<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Cisco Talos Blog]]></title><description><![CDATA[Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.]]></description><link>https://blog.talosintelligence.com/</link><image><url>https://blog.talosintelligence.com/favicon.png</url><title>Cisco Talos Blog</title><link>https://blog.talosintelligence.com/</link></image><generator>Ghost 6.30</generator><lastBuildDate>Thu, 16 Apr 2026 19:00:31 GMT</lastBuildDate><atom:link href="https://blog.talosintelligence.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Foxit, LibRaw vulnerabilities]]></title><description><![CDATA[<p>Cisco Talos&#x2019; Vulnerability Discovery &amp; Research team recently disclosed one Foxit Reader vulnerability, and six LibRaw file reader vulnerabilities.</p><p>The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to<a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html"> <u>Cisco&#x2019;s third-party vulnerability disclosure policy</u></a>.&#xA0;&#xA0;&#xA0;&#xA0;</p><p>For</p>]]></description><link>https://blog.talosintelligence.com/foxit-libraw-vulnerabilities/</link><guid isPermaLink="false">69dd0369ab91ce0001a70dc9</guid><category><![CDATA[Vulnerability Roundup]]></category><dc:creator><![CDATA[Kri Dontje]]></dc:creator><pubDate>Thu, 16 Apr 2026 19:00:24 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/vuln_roundup.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/vuln_roundup.jpg" alt="Foxit, LibRaw vulnerabilities"><p>Cisco Talos&#x2019; Vulnerability Discovery &amp; Research team recently disclosed one Foxit Reader vulnerability, and six LibRaw file reader vulnerabilities.</p><p>The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to<a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html"> <u>Cisco&#x2019;s third-party vulnerability disclosure policy</u></a>.&#xA0;&#xA0;&#xA0;&#xA0;</p><p>For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from<a href="https://snort.org/"> <u>Snort.org</u></a>, and our latest Vulnerability Advisories are always posted on<a href="https://talosintelligence.com/vulnerability_reports"> <u>Talos Intelligence&#x2019;s website</u></a>.</p><h2 id="foxit-use-after-free-vulnerability"><strong>Foxit use-after-free vulnerability</strong></h2><p><em>Discovered by KPC of Cisco Talos.</em></p><p>Foxit Reader allows users to view, edit, and sign PDF documents, among other features. Foxit aims to be one of the most feature-rich PDF readers on the market, and contains many similar functions to that of Adobe Acrobat Reader.</p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2365" rel="noreferrer">TALOS-2026-2365</a> (CVE-2026-3779) is a use-after-free vulnerability in the way Foxit Reader handles an Array object. A specially crafted JavaScript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability.</p><h2 id="libraw-heap-based-buffer-overflow-and-integer-overflow-vulnerabilities"><strong>LibRaw heap-based buffer overflow and integer overflow vulnerabilities</strong></h2><p><em>Discovered by Francesco Benvenuto of Cisco Talos.</em></p><p>LibRaw is a library and user interface for processing RAW file types and metadata created by digital cameras. Talos analysts found 6 vulnerabilities in LibRaw. </p><p><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2330" rel="noreferrer">TALOS-2026-2330</a> (CVE-2026-20911), <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2331" rel="noreferrer">TALOS-2026-2331</a> (CVE-2026-21413), <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2358" rel="noreferrer">TALOS-2026-2358</a> (CVE-2026-20889), and <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2359" rel="noreferrer">TALOS-2026-2359</a> (CVE-2026-24660) are heap-based buffer overflow vulnerabilities in LibRaw, and <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2363" rel="noreferrer">TALOS-2026-2363</a> (CVE-2026-24450) and <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2026-2364" rel="noreferrer">TALOS-2026-2364</a> (CVE-2026-20884) are integer overflow vulnerabilities. Specially crafted malicious files can lead to heap buffer overflow in all cases. An attacker can provide a malicious file to trigger these vulnerabilities. </p>]]></content:encoded></item><item><title><![CDATA[The Q1 vulnerability pulse]]></title><description><![CDATA[Thor provides an overview of the Q1 2026 vulnerability statistics, highlighting key trends in legacy CVEs and the evolving impact of AI on the threat landscape.]]></description><link>https://blog.talosintelligence.com/the-q1-vulnerability-pulse/</link><guid isPermaLink="false">69dfae17645a220001422ae1</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Thorsten Rosendahl]]></dc:creator><pubDate>Thu, 16 Apr 2026 18:00:31 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-2.jpg" alt="The Q1 vulnerability pulse"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>The first quarter of 2026 passed faster than a misconfigured&#xA0;firewall&#xA0;rule gets exploited &#x2014; and the last few weeks have been firmly stamped with the &quot;software supply chain compromise&quot; label, with headlines surrounding incidents involving&#xA0;<a href="https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know" rel="noreferrer noopener"><u>Trivy</u></a>,<a href="https://checkmarx.com/blog/checkmarx-security-update" rel="noreferrer noopener"><u>Checkmark</u></a>,&#xA0;<a href="https://lwn.net/Articles/1064479/" rel="noreferrer noopener"><u>LiteLLM</u></a>,&#xA0;<a href="https://research.jfrog.com/post/team-pcp-strikes-again-telnyx-popular-library-hit/" rel="noreferrer noopener"><u>telnyx</u></a>&#xA0;and&#xA0;<a href="https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan" rel="noreferrer noopener"><u>axios</u></a>. This edition stays focused on vulnerability statistics, although you can view&#xA0;<a href="https://blog.talosintelligence.com/protecting-supply-chain-2026/" rel="noreferrer noopener"><u>Dave</u></a>&#xA0;and&#xA0;<a href="https://blog.talosintelligence.com/axois-npm-supply-chain-incident/" rel="noreferrer noopener"><u>Nick&apos;s</u></a>&#xA0;Talos blogs for more information about these incidents.&#xA0;</p><p>Known Exploited Vulnerabilities (KEVs) stayed&#xA0;roughly in&#xA0;line with 2025 numbers &#x2014; no dramatic spike, but no room for relief either.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/041526_threatsource_blog_KEVline.jpg" class="kg-image" alt="The Q1 vulnerability pulse" loading="lazy" width="1792" height="1056" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/041526_threatsource_blog_KEVline.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/041526_threatsource_blog_KEVline.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/041526_threatsource_blog_KEVline.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/041526_threatsource_blog_KEVline.jpg 1792w" sizes="(min-width: 720px) 720px"></figure><p>What&#xA0;<em>does</em>&#xA0;stand out? Networking gear accounted for 20% of KEV-related vulnerabilities, and that number is expected to climb as the year progresses. If the trend from 2025 holds, this&#xA0;won&apos;t&#xA0;be the high-water mark.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/041526_threatsource_blog_pie.jpg" class="kg-image" alt="The Q1 vulnerability pulse" loading="lazy" width="1792" height="710" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/041526_threatsource_blog_pie.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/041526_threatsource_blog_pie.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/041526_threatsource_blog_pie.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/041526_threatsource_blog_pie.jpg 1792w" sizes="(min-width: 720px) 720px"></figure><p>Patch management&#xA0;remains&#xA0;one of the industry&apos;s most persistent challenges, and I understand all the operational complexity that comes with it. That said, it still stings to come across CVEs with disclosure dates reaching back to 2009 &#x2014; and&#xA0;roughly 25%&#xA0;of the CVEs&#xA0;we&apos;re&#xA0;tracking date to 2024 or earlier. Old vulnerabilities&#xA0;don&apos;t&#xA0;retire. They wait. It starts with visibility: Knowing&#xA0;what&apos;s&#xA0;actually running&#xA0;in your environment is the prerequisite for everything else.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/041526_threatsource_blog_CVEline.jpg" class="kg-image" alt="The Q1 vulnerability pulse" loading="lazy" width="1792" height="1056" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/041526_threatsource_blog_CVEline.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/041526_threatsource_blog_CVEline.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/041526_threatsource_blog_CVEline.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/041526_threatsource_blog_CVEline.jpg 1792w" sizes="(min-width: 720px) 720px"></figure><p>Overall CVE counts increased in Q1, with March showing the sharpest climb. Whether that reflects improved disclosure pipelines, increased researcher activity,&#xA0;ora&#xA0;genuine uptick in vulnerability density, the trend line from 2025&#xA0;hasn&apos;t&#xA0;flattened &#x2014; if anything,&#xA0;it&apos;s&#xA0;still pointing up.&#xA0;</p><p>Using the keyword&#xA0;methodology&#xA0;described&#xA0;<a href="https://blog.talosintelligence.com/patch-track-repeat-the-2025-cve-retrospective/" rel="noreferrer noopener"><u>here</u></a>, 121 CVEs with AI relevance were&#xA0;identified&#xA0;in Q1 &#x2014; more than Q1 2025, though consistent with what adoption trends would predict. As AI components become more deeply embedded across the software stack, this number will keep climbing.&#xA0;</p><p>Given the recent developments with models like&#xA0;the&#xA0;Mythos&#xA0;preview and the industry teaming up in initiatives like&#xA0;<a href="https://www.anthropic.com/glasswing" rel="noreferrer noopener"><u>Project Glasswing</u></a>,&#xA0;I&apos;m&#xA0;curious how the trajectory will change moving forward. If you&#xA0;haven&apos;t&#xA0;read about it:&#xA0;</p><p><em>&#x201C;During our testing, we found that Mythos Preview is capable of identifying and then exploiting zero-day vulnerabilities in every major operating system and every major web browser when directed by a user to do so.&#x201D; -</em>&#xA0;<a href="https://red.anthropic.com/2026/mythos-preview/" rel="noreferrer noopener"><em><u>Anthropic Frontier Red Team</u></em></a></p><p>That&apos;s&#xA0;a substantial capability&#xA0;jump&#xA0;in agentic coding and reasoning, which eventually needs to be implemented early in the development lifecycle. And as&#xA0;<a href="https://blogs.cisco.com/news/rising-to-the-era-of-ai-powered-cyber-defense" rel="noreferrer noopener"><u>Anthony</u></a>&#xA0;points&#xA0;out,&#xA0;those&#xA0;capabilities will become available to adversaries. Read <a href="https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-defending-against-ai-attacks-guidance.pdf" rel="noreferrer">Cisco&apos;s guidance</a> on defending in the age of AI-enabled attacks for more.</p><p>Will we see fewer CVEs or even more negative times-to-exploit (TTEs)?&#xA0;</p><p>It&apos;s&#xA0;on us. Defenders need to get ahead of the adversaries, and at the same time, we need to pay attention to (sometimes decade-old) vulnerabilities.</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>Cisco Talos has&#xA0;<a href="https://blog.talosintelligence.com/the-n8n-n8mare/" rel="noreferrer noopener"><u>identified</u>&#xA0;<u>a significant increase</u></a>&#xA0;in the abuse of n8n, an AI workflow automation platform, to&#xA0;facilitate&#xA0;malicious campaigns including malware delivery and device fingerprinting. Attackers are weaponizing the platform&#x2019;s URL-exposed webhooks to create phishing lures that bypass traditional security filters by&#xA0;leveraging&#xA0;trusted, legitimate infrastructure. By masking malicious payloads as standard data streams, these campaigns effectively turn productivity tools into delivery vehicles for remote access trojans and other cyber threats.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>The abuse of legitimate automation platforms exploits the inherent trust organizations&#xA0;place&#xA0;in these tools, which often neutralizes traditional perimeter-based security defenses. Because these platforms are designed for flexibility and seamless integration, they allow attackers to dynamically tailor payloads and evade detection through standard reputation-based filtering.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Move beyond static domain blocking and implement behavioral detection that&#xA0;alerts on&#xA0;anomalous traffic patterns directed toward automation platforms. Restrict endpoint communication with these services to only those explicitly authorized by the organization&#x2019;s established internal workflows. Finally,&#xA0;utilize&#xA0;AI-driven email security solutions to analyze the semantic intent of incoming messages and proactively share indicators of compromise, such as specific webhook structures, with threat intelligence communities.&#xA0;</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>Adobe</strong>&#xA0;<strong>patches</strong>&#xA0;<strong>actively</strong>&#xA0;<strong>exploited</strong>&#xA0;<strong>zero-day</strong>&#xA0;<strong>that</strong>&#xA0;<strong>lingered for</strong>&#xA0;<strong>months</strong>&#xA0;<br>Adobe patched an arbitrary code execution vulnerability in the latest versions of its Acrobat and Reader for Windows and macOS,&#xA0;nearly four&#xA0;months after an attacker first appeared to have begun exploiting it. (<a href="https://www.darkreading.com/application-security/adobe-patches-actively-exploited-zero-day" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><p><strong>Fake Claude website distributes</strong>&#xA0;<strong>PlugX</strong>&#xA0;<strong>RAT</strong>&#xA0;<br>A threat actor created a site that hosts a download link pointing to a ZIP archive allegedly&#xA0;containing&#xA0;a pro version of the LLM.&#xA0;(<a href="https://www.securityweek.com/fake-claude-website-distributes-plugx-rat/" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><p><strong>Sweden blames Russian hackers for attempting &#x201C;destructive&#x201D;</strong>&#xA0;<strong>cyber attack</strong>&#xA0;<strong>on thermal plant</strong>&#xA0;<br>Sweden&#x2019;s minister of civil defense said during a press conference on Wednesday that the attempted attack happened in early 2025 and attributed the incident to hackers with &#x201C;connections to Russian intelligence and security services.&#x201D; (<a href="https://techcrunch.com/2026/04/15/sweden-blames-russian-hackers-for-attempting-destructive-cyberattack-on-thermal-plant/" rel="noreferrer noopener"><u>TechCrunch</u></a>)&#xA0;</p><p><strong>FBI and Indonesian police dismantle W3LL phishing network behind $20M fraud attempts</strong>&#xA0;<br>The W3LL phishing kit, advertised for a fee of about $500, allowed criminals to mimic legitimate login pages to deceive victims into handing over their credentials, allowing the attackers to seize control of their accounts. (<a href="https://thehackernews.com/2026/04/fbi-and-indonesian-police-dismantle.html" rel="noreferrer noopener"><u>The Hacker News</u></a>)&#xA0;</p><p><strong>Google API keys in Android apps expose Gemini endpoints to unauthorized access</strong>&#xA0;<br>Armed with the key, an attacker could access private files and cached content, make arbitrary Gemini API calls, exhaust API&#xA0;quotas&#xA0;and disrupt legitimate services, and access any data on Gemini&#x2019;s file storage. (<a href="https://www.securityweek.com/google-api-keys-in-android-apps-expose-gemini-endpoints-to-unauthorized-access/?utm_source=tldrinfosec" rel="noreferrer noopener"><u>SecurityWeek</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://blog.talosintelligence.com/more-than-pretty-pictures-wendy-bishop-on-visual-storytelling-in-tech" rel="noreferrer noopener"><strong><u>More than pretty pictures: Wendy Bishop on visual storytelling in tech</u></strong></a>&#xA0;<br>From her early beginnings in web design and journalism to leading the creative vision for Talos, Wendy talks about the unique challenges and rewards of bridging the gap between artistic expression and highly technical research.&#xA0;</p><p><a href="https://blog.talosintelligence.com/powmix-botnet-targets-czech-workforce" rel="noreferrer noopener"><strong><u>PowMix botnet targets Czech workforce</u></strong></a>&#xA0;<br>Cisco Talos discovered an ongoing malicious campaign affecting Czech workers with a previously undocumented botnet we call &#x201C;PowMix.&#x201D; It&#xA0;employs&#xA0;random beaconing intervals to evade the&#xA0;network&#xA0;signature detections.&#xA0;</p><p><a href="https://blog.talosintelligence.com/state-sponsored-threats-different-objectives-similar-access-paths/" rel="noreferrer noopener"><strong><u>APTs: Different</u></strong>&#xA0;<strong><u>objectives, similar access paths</u></strong></a>&#xA0;&#xA0;<br>Across the Talos 2025 Year in Review, state-sponsored threat activity from China, Russia, North Korea, and Iran all had varying motivations, such as espionage, disruption, financial gain, and geopolitical influence.&#xA0;</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://pivotcon.org/" rel="noreferrer noopener"><u>PIVOTcon</u></a>&#xA0;(May 6 &#x2013; 8) M&#xE1;laga, Spain&#xA0;</li><li><a href="https://www.offensivecon.org/" rel="noreferrer noopener"><u>OffensiveCon</u></a>&#xA0;(May 15 &#x2013; 16)&#xA0;Berlin, Germany&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;<br>Example Filename: VID001.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201**&#xA0;</p><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;<br>Example Filename: d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;&#xA0;<br>Talos Rep: https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59&#xA0;&#xA0;<br>Example Filename:&#xA0;APQ9305.dll&#xA0;&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</strong>&#xA0;&#xA0;<br>MD5: 7bdbd180c081fa63ca94f9c22c457376&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</u></a>&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_62_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Dropper.Miner::95.sbx.tg**&#xA0;</p><p><strong>SHA256: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</strong>&#xA0;&#xA0;<br>MD5: 41444d7018601b599beac0c60ed1bf83&#xA0;&#xA0;<br>Talos Rep: https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55&#xA0;&#xA0;<br>Example Filename:&#xA0;content.js&#xA0;&#xA0;<br>Detection Name: W32.38D053135D-95.SBX.TG&#xA0;</p><p><strong>SHA256: 3c1dbc3f56e91cc79f0014850e773a7f12bbfef06680f08f883b2bf12873eccc</strong>&#xA0;<br>MD5: d749e0f8f2cd4e14178a787571534121&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=3c1dbc3f56e91cc79f0014850e773a7f12bbfef06680f08f883b2bf12873eccc" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=3c1dbc3f56e91cc79f0014850e773a7f12bbfef06680f08f883b2bf12873eccc</u></a>&#xA0;<br>Example Filename:&#xA0;Unconfirmed 280575.crdownload.exe&#xA0;&#xA0;<br>Detection Name: W32.3C1DBC3F56-90.SBX.TG</p>]]></content:encoded></item><item><title><![CDATA[PowMix botnet targets Czech workforce]]></title><description><![CDATA[Cisco Talos discovered an ongoing malicious campaign, operating since at least December 2025, affecting a broader workforce in the Czech Republic with a previously undocumented botnet we call “PowMix.” ]]></description><link>https://blog.talosintelligence.com/powmix-botnet-targets-czech-workforce/</link><guid isPermaLink="false">69de95aa645a22000142298d</guid><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[Cisco Talos Antivirus]]></category><category><![CDATA[Cisco Talos DNS Security]]></category><category><![CDATA[Cisco Talos Network Intrusion Prevention]]></category><dc:creator><![CDATA[Chetan Raghuprasad]]></dc:creator><pubDate>Thu, 16 Apr 2026 10:00:33 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_spotlight-1.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos&#xA0;discovered&#xA0;an ongoing malicious campaign,&#xA0;operating&#xA0;since&#xA0;at least&#xA0;December 2025, affecting a broader workforce in the Czech Republic with a&#xA0;previously&#xA0;undocumented botnet we&#xA0;call&#xA0;&#x201C;PowMix.&#x201D;&#xA0;</li><li>PowMix&#xA0;employs randomized&#xA0;command-and-control&#xA0;(C2)&#xA0;beaconing&#xA0;intervals,&#xA0;rather than&#xA0;persistent connection&#xA0;to the C2 server,&#xA0;to evade the&#xA0;network signature detections.&#xA0;</li><li>PowMix&#xA0;embeds the encrypted heartbeat data along with&#xA0;unique identifiers of the victim machine into the C2 URL paths,&#xA0;mimicking&#xA0;legitimate&#xA0;REST API&#xA0;URLs.&#xA0;</li><li>PowMix&#xA0;has the capability to&#xA0;remotely&#xA0;update&#xA0;the new&#xA0;C2&#xA0;domain&#xA0;to the botnet configuration file&#xA0;dynamically.&#xA0;</li><li>Talos observed a few&#xA0;tactical similarities of&#xA0;the current campaign with&#xA0;the&#xA0;<a href="https://research.checkpoint.com/2025/zipline-phishing-campaign/#:~:text=This%20suggests%20that%20the%20malicious,agent%2C%20or%20other%20contextual%20indicators." rel="noreferrer noopener"><u>ZipLine</u></a>&#xA0;campaign,&#xA0;including&#xA0;the payload delivery mechanism&#xA0;and the&#xA0;misuse&#xA0;of the legitimate cloud&#xA0;platform&#xA0;Heroku&#xA0;for C2 operations.</li></ul><hr><h2 id="victimology">Victimology&#xA0;&#xA0;</h2><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_spotlight-1.jpg" alt="PowMix botnet targets Czech workforce"><p>Talos observed&#xA0;that an attacker targeted&#xA0;Czech&#xA0;organizations&#xA0;across various levels, based on the contents of the lure documents used by the attacker in the current campaign.</p><p>Impersonating&#xA0;the&#xA0;legitimate&#xA0;EDEKA brand and authentic regulatory frameworks&#xA0;such&#xA0;as the Czech Data Protection Act,&#xA0;the&#xA0;attacker deploys&#xA0;decoy&#xA0;documents&#xA0;with&#xA0;compliance-themed lures,&#xA0;potentially&#xA0;aimed at compromising&#xA0;victims from&#xA0;human resources (HR), legal, and recruitment&#xA0;agencies.&#xA0;In the lure documents, the attacker also used compensation data, as well as the&#xA0;legitimate legislative references,&#xA0;to enhance&#xA0;the&#xA0;authenticity of these&#xA0;decoy&#xA0;documents&#xA0;and to entice the job aspirants across diverse sectors like IT, finance, and&#xA0;logistics.&#xA0;</p><figure class="kg-card kg-gallery-card kg-width-wide kg-card-hascaption"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image-6.png" width="600" height="702" loading="lazy" alt="PowMix botnet targets Czech workforce" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image-6.png 600w"></div><div class="kg-gallery-image"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image-7-1.png" width="600" height="718" loading="lazy" alt="PowMix botnet targets Czech workforce" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image-7-1.png 600w"></div></div></div><figcaption><p><span style="white-space: pre-wrap;">Figures 1 (left) and 2 (right). First pages of two decoy documents.</span></p></figcaption></figure><h2 id="ttps-overlaps-with-the-zipline-campaign">TTPs overlaps&#xA0;with the&#xA0;ZipLine&#xA0;campaign&#xA0;&#xA0;</h2><p>Talos&#xA0;observed a few&#xA0;tactical similarities&#xA0;employed in the current campaign with that of the <a href="https://research.checkpoint.com/2025/zipline-phishing-campaign/#:~:text=This%20suggests%20that%20the%20malicious,agent%2C%20or%20other%20contextual%20indicators." rel="noreferrer noopener"><u>ZipLine</u></a> campaign, reported by researchers from Check Point&#xA0;in&#xA0;August 2025.</p><p>In the current campaign, the&#xA0;PowMix&#xA0;botnet payload is delivered via an LNK&#xA0;triggered PowerShell loader that extracts it from a ZIP archive data blob, bypasses AMSI, and executes the decrypted script directly in memory. This campaign shares tactical overlaps with the older&#xA0;<a href="https://research.checkpoint.com/2025/zipline-phishing-campaign/#:~:text=This%20suggests%20that%20the%20malicious,agent%2C%20or%20other%20contextual%20indicators." rel="noreferrer noopener"><u>ZipLine</u></a>&#xA0;campaign (which deployed the&#xA0;MixShell&#xA0;malware), including identical ZIP-based payload concealment, Windows-scheduled task persistence, CRC32-based BOT ID generation, and the abuse of&#xA0;&#x201C;herokuapp.com&#x201D;&#xA0;for command-and-control&#xA0;(C2)&#xA0;infrastructure.&#xA0;Although there are overlaps in the tactics, the attacker&#x2019;s final&#xA0;payload was&#xA0;unobserved,&#xA0;and the&#xA0;intent&#xA0;remains&#xA0;unknown&#xA0;in this campaign.</p><h2 id="attack-summary">Attack&#xA0;summary&#xA0;&#xA0;</h2><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/PowMix.jpg" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="2000" height="1109" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/PowMix.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/PowMix.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/PowMix.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/PowMix.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 3. Attack summary flow chart.&#xA0;</span></figcaption></figure><p>The attack begins when a victim runs the Windows shortcut file contained within the received malicious ZIP file,&#xA0;potentially through&#xA0;a&#xA0;phishing&#xA0;email. This shortcut file triggers the execution of an embedded PowerShell loader script, which initially creates a&#xA0;copy&#xA0;of the ZIP file along with its contents in the victim&apos;s &#x201C;ProgramData&#x201D; folder. Subsequently, it loads the malicious ZIP file, extracts, and executes the embedded&#xA0;PowMix&#xA0;botnet payload directly in the victim&apos;s machine memory&#xA0;and starts to communicate with the botnet C2.&#xA0;</p><h2 id="powershell-loader-executes-powmix-in-memory">PowerShell&#xA0;loader&#xA0;executes&#xA0;PowMix&#xA0;in memory&#xA0;&#xA0;</h2><p>The first stage PowerShell script functions as a loader, and its execution routine&#xA0;is designed&#xA0;to bypass security controls and deliver a secondary payload. It begins by defining several obfuscated variables, including&#xA0;file&#xA0;name&#xA0;of the malicious ZIP file&#xA0;that was&#xA0;likely received&#xA0;via a phishing email. Then,&#xA0;the script&#xA0;dynamically constructs paths to&#xA0;the folders&#xA0;such as&#xA0;&#x201C;ProgramData&#x201D;&#xA0;and the&#xA0;user&#x2019;s&#xA0;&#x201C;Downloads&#x201D;&#xA0;folder to&#xA0;locate&#xA0;this ZIP file. Once the&#xA0;ZIP&#xA0;file is found,&#xA0;it extracts the contents&#xA0;to&#xA0;the&#xA0;&#x201C;ProgramData&#x201D;folder, effectively staging the environment for the next phase of the attack.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-129c9a39-fe3e-49a6-bf04-62e51d487f36-1-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="398" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-129c9a39-fe3e-49a6-bf04-62e51d487f36-1-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-129c9a39-fe3e-49a6-bf04-62e51d487f36-1-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 4. Excerpt of the&#xA0;deobfuscated&#xA0;PowerShell Loader main function.&#xA0;</span></figcaption></figure><p>To evade detection, the script employs an AMSI (Antimalware Scan Interface) bypass technique. It uses&#xA0;a reflection&#xA0;technique&#xA0;to browse the loaded assemblies in the current process, specifically searching for the <code>AmsiUtils</code> class. Once&#xA0;located, it&#xA0;identifies the <code>amsiInitFailed</code> field and manually sets its value to true.&#xA0;This action deceives the Windows security subsystem into thinking that AMSI has not initialized, which disables real-time scanning of&#xA0;subsequent&#xA0;commands, enabling the script to run malicious code in memory without being detected by Windows Defender or other&#xA0;endpoint detection and response (EDR)&#xA0;solutions.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-7a4fc13c-9eaf-4b6a-a3c6-ff048060f0e0-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="412" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-7a4fc13c-9eaf-4b6a-a3c6-ff048060f0e0-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-7a4fc13c-9eaf-4b6a-a3c6-ff048060f0e0-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 5. Excerpt of the deobfuscated PowerShell Loader AMSI bypass function.&#xA0;</span></figcaption></figure><p>The script parses the malicious ZIP file to&#xA0;locate&#xA0;a specific marker that is&#xA0;hardcoded, such as&#xA0;<code>zAswKoK</code>. This marker is treated as a delimiter, enabling the extraction of a hidden, encoded command that is embedded within the&#xA0;ZIP&#xA0;file data&#xA0;blob.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image-2.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="2000" height="836" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/image-2.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/image-2.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/image-2.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/image-2.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 6.&#xA0;Malicious&#xA0;ZIP file data blob embedded with an obfuscated&#xA0;PowMix&#xA0;botnet.&#xA0;</span></figcaption></figure><p>Throughout this process, the script performs a series of string replacements, which include the removal of&#xA0;<code>#</code> symbols and the mapping of placeholders, such as <code>{cdm}</code>, to their corresponding specific file paths, reconstructing a&#xA0;functional&#xA0;secondary&#xA0;PowerShell&#xA0;script&#xA0;payload.&#xA0;Then it executes the secondary payload script in the victim machine memory using the <code>Invoke-Expression</code> (IEX) PowerShell command.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-ebd82069-855b-4971-abac-77ce0f705ab8-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="496" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-ebd82069-855b-4971-abac-77ce0f705ab8-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-ebd82069-855b-4971-abac-77ce0f705ab8-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 7. PowerShell loader excerpt with instructions to extract payload and execute.&#xA0;</span></figcaption></figure><h2 id="powmix-botnet">PowMix&#xA0;botnet&#xA0;</h2><p>Talos discovered that the secondary payload PowerShell script, which we call &#x201C;PowMix,&#x201D;&#xA0;is&#xA0;a previously unreported&#xA0;botnet&#xA0;designed&#xA0;for&#xA0;remote&#xA0;access, reconnaissance, and remote code execution.&#xA0;</p><p>The main execution of the script&#xA0;begins&#xA0;with an environment check to ensure it is running within a specific loader context&#xA0;at the placeholder <code>{cdm}</code>, which is the path of the Windows shortcut in the&#xA0;ProgramData&#xA0;folder, before&#xA0;immediately&#xA0;attempting&#xA0;to conceal its presence. It invokes a&#xA0;function&#xA0;that&#xA0;utilizes&#xA0;the <code>Win32ShowWindowAsync</code>&#xA0;function&#xA0;of&#xA0;&#x201C;user32.dll&#x201D;&#xA0;to hide the current PowerShell console window.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-01acf711-5f5c-4cdc-b055-c16e31e1a449-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="262" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-01acf711-5f5c-4cdc-b055-c16e31e1a449-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-01acf711-5f5c-4cdc-b055-c16e31e1a449-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 8.&#xA0;PowMix&#xA0;excerpt to hide the PowerShell console window.&#xA0;</span></figcaption></figure><p>Then it decrypts the&#xA0;C2&#xA0;domain and&#xA0;a&#xA0;configuration file using a custom XOR-based routine with a hardcoded key. It retrieves the machine&apos;s&#xA0;product ID&#xA0;by querying the&#xA0;<code>HKLM: SOFTWARE\Microsoft\Windows NT\CurrentVersion</code>&#xA0;registry key for the&#xA0;Windows&#xA0;ProductID.&#xA0;PowMix&#xA0;processes the&#xA0;victim machine&#x2019;s&#xA0;ProductID&#xA0;and the decrypted configuration data&#xA0;through a&#xA0;CRC32-style&#xA0;checksum&#xA0;function to generate a unique Bot&#xA0;ID and a corresponding Windows schedule task name,&#xA0;which it&#xA0;subsequently&#xA0;uses to&#xA0;establish&#xA0;persistence.&#xA0;</p><p>Some of the hardcoded XOR key&#xA0;strings&#xA0;found in this campaign&#xA0;are:&#xA0;</p><ul><li>HpSWSb&#xA0;&#xA0;</li><li>qDQyxQE&#xA0;&#xA0;</li><li>bKUxmhyAe&#xA0;</li><li>HymzqLse&#xA0;</li><li>KsEYwmgSF&#xA0;</li><li>ujCPOEPU&#xA0;</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-9cbd9470-e08b-4329-862d-5a2dcaa8e808-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="482" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-9cbd9470-e08b-4329-862d-5a2dcaa8e808-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-9cbd9470-e08b-4329-862d-5a2dcaa8e808-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 9.&#xA0;PowMix&#xA0;excerpts&#xA0;with the main function and the function that implements the CRC32&#xA0;type&#xA0;checksum&#xA0;algorithm.&#xA0;</span></figcaption></figure><p>Instead of using obvious task names,&#xA0;PowMix&#xA0;names the scheduled task by concatenating the Bot ID and Configuration&#xA0;file&#xA0;hash, resulting in names&#xA0;that&#xA0;appear as random hexadecimal strings&#xA0;(such&#xA0;as &quot;289c2e236761&#x201D;). The task configuration specifies a daily trigger set to execute at 11:00&#xA0;a.m.,&#xA0;and the&#xA0;execution action&#xA0;is configured to&#xA0;launch the benign Windows Explorer binary with the&#xA0;malicious&#xA0;Windows&#xA0;Shortcut file path&#xA0;as an argument. Windows Explorer&apos;s file association handling then automatically launches&#xA0;the malicious&#xA0;shortcut&#xA0;file to&#xA0;execute the&#xA0;PowerShell loader&#xA0;script.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-1f394bb8-3442-40b9-92bc-4b67dd2fd0cb.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="452" height="168"><figcaption><span style="white-space: pre-wrap;">Figure 10.&#xA0;Windows scheduled task created by&#xA0;PowMix. </span></figcaption></figure><p>Before&#xA0;attempting&#xA0;to establish persistence,&#xA0;PowMix&#xA0;performs several&#xA0;validation&#xA0;checks to ensure&#xA0;that&#xA0;another&#xA0;instance&#xA0;of the botnet is&#xA0;not&#xA0;running in the infected machine.&#xA0;It&#xA0;examines the process tree using&#xA0;Common Information Model&#xA0;(CIM) queries to&#xA0;identify&#xA0;its parent processes. If the&#xA0;PowMix&#xA0;is not running under either&#xA0;&#x201C;svchost.exe&#x201D;&#xA0;or&#xA0;&#x201C;powershell.exe&#x201D;,&#xA0;and&#xA0;if certain environmental variables are not set, it&#xA0;attempts&#xA0;to restart itself in the&#xA0;privileged&#xA0;context.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-8ef912e2-e786-410a-b4be-d1440b67dbd9-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="549" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-8ef912e2-e786-410a-b4be-d1440b67dbd9-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-8ef912e2-e786-410a-b4be-d1440b67dbd9-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 11.&#xA0;PowMix&#xA0;excerpts with the instructions to&#xA0;establish&#xA0;persistence.&#xA0;</span></figcaption></figure><p>The mutex implementation in the botnet prevents multiple instances from running at the same time. It creates a mutex with the&#xA0;name&#xA0;&#x201C;Global\[BotID]&#x201D;.&#xA0;&#xA0;The&#xA0;&#x201C;Global&#x201D;&#xA0;prefix makes the mutex visible across all&#xA0;user&#xA0;sessions, stopping separate instances from running in different user sessions.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-2a0d14de-803f-4bf0-90e3-953d5f72174d-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="138" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-2a0d14de-803f-4bf0-90e3-953d5f72174d-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-2a0d14de-803f-4bf0-90e3-953d5f72174d-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 12.&#xA0;PowMix&#xA0;excerpts with&#xA0;Mutex creation commands.&#xA0;</span></figcaption></figure><p>PowMix&#xA0;avoids persistent connections to the&#xA0;C2&#xA0;server.&#xA0;Instead,&#xA0;it&#xA0;implements&#xA0;a&#xA0;jitter via&#xA0;<code>Get-Random</code>&#xA0;PowerShell command&#xA0;to vary&#xA0;the beaconing intervals&#xA0;initially between 0 and&#xA0;261 seconds, and&#xA0;subsequently&#xA0;between 1,075 and&#xA0;1,450 seconds. This&#xA0;technique&#xA0;attempts&#xA0;to prevent&#xA0;detection&#xA0;of C2 traffic&#xA0;through&#xA0;predictable&#xA0;network signatures.&#xA0;</p><p>Each request&#xA0;from&#xA0;PowMix&#xA0;&#xA0;to C2&#xA0;is&#xA0;created&#xA0;by concatenating the base C2 domain with the&#xA0;Bot ID,&#xA0;configuration file&#xA0;hash, an encrypted heartbeat, a hexadecimal Unix timestamp, and a random hexadecimal suffix.&#xA0;The standard heartbeat&#xA0;string&#xA0;&#x201C;[]0&#x201D;&#xA0;is encrypted using&#xA0;a&#xA0;custom XOR routine&#xA0;using&#xA0;the Bot ID&#xA0;as the key and is&#xA0;then converted to a hex string. The inclusion of a random&#xA0;length&#xA0;hexadecimal&#xA0;suffix further ensures that every URL is unique.&#xA0;</p><p>The attacker&#xA0;mimics&#xA0;the REST API calls&#xA0;URLs by embedding these data directly into the URL path,&#xA0;instead of using a URL query string or a POST request for communicating with the C2 server.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-999ba268-19b7-4971-b583-38277bf0b9fc.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="42" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-999ba268-19b7-4971-b583-38277bf0b9fc.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-999ba268-19b7-4971-b583-38277bf0b9fc.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 13. C2 URL format.&#xA0;</span></figcaption></figure><p>PowMix&#xA0;establishes a Chrome User-Agent and configures the Accept-Language (en-US) and Accept-Encoding (gzip, deflate,&#xA0;br) headers. It&#xA0;utilizes&#xA0;the <code>GetSystemWebProxy</code>&#xA0;API along with&#xA0;<code>DefaultCredentials</code>&#xA0;to dynamically adopt the host machine&#x2019;s network proxy settings and automatically authenticates using the logged-in user&apos;s active session tokens, thereby disguising the C2 traffic as legitimate web browser traffic within the victim&#x2019;s environment.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-7b53a04b-228b-437a-9d9f-499b3dde34b7-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="271" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-7b53a04b-228b-437a-9d9f-499b3dde34b7-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-7b53a04b-228b-437a-9d9f-499b3dde34b7-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 14.&#xA0;PowMix&#xA0;excerpts with C2 loop instructions.&#xA0;</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-62f93cb8-65d4-4bd1-b453-4e37183f5d73-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="624" height="292" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/data-src-image-62f93cb8-65d4-4bd1-b453-4e37183f5d73-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/data-src-image-62f93cb8-65d4-4bd1-b453-4e37183f5d73-1.png 624w"><figcaption><span style="white-space: pre-wrap;">Figure 15.&#xA0;PowMix&#xA0;excerpts&#xA0;of&#xA0;download function&#xA0;with hardcoded HTTP headers.&#xA0;</span></figcaption></figure><p>The&#xA0;PowMix&#xA0;command&#xA0;processing logic is executed upon receiving&#xA0;the response from the C2 with&#xA0;a&#xA0;period&#xA0;delimiter. It extracts the second segment and decrypts it using the unique&#xA0;Bot ID&#xA0;as the XOR key. The resulting&#xA0;decrypted response&#xA0;is then evaluated through a conditional parser that distinguishes between&#xA0;the command operations hardcoded in the botnet&#xA0;and arbitrary code execution, allowing the&#xA0;attacker&#xA0;to remotely control the victim machine.&#xA0;&#xA0;</p><p>The remote management commands that the botnet receives from the C2&#xA0;are&#xA0;identified&#xA0;by a leading hash symbol (#).&#xA0;We found that the&#xA0;PowMix&#xA0;botnet&#xA0;facilitates&#xA0;the commands described below:&#xA0;</p><ul><li><code>#KILL</code>&#xA0;-&#xA0;The&#xA0;KILL&#xA0;command&#xA0;initiates&#xA0;a self-deletion routine,&#xA0;utilizing&#xA0;the&#xA0;<code>Unregister-ScheduledTask</code>&#xA0;PowerShell command with the&#xA0;parameter&#xA0;<code>Confirm: $false</code>&#xA0;to silently remove persistence, followed by&#xA0;<code>Remove-Item -Recurse&#x2013;Force</code>&#xA0;command&#xA0;to&#xA0;wipe the malware&#x2019;s directory&#xA0;in the victim machine.&#xA0;&#xA0;</li><li><code>#HOST&#xA0;</code>- The&#xA0;HOST&#xA0;command enables&#xA0;the C2&#xA0;infrastructure migration by&#xA0;remotely updating&#xA0;a new C2 URL&#xA0;to&#xA0;a&#xA0;configuration file.&#xA0;By receiving the HOST command,&#xA0;PowMix&#xA0;will&#xA0;encrypt&#xA0;the new domain that it receives using the hardcoded XOR key and&#xA0;save&#xA0;it to a local&#xA0;configuration&#xA0;file via&#xA0;<code>Set-Content</code>&#xA0;PowerShell command.&#xA0;During the next initialization&#xA0;of the botnet&#xA0;through the task scheduler execution,&#xA0;it prioritizes the&#xA0;local configuration&#xA0;file data with the encrypted new C2 domain&#xA0;over hardcoded defaults,&#xA0;providing&#xA0;a robust mechanism for evading domain blacklisting.&#xA0;</li><li>For&#xA0;non&#xA0;#-prefixed&#xA0;responses from the C2,&#xA0;the command processing routine of&#xA0;PowMix&#xA0;transitions into an arbitrary execution mode. It bypasses static detection of the&#xA0;<code>Invoke-Expression</code>&#xA0;(IEX)&#xA0;PowerShell command&#xA0;by dynamically reconstructing the command string from the&#xA0;<code>$VerbosePreference</code> variable&#xA0;and executes&#xA0;the decrypted payload&#xA0;while redirecting the output to Out-Null, ensuring&#xA0;erasing the execution traces.&#xA0;&#xA0;</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image-3-1.png" class="kg-image" alt="PowMix botnet targets Czech workforce" loading="lazy" width="2000" height="1336" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/image-3-1.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/image-3-1.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/image-3-1.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image-3-1.png 2372w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 16.&#xA0;PowMix&#xA0;excerpts with the instructions&#xA0;facilitating&#xA0;the C2 commands.&#xA0;</span></figcaption></figure><h2 id="coverage">Coverage</h2><p>The following ClamAV signature detects and blocks this threat:&#xA0;</p><ul><li>Lnk.Trojan.PowMix-10059735-0&#xA0;</li><li>Txt.Trojan.PowMix-10059742-0&#xA0;</li><li>Txt.Trojan.PowMix-10059778-0&#xA0;</li><li>Win.Trojan.PowMix-10059728-0&#xA0;</li></ul><p>The following Snort Rules (SIDs) detect and block this threat:&#xA0;</p><ul><li>Snort2&#xA0;and Snort3:&#xA0;66118&#xA0;</li></ul><h2 id="indicators-of-compromise-iocs">Indicators of compromise (IOCs)&#xA0;</h2><p>The IOCs for this threat are also available at our GitHub repository <a href="https://github.com/Cisco-Talos/IOCs/blob/main/2026/04/powmix-botnet-targets-czech-workforce.txt" rel="noreferrer">here</a>.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[More than pretty pictures: Wendy Bishop on visual storytelling in tech]]></title><description><![CDATA[Wendy shares the unique challenges and rewards of bridging the gap between artistic expression and highly technical research.]]></description><link>https://blog.talosintelligence.com/more-than-pretty-pictures-wendy-bishop-on-visual-storytelling-in-tech/</link><guid isPermaLink="false">69dd16cfab91ce0001a70dd2</guid><category><![CDATA[Humans of Talos]]></category><dc:creator><![CDATA[Amy Ciminnisi]]></dc:creator><pubDate>Thu, 16 Apr 2026 10:00:28 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/humans_of_talos.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/humans_of_talos.jpg" alt="More than pretty pictures: Wendy Bishop on visual storytelling in tech"><p>In this episode of Humans of Talos, Amy sits down with Wendy Bishop, Head of Creative, to explore the vital role of design in the world of cybersecurity. From her early beginnings in web design and journalism to leading the creative vision for Talos, Wendy shares the unique challenges and rewards of bridging the gap between artistic expression and highly technical research.</p><p>Whether you&apos;re a creative professional looking to break into the cybersecurity industry or simply curious about the people behind our security intelligence, this conversation offers a fascinating look at the artistic side of Talos&apos; mission to keep the digital world safe.</p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/-OEPsPNcaFQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen title="More than pretty pictures: Wendy Bishop on visual storytelling in tech"></iframe></figure><p><strong>Amy Ciminnisi: Wendy, welcome! We haven&#x2019;t had anyone from creative here yet. Can you talk to me a little bit about what drew you into creative work and how your career evolved into what it is now at Talos?</strong></p><p><strong>Wendy Bishop:</strong> I never in my entire life thought I would do anything besides something creative. It&#x2019;s the only thing I&#x2019;ve ever known. I have so many memories in my childhood of just being locked in my moody teenage bedroom. In high school, I started doing web design courses, and I think that&#x2019;s when I really started being interested in a graphic design path. I learned Photoshop and basic HTML/CSS stuff as a side hobby. I moderated a message board for my favorite pop-punk band in high school. When it came time to go to college, there was nothing I wanted to do otherwise besides design. I found myself at Ohio University&#x2014; that&#x2019;s where I&#x2019;m from, Ohio &#x2014; in the School of Visual Communication. </p><p>I went off to a job working in newspapers. I actually never thought I would, but it was the job I found after college, and I designed news pages. It sounds funny now; it was already dying then, probably not the best long career path. But I think my background in journalism and communication-driven design is really what made me a great fit for the kind of design work we do here at Talos. We work with complicated materials, and a lot of the creative work we do is comms-driven. Our blog in some ways functions as a news outlet, so visual storytelling is a lot of my job. But of course, we have a lot of regular, branding-based design work now that comes out of my team.</p><p><strong>AC: We just had a really big report come out that has occupied our minds for months, especially over here in design. Can you talk a little bit about the </strong><a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer"><strong>2025 Year in Review</strong></a><strong> and share what that process is like?</strong></p><p><strong>WB:</strong> When it starts to take shape, I look over that draft with the team and we talk about each graphic. I say, &quot;That one might be better if we did this,&quot; or &quot;This is missing that piece for when it goes into production.&quot; I really start to wrap my mind around the various assets and how we would go about taking what is essentially an Excel graphic or something created in PowerPoint and making it into a much more polished and designed presentation. </p><p>We get a sneak peek, and then one day it lands on your desk, Amy. From there, my designers and I put it together. It&#x2019;s a lot about putting that puzzle together, thinking about what makes sense on each page, making sure the content flow is clean and linear, and the adjacencies of the graphics are in the right place. I come to you and say, &quot;Amy, I need a headline,&quot; or &quot;Does this make sense?&quot; We come up with a look and feel and theme for the whole report every year that&#x2019;s greater than just the layout of the document. That gets extended to all the other companion pieces &#x2014; our videos, social graphics, and any continuing campaign pieces.</p><hr><p><em>Want to see more? Watch the&#xA0;</em><a href="https://youtu.be/-OEPsPNcaFQ" rel="noreferrer"><em>full interview</em></a><em>, and don&#x2019;t forget to subscribe to our YouTube channel for future episodes of Humans of Talos.</em></p>]]></content:encoded></item><item><title><![CDATA[The n8n n8mare: How threat actors are misusing AI workflow automation]]></title><description><![CDATA[Cisco Talos research has uncovered agentic AI workflow automation platform abuse in emails. Recently, we identified an increase in the number of emails that abuse n8n, one of these platforms, from as early as October 2025 through March 2026. ]]></description><link>https://blog.talosintelligence.com/the-n8n-n8mare/</link><guid isPermaLink="false">69de939e645a220001422976</guid><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[Landing Page Top Story]]></category><category><![CDATA[Top Story]]></category><dc:creator><![CDATA[Sean Gallagher]]></dc:creator><pubDate>Wed, 15 Apr 2026 10:00:52 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_spotlight.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos&#xA0;research has uncovered&#xA0;agentic AI workflow automation platform&#xA0;abuse&#xA0;in emails.&#xA0;Recently, we&#xA0;identified an increase in the number of emails that abuse&#xA0;n8n, one of these platforms,&#xA0;from&#xA0;as early as&#xA0;October 2025&#xA0;through&#xA0;March 2026.&#xA0;</li><li>In this blog, Talos&#xA0;provides&#xA0;concrete examples of how threat actors are weaponizing legitimate automation platforms to facilitate sophisticated phishing campaigns, ranging from delivering malware to fingerprinting devices.&#xA0;&#xA0;</li><li>By leveraging trusted infrastructure, these attackers&#xA0;bypass&#xA0;traditional security filters, turning productivity tools into delivery vehicles for persistent remote access.</li></ul><hr><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_spotlight.jpg" alt="The n8n n8mare: How threat actors are misusing AI workflow automation"><p>AI workflow automation platforms such as Zapier and n8n are primarily used to connect different software applications (e.g., Slack, Google Sheets, or Gmail) with AI models (e.g., OpenAI&#x2019;s GPT-4 or Anthropic&#x2019;s Claude). These platforms have been applied to different application domains, including cybersecurity over the past few months, especially with the progress that has been made in new avenues like large language models (LLMs) and agentic AI systems. However, much like other legitimate tools, AI workflow automation platforms can be weaponized to orchestrate malicious activities, like delivering malware by sending automated emails.</p><p>This blog describes how n8n, one of the most popular AI workflow automation platforms, has been abused to deliver malware and fingerprint devices by sending automated emails.</p><h2 id="what-is-n8n">What is n8n?</h2><p>N8n is a workflow automation platform that connects web applications and services (including Slack, GitHub, Google Sheets, and others with HTTP-based APIs) and builds automated workflows. A community-licensed version of the platform can be self-hosted by organizations. The commercial service, hosted at n8n.io, includes AI-driven features that can create agents capable of using web-based APIs to pull data from documents and other data sources.</p><p>Users can register for an n8n developer account at no initial charge. Doing so creates a subdomain on &#x201C;tti.app.n8n[.]cloud&#x201D; from which the user&#x2019;s applications can be accessed. This is similar to many web-based AI-aided development tools, and one that malicious actors have harnessed elsewhere in the past; earlier this year, Talos observed another AI-oriented web application service, Softr.io, being used for the creation of phishing pages used in a series of targeted attacks.</p><h2 id="how-n8n%E2%80%99s-webhooks-work">How n8n&#x2019;s&#xA0;webhooks&#xA0;work</h2><p>Talos&apos; investigation found that a primary point of abuse in n8n&#x2019;s AI workflow automation platform is its URL-exposed webhooks. A webhook, often referred to as a &#x201C;reverse API,&#x201D; allows one application to provide real-time information to another. These URLs register an application as a &#x201C;listener&#x201D; to receive data, which can include programmatically pulled HTML content. An example of an n8n webhook URL is shown in Figure 1.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/AI_flow_automation_URL.jpg" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="1875" height="330" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/AI_flow_automation_URL.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/AI_flow_automation_URL.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/AI_flow_automation_URL.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/AI_flow_automation_URL.jpg 1875w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 1.&#xA0;Anatomy of an example&#xA0;n8n&#xA0;webhook&#xA0;URL.</span></figcaption></figure><p>When the URL receives a request, the subsequent workflow steps are triggered, returning results as an HTTP data stream to the requesting application. If the URL is accessed via email, the recipient&#x2019;s browser acts as the receiving application, processing the output as a webpage.</p><p>Talos has observed a significant rise in emails containing n8n webhook URLs over the past year. For example, the volume of these emails in March 2026 was approximately 686% higher than in January 2025. This increase is driven, in part, by several instances of platform abuse, including malware delivery and device fingerprinting, as we will discuss in the next sections.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/AI_flow_automation.jpg" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="1875" height="1039" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/AI_flow_automation.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/AI_flow_automation.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/AI_flow_automation.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/AI_flow_automation.jpg 1875w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 2. The prevalence of n8n webhook URLs in&#xA0;emails over the past few months.</span></figcaption></figure><h2 id="abusing-n8n-for-malware-delivery">Abusing n8n for malware delivery</h2><p>Because webhooks mask the source of the data they deliver, they can be used to serve payloads from untrusted sources while making them appear to originate from a trusted domain. Furthermore, since webhooks can dynamically serve different data streams based on triggering events &#x2014; such as request header information &#x2014; a phishing operator can tailor payloads based on the user-agent header.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_3.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="2000" height="1099" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_3.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_3.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_3.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/Figure_3.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;3. Example of a malicious email that delivers malware to the victim&#x2019;s device by abusing the n8n platform.</span></figcaption></figure><p>Talos observed a phishing campaign (shown in Figure 3) that used an n8n-hosted webhook link in emails that purported to be a shared Microsoft OneDrive folder. When clicked, the link opened a webpage in the targeted user&#x2019;s browser containing a CAPTCHA.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_4.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="2000" height="1499" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_4.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_4.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_4.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_4.png 2304w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;4.&#xA0;HTML document delivered by the webhook presenting a&#xA0;CAPTCHA.</span></figcaption></figure><p>Once the CAPTCHA is completed, a download button appears, triggering a progress bar as the payload is downloaded from an external host. Because the entire process is encapsulated within the JavaScript of the HTML document, the download appears to the browser to have come from the n8n domain.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_5.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="1952" height="1240" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_5.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_5.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_5.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_5.png 1952w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;5.&#xA0;HTML and JavaScript payload of the webhook downloads an executable file from a malicious URL.</span></figcaption></figure><p>In this case, the payload was an .exe file named &#x201C;DownloadedOneDriveDocument.exe&#x201D; that posed as a self-extracting archive. When opened, it installed a modified version of the Datto Remote Monitoring and Management (RMM) tool and executed a chain of PowerShell commands.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_6.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="543" height="345"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;6.&#xA0;Downloaded&#xA0;executable and&#xA0;the&#xA0;document it deploys&#xA0;(an installer for an RMM tool).</span></figcaption></figure><p>The PowerShell commands generated by the malicious executable extract and configure the Datto RMM tool, configure it as a scheduled task, and then launch it, establishing a connection to a relay on Datto&apos;s &quot;centrastage[.]net&quot; domain before deleting themselves and the rest of the payload.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/AI_flow_automation_attack-chain.jpg" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="1875" height="891" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/AI_flow_automation_attack-chain.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/AI_flow_automation_attack-chain.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/AI_flow_automation_attack-chain.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/AI_flow_automation_attack-chain.jpg 1875w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;7.&#xA0;The&#xA0;webhook-delivered&#xA0;&#x201C;DownloadedOneDriveDocument.exe&#x201D;&#xA0;malware attack chain.</span></figcaption></figure><p>Talos observed a similar campaign that also utilized an n8n webhook to deliver a different payload. Like the previous instance, it featured a self-contained phishing page delivered as a data stream from the webhook, protected with a CAPTCHA for human verification.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_8.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="2000" height="1501" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_8.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_8.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_8.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_8.png 2309w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;8.&#xA0;Second CAPTCHA variant presented by n8n&#xA0;webhook.</span></figcaption></figure><p>This CAPTCHA code was significantly simpler than the first case. The payload delivered upon solving the CAPTCHA was a maliciously modified Microsoft Windows Installer (MSI) file named &#x201C;OneDrive_Document_Reader_pHFNwtka_installer.msi&#x201D;. Protected by the Armadillo anti-analysis packer, the payload deployed a different backdoor: the ITarian Endpoint Management RMM tool. When executed by &#x201C;msiexec.exe&#x201D;, the file installs a modified version of the ITarian Endpoint RMM, which acts as a backdoor while running Python modules to exfiltrate information from the target&#x2019;s system. During this process, a fake installer GUI displays a progress bar; once finished, the bar resets to 0% and the application exits, creating the illusion of a failed installation.</p><h2 id="abusing-n8n-for-fingerprinting">Abusing n8n for&#xA0;fingerprinting&#xA0;</h2><p>Talos observed another common abuse case:&#xA0;device fingerprinting. This is achieved by embedding&#xA0;an invisible image (or&#xA0;tracking pixel)&#xA0;within an email.&#xA0;For example, when&#xA0;the&#xA0;<code>&lt;img&gt;</code>&#xA0;HTML tag is used,&#xA0;it tells the email client (e.g.,&#xA0;Outlook or Gmail) to fetch an image from a specific URL.&#xA0;Figure 9 shows an example&#xA0;spam email in&#xA0;the&#xA0;Spanish language that&#xA0;leverages&#xA0;this technique.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_9.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="2000" height="332" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_9.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_9.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_9.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/Figure_9.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;9.&#xA0;Email example where n8n is abused to fingerprint the recipient&#x2019;s device.</span></figcaption></figure><p>When the email client attempts to load the image, it automatically sends an HTTP GET request to the specified address, which is an n8n webhook URL. These URLs include tracking parameters (such as the victim&#x2019;s email address), allowing the server to identify exactly which user opened the email. Also, it is clear how this image is made invisible by using the &#x201C;display&#x201D; and &#x201C;opacity&#x201D; CSS properties.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_10.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="2000" height="614" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_10.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_10.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_10.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/Figure_10.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;10. HTML source&#xA0;snippet&#xA0;of the email&#xA0;in Figure 9.</span></figcaption></figure><p>The second example below uses the same technique to track email opens and fingerprint the recipient&#x2019;s device. Here, the sender tries to get a hold of recipient by introducing a new gift card feature.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_11.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="2000" height="921" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_11.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_11.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_11.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/Figure_11.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;11. Email&#xA0;example where n8n is abused to fingerprint the recipient&#x2019;s device.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure_12.png" class="kg-image" alt="The n8n n8mare: How threat actors are misusing AI workflow automation" loading="lazy" width="2000" height="607" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure_12.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure_12.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure_12.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/Figure_12.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;12. HTML source snippet of&#xA0;email in Figure 11.</span></figcaption></figure><h2 id="conclusion">Conclusion</h2><p>The same workflows designed to save developers hours of manual labor are now being repurposed to automate the delivery of malware and fingerprinting devices due to their flexibility, ease of integration, and seamless automation. As we continue to leverage the power of low-code automation, it&#x2019;s the responsibility of security teams to ensure these platforms and tools remain assets rather than liabilities.</p><h2 id="protection">Protection</h2><p>Because several AI automation platforms exist today that are inherently designed to be flexible and trustworthy, the security community must move beyond simple static analysis to effectively counter their abuse. For instance, instead of blocking entire domains, which would disrupt legitimate business workflows, security researchers should investigate behavioral detection approaches. These should trigger alerts when high volumes of traffic are directed toward such platforms from unexpected internal sources. Similarly, if an endpoint attempts to communicate with an AI automation platform&#x2019;s domain (e.g., &#x201C;n8n.cloud&#x201D;) that is not part of the organization&#x2019;s authorized workflow, it should trigger an immediate alert.</p><p>Collaborative intelligence sharing is another effective approach to countering malicious email campaigns. Security teams should prioritize sharing indicators of compromise (IOCs) &#x2014; such as specific webhook URL structures, malicious file hashes, and command and control (C2) domains &#x2014; with platforms like Cisco Talos Intelligence.</p><p>Last but not least, safeguarding against these complex threats necessitates a comprehensive email security solution that utilizes AI-driven detection. Secure Email Threat Defense employs distinctive deep learning and machine learning models, incorporating Natural Language Processing, within its sophisticated threat detection systems. It detects harmful techniques employed in attacks against your organization, extracts unmatched context for particular business risks, offers searchable threat data, and classifies threats to identify which sectors of your organization are most at risk of attack. You can register now for a <a href="https://www.cisco.com/c/en/us/products/security/email-threat-defense-free-trial.html" rel="noreferrer">free trial</a> of Email Threat Defense.</p><h2 id="iocs">IOCs&#xA0;</h2><p>IOCs for this threat also available on our GitHub repository&#xA0;<a href="https://github.com/Cisco-Talos/IOCs/tree/main/2026/04" rel="noreferrer noopener"><u>here</u></a>.&#xA0;</p>
<!--kg-card-begin: html-->
<pre>93a09e54e607930dfc068fcbc7ea2c2ea776c504aa20a8ca12100a28cfdcc75a&#xA0;
7f30259d72eb7432b2454c07be83365ecfa835188185b35b30d11654aadf86a0&#xA0;
hxxps[://]onedrivedownload[.]zoholandingpage[.]com/my-workspace/DownloadedOneDrive&#xA0;
hxxps[://]majormetalcsorp[.]com/Openfolder&#xA0;
hxxps[://]pagepoinnc[.]app[.]n8n[.]cloud/webhook/downloading-1a92cb4f-cff3-449d-8bdd-ec439b4b3496&#xA0;
hxxps[://]monicasue[.]app[.]n8n[.]cloud/webhook/download-file-92684bb4-ee1d-4806-a264-50bfeb750dab&#xA0;</pre>
<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities]]></title><description><![CDATA[Overview of patch tuesday release from Microsoft for April 2026.]]></description><link>https://blog.talosintelligence.com/microsoft-patch-tuesday-april-2026/</link><guid isPermaLink="false">69de9e36645a220001422999</guid><category><![CDATA[Patch Tuesday]]></category><dc:creator><![CDATA[Nick Biasini]]></dc:creator><pubDate>Tue, 14 Apr 2026 20:27:56 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/patch_tuesday.png" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/patch_tuesday.png" alt="Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities"><p>Microsoft has released its monthly security update for April 2026, which includes 165 vulnerabilities affecting a wide range of products, including eight Microsoft marked as &#x201C;critical.&#x201D;&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23666">CVE-2026-23666</a> is a critical Denial of Service (DoS) vulnerability that affects the .NET framework. Successful exploitation could allow the attacker to deny service over the network.</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157">CVE-2026-32157</a> is a critical use after free vulnerability in the Remote Desktop Client that results in code execution. Attack requires an authorized user on the client to connect to a malicious server, which could result in code execution on the client.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32190">CVE-2026-32190</a> is a critical user after free vulnerability in Microsoft Office that can result in local code execution. Attacker is remote but attack is carried out locally.&#xA0; Code from the local machine needs to be executed to exploit the vulnerability.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33114">CVE-2026-33114</a> is a critical untrusted pointer deference vulnerability in Microsoft Office Word that could allow the attacker to execute code locally. Code from the local machine needs to be executed to exploit this vulnerability.</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33115">CVE-2026-33115</a> is a critical use after free vulnerability in Microsoft Office word that can result in local code execution. Similar to CVE-2026-33114 and CVE-2026-32190 the attacker is remote, but code needs to be executed from the local machine to exploit the vulnerability.</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824">CVE-2026-33824</a> is a critical double free vulnerability in the Widows Internet Key Exchange (IKE) extension, allowing remote code execution. An unauthenticated attacker can send specially crafted packets to a Windows machine with IKE version 2 enabled to potentially enable remote code execution. Additional mitigations can include blocking inbound traffic on UDP ports 500 and 4500 if IKE is not in use.</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826">CVE-2026-33826</a> is a critical improper input validation in Windows Active Directory that can result in code execution over an adjacent network. Requires an authenticated attacker to send specially crafted RPC calls to an RPC host. Can result in remote code execution. Note that successful exploitation requires the attacker be in the same restricted Active Directory domain as the target system.</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33827">CVE-2026-33827</a> is a critical race condition vulnerability in Windows TCP/IP that can result in remote code execution. Successful exploitation requires the attacker to win a race condition along with additional actions prior to exploitation to prepare the target environment. An unauthenticated actor can send specially crafted IPv6 packets to a Windows node where IPSec is enabled to potentially achieve remote code execution.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201">CVE-2026-32201</a> is an important improper input validation vulnerability in Microsoft Office SharePoint that can allow an unauthorized user to perform spoofing. An attacker that successfully exploits this vulnerability could view some sensitive information and make changes to disclosed information. This vulnerability has already been detected as being exploited in the wild.</p><p>The majority of the remaining vulnerabilities are labeled as important with a two moderate and one low vulnerability also being patched.&#xA0; Talos would like to highlight the several additional&#xA0; important vulnerabilities that Microsoft has deemed as &#x201C;more likely&#x201D; to be exploited.</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0390">CVE-2026-0390</a> - UEFI Secure Boot Security Feature Bypass Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151">CVE-2026-26151</a> - Remote Desktop Spoofing Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26169">CVE-2026-26169</a> - Windows Kernel Memory Information Disclosure Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26173">CVE-2026-26173</a> - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26177">CVE-2026-26177</a> - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26182">CVE-2026-26182</a> - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27906">CVE-2026-27906</a> - Windows Hello Security Feature Bypass Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27908">CVE-2026-27908</a> - Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27909">CVE-2026-27909</a> - Windows Search Service Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27913">CVE-2026-27913</a> - Windows BitLocker Security Feature Bypass Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27914">CVE-2026-27914</a> - Microsoft Management Console Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27921">CVE-2026-27921</a> - Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27922">CVE-2026-27922</a> - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32070">CVE-2026-32070</a> - Windows Common Log File System Driver Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32075">CVE-2026-32075</a> - Windows UPnP Device Host Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32093">CVE-2026-32093</a> - Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32152">CVE-2026-32152</a> - Desktop Window Manager Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32154">CVE-2026-32154</a> - Desktop Window Manager Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32155">CVE-2026-32155</a> - Desktop Window Manager Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32162">CVE-2026-32162</a> - Windows COM Elevation of Privilege Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202">CVE-2026-32202</a> - Windows Shell Spoofing Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32225">CVE-2026-32225</a> - Windows Shell Security Feature Bypass Vulnerability</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825">CVE-2026-33825</a> - Microsoft Defender Elevation of Privilege Vulnerability</p><p>A complete list of all other vulnerabilities Microsoft disclosed this month is available on its <a href="https://msrc.microsoft.com/update-guide/">update page</a>. In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that&#xA0;additional&#xA0;rules may be released at a future&#xA0;date&#xA0;and current rules are subject to change pending&#xA0;additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on&#xA0;<a href="http://snort.org/">Snort.org</a>.&#x202F;&#xA0;</p><p>The rules included in this release that protect against the exploitation of many of these vulnerabilities are:&#xA0;1:65902-1:65903, 1:66242-1:66251, 1:66259-1:66260, 1:66264-1:66267, 1:66275-1:66276&#xA0;</p><p>The following Snort 3 rules are also available: 1:301398, 1:301468-1:3101472, 1:301475, 1:301477-1:301478, 1:301480</p>]]></content:encoded></item><item><title><![CDATA[State-sponsored threats: Different objectives, similar access paths]]></title><description><![CDATA[A look at 2025 state-sponsored threats, exploring how actors linked to China, Russia, North Korea, and Iran use vulnerabilities, identity, and trusted access paths to achieve their goals.]]></description><link>https://blog.talosintelligence.com/state-sponsored-threats-different-objectives-similar-access-paths/</link><guid isPermaLink="false">69dce83eab91ce0001a70dab</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Tue, 14 Apr 2026 13:49:46 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/2025YiR-topic_APTs.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/2025YiR-topic_APTs.jpg" alt="State-sponsored threats: Different objectives, similar access paths"><p>Across the&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/"><u>Talos 2025 Year in Review</u></a>, state-sponsored threat activity from China, Russia, North Korea, and Iran all had varying motivations, such as espionage, disruption, financial gain, and geopolitical influence.</p><p>But when you look at how these operations actually unfold, similar tactics, techniques, and procedures (TTPs) keep appearing: access through vulnerabilities and identity, and access that remains under the radar for a considerable period of time.</p><p>Here are the dominant themes from the state-sponsored section of the Talos Year in Review,&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/"><u>available now.</u></a></p><h2 id="china">China</h2><p>China-nexus threat activity stood out this year for both volume and efficiency, with Talos investigations increasing by nearly 75% compared to 2024.</p><p>Newly disclosed vulnerabilities were exploited almost immediately (e.g., ToolShell), sometimes before patches were widely available. At the same time, long-standing, unpatched vulnerabilities in networking devices and widely used software continued to provide reliable entry points for these types of adversary.</p><p>Once inside, the focus shifts to persistence. Web shells, custom backdoors, tunneling tools, and credential harvesting all support long-term access.&#xA0;</p><p>There&#x2019;s also more overlap than ever before between state-sponsored and financially motivated activity. It is likely that in some cases, state-sponsored actors conducted operations for personal profit alongside espionage-focused missions, while in others, cybercriminals collected valuable information during an attack that could be sold to espionage-motivated actors for further exploitation, providing them dual revenue streams.</p><h2 id="russia">Russia</h2><p>Russian-linked cyber activity remains closely tied to their geopolitical objectives, particularly the war in Ukraine.</p><p>Many operations continue to rely on unpatched, older vulnerabilities (especially in networking devices) to gain initial access. These flaws provide a dependable way in for adversaries and support long-term intelligence gathering.</p><p>Russia&#x2019;s offensive cyber activity is highly correlated with developments in the larger geopolitical sphere. For example, the announcement of sanctions intended to apply pressure on Russia by both the U.S. and E.U. often corresponded with our observed levels of Russian cyber activity.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_figsforblog_sanctions.jpg" class="kg-image" alt="State-sponsored threats: Different objectives, similar access paths" loading="lazy" width="1875" height="881" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/YiR_figsforblog_sanctions.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/YiR_figsforblog_sanctions.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/YiR_figsforblog_sanctions.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_figsforblog_sanctions.jpg 1875w" sizes="(min-width: 720px) 720px"></figure><p>Common malware families like Dark Crystal RAT (DCRAT), Remcos RAT, and Smoke Loader appeared frequently in Talos investigations on operations against Ukraine in 2025. These families aren&#x2019;t exclusive to Russia-nexus threat actors, but they continue to be effective in environments where patching and visibility are inconsistent, and should therefore be high priority targets for defense and monitoring.</p><h2 id="north-korea">North Korea</h2><p>North Korea cyber operations leaned heavily into social engineering and insider access in 2025. These operations were both for financial and espionage purposes.</p><p>Campaigns like Contagious Interview (orchestrated by&#xA0;<a href="https://blog.talosintelligence.com/python-version-of-golangghost-rat/"><u>Famous Chollima</u></a>) used fake recruiters from legitimate companies to socially engineering targets to execute code or hand over credentials. From there, actors stole cryptocurrency, exfiltrated data, and established persistent access.</p><p>North Korean cyber actors also pulled off the largest cryptocurrency heist in history in 2025,&#xA0;<a href="https://www.ic3.gov/psa/2025/psa250226?"><u>stealing $1.5 billion</u></a>. Additionally, thousands of IT workers used stolen identities and AI-generated profiles to secure positions at Fortune 500 companies, generating billions in annual revenue for North Korea&#x2019;s nuclear weapons and ballistic missiles programs.</p><figure class="kg-card kg-image-card"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_figsforblog_worker_accounts.jpg" class="kg-image" alt="State-sponsored threats: Different objectives, similar access paths" loading="lazy" width="1875" height="1339" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/YiR_figsforblog_worker_accounts.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/YiR_figsforblog_worker_accounts.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/YiR_figsforblog_worker_accounts.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_figsforblog_worker_accounts.jpg 1875w" sizes="(min-width: 720px) 720px"></figure><h2 id="iran">Iran</h2><p>Iranian cyber threat activity in 2025 combined visible disruption with long-term access.</p><p>Hacktivist operations increased by 60% in response to geopolitical events, particularly the Israel-Hamas conflict. These campaigns, which include distributed denial-of-service (DDoS) attacks, defacements, and other disruptive operations, are often designed to generate attention and shape narratives.</p><p>At the same time, more traditional advanced persistent threat (APT) activity focused on persistence. Groups such as ShroudedSnooper targeted sectors like telecommunications, using custom compact backdoors designed to blend into normal traffic and remain undetected.&#xA0;</p><p>ShroudedSnooper is an APT that public reporting widely&#xA0;<a href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks"><u>attributes</u></a> to Iran&#x2019;s Ministry of Intelligence and Security (MOIS). It is very likely an initial access group that passes operations off to secondary threat actors for long term espionage or destructive attacks.</p><p>For current threat intelligence related to the developing conflict in Iran, follow our coverage on the&#xA0;<a href="https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east/"><u>Talos blog</u></a>.</p><h2 id="guidance-for-defenders">Guidance for defenders</h2><p>Though the state-sponsored activity that we tracked for the Talos Year in Review have different objectives, they still have the same reliance on gaining and maintaining access. The following guidance is recommended for security teams:</p><ul><li><strong>Don&#x2019;t ignore older systems:</strong>&#xA0;Both newly disclosed and long-known vulnerabilities are actively exploited.&#xA0;</li><li><strong>Prioritize identity security:</strong>&#xA0;Credentialed access and social engineering remain reliable entry points.&#xA0;</li><li><strong>Increase visibility into network and edge infrastructure:</strong>&#xA0;These systems are common targets for persistent access.</li><li><strong>Expect activity to follow global events:</strong>&#xA0;Sanctions, conflicts, and political developments often correlate with spikes in activity. Follow the Talos blog to keep informed of new state sponsored activity and campaigns.</li><li><strong>Inspect for long-term presence:</strong>&#xA0;Many state-sponsored operations are designed to persist stealthily over time, not trigger immediate disruption.&#xA0;</li></ul><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/YiR2025_background-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/YiR2025_background-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/YiR2025_background-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg 2000w" loading="lazy" alt="State-sponsored threats: Different objectives, similar access paths"></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="read-the-2025-cisco-talos-year-in-review" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Read the 2025 Cisco Talos Year in Review</span></h2>
                    
                    <a href="https://blog.talosintelligence.com/content/files/2026/03/2025YiR-report.pdf" class="kg-header-card-button kg-style-accent" style="color: #FFFFFF;" data-button-color="accent" data-button-text-color="#FFFFFF">Download now</a>
                </div>
            </div>
        </div>]]></content:encoded></item><item><title><![CDATA[[Video] The TTP Ep. 22: The Collapse of the Patch Window]]></title><description><![CDATA[In this episode of The Talos Threat Perspective, we discuss how vulnerability exploitation is accelerating, and why attacker speed, AI, and exposed systems are affecting the patch window.]]></description><link>https://blog.talosintelligence.com/video-the-ttp-ep-22-the-collapse-of-the-patch-window/</link><guid isPermaLink="false">69d9156bab91ce0001a70d89</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Fri, 10 Apr 2026 15:29:39 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-3.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-3.jpg" alt="[Video] The TTP Ep. 22: The Collapse of the Patch Window"><p>One of the clearest trends in the <a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer">2025 Talos Year in Review</a> is just how quickly vulnerabilities are now being turned into working exploits. What used to take weeks or months is now happening in days, sometimes hours &#x2014; and in some cases, exploitation is beginning almost immediately after vulnerability details are made public.</p><p>The process of exploitation itself is changing. With the increasing availability of proof-of-concept code, automation, and AI-assisted tooling, certain vulnerabilities can very quickly become weaponized, which is what we saw with React2Shell.</p><p>At the same time, the data shows that attackers are not just chasing new vulnerabilities. They are consistently targeting what is exposed, accessible, and valuable.</p><p>On one end of the spectrum, near-instant exploitation.<br>On the other, long-standing vulnerabilities that remain unaddressed.</p><p>Attackers are using a combination of speed, scale, and accessibility to reduce the window defenders have to respond, while increasing the impact when they can&#x2019;t.</p><p>In the latest episode of the Talos Threat Perspective, we explore what the &#x2018;industrialization of exploitation&#x2019; looks like in practice, and what it means for defenders trying to prioritise risk in an increasingly compressed timeline.</p><p>&#x25B6;&#xFE0F; Watch the full episode below.</p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/o1xKzRjKRpE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen title="The TTP Ep. 22: The Collapse of the Patch Window"></iframe></figure><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/03/YiR2025_background-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/03/YiR2025_background-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/03/YiR2025_background-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/03/YiR2025_background-2.jpg 2000w" loading="lazy" alt="[Video] The TTP Ep. 22: The Collapse of the Patch Window"></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="read-the-2025-cisco-talos-year-in-review" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Read the 2025 Cisco Talos Year in Review</span></h2>
                    
                    <a href="https://blog.talosintelligence.com/content/files/2026/03/2025YiR-report.pdf" class="kg-header-card-button kg-style-accent" style="color: #FFFFFF;" data-button-color="accent" data-button-text-color="#FFFFFF">Download now</a>
                </div>
            </div>
        </div>]]></content:encoded></item><item><title><![CDATA[The threat hunter’s gambit]]></title><description><![CDATA[Bill discusses why obsessing over strategy games is actually a secret weapon to outsmart threat actors.]]></description><link>https://blog.talosintelligence.com/the-threat-hunters-gambit/</link><guid isPermaLink="false">69d6ae38ab91ce0001a70d5f</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[William Largent]]></dc:creator><pubDate>Thu, 09 Apr 2026 18:00:20 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/threat_source-1.jpg" alt="The threat hunter&#x2019;s gambit"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p><em>&#x201C;Study hard what interests you the most in the most undisciplined, irreverent and original manner possible.&#x201D; &#x2015; Richard Feynman&#xA0;</em>&#xA0;</p><p><em>&#x201C;I had discovered that learning something, no matter how complex, wasn&apos;t hard when I had a reason to want to know it.&#x201D; &#x2015; Homer Hickam, Rocket Boys&#xA0;</em>&#xA0;</p><p>*looks&#xA0;around at&#xA0;-&#xA0;gestures&#xA0;-&#xA0;everything*&#xA0;&#xA0;</p><p>*opens&#xA0;a new tab in the browser, takes in the newest news on AI,&#xA0;a new tab&#xA0;on supply chains,&#xA0;a new tab&#xA0;on vulnerability,&#xA0;and&#xA0;a new tab&#xA0;on active exploitation and zero-days*&#xA0;&#xA0;&#xA0;</p><p>*closes&#xA0;tabs&#xA0;and&#xA0;throws laptop into&#xA0;the nearest bin,&#xA0;&#xE0; la&#xA0;Ron&#xA0;Swanson*&#xA0;&#xA0;</p><p>*opens&#xA0;other&#xA0;laptop, avoids the internet*&#xA0;&#xA0;</p><p>*puts&#xA0;on headphones&#xA0;for&#xA0;deep work binaural audio*&#xA0;&#xA0;</p><p>*cracks&#xA0;knuckles*&#xA0;&#xA0;</p><p>I&#x2019;m&#xA0;often asked about why I&#xA0;bring up&#xA0;board games and video games when interviewing perspective analysts or threat hunters,&#xA0;so&#xA0;I&#x2019;m&#xA0;going to give the&#xA0;8,000 foot&#xA0;view on my thoughts. With everything that is going on, now more than ever we need the most curious people on the planet on our side.&#xA0;&#xA0;&#xA0;</p><p>What&#x2019;s&#xA0;the very first and most&#xA0;important step&#xA0;to securing any environment? Knowing the environment,&#xA0;inside and out. When you&#xA0;play&#xA0;any&#xA0;gameyou&#xA0;must understand the&#xA0;rules:&#xA0;the&#xA0;standard opening moves of chess,&#xA0;or&#xA0;Go,&#xA0;or&#xA0;perhaps the&#xA0;common resource-gathering patterns in strategy games. Once you understand&#xA0;what &quot;normal&quot;&#xA0;play looks like, you can&#xA0;immediately&#xA0;spot when an opponent makes a move that is inefficient or unusual&#xA0;&#x2014;&#xA0;an anomalous trigger&#xA0;that, if spotted, can lead to victory.&#xA0;&#xA0;&#xA0;</p><p>When experienced players recognize patterns (a specific chess gambit, a defensive build in a strategy game, etc.),&#xA0;they&#xA0;don&apos;t&#xA0;just react to the current move&#xA0;&#x2014;&#xA0;they predict&#xA0;several moves into the future&#xA0;from both players,&#xA0;especially&#xA0;if they know their&#xA0;opponents&apos;&#xA0;tendencies.&#xA0;As players gain experience and play against&#xA0;other&#xA0;skilled&#xA0;players,&#xA0;they begin&#xA0;involving feints or decoys (false&#xA0;flags, if&#xA0;you will). A player might sacrifice a minor piece to distract you from their true&#xA0;objective. Learning to look past that &quot;noise&quot; to find the real&#xA0;motivation is the key to taking your experience and skill to the next level.&#xA0;&#xA0;&#xA0;</p><p>Threat actors rarely follow a predictable script. They constantly evolve tactics, techniques, and procedures (TTPs). Developing the mental flexibility to handle&#xA0;those unexpected, non-standard behaviors is essential in&#xA0;identifying&#xA0;the unknowns.&#xA0;&#xA0;</p><p>The transition from board games to threat hunting is rooted in the development of critical thinking and situational awareness. While board games provide a controlled environment to practice these skills, the core competency &#x2014; that ability to&#xA0;identify&#xA0;the why behind a deviation&#xA0;&#x2014;&#xA0;is exactly what will make you a successful threat hunter.&#xA0;&#xA0;</p><p><em>&#x201C;I prefer to speak in metaphor: That way, no logic can trap me, and no rule can bind me, and no fact can limit me or decide for me what&#x2019;s possible.&#x201D; &#x2015; Claire&#xA0;Oshetsky, Chouette</em>&#xA0;</p><h2 id="the-one-big-thing">The one&#xA0;big thing&#xA0;</h2><p>Cisco Talos has&#xA0;observed&#xA0;threat actors&#xA0;<a href="https://blog.talosintelligence.com/weaponizing-saas-notification-pipelines/" rel="noreferrer noopener"><u>weaponizing legitimate SaaS notification pipelines</u></a>, such as those in GitHub and Jira, to deliver phishing and spam emails. By&#xA0;leveragingthese platforms&apos; official infrastructure, attackers bypass traditional email authentication protocols like SPF, DKIM, and DMARC. This &quot;Platform-as-a-Proxy&quot; (PaaP) technique exploits the implicit trust organizations place in system-generated notifications to&#xA0;facilitate&#xA0;credential harvesting. These campaigns effectively mask malicious intent behind the reputation of trusted enterprise tools.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>Traditional email security gateways are often blind to these attacks because the emails are technically authenticated and originate from verified, trusted domains. This technique exploits &quot;automation fatigue,&quot; where users are conditioned to reflexively trust system-generated alerts from business-critical platforms. Consequently, attackers can bypass standard perimeter defenses, making it harder to distinguish between legitimate business communications and sophisticated phishing attempts.&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Transition to a Zero-Trust approach by implementing instance-level verification and cross-referencing notifications against internal SaaS directories. Security teams should ingest SaaS API logs into their SIEM to detect anomalous precursor activities, such as suspicious project creation or mass invitations. Additionally, introduce friction for high-risk interactions by requiring out-of-band verification and apply semantic intent analysis to&#xA0;identify&#xA0;notifications that deviate from a platform&apos;s established functional baseline.&#xA0;</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h2><p><strong>Tech giants launch AI-powered &#x201C;Project</strong>&#xA0;<strong>Glasswing&#x201D;</strong>&#xA0;<br>Major technology companies have joined forces&#xA0;in an effort to&#xA0;use advanced artificial intelligence to&#xA0;identify&#xA0;and address security flaws in the world&#x2019;s most critical software systems. (<a href="https://cyberscoop.com/project-glasswing-anthropic-ai-open-source-software-vulnerabilities/" rel="noreferrer noopener"><u>CyberScoop</u></a>)&#xA0;</p><p><strong>Russian government hackers broke into thousands of home routers to steal passwords</strong>&#xA0;<br>Fancy Bear, or APT 28, is known for its high-profile hacks and spying operations, including the breach of the&#xA0;U.S. Democratic National Committee in 2016&#xA0;and&#xA0;the destructive hack that hit satellite provider&#xA0;Viasat&#xA0;in 2022. (<a href="https://techcrunch.com/2026/04/07/russian-government-hackers-broke-into-thousands-of-home-routers-to-steal-passwords/" rel="noreferrer noopener"><u>TechCrunch</u></a>)&#xA0;</p><p><strong>Storm-1175 deploys Medusa ransomware at &#x201C;high velocity&#x201D;</strong>&#xA0;<br>Storm-1175 has rapidly exploited more than a dozen n-days, the most recent of which is CVE-2026-1731, a critical remote code execution flaw in&#xA0;BeyondTrust&#xA0;Remote Support and older versions of the vendor&apos;s Privileged Remote Access. (<a href="https://www.darkreading.com/threat-intelligence/storm-1175-medusa-ransomware-high-velocity" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><p><strong>North Korean hackers pose</strong>&#xA0;<strong>as</strong>&#xA0;<strong>trading firm to steal $285M from Drift</strong>&#xA0;<br>A&#xA0;group of individuals approached Drift staff at a &#x201C;major crypto conference,&#x201D; presenting as a professional quantitative trading firm. They&#xA0;went&#xA0;so far as&#xA0;to deposit $1M&#xA0;of their own money into a Drift Ecosystem Vault between December 2025 and January 2026.&#xA0;(<a href="https://hackread.com/north-korean-hackers-trading-firm-drift-protocol/" rel="noreferrer noopener"><u>HackRead</u></a>)&#xA0;</p><p><strong>Telehealth giant Hims &amp; Hers says its customer support system was hacked</strong>&#xA0;<br>A spokesperson for Hims &amp; Hers said the company was hit by a social engineering attack, and the stolen data &#x201C;primarily included customer names and email addresses.&#x201D; (<a href="https://techcrunch.com/2026/04/02/telehealth-giant-hims-hers-says-its-customer-support-system-was-hacked/" rel="noreferrer noopener"><u>TechCrunch</u></a>)&#xA0;</p><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t&#xA0;get enough Talos?&#xA0;</h2><p><a href="https://blog.talosintelligence.com/new-lua-based-malware-lucidrook/" rel="noreferrer noopener"><strong><u>New Lua-based malware</u></strong>&#xA0;<strong><u>observed</u></strong>&#xA0;<strong><u>in targeted attacks against Taiwanese organizations</u></strong></a>&#xA0;<br>Cisco Talos uncovered a cluster of&#xA0;activity&#xA0;we track as UAT-10362 conducting spear-phishing campaigns against Taiwanese non-governmental&#xA0;organizations&#xA0;(NGOs)&#xA0;and suspected universities to deliver a newly identified malware family,&#xA0;&#x201C;LucidRook.&#x201D;&#xA0;</p><p><a href="https://blog.talosintelligence.com/year-in-review-vulnerabilities-old-and-new-and-something-react2/" rel="noreferrer noopener"><strong><u>Vulnerabilities old and new and something React2</u></strong></a>&#xA0;<br>2025 was characterized by an unending beat-down on infrastructure that relied on older enmeshed dependencies (e.g., Log4j and&#xA0;PHPUnit), while React2Shell&#xA0;rocketed&#xA0;to the highest percentage of attacks for the entire year within the last&#xA0;three&#xA0;weeks of the year.&#xA0;</p><p><a href="https://blog.talosintelligence.com/from-the-field-to-the-report-and-back-again-how-incident-responders-can-use-the-year-in-review/" rel="noreferrer noopener"><strong><u>From the field to the report and back again</u></strong></a>&#xA0;<br>The same Year in Review report that Talos IR casework&#xA0;feeds into&#xA0;is the report that defenders should be feeding back into their own preparation cycles.&#xA0;Here&#x2019;s&#xA0;how you can start.&#xA0;</p><p><a href="https://www.buzzsprout.com/admin/2018149/episodes/18968770-2025-s-ransomware-trends-and-zombie-vulnerabilities" rel="noreferrer noopener"><strong><u>Talos Takes:</u></strong>&#xA0;<strong><u>2025&apos;s</u></strong>&#xA0;<strong><u>ransomware trends and zombie vulnerabilities</u></strong></a>&#xA0;<br>In this episode, Amy and Pierre Cadieux unpack the ransomware and vulnerability trends that defined 2025. From the persistent ransomware threats targeting the manufacturing sector to the rise of stealthy &quot;living off the land&quot; tactics, we break down what these shifts mean for your defense strategy.&#xA0;</p><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><ul><li><a href="https://www.offensivecon.org/" rel="noreferrer noopener"><u>OffensiveCon</u></a>&#xA0;(May 15 &#x2013; 16)&#xA0;Berlin, Germany&#xA0;</li></ul><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;</h2><p><strong>SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</strong>&#xA0;&#xA0;<br>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</u></a>&#xA0;<br>Example Filename: VID001.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;Win.Worm.Coinminer::1201&#xA0;</p><p><strong>SHA256: 90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</strong>&#xA0;<br>MD5: c2efb2dcacba6d3ccc175b6ce1b7ed0a&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=90b1456cdbe6bc2779ea0b4736ed9a998a71ae37390331b6ba87e389a49d3d59</u></a>&#xA0;<br>Example Filename: APQ9305.dll&#xA0;&#xA0;<br>Detection Name: Auto.90B145.282358.in02&#xA0;</p><p><strong>SHA256: 38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</strong>&#xA0;&#xA0;<br>MD5: 41444d7018601b599beac0c60ed1bf83&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=38d053135ddceaef0abb8296f3b0bf6114b25e10e6fa1bb8050aeecec4ba8f55</u></a>&#xA0;<br>Example&#xA0;Filename:&#xA0;content.js&#xA0;&#xA0;<br>Detection Name: W32.38D053135D-95.SBX.TG&#xA0;</p><p><strong>SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</strong>&#xA0;&#xA0;<br>MD5: 7bdbd180c081fa63ca94f9c22c457376&#xA0;&#xA0;<br>Talos Rep: https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91&#xA0;&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_62_Exe.exe&#xA0;<br>Detection Name:&#xA0;Win.Dropper.Miner::95.sbx.tg**&#xA0;</p><p><strong>SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</strong>&#xA0;&#xA0;<br>MD5: aac3165ece2959f39ff98334618d10d9&#xA0;&#xA0;<br>Talos Rep:&#xA0;<a href="https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974" rel="noreferrer noopener"><u>https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974</u></a>&#xA0;<br>Example Filename:&#xA0;d4aa3e7010220ad1b458fac17039c274_63_Exe.exe&#xA0;&#xA0;<br>Detection Name:&#xA0;W32.Injector:Gen.21ie.1201&#xA0;</p><p><strong>SHA256: 5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe</strong>&#xA0;&#xA0;<br>MD5: a2cf85d22a54e26794cbc7be16840bb1&#xA0;&#xA0;<br>Talos Rep: https://talosintelligence.com/talos_file_reputation?s=5e6060df7e8114cb7b412260870efd1dc05979454bd907d8750c669ae6fcbcfe&#xA0;&#xA0;<br>Example Filename:&#xA0;a2cf85d22a54e26794cbc7be16840bb1.exe&#xA0;&#xA0;<br>Detection Name: W32.5E6060DF7E-100.SBX.TG</p>]]></content:encoded></item><item><title><![CDATA[From the field to the report and back again: How incident responders can use the Year in Review]]></title><description><![CDATA[The Year in Review distills Talos IR's observations into structured intelligence, but defenders should also be feeding this report back into their own preparation cycles. Here's how.]]></description><link>https://blog.talosintelligence.com/from-the-field-to-the-report-and-back-again-how-incident-responders-can-use-the-year-in-review/</link><guid isPermaLink="false">69d3f544421b250001704338</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Jerzy ‘Yuri’ Kramarz]]></dc:creator><pubDate>Thu, 09 Apr 2026 10:00:03 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/2025YiR-topic_IR.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/2025YiR-topic_IR.jpg" alt="From the field to the report and back again: How incident responders can use the Year in Review"><p>Every year, Cisco Talos publishes&#xA0;<a href="https://blog.talosintelligence.com/category/year-in-review/" rel="noreferrer noopener"><u>Year in Review</u></a>, a comprehensive look at the&#xA0;previous year&#x2019;s&#xA0;threat landscape.&#xA0;It&#x2019;s&#xA0;drawn from an enormous volume of telemetry,&#xA0;such&#xA0;as&#xA0;endpoint detections, network traffic, email data, and&#xA0;boots-on-the-ground&#xA0;<a href="https://blog.talosintelligence.com/category/ctir-trends/" rel="noreferrer noopener"><u>Cisco Talos Incident</u>&#xA0;<u>Response (Talos</u>&#xA0;<u>IR)</u>&#xA0;<u>engagements</u></a>.&#xA0;</p><p>As incident responders,&#xA0;we see&#xA0;threats&#xA0;mid-detonation in the wreckage of&#xA0;an&#xA0;Active Directory environment,&#xA0;or&#xA0;in&#xA0;the lateral movement artifacts left behind by an affiliate who got in using nothing more than a valid account. The&#xA0;Year in Review&#xA0;distills those raw&#xA0;observations into structured intelligence,&#xA0;but&#xA0;that intelligence loop works both ways. The same report that our IR casework&#xA0;feeds into&#xA0;is the report that defenders should be feeding back into their own preparation cycles.</p><h2 id="ir-casework-shapes-the-year-in-review-the-year-in-review-shapes-your-readiness">IR casework shapes the&#xA0;Year in Review, the&#xA0;Year in&#xA0;Review&#xA0;shapes your readiness&#xA0;</h2><p>When Talos IR&#xA0;closes out&#xA0;an engagement&#xA0;with customers, the tactics,&#xA0;techniques, and procedures (TTPs) we&#xA0;observe&#xA0;through&#xA0;forensic work and analysis&#xA0;are catalogued, aggregated, and analyzed alongside broader&#xA0;Cisco&#xA0;telemetry.&#xA0;When we track the emergence of a new exploit like React2Shell redefining attacker&#xA0;speed,&#xA0;or&#xA0;when we&#xA0;see&#xA0;Qilin&#xA0;rise to dominate the ransomware landscape while legacy groups like&#xA0;others&#xA0;maintain&#xA0;rare, sustained&#xA0;momentum, those shifts in the adversary ecosystem become the intelligence that informs&#xA0;what&#xA0;we are on the lookout for during&#xA0;the&#xA0;next investigation.&#xA0;When we&#xA0;observe&#xA0;patterns of behavior, they&#xA0;may&#xA0;form&#xA0;trend lines&#xA0;that&#xA0;<a href="https://blog.talosintelligence.com/ir-trends-q4-2025/" rel="noreferrer noopener"><u>span multiple years</u></a>&#xA0;and&#xA0;reveal how the landscape is evolving.&#xA0;</p><p>For defenders, this means the&#xA0;Year in Review&#xA0;is not a theoretical document.&#xA0;It is a distillation of what&#xA0;actually happened&#xA0;to organizations&#xA0;we respond to, investigated by the people who were in the room when&#xA0;things broke down.&#xA0;Here are some&#xA0;suggestions on how to operationalize these findings.</p><h2 id="turning-findings-into-tabletop-scenarios">Turning findings into tabletop scenarios&#xA0;</h2><p>One of the most immediate and practical applications of&#xA0;Year in Review&#xA0;is&#xA0;raw material for tabletop exercises. The report hands&#xA0;you&#xA0;the adversary playbook.&#xA0;For example, the 2024&#xA0;Year in Review&#xA0;highlighted that identity-based attacks accounted for 60% of all Talos IR cases, with Active Directory being the focal point in 44% of those incidents. Attackers were not breaking down doors with zero-days; rather, they were walking through the front door with stolen credentials, often bypassing&#xA0;multi-factor authentication (MFA)&#xA0;through push fatigue, misconfigured policies, or the simple fact that MFA was never fully enrolled in the first place&#xA0;for some accounts.&#xA0;&#xA0;</p><p>The&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview" rel="noreferrer noopener"><u>2025</u>&#xA0;<u>Year in Review</u></a>&#xA0;reinforces and deepens this picture. Attacks against MFA evolved significantly, with MFA spray attacks&#xA0;doubling down&#xA0;on&#xA0;identity and access management (IAM)&#xA0;infrastructure while expanding efforts against high-value privileged accounts. Device compromise attacks saw a significant rise in activity, showing that actors increasingly value reliable, repeatable access methods over one-off exploitation. These are adversary preferences that should directly shape your exercise scenariosand cybersecurity preparedness.&#xA0;</p><p>That is a ready-made tabletop scenario.&#xA0;Work with&#xA0;your team&#xA0;on this exact entry scenario&#xA0;and walk through&#xA0;it just as&#xA0;adversary would.&#xA0;An adversary&#xA0;authenticates&#xA0;to your VPN. MFA fires, but the user approves the push because they were already expecting a login prompt. The attacker is now inside your perimeter with legitimate access. What does your detection look like? How quickly do your analysts&#xA0;identify&#xA0;the anomaly? Who makes the call to force a password&#xA0;reset&#xA0;and revoke sessions?&#xA0;These are some good questions to&#xA0;cover&#xA0;in&#xA0;this scenario.&#xA0;The 2025&#xA0;Year in Review&#xA0;found that actors tailor their MFA attack style depending on the sector, and that manufacturing was the most impacted sector for ransomware in 2025, underscoring persistent risk to repeatedly targeted industries. If you&#xA0;operate&#xA0;in manufacturing, health&#xA0;care, or another sector that has appeared consistently in ransomware targeting data, your tabletop should reflect the specific TTPs directed at your&#xA0;vertical&#xA0;&#x2014;&#xA0;not a generic ransomware exercise. These are just some ideas to get started on&#xA0;scenarios.</p><h2 id="validate-your-detections-against-real-world-tradecraft">Validate your detections against real-world tradecraft&#xA0;</h2><p>Beyond tabletops, the&#xA0;Year in Review&#xA0;provides a prioritized list of what to test your detections against. Year after year,&#xA0;Talos&#xA0;IR engagements reveal a consistent core of adversary tradecraft that organizations&#xA0;are still struggling to detect. Tools like PowerShell and&#xA0;Mimikatz&#xA0;appear in&#xA0;a significant portion&#xA0;of engagements. Remote services such as RDP and SSH continue to be abused for lateral movement. Ransomware operators are increasingly disabling security solutions before deploying payloads, and in 2024, they succeeded in doing so at an alarming rate.&#xA0;</p><p>The 2025&#xA0;Year in Review&#xA0;adds critical nuance to detection priorities through its vulnerability analysis. The top 10 most&#xA0;targeted vulnerabilities tell a story about what attackers reach for. React2Shell redefined attacker speed and targeting,&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview" rel="noreferrer noopener"><u>compressing the window between disclosure and exploitation</u></a>.&#xA0;ToolShell&apos;s&#xA0;quick rise to the top five highlighted the sheer volume and impact of attacks exploiting development tool vulnerabilities.&#xA0;</p><p>For defenders, this is a&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview" rel="noreferrer noopener"><u>checklist</u></a>. Can your&#xA0;endpoint detection and response (EDR)&#xA0;detect and&#xA0;alert on&#xA0;the disabling of its own agent? Do you have detections for credential dumping from LSASS&#xA0;or web shell deployment?&#xA0;What about a scenario where direct exploitation takes place, but no web shell is deployed?&#xA0;Are you&#xA0;monitoring for&#xA0;anomalous&#xA0;Remote Desktop Protocol (RDP)&#xA0;sessions originating from unexpected source hosts?&#xA0;The&#xA0;Year in Review&#xA0;tells you what the adversary is&#xA0;actually doing, not what they might hypothetically do.&#xA0;That distinction is critical when you are prioritizing&#xA0;detection&#xA0;engineering&#xA0;across your organization.&#xA0;</p><p>Map these findings to the MITRE ATT&amp;CK framework, which the Talos&#xA0;Quarterly IR&#xA0;Trend&#xA0;Reports and the&#xA0;Year in Review&#xA0;already reference, and you have a structured way to assess your coverage gaps. If valid account abuse is the dominant&#xA0;initial&#xA0;access technique and your detections are heavily weighted toward exploit-based intrusions, you have a mismatch between your defensive posture and the actual&#xA0;threat&#xA0;landscape.</p><h2 id="stress-test-your-ir-plan-not-just-your-tooling">Stress-test your IR plan, not just your tooling&#xA0;</h2><p>The&#xA0;Year in Review&#xA0;also reveals&#xA0;patterns in&#xA0;where&#xA0;organizations struggle that go beyond technology. Across multiple years of IR engagements, common security weaknesses keep surfacing: incomplete asset inventories, inconsistent logging, missing or misconfigured MFA, inadequate network segmentation, and unpatched or end-of-life network devices that&#xA0;remain&#xA0;exposed. The&#xA0;<a href="https://blog.talosintelligence.com/2024yearinreview/" rel="noreferrer noopener"><u>2024 report noted</u></a>&#xA0;that some of the most targeted network vulnerabilities affected end-of-life devices with no available patches, yet those devices remained in production environments. The&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview" rel="noreferrer noopener"><u>2025 data reinforce</u></a>&#xA0;this with even sharper clarity:&#xA0;&#xA0;<a href="https://blog.talosintelligence.com/uat-9686/" rel="noreferrer noopener"><u>Legacy systems remain highly vulnerable to attack</u></a>, CVE age distribution data highlights systemic patch delays, and a small number of vulnerabilities in network infrastructure continue to drive outsized risk.&#xA0;</p><p>Two&#xA0;additional&#xA0;areas from the 2025&#xA0;report&#xA0;deserve attention in your planning cycle. First, phishing continues to evolve. Phishing plays a key role in both&#xA0;initial&#xA0;access and post-compromise activity, with&#xA0;business email compromise-style and workflow-based lures&#xA0;remaining&#xA0;the primary theme. Travel and&#xA0;logistics&#xA0;lures surged, while political lures dropped&#xA0;off&#xA0;and IT-themed lures became more prominent.&#xA0;These shifts matter for security awareness training;&#xA0;if your phishing simulations are still heavily weighted toward current-events&#xA0;lures, they may not reflect what your users are&#xA0;encountering.&#xA0;</p><p>Second, the&#xA0;<a href="https://blog.talosintelligence.com/using-ai-to-defeat-ai/" rel="noreferrer noopener"><u>AI threat landscape</u></a>&#xA0;warrants monitoring. The 2025&#xA0;observations&#xA0;include&#xA0;dedicated coverage of how AI is shaping the threat environment. While the full scope of AI-enabled threats is still&#xA0;emerging, defenders should consider how AI may be lowering the barrier for adversaries in areas like phishing content generation, vulnerability discovery, and social engineering at scale.&#xA0;Your&#xA0;<a href="https://talosintelligence.com/incident_response/plans" rel="noreferrer noopener"><u>IR</u>&#xA0;<u>plans</u></a>&#xA0;should be tested,&#xA0;validated,&#xA0;and&#xA0;updated to handle&#xA0;the&#xA0;new security regime&#xA0;we find ourselves in.&#xA0;</p><h2 id="build-a-year-round-preparation-cadence">Build a year-round preparation cadence&#xA0;</h2><p>Rather than treating the&#xA0;Year in Review&#xA0;as&#xA0;a&#xA0;one-time read, consider building a recurring preparation cycle around&#xA0;it. When the&#xA0;report&#xA0;drops, review the top-level findings with your security leadership and&#xA0;identify&#xA0;the three or four trends most relevant to your environment. In the quieter early months, run a tabletop exercise built around the most applicable scenario. Through the middle of the year,&#xA0;use&#xA0;Quarterly IR&#xA0;Trend&#xA0;Report&#xA0;data to adjust detection priorities and&#xA0;validate&#xA0;coverage. Before year-end, when threat activity tends to intensify, conduct a focused review of your IR plan.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations]]></title><description><![CDATA[Cisco Talos uncovered a cluster of activity we track as UAT-10362 conducting spear-phishing campaigns against Taiwanese non-governmental organizations (NGOs) and suspected universities to deliver a newly identified malware family, “LucidRook.” ]]></description><link>https://blog.talosintelligence.com/new-lua-based-malware-lucidrook/</link><guid isPermaLink="false">69d3eaf8421b2500017042af</guid><category><![CDATA[Threat Spotlight]]></category><dc:creator><![CDATA[Ashley Shen]]></dc:creator><pubDate>Wed, 08 Apr 2026 10:00:55 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Taiwan-NGO-Header.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>Cisco Talos uncovered a cluster of&#xA0;activity&#xA0;we track as UAT-10362 conducting spear-phishing campaigns against Taiwanese non-governmental&#xA0;organizations&#xA0;(NGOs)&#xA0;and suspected universities to deliver a newly identified malware family,&#xA0;&#x201C;LucidRook.&#x201D;&#xA0;</li><li>LucidRook&#xA0;is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a&#xA0;dynamic-link library (DLL)&#xA0;to download and execute staged Lua bytecode&#xA0;payloads.&#xA0;The dropper&#xA0;&#x201C;LucidPawn&#x201D;&#xA0;uses region-specific anti-analysis checks and executes only in Traditional Chinese language environments associated with Taiwan.&#xA0;</li><li>Talos&#xA0;identified&#xA0;two distinct infection chains used to deliver&#xA0;LucidRook, involving malicious LNK and EXE files disguised as antivirus&#xA0;software.&#xA0;In both cases, the actor abused&#xA0;an&#xA0;Out-of-band Application Security Testing (OAST)&#xA0;service&#xA0;and&#xA0;compromised FTP servers&#xA0;for&#xA0;command-and-control (C2) infrastructure.&#xA0;</li><li>Through hunting for&#xA0;LucidRook, we discovered&#xA0;&#x201C;LucidKnight,&#x201D;&#xA0;a companion reconnaissance tool that exfiltrates system information via Gmail. Its presence alongside&#xA0;LucidRook&#xA0;suggests the actor&#xA0;operates a tiered toolkit, potentially using&#xA0;LucidKnight&#xA0;to profile targets before escalating to full stager deployment.&#xA0;</li><li>The multi-language modular design,&#xA0;layered anti-analysis features, stealth-focused payload handling of the malware, and reliance on compromised or public infrastructure indicate UAT-10362&#xA0;is a capable threat actor with mature operational tradecraft.</li></ul><hr><h2 id="spear-phishing-campaigns-against-taiwanese-ngos-and-universities">Spear-phishing&#xA0;campaigns&#xA0;against Taiwanese NGOs and&#xA0;universities&#xA0;</h2><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Taiwan-NGO-Header.jpg" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations"><p>Cisco Talos&#xA0;observed&#xA0;a spear-phishing attack delivering&#xA0;LucidRook, a newly identified stager that targeted&#xA0;a&#xA0;Taiwanese&#xA0;NGO&#xA0;in October&#xA0;2025. The metadata in the email suggests that it was delivered via authorized mail infrastructure, which implies potential misuse of legitimate sending capabilities.</p><p>The email&#xA0;contained&#xA0;a shortened URL that leads to the download of a password&#xA0;protected&#xA0;and&#xA0;encrypted RAR archive. The decryption password was included in the email body. Based on this email and the collected samples, Talos observed two distinct infection chains originating from the delivered archives.&#xA0;</p><h2 id="decoy-files">Decoy&#xA0;files&#xA0;</h2><p>In the infection chain, the threat actor deployed a dropper that opens&#xA0;the decoy documents included in the bundle. One&#xA0;example&#xA0;decoy file is&#xA0;a&#xA0;letter issued by the Taiwanese government to universities in Taiwan. This document is a formal directive reminding national universities that teachers with administrative roles are legally required to obtain prior approval and file attendance records before traveling to China.&#xA0;An&#xA0;official&#xA0;version of this&#xA0;document can be found on the&#xA0;Taiwanese&#xA0;government website.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure1-2.jpg" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="1801" height="999" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure1-2.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure1-2.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure1-2.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure1-2.jpg 1801w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 1.&#xA0;Decoy&#xA0;file.</span></figcaption></figure><h2 id="two-infection-chains">Two&#xA0;infection&#xA0;chains&#xA0;</h2><p>Talos&#xA0;identified&#xA0;two infection chains used to deploy&#xA0;LucidRook. Both were multi-stage and&#xA0;began with either an LNK or an EXE launcher. The LNK infection chain uses&#xA0;an initial&#xA0;dropper Talos tracks&#xA0;as&#xA0;LucidPawn.&#xA0;</p><h3 id="lnk-based-infection-chain">LNK-based infection chain</h3><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Taiwan-NGO-01.jpg" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="2000" height="1366" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Taiwan-NGO-01.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Taiwan-NGO-01.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Taiwan-NGO-01.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/Taiwan-NGO-01.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 2.&#xA0;LNK-based infection&#xA0;chain.</span></figcaption></figure><p>The LNK-based infection chain was&#xA0;observed&#xA0;in both the sample&#xA0;targeting Taiwanese NGOs (which were&#xA0;distributed via spear-phishing emails)&#xA0;and the sample&#xA0;we&#xA0;suspect&#xA0;targeted&#xA0;Taiwanese universities. Both samples&#xA0;were&#xA0;delivered as an archive,&#xA0;containing&#xA0;an LNK file with a document file with&#xA0;substituted&#xA0;PDF file icon, as well as a hidden directory in the folder, as shown in&#xA0;Figure 3.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure3.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="1116" height="172" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure3.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure3.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure3.png 1116w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 3.&#xA0;LNK with substituted icon in the&#xA0;archive.</span></figcaption></figure><p>The hidden directory&#xA0;contains&#xA0;four layers of nested folders designed to evade&#xA0;analysis.&#xA0;The&#xA0;fourth-level directory&#xA0;contains&#xA0;the LucidPawn dropper sample (<code>DismCore.dll</code>), a legitimate EXE file (<code>install.exe</code>),&#xA0;and a decoy file. An example folder structure is shown&#xA0;in Figure 4.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure4.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="1750" height="676" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure4.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure4.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure4.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure4.png 1750w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 4.&#xA0;File structure of the malicious archive.</span></figcaption></figure><p>When the user clicks the LNK file, it executes the PowerShell testing framework script&#xA0;<code>C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Build.bat</code>, passing the path to binaries&#xA0;located&#xA0;in the hidden directory&#xA0;in order to&#xA0;launch the embedded malware. This is a&#xA0;<a href="https://lolbas-project.github.io/lolbas/Scripts/pester/" rel="noreferrer noopener"><u>known technique</u></a>&#xA0;that&#xA0;leverages&#xA0;living-off-the-land&#xA0;binaries and&#xA0;scripts (LOLBAS) to evade detection.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure5.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="1750" height="434" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure5.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure5.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure5.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure5.png 1750w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 5. LNK target metadata.</span></figcaption></figure><p>The PowerShell process executes the following command:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure6.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="1750" height="596" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure6.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure6.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Figure6.png 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure6.png 1750w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 6.&#xA0;PowerShell&#xA0;process execution command.</span></figcaption></figure><p>The&#xA0;<code>index.exe</code>&#xA0;file is a legitimate Windows binary associated with the Deployment Image Servicing and Management (DISM) framework. It is abused as a loader to&#xA0;<a href="https://hijacklibs.net/entries/microsoft/built-in/dismcore.html" rel="noreferrer noopener"><u>sideload</u></a>&#xA0;LucidPawn via DLL search order hijacking.</p><p>The LucidPawn dropper embeds two AES-encrypted binaries: a legitimate DISM executable and the&#xA0;LucidRook&#xA0;stager. Upon execution, both binaries are decrypted and written to&#xA0;<code>%APPDATA%\Local\Microsoft\WindowsApps\</code>, with the DISM executable renamed to&#xA0;<code>msedge.exe</code>&#xA0;to impersonate&#xA0;the Microsoft Edge browser and the&#xA0;LucidRook&#xA0;stager written as&#xA0;<code>DismCore.dll</code>.&#xA0;Persistence is&#xA0;established&#xA0;via a LNK file in the Startup folder that launches&#xA0;<code>msedge.exe</code>. After dropping the binaries, LucidPawn launches the DISM executable to sideload the&#xA0;LucidRook&#xA0;stager.&#xA0;&#xA0;</p><p>The LucidPawn dropper also handles decoy documents by locating files with specific document extensions (.pdf, .docx, .doc, .xlsx) in the working directory, copying them to the first layer directory, deleting the original lure LNK file, and opening the decoy using Microsoft Edge to distract the victim.</p><h3 id="exe-based-infection-chain">EXE-based infection chain&#xA0;&#xA0;</h3><p>The second infection chain leverages only a malicious EXE written in the .NET&#xA0;framework without the LucidPawn dropper.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Taiwan-NGO-02.jpg" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="2000" height="1477" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Taiwan-NGO-02.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Taiwan-NGO-02.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/Taiwan-NGO-02.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w2400/2026/04/Taiwan-NGO-02.jpg 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 7.&#xA0;EXE-based infection&#xA0;chain.</span></figcaption></figure><p>Talos&#xA0;observed the EXE-based infection chain in samples uploaded to public malware&#xA0;repositories in December 2025. The samples were distributed as password&#xA0;protected 7-Zip archives&#xA0;named &#x201C;Cleanup(&#x5BC6;&#x78BC;&#xFF1A;33665512).7z&#x201D;.&#xA0;Based on the Traditional Chinese language&#xA0;used in the archive filename, the language shown in the malicious dropper,&#xA0;and the&#xA0;geographic context of the sample upload locations, we assess with moderate to high&#xA0;confidence that the campaign was intended to target Taiwanese entities.</p><p>The 7-Zip archive&#xA0;contains&#xA0;a single executable file named&#xA0;<code>Cleanup.exe</code>. The extracted&#xA0;binary masquerades as Trend Micro&#x2122; Worry-Free&#x2122; Business Security Services, using a&#xA0;forged application name and icon to impersonate a legitimate security product. In addition,&#xA0;the binary&#xA0;contains&#xA0;a compilation timestamp that is clearly falsified (2065-01-12 14:12:28&#xA0;UTC).</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure8.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="230" height="188"><figcaption><span style="white-space: pre-wrap;">Figure 8.&#xA0;The EXE dropper forged as Trend Micro&#xA0;product.</span></figcaption></figure><p>The executable is a simple dropper written with the .NET framework. It embeds three&#xA0;binary&#xA0;files as Base64-encoded data within its code and, upon execution, decodes and drops these files into the&#xA0;<code>C:\ProgramData</code>&#xA0;directory. The dropped files include a legitimate DISM&#xA0;executable, the&#xA0;LucidRook&#xA0;stager, and a LNK file placed in the Startup folder to&#xA0;establish&#xA0;persistence.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure9.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="1450" height="730" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure9.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure9.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure9.png 1450w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 9.&#xA0;Decompiled code of the EXE&#xA0;dropper.</span></figcaption></figure><p>After execution, the program displays a decoy message box claiming that the cleanup process has&#xA0;completed.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure10.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="424" height="344"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;10.&#xA0;Decoy message&#xA0;box from the&#xA0;dropper.</span></figcaption></figure><h2 id="lucidrook-lua-based-stager">LucidRook Lua-based&#xA0;stager&#xA0;</h2><p>LucidRook&#xA0;is a sophisticated 64-bit Windows DLL stager consisting of a Lua interpreter, embedded Rust-compiled libraries, and Lua bytecode payload. The DLL embeds a Lua 5.4.8 interpreter and retrieves a staged payload (in our sample named&#xA0;<code>archive1.zip</code>) from its C2 over FTP. After unpacking and&#xA0;validating&#xA0;the downloaded stage, the implant loads and executes the resulting Lua bytecode on the compromised host. Embedding the Lua interpreter effectively turns the native DLL into a stable execution platform while allowing the threat actor to update or tailor behavior&#xA0;for each&#xA0;target or campaigns by updating the Lua bytecode payload with a lighter and more flexible development process. This approach also improves operational security, since the Lua stage can be hosted only briefly and removed from C2 after delivery, and it can hinder post-incident reconstruction when defenders recover only the loader without the externally delivered Lua payload.&#xA0;&#xA0;</p><p>Due to the embedded Lua interpreter and stripped Rust-compiled components, the DLL is complex to reverse engineer. The binary is approximately 1.6MB in size and&#xA0;contains&#xA0;over 3,800 functions, reflecting the amount of runtime and library code bundled into a single module. Execution is&#xA0;initiated&#xA0;via the&#xA0;<code>DllGetClassObject</code>&#xA0;export; however, the sample implements no COM functionality and uses the export solely as an entry point.</p><p>Upon execution, the&#xA0;malware&#x2019;s&#xA0;core workflow is twofold. First, it performs host reconnaissance, collecting system information that is encrypted, packaged, and exfiltrated to the C2 infrastructure. It then retrieves an encrypted, staged Lua bytecode payload from the C2 server, which is&#xA0;subsequently&#xA0;decrypted and executed on the compromised host.</p><h3 id="lua-interpreter-embedding-implementation">Lua&#xA0;interpreter&#xA0;embedding&#xA0;implementation&#xA0;</h3><p>LucidRook&#xA0;embeds a Lua 5.4.8 interpreter directly inside the DLL and uses it to execute a downloaded Lua bytecode stage. Before handing the stage to the VM, the loader verifies that the decrypted blob begins with the standard Lua bytecode magic (<code>\x1bLua</code>),&#xA0;indicating&#xA0;the payload is a compiled Lua chunk rather than plaintext script.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure11.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="902" height="102" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure11.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure11.png 902w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;11.&#xA0;Code to check the Lua bytecode prefix in the downloaded&#xA0;blob.</span></figcaption></figure><p>The Lua runtime is also wrapped with&#xA0;additional&#xA0;controls. Notably, the malware implements a non-standard &#x201C;safe mode&#x201D; that disables&#xA0;<code>package.loadlib</code>&#xA0;(as shown by the unique error string &#x201C;package.loadlibis disabled in safe mode&#x201D;), which prevents Lua payloads from loading arbitrary external DLL-based modules via the standard require/loader pathway. Additionally, in the library initialization flow&#xA0;observed, the malware opens common standard libraries (e.g., io,&#xA0;os, string, math, package) but does not open the debug library, which would normally provide powerful introspection primitives; this omission is consistent with an anti-analysis hardening choice.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure12.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="902" height="456" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure12.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure12.png 902w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;12.&#xA0;Code in the interpreter to load the&#xA0;libraries.</span></figcaption></figure><h3 id="string-obfuscation-scheme">String&#xA0;obfuscation&#xA0;scheme&#xA0;</h3><p>The&#xA0;LucidRook&#xA0;samples employ a sophisticated string obfuscation scheme. The obfuscation was applied to&#xA0;almost all&#xA0;the embedded strings including file extensions, internal identifiers, and C2&#xA0;addresses. This transformation increases&#xA0;the difficulty of&#xA0;analysis&#xA0;and&#xA0;detection.</p><p>The&#xA0;deobfuscation&#xA0;follows a structured two-stage runtime process:&#xA0;</p><ol><li><strong>Address</strong>&#xA0;<strong>calculation:</strong>&#xA0;Rather than using direct offsets, the malware calculates the memory address of an encrypted string through a unique series of arithmetic operations for each&#xA0;string.&#xA0;This design prevents cross-referencing encrypted data blocks to their use-sites for reverse&#xA0;engineering.&#xA0;&#xA0;</li><li><strong>Runtime key reconstruction and XOR decryption:</strong>&#xA0;Each 4-byte chunk is decrypted using XOR with a key that is not hardcoded&#xA0;directly.&#xA0;Instead, the key is reconstructed at runtime by combining a constant seed&#xA0;value (ending in&#xA0;<code>0x00</code>) and a single-byte mask read from a parallel lookup table:&#xA0;<code>Plaintext =&#xA0;Ciphertext ^&#xA0;(Seed&#xA0;|&#xA0;Mask)</code></li></ol><p>The use of a parallel lookup table for masks significantly complicates the creation of automated &quot;unpacking&quot; scripts, as the relationship between the encrypted string and its corresponding mask is obscured by the flattened control&#xA0;flow.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure13.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="902" height="420" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure13.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure13.png 902w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 13.&#xA0;Decompiled code for file extension string&#xA0;deobfuscation.</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure14.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="560" height="470"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;14.&#xA0;Address computation for&#xA0;string &#x201C;docx&#x201D;.&#xA0;</span></figcaption></figure><h3 id="host-reconnaissance">Host reconnaissance&#xA0;</h3><p>The malware collects several system information including user account name, computer name, driver information, user profile directory, installed applications, running process,&#xA0;and so on. The collected information is stored into&#xA0;three&#xA0;files (named&#xA0;<code>1.bin</code>,&#xA0;<code>2.bin</code>,&#xA0;<code>3.bin</code>) with two layers of encryptions: RSA and&#xA0;a&#xA0;password-encrypted ZIP&#xA0;archive. The&#xA0;BIN&#xA0;files are encrypted with an embedded RSA public key (DER hash&#xA0;<code>ab72813444207dba5429cf498c6ffbc69e1bd665d8007561d0973246fa7f8175</code>) and then&#xA0;compressed&#xA0;into a ZIP file encrypted with&#xA0;password&#xA0;<code>!,OO5*+ZEYORE%&amp;.K1PQHxiODU^RA046</code>. With these encryptions in place, the exfiltrated data can only be decrypted by the threat actor.&#xA0;The decrypted RSA public key used to encrypt exfiltrated data is:</p>
<!--kg-card-begin: html-->
<pre>-----BEGIN RSA PUBLIC KEY----- 
MIIBCgKCAQEA3YeM0FbZO8QB3/ctZd2+oS8weSUwmgp33c5lVJ8InJx5yJJnXF+8 
qLL+nzwcItVQyAQbZBymN9ueIgkNRBQuRJgZOxLHG2cbNIWXMImKb5zkkyIUfCz1 
hLprvBu4i2IIeWTFyTLfIpwZ/rUn+lARRmIeWTmJezOaSh5QvVaF6Oqk5qoTXk9A 
MivxKnfFiMhlBh3/V6S4+gTzqy7IwgSuPv8IL6n5LF+N8DmIvAVCck1e2KIYMu54 
UT7ef16N60LVksADJsnk+E5CSOeD4FzSTjS9G9c3sZFP/7r7xAbr5CbKvaBvJ+49 
7OlzJjaq1H+M7aOAPKaf/hyewEHIr+W1EQIDAQAB 
-----END RSA PUBLIC KEY----- </pre>
<!--kg-card-end: html-->
<p>The encrypted data is archived into a file named&#xA0;<code>archive4.zip</code>&#xA0;and uploaded to the C2 FTP server using authenticated credentials obfuscated and embedded in the&#xA0;stager.&#xA0;</p><h3 id="c2-communication">C2&#xA0;communication&#xA0;</h3><p>The&#xA0;LucidRook&#xA0;stager communicates with the abused/compromised FTP servers to not only upload the collected system information but also to download and execute Lua bytecode payload to achieve remote code execution.&#xA0;</p><p><strong>FTP&#xA0;servers with&#xA0;publicly&#xA0;exposed&#xA0;credentials&#xA0;</strong></p><p>LucidRook&#xA0;uses plaintext FTP for both staging and exfiltration. In the observed captures, the implant authenticates with embedded credentials, switches to binary mode (TYPE I), enters passive mode (PASV), and uploads the exfiltrated information in an archive named&#xA0;<code>archive4.zip</code>&#xA0;via STOR before closing the session. It then&#xA0;establishes&#xA0;a second FTP session and&#xA0;attempts&#xA0;to retrieve&#xA0;<code>archive1.zip</code>&#xA0;(payload) via RETR.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure15.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="550" height="624"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;15.&#xA0;Communication with C2&#xA0;server.&#xA0;</span></figcaption></figure><p>The&#xA0;LucidRook&#xA0;samples connect to C2 infrastructure that&#xA0;appears to abuse&#xA0;FTP servers with exposed credentials to retrieve staged payloads.&#xA0;Talos&#xA0;identified&#xA0;two such C2 servers, both&#xA0;located&#xA0;in Taiwan and&#xA0;operated&#xA0;by printing companies. Initially, it was unclear why the threat actor selected this infrastructure; however, further investigation revealed that both companies publicly listed FTP credentials on their official websites as part of a &#x201C;file uploading service&quot;.&#xA0;We&#xA0;observed&#xA0;that this practice is common among local printing companies and effectively creates a pool of publicly accessible, low&#x2011;cost infrastructure that can be repurposed by threat actors as low-cost C2 staging servers.</p><h3 id="stealthy-payload-protections">Stealthy&#xA0;payload&#xA0;protections&#xA0;</h3><p>Besides what we&#xA0;previously&#xA0;mentioned about the encryption for the exfiltrated data,&#xA0;the threat actor also employed stealthy protection for the downloaded payload. The&#xA0;LucidRook&#xA0;sample Talos obtained (<code>edb25fed9df8e9a517188f609b9d1a030682c701c01c0d1b5ce79cba9f7ac809</code>) uses the&#xA0;password&#xA0;<code>?.aX$p8dpiP$+4a$x?=0LC=M&gt;^&gt;f6N]a</code>&#xA0;to decrypt the archive when&#xA0;it&#x2019;s&#xA0;protected and requires that an&#xA0;<code>index.bin</code>&#xA0;file be found within the ZIP archive. After decryption, it uses a different RSA private key&#xA0;(DER hash&#xA0;<code>7e851b73bd59088d60101109c9ebf7ef300971090c991b57393e4c793f5e2d33</code>)&#xA0;embedded and encrypted inside the malware to decrypt the payload.&#xA0;The corresponding public&#xA0;key (DER hash&#xA0;<code>a42ad963c53f2e0794e7cd0c3632cc75b98f131c3ffceb8f2f740241c097214a</code>) for this private key&#xA0;is:</p>
<!--kg-card-begin: html-->
<pre>-----BEGIN PUBLIC KEY----- 
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArQ9deG1+FiOgxT2eX78n 
3Ni/PmrV/V6iuf+bc+ii+9wD6Pyc7QyicaZODr2YlKifwJabJuDsIcANRIQGBLf2 
8j0yG3x25rP4XTnavTyPB6s+fJgNebmB9Hhgx3AY25ufJvNAelnmXnPn/xp6tZ/V 
kup72tiwKWeBVJOZYW3qYno4n5hffdNqTFIgUZDDLhqa+nT1gD6LZ6W/BidIM70O 
gn2h8ppc8aKc893FkfvNYwhgubiDFv9rgvSVvxt0uTVERtBsCyAScD1MMvswEyK6 
LrgnyTz7KwOv5wyPfE3BPs8lpMQIyi/jcIIroyk9uLarfV/XIbgTOqEYf5/9bDSs 
iQIDAQAB 
-----END PUBLIC KEY----- </pre>
<!--kg-card-end: html-->
<p>During investigation, Talos obtained a payload from a private source which matched the&#xA0;<code>index.bin</code>&#xA0;file structure. However, the password from the&#xA0;LucidRook&#xA0;sample we got&#xA0;was not able to&#xA0;decrypt the archive. We also obtained another version of the payload from the FTP C2&#xA0;server, but this payload includes four files that&#xA0;does&#xA0;not match the version of&#xA0;LucidRook&#xA0;sample we analyzed as shown in&#xA0;Figure 16.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure16.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="902" height="334" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure16.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure16.png 902w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 16.&#xA0;The files inside the downloaded payload&#xA0;file.</span></figcaption></figure><p>Based on this information, we suspect that the threat actor is generating different payloads using different sets of passwords for different targets, even though they&#xA0;share&#xA0;the same C2 server. The files inside the payload also suggest it potentially&#xA0;leverages&#xA0;different modules for different capabilities for the stager.&#xA0;</p><h2 id="lucidpawn-dropper">LucidPawn&#xA0;dropper&#xA0;</h2><p>The&#xA0;LucidPawn dropper shares some similarity with LucidRook, including the same COM DLL masquerade technique, obfuscation scheme,&#xA0;and Rust-compiled&#xA0;code.&#xA0;</p><h3 id="leveraging-an-oast-service">Leveraging an&#xA0;OAST service&#xA0;</h3><p>Upon execution,&#xA0;the&#xA0;LucidPawn&#xA0;dropper sends a DNS request to a domain&#xA0;&#x201C;D.2fcc7078.digimg[.]store&#x201D;.&#xA0;The domain&#xA0;&#x201C;digimg[.]store&#x201D;&#xA0;redirects&#xA0;to&#xA0;&#x201C;dnslog[.]ink&#x201D;,&#xA0;a public&#xA0;Chinese&#xA0;<a href="https://portswigger.net/kb/issues/00300200_external-service-interaction-dns" rel="noreferrer noopener"><u>Out-of-band Application Security Testing (OAST)</u>&#xA0;<u>service</u></a>.&#xA0;It is&#xA0;<a href="https://www.bitdefender.com/en-us/blog/businessinsights/bitdefender-advisory-critical-unauthenticated-rce-windows-server-update-services-cve-2025-59287" rel="noreferrer noopener"><u>widely used</u></a>&#xA0;by security researchers, penetration testers, and threat actors&#xA0;to verify network connectivity&#xA0;and&#xA0;vulnerability exploitation. By using this service,&#xA0;LucidRookoperators receive confirmation once the exploitation succeeds without setting up their own infrastructure.&#xA0;It is worth noting that the same service domain has been&#xA0;leveraged&#xA0;in other targeted campaigns; however, because the service is publicly accessible and can be used by any threat actor,&#xA0;Talos&#xA0;avoids&#xA0;making attribution based solely on this linkage.</p><h2 id="geo-targeting-anti-analysis">Geo-targeting&#xA0;anti-analysis&#xA0;</h2><p>LucidPawn implements a geo-targeting&#xA0;anti-analysis execution gate by querying the host&#x2019;s Windows UI language via&#xA0;the&#xA0;<code>GetUserDefaultUILanguage()</code>&#xA0;API. Execution continues only when the system UI language matches Traditional Chinese environments associated with Taiwan.</p><p>The implementation compares a masked LANGID against 0x0404 (zh-TW). The mask&#xA0;and&#xA0;0xF7FF clears bit 0x0800, causing only 0x0404 (zh-TW) and 0x0C04 (zh-HK) to&#xA0;normalize to&#xA0;the same value and satisfy the check. As a result, the sample exits early on most&#xA0;analysis&#xA0;sandboxes, which commonly use 0x0409 (en-US). This control reduces exposure by limiting execution to the intended&#xA0;victim&#xA0;geography and suppressing behavior in common analyst environments.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure17.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="902" height="82" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure17.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure17.png 902w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 17.&#xA0;Code for geo-targeting&#xA0;anti-analysis.</span></figcaption></figure><h2 id="the-lucidknight-reconnaissance-tool">The&#xA0;LucidKnight&#xA0;reconnaissance&#xA0;tool&#xA0;</h2><p>While hunting for&#xA0;additional&#xA0;LucidPawn samples, we&#xA0;identified&#xA0;a variant of LucidPawn (<code>d8bc6047fb3fd4f47b15b4058fa482690b5b72a5e3b3d324c21d7da4435c9964</code>). This sample shares the same geo-targeting&#xA0;anti-analysis logic&#xA0;observed&#xA0;in other samples used to deliver&#xA0;LucidRook. Compared with the LucidPawn samples associated with&#xA0;LucidRook&#xA0;delivery, however, this variant omits the callback to the out-of-band interactive service domain and functions solely as a dropper, deploying the reconnaissance tool&#xA0;LucidKnight (<code>aa7a3e8b59b5495f6eebc19f0654b93bb01fd2fa2932458179a8ae85fb4b8ec1</code>) after execution.</p><p>Like other malware in the Lucid family,&#xA0;LucidKnight&#xA0;is a 64-bit Windows DLL that&#xA0;contains&#xA0;embedded Rust-compiled components to implement various functions. The malware also uses a string obfuscation scheme&#xA0;similar to&#xA0;those&#xA0;observed&#xA0;in LucidPawn and&#xA0;LucidRook&#xA0;to conceal its C2 configuration.</p><p>Upon execution,&#xA0;LucidKnight&#xA0;collects system information including the computer name, OS version, processor architecture, CPU usage, running processes, and installed software. The collected data are written to four TXT files, encrypted with an embedded RSA public key, and packaged into a password-protected ZIP archive named&#xA0;<code>archive.zip</code>&#xA0;using the password&#xA0;<code>xZh&gt;1&lt;{Km1YD3[V&gt;x]X&gt;=1u(Da)Y=N&gt;u</code>. The embedded RSA public key (DER hash&#xA0;<code>852a80470536cb1fdab1a04d831923616bf00c77320a6b4656e80fc3cc722a66</code>) is shown below:</p>
<!--kg-card-begin: html-->
<pre>-----BEGIN RSA PUBLIC KEY----- 
MIIBCgKCAQEAuvXyx+rPGjS/bI6cvl8LIVVatwD6JU19EvJPlBWlmPqVm/se+3QS 
9av+X8PFgwoGXJZTEanAY4JhOMXKYSbErwrLktbEY2tFi7w3/WyPPcB6/I6zD2yU 
Mqcoqy1Z3+4CsLz4D/LZtOst4alSGOgTDeKtrWKHCyigFvndfds4pdCy78KBRtQb 
kV3UUlKQZm/37tP0CPXkKwxQ1n/+DTh265gRaVrhr4+VUagNmYta1faMLsvM8O3F 
Lu2tQiOxeSZC21z6V3kcifYiBLT0khx11JqD3jTfA41OcngZfwWYHbitDBZF7rpL 
26ZSitNxMAq1O6DrXzI5wdVn0fZgSXNEbwIDAQAB 
-----END RSA PUBLIC KEY----- </pre>
<!--kg-card-end: html-->
<p>Unlike&#xA0;LucidRook, which uploads collected system information to a compromised FTP server,&#xA0;LucidKnight&#xA0;exfiltrates reconnaissance data via email using the embedded&#xA0;<a href="https://docs.rs/lettre/latest/lettre/" rel="noreferrer noopener"><u>Rust lettre crate</u></a>, which provides SMTP message creation and delivery functionality.</p><p>Specifically, the malware constructs an email with the Traditional Chinese subject &#x201C;&#x904B;&#x52D5;&#x8CC7;&#x8A0A;&#x5E73;&#x53F0;&#x201D; (&#x201C;Sports Information Platform&#x201D;) and includes the collected data as a MIME attachment.&#xA0;It then resolves&#xA0;&#x201C;smtp.gmail.com&#x201D;, authenticates to the Gmail account&#xA0;&#x201C;fexopuboriw972@gmail.com&quot;&#xA0;with an embedded application key, and sends the data to the temporary email address&#xA0;&#x201C;crimsonanabel@powerscrews.com&quot;. The following email shows an example of the content crafted by&#xA0;LucidKnight:</p>
<!--kg-card-begin: html-->
<pre>From: fexopuboriw972@gmail.com 
To: crimsonanabel@powerscrews.com 
Subject: =?utf-8?b?6YGL5YuV6LOH6KiK5bmz5Y+w?= 
MIME-Version: 1.0 
Date: Tue, 17 Feb 2026 02:05:49 +0000 
Content-Type: multipart/mixed; 
 boundary=&quot;vlOcEyPfxrLCR89C5RuARsViLsqzv1brB2u8YvNd&quot; 
--vlOcEyPfxrLCR89C5RuARsViLsqzv1brB2u8YvNd 
Content-Type: text/plain; charset=utf-8 
Content-Transfer-Encoding: base64 
5oKo6KqN54K65Y+w54Gj55uu5YmN5Zyo6Jed5paH5rC457qM55m85bGV55qE5pS/562W5LiK5pyJ 
5ZOq5Lqb5YW36auU55qE5oiQ5Yqf5qGI5L6L5oiW5YC85b6X5pS56YCy55qE5Zyw5pa577yf 
--vlOcEyPfxrLCR89C5RuARsViLsqzv1brB2u8YvNd 
Content-Type: application/zip 
Content-Disposition: attachment; filename=&quot;archive.zip&quot; 
Content-Transfer-Encoding: base64 
UEsDBDMAAQBjALgQUVwEOkfvkhkAAHEZAAAFAAsAMS50eHQBmQcAAQBBRQMIAEF/fb/F6o3HptX3 
(redacted)</pre>
<!--kg-card-end: html-->
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure18.png" class="kg-image" alt="New Lua-based malware &#x201C;LucidRook&#x201D; observed in targeted attacks against Taiwanese organizations" loading="lazy" width="1214" height="456" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/Figure18.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/Figure18.png 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/Figure18.png 1214w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;18.&#xA0;Email sent by&#xA0;LucidKnight&#xA0;malware with collected data attached.</span></figcaption></figure><p>The discovery of&#xA0;LucidKnight&#xA0;suggests that the actor&#xA0;maintains&#xA0;a modular toolkit and may select components based on the operational context of each target, rather than deploying a fixed infection chain.&#xA0;LucidKnight&#xA0;may be used independently when lightweight reconnaissance is sufficient, or as a precursor to assess targets before committing the more complex&#xA0;LucidRook&#xA0;stager.&#xA0;</p><h2 id="the-bottom-line">The&#xA0;bottom&#xA0;line&#xA0;</h2><p>Based on the&#xA0;tactics, techniques, and procedures (TTPs)&#xA0;and the level of engineering investment&#xA0;observed&#xA0;across these infection chains, we assess with medium confidence that this activity reflects a targeted intrusion rather than broad, opportunistic malware distribution. Delivery via&#xA0;spearphishing, combined with&#xA0;LucidRook&#x2019;s&#xA0;sophisticated design, suggests a sophisticated&#xA0;threat&#xA0;actor prioritizing flexibility, stealth, and victim-specific tasking.</p><p>Although&#xA0;Talos has&#xA0;not yet found a decryptable Lua bytecode payload executed by&#xA0;LucidRook, we are publishing these findings to make early detection possible and encourage community sharing, with the goal of uncovering&#xA0;additional&#xA0;indicators that may&#xA0;facilitate&#xA0;stronger clustering and attribution in the future.</p><h2 id="coverage">Coverage&#xA0;</h2><p>The following ClamAV signature detects and blocks this&#xA0;threat:</p><ul><li>Win.Backdoor.LucidRook-10059729-0&#xA0;&#xA0;</li><li>Lnk.Tool.UAT-10362-10059730-0&#xA0;&#xA0;</li><li>Win.Dropper.UAT-10362-10059731-0&#xA0;&#xA0;</li><li>Win.Tool.CobaltStrike-10059732-0&#xA0;</li></ul><p>The following SNORT&#xAE;&#xA0;rules cover this&#xA0;threat:&#xA0;&#xA0;</p><ul><li>Snort2 Rules: 66108, 66109, 66110, 66111&#xA0;</li><li>Snort3 Rules: 301447, 301448&#xA0;</li></ul><h2 id="indicators-of-compromise-iocs">Indicators of&#xA0;compromise (IOCs)&#xA0;&#xA0;</h2><p>IOCs for this research can also be found at our GitHub repository&#xA0;<a href="https://github.com/Cisco-Talos/IOCs/blob/main/2026/04/new-lua-based-malware-lucidrook.txt" rel="noreferrer">here</a>.</p><p>d49761cdbea170dd17255a958214db392dc7621198f95d5eb5749859c603100a (malicious&#xA0;7z)&#xA0;</p><p>adf676107a6c2354d1a484c2a08c36c33d276e355a65f77770ae1ae7b7c36143 (malicious&#xA0;archive)&#xA0;</p><p>b480092d8e5f7ca6aebdeaae676ea09281d07fc8ccf2318da2fa1c01471b818d (Forged EXE&#xA0;dropper that drops&#xA0;LucidRook)&#xA0;</p><p>c2d983d3812b5b6d592b149d627b118db2debd33069efe4de4e57306ba42b5dc (Forged&#xA0;EXE dropper that drops&#xA0;LucidRook)&#xA0;</p><p>6aba7b5a9b4f7ad4203f26f3fb539911369aeef502d43af23aa3646d91280ad9 (LucidPawn, DismCore.dll)&#xA0;</p><p>bdc5417ffba758b6d0a359b252ba047b59aacf1d217a8b664554256b5adb071d (LucidPawn&#xA0;dropper, DismCore.dll)&#xA0;</p><p>f279e462253f130878ffac820f5a0f9ac92dd14ad2f1e4bd21062bab7b99b839 (malicious&#xA0;LNK)&#xA0;</p><p>166791aac8b056af8029ab6bdeec5a2626ca3f3961fdf0337d24451cfccfc05d (malicious&#xA0;LNK)&#xA0;</p><p>11ae897d79548b6b44da75f7ab335a0585f47886ce22b371f6d340968dbed9ae (LucidRook&#xA0;stager, DismCore.dll)&#xA0;</p><p>edb25fed9df8e9a517188f609b9d1a030682c701c01c0d1b5ce79cba9f7ac809 (LucidRook&#xA0;stager, DismCore.dll)&#xA0;</p><p>0305e89110744077d8db8618827351a03bce5b11ef5815a72c64eea009304a34 (LucidRook&#xA0;stager, DismCore.dll)&#xA0;</p><p>d8bc6047fb3fd4f47b15b4058fa482690b5b72a5e3b3d324c21d7da4435c9964 (LucidPawn dropper dropping&#xA0;LucidKnight)&#xA0;</p><p>aa7a3e8b59b5495f6eebc19f0654b93bb01fd2fa2932458179a8ae85fb4b8ec1 (LucidKnight, DismCore.dll)&#xA0;</p><p>fd11f419e4ac992e89cca48369e7d774b7b2e0d28d0b6a34f7ee0bc1d943c056 (archive1.zip&#xA0;download from C2)</p><p>1.34.253[.]131 (abused FTP server)&#xA0;</p><p>59.124.71[.]242 (abused FTP server)&#xA0;</p><p>D.2fcc7078.digimg[.]store (DNS beaconing domain)&#xA0;</p><p><a href="mailto:fexopuboriw972@gmail.com" rel="noreferrer noopener"><u>fexopuboriw972@gmail.com</u></a>&#xA0;</p><p><a href="mailto:crimsonanabel@powerscrews.com" rel="noreferrer noopener"><u>crimsonanabel@powerscrews.com</u></a>&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Talos Takes: 2025's ransomware trends and zombie vulnerabilities]]></title><description><![CDATA[In this episode of Talos Takes, Amy and Pierre Cadieux unpack the ransomware and vulnerability trends that defined 2025.]]></description><link>https://blog.talosintelligence.com/talos-takes-2025s-ransomware-trends-and-zombie-vulnerabilities/</link><guid isPermaLink="false">69d3b1fb421b25000170424b</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Amy Ciminnisi]]></dc:creator><pubDate>Tue, 07 Apr 2026 12:03:13 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR2025_cover_2x1-2.jpg" alt="Talos Takes: 2025&apos;s ransomware trends and zombie vulnerabilities"><p>Join Amy and Pierre Cadieux as they unpack the ransomware and vulnerability trends that defined 2025. From the persistent ransomware threats targeting the manufacturing sector to the rise of stealthy living-off-the-land tactics, we break down what these shifts mean for your defense strategy.</p><p>Why are attackers are increasingly targeting your management infrastructure? How do you spot the difference between a system admin and a threat actor? Tune in to hear Talos&apos; insights on how to move beyond reacting to threats and start building a more resilient, proactive security posture for the year ahead. </p><p><a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer">View the 2025 Year in Review here.</a></p><figure class="kg-card kg-embed-card"><iframe style="border-radius: 12px" width="100%" height="152" title="Spotify Embed: 2025&apos;s ransomware trends and zombie vulnerabilities" frameborder="0" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy" src="https://open.spotify.com/embed/episode/379YOTqjZisbNVTC0uchM2?si=cebb3751111e4d76&amp;utm_source=oembed"></iframe></figure>]]></content:encoded></item><item><title><![CDATA[The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines]]></title><description><![CDATA[Cisco Talos has recently observed an increase in activity that is leveraging notification pipelines in popular collaboration platforms to deliver spam and phishing emails. ]]></description><link>https://blog.talosintelligence.com/weaponizing-saas-notification-pipelines/</link><guid isPermaLink="false">69cfb958421b2500017041e3</guid><category><![CDATA[SecureX]]></category><category><![CDATA[Threat Spotlight]]></category><category><![CDATA[Cisco Talos Email Threat Prevention]]></category><category><![CDATA[Cisco Talos Email Filtering]]></category><dc:creator><![CDATA[Cisco Talos]]></dc:creator><pubDate>Tue, 07 Apr 2026 10:00:35 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/phishing-evergreen.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/phishing-evergreen.jpg" alt="The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines"><p><em>By Diana Brown</em></p><ul><li>Cisco Talos has recently&#xA0;observed&#xA0;an increase in activity that is&#xA0;leveraging&#xA0;notification pipelines in popular collaboration platforms to deliver spam and phishing emails.</li><li>These emails are transmitted using the legitimate mail delivery infrastructure associated with GitHub and Jira, minimizing the likelihood that they will be blocked in transit to potential victims.</li><li>By taking advantage of the built-in notification functionality available&#xA0;within&#xA0;these&#xA0;platforms, adversaries can more effectively circumvent email security and monitoring solutions and&#xA0;facilitate&#xA0;more effective delivery to potential victims.</li><li>In most cases, these campaigns have been associated with phishing and credential harvesting&#xA0;activity, which is often a precursor to&#xA0;additional&#xA0;attacks once credentials have been compromised&#xA0;and/or initial access has been achieved.&#xA0;</li><li>During&#xA0;one&#xA0;campaign&#xA0;conducted&#xA0;on Feb.&#xA0;17, 2026,&#xA0;approximately&#xA0;2.89% of the emails&#xA0;observed&#xA0;being sent from GitHub&#xA0;were&#xA0;likely associated&#xA0;with this abuse activity.&#xA0;</li></ul><h2 id="platform-abuse-social-engineering-and-saas-notification-hijacking">Platform&#xA0;abuse,&#xA0;social&#xA0;engineering, and&#xA0;SaaS&#xA0;notification&#xA0;hijacking&#xA0;</h2><p>Recent telemetry&#xA0;indicates&#xA0;an increase in threat actors&#xA0;leveraging&#xA0;the automated notification infrastructure of legitimate&#xA0;Software-as-a-Service (SaaS)&#xA0;platforms&#xA0;to&#xA0;facilitate&#xA0;social engineering campaigns. By embedding malicious lures within system-generated commit notifications, attackers bypass traditional reputation-based email security filters. This Platform-as-a-Proxy (PaaP) technique exploits the implicit trust organizations place in traffic originating&#xA0;from verified SaaS providers,&#xA0;effectively&#xA0;weaponizing legitimate infrastructure to bypass standard email authentication protocols. Talos&apos;&#xA0;analysis explores how attackers abuse the notification pipelines of platforms like GitHub and Atlassian to&#xA0;facilitate&#xA0;credential harvesting and social engineering.&#xA0;</p><h3 id="the-paap-model">The&#xA0;PaaP&#xA0;model&#xA0;</h3><p>The core of this campaign relies on the abuse of SaaS features to generate emails. Because the emails are dispatched from the platform&apos;s own infrastructure, they satisfy all standard authentication requirements (SPF, DKIM, and DMARC), effectively neutralizing the primary gatekeepers of modern email security. By decoupling the malicious intent from the technical infrastructure, attackers successfully deliver phishing content with a &quot;seal of approval&quot; that few security gateways are configured to challenge.&#xA0;</p><h3 id="anatomy-of-github-campaign-abusing-automated-notification-pipelines">Anatomy of&#xA0;GitHub&#xA0;campaign:&#xA0;Abusing&#xA0;automated&#xA0;notification&#xA0;pipelines&#xA0;</h3><p>The GitHub vector is a pure &quot;notification pipeline&quot; abuse&#xA0;mechanism. Attackers create repositories and push commits with payloads embedded in the commit messages.&#xA0;The User Interface Mechanism has&#xA0;two&#xA0;fields for text input: one is a&#xA0;mandatory&#xA0;summary, a single limited line, where the user provides a high-level overview of the change.&#xA0;Attackers&#xA0;weaponize this field to craft the&#xA0;initial&#xA0;social engineering hook,&#xA0;ensuring the malicious lure is the most&#xA0;prominent element&#xA0;of the resulting automated notification.&#xA0;The second field&#xA0;is an&#xA0;optional,&#xA0;extended description&#xA0;that&#xA0;allows for multi-line, detailed explanations. Attackers abuse this to place the primary&#xA0;scam content, such as fake billing details or fraudulent support numbers.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image002.png" class="kg-image" alt="The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines" loading="lazy" width="440" height="86"><figcaption><span style="white-space: pre-wrap;">Figure 1: Email header</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image003.png" class="kg-image" alt="The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines" loading="lazy" width="667" height="687" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/image003.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image003.png 667w"><figcaption><span style="white-space: pre-wrap;">Figure 2: The body of the message</span></figcaption></figure><p>By pushing a commit, the attacker triggers&#xA0;an&#xA0;automatic email notification.&#xA0;GitHub&#x2019;s system is&#xA0;configured&#xA0;to notify collaborators of repository activity. Because the content is generated by the platform&#x2019;s own system, it avoidssecurity flags.&#xA0;In this&#xA0;example,&#xA0;we can see the details of the commit followed by the&#xA0;scam&#xA0;message.&#xA0;At the bottom of the email, we&#xA0;have&#xA0;the&#xA0;mention of the&#xA0;subscription,&#xA0;buried at the very bottom of the&#xA0;page.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image004.png" class="kg-image" alt="The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines" loading="lazy" width="635" height="234" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/image004.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image004.png 635w"><figcaption><span style="white-space: pre-wrap;">Figure 3: List-Unsubscribe link</span></figcaption></figure><p>The chain of Received headers shows the message entering the system from&#xA0;&#x201C;out-28[.]smtp[.]github[.]com&#x201D;&#xA0;(IP&#xA0;&#x201C;192[.]30[.]252[.]211&#x201D;). This is a known&#xA0;legitimate&#xA0;and&#xA0;verified GitHub SMTP server.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image005.png" class="kg-image" alt="The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines" loading="lazy" width="679" height="62" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/image005.png 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image005.png 679w"><figcaption><span style="white-space: pre-wrap;">Figure 4: Raw headers</span></figcaption></figure><p>The email&#xA0;contains&#xA0;a DKIM-Signature&#xA0;with&#xA0;&#x201C;d=github[.]com&#x201D;.&#xA0;This signature was successfully verified by the receiving server (&#x201C;esa1[.]hc6633-79[.]iphmx[.]com&#x201D;), proving that the email was sent by an authorized GitHub system and was not tampered with in transit.&#xA0;Telemetry collected over a five-day observation period&#xA0;indicates&#xA0;that&#xA0;1.20%&#xA0;of the total traffic originating from&#xA0;&#x201C;noreply[@]github[.]com&#x201D;&#xA0;contained&#xA0;the &quot;invoice&quot; lure in the subject line. On the peak day of Feb.&#xA0;17, 2026, this volume spiked to approximately&#xA0;2.89%&#xA0;of the daily sample set.&#xA0;</p><h3 id="abusing-workflow-and-invitation-logic-jira">Abusing&#xA0;workflow&#xA0;and invitation&#xA0;logic (Jira)&#xA0;</h3><p>The Jira vector does not rely on a notification pipeline in the traditional sense.&#xA0;Jira notifications are expected in corporate environments. An email from Atlassian is rarely blocked, as it is often critical for internal project management and IT operations. The abuse here is not a &quot;pipeline&quot; of activity, but an abuse of the collaborative invitation feature.&#xA0;&#xA0;</p><p>Attackers do not have access to&#xA0;modify&#xA0;the underlying HTML/CSS templates of Atlassian&#x2019;s emails. Instead, they abuse the data fields that the platform injects into those templates. When an attacker creates a Jira Service Management project, they are given several fields to configure.&#xA0;When the platform triggers an automated&#xA0;&#x201C;Customer Invite&#x201D;&#xA0;or&#xA0;&#x201C;Service Desk&#x201D;&#xA0;notification, it automatically wraps the attacker&#x2019;s input&#xA0;&#x2014;&#xA0;such as a fraudulent project name or a deceptive welcome message&#xA0;&#x2014;&#xA0;within its own cryptographically signed, trusted email template.&#xA0;By&#xA0;utilizing&#xA0;a trusted delivery pipeline, the attacker successfully obscures the origin and intent of the&#xA0;malicious.&#xA0;</p><p>In this example, the attacker sets the &quot;Project Name&quot; to &quot;Argenta.&quot; When the platform sends an automated invite, the email subject and body dynamically pull the project name. The recipient sees &quot;Argenta&quot; as the sender or the subject, which the platform has verified as the project name.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image006.png" class="kg-image" alt="The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines" loading="lazy" width="400" height="89"><figcaption><span style="white-space: pre-wrap;">Figure 5: Email header</span></figcaption></figure><p>The attacker&#xA0;placed&#xA0;their malicious lure&#xA0;subject&#xA0;into&#xA0;the &quot;Welcome Message&quot; or &quot;Project Description&quot; field.&#xA0;They use&#xA0;the &quot;Invite Customers&quot;&#xA0;feature and&#xA0;input the victim&apos;s email address. Atlassian&#x2019;s backend then generates the email. Because the system is designed to be a &quot;Service Desk,&quot; the email is formatted to look like a professional, automated system alert. At the bottom of the phishing email, we can see the branding footer that Jira automatically appends to email notifications.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/image007.png" class="kg-image" alt="The Trojan horse of cybercrime: Weaponizing SaaS notification pipelines" loading="lazy" width="461" height="333"><figcaption><span style="white-space: pre-wrap;">Figure 6: The body of the message and the footer branding</span></figcaption></figure><h2 id="strategic-implications">Strategic&#xA0;implications&#xA0;</h2><p>The&#xA0;trust&#xA0;paradox is now the primary driver of successful phishing&#xA0;and&#xA0;scamming. GitHub is abused primarily for its high developer reputation, where attackers rely on the platform&#x2019;s status as an official source of automated alerts. In contrast, Jira is abused for its business-critical integration; because it is a trusted enterprise tool, attackers use it to mimic internal IT and helpdesk alerts, which employees are&#xA0;pre-conditioned to treat as urgent and legitimate. In both cases, attackers are using the platform&apos;s own reputation to launder their malicious content.&#xA0;</p><h3 id="how-do-we-fundamentally-change-the-trust-model">How&#xA0;do we&#xA0;fundamentally change the trust model?&#xA0;</h3><p>Defending against&#xA0;PaaP&#xA0;attacks requires moving&#xA0;from the binary &#x201C;trusted vs. untrusted&#x201D; approach.&#xA0;Because attackers weaponize the platform&#x2019;s own infrastructure to bypass authentication protocols (SPF/DKIM/DMARC), the gateway is effectively blind to the malicious intent.&#xA0;Defenders&#xA0;should&#xA0;transition to a Zero-Trust architecture that treats SaaS notifications as untrusted traffic until verified against platform-level telemetry.&#xA0;Moving&#xA0;beyond the limitations of the email gateway and adopt a fundamental&#xA0;paradigm shift: transitioning from reactive, signature-based filtering toward a proactive, API-driven model&#xA0;architecture&#xA0;that&#xA0;validates&#xA0;intent before a notification ever reaches the user.&#xA0;&#xA0;</p><p><strong>Identity and</strong>&#xA0;<strong>instance-level</strong>&#xA0;<strong>verification:</strong>&#xA0;We must move from &quot;global domain trust&quot; to &quot;instance-level authorization.&quot; Security teams should restrict&#xA0;notification&#xA0;acceptance to specific sender addresses or IP ranges associated with their organization&#x2019;s verified SaaS instances. Furthermore, by implementing Identity-Contextualization, notifications must be cross-referenced against the organization&apos;s internal SaaS directory. If a notification originates from an external or unverified account&#xA0;&#x2014;&#xA0;even one hosted on a trusted platform like GitHub&#xA0;&#x2014;&#xA0;it should be automatically quarantined. Verification is no longer about the server sending the email; it is about the identity of the user triggering the action.&#xA0;</p><p><strong>Upstream API-level</strong>&#xA0;<strong>monitoring:</strong>&#xA0;The most effective way to disrupt&#xA0;PaaP&#xA0;campaigns is to detect them before the notification is ever sent. Attackers must perform &quot;precursor activities&quot; within the platform&#xA0;&#x2014;&#xA0;such as creating repositories, configuring project names, or mass-inviting users&#xA0;&#x2014;&#xA0;to set the stage for their&#xA0;cyber-attack. By ingesting metadata from SaaS APIs (e.g., GitHub or Atlassian audit logs) into a SIEM/SOAR environment, security teams can&#xA0;identify&#xA0;these anomalous events in real-time. Detecting a &quot;Project Creation&quot; event that deviates from established naming conventions,&#xA0;originating&#xA0;from a country where the receiving organization has no employees&#xA0;or occurs outside of business hours allows for the preemptive suspension of the malicious account, neutralizing the threat at the source.&#xA0;Instead of waiting for a phishing email to arrive in an inbox, defenders are watching the&#xA0;attacker&#x2019;s&#xA0;movements inside the platform as they set up the attack.&#xA0;</p><p><strong>Semantic</strong>&#xA0;<strong>intent and</strong>&#xA0;<strong>behavioral</strong>&#xA0;<strong>profiling:</strong>&#xA0;We must replace simple&#xA0;keyword matching&#xA0;with Business Logic Profiling. Every sanctioned SaaS tool has a functional &quot;Communication Baseline.&quot; GitHub is for code collaboration; Jira is for project management. By defining these baselines, security teams can detect &quot;semantic discontinuity,&quot;&#xA0;when the content of a notification (e.g., urgent financial billing) is incongruent with the platform&apos;s primary utility. Any notification that deviates from the expected functional profile should trigger an automated &quot;Suspicious&quot; banner or be routed for manual review, regardless of its technical validity.&#xA0;</p><p><strong>Mitigating</strong>&#xA0;<strong>cognitive</strong>&#xA0;<strong>automation</strong>&#xA0;<strong>fatigue:</strong>&#xA0;PaaP&#xA0;attacks exploit &quot;automation fatigue,&quot; where users are conditioned to trust system-generated alerts. To break this cycle, organizations&#xA0;can&#xA0;introduce intentional friction. For high-risk SaaS interactions, such as new project invitations or requests for sensitive data, security policies should mandate out-of-band verification. By requiring a platform-native verification code or forcing the user to navigate directly to the official portal rather than clicking a link, we remove the &quot;reflexive trust&quot; that attackers rely on. This ensures that the platform&#x2019;s &quot;seal of approval&quot; is&#xA0;validated&#xA0;by a deliberate human action.&#xA0;</p><p><strong>Automated</strong>&#xA0;<strong>takedown</strong>&#xA0;<strong>orchestration:</strong>&#xA0;Finally, the cost of attack must be increased. Security teams should integrate automated workflows that report malicious repositories or projects directly to the provider&#x2019;s Trust&#xA0;andSafety teams. By accelerating the detection-to-takedown lifecycle, we force adversaries to constantly churn their infrastructure, making the&#xA0;PaaP&#xA0;model technically and economically unsustainable.&#xA0;</p><p>By adopting this framework, the security posture evolves from &quot;Is this email authenticated?&quot; to &quot;Is this platform activity authorized and consistent with our business logic?&quot; This shift effectively&#xA0;strips&#xA0;the trusted status that attackers exploit, forcing them to&#xA0;operate&#xA0;within an&#xA0;environment where their actions are&#xA0;monitored, profiled, and verified at every stage of the pipeline.&#xA0;</p><h2 id="acknowledgements">Acknowledgements&#xA0;</h2><p>Special thanks to the&#xA0;Talos&#xA0;Email Security&#xA0;Research&#xA0;Team&#xA0;&#x2014;&#xA0;Dev Shah,&#xA0;Lucimara&#xA0;Borges,&#xA0;Bruno Antonino, Eden Avivi, Marina Barsegyan,&#xA0;Barbara Turino Jones,&#xA0;Doaa Osman,&#xA0;Yosuke Okazaki,&#xA0;and&#xA0;Said Toure&#xA0;&#x2014;&#xA0;for their collaborative effort in&#xA0;identifying&#xA0;and mitigating these platform abuse vectors.&#xA0;</p><h2 id="indicators-of-compromise-iocs">Indicators of&#xA0;compromise (IOCs)&#xA0;</h2><p>IOCs for this threat can be found on our GitHub repository&#xA0;<a href="https://github.com/Cisco-Talos/IOCs/blob/main/2026/04/weaponizing-saas-notification-pipelines.txt" rel="noreferrer">here</a>.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Year in Review: Vulnerabilities old and new and something React2]]></title><description><![CDATA[The year was characterized by an unending beat-down on infrastructure that relied on older enmeshed dependencies (e.g., Log4j and PHPUnit), while React2Shell rocketed to the highest percentage of attacks for the entire year within the last three weeks of 2025. ]]></description><link>https://blog.talosintelligence.com/year-in-review-vulnerabilities-old-and-new-and-something-react2/</link><guid isPermaLink="false">69d3bcef421b25000170425b</guid><category><![CDATA[2025YiR]]></category><category><![CDATA[Year In Review]]></category><dc:creator><![CDATA[Kri Dontje]]></dc:creator><pubDate>Tue, 07 Apr 2026 10:00:11 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/2025YiR-topic_vulnerabilities.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/2025YiR-topic_vulnerabilities.jpg" alt="Year in Review: Vulnerabilities old and new and something React2"><p>Speed and age&#xA0;shouldn&#x2019;t&#xA0;be allowed to pair up, but that is the theme of&#xA0;the&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer noopener"><u>Talos 2025 Year in Review</u></a>&#xA0;vulnerability findings.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_top10_vulns.jpg" class="kg-image" alt="Year in Review: Vulnerabilities old and new and something React2" loading="lazy" width="1875" height="1545" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/YiR_top10_vulns.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/YiR_top10_vulns.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/YiR_top10_vulns.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_top10_vulns.jpg 1875w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure 1. React/React2Shell (2025) at the top, with PHPUnit (2017) and Log4j (2021) following up.</span></figcaption></figure><p>The year was characterized by an unending beat-down on infrastructure that relied on older enmeshed dependencies (e.g., Log4j and PHPUnit), while React2Shell&#xA0;rocketed&#xA0;to the highest percentage of attacks for the entire year within the last&#xA0;three&#xA0;weeks of 2025.&#xA0;Agentic AI&apos;s capacity for building&#xA0;and deploying&#xA0;new&#xA0;proofs-of-concepts&#xA0;and exploit kits lowered&#xA0;attacker&#xA0;time-to-exploit, and the landscape&#xA0;shifted&#xA0;for defenders.&#xA0;</p><p><em>&#x201C;The speed at which these CVEs climbed into the top tier reflects a larger systemic challenge: Newly disclosed vulnerabilities in widely deployed software can generate significant, organization-wide impact long before typical patch cycles catch up, leaving defenders with small&#xA0;reaction windows and escalating consequences for even short-lived exposure.&#x201D;&#xA0;&#x2013;&#xA0;2025 Talos&#xA0;Year&#xA0;in&#xA0;Review</em></p><h2 id="top-targeted-infrastructure">Top-targeted&#xA0;infrastructure&#xA0;</h2><p>Outdated infrastructure continues to expand the attack surface.&#xA0;Components like&#xA0;PHPUnit, ColdFusion, and Log4j&#xA0;are often embedded within&#xA0;applications, tightly coupled to legacy applications.&#xA0;Technologies age quickly, and companies are under pressure to adopt&#xA0;first, ask questions later. Low-use&#xA0;systems in&#xA0;a network&#xA0;can&#xA0;fossilize,&#xA0;unnoticed&#xA0;and unpatched. Others become mainstays that often cannot be&#xA0;swapped out or even patched without destabilizing an organization.&#xA0;&#xA0;</p><p>Attackers prioritized&#xA0;software and firmware inside network appliances, identity-adjacent systems, and widely deployed open-source components:&#xA0;</p><ul><li>Remote code execution&#xA0;(RCE)&#xA0;flaws,&#xA0;which&#xA0;enable access without requiring user interaction, avoiding a need for social engineering&#xA0;&#xA0;</li><li>Legacy systems&#xA0;and&#xA0;widely used&#xA0;components&#xA0;</li><li>Perimeter devices,&#xA0;especially without&#xA0;endpoint detection and response (EDR)&#xA0;</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_top50_CVEs.jpg" class="kg-image" alt="Year in Review: Vulnerabilities old and new and something React2" loading="lazy" width="1875" height="1181" srcset="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w600/2026/04/YiR_top50_CVEs.jpg 600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1000/2026/04/YiR_top50_CVEs.jpg 1000w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/size/w1600/2026/04/YiR_top50_CVEs.jpg 1600w, https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/YiR_top50_CVEs.jpg 1875w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Figure&#xA0;2.&#xA0;Top 50 network infrastructure CVEs.</span></figcaption></figure><p>The theme was&#xA0;identity, identity, identity.&#xA0;Controlling identity meant&#xA0;controlling access,&#xA0;so&#xA0;attackers&#xA0;focused on components that authenticate users, enforce access decisions, and broker trust between systems.&#xA0;A small number of vulnerabilities targeting these vectors drove outsized risk.&#xA0;This can invalidate&#xA0;multi-factor authentication (MFA)&#xA0;checks and bypass segmentation.&#xA0;</p><h2 id="defender-recommendations">Defender&#xA0;recommendations&#xA0;</h2><p>Attacker prioritization is now guided less by vulnerability age or maturity and more by exposure, exploitability, and proximity to trust, reshaping how organizations must think about risk in modern environments.&#xA0;</p><p>Attackers exploit patching&#xA0;gaps and policy weaknesses&#xA0;in vendor lifecycles.&#xA0;Organizations should&#xA0;evaluate&#xA0;their identity-centric network components and&#xA0;management&#xA0;platforms and&#xA0;prioritize patching of network devices&#xA0;accordingly.&#xA0;</p><p>For&#xA0;a more&#xA0;in-depth&#xA0;analysis of&#xA0;these trends, as well as how company size impacted CVE targeting trends,&#xA0;why the management plane matters,&#xA0;and&#xA0;the shortening window&#xA0;defenders have&#xA0;for putting&#xA0;defenses in place, see the&#xA0;<a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer noopener"><u>2025 Year in Review</u>&#xA0;<u>report</u></a>.</p>]]></content:encoded></item><item><title><![CDATA[Do not get high(jacked) off your own supply (chain)]]></title><description><![CDATA[In the span of just a few weeks, we have observed a dizzying array of major supply chain attacks. If we are all building on such shaky foundation, what can we do to keep safe?]]></description><link>https://blog.talosintelligence.com/protecting-supply-chain-2026/</link><guid isPermaLink="false">69cfef79421b25000170420e</guid><category><![CDATA[On The Radar]]></category><dc:creator><![CDATA[Dave Liebenberg]]></dc:creator><pubDate>Fri, 03 Apr 2026 17:31:42 GMT</pubDate><media:content url="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/on_the_radar.png" medium="image"/><content:encoded><![CDATA[<img src="https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/images/2026/04/on_the_radar.png" alt="Do not get high(jacked) off your own supply (chain)"><p>In the span of just a few weeks, we have observed a dizzying array of major supply chain attacks. Prominent examples include the malicious modification of <a href="https://blog.talosintelligence.com/axois-npm-supply-chain-incident/" rel="noreferrer">Axios</a>, a popular HTTP client library for JavaScript, as well as cascading compromises from TeamPCP, a &#x201C;chaos-as-a-service&#x201D; group that injected malicious code into hijacked GitHub repositories for open-source projects, including Trivy, an open-source security scanner.</p><p>The impact of these supply chain attacks can be vast. Axios receives 100 million downloads weekly and innumerable organizations rely on the frameworks and libraries compromised by TeamPCP. The headache they pose to organizations and their security personnel is considerable as well; affected utilities can be integrated so deeply that it may be difficult to fully catalog, let alone remediate.</p><p>Although the timing, scale, and severity of these attacks can be shocking, this is not a new phenomenon. The supply chain has remained an attractive target for some time because of its fragility and the fact that a successful compromise can lead to countless additional downstream victims.</p><p>Findings from the recently published <a href="https://blog.talosintelligence.com/2025yearinreview/" rel="noreferrer">Talos 2025 Year in Review</a> illustrate these long-standing trends. Nearly 25% of the top 100 targeted vulnerabilities we observed in 2025 affect widely used frameworks and libraries. Digging deeper into the list reveals additional insights. The React2Shell vulnerability affecting React Server Components became the top-targeted vulnerability of 2025 despite being disclosed in December, reflecting the speed at which these supply chain attacks can reach massive scale. The presence of Log4j vulnerabilities shows how deeply embedded these utilities can be and therefore how difficult it can be to reduce the attack surface. Although these particular examples represent extant vulnerabilities that can be weaponized by numerous adversaries versus a deliberate attack carried out by a single adversary, they show how impactful and disruptive threats to the supply chain can be. Follow-on attacks can range from ransomware to espionage, which is reflective of the broad swath of adversaries that carry them out &#x2014; from sophisticated state-sponsored groups to teenage cyber criminals.</p><p>If we are all building on such shaky foundation, what can we do to keep safe? After all, it certainly seems dire when a tool such as Trivy that we could normally use to scan for supply chain vulnerabilities becomes compromised itself. But there are concrete steps we can take to improve our security posture.</p><p>As highlighted in the Year in Review, protecting identity is key. This includes securing CI/CD pipelines to prevent these types of compromises from occurring in the first place, as well as limiting the impact and lateral movement of an adversary should they obtain access to a downstream victim.</p><p>In addition, organizations must try to the best of their abilities to inventory the software libraries and frameworks they employ, stay informed of security incidents, and respond rapidly to implement patching and other mitigations.</p><p>Just as supply chain attacks are evergreen, so too is the efficacy of security fundamentals, such as segmentation, robust logging, multi-factor authentication (MFA), and the implementation of emergency response plans.</p><p>As trust continues to break down, the only viable solution may be to double down on vigilance. Since this recent spate of attacks represents a trend that will likely only grow in intensity and breadth, the time for action and planning is now.</p><h2 id="coverage">Coverage</h2><p>Below, find a sample of the some of the recent coverage we offer to protect against these threats:</p><p>ClamAV:<br>Txt.Trojan.TeamPCP-10059839-0</p><p>Txt.Trojan.TeamPCP-10059839-0</p><p>Behavioral Protections:<br>LiteLLM Supply Chain Compromise &#x2013; alerts during installation of compromised packages</p>]]></content:encoded></item></channel></rss>