221;</p>
<p>Nascimento said the unauthorized activity is likely related to a digital intrusion first detected in January 2026 that compromised two of the company&#8217;s development servers, as well as his personal SSH keys. But he said there&#8217;s no evidence those keys were used after January.</p>
<p>&#8220;We notified the team in writing the same day, wiped the boxes, and rotated keys,&#8221; Nascimento said, sharing a screenshot of a January 11 notification from Digital Ocean. &#8220;All documented internally.&#8221;</p>
<p>Mr. Nascimento said Huge Networks has since engaged a third-party network forensics firm to investigate further.</p>
<p>&#8220;Our working assessment so far is that this all started with a single internal compromise — one pivot point that gave the attacker downstream access to some resources, including a legacy personal droplet of mine,&#8221; he wrote. <span id="more-73488"></span></p>
<p>&#8220;The compromise happened through a bastion/jump server that several people had access to,&#8221; Nascimento continued. &#8220;Digital Ocean flagged the droplet on January 11 — compromised due to a leaked SSH key, in their wording &#8212; I was traveling at the time and addressed it on return. That droplet was deprecated and destroyed, and it was never part of Huge Networks infrastructure.&#8221;</p>
<p>The malicious software that powers the botnet of TP-Link devices used in the DDoS attacks on Brazilian ISPs is based on <a href="https://krebsonsecurity.com/?s=mirai" target="_blank" rel="noopener">Mirai</a>, a malware strain that made its public debut in September 2016 by launching <a href="https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/" target="_blank" rel="noopener">a then record-smashing DDoS attack</a> that kept this website <a href="https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/" target="_blank" rel="noopener">offline for four days</a>. In January 2017, KrebsOnSecurity <a href="https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/" target="_blank" rel="noopener">identified the Mirai authors</a> as the co-owners of a DDoS mitigation firm that was using the botnet to attack gaming servers and scare up new clients.</p>
<p>In May 2025, KrebsOnSecurity was hit by another Mirai-based DDoS that Google called <a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" target="_blank" rel="noopener">the largest attack it had ever mitigated</a>. That report implicated a 20-something Brazilian man who was running a DDoS mitigation company as well as several DDoS-for-hire services that have since been seized by the FBI.</p>
<p>Nascimento flatly denied being involved in DDoS attacks against Brazilian operators to generate business for his company&#8217;s services.</p>
<p>&#8220;We don&#8217;t run DDoS attacks against Brazilian operators to sell protection,&#8221; Nascimento wrote in response to questions. &#8220;Our sales model is mostly inbound and through channel integrator, distributors, partners &#8212; not active prospecting based on market incidents. The targets in the scripts you received are small regional providers, the vast majority of which are neither in our customer base nor in our commercial pipeline &#8212; a fact verifiable through public sources like <a href="https://radar.qrator.net/as/264409" target="_blank" rel="noopener">QRator</a>.&#8221;</p>
<p>Nascimento maintains he has &#8220;strong evidence stored on the blockchain&#8221; that this was all done by a competitor. As for who that competitor might be, the CEO wouldn&#8217;t say.</p>
<p>&#8220;I would love to share this with you, but it could not be published as it would lose the surprise factor against my dishonest competitor,&#8221; he explained. &#8220;Coincidentally or not, your contact happened a week before an important event – ​​one that this competitor has NEVER participated in (and it&#8217;s a traditional event in the sector). And this year, they will be participating. Strange, isn&#8217;t it?&#8221;</p>
<p>Strange indeed.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/04/anti-ddos-firm-heaped-attacks-on-brazilian-isps/feed/</wfw:commentRss>
			<slash:comments>28</slash:comments>
		
		
			</item>
		<item>
		<title>&#8216;Scattered Spider&#8217; Member &#8216;Tylerb&#8217; Pleads Guilty</title>
		<link>https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/</link>
					<comments>https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 14:53:59 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Ne'er-Do-Well News]]></category>
		<category><![CDATA[SIM Swapping]]></category>
		<category><![CDATA[Ahmed Hossam Eldin Elbadawy]]></category>
		<category><![CDATA[Evans Onyeaka Osiebo]]></category>
		<category><![CDATA[Joel Martin Evans]]></category>
		<category><![CDATA[Noah Michael Urban]]></category>
		<category><![CDATA[Owen Flowers]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[SIM swapping]]></category>
		<category><![CDATA[Thalha Jubair]]></category>
		<category><![CDATA[Tyler Robert Buchanan]]></category>
		<category><![CDATA[Tylerb]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73470</guid>

					<description><![CDATA[A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of dollars worth of cryptocurrency from investors.]]></description>
										<content:encoded><![CDATA[<p>A 24-year-old British national and senior member of the cybercrime group &#8220;<strong>Scattered Spider</strong>&#8221; has pleaded guilty to wire fraud conspiracy and aggravated identity theft. <strong>Tyler Robert Buchanan </strong>admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of dollars worth of cryptocurrency from investors.</p>
<p>Buchanan&#8217;s hacker handle &#8220;<strong>Tylerb</strong>&#8221; once graced a leaderboard in the English-language criminal hacking scene that tracked the most accomplished cyber thieves. Now in U.S. custody and awaiting sentencing, the Dundee, Scotland native is facing the possibility of more than 20 years in prison.</p>
<div id="attachment_73476" style="width: 610px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73476" decoding="async" loading="lazy" class="size-full wp-image-73476" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/dailymail-tylerb.png" alt="A screenshot of two photos of Buchanan that appeared in a Daily Mail story dated May 3, 2025." width="600" height="807" /><p id="caption-attachment-73476" class="wp-caption-text">Two photos published in a Daily Mail story dated May 3, 2025 show Buchanan as a child (left) and as an adult being detained by airport authorities in Spain. &#8220;M&amp;S&#8221; in this screenshot refers to Marks &amp; Spencer, a major U.K. retail chain that suffered a ransomware attack last year at the hands of Scattered Spider.</p></div>
<p>Scattered Spider is the name given to a prolific English-speaking cybercrime group known for using social engineering tactics to break into companies and steal data for ransom, often impersonating employees or contractors to deceive IT help desks into granting access.</p>
<p>As part of his guilty plea, Buchanan admitted conspiring with other Scattered Spider members to launch tens of thousands of SMS-based phishing attacks in 2022 that led to intrusions at a number of technology companies, including Twilio, LastPass, DoorDash, and Mailchimp.</p>
<p>The group then used data stolen in those breaches to carry out <a href="https://krebsonsecurity.com/category/sim-swapping/" target="_blank" rel="noopener">SIM-swapping attacks</a> that siphoned funds from individual cryptocurrency investors. In an unauthorized SIM-swap, crooks transfer the target’s phone number to a device they control and intercept any text messages or phone calls to the victim’s device — such as one-time passcodes for authentication and password reset links sent via SMS. The U.S. Justice Department <a href="https://www.justice.gov/usao-cdca/pr/british-national-pleads-guilty-hacking-companies-and-stealing-least-8-million-virtual" target="_blank" rel="noopener">said</a> Buchanan admitted to stealing at least $8 million in virtual currency from individual victims throughout the United States.<span id="more-73470"></span></p>
<p>FBI investigators tied Buchanan to the 2022 SMS phishing attacks after discovering the same username and email address was used to register numerous phishing domains seen in the campaign. The domain registrar <strong>NameCheap</strong> found that less than a month before the phishing spree, the account that registered those domains logged in from an Internet address in the U.K. FBI investigators said the Scottish police told them the address was leased to Buchanan throughout 2022.</p>
<p>As <a href="https://krebsonsecurity.com/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/" target="_blank" rel="noopener">first reported</a> by KrebsOnSecurity, Buchanan fled the United Kingdom in February 2023, after a rival cybercrime gang hired thugs to invade his home, assault his mother, and threaten to burn him with a blowtorch unless he gave up the keys to his cryptocurrency wallet. That same year, U.K. investigators found a device at Buchanan&#8217;s Scotland residence that included data stolen from SMS phishing victims and seed phrases from cryptocurrency theft victims.</p>
<p>Buchanan was <a href="https://krebsonsecurity.com/2025/04/alleged-scattered-spider-member-extradited-to-u-s/" target="_blank" rel="noopener">arrested by Spanish authorities in June 2024</a> while trying to board a flight to Italy. He was extradited to the United States and has remained in U.S. federal custody since April 2025.</p>
<p>Buchanan is the second known Scattered Spider member to plead guilty. <strong>Noah Michael Urban</strong>, 21, of Palm Coast, Fla., was <a href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/" target="_blank" rel="noopener">sentenced to 10 years in federal prison last year</a> and ordered to pay $13 million in restitution. Three other alleged co-conspirators &#8212; <strong>Ahmed Hossam Eldin Elbadawy</strong>, 24, a.k.a. &#8220;AD,&#8221; of College Station, Texas; <strong>Evans Onyeaka Osiebo</strong>, 21, of Dallas, Texas; and <strong>Joel Martin Evans</strong>, 26, a.k.a. &#8220;joeleoli,&#8221; of Jacksonville, North Carolina – still face criminal charges.</p>
<p>Two other alleged Scattered Spider members will soon be tried in the United Kingdom. <strong>Owen Flowers</strong>, 18, and <strong>Thalha Jubair</strong>, 20, are <a href="https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ransoms/" target="_blank" rel="noopener">facing charges</a> related to the hacking and extortion of several large U.K. retailers, the London transit system, and healthcare providers in the United States. Both have pleaded not guilty, and their trial is slated to begin in June.</p>
<p>Investigators say the Scattered Spider suspects are part of <a href="https://krebsonsecurity.com/2024/09/the-dark-nexus-between-harm-groups-and-the-com/" target="_blank" rel="noopener">a sprawling cybercriminal community online</a> known as &#8220;<strong>The Com</strong>,&#8221; wherein hackers from different cliques boast publicly on Telegram and Discord about high-profile cyber thefts that almost invariably begin with social engineering — tricking people over the phone, email or SMS into giving away credentials that allow remote access to corporate internal networks.</p>
<p>One of the more popular SIM-swapping channels on Telegram has long maintained a leaderboard of the most rapacious SIM-swappers, indexed by their supposed conquests in stealing cryptocurrency. That leaderboard previously listed Buchanan&#8217;s hacker alias Tylerb at #65 (out of 100 hackers), with Urban&#8217;s moniker &#8220;Sosa&#8221; coming in at #24.</p>
<p>Buchanan&#8217;s sentencing hearing is scheduled for August 21, 2026. According to the Justice Department, he faces a statutory maximum sentence of 22 years in federal prison. However, any sentence the judge hands down in this case may be significantly tempered by a number of mitigating factors in the U.S. Sentencing Guidelines, including the defendant&#8217;s age, criminal history, time already served in U.S. custody, and the degree to which they cooperated with federal authorities.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/feed/</wfw:commentRss>
			<slash:comments>30</slash:comments>
		
		
			</item>
		<item>
		<title>Patch Tuesday, April 2026 Edition</title>
		<link>https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/</link>
					<comments>https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 21:47:59 +0000</pubDate>
				<category><![CDATA[Latest Warnings]]></category>
		<category><![CDATA[The Coming Storm]]></category>
		<category><![CDATA[Time to Patch]]></category>
		<category><![CDATA[Action1]]></category>
		<category><![CDATA[adobe reader]]></category>
		<category><![CDATA[Automox]]></category>
		<category><![CDATA[BlueHammer]]></category>
		<category><![CDATA[CVE-2026-32201]]></category>
		<category><![CDATA[CVE-2026-33120]]></category>
		<category><![CDATA[CVE-2026-33825]]></category>
		<category><![CDATA[CVE-2026-34621]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[Mike Walters]]></category>
		<category><![CDATA[Patch Tuesday April 2026]]></category>
		<category><![CDATA[Ryan Braunstein]]></category>
		<category><![CDATA[Satnam Narang]]></category>
		<category><![CDATA[SharePoint Server]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[Will Dormann]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73440</guid>

					<description><![CDATA[Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed "BlueHammer." Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited flaw that can lead to remote code execution.]]></description>
										<content:encoded><![CDATA[<p><strong>Microsoft</strong> today pushed software updates to fix a staggering 167 security vulnerabilities in its <strong>Windows</strong> operating systems and related software, including a <strong>SharePoint Server</strong> zero-day and a publicly disclosed weakness in <strong>Windows Defender</strong> dubbed &#8220;<strong>BlueHammer</strong>.&#8221; Separately, <strong>Google Chrome</strong> fixed its fourth zero-day of 2026, and an emergency update for <strong>Adobe Reader</strong> nixes an actively exploited flaw that can lead to remote code execution.</p>
<p><img decoding="async" loading="lazy" class=" wp-image-56287 aligncenter" src="https://krebsonsecurity.com/wp-content/uploads/2021/07/windupate.png" alt="A picture of a windows laptop in its updating stage, saying do not turn off the computer. " width="749" height="527" srcset="https://krebsonsecurity.com/wp-content/uploads/2021/07/windupate.png 841w, https://krebsonsecurity.com/wp-content/uploads/2021/07/windupate-768x541.png 768w, https://krebsonsecurity.com/wp-content/uploads/2021/07/windupate-782x550.png 782w, https://krebsonsecurity.com/wp-content/uploads/2021/07/windupate-100x70.png 100w" sizes="(max-width: 749px) 100vw, 749px" /></p>
<p>Redmond warns that attackers are already targeting <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32201" target="_blank" rel="noopener">CVE-2026-32201</a>, a vulnerability in Microsoft SharePoint Server that allows attackers to spoof trusted content or interfaces over a network.</p>
<p><strong>Mike Walters</strong>, president and co-founder of <strong>Action1</strong>, said CVE-2026-32201 can be used to deceive employees, partners, or customers by presenting falsified information within trusted SharePoint environments.</p>
<p>&#8220;This CVE can enable phishing attacks, unauthorized data manipulation, or social engineering campaigns that lead to further compromise,&#8221; Walters said. &#8220;The presence of active exploitation significantly increases organizational risk.&#8221;</p>
<p>Microsoft also addressed BlueHammer (<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33825" target="_blank" rel="noopener">CVE-2026-33825</a>), a privilege escalation bug in Windows Defender. According to BleepingComputer, the researcher who discovered the flaw <a href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/" target="_blank" rel="noopener">published exploit code for it</a> after notifying Microsoft and growing exasperated with their response. <strong>Will Dormann</strong>, senior principal vulnerability analyst at <strong>Tharros</strong>, says he <a href="https://infosec.exchange/@wdormann/116404516592597593" target="_blank" rel="noopener">confirmed</a> that the public BlueHammer exploit code no longer works after installing today&#8217;s patches.<span id="more-73440"></span></p>
<p><strong>Satnam Narang</strong>, senior staff research engineer at <strong>Tenable</strong>, said April marks the second-biggest Patch Tuesday ever for Microsoft. Narang also said there are indications that a zero-day flaw Adobe patched in an emergency update on April 11 &#8212; <a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" target="_blank" rel="noopener">CVE-2026-34621</a> &#8212; has seen active exploitation since at least November 2025.</p>
<p><strong>Adam Barnett</strong>, lead software engineer at <strong>Rapid7</strong>, called the patch total from Microsoft today &#8220;a new record in that category&#8221; because it includes nearly 60 browser vulnerabilities. Barnett said it might be tempting to imagine that this sudden spike was tied to the buzz around the announcement a week ago today of <a href="https://www.anthropic.com/glasswing" target="_blank" rel="noopener">Project Glasswing</a> &#8212; a much-hyped but still unreleased new AI capability from Anthropic that is reportedly quite good at finding bugs in a vast array of software.</p>
<p>But he notes that <strong>Microsoft Edge</strong> is based on the Chromium engine, and the Chromium maintainers acknowledge a wide range of researchers for the vulnerabilities which Microsoft republished last Friday.</p>
<p>&#8220;A safe conclusion is that this increase in volume is driven by ever-expanding AI capabilities,&#8221; Barnett said. &#8220;We should expect to see further increases in vulnerability reporting volume as the impact of AI models extend further, both in terms of capability and availability.&#8221;</p>
<p>Finally, no matter what browser you use to surf the web, it&#8217;s important to completely close out and restart the browser periodically. This is really easy to put off (especially if you have a bajillion tabs open at any time) but it&#8217;s the only way to ensure that any available updates get installed. For example, a Google Chrome update released earlier this month fixed 21 security holes, including the high-severity zero-day flaw <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-5281" target="_blank" rel="noopener">CVE-2026-5281</a>.</p>
<p>For a clickable, per-patch breakdown, check out the <strong>SANS Internet Storm Center</strong> <a href="https://isc.sans.edu/forums/diary/Microsoft%20Patch%20Tuesday%20April%202026./32898/" target="_blank" rel="noopener">Patch Tuesday roundup</a>. Running into problems applying any of these updates? Leave a note about it in the comments below and there&#8217;s a decent chance someone here will pipe in with a solution.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/feed/</wfw:commentRss>
			<slash:comments>29</slash:comments>
		
		
			</item>
		<item>
		<title>Russia Hacked Routers to Steal Microsoft Office Tokens</title>
		<link>https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/</link>
					<comments>https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 17:02:44 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[Internet of Things (IoT)]]></category>
		<category><![CDATA[Latest Warnings]]></category>
		<category><![CDATA[Ne'er-Do-Well News]]></category>
		<category><![CDATA[The Coming Storm]]></category>
		<category><![CDATA[APT 28]]></category>
		<category><![CDATA[Black Lotus Labs]]></category>
		<category><![CDATA[Danny Adamitis]]></category>
		<category><![CDATA[Fancy Bear]]></category>
		<category><![CDATA[Forest Blizzard]]></category>
		<category><![CDATA[Lumen]]></category>
		<category><![CDATA[Microsoft Office]]></category>
		<category><![CDATA[MikroTik]]></category>
		<category><![CDATA[National Cyber Security Centre]]></category>
		<category><![CDATA[Ryan English]]></category>
		<category><![CDATA[TP-Link]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73422</guid>

					<description><![CDATA[Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.]]></description>
										<content:encoded><![CDATA[<p>Hackers linked to Russia&#8217;s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from <strong>Microsoft Office</strong> users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.</p>
<p>Microsoft said in <a href="https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/" target="_blank" rel="noopener">a blog post</a> today it identified more than 200 organizations and 5,000 consumer devices that were caught up in a stealthy but remarkably simple spying network built by a Russia-backed threat actor known as &#8220;<strong>Forest Blizzard</strong>.&#8221;</p>
<div id="attachment_73429" style="width: 774px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73429" decoding="async" loading="lazy" class="size-full wp-image-73429" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/lumen-forestblizzard.png" alt="" width="764" height="353" /><p id="caption-attachment-73429" class="wp-caption-text">How targeted DNS requests were redirected at the router. Image: Black Lotus Labs.</p></div>
<p>Also known as <a href="https://attack.mitre.org/groups/G0007/" target="_blank" rel="noopener">APT28</a> and Fancy Bear, Forest Blizzard is attributed to the military intelligence units within Russia&#8217;s General Staff Main Intelligence Directorate (GRU). APT 28 famously compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election.</p>
<p>Researchers at <strong>Black Lotus Labs</strong>, a security division of the Internet backbone provider <strong>Lumen</strong>, found that at the peak of its activity in December 2025, Forest Blizzard&#8217;s surveillance dragnet ensnared more than 18,000 Internet routers that were mostly unsupported, end-of-life routers, or else far behind on security updates. A <a href="https://www.lumen.com/blog-and-news/en-us/frostarmada-forest-blizzard-dns-hijacking" target="_blank" rel="noopener">new report</a> from Lumen says the hackers primarily targeted government agencies—including ministries of foreign affairs, law enforcement, and third-party email providers.</p>
<p>Black Lotus Security Engineer <strong>Ryan English</strong> said the GRU hackers did not need to install malware on the targeted routers, which were mainly older <strong>Mikrotik</strong> and <strong>TP-Link </strong>devices marketed to the Small Office/Home Office (SOHO) market. Instead, they used known vulnerabilities to modify the Domain Name System (DNS) settings of the routers to include DNS servers controlled by the hackers.</p>
<p>As the U.K.&#8217;s <strong>National Cyber Security Centre</strong> (NCSC) notes in <a href="https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations" target="_blank" rel="noopener">a new advisory</a> detailing how Russian cyber actors have been compromising routers, DNS is what allows individuals to reach websites by typing familiar addresses, instead of associated IP addresses. In a DNS hijacking attack, bad actors interfere with this process to covertly send users to malicious websites designed to steal login details or other sensitive information.</p>
<p>English said the routers attacked by Forest Blizzard were reconfigured to use DNS servers that pointed to a handful of virtual private servers controlled by the attackers. Importantly, the attackers could then propagate their malicious DNS settings to all users on the local network, and from that point forward intercept any <a href="https://learn.microsoft.com/en-us/entra/identity-platform/v2-oauth2-auth-code-flow" target="_blank" rel="noopener">OAuth authentication tokens</a> transmitted by those users.<span id="more-73422"></span></p>
<div id="attachment_73428" style="width: 757px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73428" decoding="async" loading="lazy" class=" wp-image-73428" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/ms-dns-forestblizard.png" alt="" width="747" height="544" /><p id="caption-attachment-73428" class="wp-caption-text">DNS hijacking through router compromise. Image: Microsoft.</p></div>
<p>Because those tokens are typically transmitted only <em>after</em> the user has successfully logged in and gone through multi-factor authentication, the attackers could gain direct access to victim accounts without ever having to phish each user&#8217;s credentials and/or one-time codes.</p>
<p>&#8220;Everyone is looking for some sophisticated malware to drop something on your mobile devices or something,&#8221; English said. &#8220;These guys didn&#8217;t use malware. They did this in an old-school, graybeard way that isn&#8217;t really sexy but it gets the job done.&#8221;</p>
<p>Microsoft refers to the Forest Blizzard activity as using DNS hijacking &#8220;to support post-compromise adversary-in-the-middle (AiTM) attacks on Transport Layer Security (TLS) connections against Microsoft Outlook on the web domains.&#8221; The software giant said while targeting SOHO devices isn&#8217;t a new tactic, this is the first time Microsoft has seen Forest Blizzard using &#8220;DNS hijacking at scale to support AiTM of TLS connections after exploiting edge devices.&#8221;</p>
<p>Black Lotus Labs engineer <strong>Danny Adamitis</strong> said it will be interesting to see how Forest Blizzard reacts to today&#8217;s flurry of attention to their espionage operation, noting that the group immediately switched up its tactics in response to <a href="https://www.ncsc.gov.uk/sites/default/files/documents/ncsc-mar-authentic_antics.pdf" target="_blank" rel="noopener">a similar NCSC report</a> (PDF) in August 2025. At the time, Forest Blizzard was using malware to control a far more targeted and smaller group of compromised routers. But Adamitis said the day after the NCSC report, the group quickly ditched the malware approach in favor of mass-altering the DNS settings on thousands of vulnerable routers.</p>
<p>&#8220;Before the last NCSC report came out they used this capability in very limited instances,&#8221; Adamitis told KrebsOnSecurity. &#8220;After the report was released they implemented the capability in a more systemic fashion and used it to target everything that was vulnerable.&#8221;</p>
<p>TP-Link was among the router makers <a href="https://krebsonsecurity.com/2025/11/drilling-down-on-uncle-sams-proposed-tp-link-ban/" target="_blank" rel="noopener">facing a complete ban</a> in the United States. But on March 23, the <strong>U.S. Federal Communications Commissio</strong>n (FCC) took a much broader approach, <a href="https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers" target="_blank" rel="noopener">announcing</a> it would no longer certify consumer-grade Internet routers that are produced outside of the United States.</p>
<p>The FCC warned that foreign-made routers had become an untenable national security threat, and that poorly-secured routers present “a severe cybersecurity risk that could be leveraged to immediately and severely disrupt U.S. critical infrastructure and directly harm U.S. persons.”</p>
<p>Experts have countered that few new consumer-grade routers would be available for purchase under this new FCC policy (besides maybe Musk&#8217;s Starlink satellite Internet routers, which are produced in Texas). The FCC says router makers can apply for a special &#8220;conditional approval&#8221; from the Department of War or Department of Homeland Security, and that the new policy does not affect any previously-purchased consumer-grade routers.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/feed/</wfw:commentRss>
			<slash:comments>25</slash:comments>
		
		
			</item>
		<item>
		<title>Germany Doxes &#8220;UNKN,&#8221; Head of RU Ransomware Gangs REvil, GandCrab</title>
		<link>https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</link>
					<comments>https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 02:07:17 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[Ne'er-Do-Well News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Web Fraud 2.0]]></category>
		<category><![CDATA[Anatoly Sergeevitsch Kravchuk]]></category>
		<category><![CDATA[Daniel Golden]]></category>
		<category><![CDATA[Daniil Maksimovich Shchukin]]></category>
		<category><![CDATA[Dmitry Smilyanets]]></category>
		<category><![CDATA[GandCrab]]></category>
		<category><![CDATA[Ger0in]]></category>
		<category><![CDATA[German Federal Criminal Police]]></category>
		<category><![CDATA[Intel 471]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[Renee Dudley]]></category>
		<category><![CDATA[rEvil]]></category>
		<category><![CDATA[UNKN]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73394</guid>

					<description><![CDATA[An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.]]></description>
										<content:encoded><![CDATA[<p>An elusive hacker who went by the handle &#8220;<strong>UNKN</strong>&#8221; and ran the early Russian ransomware groups <strong>GandCrab</strong> and <strong>REvil</strong> now has a name and a face. Authorities in Germany say 31-year-old Russian <strong>Daniil Maksimovich Shchukin</strong> headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.</p>
<p>Shchukin was named as UNKN (a.k.a. UNKNOWN) in <a href="https://www.bka.de/DE/IhreSicherheit/Fahndungen/Personen/BekanntePersonen/CC_BW/DMS/Sachverhalt.html?nn=26874#detailinformationen265540" target="_blank" rel="noopener">an advisory</a> published by the <strong>German Federal Criminal Police</strong> (the “Bundeskriminalamt” or BKA for short). The BKA said Shchukin and another Russian &#8212; 43-year-old <strong>Anatoly Sergeevitsch Kravchuk </strong>&#8212; extorted nearly $2 million euros across two dozen cyberattacks that caused more than 35 million euros in total economic damage.</p>
<div id="attachment_73400" style="width: 765px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73400" decoding="async" loading="lazy" class="size-full wp-image-73400" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-kravchuk.png" alt="" width="755" height="473" /><p id="caption-attachment-73400" class="wp-caption-text"><span class="wrapper-text"><span class="caption">Daniil Maksimovich SHCHUKIN, a.k.a. UNKN, and Anatoly Sergeevitsch Karvchuk, alleged leaders of the GandCrab and REvil ransomware groups.</span></span></p></div>
<p>Germany&#8217;s BKA said Shchukin acted as the head of one of the largest worldwide operating ransomware groups GandCrab and REvil, which pioneered the practice of double extortion &#8212; charging victims once for a key needed to unlock hacked systems, and a separate payment in exchange for a promise not to publish stolen data.</p>
<p>Shchukin&#8217;s name appeared in a <a href="https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-seizure-revil.pdf" target="_blank" rel="noopener">Feb. 2023 filing</a> (PDF) from the U.S. Justice Department seeking the seizure of various cryptocurrency accounts associated with proceeds from the REvil ransomware gang&#8217;s activities. The government said the digital wallet tied to Shchukin contained more than $317,000 in ill-gotten cryptocurrency.</p>
<p>The GandCrab ransomware affiliate program first surfaced in January 2018, and paid enterprising hackers huge shares of the profits just for hacking into user accounts at major corporations. The GandCrab team would then try to expand that access, often siphoning vast amounts of sensitive and internal documents in the process. The malware&#8217;s curators shipped five major revisions to the GandCrab code, each corresponding with sneaky new features and bug fixes aimed at thwarting the efforts of computer security firms to stymie the spread of the malware.</p>
<p>On May 31, 2019, the GandCrab team <a href="https://krebsonsecurity.com/2019/07/whos-behind-the-gandcrab-ransomware/" target="_blank" rel="noopener">announced</a> the group was shutting down after extorting more than $2 billion from victims. &#8220;We are a living proof that you can do evil and get off scot-free,&#8221; GandCrab&#8217;s farewell address famously quipped. &#8220;We have proved that one can make a lifetime of money in one year. We have proved that you can become number one by general admission, not in your own conceit.”</p>
<p>The REvil ransomware affiliate program materialized around the same as GandCrab&#8217;s demise, fronted by a user named UNKNOWN who announced on a Russian cybercrime forum that he&#8217;d deposited $1 million in the forum&#8217;s escrow to show he meant business. By this time, many cybersecurity experts <a href="https://krebsonsecurity.com/2019/07/is-revil-the-new-gandcrab-ransomware/" target="_blank" rel="noopener">had concluded</a> REvil was little more than a reorganization of GandCrab.</p>
<p>UNKNOWN also gave <a href="https://therecord.media/i-scrounged-through-the-trash-heaps-now-im-a-millionaire-an-interview-with-revils-unknown" target="_blank" rel="noopener">an interview</a> to <strong>Dmitry Smilyanets</strong>, a former malicious hacker hired by <strong>Recorded Future</strong>, wherein UNKNOWN described a rags-to-riches tale unencumbered by ethics and morals.</p>
<p>&#8220;As a child, I scrounged through the trash heaps and smoked cigarette butts,&#8221; UNKNOWN told Recorded Future. &#8220;I walked 10 km one way to the school. I wore the same clothes for six months. In my youth, in a communal apartment, I didn’t eat for two or even three days. Now I am a millionaire.&#8221;<span id="more-73394"></span></p>
<p>As described in <a href="https://www.amazon.com/Ransomware-Hunting-Team-Improbable-Cybercrime/dp/0374603308" target="_blank" rel="noopener">The Ransomware Hunting Team</a> by <strong>Renee Dudley</strong> and <strong>Daniel Golden</strong>, UNKNOWN and REvil reinvested significant earnings into improving their success and mirroring practices of legitimate businesses. The authors wrote:</p>
<blockquote><p>&#8220;Just as a real-world manufacturer might hire other companies to handle logistics or web design, ransomware developers increasingly outsourced tasks beyond their purview, focusing instead on improving the quality of their ransomware. The higher quality ransomware—which, in many cases, the Hunting Team could not break—resulted in more and higher pay-outs from victims. The monumental payments enabled gangs to reinvest in their enterprises. They hired more specialists, and their success accelerated.&#8221;</p>
<p>&#8220;Criminals raced to join the booming ransomware economy. Underworld ancillary service providers sprouted or pivoted from other criminal work to meet developers’ demand for customized support. Partnering with gangs like GandCrab, &#8216;cryptor&#8217; providers ensured ransomware could not be detected by standard anti-malware scanners. &#8216;Initial access brokerages&#8217; specialized in stealing credentials and finding vulnerabilities in target networks, selling that access to ransomware operators and affiliates. Bitcoin “tumblers” offered discounts to gangs that used them as a preferred vendor for laundering ransom payments. Some contractors were open to working with any gang, while others entered exclusive partnerships.&#8221;</p></blockquote>
<p>REvil would evolve into a feared &#8220;big-game-hunting&#8221; machine capable of extracting hefty extortion payments from victims, largely going after organizations with more than $100 million in annual revenues and fat new cyber insurance policies that were known to pay out.</p>
<p>Over the July 4, 2021 weekend in the United States, REvil hacked into and <a href="https://krebsonsecurity.com/2021/07/kaseya-left-customer-portal-vulnerable-to-2015-flaw-in-its-own-software/" target="_blank" rel="noopener">extorted Kaseya</a>, a company that handled IT operations for more than 1,500 businesses, nonprofits and government agencies. The FBI would later announce they&#8217;d infiltrated the ransomware group&#8217;s servers prior to the Kaseya hack but couldn&#8217;t tip their hand at the time. REvil never recovered from that core compromise, or from the FBI&#8217;s release of a free decryption key for REvil victims who couldn&#8217;t or didn&#8217;t pay.</p>
<p>Shchukin is from Krasnodar, Russia and is thought to reside there, the BKA said.</p>
<p>&#8220;Based on the investigations so far, it is assumed that the wanted person is abroad, presumably in Russia,&#8221; the BKA advised. &#8220;Travel behaviour cannot be ruled out.&#8221;</p>
<p>There is little that connects Shchukin to UNKNOWN&#8217;s various accounts on the Russian crime forums. But a review of the Russian crime forums indexed by the cyber intelligence firm <strong>Intel 471</strong> shows there is plenty connecting Shchukin to a hacker identity called &#8220;<strong>Ger0in</strong>&#8221; who operated large botnets and sold &#8220;installs&#8221; &#8212; allowing other cybercriminals to rapidly deploy malware of their choice to thousands of PCs in one go. However, Ger0in was only active between 2010 and 2011, well before UNKNOWN&#8217;s appearance as the REvil front man.</p>
<p>A review of the mugshots released by the BKA at the image comparison site Pimeyes found a match on <a href="https://event-myata.ru/private/02#!/tab/581005712-2" target="_blank" rel="noopener">this birthday celebration from 2023</a>, which features a young man named Daniel wearing the same fancy watch as in the BKA photos.</p>
<div id="attachment_73401" style="width: 760px" class="wp-caption aligncenter"><a href="https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-bday.png" target="_blank" rel="noopener"><img aria-describedby="caption-attachment-73401" decoding="async" loading="lazy" class="wp-image-73401" src="https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-bday.png" alt="" width="750" height="170" srcset="https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-bday.png 1525w, https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-bday-768x174.png 768w, https://krebsonsecurity.com/wp-content/uploads/2026/04/shchukin-bday-782x177.png 782w" sizes="(max-width: 750px) 100vw, 750px" /></a><p id="caption-attachment-73401" class="wp-caption-text">Images from Daniil Shchukin&#8217;s birthday party celebration in Krasnodar in 2023.</p></div>
<p><strong>Update, April 6, 12:06 p.m. ET</strong>: A <a href="https://infosec.exchange/@odr_k4tana" target="_blank" rel="noopener">reader</a> forwarded <a href="https://us.mirror.ionos.com/projects/media.ccc.de/congress/2023/mp3-translated/37c3-12134-eng-Hirne_hacken_Hackback_Edition_mp3-2.mp3" target="_blank" rel="noopener">this English-dubbed audio recording</a> from a ccc.de (37C3) conference talk in Germany from 2023 that previously outed Shchukin as the REvil leader (Shchuckin is mentioned at around 24:25).</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/feed/</wfw:commentRss>
			<slash:comments>10</slash:comments>
		
		<enclosure url="https://us.mirror.ionos.com/projects/media.ccc.de/congress/2023/mp3-translated/37c3-12134-eng-Hirne_hacken_Hackback_Edition_mp3-2.mp3" length="59196830" type="audio/mpeg" />

			</item>
		<item>
		<title>&#8216;CanisterWorm&#8217; Springs Wiper Attack Targeting Iran</title>
		<link>https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/</link>
					<comments>https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 15:43:04 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[Latest Warnings]]></category>
		<category><![CDATA[Ne'er-Do-Well News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[The Coming Storm]]></category>
		<category><![CDATA[Aikido]]></category>
		<category><![CDATA[Aqua Security]]></category>
		<category><![CDATA[Assaf Morag]]></category>
		<category><![CDATA[CanisterWorm]]></category>
		<category><![CDATA[Catalin Cimpanu]]></category>
		<category><![CDATA[Charlie Eriksen]]></category>
		<category><![CDATA[Flare]]></category>
		<category><![CDATA[ICP]]></category>
		<category><![CDATA[Internet Computer Protocol]]></category>
		<category><![CDATA[TeamPCP]]></category>
		<category><![CDATA[Trivy]]></category>
		<category><![CDATA[Wiz]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73368</guid>

					<description><![CDATA[A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the default language.]]></description>
										<content:encoded><![CDATA[<p>A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran&#8217;s time zone or have Farsi set as the default language.</p>
<p>Experts say the wiper campaign against Iran materialized this past weekend and came from a relatively new cybercrime group known as <strong>TeamPCP</strong>. In December 2025, the group began compromising corporate cloud environments using a self-propagating worm that went after exposed Docker APIs, Kubernetes clusters, Redis servers, and the React2Shell vulnerability. TeamPCP then attempted to move laterally through victim networks, siphoning authentication credentials and extorting victims over Telegram.</p>
<div id="attachment_73375" style="width: 979px" class="wp-caption alignnone"><img aria-describedby="caption-attachment-73375" decoding="async" loading="lazy" class="size-full wp-image-73375" src="https://krebsonsecurity.com/wp-content/uploads/2026/03/aikido-iranwiper.png" alt="" width="969" height="496" srcset="https://krebsonsecurity.com/wp-content/uploads/2026/03/aikido-iranwiper.png 969w, https://krebsonsecurity.com/wp-content/uploads/2026/03/aikido-iranwiper-768x393.png 768w, https://krebsonsecurity.com/wp-content/uploads/2026/03/aikido-iranwiper-782x400.png 782w" sizes="(max-width: 969px) 100vw, 969px" /><p id="caption-attachment-73375" class="wp-caption-text">A snippet of the malicious CanisterWorm that seeks out and destroys data on systems that match Iran&#8217;s timezone or have Farsi as the default language. Image: Aikido.dev.</p></div>
<p>In a profile of TeamPCP published in January, the security firm <strong>Flare</strong> said the group weaponizes exposed control planes rather than exploiting endpoints, predominantly targeting cloud infrastructure over end-user devices, with Azure (61%) and AWS (36%) accounting for 97% of compromised servers.</p>
<p>&#8220;TeamPCP&#8217;s strength does not come from novel exploits or original malware, but from the large-scale automation and integration of well-known attack techniques,&#8221; Flare&#8217;s <strong>Assaf Morag</strong> <a href="https://flare.io/learn/resources/blog/teampcp-cloud-native-ransomware" target="_blank" rel="noopener">wrote</a>. &#8220;The group industrializes existing vulnerabilities, misconfigurations, and recycled tooling into a cloud-native exploitation platform that turns exposed infrastructure into a self-propagating criminal ecosystem.&#8221;</p>
<p>On March 19, TeamPCP executed a supply chain attack against the vulnerability scanner <strong>Trivy</strong> from <strong>Aqua Security</strong>, injecting credential-stealing malware into official releases on GitHub actions. Aqua Security said it has since <a href="https://github.com/aquasecurity/trivy/discussions/10425" target="_blank" rel="noopener">removed</a> the harmful files, but the security firm Wiz <a href="https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack" target="_blank" rel="noopener">notes</a> the attackers were able to publish malicious versions that snarfed SSH keys, cloud credentials, Kubernetes tokens and cryptocurrency wallets from users.</p>
<p>Over the weekend, the same technical infrastructure TeamPCP used in the Trivy attack was leveraged to deploy a new malicious payload which executes a wiper attack if the user&#8217;s timezone and locale are determined to correspond to Iran, said <strong>Charlie Eriksen</strong>, a security researcher at <strong>Aikido</strong>. In <a href="https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran" target="_blank" rel="noopener">a blog post</a> published on Sunday, Eriksen said if the wiper component detects that the victim is in Iran and has access to a Kubernetes cluster, it will destroy data on every node in that cluster.</p>
<p>&#8220;If it doesn&#8217;t it will just wipe the local machine,&#8221; Eriksen told KrebsOnSecurity.</p>
<div id="attachment_73374" style="width: 985px" class="wp-caption alignnone"><img aria-describedby="caption-attachment-73374" decoding="async" loading="lazy" class="size-full wp-image-73374" src="https://krebsonsecurity.com/wp-content/uploads/2026/03/4paths1script.png" alt="" width="975" height="568" srcset="https://krebsonsecurity.com/wp-content/uploads/2026/03/4paths1script.png 975w, https://krebsonsecurity.com/wp-content/uploads/2026/03/4paths1script-768x447.png 768w, https://krebsonsecurity.com/wp-content/uploads/2026/03/4paths1script-782x456.png 782w" sizes="(max-width: 975px) 100vw, 975px" /><p id="caption-attachment-73374" class="wp-caption-text">Image: Aikido.dev.</p></div>
<p><span id="more-73368"></span>Aikido refers to TeamPCP&#8217;s infrastructure as &#8220;<strong>CanisterWorm</strong>&#8221; because the group orchestrates their campaigns using an <a href="https://docs.internetcomputer.org/building-apps/essentials/canisters" target="_blank" rel="noopener">Internet Computer Protocol</a> (ICP) canister &#8212; a system of tamperproof, blockchain-based &#8220;smart contracts&#8221; that combine both code and data. ICP canisters can serve Web content directly to visitors, and their distributed architecture makes them resistant to takedown attempts. These canisters will remain reachable so long as their operators continue to pay virtual currency fees to keep them online.</p>
<p>Eriksen said the people behind TeamPCP are bragging about their exploits in a group on Telegram and claim to have used the worm to steal vast amounts of sensitive data from major companies, including a large multinational pharmaceutical firm.</p>
<p>&#8220;When they compromised Aqua a second time, they took a lot of GitHub accounts and started spamming these with junk messages,&#8221; Eriksen said. &#8220;It was almost like they were just showing off how much access they had. Clearly, they have an entire stash of these credentials, and what we&#8217;ve seen so far is probably a small sample of what they have.&#8221;</p>
<p>Security experts say the spammed GitHub messages could be a way for TeamPCP to ensure that any code packages tainted with their malware will remain prominent in GitHub searches. In a newsletter published today titled <a href="https://risky.biz/risky-bulletin-github-is-starting-to-have-a-real-malware-problem/" target="_blank" rel="noopener">GitHub is Starting to Have a Real Malware Problem</a>, <strong>Risky Business</strong> reporter <strong>Catalin Cimpanu</strong> writes that attackers often are seen pushing meaningless commits to their repos or using online services that sell GitHub stars and &#8220;likes&#8221; to keep malicious packages at the top of the GitHub search page.</p>
<p>This weekend&#8217;s outbreak is the <a href="https://ramimac.me/trivy-teampcp/" target="_blank" rel="noopener">second major supply chain attack</a> involving Trivy in as many months. At the end of February, Trivy was hit as part of an automated threat called <a href="https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation#attack-3-microsoftai-discovery-agent---branch-name-injection" target="_blank" rel="noopener">HackerBot-Claw</a>, which mass exploited misconfigured workflows in GitHub Actions to steal authentication tokens.</p>
<p>Eriksen said it appears TeamPCP used access gained in the first attack on Aqua Security to perpetrate this weekend&#8217;s mischief. But he said there is no reliable way to tell whether TeamPCP&#8217;s wiper actually succeeded in trashing any data from victim systems, and that the malicious payload was only active for a short time over the weekend.</p>
<p>&#8220;They&#8217;ve been taking [the malicious code] up and down, rapidly changing it adding new features,&#8221; Eriksen said, noting that when the malicious canister wasn&#8217;t serving up malware downloads it was pointing visitors to <a href="https://www.youtube.com/watch?v=dQw4w9WgXcQ" target="_blank" rel="noopener">a Rick Roll video</a> on YouTube.</p>
<p>&#8220;It&#8217;s a little all over the place, and there&#8217;s a chance this whole Iran thing is just their way of getting attention,&#8221; Eriksen said. &#8220;I feel like these people are really playing this Chaotic Evil role here.&#8221;</p>
<p>Cimpanu observed that supply chain attacks have increased in frequency of late as threat actors begin to grasp just how efficient they can be, and his post documents an alarming number of these incidents since 2024.</p>
<p>&#8220;While security firms appear to be doing a good job spotting this, we&#8217;re also gonna need GitHub&#8217;s security team to step up,&#8221; Cimpanu wrote. &#8220;Unfortunately, on a platform designed to copy (fork) a project and create new versions of it (clones), spotting malicious additions to clones of legitimate repos might be quite the engineering problem to fix.&#8221;</p>
<p><strong>Update, 2:40 p.m. ET:</strong> Wiz is <a href="https://www.wiz.io/blog/teampcp-attack-kics-github-action" rel="noopener" target="_blank">reporting</a> that TeamPCP also pushed credential stealing malware to the <strong>KICS</strong> vulnerability scanner from <strong>Checkmarx</strong>, and that the scanner&#8217;s GitHub Action was compromised between 12:58 and 16:50 UTC today (March 23rd).</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
			</item>
		<item>
		<title>Feds Disrupt IoT Botnets Behind Huge DDoS Attacks</title>
		<link>https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/</link>
					<comments>https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 00:49:19 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[DDoS-for-Hire]]></category>
		<category><![CDATA[Internet of Things (IoT)]]></category>
		<category><![CDATA[Ne'er-Do-Well News]]></category>
		<category><![CDATA[Aisuru]]></category>
		<category><![CDATA[Defense Criminal Investigative Service]]></category>
		<category><![CDATA[JackSkid]]></category>
		<category><![CDATA[Kimwolf]]></category>
		<category><![CDATA[Mossad botnet]]></category>
		<category><![CDATA[Rebecca Day]]></category>
		<category><![CDATA[Synthient]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73345</guid>

					<description><![CDATA[The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.]]></description>
										<content:encoded><![CDATA[<p>The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets &#8212; named <strong>Aisuru</strong>, <strong>Kimwolf</strong>, <strong>JackSkid</strong> and <strong>Mossad</strong> &#8212; are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.</p>
<div id="attachment_73083" style="width: 625px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73083" decoding="async" loading="lazy" class="size-full wp-image-73083" src="https://krebsonsecurity.com/wp-content/uploads/2026/01/ss-botnet.png" alt="" width="615" height="615" /><p id="caption-attachment-73083" class="wp-caption-text">Image: Shutterstock, @Elzicon.</p></div>
<p>The Justice Department said the Department of Defense Office of Inspector General’s (DoDIG) <strong>Defense Criminal Investigative Service</strong> (DCIS) executed seizure warrants targeting multiple U.S.-registered domains, virtual servers, and other infrastructure involved in DDoS attacks against Internet addresses owned by the DoD.</p>
<p>The government alleges the unnamed people in control of the four botnets used their crime machines to launch hundreds of thousands of DDoS attacks, often demanding extortion payments from victims. Some victims reported tens of thousands of dollars in losses and remediation expenses.</p>
<p>The oldest of the botnets &#8212; Aisuru &#8212; issued more than 200,000 attacks commands, while JackSkid hurled at least 90,000 attacks. Kimwolf issued more than 25,000 attack commands, the government said, while Mossad was blamed for roughy 1,000 digital sieges.</p>
<p>The DOJ <a href="https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks" target="_blank" rel="noopener">said</a> the law enforcement action was designed to prevent further infection to victim devices and to limit or eliminate the ability of the botnets to launch future attacks. The case is being investigated by the DCIS with help from the FBI&#8217;s field office in Anchorage, Alaska, and the DOJ&#8217;s statement credits nearly two dozen technology companies with assisting in the operation.<span id="more-73345"></span></p>
<p>“By working closely with DCIS and our international law enforcement partners, we collectively identified and disrupted criminal infrastructure used to carry out large-scale DDoS attacks,” said Special Agent in Charge <strong>Rebecca Day</strong> of the FBI Anchorage Field Office.</p>
<p>Aisuru emerged in late 2024, and by mid-2025 it was launching <a href="https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/" target="_blank" rel="noopener">record-breaking DDoS attacks</a> as it rapidly infected new IoT devices. In October 2025, Aisuru was used to seed Kimwolf, an Aisuru variant which introduced a novel spreading mechanism that allowed the botnet to infect devices hidden behind the protection of the user&#8217;s internal network.</p>
<p>On January 2, 2026, the security firm <strong>Synthient</strong> <a href="https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/" target="_blank" rel="noopener">publicly disclosed</a> the vulnerability Kimwolf was using to propagate so quickly. That disclosure helped curtail Kimwolf&#8217;s spread somewhat, but since then several other IoT botnets have emerged that effectively copy Kimwolf&#8217;s spreading methods while competing for the same pool of vulnerable devices. According to the DOJ, the JackSkid botnet also sought out systems on internal networks just like Kimwolf.</p>
<p>The DOJ said its disruption of the four botnets coincided with &#8220;law enforcement actions&#8221; conducted in Canada and Germany targeting individuals who allegedly operated those botnets, although no further details were available on the suspected operators.</p>
<p>In late February, KrebsOnSecurity identified <a href="https://krebsonsecurity.com/2026/02/who-is-the-kimwolf-botmaster-dort/" target="_blank" rel="noopener">a 22-year-old Canadian man</a> as a core operator of the Kimwolf botnet. Multiple sources familiar with the investigation told KrebsOnSecurity the other prime suspect is a 15-year-old living in Germany.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/feed/</wfw:commentRss>
			<slash:comments>31</slash:comments>
		
		
			</item>
		<item>
		<title>Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker</title>
		<link>https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/</link>
					<comments>https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/#comments</comments>
		
		<dc:creator><![CDATA[BrianKrebs]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 16:20:13 +0000</pubDate>
				<category><![CDATA[A Little Sunshine]]></category>
		<category><![CDATA[Latest Warnings]]></category>
		<category><![CDATA[Ne'er-Do-Well News]]></category>
		<category><![CDATA[The Coming Storm]]></category>
		<category><![CDATA[Handala]]></category>
		<category><![CDATA[Handala Hack]]></category>
		<category><![CDATA[Irish Examiner]]></category>
		<category><![CDATA[Microsoft Intune]]></category>
		<category><![CDATA[Ministry of Intelligence and Security]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[Stryker]]></category>
		<category><![CDATA[Void Manticore]]></category>
		<category><![CDATA[wiper attack]]></category>
		<guid isPermaLink="false">https://krebsonsecurity.com/?p=73316</guid>

					<description><![CDATA[A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.]]></description>
										<content:encoded><![CDATA[<p>A hacktivist group with links to Iran&#8217;s intelligence agencies is claiming responsibility for a data-wiping attack against <strong>Stryker</strong>, a global medical technology company based in Michigan. News reports out of Ireland, Stryker&#8217;s largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker&#8217;s main U.S. headquarters says the company is currently experiencing a building emergency.</p>
<p>Based in Kalamazoo, Michigan, Stryker [NYSE:SYK] is a medical and surgical equipment maker that reported $25 billion in global sales last year. In a lengthy statement posted to Telegram, a hacktivist group known as <strong>Handala</strong> (a.k.a. Handala Hack Team) claimed that Stryker&#8217;s offices in 79 countries have been forced to shut down after the group erased data from more than 200,000 systems, servers and mobile devices.</p>
<div id="attachment_73319" style="width: 764px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-73319" decoding="async" loading="lazy" class="size-full wp-image-73319" src="https://krebsonsecurity.com/wp-content/uploads/2026/03/handala-stryker.png" alt="A manifesto posted by the Iran-backed hacktivist group Handala, claiming a mass data-wiping attack against medical technology maker Stryker." width="754" height="827" /><p id="caption-attachment-73319" class="wp-caption-text">A manifesto posted by the Iran-backed hacktivist group Handala, claiming a mass data-wiping attack against medical technology maker Stryker.</p></div>
<p>&#8220;All the acquired data is now in the hands of the free people of the world, ready to be used for the true advancement of humanity and the exposure of injustice and corruption,&#8221; a portion of the Handala statement reads.</p>
<p>The group said the wiper attack was in retaliation for a Feb. 28 missile strike that hit an Iranian school and killed at least 175 people, most of them children. <strong>The New York Times</strong> <a href="https://www.nytimes.com/2026/03/11/us/politics/iran-school-missile-strike.html" target="_blank" rel="noopener">reports</a> today that an ongoing military investigation has determined the United States is responsible for the deadly Tomahawk missile strike.</p>
<p>Handala was one of several hacker groups recently <a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/" target="_blank" rel="noopener">profiled</a> by <strong>Palo Alto Networks</strong>, which links it to Iran&#8217;s <strong>Ministry of Intelligence and Security</strong> (MOIS). Palo Alto says Handala surfaced in late 2023 and is assessed as one of several online personas maintained by <a href="https://malpedia.caad.fkie.fraunhofer.de/actor/void_manticore" target="_blank" rel="noopener">Void Manticore</a>, a MOIS-affiliated actor.</p>
<p>Stryker&#8217;s website says the company has 56,000 employees in 61 countries. A phone call placed Wednesday morning to the media line at Stryker&#8217;s Michigan headquarters sent this author to a voicemail message that stated, &#8220;We are currently experiencing a building emergency. Please try your call again later.&#8221;</p>
<p>A <a href="https://www.irishexaminer.com/news/munster/arid-41808308.html" target="_blank" rel="noopener">report</a> Wednesday morning from the <strong>Irish Examiner</strong> said Stryker staff are now communicating via WhatsApp for any updates on when they can return to work. The story quoted an unnamed employee saying anything connected to the network is down, and that &#8220;anyone with Microsoft Outlook on their personal phones had their devices wiped.&#8221;</p>
<p>&#8220;Multiple sources have said that systems in the Cork headquarters have been &#8216;shut down&#8217; and that Stryker devices held by employees have been wiped out,&#8221; the Examiner reported. &#8220;The login pages coming up on these devices have been defaced with the Handala logo.&#8221;<span id="more-73316"></span></p>
<p>Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called <strong>Microsoft Intune</strong> to issue a &#8216;remote wipe&#8217; command against all connected devices.</p>
<p>Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by <a href="https://www.reddit.com/r/cybersecurity/comments/1rqopq0/stryker_hit_by_handala_intune_managed_devices/" target="_blank" rel="noopener">this Reddit discussion</a> on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently.</p>
<p>Palo Alto says Handala&#8217;s hack-and-leak activity is primarily focused on Israel, with occasional targeting outside that scope when it serves a specific agenda. The security firm said Handala also has taken credit for recent attacks against fuel systems in Jordan and an Israeli energy exploration company.</p>
<p>&#8220;Recent observed activities are opportunistic and &#8216;quick and dirty,&#8217; with a noticeable focus on supply-chain footholds (e.g., IT/service providers) to reach downstream victims, followed by &#8216;proof&#8217; posts to amplify credibility and intimidate targets,&#8221; Palo Alto researchers wrote.</p>
<p>The Handala manifesto posted to Telegram referred to Stryker as a &#8220;Zionist-rooted corporation,&#8221; which may be a reference to the company&#8217;s 2019 acquisition of the Israeli company OrthoSpace.</p>
<p>Stryker is a major supplier of medical devices, and the ongoing attack is already affecting healthcare providers. One healthcare professional at a major university medical system in the United States told KrebsOnSecurity they are currently unable to order surgical supplies that they normally source through Stryker.</p>
<p>&#8220;This is a real-world supply chain attack,&#8221; the expert said, who asked to remain anonymous because they were not authorized to speak to the press. &#8220;Pretty much every hospital in the U.S. that performs surgeries uses their supplies.&#8221;</p>
<p><strong>John Riggi</strong>, national advisor for the <strong>American Hospital Association</strong> (AHA), said the AHA is not aware of any supply-chain disruptions as of yet.</p>
<p>&#8220;We are aware of reports of the cyber attack against Stryker and are actively exchanging information with the hospital field and the federal government to understand the nature of the threat and assess any impact to hospital operations,&#8221; Riggi said in an email. &#8220;As of this time, we are not aware of any direct impacts or disruptions to U.S. hospitals as a result of this attack. That may change as hospitals evaluate services, technology and supply chain related to Stryker and if the duration of the attack extends.&#8221;</p>
<p>According to a March 11 memo from the state of Maryland&#8217;s Institute for Emergency Medical Services Systems, Stryker indicated that some of their computer systems have been impacted by a &#8220;global network disruption.&#8221; The memo indicates that in response to the attack, a number of hospitals have opted to disconnect from Stryker&#8217;s various online services, including <strong>LifeNet</strong>, which allows paramedics to transmit EKGs to emergency physicians so that heart attack patients can expedite their treatment when they arrive at the hospital.</p>
<p>&#8220;As a precaution, some hospitals have temporarily suspended their connection to Stryker systems, including LIFENET, while others have maintained the connection,&#8221; wrote Timothy Chizmar, the state&#8217;s EMS medical director. &#8220;The Maryland Medical Protocols for EMS requires ECG transmission for patients with acute coronary syndrome (or STEMI). However, if you are unable to transmit a 12 Lead ECG to a receiving hospital, you should initiate radio consultation and describe the findings on the ECG.&#8221;</p>
<p>This is a developing story. Updates will be noted with a timestamp.</p>
<p><strong>Update, 2:54 p.m. ET:</strong> Added comment from Riggi and perspectives on this attack&#8217;s potential to turn into a supply-chain problem for the healthcare system.</p>
<p><strong>Update, Mar. 12, 7:59 a.m. ET:</strong> Added information about the outage affecting Stryker&#8217;s online services.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/feed/</wfw:commentRss>
			<slash:comments>52</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 196/196 objects using memcached
Page Caching using memcached (User agent is rejected) 
Database Caching using memcached

Served from: krebsonsecurity.com @ 2026-05-13 07:10:09 by W3 Total Cache
-->