<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security News</title>
	<atom:link href="https://cybersecuritynews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersecuritynews.com/</link>
	<description>World&#039;s #1 Premier Cybersecurity and Hacking News Portal</description>
	<lastBuildDate>Sat, 18 Apr 2026 09:02:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</url>
	<title>Cyber Security News</title>
	<link>https://cybersecuritynews.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192061645</site>	<item>
		<title>Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</title>
		<link>https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 09:02:26 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147842</guid>

					<description><![CDATA[<p>Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by Google search. According to a recent disclosure on Hacker News, an insecure file-hosting configuration has exposed personal identifiable information (PII), including completed tax forms, that were exchanged between freelancers and clients. The [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/">Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by <a href="https://cybersecuritynews.com/hackers-hijacking-google-search-results-via-backdoored-browser-extensions/" type="post" id="4530" target="_blank" rel="noreferrer noopener">Google search</a>. </p>



<p>According to a recent disclosure on Hacker News, an insecure file-hosting configuration has exposed personal identifiable information (PII), including completed tax forms, that were exchanged between freelancers and clients.</p>



<h2 class="wp-block-heading" id="the-cloudinary-misconfiguration"><strong>The Cloudinary Misconfiguration</strong></h2>



<p>The root of the data exposure lies in how Fiverr handles file sharing within its internal messaging system. </p>



<p>The platform relies on a third-party service called Cloudinary to process and host images and PDF documents, including final work products delivered to clients.</p>



<p>While Cloudinary operates similarly to an <a href="https://cybersecuritynews.com/best-aws-monitoring-tools/" type="post" id="37530" target="_blank" rel="noreferrer noopener">Amazon S3 digital storage bucket</a> and supports secure, expiring web links, Fiverr reportedly configured the service incorrectly. </p>



<p>Instead of requiring authentication, Fiverr opted to generate fully public URLs for these sensitive attachments. Because these files were left open to the public, search engines like Google were able to crawl and index them. </p>



<p>This suggests that the public file links may have been exposed through unprotected HTML pages somewhere on Fiverr’s network.</p>



<p>The impact of this oversight is severe, as anyone can allegedly use specific Google search queries to surface private documents. </p>



<p>For example, running a site-specific search for &#8220;form 1040&#8221; on Fiverr&#8217;s Cloudinary domain instantly reveals<a href="https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/" type="post" id="146216" target="_blank" rel="noreferrer noopener"> private tax documents </a>containing highly sensitive financial and personal data.</p>



<p>Interestingly, the researcher highlighted a troubling contradiction. Fiverr actively purchases Google Ads for tax preparation services, yet the platform fails to secure the resulting financial work products. </p>



<p>This exposure raises immediate regulatory concerns. By failing to lock down financial documents properly, the platform and its tax preparation freelancers could be in direct violation of the FTC Safeguards Rule and the Gramm-Leach-Bliley Act (GLBA), which mandate strict protections for consumer financial data.</p>



<p><a href="https://news.ycombinator.com/item?id=47769796" target="_blank" rel="noreferrer noopener nofollow">The researcher who discovered the issue claims</a> to have followed standard responsible disclosure protocols. A detailed vulnerability report was sent to Fiverr’s designated security team 40 days before the public release. </p>



<p>After receiving no response or remediation efforts from the company, the researcher opted to publish the findings on Hacker News to warn affected users.</p>



<h2 class="wp-block-heading" id="key-takeaways-and-mitigations"><strong>Key Takeaways and Mitigations</strong></h2>



<p>Until Fiverr resolves this public exposure, users are at risk of <a href="https://cybersecuritynews.com/christmas-phishing-surge-chains-docusign-spoofing/" type="post" id="138852" target="_blank" rel="noreferrer noopener">identity theft and financial fraud</a>. Both freelancers and clients should take immediate precautions:</p>



<ul class="wp-block-list">
<li><strong>Halt sensitive transfers:</strong> Users should temporarily stop sending sensitive documents, such as tax forms or medical records, through Fiverr&#8217;s messaging system.</li>



<li><strong>Implement signed URLs:</strong> Fiverr must urgently update its Cloudinary integration to utilize signed, time-limited URLs for all user-to-user file transfers to ensure files expire after being downloaded.</li>



<li><strong>Request search de-indexing:</strong> The company needs to issue urgent takedown requests to Google to remove the exposed domain directories from public search results.</li>



<li><strong>Monitor for identity theft:</strong> Clients who purchased financial or tax preparation gigs on Fiverr should monitor their credit reports for unauthorized activity.</li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/">Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Fiverr-Allegedly-Leaks-User-Information-to-Google-Indexing-Researchers-Say-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147842</post-id>	</item>
		<item>
		<title>Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</title>
		<link>https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 08:42:55 +0000</pubDate>
				<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147838</guid>

					<description><![CDATA[<p>A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. According to recent threat research published by Fortinet&#8217;s FortiGuard Labs, threat actors are exploiting a known command injection vulnerability to hijack TBK DVR systems and construct a large-scale Distributed Denial-of-Service (DDoS) botnet. Fortinet researchers [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/">Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. </p>



<p>According to recent threat research published by Fortinet&#8217;s FortiGuard Labs, threat actors are exploiting a known <a href="https://cybersecuritynews.com/react-native-command-injection-flaw/" target="_blank" rel="noreferrer noopener">command injection vulnerability</a> to hijack TBK DVR systems and construct a large-scale Distributed Denial-of-Service (DDoS) botnet.</p>



<p>Fortinet researchers report that the campaign specifically targets TBK DVR-4104 and DVR-4216 models by exploiting CVE-2024-3721. This OS command injection flaw allows attackers to deliver a downloader script by manipulating arguments within the device system. </p>



<p>During the exploitation phase, network traffic reveals a custom HTTP header reading &#8220;X-Hacked-By: Nexus Team – Exploited By Erratic,&#8221; leading FortiGuard Labs to attribute the campaign to a relatively unknown threat actor identified as the &#8220;<a href="https://cybersecuritynews.com/china-nexus-hackers-attacking-telecommunication/" target="_blank" rel="noreferrer noopener">Nexus Team</a>&#8220;.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-67.png" alt=" Exploit traffic via CVE-2024-3721 (Source: Fortinet)" class="wp-image-183817"/><figcaption class="wp-element-caption">&nbsp;Exploit traffic via CVE-2024-3721 (Source: Fortinet)</figcaption></figure>



<p>Once the downloader script executes, it fetches multi-architecture payloads supporting ARM, MIPS, and x86-64 environments, subsequently displaying a console message stating &#8220;nexuscorp has taken control&#8221;.</p>



<h2 class="wp-block-heading" id="technical-capabilities-and-infection-mechanisms"><strong>Technical Capabilities and Infection Mechanisms</strong></h2>



<p>Fortinet’s analysis reveals that Nexcorium shares <a href="https://cybersecuritynews.com/mirai-based-botnets-evolve-into-massive-ddos/" target="_blank" rel="noreferrer noopener">fundamental architecture with traditional Mirai variants</a>, utilizing XOR-encoded configurations and modular components. The technical operation relies on several core mechanisms:<a href="https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html" target="_blank" rel="noreferrer noopener"></a></p>



<ul class="wp-block-list">
<li><strong>Modular Architecture:</strong> The malware deploys standard Mirai features, including a watchdog module to distinguish sub-processes, a scanner for network propagation, and an attacker module for DDoS execution.</li>



<li><strong>Legacy Exploit Integration:</strong> To maximize its infection radius, Nexcorium incorporates the older CVE-2017-17215 vulnerability, which targets Huawei router devices.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Aggressive Brute-Forcing:</strong> The malware launches Telnet-based brute-force attacks against other networked hardware using a hardcoded list of common and default credentials.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Self-Preservation:</strong> Nexcorium verifies its own integrity using FNV-1a hashing algorithms; if the binary is altered or unreadable, it dynamically duplicates itself under a new filename to evade detection.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-66.png" alt=" XOR-Encoded CVE-2017-17215 exploit (Source: Fortinet)" class="wp-image-183816"/><figcaption class="wp-element-caption">&nbsp;XOR-Encoded CVE-2017-17215 exploit (Source: Fortinet)</figcaption></figure>



<p>To maintain long-term access to compromised systems, the <a href="https://cybersecuritynews.com/ghostclaw-ai-assisted-malware/" target="_blank" rel="noreferrer noopener">malware establishes persistence</a> through four distinct mechanisms rather than relying on a single configuration file. The botnet secures its foothold by:<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></p>



<ul class="wp-block-list">
<li>Modifying <code>/etc/inittab</code> to ensure automatic process restarts if the malware is terminated.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Updating <code>/etc/rc.local</code> to guarantee execution during the device&#8217;s system startup sequence.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Creating a dedicated systemd service named <code>persist.service</code> for persistent background operation.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Planting scheduled tasks via crontab for reliable post-reboot execution.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-65.png" alt="Parsing the architecture information response from the victim host (Source: Fortinet)" class="wp-image-183815"/><figcaption class="wp-element-caption">Parsing the architecture information response from the victim host (Source: Fortinet)</figcaption></figure>



<p>Following this extensive setup, Fortinet notes that Nexcorium deletes its original binary from the execution path to thwart security analysts.</p>



<p>The primary objective of the Nexus Team campaign is launching devastating DDoS attacks. <a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener nofollow">Based on FortiGuard Labs&#8217; decryption of the malware&#8217;s configuration table</a>, Nexcorium communicates with a centralized command-and-control (C2) server to receive attack directives. </p>



<p>Instead of a narrow attack scope, the botnet is equipped with a versatile arsenal of flood techniques. These include standard UDP, TCP ACK, TCP SYN, SMTP, and TCP PSH floods, alongside specialized attack vectors like VSE query floods and UDP blast attacks.</p>



<p>The discovery of Nexcorium highlights the continuous weaponization of legacy IoT devices. Security experts strongly advise organizations to immediately patch CVE-2024-3721, replace default manufacturer credentials, and isolate critical infrastructure from vulnerable IoT endpoints using network segmentation.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/">Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Nexcorium-Mirai-Variant-Weaponizes-TBK-DVR-Vulnerability-in-Fresh-IoT-Botnet-Push-1-2-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147838</post-id>	</item>
		<item>
		<title>Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</title>
		<link>https://cybersecuritynews.com/ftp-servers-exposed/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 02:43:34 +0000</pubDate>
				<category><![CDATA[Cyber Attack News]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147724</guid>

					<description><![CDATA[<p>According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million internet-facing hosts are still running the File Transfer Protocol (FTP). While this marks a significant 40% decline from the 10.1 million servers observed in 2024, the presence of this decades-old protocol continues to pose an exposure risk [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/ftp-servers-exposed/">Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million <a href="https://cybersecuritynews.com/monsta-ftp-remote-code-vulnerability/" target="_blank" rel="noreferrer noopener">internet-facing hosts are still running the File Transfer Protocol (FTP).</a></p>



<p>While this marks a significant 40% decline from the 10.1 million servers observed in 2024, the presence of this decades-old protocol continues to pose an exposure risk due to widespread insecure default configurations.</p>



<p>The Censys report highlights that the dominant story of FTP exposure in 2026 is not purpose-built file transfer infrastructure, but rather an accumulation of platform defaults on shared hosting networks and broadband providers.</p>



<h2 class="wp-block-heading" id="h-the-state-of-encryption-and-regional-risks"><strong>The State of Encryption and Regional Risks</strong></h2>



<p>When it comes to securing these servers, the data reveals a mixed landscape. Censys found that roughly 58.9% of observed FTP hosts completed a <a href="https://cybersecuritynews.com/staying-on-top-of-tls-attacks/" target="_blank" rel="noreferrer noopener">Transport Layer Security (TLS) handshake</a>, meaning they support encrypted connections.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWc-bX8wtbk5jYfQ6cHUVgciSH4cHrtGVqK_BKuXTt2ioxECZ9sun64nr6JUsCYJ1106UQjEKLX460wfUXAYt9lgYvSTZBdASavVbcvypLenfXFwWM-BBDZG808wIvaZPBRj_L8ZYjVVZg31IywwcgPAPy0ybSq42TsX5HBTLGdGpROZnNgemqo273nZs/s1600/Screenshot%202026-04-17%20130236%20%281%29.webp" alt="FileZilla server responding with a funny TLS response(Source: Censys)" /><figcaption class="wp-element-caption"><em>FileZilla server responding with a funny TLS response(Source: Censys)</em></figcaption></figure>



<p>However, this leaves approximately 2.45 million hosts without observed evidence of encryption, potentially allowing them to transmit files and credentials in cleartext.</p>



<p>The lack of encryption adoption varies significantly by region. According to Censys data, mainland China and South Korea have the lowest TLS adoption rates among the top 10 hosting countries, at 17.9% and 14.5%, respectively.</p>



<p>Meanwhile, Japan accounts for 71% of all FTP servers globally that still rely on outdated, deprecated legacy <a href="https://cybersecuritynews.com/tor-adopts-galois-onion-encryption/" target="_blank" rel="noreferrer noopener">encryption protocols</a> such as TLS 1.0 and 1.1.</p>



<p>The security posture of these 6 million servers is heavily influenced by the default settings of the software daemons running them.</p>



<p><strong>Key technical observations from the Censys report include:</strong></p>



<ul class="wp-block-list">
<li><strong>Pure-FTPd Dominance:</strong> Operating on roughly 1.99 million services, this is the most common FTP daemon, largely driven by its inclusion as a default in cPanel hosting environments.<br></li>



<li><strong>The IIS FTP Configuration Trap:</strong> Over 150,000 <a href="https://cybersecuritynews.com/badiis-malware-compromising-iis-servers/" target="_blank" rel="noreferrer noopener">Microsoft IIS FTP services</a> return a &#8220;534&#8221; error response, indicating TLS was never configured.<br><br>While IIS defaults to a policy that appears to require encryption, it does not bind a security certificate upon a fresh installation. <br><br>Consequently, <a href="https://cybersecuritynews.com/lynx-gateway-vulnerability/" target="_blank" rel="noreferrer noopener">the server accepts cleartext credentials</a>, even though the configuration appears to enforce TLS.<br></li>



<li><strong>Hidden Nonstandard Ports:</strong> Relying only on port 21 scans miss a significant portion of the attack surface. <br><br>Tens of thousands of FTP services run on alternate ports, such as 10397 or 2121, often tied to specific telecom operations or network-attached storage devices.</li>
</ul>



<h2 class="wp-block-heading" id="h-mitigation-and-hardening-strategies"><strong>Mitigation and Hardening Strategies</strong></h2>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsr3i2hlehPh3kVg8ltuT0bqF9Iq8kviM-3PcIlaycBjnO6gSRkdyPna1Oqu5AUG16DVkY80p5048Ruu-O59bkY9M268RCpGBKkTACaYnwI2CDU1L8-x36X93_nh-37Vv-sh6W1DB94fBiB3lNwMOcVi5a0SoMKtB1Xuv8jA37aMXt0vYPwmZD_SUowYA/s1600/Screenshot%202026-04-17%20130214%20%281%29.webp" alt="2.35 Million FTP Services With No Evidence of TLS(Source: Censys)" /><figcaption class="wp-element-caption"><em>2.35 Million FTP Services With No Evidence of TLS(Source: Censys)</em></figcaption></figure>



<p>For enterprise defenders and infrastructure administrators, <a href="https://censys.com/blog/ftp-exposure-brief/" target="_blank" rel="noreferrer noopener nofollow">Censys strongly recommends evaluating</a> whether FTP is truly necessary before attempting to harden it.</p>



<p><strong>Organizations should consider the following mitigation strategies:</strong></p>



<ul class="wp-block-list">
<li><strong>Migrate to Secure Alternatives:</strong> Whenever possible, <a href="https://cybersecuritynews.com/titan-file-transfer-server-flaws/" target="_blank" rel="noreferrer noopener">replace FTP with SSH File Transfer Protocol (SFTP)</a>, which encrypts credentials and data by default over port 22.<br></li>



<li><strong>Enforce Explicit TLS:</strong> If legacy FTP infrastructure must remain online, administrators should configure their daemons to enforce Explicit TLS (FTPS) and refuse cleartext connections.<br></li>



<li><strong>Fix IIS Certificate Bindings:</strong> Windows Server administrators using IIS FTP must ensure that a valid certificate is bound to the FTP site and verify that the SSL policy actively enforces encryption.</li>
</ul>



<p>Ultimately, while the internet&#8217;s reliance on FTP is slowly shrinking, millions of instances continue to run quietly in the background.</p>



<p>As Censys warns, the primary risk is not advanced <a href="https://cybersecuritynews.com/hackers-launch-zero-day-attacks-to-exploits-corrupted-files-to-evade-security-tools/" target="_blank" rel="noreferrer noopener">zero-day attacks</a>, but the simple failure to update default configurations that leave systems unnecessarily exposed.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/ftp-servers-exposed/">Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Nearly-6-Million-Internet-Facing-FTP-Servers-Still-Exposed-in-2026-Censys-Warns.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147724</post-id>	</item>
		<item>
		<title>PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</title>
		<link>https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 02:38:56 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147763</guid>

					<description><![CDATA[<p>A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet&#8217;s FortiSandbox product, tracked as&#160;CVE-2026-39808. The flaw allows an unauthenticated attacker to execute arbitrary operating system commands as root, the highest privilege level, without requiring any login credentials. The vulnerability was originally discovered in&#160;November 2025&#160;and has now been made public following Fortinet&#8217;s [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/">PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet&#8217;s FortiSandbox product, tracked as&nbsp;CVE-2026-39808.</p>



<p>The flaw allows an unauthenticated attacker to <a href="https://cybersecuritynews.com/cups-vulnerability-remote-attack/" target="_blank" rel="noreferrer noopener">execute arbitrary operating system commands as root,</a> the highest privilege level, without requiring any login credentials.</p>



<p>The vulnerability was originally discovered in&nbsp;November 2025&nbsp;and has now been made public following Fortinet&#8217;s patch release in&nbsp;April 2026.</p>



<p>Security researchers and defenders are urged to apply the fix immediately, as a working exploit is now freely available on GitHub.</p>



<p>CVE-2026-39808 is an <a href="https://cybersecuritynews.com/fortisandbox-os-command-injection-vulnerability/" target="_blank" rel="noreferrer noopener">OS command injection vulnerability</a> affecting Fortinet&#8217;s FortiSandbox, a widely used sandboxing solution designed to detect and analyze advanced threats and malware. The flaw resides in the <code>/fortisandbox/job-detail/tracer-behavior</code> endpoint.</p>



<h2 class="wp-block-heading" id="h-how-simple-is-the-attack"><strong>How Simple Is the Attack?</strong></h2>



<p>An attacker can inject malicious operating system commands through the<code> jid</code> GET parameter by using the <code>pipe symbol (|)</code> a common technique used to <a href="https://cybersecuritynews.com/apache-vulnerability-to-steal-sensitive-data-from-unix/" target="_blank" rel="noreferrer noopener">chain commands in Unix-based systems</a>.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQQTmxjOXVqIpFxBamiAUZOxPt3tAPqA5jsAdn0VpRfWOkLvCbuSiCjP7a7zQew4_7CzRrin7JIoTCdAh-9gzLZHsL3wARCAdgdW8mXlupfavPqSMgZS9z13lgd6PNGLBzd2slGGnp-Rci5Hbe7H5OtXW8pulB-EeJy6M39OxwJnB4Py7cQ9kundEYLek/s1600/Screenshot%202026-04-17%20164341%20%281%29.webp" alt="OS command injection via | in the jid parameter(source : GitHub)" /><figcaption class="wp-element-caption"><br>OS command injection via <code>|</code> in the jid parameter(source : GitHub)</figcaption></figure>



<p>Because the vulnerable endpoint fails to properly sanitize user input, the injected commands are executed directly by the underlying operating system with root-level privileges.</p>



<p>FortiSandbox versions&nbsp;4.4.0 through 4.4.8&nbsp;are confirmed to be affected by this vulnerability.</p>



<p>What makes CVE-2026-39808 especially alarming is how easy it is to exploit.</p>



<p><a href="https://github.com/samu-delucas/CVE-2026-39808?tab=readme-ov-file" id="https://github.com/samu-delucas/CVE-2026-39808?tab=readme-ov-file" target="_blank" rel="noreferrer noopener nofollow">According to researcher samu-delucas, who published the PoC on GitHub</a>, a single curl command is enough to achieve unauthenticated remote code execution (RCE) as root:</p>



<p><code>curl -s -k --get "http://$HOST/fortisandbox/job-detail/tracer-behavior" --data-urlencode "jid=|(id &gt; /web/ng/out.txt)|"</code></p>



<p>In this example, the attacker redirects command output to a file stored in the web root, which can then be retrieved through a browser.</p>



<p>This means an attacker could <a href="https://cybersecuritynews.com/scarcruft-abuses-legitimate-cloud-services/" target="_blank" rel="noreferrer noopener">read sensitive files, drop malware, or fully compromise the host system </a>all without ever logging in.</p>



<h2 class="wp-block-heading" id="h-fortinet-s-response"><strong>Fortinet&#8217;s Response</strong></h2>



<p><a href="https://cybersecuritynews.com/fortinet-security-update-march/" target="_blank" rel="noreferrer noopener">Fortinet patched the vulnerability </a>and published its official advisory under FG-IR-26-100 through its FortiGuard PSIRT portal.</p>



<p>The advisory confirms the severity of the flaw and outlines affected versions. Organizations running FortiSandbox 4.4.0 through 4.4.8 should upgrade to a patched version without delay.</p>



<ul class="wp-block-list">
<li><strong>Patch immediately: </strong> upgrade FortiSandbox to a version beyond 4.4.8 as specified in Fortinet&#8217;s official advisory.<br></li>



<li><strong>Audit exposed instances:</strong> check whether FortiSandbox management interfaces are exposed to untrusted networks or the public internet.<br></li>



<li><strong>Review logs:</strong>  look for unusual GET requests to the <code>/fortisandbox/job-detail/tracer-behavior</code> endpoint as indicators of exploitation attempts.<br></li>



<li><strong>Apply network segmentation:</strong> restrict access to FortiSandbox administrative interfaces to trusted IP ranges only.</li>
</ul>



<p>With a working PoC now publicly available, the window for exploitation is open. Security teams should treat this as a critical-priority patch and act immediately to secure affected systems.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/">PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/PoC-Exploit-Released-for-FortiSandbox-Vulnerability-that-Allows-attacker-to-execute-commands.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147763</post-id>	</item>
		<item>
		<title>Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</title>
		<link>https://cybersecuritynews.com/hackers-target-tp-link-routers/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 17:53:50 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147825</guid>

					<description><![CDATA[<p>A known security flaw in several end-of-life TP-Link Wi-Fi routers is being actively targeted by hackers trying to install Mirai-based botnet malware on vulnerable devices. The vulnerability, tracked as CVE-2023-33538, affects multiple TP-Link models that no longer receive vendor updates, leaving users with no official patch to apply. The affected routers include the TL-WR940N (versions [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hackers-target-tp-link-routers/">Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A known security flaw in several end-of-life TP-Link Wi-Fi routers is being actively targeted by hackers trying to install Mirai-based botnet malware on vulnerable devices. </p>



<p>The vulnerability, tracked as CVE-2023-33538, affects multiple TP-Link models that no longer receive vendor updates, leaving users with no official patch to apply.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The affected routers include the TL-WR940N (versions 2 and 4), TL-WR740N (versions 1 and 2), and TL-WR841N (versions 8 and 10). </p>



<p>These devices share a common weakness in their web management interfaces, where a specific parameter inside an HTTP GET request is not properly checked for harmful content. </p>



<p>This missing input validation gives attackers a clear opening to inject and run commands on the router without triggering any warning on the device.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attacks work by sending malicious HTTP GET requests to the /userRpm/WlanNetworkRpm endpoint. The requests carry commands embedded in the ssid parameter, which the router&#8217;s firmware processes without filtering harmful input. </p>



<p>Once the router accepts the request, the commands instruct it to download an ELF binary named arm7 from a remote server at IP address 51.38.137[.]113, assign it full execution permissions, and run it immediately.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/" id="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/" target="_blank" rel="noreferrer noopener nofollow">Unit 42 analysts and researchers at Palo Alto Networks identified this malicious activity</a> after CISA added CVE-2023-33538 to its Known Exploited Vulnerabilities (KEV) catalog in June 2025. </p>



<p>Their telemetry systems detected large-scale, automated exploitation attempts around that same period, with multiple probes targeting the same vulnerable endpoint across numerous devices in the wild.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The downloaded arm7 binary is a variant of the Condi IoT botnet malware, a Mirai-based family tied to previous campaigns. Once running on the infected router, the malware connects to a command-and-control (C2) server and folds the device into a larger botnet. </p>



<p>The C2 domain cnc.vietdediserver[.]shop is directly associated with these <a href="https://cybersecuritynews.com/zyxel-nas-devices-under-attack/" id="68510" target="_blank" rel="noreferrer noopener">Mirai-like botnet</a> operations and was confirmed malicious.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="inside-the-arm7-malware-binary"><strong>Inside the Arm7 Malware Binary</strong></h2>



<p>After gaining access to the device, the arm7 binary carries out a structured set of tasks to maintain its presence and grow the botnet. </p>



<p>It waits for specific byte-pattern commands from the C2 server and responds by sending heartbeat signals, triggering self-updates, and launching internal HTTP server functions.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqm-hGRYR0uwfWcfpGcGJpV3LMHHahbzmIwE1GEBklSVj2hyphenhyphenCFHiguEgcGkD8hCXUh2oqzTzAkg-IIs7SVxlwFEltMrzuJHns9y9wKDsBRhE0pxpxKzeGoaFaPyHc2zTvTGr72Tc8MkHMLGqPLZ73D6tFqYliLwjGRDZTf-mq5y4_ZO1uk7UNbZ4bVztU/s16000/An%20example%20of%20an%20exploit%20attempt%20for%20CVE-2023-33538%20that%20we%20observed%20in%20May%202025%20(Source%20-%20Unit42).webp" alt="An example of an exploit attempt for CVE-2023-33538 that we observed in May 2025 (Source - Unit42)" /><figcaption class="wp-element-caption">An example of an exploit attempt for CVE-2023-33538 that we observed in May 2025 (Source &#8211; Unit42)</figcaption></figure>



<p>One particularly notable behavior is the self-update routine. The binary uses the update_bins() function to connect back to 51.38.137[.]113 on TCP port 80 and pull fresh copies of itself built for eight different CPU architectures, including arm6, mips, sh4, and x86_64. </p>



<p>The <a href="https://cybersecuritynews.com/whats-the-difference-between-a-mac-address-and-an-ip-address/" id="84137" target="_blank" rel="noreferrer noopener">IP address</a> and port are hard-coded directly inside the binary, as confirmed during disassembly. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTx-g8FU5sEtrVSXTRozBPgl13PBKgph_4vbq74-0DctXgAvxiOiL9gDZVEXz_NPOeAIgWkjrDzPYV3VLlGP9WH8zCSC2jpsvdx5N8DYBnSmvF8MQ1oZcDB5zD6oDWOVu-fsWnTVbP8B642BeYdFGfb229ePPBqSOR0tRSWZBWJfv4nx3maZ1Hzmel9bY/s16000/The%20update_bins%20function%20with%20a%20hard-coded%20IP%20address%20and%20port%20(Source%20-%20Unit42).webp" alt="The update_bins function with a hard-coded IP address and port (Source - Unit42)" /><figcaption class="wp-element-caption">The update_bins function with a hard-coded IP address and port (Source &#8211; Unit42)</figcaption></figure>
</div>


<p>The arm7 binary also starts an HTTP server on the infected device using a port randomly chosen between 1024 and 65535. </p>



<p>Once active, this server delivers fresh malware copies to other devices that connect to it, spreading the infection further without requiring any additional input from the attacker. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0w6Ws0chvpvrSTWbD-oP0hPG1JtuhkGrvKbYx3snpKYi0HvP8X49bX0c4220cNDFrg3FN3bL57V9ZuUic-7MdaOyp7puUKus_hhRQ4NzzHnDE-dgIcFiWnk8cDllcPvhHhB5rLS6VKjazY02S1BV8rcQLUQ6_HhL1U6wBFhOgVUug1G0Ma1WZCAmFkeQ/s16000/httpd_start()%20function%20graph%20for%20the%20arm7%20binary%20(Source%20-%20Unit42).webp" alt="httpd_start() function graph for the arm7 binary (Source - Unit42)" /><figcaption class="wp-element-caption">httpd_start() function graph for the arm7 binary (Source &#8211; Unit42)</figcaption></figure>
</div>


<p>This allows each newly infected host to go on recruiting more victims. Despite their scale, the in-the-wild exploit attempts observed by researchers carried technical errors. </p>



<p>The attackers targeted the ssid parameter rather than the correct and vulnerable ssid1 parameter, and their injected commands depended on wget, a utility absent from the router&#8217;s limited BusyBox environment. </p>



<p>Even so, the research team confirmed that the underlying vulnerability is real and that a more accurate attacker using the correct parameter could successfully exploit it.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>Regarding recommendations, TP-Link confirmed the affected devices are end-of-life and no vendor patches will be made available. The company advises users to replace these units with currently supported hardware. </p>



<p>Changing the default admin:admin login credentials is also strongly recommended, as exploitation of this vulnerability requires authenticated access to the router&#8217;s web interface. </p>



<p>Administrators should monitor <a href="https://cybersecuritynews.com/attaxion-releases-agentless-traffic-monitoring-for-immediate-risk-prioritization/" id="123027" target="_blank" rel="noreferrer noopener">outbound traffic</a> for connections to known malicious domains and retire any affected TP-Link router models still active on their networks.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 90%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/hackers-target-tp-link-routers/">Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147825</post-id>	</item>
		<item>
		<title>Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</title>
		<link>https://cybersecuritynews.com/email-borne-worm-surge-drives-new-threat/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 16:04:49 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147821</guid>

					<description><![CDATA[<p>A global wave of email-borne worms hit industrial control systems (ICS) in the fourth quarter of 2025, marking one of the most concerning threat shifts seen across operational technology (OT) environments in recent years. The surge was largely tied to a single piece of malware that silently spread through phishing emails, reaching ICS networks in [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/email-borne-worm-surge-drives-new-threat/">Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A global wave of email-borne worms hit industrial control systems (ICS) in the fourth quarter of 2025, marking one of the most concerning threat shifts seen across operational technology (OT) environments in recent years. </p>



<p>The surge was largely tied to a single piece of malware that silently spread through phishing emails, reaching ICS networks in every region of the world within just two months.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>At the center of this threat wave is a backdoor worm known as Backdoor.MSIL.XWorm, a malware built to settle into infected systems and hand attackers full remote control over compromised machines. </p>



<p>What makes this outbreak particularly alarming is that this threat had no presence on ICS computers in the previous quarter, yet it appeared across all global regions in Q4 2025, representing a sudden and widespread jump. </p>



<p>The overall percentage of ICS computers on which worms were blocked rose by 1.6 times to 1.60% during this period, a sharp uptick driven almost entirely by this single campaign.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://securelist.com/industrial-threat-report-q4-2025/119392/" id="https://securelist.com/industrial-threat-report-q4-2025/119392/" target="_blank" rel="noreferrer noopener nofollow">Securelist analysts identified that the active spread of Backdoor.MSIL.XWorm</a> through phishing emails was closely tied to a specific malware obfuscation technique that threat actors used heavily during mass phishing campaigns throughout Q4 2025. </p>



<p>These campaigns, known since 2024 under the name &#8220;Curriculum-vitae-catalina,&#8221; relied on a deceptively simple but effective trick. </p>



<p>Attackers sent emails to HR managers, recruiters, and employees involved in hiring decisions, disguising malicious messages as job applications with subject lines such as &#8220;Resume&#8221; or &#8220;Attached Resume.&#8221; </p>



<p>The emails carried a malicious executable file presented as a curriculum vitae, typically named Curriculum Vitae-Catalina.exe, which infected the system the moment it was opened.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>The infection did not unfold all at once. In Q4 2025, the threat rolled out in two distinct waves. The first hit in October, targeting Russia, Western Europe, South America, and North America, specifically Canada. </p>



<p>A second spike followed in November, spreading to additional regions before the campaign finally slowed in December. </p>



<p>The highest infection rates were recorded in Southern Europe, South America, and the Middle East, which are regions where ICS computers have historically faced elevated risks from email-based threats. </p>



<p>In Africa, the worm also found a different path in through removable storage devices, reflecting how diverse the spread vectors became.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>Regionally, the percentage of ICS computers with blocked malicious objects ranged from 8.5% in Northern Europe to 27.3% in Africa in Q4 2025, showing just how wide the gap in exposure levels remains across the globe. </p>



<p>The oil and gas sector stood out as the only industry to see an increase in blocked threats during this period, particularly in Russia and Central Asia. </p>



<p>While the broader trend across all surveyed industries has been a gradual decline over multiple years, the worm-driven spike in Q4 2025 served as a clear reminder that email remains a powerful entry point into even the most sensitive industrial environments.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="inside-the-infection-mechanism"><strong>Inside the Infection Mechanism</strong></h2>



<p>The way Backdoor.MSIL.XWorm operates reveals a calculated approach to gaining and holding access inside industrial networks. </p>



<p>When a target opens the fake resume file, the malware quietly executes in the background, establishing persistence on the system so it survives reboots and routine maintenance. </p>



<p>From that point, it opens a channel for remote control, allowing attackers to monitor activity, move through the network, and potentially interfere with operational technology processes.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p>The <a href="https://cybersecuritynews.com/obfuscation-techniques-to-evade-anti-virus-detection/" id="76015" target="_blank" rel="noreferrer noopener">obfuscation techniques</a> used during the &#8220;Curriculum-vitae-catalina&#8221; campaigns helped the worm slip past standard detection tools by disguising its true behavior inside layered scripts and encoded payloads. </p>



<p>This is why the malware went undetected on ICS computers in Q3 2025, only to surge dramatically the very next quarter. </p>



<p>Southern Europe recorded the steepest increase, with worm-blocking activity rising by 2.16 times, largely because that region already had the highest rate of email-sourced threats among ICS environments globally.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC0n4n1n04TAmQoPPriFRhJVszSgjFUFC7CUkWL0-TiMm9Prdw10WxetG2AQFsSokaP0y-8tdzzA5EAU-oEctvQ-vF9xHy0ZG-Sc55aLF6O7yF6OLHp3aaxyeBDi8vPIyfCkoh1cRdR5VqR21AMKBBY5WQaZmnmxP_zaqxheclJyWVPwq52Kzr5bO2BqI/s16000/Changes%20in%20Percentage%20of%20ICS%20Computers%20on%20Which%20Malicious%20Objects%20Were%20Blocked,%20Q4%202025%20(Source%20-%20Securelist).webp" alt="Changes in Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q4 2025 (Source - Securelist)" /><figcaption class="wp-element-caption">Changes in Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q4 2025 (Source &#8211; Securelist)</figcaption></figure>
</div>


<p><a href="https://cybersecuritynews.com/security-teams-shrink-as-automation-rises/" id="100650" target="_blank" rel="noreferrer noopener">Security teams</a> managing ICS or OT environments should treat any unsolicited email with an executable attachment as a serious risk, even when those emails appear to come from genuine job seekers. </p>



<p>Organizations are advised to enforce strict email filtering policies that block executable attachments before they reach end users. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7SJoaKO6jZpa0Fi8oPF2Xbt4rRhK7yuUGWXP0fdkNZlFJ5AP_JWTJMLUxnz8GcrRu3BJ0zP75iB3o1c0ckeD4LrNdXx1hLTFMGHPUdjEYsEOzj6JrRIyPg7AOfFC95scSpFqpSlgOveCXYa_jvrleQjELKdqGqqL3gGCxS_Cd1XdaSAYL1ucej526wow/s16000/Percentage%20of%20ICS%20Computers%20on%20Which%20Malicious%20Objects%20Were%20Blocked,%20Q1%202023%20to%20Q4%202025%20(Source%20-%20Securelist).webp" alt="Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q1 2023 to Q4 2025 (Source - Securelist)" /><figcaption class="wp-element-caption">Percentage of ICS Computers on Which Malicious Objects Were Blocked, Q1 2023 to Q4 2025 (Source &#8211; Securelist)</figcaption></figure>
</div>


<p>Employees in HR roles and anyone with access to OT-adjacent systems should receive focused training on identifying phishing attempts that mimic hiring communications. </p>



<p>Removable media policies should also be tightened, particularly in regions like Africa where USB-based infection proved to be an active vector during this campaign. </p>



<p>Keeping ICS endpoints updated and running behavior-based <a href="https://cybersecuritynews.com/best-fraud-detection-tools/" id="13681" target="_blank" rel="noreferrer noopener">detection tools</a> is essential to catching threats like XWorm that are specifically designed to evade signature-based defenses.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/14b547b5-0804-44de-9ffa-93ce51a1243a/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.pdf?AWSAccessKeyId=ASIA2F3EMEYE7UQM3OQW&amp;Signature=ktVIFj%2FPqYoqBdpJTsfi4k1z%2BRo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBAaCXVzLWVhc3QtMSJIMEYCIQDiIvN4RDw0iSb7z7UN4t9pArUFtwWbw%2Bs2Wc5w6AtcXAIhAMNS7sqvwwwjzAUvUUIy%2BXAokvKfhVbVY1rjAXAAPYW4KvwECNn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1IgyPULJp0ZuC90iG%2FMYq0AQThWy92LUn9nY8FcbeFHCD8hQrU17reJm9d50KmHkJ7f3g6u9sFpkLNPkA9qD9LUwzsbX94e8%2FH6eC2Nu%2BMZ0bcJqu1RwoFSNAJhrZ7tmKWhc98QnTJPZOFm7XuZBWzeUrfQuti3G3RfidYZ8jP%2B%2BLh%2Bh1kAImM8%2FhNzcYV8TVqMk%2Bwl69VwuTqmXQFzkp0JxwlJc7aZ8dv9qYXA8f8HC%2BsiFFSibPhgxi7nIYZiN01VoDOIqYr08hgyaCyi0n8Ax%2FiT8%2BkrZTuqcFLp3Vwx1XOt9Ei8S%2BaSGKgFX9yz%2Fex2FuS4I%2BHHr%2FtY%2FnOQuWrwuD%2FRACQXEh%2FlnBtlb0l5Gr5Mwl6hTyKu1sKWIm%2BHFYSjTw2NYXNm6JNQ3Bq0d8GFRk4c8FRrUbt1KioPpZl0oVY8qCTL7Ac%2Bmr5aZkXQzD9tJDb8%2FB95cY5blKYykjPa%2FN30mpEuJFNgBBvukU1tLsmgR2I02JZ8cqE7poPoCxNbFYU4m8OSOlGMc%2FHlHq93wjEcHLkuqaUs3x10lmart%2Bip6ZoJADe2KND7VVkiIVah3dQIrgqzrfPtZnlIoTKVLuq%2F0xI0lLpmankBGRITkp3t7QX7OdAd8i%2FRCp19lQvV%2FJEYWuAnMQ0omNiTK6racv6dCCt5yVVBGblJBLdMifgU2kDiJjsTPkyaba7dUd0ANkVtFzaUAhkFRyykJn24AiiAQatAlQZ6UrVFOCs%2BCY0Vbw7zBot%2ByFh8XHa%2B5q4f6yZ%2B7IbLWsvCyEMaCl1UiG%2FQdQxyyvaIDuVgw6kG4ZMKSgic8GOpcBQNhsYjINdtvc0sk32Inra%2Fd0SgIB6BlyjY0grHyPGcPeWePz2dBgppIab%2BpyXWD3gVIgyt5OSszGqQJmRHFZYkYo32J1MAzVrlyUErxSKajHO4dTxvdYoH553%2BK5poG21CC8SpwhcQUALYlt2074y2Ih8wQFAcm4rylruIr64kYppi39lA7laxLYa%2FRyuFD0an3zkdZGOg%3D%3D&amp;Expires=1776440998" target="_blank" rel="noreferrer noopener"></a></p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/email-borne-worm-surge-drives-new-threat/">Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147821</post-id>	</item>
		<item>
		<title>Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</title>
		<link>https://cybersecuritynews.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 15:17:57 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147814</guid>

					<description><![CDATA[<p>A North Korean threat actor known as Sapphire Sleet has launched a new campaign against macOS users, using a fake Zoom SDK update to trick victims into running malicious files that steal passwords, cryptocurrency assets, and personal data. Unlike attacks that exploit software flaws, this campaign relies entirely on social engineering, manipulating people rather than [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware/">Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A North Korean threat actor known as Sapphire Sleet has launched a new campaign against macOS users, using a fake Zoom SDK update to trick victims into running malicious files that steal passwords, cryptocurrency assets, and personal data. </p>



<p>Unlike attacks that exploit software flaws, this campaign relies entirely on social engineering, manipulating people rather than bypassing technical defenses.</p>



<p>The attack begins with a convincing story. Sapphire Sleet poses as a job recruiter on professional networking platforms, builds trust through career conversations, and schedules a fake technical interview. </p>



<p>At a critical point, the victim is directed to download a file called &#8220;Zoom SDK Update.scpt,&#8221; a compiled AppleScript that opens in the macOS Script Editor app. </p>



<p>Since the Script Editor is a trusted, Apple-built application, macOS raises no flags, and the user sees routine upgrade instructions while thousands of blank lines below conceal malicious code ready to execute.</p>



<p><a href="https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/" id="https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/" target="_blank" rel="noreferrer noopener nofollow">Microsoft Threat Intelligence analysts identified this campaign</a> and noted that the specific combination of execution patterns, including the use of AppleScript as a dedicated credential-harvesting component, had not been previously observed from Sapphire Sleet. </p>



<p>After discovering the activity, Microsoft shared findings with Apple through responsible disclosure, and Apple has since deployed XProtect signature updates and Safe Browsing protections in Safari to detect and block infrastructure linked to this campaign.</p>



<p>Sapphire Sleet primarily targets individuals and organizations in cryptocurrency, finance, venture capital, and blockchain sectors. </p>



<p>Once active, the malware harvests the victim&#8217;s login password, steals Telegram session data, browser credentials, <a href="https://cybersecuritynews.com/crypto-casinos-cybersecurity-protecting-your-wallet/" id="137197" target="_blank" rel="noreferrer noopener">crypto wallet</a> keys from applications like Ledger Live and Exodus, SSH keys, and macOS keychain databases. </p>



<p>All stolen data is compressed and uploaded silently to attacker-controlled servers over port 8443.</p>



<p>The malware bypasses macOS security layers including Gatekeeper and Transparency Consent and Control. </p>



<p>By convincing the user to manually run the file, Sapphire Sleet shifts execution into a user-initiated context where these protections no longer apply, placing behavioral awareness at the center of any meaningful defense.</p>



<h2 class="wp-block-heading" id="inside-the-infection-chain"><strong>Inside the Infection Chain</strong></h2>



<p>Once the victim opens the lure file, the attack moves through a fast chain of commands. </p>



<p>The script invokes the legitimate macOS &#8220;softwareupdate&#8221; binary with an invalid parameter to mimic a real system process, then uses &#8220;curl&#8221; to fetch a remote AppleScript payload and pass it directly to the &#8220;osascript&#8221; interpreter. </p>



<p>This pattern repeats across five stages, each tracked by user-agent strings mac-cur1 through mac-cur5, allowing Sapphire Sleet to manage payload delivery and <a href="https://cybersecuritynews.com/new-spam-campaign-abuses-remote-monitoring-tools/" id="104997" target="_blank" rel="noreferrer noopener">monitor campaign</a> progress.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhVpubDbMIRhZhylMIn-YeJsUSdbz3ME3Y5l8X6h2MJWV4oIFaHOvw39neahVZf4erWyHJ1GmPT7IaERurG8jDZ9ugmzp2-1UdOf-b8kkfoSg1EqycUkuTtNMR2gdXqxLnMNwMPgJ5oipCVrUA4tVQ-e5NWtjRK4Ba9QcSMFy7lj5BYCW8FB1VlIueUcM/s16000/Process%20tree%20showing%20cascading%20execution%20from%20Script%20Editor%20(Source%20-%20Microsoft).webp" alt="Process tree showing cascading execution from Script Editor (Source - Microsoft)" /><figcaption class="wp-element-caption">Process tree showing cascading execution from Script Editor (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>The mac-cur1 stage acts as the orchestrator, collecting system details, registering the infected machine with Sapphire Sleet&#8217;s command-and-control servers, and deploying a host monitoring binary called &#8220;com.apple.cli.&#8221; </p>



<p>A backdoor named &#8220;services&#8221; simultaneously installs a launch daemon called &#8220;com.google.webkit.service.plist,&#8221; named to closely mimic legitimate Apple and Google services so it persists across reboots without drawing attention.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEEfLSeP68eQa3BmusIFZO2LqSN4Y4Wmi8MQ_cxPv2vX4rPBEVMCgH2CTHdtJ2etMLNKZNsxYCbLn0c3I82PgKAVQT1BoVLXBVdPL3wfZ3z0t73CVGxrSqp-ETbht7aZMBw1_Ujl_UJNiuV4xEFhMI_WNBKY_gyK6dFmvuXxJJDeqYJs-nFVv7zHiDfhQ/s16000/The%20AppleScript%20lure%20with%20decoy%20content%20and%20payload%20execution%20(Source%20-%20Microsoft).webp" alt="The AppleScript lure with decoy content and payload execution (Source - Microsoft)" /><figcaption class="wp-element-caption">The AppleScript lure with decoy content and payload execution (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>The mac-cur2 stage delivers the credential harvester, &#8220;systemupdate.app,&#8221; which displays a native password dialog identical to a real system prompt. </p>



<p>When the user enters their password, the malware validates it against the local authentication database and immediately sends it to Sapphire Sleet via the Telegram Bot API. </p>



<p>A second fake application named &#8220;softwareupdate.app&#8221; then displays a &#8220;system update complete&#8221; message so the victim has no reason to grow suspicious.</p>



<p>To reach protected data, the mac-cur3 stage manipulates the TCC database by directing Finder to rename the TCC folder temporarily, allowing the malware to insert permissions that let osascript access sensitive files without triggering a consent prompt. </p>



<p>A 575-line exfiltration script then collects nine categories of data and uploads them to attacker servers.</p>



<p>Users and organizations should treat any unsolicited request to run terminal commands during an online interview as a clear warning sign. </p>



<p>Blocking compiled AppleScript (.scpt) files, auditing LaunchDaemon plist files for unexpected entries, and monitoring the TCC database for unauthorized changes are all effective defensive steps. </p>



<p>Keeping macOS updated ensures Apple&#8217;s latest XProtect signatures and Safari <a href="https://cybersecuritynews.com/google-chromes-enhanced-safe-browsing/" id="6251" target="_blank" rel="noreferrer noopener">Safe Browsing protections</a> remain active to block known components of this campaign.<a href="https://ppl-ai-file-upload.s3.us-east-1.amazonaws.com/web/direct-files/attachments/11146061/809986b5-ebac-48c0-acc4-dc4b46b9ca28/Fake-Zoom-SDK-Update-Delivers-Sapphire-Sleet-Malware-in-New-macOS-Intrusion-Chain.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Checksum-Mode=ENABLED&amp;X-Amz-Credential=ASIA2F3EMEYE7OS5TBAY%2F20260417%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260417T145413Z&amp;X-Amz-Expires=3600&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEA8aCXVzLWVhc3QtMSJGMEQCIEwADyW77DjUTOhSX285qnNShYVLKe6cEyD3biWq3fT%2BAiBOw68zlp1UJxRkIDmi2xbBA%2FssZ6d0VgLicT79J5sHyyr0BAjY%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMZkLyGCSiK9aKsZVfKsgEpsBBRKcfhGOtToRBkizyLHHHcr6Gzv0G2sMlVX%2BqUT506QlQHT0IOqWGUBFPYu328gXYdrrd2oMTcr2JQ7%2B4yzfEz7cI3jBT8LuV8Z6k2QOl0f1%2Blz3EaL6%2B2RN7mPFwSZSM1dWusWTF4jA5DLSNe5hTTfs780pin%2FuuLNNyrX3AOu%2BGGJnWdGW5Rys72dDPhDQbc3cikYfTwfmGNfS61hX12664jZ%2BJWyLJ4QTgLnen3VHS%2Fu4UJL%2BGYvEHvZNXpMnVzOsyiHp69DSyeZLMxQ1KMtTCJ2BusoFdXYfG44aunm%2F1XbQbri7W%2BmZfxDi%2Bj2lmi4sFVwY6lOmZ65N9cqc%2BHKLx0uq4g5DQ9q5uX9Yh8bRgE%2FhotWqF3%2Bgyuh0xpj7GceZqKW%2FGZn%2BikZNsKIiTDvpPFDOLURoEoQGrg6z7sXff9ryDSvSi2yANmTpva8LtHrIVXmn4D9kQqo%2FjeXtXmi8O2EVDiwmvGrNpG4El5hCX1zcsfV1P1rhSj76v1ssMoiJtSYsG%2B%2FUhxOvjb3a6Lrrq9t9j4Z6llxQkjxn2p64yTn0yuwWzl19zUBrpTUYkTx5XIIA6HnqEwfzUnN8j3xf%2BMMYx7bDb4YuIHd8ei7HCdQK%2BE5RR4I72agbcS55G0k5y5XbYLSGrMrowbHgDjlg6gLzHGOxbvM9XZK%2Fw9spOMxJsL2njxCdSpiidPkqUHoyQvgr0qJmKwW3XTOCLGIRaSUF4Sw%2BgQ9ybOhQZWm1kZZD9R0FSwWlxtOMhlZCuhgkmRNgwrY6JzwY6mQG2eM5M%2B%2BcGnFpBZPEwm%2B2ma3y0JCqymQkpQ1DZtC4MHrc8rruF5y2x04Oz%2FoegAIpNKGGvDPqyhWZme48BGqywbu1v5yuf%2FGoyGvkHrsWVmKfXgIxapMCwo5dB3DUmEIzPxSaJsQnKafo9ryukZPsDEGu9LTna%2F31UJGEhJeLvzHQmcEfzfoGtsdoaXZ6fWcrciGF%2BQNdeFHg%3D&amp;X-Amz-SignedHeaders=host&amp;x-id=GetObject&amp;X-Amz-Signature=62dd8fda490fb83aaf4e4e4592c2755a610de88219c171a57a06eab126b300c8" target="_blank" rel="noreferrer noopener"></a></p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware/">Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Fake-Zoom-SDK-Update-Delivers-Sapphire-Sleet-Malware-in-New-macOS-Intrusion-Chain.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147814</post-id>	</item>
		<item>
		<title>Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</title>
		<link>https://cybersecuritynews.com/attackers-spread-blockchain-based-backdoor-via-hugging-face/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 14:14:00 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147798</guid>

					<description><![CDATA[<p>A critical vulnerability in the marimo Python notebook platform is now being actively used by attackers to deploy a blockchain-powered backdoor on developer systems. The flaw, tracked as CVE-2026-39987, allows remote code execution without authentication, making it a dangerous entry point for threat actors leveraging it to install a new variant of the NKAbuse malware [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/attackers-spread-blockchain-based-backdoor-via-hugging-face/">Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in the marimo Python notebook platform is now being actively used by attackers to deploy a blockchain-powered backdoor on developer systems. </p>



<p>The flaw, tracked as CVE-2026-39987, allows remote code execution without authentication, making it a dangerous entry point for threat actors leveraging it to install a new variant of the NKAbuse malware through a fake Hugging Face Space.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The advisory, identified as GHSA-2679-6mx9-h9xc, was published on GitHub on April 8, 2026. Within just 9 hours and 41 minutes, the first active exploitation was recorded. </p>



<p>From April 11 to April 14, 2026, attackers from 11 unique IP addresses across 10 countries launched 662 exploit events against exposed marimo instances. </p>



<p>What began as early scanning quickly escalated into a full-scale, multi-actor campaign targeting AI developer workstations.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://www.sysdig.com/blog/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface" id="https://www.sysdig.com/blog/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface" target="_blank" rel="noreferrer noopener nofollow">Researchers at the Sysdig TRT identified and documented these attacks</a> as they unfolded, noting four distinct post-exploitation patterns: credential harvesting, reverse shell attempts, DNS-based data exfiltration, and deployment of a previously undocumented NKAbuse variant. </p>



<p>The speed of weaponization confirmed that multiple threat actors were independently targeting the same vulnerability within days of its public disclosure.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The most alarming finding was the deployment of a Go-based backdoor named kagent through a typosquatted Hugging Face Space called vsccode-modetx, built to mimic a legitimate <a href="https://cybersecuritynews.com/trojanized-openvsx-extension-spreads-glassworm/" id="147077" target="_blank" rel="noreferrer noopener">VS Code tool</a>. </p>



<p>Using a simple curl command against a marimo endpoint, the attacker pulled and executed a shell dropper that downloaded the kagent binary to the victim system. </p>



<p>The Hugging Face domain carried zero malicious flags across 16 reputation sources at the time, allowing the payload to bypass standard security filters without raising any alarms.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attack impact extended beyond a single compromised notebook. Attackers quickly pivoted from exploiting marimo to accessing connected PostgreSQL databases and Redis instances using credentials pulled from environment variables. </p>



<p>One operator extracted AWS access keys, database connection strings, and OpenAI API tokens, demonstrating that one exposed marimo instance could open a foothold into broader cloud infrastructure.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="nkabuse-variant-and-persistence-tactics"><strong>NKAbuse Variant and Persistence Tactics</strong></h2>



<p>The kagent binary is a stripped, UPX-packed Go ELF file that unpacks from 4.3 MB to 15.5 MB and communicates with a command-and-control server over the NKN blockchain network. </p>



<p> the NKN protocol uses decentralized relay nodes, there is no single IP address or domain to block, and C2 traffic blends with normal blockchain activity, making detection difficult with <a href="https://cybersecuritynews.com/ransomware-actors-blending-legitimate-tools/" id="121805" target="_blank" rel="noreferrer noopener">conventional tools</a>.</p>



<p>The dropper script establishes persistence using three sequential methods: first creating a systemd user service at ~/.config/systemd/user/kagent.service, then adding a crontab @reboot entry, and finally installing a macOS LaunchAgent at ~/Library/LaunchAgents/com.kagent.plist. </p>



<p>All output is silently redirected to ~/.kagent/install.log, hiding activity from standard process monitoring. Defenders must check all three locations to fully remove the implant.</p>



<p>Compared to the original NKAbuse from December 2023, this 2026 variant targets AI developer tooling using a brand-new vulnerability, uses Hugging Face for delivery, and disguises the binary as a legitimate Kubernetes agent named kagent, where the original exploited a six-year-old Apache Struts flaw against Linux desktops and <a href="https://cybersecuritynews.com/securing-iot-devices-3/" id="108816" target="_blank" rel="noreferrer noopener">IoT devices</a>.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></p>



<p>The Sysdig TRT shared the following steps for defenders:<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893"></a></p>



<ul class="wp-block-list">
<li>Update marimo to version 0.23.0 or later immediately, as the vulnerability requires no authentication and is actively targeted.</li>



<li>Hunt for the ~/.kagent/ directory, the kagent.service systemd entry, and any running kagent process on systems that ran marimo.</li>



<li>Block vsccode-modetx.hf.space at the proxy or DNS level to stop the known payload delivery URL.</li>



<li>Rotate all credentials on exposed marimo instances, focusing on DATABASE_URL, AWS keys, and API tokens stored in environment variables.</li>



<li>Monitor network traffic for NKN blockchain relay patterns that indicate active C2 communication from an infected host.</li>



<li>Audit Hugging Face Spaces and AI/ML dependencies, and restrict access to verified publishers only.</li>



<li>Deploy runtime behavioral detection, as signature-based tools cannot catch zero-detection malware hosted on trusted platforms.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/a21c9e67-21d0-433f-99fc-9febf6ba175d/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.pdf?AWSAccessKeyId=ASIA2F3EMEYEZCFFAI3O&amp;Signature=bxafNbkOLloZiTZ1qNQFJ17Rii0%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJIMEYCIQD20kmYWDN7Qpa490%2FPlB0DnA3QqR83Eh4%2BasfeUNdX7wIhAMHrUi9W71Hj%2BYTiORPoChhpRqSTWtbAuzCrf7rks6%2BhKvwECNb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEQARoMNjk5NzUzMzA5NzA1Igy%2F0VkTWbbM7pDz1Zoq0ARJY%2BKhmmsaf6TAjLK1az7Nqgcvq%2FQlTbLxO%2Fs7j6LOQ2gvGX0ws%2FSIkNrSQxZKqzSGIiZvCzn9amch4WzPIqrY8pQ2RUD4jk%2FZWjFGu2pt6IQLBAyPaWVpASOr26gYfBAJFnYgU2SRB0yNG5k97ZdERm9l0fnu28UQo9YJIh7IPVmtnNqUD%2BBG6wWQWSQhbEGSaUSV2uPnkD29q0EkQKfT52sEMyOu6LElfdXDbCI3qtTu7H8LxJ30bZ546RPVsmDUsuDxvV5nGY8p3FqEMTDBnIr%2F2pHkBj4qj0F26NQ87RQeQmg1VW9U3pHZw2Mk%2BJV1WqDyeTlOMyg1hcUj%2FfqfDPM1hdYQqZd2cmOUzB%2BubesMkTlE6FUFskwBH9BJeTwfv5PTmvDIGlMlCxjLUIWMPcAnjvmzdTgjL2Sj1ovIoZ9xdtxi%2BXRTOAGr%2BDlp6MwWagTWEYr1gtuUuc%2Bp167nQtUxTR1GhC8qtZBaLu4OabFA3DQnxUSlheOirUmtl%2Bu11B8diggcoj2VwTXMJJQECNagyuER2svL4tBdZuaPQXQi0TYoTFfP9kvhxDIvWYf5rrOVcBgb%2F0lu8oAHlzCqmhsBSkCAIiZ0iRgb6vL8Zv9ggjRnzq2awDaY3HV0juWLFANQQYYKP0AW9ASb%2FZNNzvn3RMJq61eZmuQUnOuAxh8tL9wzJjwNCdQsWxIN%2FiaJKA58pYvRJFqfO88Lyc42Lm9lxkzS9jo3v1hJJKnReuntfReDUW5F832Yf3zaCBwJYaK4THpZqsgrbr5bimPwMIPciM8GOpcB9saSWhTwKqYNQ334zvepdxj8%2BN5bEZ7CqaSfTDp1vxskrynNg1cS36RH3qSI8DlnNCHs4odvI9sYH3nT48j8oUl9jQRMBTT9Gx1yXMvvEdz36MksBYWHYsQGvEjJQwXLBAgW7Xho4PMRgtuI10yRkNZUlyHYCmpHUSytuhjMyz6MMOKuh5KAkEtSIE3XU8e0NLVdAQrKFg%3D%3D&amp;Expires=1776433893" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/attackers-spread-blockchain-based-backdoor-via-hugging-face/">Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147798</post-id>	</item>
		<item>
		<title>Fake Ledger Hardware Wallets on Chinese Marketplaces Steal Crypto Seeds and PINs</title>
		<link>https://cybersecuritynews.com/fake-ledger-hardware-wallets/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 14:07:45 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147800</guid>

					<description><![CDATA[<p>A Brazilian cybersecurity researcher has exposed a sophisticated, large-scale supply chain scam involving counterfeit Ledger Nano S Plus hardware wallets sold through a Chinese marketplace, devices engineered from the ground up to silently drain cryptocurrency across roughly 20 blockchains. The findings, posted to Reddit by user u/Past_Computer2901, have sent shockwaves through the crypto security community, [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/fake-ledger-hardware-wallets/">Fake Ledger Hardware Wallets on Chinese Marketplaces Steal Crypto Seeds and PINs</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A Brazilian cybersecurity researcher has exposed a sophisticated, large-scale supply chain scam involving counterfeit Ledger Nano S Plus hardware wallets sold through a Chinese marketplace, devices engineered from the ground up to silently drain cryptocurrency across roughly 20 blockchains.</p>



<p>The findings, posted to Reddit by user<a href="https://www.reddit.com/user/Past_Computer2901/" target="_blank" rel="noreferrer noopener"> u/Past_Computer2901</a>, have sent shockwaves through the crypto security community, revealing a highly coordinated operation that combines tampered hardware, trojanized software, and cross-platform malware deployment into a single unified phishing pipeline.<a href="https://www.cryptotimes.io/2026/04/17/counterfeit-ledger-wallet-scam-traced-to-chinese-marketplace/" target="_blank" rel="noreferrer noopener"></a></p>



<p>The researcher purchased the device at a price matching the official Ledger store, with packaging and product listings that appeared authentic at a glance. Suspicion arose only after the device failed Ledger&#8217;s built-in Genuine Check when connected to a legitimately installed copy of Ledger Live — prompting a full physical teardown.</p>



<p>Inside the shell, the deception became undeniable. The original secure element chip had been replaced with an ESP32-S3 microcontroller, a generic IoT component manufactured by Shanghai-based Espressif Systems, a chip with no business being inside a hardware security device.</p>



<p>The chip markings had been physically scraped off to prevent identification, and the device contained a WiFi/Bluetooth antenna entirely absent in genuine Ledger Nano S Plus units. During boot mode, the chip initially spoofed itself as a legitimate Ledger product, but once the boot sequence completed, it betrayed its true identity: Espressif Systems.</p>



<p>A full firmware dump confirmed the most alarming finding: every PIN entered, and seed phrase generated on the device was stored in plaintext and transmitted to attacker-controlled <a href="https://cybersecuritynews.com/command-and-controlc2-server/" target="_blank" rel="noreferrer noopener">command-and-control (C2) servers</a>, including the domain <code>kkkhhhnnn[.]com</code>.</p>



<p>The fake firmware was labeled &#8220;Nano S+ V2.1&#8221; — a version that does not exist in Ledger&#8217;s official firmware lineup — effectively impersonating a product release to instill false confidence. The operation was designed to drain wallets across approximately 20 different blockchain networks simultaneously.</p>



<p>The counterfeit device shipped with a QR code inside the box, not directing buyers to <code>ledger.com</code>, but to a cloned phishing website where they would download a trojanized version of the Ledger Live app.</p>



<p>The fake app contained a hardcoded &#8220;Genuine Check&#8221; that always returned a success screen, meaning first-time crypto users would never receive any warning that their device was compromised. The malicious app was not properly signed and silently exfiltrated wallet data the moment it was used.</p>



<p>The scope of the operation extends far beyond a single fake app. The threat actors behind this campaign have deployed malware across Android, Windows, macOS, and iOS, with the iOS variant distributed through Apple&#8217;s TestFlight program to entirely bypass App Store review requirements.</p>



<p>Infrastructure analysis revealed three C2 servers, a cloned website, and a <a href="https://cybersecuritynews.com/qr-codes-used-to-spread-phishing-attacks/" target="_blank" rel="noreferrer noopener">QR code redirect</a> chain all registered under a shell company based in Shanghai.</p>



<p>Critically, the researcher clarified that Ledger&#8217;s official cryptographic Genuine Check does successfully detect this counterfeit device, but only when using the real Ledger Live downloaded from <code>ledger.com</code>.</p>



<p>The scam&#8217;s effectiveness hinges entirely on ensuring the victim never interacts with the legitimate application. The researcher has submitted a full technical report to Ledger&#8217;s security team, and a deeper analysis is expected following their review.<a href="https://www.cryptotimes.io/2026/04/17/counterfeit-ledger-wallet-scam-traced-to-chinese-marketplace/" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="how-to-stay-protected"><strong>How to Stay Protected</strong></h2>



<ul class="wp-block-list">
<li>Buy only from Ledger&#8217;s official website (ledger.com) or verified authorized resellers never from third-party Chinese marketplaces or auction sites<a href="https://www.reddit.com/r/ledgerwallet/comments/1sm9w6z/supply_chain_alert_analyzing_a_highly/" target="_blank" rel="noreferrer noopener"></a></li>



<li>Download Ledger Live exclusively from ledger.com — never scan QR codes from inside the box to obtain software<a href="https://www.reddit.com/r/ledgerwallet/comments/1sm9w6z/supply_chain_alert_analyzing_a_highly/" target="_blank" rel="noreferrer noopener"></a></li>



<li>Run the Genuine Check immediately upon first connecting any hardware wallet<a href="https://www.mexc.co/news/1033580" target="_blank" rel="noreferrer noopener"></a></li>



<li>Treat any firmware version not listed on Ledger&#8217;s official changelog as a red flag.<a href="https://www.binance.com/en/square/post/313309842106322" target="_blank" rel="noreferrer noopener"></a></li>



<li>Report suspicious devices to Ledger&#8217;s security team at security@ledger.fr.<a href="https://www.ledger.com/phishing-campaigns-status" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<p>This incident marks one of the most technically sophisticated hardware wallet supply chain attacks documented to date, with confirmed financial losses from the fake app component alone surpassing $9.5 million across more than 50 victims.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/fake-ledger-hardware-wallets/">Fake Ledger Hardware Wallets on Chinese Marketplaces Steal Crypto Seeds and PINs</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Fake-Ledger-Hardware-Wallets-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147800</post-id>	</item>
		<item>
		<title>Anthropic Releases Claude Opus 4.7 with Automated Real-Time Cybersecurity Safeguards</title>
		<link>https://cybersecuritynews.com/anthropic-releases-claude-opus-4-7/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 13:28:15 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147746</guid>

					<description><![CDATA[<p>Anthropic has launched Claude Opus 4.7, its latest flagship model, combining improved coding and vision capabilities with automated real-time safeguards to detect and block high-risk cybersecurity requests. The release is notable because Anthropic is testing these protections on a broadly available model before considering wider access to its more powerful Mythos-class systems. According to Anthropic, [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/anthropic-releases-claude-opus-4-7/">Anthropic Releases Claude Opus 4.7 with Automated Real-Time Cybersecurity Safeguards</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Anthropic has launched Claude Opus 4.7, its latest flagship model, combining improved coding and vision capabilities with automated real-time safeguards to detect and block high-risk cybersecurity requests.</p>



<p>The release is notable because Anthropic is testing these protections on a broadly available model before considering <a href="https://cybersecuritynews.com/anthropic-claude-mythos/" target="_blank" rel="noreferrer noopener">wider access to its more powerful Mythos-class systems.</a></p>



<p>According to Anthropic, Opus 4.7 performs better than Opus 4.6 on difficult coding tasks, follows instructions more precisely, and can verify parts of its own work before responding.</p>



<h2 class="wp-block-heading" id="h-what-s-new-in-the-latest-update"><strong>What’s New in the Latest Update</strong></h2>



<p>The company also says the model has stronger vision capabilities, supporting images up to 2,576 pixels on the long edge, which can help with detailed screenshot analysis, diagram reading, and document understanding.</p>



<p>The cybersecurity angle is what makes this launch especially important.</p>



<p><strong>Core Upgrades:</strong> Better coding (+10–15%), precise instructions, improved long-task reliability, self-checking, and stronger memory.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_fvtKCNQo6_KlKtXOrs9TWSYuqvxwnGpdUVGoAYnegc4VVoMZ9YNXz8loLgRsrkSfGOf3Aij8ZrR01KpOcvnc4jZjzT6YC7zv6cQ9dXQnL5ItimS_2LBu2cdeRvocVZBOrms9T4SC11DCrodTQvQAQNpnoZtqMzC9FkDmZHjSiRjZ9yAfIifd6LPnZXY/s1600/Screenshot%202026-04-17%20152405%20%281%29.webp" alt="Claude Opus 4.7 with Advanced Problem-Solving skills (Source: Anthropic)"/><figcaption class="wp-element-caption"><em>Claude Opus 4.7 with Advanced Problem-Solving skills (Source: Anthropic)</em></figcaption></figure>



<p><strong>Vision:</strong> Higher-res images,<a href="https://cybersecuritynews.com/hackers-abuse-msbuild-lolbin/" target="_blank" rel="noreferrer noopener"> improved UI/diagram reading</a>, 98.5% visual accuracy.</p>



<p><strong>Security:</strong> Real-time threat blocking, verification program, advanced safeguards.</p>



<p><strong>Developer Features:</strong> <code>xhigh</code> mode, task budgets, improved tokenizer, 1-hour cache.</p>



<p><strong>Claude Code:</strong><code> /ultrareview</code>, fullscreen TUI, auto mode, xhigh default.</p>



<p><strong>Availability &amp; Pricing:</strong> Same pricing, available across major platforms.</p>



<p>Anthropic said Opus 4.7 includes safeguards that automatically detect and block prompts linked to prohibited or high-risk cyber activity.</p>



<p>At the same time, the company is inviting legitimate security researchers, red-teamers, <span style="box-sizing: border-box; margin: 0px; padding: 0px;">and<a href="https://cybersecuritynews.com/top-10-gpt-tools/" target="_blank"> penetration</a></span><a href="https://cybersecuritynews.com/top-10-gpt-tools/" target="_blank" rel="noreferrer noopener"> testers to apply for a new Cyber Verification Program</a> so they can use the model for approved security work with fewer restrictions.</p>



<p>This rollout follows Anthropic’s <span style="box-sizing: border-box; margin: 0px; padding: 0px;">recent<a href="https://cybersecuritynews.com/aws-and-anthropic-ai-powered-cybersecurity/" target="_blank"> Project</a></span><a href="https://cybersecuritynews.com/aws-and-anthropic-ai-powered-cybersecurity/" target="_blank" rel="noreferrer noopener"> Glasswing initiative</a>, which was created to study how advanced AI models can help defend critical software while reducing the risk of offensive misuse.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2L2GZHDKk8YjHxhd7AyPJ8NVApScvsSLL35IxczyvPJ1Gli1xezVCKVw2A7qqWfIXywdAQMv1Bo8Zii7NJ0yAz6KfYUFIUZbUpB-WwvKtHKKcIfLbx6anr1uFRRGGSkBNd25OxkL_pKcktZzT6SecKB7nD0oMy0gHEjT1Uevop3aN9_jHZdFVfzvBfaw/s1600/Screenshot%202026-04-17%20152525%20%281%29.webp" alt="Knowledge work (Source: Anthropic)"/><figcaption class="wp-element-caption"><em>Knowledge work (Source: Anthropic)</em></figcaption></figure>



<p>In that announcement, Anthropic said its unreleased <a href="https://cybersecuritynews.com/claude-mythos-zero-day-detection/" target="_blank" rel="noreferrer noopener">Claude Mythos Preview demonstrated very strong vulnerability discovery</a> and exploit development capabilities, strong enough that the company chose not to make it generally available.</p>



<p>Instead, Anthropic said it would test new cyber defenses first on a less capable model, and Opus 4.7 is the first product to carry that plan into production.</p>



<p>Anthropic also said Opus 4.7 keeps the same price as Opus 4.6, at $5 per million input tokens and $25 per million output tokens.</p>



<p>The model is now available across Claude products, the Claude API, Amazon Bedrock, <a href="https://cybersecuritynews.com/google-clouds-vertex-ai-platform-vulnerability/" target="_blank" rel="noreferrer noopener">Google Cloud Vertex AI</a>, and Microsoft Foundry, providing enterprises with several deployment options. For developers, the update includes operational changes beyond safety.</p>



<p>Anthropic introduced a new&nbsp;xhigh&nbsp;effort level for harder reasoning tasks, public beta task budgets for managing token usage in long-running jobs, and a new&nbsp;<code>/ultrareview</code>&nbsp;<a href="https://cybersecuritynews.com/claude-code-source-code-leaked/" target="_blank" rel="noreferrer noopener">feature in Claude Code for bug and design review</a>.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkkC96W-gjuO5bIdTuv5-LHw-2QI7xZtR2qoARUGblKRQfmLjPB3GX_NPf1w2rvbfmKQVlUUHBlouJrCJvYPSg04D80rrhqsQoCony0b3UzNw-4hLqqoYHzAeUhq77MeTPfoLey3YE1PZc77tg9Jo7OXzcj1qfjt4QXHjvHdbS9S5FzcPDjLCGbe-patk/s1600/Screenshot%202026-04-17%20152541%20%281%29.webp" alt="Agentic code performance of Claude (Source: Anthropic)"/><figcaption class="wp-element-caption"><em>Agentic code performance of Claude (Source: Anthropic)</em></figcaption></figure>



<p>The migration guide also notes that Opus 4.7 <a href="https://cybersecuritynews.com/tokenbreak-attack/" target="_blank" rel="noreferrer noopener">uses a new tokenizer that may increase token counts</a> by 1.0 to 1.35 times, depending on content, meaning teams may need to retune prompts, budgets, and output limits when upgrading.</p>



<p>From a security industry perspective, <a href="https://www.anthropic.com/news/claude-opus-4-7" target="_blank" rel="noreferrer noopener nofollow">this release shows how AI vendors are beginning to treat cyber capabilities</a> as a governed feature rather than just a competitive advantage.</p>



<p>Anthropic is trying to balance stronger coding autonomy with automated misuse controls, using live deployment data from Opus 4.7 to shape how future, more capable models might be released safely.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/anthropic-releases-claude-opus-4-7/">Anthropic Releases Claude Opus 4.7 with Automated Real-Time Cybersecurity Safeguards</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Anthropic-releases-Claude-Opus-4.7-with-automated-Real-time-cybersecurity-safeguards-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147746</post-id>	</item>
	</channel>
</rss>
