<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security News</title>
	<atom:link href="https://cybersecuritynews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersecuritynews.com/</link>
	<description>World&#039;s #1 Premier Cybersecurity and Hacking News Portal</description>
	<lastBuildDate>Sat, 18 Apr 2026 12:51:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</url>
	<title>Cyber Security News</title>
	<link>https://cybersecuritynews.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192061645</site>	<item>
		<title>Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character</title>
		<link>https://cybersecuritynews.com/apple-works-on-fix-for-iphone-passcode-bug/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 12:50:59 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147852</guid>

					<description><![CDATA[<p>Apple is reportedly developing a software fix for a frustrating iOS 26 bug that has left some users entirely locked out of their iPhones for months. According to a recent report by The Register, Cupertino’s software engineers are scrambling to patch a keyboard interface flaw that inadvertently removed a specific special character necessary for unlocking [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/apple-works-on-fix-for-iphone-passcode-bug/">Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Apple is reportedly developing a software fix for a frustrating iOS 26 bug that has left some users entirely locked out of their iPhones for months. </p>



<p>According to a recent report by The Register, Cupertino’s software engineers are scrambling to patch a keyboard interface flaw that inadvertently removed a specific special character necessary for <a href="https://cybersecuritynews.com/securing-iot-devices/" type="post" id="102072" target="_blank" rel="noreferrer noopener">unlocking devices </a>configured with custom alphanumeric passcodes.</p>



<p>The issue first gained public attention when a 21-year-old university student, Connor Byrne, shared his predicament on Reddit. </p>



<p>As The Register reported, Byrne opted not to use the standard four- or six-digit PIN on his iPhone 13. Instead, he enhanced his device security by setting a complex, custom alphanumeric string as his primary passcode.</p>



<p>While cybersecurity professionals highly recommend complex passcodes to<a href="https://cybersecuritynews.com/are-educational-institutions-easy-victims-of-ransomware-groups/" type="post" id="17807" target="_blank" rel="noreferrer noopener"> thwart brute-force attacks</a>, Byrne’s specific password combination triggered an unexpected software trap. </p>



<p>He utilized the caron or háček (ˇ) symbol from the iPhone&#8217;s Czech keyboard layout. When Apple released iOS 26 to the general public in September 2025, the company unknowingly removed this specific character from the<a href="https://cybersecuritynews.com/researchers-bypassed-android-lock-screen/" type="post" id="52680" target="_blank" rel="noreferrer noopener"> lock screen keyboard</a>.</p>



<p>Without the ability to type the required symbol, Byrne was permanently locked out of his smartphone. The only native solution provided by the device was a full factory reset. </p>



<p>However, a reset would permanently erase months of valuable photographs and personal files stored locally on the device. Choosing to preserve his data, the user has remained locked out while waiting for a potential software patch.</p>



<p>Following the viral social media post, Apple’s internal engineering team reportedly began investigating the issue. The Register notes that Apple is now working on a targeted fix to restore the missing character, which is expected to roll out in an upcoming major iOS 26 release.</p>



<p>Interestingly, despite Apple&#8217;s engineers responding within 9 days after the issue surfaced online, the extended lockout has permanently damaged the user&#8217;s trust. </p>



<p><a href="https://www.theregister.com/2026/04/17/iphone_keyboard_error_fix/" target="_blank" rel="noreferrer noopener nofollow">According to The Register,</a> Byrne has decided to migrate to an Android device, specifically eyeing the Samsung Galaxy S26 Ultra. </p>



<p>He cited both the software quality assurance oversight, noting that the current keyboard&#8217;s flaws duplicate characters side-by-side, and a preference for alternative camera hardware. Apple has not yet issued an official public comment on the fix&#8217;s timeline.</p>



<ul class="wp-block-list">
<li><strong>Backup Data Regularly:</strong> Always maintain up-to-date iCloud or physical backups. If a critical lock screen glitch occurs after an update, you can safely perform a factory reset without losing your data.</li>



<li><strong>Review Custom Passcodes:</strong> If you use a custom alphanumeric passcode, ensure it relies on standard characters that are universally available across different keyboard layouts to avoid getting locked out.</li>



<li><strong>Monitor Software Updates:</strong> Be cautious when adopting major operating system upgrades immediately upon release. As this incident highlights, unexpected interface bugs can temporarily sever device access.</li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/apple-works-on-fix-for-iphone-passcode-bug/">Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Apple-Works-on-Fix-for-iPhone-Passcode-Bug-Linked-to-Missing-Czech-Keyboard-Character-1-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147852</post-id>	</item>
		<item>
		<title>Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain</title>
		<link>https://cybersecuritynews.com/claude-opus-to-build-a-working-chrome-exploit-chain/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 12:16:39 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147846</guid>

					<description><![CDATA[<p>Amidst the heated debate surrounding Anthropic’s recent announcement of its Mythos and Project Glasswing models, a security researcher has demonstrated the tangible cybersecurity implications of frontier AI. Moving beyond theoretical warnings, the researcher successfully utilized Claude Opus to construct a fully functional exploit chain targeting Google Chrome&#8217;s complex V8 JavaScript engine. The experiment highlights a [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/claude-opus-to-build-a-working-chrome-exploit-chain/">Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Amidst the heated debate surrounding Anthropic’s recent announcement of its Mythos and Project Glasswing models, a security researcher has demonstrated the tangible cybersecurity implications of frontier AI. </p>



<p>Moving beyond theoretical warnings, the researcher successfully utilized <a href="https://cybersecuritynews.com/claude-opus-4-5-integrated-with-github-copilot/" type="post" id="137270" target="_blank" rel="noreferrer noopener">Claude Opus</a> to construct a fully functional exploit chain targeting Google Chrome&#8217;s complex V8 JavaScript engine.</p>



<p>The experiment highlights a persistent vulnerability in the modern software ecosystem: the patch gap. Many popular desktop applications built on the Electron framework, such as Discord, Notion, and Slack, bundle their own Chromium builds. </p>



<p>These bundled versions often lag weeks or months behind the upstream Chrome releases, leaving known vulnerabilities unpatched and exposing users to n-day exploits.</p>



<p>For this test, the researcher targeted the <a href="https://cybersecuritynews.com/malicious-npm-packages-target-discord-browsers-and-crypto-wallets/" type="post" id="144943" target="_blank" rel="noreferrer noopener">Discord desktop application</a>, which was running on the outdated Chrome 138 engine. </p>



<p>Because Discord operates without a sandbox on its main window, the exploit required only two vulnerabilities to achieve a full chain, circumventing the need for a third dedicated sandbox escape.</p>



<h2 class="wp-block-heading" id="h-chaining-the-vulnerabilities"><strong>Chaining the Vulnerabilities</strong></h2>



<p>Through a series of guided interactions, Claude Opus was tasked with developing an exploit using specific unpatched flaws. The AI successfully chained together two complex vulnerabilities to achieve<a href="https://cybersecuritynews.com/n8n-vulnerability/" type="post" id="146071" target="_blank" rel="noreferrer noopener"> Remote Code Execution (RCE)</a>:</p>



<ul class="wp-block-list">
<li><strong>CVE-2026-5873:</strong> An out-of-bounds (OOB) read and write vulnerability in V8&#8217;s Turboshaft compiler for WebAssembly. Fixed in Chrome 147, this bug allowed the attacker to bypass bounds checks after tier-up compilation, enabling arbitrary memory manipulation within the V8 heap.</li>



<li><strong>V8 Sandbox Bypass:</strong> A Use-After-Free (UAF) flaw in the WebAssembly Code Pointer Table (WasmCPT). By corrupting the import dispatch table and exploiting type confusion, the exploit escaped the V8 sandbox entirely, granting full read and write access to the entire virtual address space.</li>
</ul>



<p>Using these chained primitives, the model generated a payload capable of redirecting execution flows to the system&#8217;s dyld cache, ultimately launching arbitrary system commands on a macOS target.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="437" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1024x437.png" alt="Exploit Token (Source: Hacktron)" class="wp-image-147848" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1024x437.png 1024w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-300x128.png 300w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-768x328.png 768w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1536x656.png 1536w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-2048x874.png 2048w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-984x420.png 984w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-696x297.png 696w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1068x456.png 1068w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1920x819.png 1920w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-150x64.png 150w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Exploit Token (Source: Hacktron)</figcaption></figure>



<p>Despite the impressive outcome, the process was far from fully autonomous. The researcher noted that Claude Opus required extensive human oversight, scaffolding, and operational management. </p>



<p>The AI frequently suffered from context collapse during long conversations, speculated on memory offsets instead of verifying them, and struggled to recover independently when stuck in logical loops.</p>



<p>Over the course of a week, the experiment consumed roughly 2.3 billion tokens across 1,765 requests, costing approximately $2,283 and requiring 20 hours of hands-on guidance. </p>



<p>The researcher had to continually feed the debugger (LLDB) back into the model to keep it on track,<a href="https://www.hacktron.ai/blog/i-let-claude-opus-to-write-me-a-chrome-exploit" target="_blank" rel="noreferrer noopener nofollow"> as reported by Hacktron AI</a>.</p>



<h2 class="wp-block-heading" id="h-economic-reality-and-future-threats"><strong>Economic Reality and Future Threats</strong></h2>



<p>While the process was labor-intensive, the economics of AI-assisted exploitation are striking. Spending around $2,300 and a few days of effort to generate a reliable Chrome exploit is highly profitable<a href="https://cybersecuritynews.com/ai-polluting-bug-bounty-platforms/" target="_blank" rel="noreferrer noopener"> when compared to commercial bug bounties</a>, which frequently pay upwards of $10,000 for similar submissions, or the highly lucrative underground exploit market.</p>



<p>This experiment serves as a stark warning for the cybersecurity industry. While current models like Claude Opus still require expert babysitting to weaponize vulnerabilities, the technological trajectory is clear. </p>



<p>As next-generation models like Anthropic&#8217;s Mythos emerge with enhanced reasoning and coding capabilities, the barrier to generating sophisticated exploits will drop drastically.</p>



<p> Ultimately, the shrinking gap between automated exploit generation and slow vendor patching cycles threatens to empower less sophisticated threat actors to compromise vulnerable software at an unprecedented scale.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/claude-opus-to-build-a-working-chrome-exploit-chain/">Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Researcher-Uses-Claude-Opus-to-Build-a-Working-Chrome-Exploit-Chain-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147846</post-id>	</item>
		<item>
		<title>Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</title>
		<link>https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 09:02:26 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147842</guid>

					<description><![CDATA[<p>Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by Google search. According to a recent disclosure on Hacker News, an insecure file-hosting configuration has exposed personal identifiable information (PII), including completed tax forms, that were exchanged between freelancers and clients. The [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/">Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by <a href="https://cybersecuritynews.com/hackers-hijacking-google-search-results-via-backdoored-browser-extensions/" type="post" id="4530" target="_blank" rel="noreferrer noopener">Google search</a>. </p>



<p>According to a recent disclosure on Hacker News, an insecure file-hosting configuration has exposed personal identifiable information (PII), including completed tax forms, that were exchanged between freelancers and clients.</p>



<h2 class="wp-block-heading" id="the-cloudinary-misconfiguration"><strong>The Cloudinary Misconfiguration</strong></h2>



<p>The root of the data exposure lies in how Fiverr handles file sharing within its internal messaging system. </p>



<p>The platform relies on a third-party service called Cloudinary to process and host images and PDF documents, including final work products delivered to clients.</p>



<p>While Cloudinary operates similarly to an <a href="https://cybersecuritynews.com/best-aws-monitoring-tools/" type="post" id="37530" target="_blank" rel="noreferrer noopener">Amazon S3 digital storage bucket</a> and supports secure, expiring web links, Fiverr reportedly configured the service incorrectly. </p>



<p>Instead of requiring authentication, Fiverr opted to generate fully public URLs for these sensitive attachments. Because these files were left open to the public, search engines like Google were able to crawl and index them. </p>



<p>This suggests that the public file links may have been exposed through unprotected HTML pages somewhere on Fiverr’s network.</p>



<p>The impact of this oversight is severe, as anyone can allegedly use specific Google search queries to surface private documents. </p>



<p>For example, running a site-specific search for &#8220;form 1040&#8221; on Fiverr&#8217;s Cloudinary domain instantly reveals<a href="https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/" type="post" id="146216" target="_blank" rel="noreferrer noopener"> private tax documents </a>containing highly sensitive financial and personal data.</p>



<p>Interestingly, the researcher highlighted a troubling contradiction. Fiverr actively purchases Google Ads for tax preparation services, yet the platform fails to secure the resulting financial work products. </p>



<p>This exposure raises immediate regulatory concerns. By failing to lock down financial documents properly, the platform and its tax preparation freelancers could be in direct violation of the FTC Safeguards Rule and the Gramm-Leach-Bliley Act (GLBA), which mandate strict protections for consumer financial data.</p>



<p><a href="https://news.ycombinator.com/item?id=47769796" target="_blank" rel="noreferrer noopener nofollow">The researcher who discovered the issue claims</a> to have followed standard responsible disclosure protocols. A detailed vulnerability report was sent to Fiverr’s designated security team 40 days before the public release. </p>



<p>After receiving no response or remediation efforts from the company, the researcher opted to publish the findings on Hacker News to warn affected users.</p>



<h2 class="wp-block-heading" id="key-takeaways-and-mitigations"><strong>Key Takeaways and Mitigations</strong></h2>



<p>Until Fiverr resolves this public exposure, users are at risk of <a href="https://cybersecuritynews.com/christmas-phishing-surge-chains-docusign-spoofing/" type="post" id="138852" target="_blank" rel="noreferrer noopener">identity theft and financial fraud</a>. Both freelancers and clients should take immediate precautions:</p>



<ul class="wp-block-list">
<li><strong>Halt sensitive transfers:</strong> Users should temporarily stop sending sensitive documents, such as tax forms or medical records, through Fiverr&#8217;s messaging system.</li>



<li><strong>Implement signed URLs:</strong> Fiverr must urgently update its Cloudinary integration to utilize signed, time-limited URLs for all user-to-user file transfers to ensure files expire after being downloaded.</li>



<li><strong>Request search de-indexing:</strong> The company needs to issue urgent takedown requests to Google to remove the exposed domain directories from public search results.</li>



<li><strong>Monitor for identity theft:</strong> Clients who purchased financial or tax preparation gigs on Fiverr should monitor their credit reports for unauthorized activity.</li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/">Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Fiverr-Allegedly-Leaks-User-Information-to-Google-Indexing-Researchers-Say-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147842</post-id>	</item>
		<item>
		<title>Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</title>
		<link>https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 08:42:55 +0000</pubDate>
				<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147838</guid>

					<description><![CDATA[<p>A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. According to recent threat research published by Fortinet&#8217;s FortiGuard Labs, threat actors are exploiting a known command injection vulnerability to hijack TBK DVR systems and construct a large-scale Distributed Denial-of-Service (DDoS) botnet. Fortinet researchers [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/">Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. </p>



<p>According to recent threat research published by Fortinet&#8217;s FortiGuard Labs, threat actors are exploiting a known <a href="https://cybersecuritynews.com/react-native-command-injection-flaw/" target="_blank" rel="noreferrer noopener">command injection vulnerability</a> to hijack TBK DVR systems and construct a large-scale Distributed Denial-of-Service (DDoS) botnet.</p>



<p>Fortinet researchers report that the campaign specifically targets TBK DVR-4104 and DVR-4216 models by exploiting CVE-2024-3721. This OS command injection flaw allows attackers to deliver a downloader script by manipulating arguments within the device system. </p>



<p>During the exploitation phase, network traffic reveals a custom HTTP header reading &#8220;X-Hacked-By: Nexus Team – Exploited By Erratic,&#8221; leading FortiGuard Labs to attribute the campaign to a relatively unknown threat actor identified as the &#8220;<a href="https://cybersecuritynews.com/china-nexus-hackers-attacking-telecommunication/" target="_blank" rel="noreferrer noopener">Nexus Team</a>&#8220;.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-67.png" alt=" Exploit traffic via CVE-2024-3721 (Source: Fortinet)" class="wp-image-183817"/><figcaption class="wp-element-caption">&nbsp;Exploit traffic via CVE-2024-3721 (Source: Fortinet)</figcaption></figure>



<p>Once the downloader script executes, it fetches multi-architecture payloads supporting ARM, MIPS, and x86-64 environments, subsequently displaying a console message stating &#8220;nexuscorp has taken control&#8221;.</p>



<h2 class="wp-block-heading" id="technical-capabilities-and-infection-mechanisms"><strong>Technical Capabilities and Infection Mechanisms</strong></h2>



<p>Fortinet’s analysis reveals that Nexcorium shares <a href="https://cybersecuritynews.com/mirai-based-botnets-evolve-into-massive-ddos/" target="_blank" rel="noreferrer noopener">fundamental architecture with traditional Mirai variants</a>, utilizing XOR-encoded configurations and modular components. The technical operation relies on several core mechanisms:<a href="https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html" target="_blank" rel="noreferrer noopener"></a></p>



<ul class="wp-block-list">
<li><strong>Modular Architecture:</strong> The malware deploys standard Mirai features, including a watchdog module to distinguish sub-processes, a scanner for network propagation, and an attacker module for DDoS execution.</li>



<li><strong>Legacy Exploit Integration:</strong> To maximize its infection radius, Nexcorium incorporates the older CVE-2017-17215 vulnerability, which targets Huawei router devices.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Aggressive Brute-Forcing:</strong> The malware launches Telnet-based brute-force attacks against other networked hardware using a hardcoded list of common and default credentials.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Self-Preservation:</strong> Nexcorium verifies its own integrity using FNV-1a hashing algorithms; if the binary is altered or unreadable, it dynamically duplicates itself under a new filename to evade detection.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-66.png" alt=" XOR-Encoded CVE-2017-17215 exploit (Source: Fortinet)" class="wp-image-183816"/><figcaption class="wp-element-caption">&nbsp;XOR-Encoded CVE-2017-17215 exploit (Source: Fortinet)</figcaption></figure>



<p>To maintain long-term access to compromised systems, the <a href="https://cybersecuritynews.com/ghostclaw-ai-assisted-malware/" target="_blank" rel="noreferrer noopener">malware establishes persistence</a> through four distinct mechanisms rather than relying on a single configuration file. The botnet secures its foothold by:<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></p>



<ul class="wp-block-list">
<li>Modifying <code>/etc/inittab</code> to ensure automatic process restarts if the malware is terminated.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Updating <code>/etc/rc.local</code> to guarantee execution during the device&#8217;s system startup sequence.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Creating a dedicated systemd service named <code>persist.service</code> for persistent background operation.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Planting scheduled tasks via crontab for reliable post-reboot execution.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-65.png" alt="Parsing the architecture information response from the victim host (Source: Fortinet)" class="wp-image-183815"/><figcaption class="wp-element-caption">Parsing the architecture information response from the victim host (Source: Fortinet)</figcaption></figure>



<p>Following this extensive setup, Fortinet notes that Nexcorium deletes its original binary from the execution path to thwart security analysts.</p>



<p>The primary objective of the Nexus Team campaign is launching devastating DDoS attacks. <a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener nofollow">Based on FortiGuard Labs&#8217; decryption of the malware&#8217;s configuration table</a>, Nexcorium communicates with a centralized command-and-control (C2) server to receive attack directives. </p>



<p>Instead of a narrow attack scope, the botnet is equipped with a versatile arsenal of flood techniques. These include standard UDP, TCP ACK, TCP SYN, SMTP, and TCP PSH floods, alongside specialized attack vectors like VSE query floods and UDP blast attacks.</p>



<p>The discovery of Nexcorium highlights the continuous weaponization of legacy IoT devices. Security experts strongly advise organizations to immediately patch CVE-2024-3721, replace default manufacturer credentials, and isolate critical infrastructure from vulnerable IoT endpoints using network segmentation.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/">Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Nexcorium-Mirai-Variant-Weaponizes-TBK-DVR-Vulnerability-in-Fresh-IoT-Botnet-Push-1-2-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147838</post-id>	</item>
		<item>
		<title>Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</title>
		<link>https://cybersecuritynews.com/ftp-servers-exposed/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 02:43:34 +0000</pubDate>
				<category><![CDATA[Cyber Attack News]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147724</guid>

					<description><![CDATA[<p>According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million internet-facing hosts are still running the File Transfer Protocol (FTP). While this marks a significant 40% decline from the 10.1 million servers observed in 2024, the presence of this decades-old protocol continues to pose an exposure risk [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/ftp-servers-exposed/">Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million <a href="https://cybersecuritynews.com/monsta-ftp-remote-code-vulnerability/" target="_blank" rel="noreferrer noopener">internet-facing hosts are still running the File Transfer Protocol (FTP).</a></p>



<p>While this marks a significant 40% decline from the 10.1 million servers observed in 2024, the presence of this decades-old protocol continues to pose an exposure risk due to widespread insecure default configurations.</p>



<p>The Censys report highlights that the dominant story of FTP exposure in 2026 is not purpose-built file transfer infrastructure, but rather an accumulation of platform defaults on shared hosting networks and broadband providers.</p>



<h2 class="wp-block-heading" id="h-the-state-of-encryption-and-regional-risks"><strong>The State of Encryption and Regional Risks</strong></h2>



<p>When it comes to securing these servers, the data reveals a mixed landscape. Censys found that roughly 58.9% of observed FTP hosts completed a <a href="https://cybersecuritynews.com/staying-on-top-of-tls-attacks/" target="_blank" rel="noreferrer noopener">Transport Layer Security (TLS) handshake</a>, meaning they support encrypted connections.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWc-bX8wtbk5jYfQ6cHUVgciSH4cHrtGVqK_BKuXTt2ioxECZ9sun64nr6JUsCYJ1106UQjEKLX460wfUXAYt9lgYvSTZBdASavVbcvypLenfXFwWM-BBDZG808wIvaZPBRj_L8ZYjVVZg31IywwcgPAPy0ybSq42TsX5HBTLGdGpROZnNgemqo273nZs/s1600/Screenshot%202026-04-17%20130236%20%281%29.webp" alt="FileZilla server responding with a funny TLS response(Source: Censys)" /><figcaption class="wp-element-caption"><em>FileZilla server responding with a funny TLS response(Source: Censys)</em></figcaption></figure>



<p>However, this leaves approximately 2.45 million hosts without observed evidence of encryption, potentially allowing them to transmit files and credentials in cleartext.</p>



<p>The lack of encryption adoption varies significantly by region. According to Censys data, mainland China and South Korea have the lowest TLS adoption rates among the top 10 hosting countries, at 17.9% and 14.5%, respectively.</p>



<p>Meanwhile, Japan accounts for 71% of all FTP servers globally that still rely on outdated, deprecated legacy <a href="https://cybersecuritynews.com/tor-adopts-galois-onion-encryption/" target="_blank" rel="noreferrer noopener">encryption protocols</a> such as TLS 1.0 and 1.1.</p>



<p>The security posture of these 6 million servers is heavily influenced by the default settings of the software daemons running them.</p>



<p><strong>Key technical observations from the Censys report include:</strong></p>



<ul class="wp-block-list">
<li><strong>Pure-FTPd Dominance:</strong> Operating on roughly 1.99 million services, this is the most common FTP daemon, largely driven by its inclusion as a default in cPanel hosting environments.<br></li>



<li><strong>The IIS FTP Configuration Trap:</strong> Over 150,000 <a href="https://cybersecuritynews.com/badiis-malware-compromising-iis-servers/" target="_blank" rel="noreferrer noopener">Microsoft IIS FTP services</a> return a &#8220;534&#8221; error response, indicating TLS was never configured.<br><br>While IIS defaults to a policy that appears to require encryption, it does not bind a security certificate upon a fresh installation. <br><br>Consequently, <a href="https://cybersecuritynews.com/lynx-gateway-vulnerability/" target="_blank" rel="noreferrer noopener">the server accepts cleartext credentials</a>, even though the configuration appears to enforce TLS.<br></li>



<li><strong>Hidden Nonstandard Ports:</strong> Relying only on port 21 scans miss a significant portion of the attack surface. <br><br>Tens of thousands of FTP services run on alternate ports, such as 10397 or 2121, often tied to specific telecom operations or network-attached storage devices.</li>
</ul>



<h2 class="wp-block-heading" id="h-mitigation-and-hardening-strategies"><strong>Mitigation and Hardening Strategies</strong></h2>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsr3i2hlehPh3kVg8ltuT0bqF9Iq8kviM-3PcIlaycBjnO6gSRkdyPna1Oqu5AUG16DVkY80p5048Ruu-O59bkY9M268RCpGBKkTACaYnwI2CDU1L8-x36X93_nh-37Vv-sh6W1DB94fBiB3lNwMOcVi5a0SoMKtB1Xuv8jA37aMXt0vYPwmZD_SUowYA/s1600/Screenshot%202026-04-17%20130214%20%281%29.webp" alt="2.35 Million FTP Services With No Evidence of TLS(Source: Censys)" /><figcaption class="wp-element-caption"><em>2.35 Million FTP Services With No Evidence of TLS(Source: Censys)</em></figcaption></figure>



<p>For enterprise defenders and infrastructure administrators, <a href="https://censys.com/blog/ftp-exposure-brief/" target="_blank" rel="noreferrer noopener nofollow">Censys strongly recommends evaluating</a> whether FTP is truly necessary before attempting to harden it.</p>



<p><strong>Organizations should consider the following mitigation strategies:</strong></p>



<ul class="wp-block-list">
<li><strong>Migrate to Secure Alternatives:</strong> Whenever possible, <a href="https://cybersecuritynews.com/titan-file-transfer-server-flaws/" target="_blank" rel="noreferrer noopener">replace FTP with SSH File Transfer Protocol (SFTP)</a>, which encrypts credentials and data by default over port 22.<br></li>



<li><strong>Enforce Explicit TLS:</strong> If legacy FTP infrastructure must remain online, administrators should configure their daemons to enforce Explicit TLS (FTPS) and refuse cleartext connections.<br></li>



<li><strong>Fix IIS Certificate Bindings:</strong> Windows Server administrators using IIS FTP must ensure that a valid certificate is bound to the FTP site and verify that the SSL policy actively enforces encryption.</li>
</ul>



<p>Ultimately, while the internet&#8217;s reliance on FTP is slowly shrinking, millions of instances continue to run quietly in the background.</p>



<p>As Censys warns, the primary risk is not advanced <a href="https://cybersecuritynews.com/hackers-launch-zero-day-attacks-to-exploits-corrupted-files-to-evade-security-tools/" target="_blank" rel="noreferrer noopener">zero-day attacks</a>, but the simple failure to update default configurations that leave systems unnecessarily exposed.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/ftp-servers-exposed/">Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Nearly-6-Million-Internet-Facing-FTP-Servers-Still-Exposed-in-2026-Censys-Warns.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147724</post-id>	</item>
		<item>
		<title>PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</title>
		<link>https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 02:38:56 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147763</guid>

					<description><![CDATA[<p>A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet&#8217;s FortiSandbox product, tracked as&#160;CVE-2026-39808. The flaw allows an unauthenticated attacker to execute arbitrary operating system commands as root, the highest privilege level, without requiring any login credentials. The vulnerability was originally discovered in&#160;November 2025&#160;and has now been made public following Fortinet&#8217;s [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/">PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet&#8217;s FortiSandbox product, tracked as&nbsp;CVE-2026-39808.</p>



<p>The flaw allows an unauthenticated attacker to <a href="https://cybersecuritynews.com/cups-vulnerability-remote-attack/" target="_blank" rel="noreferrer noopener">execute arbitrary operating system commands as root,</a> the highest privilege level, without requiring any login credentials.</p>



<p>The vulnerability was originally discovered in&nbsp;November 2025&nbsp;and has now been made public following Fortinet&#8217;s patch release in&nbsp;April 2026.</p>



<p>Security researchers and defenders are urged to apply the fix immediately, as a working exploit is now freely available on GitHub.</p>



<p>CVE-2026-39808 is an <a href="https://cybersecuritynews.com/fortisandbox-os-command-injection-vulnerability/" target="_blank" rel="noreferrer noopener">OS command injection vulnerability</a> affecting Fortinet&#8217;s FortiSandbox, a widely used sandboxing solution designed to detect and analyze advanced threats and malware. The flaw resides in the <code>/fortisandbox/job-detail/tracer-behavior</code> endpoint.</p>



<h2 class="wp-block-heading" id="h-how-simple-is-the-attack"><strong>How Simple Is the Attack?</strong></h2>



<p>An attacker can inject malicious operating system commands through the<code> jid</code> GET parameter by using the <code>pipe symbol (|)</code> a common technique used to <a href="https://cybersecuritynews.com/apache-vulnerability-to-steal-sensitive-data-from-unix/" target="_blank" rel="noreferrer noopener">chain commands in Unix-based systems</a>.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQQTmxjOXVqIpFxBamiAUZOxPt3tAPqA5jsAdn0VpRfWOkLvCbuSiCjP7a7zQew4_7CzRrin7JIoTCdAh-9gzLZHsL3wARCAdgdW8mXlupfavPqSMgZS9z13lgd6PNGLBzd2slGGnp-Rci5Hbe7H5OtXW8pulB-EeJy6M39OxwJnB4Py7cQ9kundEYLek/s1600/Screenshot%202026-04-17%20164341%20%281%29.webp" alt="OS command injection via | in the jid parameter(source : GitHub)" /><figcaption class="wp-element-caption"><br>OS command injection via <code>|</code> in the jid parameter(source : GitHub)</figcaption></figure>



<p>Because the vulnerable endpoint fails to properly sanitize user input, the injected commands are executed directly by the underlying operating system with root-level privileges.</p>



<p>FortiSandbox versions&nbsp;4.4.0 through 4.4.8&nbsp;are confirmed to be affected by this vulnerability.</p>



<p>What makes CVE-2026-39808 especially alarming is how easy it is to exploit.</p>



<p><a href="https://github.com/samu-delucas/CVE-2026-39808?tab=readme-ov-file" id="https://github.com/samu-delucas/CVE-2026-39808?tab=readme-ov-file" target="_blank" rel="noreferrer noopener nofollow">According to researcher samu-delucas, who published the PoC on GitHub</a>, a single curl command is enough to achieve unauthenticated remote code execution (RCE) as root:</p>



<p><code>curl -s -k --get "http://$HOST/fortisandbox/job-detail/tracer-behavior" --data-urlencode "jid=|(id &gt; /web/ng/out.txt)|"</code></p>



<p>In this example, the attacker redirects command output to a file stored in the web root, which can then be retrieved through a browser.</p>



<p>This means an attacker could <a href="https://cybersecuritynews.com/scarcruft-abuses-legitimate-cloud-services/" target="_blank" rel="noreferrer noopener">read sensitive files, drop malware, or fully compromise the host system </a>all without ever logging in.</p>



<h2 class="wp-block-heading" id="h-fortinet-s-response"><strong>Fortinet&#8217;s Response</strong></h2>



<p><a href="https://cybersecuritynews.com/fortinet-security-update-march/" target="_blank" rel="noreferrer noopener">Fortinet patched the vulnerability </a>and published its official advisory under FG-IR-26-100 through its FortiGuard PSIRT portal.</p>



<p>The advisory confirms the severity of the flaw and outlines affected versions. Organizations running FortiSandbox 4.4.0 through 4.4.8 should upgrade to a patched version without delay.</p>



<ul class="wp-block-list">
<li><strong>Patch immediately: </strong> upgrade FortiSandbox to a version beyond 4.4.8 as specified in Fortinet&#8217;s official advisory.<br></li>



<li><strong>Audit exposed instances:</strong> check whether FortiSandbox management interfaces are exposed to untrusted networks or the public internet.<br></li>



<li><strong>Review logs:</strong>  look for unusual GET requests to the <code>/fortisandbox/job-detail/tracer-behavior</code> endpoint as indicators of exploitation attempts.<br></li>



<li><strong>Apply network segmentation:</strong> restrict access to FortiSandbox administrative interfaces to trusted IP ranges only.</li>
</ul>



<p>With a working PoC now publicly available, the window for exploitation is open. Security teams should treat this as a critical-priority patch and act immediately to secure affected systems.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/">PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/PoC-Exploit-Released-for-FortiSandbox-Vulnerability-that-Allows-attacker-to-execute-commands.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147763</post-id>	</item>
		<item>
		<title>Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</title>
		<link>https://cybersecuritynews.com/hackers-target-tp-link-routers/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 17:53:50 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147825</guid>

					<description><![CDATA[<p>A known security flaw in several end-of-life TP-Link Wi-Fi routers is being actively targeted by hackers trying to install Mirai-based botnet malware on vulnerable devices. The vulnerability, tracked as CVE-2023-33538, affects multiple TP-Link models that no longer receive vendor updates, leaving users with no official patch to apply. The affected routers include the TL-WR940N (versions [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hackers-target-tp-link-routers/">Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A known security flaw in several end-of-life TP-Link Wi-Fi routers is being actively targeted by hackers trying to install Mirai-based botnet malware on vulnerable devices. </p>



<p>The vulnerability, tracked as CVE-2023-33538, affects multiple TP-Link models that no longer receive vendor updates, leaving users with no official patch to apply.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The affected routers include the TL-WR940N (versions 2 and 4), TL-WR740N (versions 1 and 2), and TL-WR841N (versions 8 and 10). </p>



<p>These devices share a common weakness in their web management interfaces, where a specific parameter inside an HTTP GET request is not properly checked for harmful content. </p>



<p>This missing input validation gives attackers a clear opening to inject and run commands on the router without triggering any warning on the device.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attacks work by sending malicious HTTP GET requests to the /userRpm/WlanNetworkRpm endpoint. The requests carry commands embedded in the ssid parameter, which the router&#8217;s firmware processes without filtering harmful input. </p>



<p>Once the router accepts the request, the commands instruct it to download an ELF binary named arm7 from a remote server at IP address 51.38.137[.]113, assign it full execution permissions, and run it immediately.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/" id="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/" target="_blank" rel="noreferrer noopener nofollow">Unit 42 analysts and researchers at Palo Alto Networks identified this malicious activity</a> after CISA added CVE-2023-33538 to its Known Exploited Vulnerabilities (KEV) catalog in June 2025. </p>



<p>Their telemetry systems detected large-scale, automated exploitation attempts around that same period, with multiple probes targeting the same vulnerable endpoint across numerous devices in the wild.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The downloaded arm7 binary is a variant of the Condi IoT botnet malware, a Mirai-based family tied to previous campaigns. Once running on the infected router, the malware connects to a command-and-control (C2) server and folds the device into a larger botnet. </p>



<p>The C2 domain cnc.vietdediserver[.]shop is directly associated with these <a href="https://cybersecuritynews.com/zyxel-nas-devices-under-attack/" id="68510" target="_blank" rel="noreferrer noopener">Mirai-like botnet</a> operations and was confirmed malicious.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="inside-the-arm7-malware-binary"><strong>Inside the Arm7 Malware Binary</strong></h2>



<p>After gaining access to the device, the arm7 binary carries out a structured set of tasks to maintain its presence and grow the botnet. </p>



<p>It waits for specific byte-pattern commands from the C2 server and responds by sending heartbeat signals, triggering self-updates, and launching internal HTTP server functions.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqm-hGRYR0uwfWcfpGcGJpV3LMHHahbzmIwE1GEBklSVj2hyphenhyphenCFHiguEgcGkD8hCXUh2oqzTzAkg-IIs7SVxlwFEltMrzuJHns9y9wKDsBRhE0pxpxKzeGoaFaPyHc2zTvTGr72Tc8MkHMLGqPLZ73D6tFqYliLwjGRDZTf-mq5y4_ZO1uk7UNbZ4bVztU/s16000/An%20example%20of%20an%20exploit%20attempt%20for%20CVE-2023-33538%20that%20we%20observed%20in%20May%202025%20(Source%20-%20Unit42).webp" alt="An example of an exploit attempt for CVE-2023-33538 that we observed in May 2025 (Source - Unit42)" /><figcaption class="wp-element-caption">An example of an exploit attempt for CVE-2023-33538 that we observed in May 2025 (Source &#8211; Unit42)</figcaption></figure>



<p>One particularly notable behavior is the self-update routine. The binary uses the update_bins() function to connect back to 51.38.137[.]113 on TCP port 80 and pull fresh copies of itself built for eight different CPU architectures, including arm6, mips, sh4, and x86_64. </p>



<p>The <a href="https://cybersecuritynews.com/whats-the-difference-between-a-mac-address-and-an-ip-address/" id="84137" target="_blank" rel="noreferrer noopener">IP address</a> and port are hard-coded directly inside the binary, as confirmed during disassembly. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTx-g8FU5sEtrVSXTRozBPgl13PBKgph_4vbq74-0DctXgAvxiOiL9gDZVEXz_NPOeAIgWkjrDzPYV3VLlGP9WH8zCSC2jpsvdx5N8DYBnSmvF8MQ1oZcDB5zD6oDWOVu-fsWnTVbP8B642BeYdFGfb229ePPBqSOR0tRSWZBWJfv4nx3maZ1Hzmel9bY/s16000/The%20update_bins%20function%20with%20a%20hard-coded%20IP%20address%20and%20port%20(Source%20-%20Unit42).webp" alt="The update_bins function with a hard-coded IP address and port (Source - Unit42)" /><figcaption class="wp-element-caption">The update_bins function with a hard-coded IP address and port (Source &#8211; Unit42)</figcaption></figure>
</div>


<p>The arm7 binary also starts an HTTP server on the infected device using a port randomly chosen between 1024 and 65535. </p>



<p>Once active, this server delivers fresh malware copies to other devices that connect to it, spreading the infection further without requiring any additional input from the attacker. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0w6Ws0chvpvrSTWbD-oP0hPG1JtuhkGrvKbYx3snpKYi0HvP8X49bX0c4220cNDFrg3FN3bL57V9ZuUic-7MdaOyp7puUKus_hhRQ4NzzHnDE-dgIcFiWnk8cDllcPvhHhB5rLS6VKjazY02S1BV8rcQLUQ6_HhL1U6wBFhOgVUug1G0Ma1WZCAmFkeQ/s16000/httpd_start()%20function%20graph%20for%20the%20arm7%20binary%20(Source%20-%20Unit42).webp" alt="httpd_start() function graph for the arm7 binary (Source - Unit42)" /><figcaption class="wp-element-caption">httpd_start() function graph for the arm7 binary (Source &#8211; Unit42)</figcaption></figure>
</div>


<p>This allows each newly infected host to go on recruiting more victims. Despite their scale, the in-the-wild exploit attempts observed by researchers carried technical errors. </p>



<p>The attackers targeted the ssid parameter rather than the correct and vulnerable ssid1 parameter, and their injected commands depended on wget, a utility absent from the router&#8217;s limited BusyBox environment. </p>



<p>Even so, the research team confirmed that the underlying vulnerability is real and that a more accurate attacker using the correct parameter could successfully exploit it.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>Regarding recommendations, TP-Link confirmed the affected devices are end-of-life and no vendor patches will be made available. The company advises users to replace these units with currently supported hardware. </p>



<p>Changing the default admin:admin login credentials is also strongly recommended, as exploitation of this vulnerability requires authenticated access to the router&#8217;s web interface. </p>



<p>Administrators should monitor <a href="https://cybersecuritynews.com/attaxion-releases-agentless-traffic-monitoring-for-immediate-risk-prioritization/" id="123027" target="_blank" rel="noreferrer noopener">outbound traffic</a> for connections to known malicious domains and retire any affected TP-Link router models still active on their networks.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 90%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/hackers-target-tp-link-routers/">Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147825</post-id>	</item>
		<item>
		<title>Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</title>
		<link>https://cybersecuritynews.com/email-borne-worm-surge-drives-new-threat/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 16:04:49 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147821</guid>

					<description><![CDATA[<p>A global wave of email-borne worms hit industrial control systems (ICS) in the fourth quarter of 2025, marking one of the most concerning threat shifts seen across operational technology (OT) environments in recent years. The surge was largely tied to a single piece of malware that silently spread through phishing emails, reaching ICS networks in [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/email-borne-worm-surge-drives-new-threat/">Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A global wave of email-borne worms hit industrial control systems (ICS) in the fourth quarter of 2025, marking one of the most concerning threat shifts seen across operational technology (OT) environments in recent years. </p>



<p>The surge was largely tied to a single piece of malware that silently spread through phishing emails, reaching ICS networks in every region of the world within just two months.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>At the center of this threat wave is a backdoor worm known as Backdoor.MSIL.XWorm, a malware built to settle into infected systems and hand attackers full remote control over compromised machines. </p>



<p>What makes this outbreak particularly alarming is that this threat had no presence on ICS computers in the previous quarter, yet it appeared across all global regions in Q4 2025, representing a sudden and widespread jump. </p>



<p>The overall percentage of ICS computers on which worms were blocked rose by 1.6 times to 1.60% during this period, a sharp uptick driven almost entirely by this single campaign.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://securelist.com/industrial-threat-report-q4-2025/119392/" id="https://securelist.com/industrial-threat-report-q4-2025/119392/" target="_blank" rel="noreferrer noopener nofollow">Securelist analysts identified that the active spread of Backdoor.MSIL.XWorm</a> through phishing emails was closely tied to a specific malware obfuscation technique that threat actors used heavily during mass phishing campaigns throughout Q4 2025. </p>



<p>These campaigns, known since 2024 under the name &#8220;Curriculum-vitae-catalina,&#8221; relied on a deceptively simple but effective trick. </p>



<p>Attackers sent emails to HR managers, recruiters, and employees involved in hiring decisions, disguising malicious messages as job applications with subject lines such as &#8220;Resume&#8221; or &#8220;Attached Resume.&#8221; </p>



<p>The emails carried a malicious executable file presented as a curriculum vitae, typically named Curriculum Vitae-Catalina.exe, which infected the system the moment it was opened.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>The infection did not unfold all at once. In Q4 2025, the threat rolled out in two distinct waves. The first hit in October, targeting Russia, Western Europe, South America, and North America, specifically Canada. </p>



<p>A second spike followed in November, spreading to additional regions before the campaign finally slowed in December. </p>



<p>The highest infection rates were recorded in Southern Europe, South America, and the Middle East, which are regions where ICS computers have historically faced elevated risks from email-based threats. </p>



<p>In Africa, the worm also found a different path in through removable storage devices, reflecting how diverse the spread vectors became.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>Regionally, the percentage of ICS computers with blocked malicious objects ranged from 8.5% in Northern Europe to 27.3% in Africa in Q4 2025, showing just how wide the gap in exposure levels remains across the globe. </p>



<p>The oil and gas sector stood out as the only industry to see an increase in blocked threats during this period, particularly in Russia and Central Asia. </p>



<p>While the broader trend across all surveyed industries has been a gradual decline over multiple years, the worm-driven spike in Q4 2025 served as a clear reminder that email remains a powerful entry point into even the most sensitive industrial environments.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="inside-the-infection-mechanism"><strong>Inside the Infection Mechanism</strong></h2>



<p>The way Backdoor.MSIL.XWorm operates reveals a calculated approach to gaining and holding access inside industrial networks. </p>



<p>When a target opens the fake resume file, the malware quietly executes in the background, establishing persistence on the system so it survives reboots and routine maintenance. </p>



<p>From that point, it opens a channel for remote control, allowing attackers to monitor activity, move through the network, and potentially interfere with operational technology processes.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>The <a href="https://cybersecuritynews.com/obfuscation-techniques-to-evade-anti-virus-detection/" id="76015" target="_blank" rel="noreferrer noopener">obfuscation techniques</a> used during the &#8220;Curriculum-vitae-catalina&#8221; campaigns helped the worm slip past standard detection tools by disguising its true behavior inside layered scripts and encoded payloads. </p>



<p>This is why the malware went undetected on ICS computers in Q3 2025, only to surge dramatically the very next quarter. </p>



<p>Southern Europe recorded the steepest increase, with worm-blocking activity rising by 2.16 times, largely because that region already had the highest rate of email-sourced threats among ICS environments globally.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC0n4n1n04TAmQoPPriFRhJVszSgjFUFC7CUkWL0-TiMm9Prdw10WxetG2AQFsSokaP0y-8tdzzA5EAU-oEctvQ-vF9xHy0ZG-Sc55aLF6O7yF6OLHp3aaxyeBDi8vPIyfCkoh1cRdR5VqR21AMKBBY5WQaZmnmxP_zaqxheclJyWVPwq52Kzr5bO2BqI/s16000/Changes%20in%20Percentage%20of%20ICS%20Computers%20on%20Which%20Malicious%20Objects%20Were%20Blocked,%20Q4%202025%20(Source%20-%20Securelist).webp" alt="Changes in Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q4 2025 (Source - Securelist)" /><figcaption class="wp-element-caption">Changes in Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q4 2025 (Source &#8211; Securelist)</figcaption></figure>
</div>


<p><a href="https://cybersecuritynews.com/security-teams-shrink-as-automation-rises/" id="100650" target="_blank" rel="noreferrer noopener">Security teams</a> managing ICS or OT environments should treat any unsolicited email with an executable attachment as a serious risk, even when those emails appear to come from genuine job seekers. </p>



<p>Organizations are advised to enforce strict email filtering policies that block executable attachments before they reach end users. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7SJoaKO6jZpa0Fi8oPF2Xbt4rRhK7yuUGWXP0fdkNZlFJ5AP_JWTJMLUxnz8GcrRu3BJ0zP75iB3o1c0ckeD4LrNdXx1hLTFMGHPUdjEYsEOzj6JrRIyPg7AOfFC95scSpFqpSlgOveCXYa_jvrleQjELKdqGqqL3gGCxS_Cd1XdaSAYL1ucej526wow/s16000/Percentage%20of%20ICS%20Computers%20on%20Which%20Malicious%20Objects%20Were%20Blocked,%20Q1%202023%20to%20Q4%202025%20(Source%20-%20Securelist).webp" alt="Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q1 2023 to Q4 2025 (Source - Securelist)" /><figcaption class="wp-element-caption">Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q1 2023 to Q4 2025 (Source &#8211; Securelist)</figcaption></figure>
</div>


<p>Employees in HR roles and anyone with access to OT-adjacent systems should receive focused training on identifying phishing attempts that mimic hiring communications. </p>



<p>Removable media policies should also be tightened, particularly in regions like Africa where USB-based infection proved to be an active vector during this campaign. </p>



<p>Keeping ICS endpoints updated and running behavior-based <a href="https://cybersecuritynews.com/best-fraud-detection-tools/" id="13681" target="_blank" rel="noreferrer noopener">detection tools</a> is essential to catching threats like XWorm that are specifically designed to evade signature-based defenses.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/email-borne-worm-surge-drives-new-threat/">Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147821</post-id>	</item>
		<item>
		<title>Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</title>
		<link>https://cybersecuritynews.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 15:17:57 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147814</guid>

					<description><![CDATA[<p>A North Korean threat actor known as Sapphire Sleet has launched a new campaign against macOS users, using a fake Zoom SDK update to trick victims into running malicious files that steal passwords, cryptocurrency assets, and personal data. Unlike attacks that exploit software flaws, this campaign relies entirely on social engineering, manipulating people rather than [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware/">Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A North Korean threat actor known as Sapphire Sleet has launched a new campaign against macOS users, using a fake Zoom SDK update to trick victims into running malicious files that steal passwords, cryptocurrency assets, and personal data. </p>



<p>Unlike attacks that exploit software flaws, this campaign relies entirely on social engineering, manipulating people rather than bypassing technical defenses.</p>



<p>The attack begins with a convincing story. Sapphire Sleet poses as a job recruiter on professional networking platforms, builds trust through career conversations, and schedules a fake technical interview. </p>



<p>At a critical point, the victim is directed to download a file called &#8220;Zoom SDK Update.scpt,&#8221; a compiled AppleScript that opens in the macOS Script Editor app. </p>



<p>Since the Script Editor is a trusted, Apple-built application, macOS raises no flags, and the user sees routine upgrade instructions while thousands of blank lines below conceal malicious code ready to execute.</p>



<p><a href="https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/" id="https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/" target="_blank" rel="noreferrer noopener nofollow">Microsoft Threat Intelligence analysts identified this campaign</a> and noted that the specific combination of execution patterns, including the use of AppleScript as a dedicated credential-harvesting component, had not been previously observed from Sapphire Sleet. </p>



<p>After discovering the activity, Microsoft shared findings with Apple through responsible disclosure, and Apple has since deployed XProtect signature updates and Safe Browsing protections in Safari to detect and block infrastructure linked to this campaign.</p>



<p>Sapphire Sleet primarily targets individuals and organizations in cryptocurrency, finance, venture capital, and blockchain sectors. </p>



<p>Once active, the malware harvests the victim&#8217;s login password, steals Telegram session data, browser credentials, <a href="https://cybersecuritynews.com/crypto-casinos-cybersecurity-protecting-your-wallet/" id="137197" target="_blank" rel="noreferrer noopener">crypto wallet</a> keys from applications like Ledger Live and Exodus, SSH keys, and macOS keychain databases. </p>



<p>All stolen data is compressed and uploaded silently to attacker-controlled servers over port 8443.</p>



<p>The malware bypasses macOS security layers including Gatekeeper and Transparency Consent and Control. </p>



<p>By convincing the user to manually run the file, Sapphire Sleet shifts execution into a user-initiated context where these protections no longer apply, placing behavioral awareness at the center of any meaningful defense.</p>



<h2 class="wp-block-heading" id="inside-the-infection-chain"><strong>Inside the Infection Chain</strong></h2>



<p>Once the victim opens the lure file, the attack moves through a fast chain of commands. </p>



<p>The script invokes the legitimate macOS &#8220;softwareupdate&#8221; binary with an invalid parameter to mimic a real system process, then uses &#8220;curl&#8221; to fetch a remote AppleScript payload and pass it directly to the &#8220;osascript&#8221; interpreter. </p>



<p>This pattern repeats across five stages, each tracked by user-agent strings mac-cur1 through mac-cur5, allowing Sapphire Sleet to manage payload delivery and <a href="https://cybersecuritynews.com/new-spam-campaign-abuses-remote-monitoring-tools/" id="104997" target="_blank" rel="noreferrer noopener">monitor campaign</a> progress.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhVpubDbMIRhZhylMIn-YeJsUSdbz3ME3Y5l8X6h2MJWV4oIFaHOvw39neahVZf4erWyHJ1GmPT7IaERurG8jDZ9ugmzp2-1UdOf-b8kkfoSg1EqycUkuTtNMR2gdXqxLnMNwMPgJ5oipCVrUA4tVQ-e5NWtjRK4Ba9QcSMFy7lj5BYCW8FB1VlIueUcM/s16000/Process%20tree%20showing%20cascading%20execution%20from%20Script%20Editor%20(Source%20-%20Microsoft).webp" alt="Process tree showing cascading execution from Script Editor (Source - Microsoft)" /><figcaption class="wp-element-caption">Process tree showing cascading execution from Script Editor (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>The mac-cur1 stage acts as the orchestrator, collecting system details, registering the infected machine with Sapphire Sleet&#8217;s command-and-control servers, and deploying a host monitoring binary called &#8220;com.apple.cli.&#8221; </p>



<p>A backdoor named &#8220;services&#8221; simultaneously installs a launch daemon called &#8220;com.google.webkit.service.plist,&#8221; named to closely mimic legitimate Apple and Google services so it persists across reboots without drawing attention.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEEfLSeP68eQa3BmusIFZO2LqSN4Y4Wmi8MQ_cxPv2vX4rPBEVMCgH2CTHdtJ2etMLNKZNsxYCbLn0c3I82PgKAVQT1BoVLXBVdPL3wfZ3z0t73CVGxrSqp-ETbht7aZMBw1_Ujl_UJNiuV4xEFhMI_WNBKY_gyK6dFmvuXxJJDeqYJs-nFVv7zHiDfhQ/s16000/The%20AppleScript%20lure%20with%20decoy%20content%20and%20payload%20execution%20(Source%20-%20Microsoft).webp" alt="The AppleScript lure with decoy content and payload execution (Source - Microsoft)" /><figcaption class="wp-element-caption">The AppleScript lure with decoy content and payload execution (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>The mac-cur2 stage delivers the credential harvester, &#8220;systemupdate.app,&#8221; which displays a native password dialog identical to a real system prompt. </p>



<p>When the user enters their password, the malware validates it against the local authentication database and immediately sends it to Sapphire Sleet via the Telegram Bot API. </p>



<p>A second fake application named &#8220;softwareupdate.app&#8221; then displays a &#8220;system update complete&#8221; message so the victim has no reason to grow suspicious.</p>



<p>To reach protected data, the mac-cur3 stage manipulates the TCC database by directing Finder to rename the TCC folder temporarily, allowing the malware to insert permissions that let osascript access sensitive files without triggering a consent prompt. </p>



<p>A 575-line exfiltration script then collects nine categories of data and uploads them to attacker servers.</p>



<p>Users and organizations should treat any unsolicited request to run terminal commands during an online interview as a clear warning sign. </p>



<p>Blocking compiled AppleScript (.scpt) files, auditing LaunchDaemon plist files for unexpected entries, and monitoring the TCC database for unauthorized changes are all effective defensive steps. </p>



<p>Keeping macOS updated ensures Apple&#8217;s latest XProtect signatures and Safari <a href="https://cybersecuritynews.com/google-chromes-enhanced-safe-browsing/" id="6251" target="_blank" rel="noreferrer noopener">Safe Browsing protections</a> remain active to block known components of this campaign.<a href="https://ppl-ai-file-upload.s3.us-east-1.amazonaws.com/web/direct-files/attachments/11146061/809986b5-ebac-48c0-acc4-dc4b46b9ca28/Fake-Zoom-SDK-Update-Delivers-Sapphire-Sleet-Malware-in-New-macOS-Intrusion-Chain.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Checksum-Mode=ENABLED&amp;X-Amz-Credential=ASIA2F3EMEYE7OS5TBAY%2F20260417%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260417T145413Z&amp;X-Amz-Expires=3600&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEA8aCXVzLWVhc3QtMSJGMEQCIEwADyW77DjUTOhSX285qnNShYVLKe6cEyD3biWq3fT%2BAiBOw68zlp1UJxRkIDmi2xbBA%2FssZ6d0VgLicT79J5sHyyr0BAjY%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMZkLyGCSiK9aKsZVfKsgEpsBBRKcfhGOtToRBkizyLHHHcr6Gzv0G2sMlVX%2BqUT506QlQHT0IOqWGUBFPYu328gXYdrrd2oMTcr2JQ7%2B4yzfEz7cI3jBT8LuV8Z6k2QOl0f1%2Blz3EaL6%2B2RN7mPFwSZSM1dWusWTF4jA5DLSNe5hTTfs780pin%2FuuLNNyrX3AOu%2BGGJnWdGW5Rys72dDPhDQbc3cikYfTwfmGNfS61hX12664jZ%2BJWyLJ4QTgLnen3VHS%2Fu4UJL%2BGYvEHvZNXpMnVzOsyiHp69DSyeZLMxQ1KMtTCJ2BusoFdXYfG44aunm%2F1XbQbri7W%2BmZfxDi%2Bj2lmi4sFVwY6lOmZ65N9cqc%2BHKLx0uq4g5DQ9q5uX9Yh8bRgE%2FhotWqF3%2Bgyuh0xpj7GceZqKW%2FGZn%2BikZNsKIiTDvpPFDOLURoEoQGrg6z7sXff9ryDSvSi2yANmTpva8LtHrIVXmn4D9kQqo%2FjeXtXmi8O2EVDiwmvGrNpG4El5hCX1zcsfV1P1rhSj76v1ssMoiJtSYsG%2B%2FUhxOvjb3a6Lrrq9t9j4Z6llxQkjxn2p64yTn0yuwWzl19zUBrpTUYkTx5XIIA6HnqEwfzUnN8j3xf%2BMMYx7bDb4YuIHd8ei7HCdQK%2BE5RR4I72agbcS55G0k5y5XbYLSGrMrowbHgDjlg6gLzHGOxbvM9XZK%2Fw9spOMxJsL2njxCdSpiidPkqUHoyQvgr0qJmKwW3XTOCLGIRaSUF4Sw%2BgQ9ybOhQZWm1kZZD9R0FSwWlxtOMhlZCuhgkmRNgwrY6JzwY6mQG2eM5M%2B%2BcGnFpBZPEwm%2B2ma3y0JCqymQkpQ1DZtC4MHrc8rruF5y2x04Oz%2FoegAIpNKGGvDPqyhWZme48BGqywbu1v5yuf%2FGoyGvkHrsWVmKfXgIxapMCwo5dB3DUmEIzPxSaJsQnKafo9ryukZPsDEGu9LTna%2F31UJGEhJeLvzHQmcEfzfoGtsdoaXZ6fWcrciGF%2BQNdeFHg%3D&amp;X-Amz-SignedHeaders=host&amp;x-id=GetObject&amp;X-Amz-Signature=62dd8fda490fb83aaf4e4e4592c2755a610de88219c171a57a06eab126b300c8" target="_blank" rel="noreferrer noopener"></a></p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware/">Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Fake-Zoom-SDK-Update-Delivers-Sapphire-Sleet-Malware-in-New-macOS-Intrusion-Chain.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147814</post-id>	</item>
		<item>
		<title>Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</title>
		<link>https://cybersecuritynews.com/attackers-spread-blockchain-based-backdoor-via-hugging-face/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 14:14:00 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147798</guid>

					<description><![CDATA[<p>A critical vulnerability in the marimo Python notebook platform is now being actively used by attackers to deploy a blockchain-powered backdoor on developer systems. The flaw, tracked as CVE-2026-39987, allows remote code execution without authentication, making it a dangerous entry point for threat actors leveraging it to install a new variant of the NKAbuse malware [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/attackers-spread-blockchain-based-backdoor-via-hugging-face/">Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in the marimo Python notebook platform is now being actively used by attackers to deploy a blockchain-powered backdoor on developer systems. </p>



<p>The flaw, tracked as CVE-2026-39987, allows remote code execution without authentication, making it a dangerous entry point for threat actors leveraging it to install a new variant of the NKAbuse malware through a fake Hugging Face Space.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The advisory, identified as GHSA-2679-6mx9-h9xc, was published on GitHub on April 8, 2026. Within just 9 hours and 41 minutes, the first active exploitation was recorded. </p>



<p>From April 11 to April 14, 2026, attackers from 11 unique IP addresses across 10 countries launched 662 exploit events against exposed marimo instances. </p>



<p>What began as early scanning quickly escalated into a full-scale, multi-actor campaign targeting AI developer workstations.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://www.sysdig.com/blog/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface" id="https://www.sysdig.com/blog/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface" target="_blank" rel="noreferrer noopener nofollow">Researchers at the Sysdig TRT identified and documented these attacks</a> as they unfolded, noting four distinct post-exploitation patterns: credential harvesting, reverse shell attempts, DNS-based data exfiltration, and deployment of a previously undocumented NKAbuse variant. </p>



<p>The speed of weaponization confirmed that multiple threat actors were independently targeting the same vulnerability within days of its public disclosure.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The most alarming finding was the deployment of a Go-based backdoor named kagent through a typosquatted Hugging Face Space called vsccode-modetx, built to mimic a legitimate <a href="https://cybersecuritynews.com/trojanized-openvsx-extension-spreads-glassworm/" id="147077" target="_blank" rel="noreferrer noopener">VS Code tool</a>. </p>



<p>Using a simple curl command against a marimo endpoint, the attacker pulled and executed a shell dropper that downloaded the kagent binary to the victim system. </p>



<p>The Hugging Face domain carried zero malicious flags across 16 reputation sources at the time, allowing the payload to bypass standard security filters without raising any alarms.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attack impact extended beyond a single compromised notebook. Attackers quickly pivoted from exploiting marimo to accessing connected PostgreSQL databases and Redis instances using credentials pulled from environment variables. </p>



<p>One operator extracted AWS access keys, database connection strings, and OpenAI API tokens, demonstrating that one exposed marimo instance could open a foothold into broader cloud infrastructure.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="nkabuse-variant-and-persistence-tactics"><strong>NKAbuse Variant and Persistence Tactics</strong></h2>



<p>The kagent binary is a stripped, UPX-packed Go ELF file that unpacks from 4.3 MB to 15.5 MB and communicates with a command-and-control server over the NKN blockchain network. </p>



<p> the NKN protocol uses decentralized relay nodes, there is no single IP address or domain to block, and C2 traffic blends with normal blockchain activity, making detection difficult with <a href="https://cybersecuritynews.com/ransomware-actors-blending-legitimate-tools/" id="121805" target="_blank" rel="noreferrer noopener">conventional tools</a>.</p>



<p>The dropper script establishes persistence using three sequential methods: first creating a systemd user service at ~/.config/systemd/user/kagent.service, then adding a crontab @reboot entry, and finally installing a macOS LaunchAgent at ~/Library/LaunchAgents/com.kagent.plist. </p>



<p>All output is silently redirected to ~/.kagent/install.log, hiding activity from standard process monitoring. Defenders must check all three locations to fully remove the implant.</p>



<p>Compared to the original NKAbuse from December 2023, this 2026 variant targets AI developer tooling using a brand-new vulnerability, uses Hugging Face for delivery, and disguises the binary as a legitimate Kubernetes agent named kagent, where the original exploited a six-year-old Apache Struts flaw against Linux desktops and <a href="https://cybersecuritynews.com/securing-iot-devices-3/" id="108816" target="_blank" rel="noreferrer noopener">IoT devices</a>.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The Sysdig TRT shared the following steps for defenders:<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893"></a></p>



<ul class="wp-block-list">
<li>Update marimo to version 0.23.0 or later immediately, as the vulnerability requires no authentication and is actively targeted.</li>



<li>Hunt for the ~/.kagent/ directory, the kagent.service systemd entry, and any running kagent process on systems that ran marimo.</li>



<li>Block vsccode-modetx.hf.space at the proxy or DNS level to stop the known payload delivery URL.</li>



<li>Rotate all credentials on exposed marimo instances, focusing on DATABASE_URL, AWS keys, and API tokens stored in environment variables.</li>



<li>Monitor network traffic for NKN blockchain relay patterns that indicate active C2 communication from an infected host.</li>



<li>Audit Hugging Face Spaces and AI/ML dependencies, and restrict access to verified publishers only.</li>



<li>Deploy runtime behavioral detection, as signature-based tools cannot catch zero-detection malware hosted on trusted platforms.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/attackers-spread-blockchain-based-backdoor-via-hugging-face/">Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147798</post-id>	</item>
	</channel>
</rss>
