<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Cybersecurity News and Magazine</title>
	<atom:link href="https://thecyberexpress.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://thecyberexpress.com</link>
	<description>Trending Cybersecurity News, Updates, Magazine and More.</description>
	<lastBuildDate>Wed, 08 Apr 2026 09:19:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://thecyberexpress.com/wp-content/uploads/tce-favicon-75x75.jpg?crop=1</url>
	<title>The Cyber Express</title>
	<link>https://thecyberexpress.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">208869986</site>	<itunes:explicit>no</itunes:explicit><itunes:subtitle>Trending Cybersecurity News, Updates, Magazine and More.</itunes:subtitle><item>
		<title>Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk</title>
		<link>https://thecyberexpress.com/flowise-rce-vulnerability-cve-2025-59528/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 09:19:18 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[CustomMCP]]></category>
		<category><![CDATA[CVE-2025-59528]]></category>
		<category><![CDATA[execute arbitrary code]]></category>
		<category><![CDATA[Flowise RCE vulnerability]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111146</guid>

					<description><![CDATA[<p><img width="1500" height="844" src="https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Flowise RCE vulnerability" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability.webp 1500w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1140x641.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability.webp 1500w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1140x641.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk 1"></p><span data-contrast="auto">A critical Flowise RCE vulnerability is now being actively exploited. The flaw, tracked as CVE-2025-59528, carries a maximum severity rating and enables attackers to execute arbitrary code on affected systems, potentially leading to full system compromise.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27547">Security</a> researchers have confirmed that threat actors are taking advantage of the Flowise RCE vulnerability to infiltrate vulnerable deployments. This issue, identified as CVE-2025-59528, allows malicious actors to inject and execute arbitrary code through unsafe handling of user input within the platform.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27552">vulnerability</a> was first publicly disclosed in September of last year, accompanied by warnings that successful exploitation could result in command execution and unauthorized access to the file system. Despite the availability of a patch, exploitation attempts have now been observed in real-world environments.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Unsafe JavaScript Execution</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The issue arises in the<span data-contrast="auto"> Flowise CustomMCP node, a component designed to connect with external Model Context Protocol (MCP) servers. The vulnerability arises because the node unsafely evaluates user-supplied input in the </span><span data-contrast="auto">mcpServerConfig</span><span data-contrast="auto"> setting.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This design flaw allows attackers to inject malicious JavaScript code without undergoing proper validation or security checks. As a result, attackers can leverage the Flowise RCE vulnerability (CVE-2025-59528) to <a href="https://thecyberexpress.com/flexplm-vulnerability-cve-2026-4681/" target="_blank" rel="noopener">execute arbitrary code</a>, potentially gaining control over the affected system.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The <a href="https://github.com/FlowiseAI/Flowise" target="_blank" rel="nofollow noopener">developers addressed the vulnerability</a> in Flowise version 3.0.6. The latest available version, 3.1.1, was released two weeks ago and includes the necessary fixes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Flowise itself is a low-code, open-source platform used to build AI agents and large language model (LLM) workflows. It features a drag-and-drop interface that enables users to design pipelines for chatbots, automation tools, and other AI-driven systems.</span>
<h3 aria-level="3"><b><span data-contrast="none">Evidence of Flowise RCE Vulnerability</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">According to <a href="https://www.linkedin.com/feed/update/urn:li:activity:7446686314562850817/" target="_blank" rel="nofollow noopener">Caitlin Condon</a>, VP of Security Research at VulnCheck, exploitation activity has already begun. She stated:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">“New hashtag#KEV: Early this morning, VulnCheck's Canary network began detecting first-time exploitation of CVE-2025-59528, a CVSS-10 arbitrary JavaScript code injection vulnerability in Flowise, an open-source AI development platform. The vulnerability resides in the CustomMCP server logic in multiple versions of Flowise and allows for code execution.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">She further noted:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">“Observed activity so far originates from a single Starlink IP. Our team's ASM queries show 12,000 - 15,000 instances of Flowise on the public <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27551">internet</a> as of today. CVE-2025-59528 is patched in version 3.0.6 of Flowise.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This suggests that while exploitation is currently limited, the <a href="https://thecyberexpress.com/cortex-xdr-bioc-rules-security-risk/" target="_blank" rel="noopener">attack surface</a> remains significant due to the large number of exposed instances.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Additional Vulnerabilities Increase Risk</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The Flowise RCE vulnerability (CVE-2025-59528) is not the only security concern affecting the platform. Researchers have also observed active exploitation of two other <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27550">vulnerabilities</a>: CVE-2025-8943 and CVE-2025-26319.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Condon emphasized that both of these flaws are included in VulnCheck’s Known Exploited Vulnerabilities (KEV) catalog and have been detected through their monitoring systems. This indicates a broader pattern of attackers targeting Flowise deployments to execute arbitrary code and gain unauthorized access.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Although estimates suggest that between 12,000 and 15,000 Flowise instances are accessible on the public internet, it remains unclear how many of these are vulnerable to CVE-2025-59528.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Even so, the presence of such a large number of exposed systems increases the likelihood of further attacks, especially as <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27549">exploit</a> techniques become more widely available.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><strong>Recommendations for Users</strong></h3>
<span data-contrast="auto">Users of Flowise are strongly advised to take immediate action to mitigate the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27548">risks</a> associated with CVE-2025-59528. Upgrading to version 3.1.1, or at a minimum version 3.0.6, is critical to patch the Flowise RCE vulnerability and prevent attackers from exploiting it to execute arbitrary code.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Additionally, organizations should evaluate whether their Flowise instances need to be publicly accessible. If external access is not required, removing these systems from the public internet can significantly reduce exposure to attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1500" height="844" src="https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Flowise RCE vulnerability" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability.webp 1500w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1140x641.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability.webp 1500w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/Flowise-RCE-vulnerability-1140x641.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk 2"></p><span data-contrast="auto">A critical Flowise RCE vulnerability is now being actively exploited. The flaw, tracked as CVE-2025-59528, carries a maximum severity rating and enables attackers to execute arbitrary code on affected systems, potentially leading to full system compromise.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27547">Security</a> researchers have confirmed that threat actors are taking advantage of the Flowise RCE vulnerability to infiltrate vulnerable deployments. This issue, identified as CVE-2025-59528, allows malicious actors to inject and execute arbitrary code through unsafe handling of user input within the platform.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27552">vulnerability</a> was first publicly disclosed in September of last year, accompanied by warnings that successful exploitation could result in command execution and unauthorized access to the file system. Despite the availability of a patch, exploitation attempts have now been observed in real-world environments.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Unsafe JavaScript Execution</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
The issue arises in the<span data-contrast="auto"> Flowise CustomMCP node, a component designed to connect with external Model Context Protocol (MCP) servers. The vulnerability arises because the node unsafely evaluates user-supplied input in the </span><span data-contrast="auto">mcpServerConfig</span><span data-contrast="auto"> setting.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This design flaw allows attackers to inject malicious JavaScript code without undergoing proper validation or security checks. As a result, attackers can leverage the Flowise RCE vulnerability (CVE-2025-59528) to <a href="https://thecyberexpress.com/flexplm-vulnerability-cve-2026-4681/" target="_blank" rel="noopener">execute arbitrary code</a>, potentially gaining control over the affected system.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The <a href="https://github.com/FlowiseAI/Flowise" target="_blank" rel="nofollow noopener">developers addressed the vulnerability</a> in Flowise version 3.0.6. The latest available version, 3.1.1, was released two weeks ago and includes the necessary fixes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Flowise itself is a low-code, open-source platform used to build AI agents and large language model (LLM) workflows. It features a drag-and-drop interface that enables users to design pipelines for chatbots, automation tools, and other AI-driven systems.</span>
<h3 aria-level="3"><b><span data-contrast="none">Evidence of Flowise RCE Vulnerability</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></h3>
<span data-contrast="auto">According to <a href="https://www.linkedin.com/feed/update/urn:li:activity:7446686314562850817/" target="_blank" rel="nofollow noopener">Caitlin Condon</a>, VP of Security Research at VulnCheck, exploitation activity has already begun. She stated:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">“New hashtag#KEV: Early this morning, VulnCheck's Canary network began detecting first-time exploitation of CVE-2025-59528, a CVSS-10 arbitrary JavaScript code injection vulnerability in Flowise, an open-source AI development platform. The vulnerability resides in the CustomMCP server logic in multiple versions of Flowise and allows for code execution.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">She further noted:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">“Observed activity so far originates from a single Starlink IP. Our team's ASM queries show 12,000 - 15,000 instances of Flowise on the public <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27551">internet</a> as of today. CVE-2025-59528 is patched in version 3.0.6 of Flowise.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This suggests that while exploitation is currently limited, the <a href="https://thecyberexpress.com/cortex-xdr-bioc-rules-security-risk/" target="_blank" rel="noopener">attack surface</a> remains significant due to the large number of exposed instances.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Additional Vulnerabilities Increase Risk</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The Flowise RCE vulnerability (CVE-2025-59528) is not the only security concern affecting the platform. Researchers have also observed active exploitation of two other <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27550">vulnerabilities</a>: CVE-2025-8943 and CVE-2025-26319.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Condon emphasized that both of these flaws are included in VulnCheck’s Known Exploited Vulnerabilities (KEV) catalog and have been detected through their monitoring systems. This indicates a broader pattern of attackers targeting Flowise deployments to execute arbitrary code and gain unauthorized access.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Although estimates suggest that between 12,000 and 15,000 Flowise instances are accessible on the public internet, it remains unclear how many of these are vulnerable to CVE-2025-59528.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Even so, the presence of such a large number of exposed systems increases the likelihood of further attacks, especially as <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27549">exploit</a> techniques become more widely available.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><strong>Recommendations for Users</strong></h3>
<span data-contrast="auto">Users of Flowise are strongly advised to take immediate action to mitigate the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27548">risks</a> associated with CVE-2025-59528. Upgrading to version 3.1.1, or at a minimum version 3.0.6, is critical to patch the Flowise RCE vulnerability and prevent attackers from exploiting it to execute arbitrary code.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Additionally, organizations should evaluate whether their Flowise instances need to be publicly accessible. If external access is not required, removing these systems from the public internet can significantly reduce exposure to attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111146</post-id>	</item>
		<item>
		<title>Gov. Tim Walz Deploys National Guard After Winona Cyberattack Disrupts Services</title>
		<link>https://thecyberexpress.com/winona-county-cyberattack-update/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 07:37:30 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber Pressure]]></category>
		<category><![CDATA[cyberattack on Winona County]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Governor Tim Walz]]></category>
		<category><![CDATA[Minnesota Information Technology Services]]></category>
		<category><![CDATA[Minnesota National Guard]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[Winona County cyberattack]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111132</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Winona County cyberattack" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Gov. Tim Walz Deploys National Guard After Winona Cyberattack Disrupts Services 3"></p>A Winona County cyberattack has disrupted critical systems and forced Minnesota to step in with emergency support.

The cyberattack on Winona County began on April 6 and continued overnight into April 7, affecting key <a href="https://thecyberexpress.com/?s=digital+infrastructure" target="_blank" rel="noopener">digital infrastructure</a> used to run emergency and municipal services. County officials said the disruption significantly impaired their ability to deliver essential services, including core administrative and public-facing operations.

Governor Tim Walz signed an executive order authorizing the Minnesota National Guard to assist with the response.

“Cyberattacks are an evolving threat that can strike anywhere, at any time,” <a href="https://mn.gov/governor/newsroom/press-releases/#/detail/appId/1/id/739093" target="_blank" rel="nofollow noopener">said</a> Governor Walz. “Swift coordination between state and local experts matters in these moments. That's why I am authorizing the National Guard to support Winona County as they work to protect critical systems and maintain essential services.”
<h3><strong>Winona County Cyberattack Strains Local Response</strong></h3>
The Winona County <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-cyber-attack/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27541">cyberattack</a> quickly overwhelmed local response efforts.

Officials said teams have been working around the clock since the incident was detected. The county is coordinating with Minnesota Information Technology Services, the Minnesota Bureau of Criminal Apprehension, the League of Minnesota Cities, the <a href="https://thecyberexpress.com/phishing-scam-targeting-pro-athletes/" target="_blank" rel="noopener">Federal Bureau of Investigation</a>, and external cybersecurity specialists.

Despite this multi-agency response, officials confirmed that the scale and complexity of the incident exceeded both internal and commercial response capabilities. This led to a formal request for <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27544">cyber</a> protection support from the Minnesota National Guard.

The incident highlights how even smaller jurisdictions are now facing large-scale cyber disruptions that require state-level intervention.
<h3><strong>National Guard Activated Under Emergency Order</strong></h3>
Under the emergency order, the Adjutant <a class="wpil_keyword_link" href="https://cyble.com/general/" target="_blank"  rel="noopener" title="General" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27545">General</a> is authorized to deploy personnel, equipment, and other resources to support the response to the Winona County cyberattack.

The order also allows the state to procure services needed to manage the incident and confirms that costs will be covered through the state’s general fund. It is already in effect and will remain active until the emergency conditions subside or the order is formally rescinded.

Officials say the priority is to stabilize affected systems, prevent further damage, and restore full functionality as quickly as possible.
<h3><strong>Essential Services Continue Amid Disruption</strong></h3>
Even as systems remain impacted, officials stressed that emergency services are still operational.

911 services, fire response, and other emergency operations continue to function during the Winona County cyberattack, ensuring that urgent public safety needs are not affected.

However, the disruption has slowed other county services, and officials have warned that some delays are expected as systems are brought back online. Residents have been asked for patience while recovery efforts continue.
<h3><strong>Investigation Underway</strong></h3>
Authorities have not disclosed the nature of the Winona County cyberattack or whether it involves<a href="https://thecyberexpress.com/tce-weekly-roundup-ransomware-supply-chain/" target="_blank" rel="noopener"> ransomware</a> or another type of cyber intrusion.

The FBI is actively involved in the investigation, along with state agencies and external <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27540">cybersecurity</a> experts. Investigators are working to determine how the attack occurred, what systems were impacted, and whether any sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27542">data</a> was accessed.

For now, the focus remains on containment, system recovery, and strengthening defenses to prevent further intrusion.
<h3><strong>Earlier Ransomware Incident Raises Concerns</strong></h3>
The latest Winona County cyberattack comes as an update to a <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ransomware/" target="_blank"  rel="noopener" title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27546">ransomware</a> incident the county first reported in January 2026.

At the time, officials <a href="https://winonacounty.gov/m/newsflash/Home/Detail/350" target="_blank" rel="nofollow noopener">said</a>, “We recently identified and responded to a ransomware incident affecting our computer network. Upon discovery, we immediately initiated an investigation to assess the scope and impact of the incident.”

A local emergency was declared during that event by County Board Chair Commissioner Meyer, as officials worked to maintain continuity of services. Emergency operations, including 911 and fire response, remained active while systems were analyzed and restored.

The recurrence of cyber incidents in such a short period has raised concerns about ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27543">vulnerabilities</a> and the growing threat landscape facing local governments.
<h3><strong>Growing Cyber Pressure on Local Governments</strong></h3>
The Winona County cyberattack highlight a broader trend, local governments are increasingly targeted but often lack the resources to respond to complex cyber incidents on their own.

When systems go down, the impact is immediate. Public services are disrupted, and recovery can take time.

State support is now helping Winona County stabilize operations. But the incident highlights a larger issue: cyberattacks are becoming more frequent, more disruptive, and harder for local agencies to handle without outside assistance.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Winona County cyberattack" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Winona-County-cyberattack-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Gov. Tim Walz Deploys National Guard After Winona Cyberattack Disrupts Services 4"></p>A Winona County cyberattack has disrupted critical systems and forced Minnesota to step in with emergency support.

The cyberattack on Winona County began on April 6 and continued overnight into April 7, affecting key <a href="https://thecyberexpress.com/?s=digital+infrastructure" target="_blank" rel="noopener">digital infrastructure</a> used to run emergency and municipal services. County officials said the disruption significantly impaired their ability to deliver essential services, including core administrative and public-facing operations.

Governor Tim Walz signed an executive order authorizing the Minnesota National Guard to assist with the response.

“Cyberattacks are an evolving threat that can strike anywhere, at any time,” <a href="https://mn.gov/governor/newsroom/press-releases/#/detail/appId/1/id/739093" target="_blank" rel="nofollow noopener">said</a> Governor Walz. “Swift coordination between state and local experts matters in these moments. That's why I am authorizing the National Guard to support Winona County as they work to protect critical systems and maintain essential services.”
<h3><strong>Winona County Cyberattack Strains Local Response</strong></h3>
The Winona County <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-cyber-attack/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27541">cyberattack</a> quickly overwhelmed local response efforts.

Officials said teams have been working around the clock since the incident was detected. The county is coordinating with Minnesota Information Technology Services, the Minnesota Bureau of Criminal Apprehension, the League of Minnesota Cities, the <a href="https://thecyberexpress.com/phishing-scam-targeting-pro-athletes/" target="_blank" rel="noopener">Federal Bureau of Investigation</a>, and external cybersecurity specialists.

Despite this multi-agency response, officials confirmed that the scale and complexity of the incident exceeded both internal and commercial response capabilities. This led to a formal request for <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27544">cyber</a> protection support from the Minnesota National Guard.

The incident highlights how even smaller jurisdictions are now facing large-scale cyber disruptions that require state-level intervention.
<h3><strong>National Guard Activated Under Emergency Order</strong></h3>
Under the emergency order, the Adjutant <a class="wpil_keyword_link" href="https://cyble.com/general/" target="_blank"  rel="noopener" title="General" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27545">General</a> is authorized to deploy personnel, equipment, and other resources to support the response to the Winona County cyberattack.

The order also allows the state to procure services needed to manage the incident and confirms that costs will be covered through the state’s general fund. It is already in effect and will remain active until the emergency conditions subside or the order is formally rescinded.

Officials say the priority is to stabilize affected systems, prevent further damage, and restore full functionality as quickly as possible.
<h3><strong>Essential Services Continue Amid Disruption</strong></h3>
Even as systems remain impacted, officials stressed that emergency services are still operational.

911 services, fire response, and other emergency operations continue to function during the Winona County cyberattack, ensuring that urgent public safety needs are not affected.

However, the disruption has slowed other county services, and officials have warned that some delays are expected as systems are brought back online. Residents have been asked for patience while recovery efforts continue.
<h3><strong>Investigation Underway</strong></h3>
Authorities have not disclosed the nature of the Winona County cyberattack or whether it involves<a href="https://thecyberexpress.com/tce-weekly-roundup-ransomware-supply-chain/" target="_blank" rel="noopener"> ransomware</a> or another type of cyber intrusion.

The FBI is actively involved in the investigation, along with state agencies and external <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27540">cybersecurity</a> experts. Investigators are working to determine how the attack occurred, what systems were impacted, and whether any sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27542">data</a> was accessed.

For now, the focus remains on containment, system recovery, and strengthening defenses to prevent further intrusion.
<h3><strong>Earlier Ransomware Incident Raises Concerns</strong></h3>
The latest Winona County cyberattack comes as an update to a <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ransomware/" target="_blank"  rel="noopener" title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27546">ransomware</a> incident the county first reported in January 2026.

At the time, officials <a href="https://winonacounty.gov/m/newsflash/Home/Detail/350" target="_blank" rel="nofollow noopener">said</a>, “We recently identified and responded to a ransomware incident affecting our computer network. Upon discovery, we immediately initiated an investigation to assess the scope and impact of the incident.”

A local emergency was declared during that event by County Board Chair Commissioner Meyer, as officials worked to maintain continuity of services. Emergency operations, including 911 and fire response, remained active while systems were analyzed and restored.

The recurrence of cyber incidents in such a short period has raised concerns about ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27543">vulnerabilities</a> and the growing threat landscape facing local governments.
<h3><strong>Growing Cyber Pressure on Local Governments</strong></h3>
The Winona County cyberattack highlight a broader trend, local governments are increasingly targeted but often lack the resources to respond to complex cyber incidents on their own.

When systems go down, the impact is immediate. Public services are disrupted, and recovery can take time.

State support is now helping Winona County stabilize operations. But the incident highlights a larger issue: cyberattacks are becoming more frequent, more disruptive, and harder for local agencies to handle without outside assistance.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111132</post-id>	</item>
		<item>
		<title>FBI Takes Down APT28 Network Behind Global DNS Hijacking Attacks</title>
		<link>https://thecyberexpress.com/apt28-dns-hijacking-fbi/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 07:00:10 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[adversary-in-the-middle]]></category>
		<category><![CDATA[APT28]]></category>
		<category><![CDATA[DNS hijacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FBI Takes Down APT28]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111135</guid>

					<description><![CDATA[<p><img width="1500" height="1001" src="https://thecyberexpress.com/wp-content/uploads/APT28.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="APT28" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/APT28.webp 1500w, https://thecyberexpress.com/wp-content/uploads/APT28-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/APT28-1024x683.webp 1024w, https://thecyberexpress.com/wp-content/uploads/APT28-768x513.webp 768w, https://thecyberexpress.com/wp-content/uploads/APT28-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/APT28-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/APT28-750x501.webp 750w, https://thecyberexpress.com/wp-content/uploads/APT28-1140x761.webp 1140w, https://thecyberexpress.com/wp-content/uploads/APT28.webp 1500w, https://thecyberexpress.com/wp-content/uploads/APT28-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/APT28-1024x683.webp 1024w, https://thecyberexpress.com/wp-content/uploads/APT28-768x513.webp 768w, https://thecyberexpress.com/wp-content/uploads/APT28-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/APT28-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/APT28-750x501.webp 750w, https://thecyberexpress.com/wp-content/uploads/APT28-1140x761.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="FBI Takes Down APT28 Network Behind Global DNS Hijacking Attacks 5"></p><span data-contrast="auto">The Russian-linked threat group APT28 has continued to leverage vulnerable network devices to carry out large-scale DNS hijacking campaigns, enabling adversary-in-the-middle attacks. Recent developments show that these operations have drawn direct intervention from U.S. authorities.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The U.S. Department of Justice and the FBI announced a court-authorized operation to disrupt a network of compromised routers controlled by Russia’s military intelligence unit, widely known as APT28. According to findings aligned with prior reporting from the NCSC, the group has been exploiting routers to intercept communications, harvest credentials, and target individuals and organizations of intelligence interest.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">DNS Hijacking and Adversary-in-the-Middle Tactics</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">APT28’s operations include DNS hijacking, a technique that manipulates how domain names are resolved into <a href="https://thecyberexpress.com/russia-weaponizes-ukrainian-ip-addresses/" target="_blank" rel="noopener">IP addresses</a>. By altering DNS settings, often at the router level, attackers redirect legitimate traffic through malicious infrastructure.</span>

<span data-contrast="auto">This enables adversary-in-the-middle (AitM) attacks, where victims unknowingly connect to spoofed services. These malicious endpoints are designed to imitate legitimate platforms, allowing attackers to intercept login sessions and extract <a href="https://thecyberexpress.com/ai-driven-phishing-campaign/" target="_blank" rel="noopener">sensitive data</a>, including passwords, OAuth tokens, and emails.</span>

<span data-contrast="auto">Both the FBI and the NCSC have noted that these attacks can impact browser sessions and desktop applications alike, increasing the scale and effectiveness of credential harvesting.</span>
<h3 aria-level="2"><b><span data-contrast="none">U.S. Operation Targets APT28 Infrastructure</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The disruption effort, publicly disclosed by the <a href="https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled" target="_blank" rel="nofollow noopener">Department of Justice</a>, targeted a network of small office/home office (SOHO) routers compromised by APT28, also known as Fancy Bear, Sofacy, Sednit, STRONTIUM, Forest Blizzard, and Pawn Storm. The group is widely attributed to Russia’s GRU Unit 26165.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Since at least 2024, APT28 actors have exploited known <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27539">vulnerabilities</a> to gain access to thousands of TP-Link routers globally. After stealing credentials, they modified router configurations to redirect DNS traffic to malicious servers under their control.</span>

<span data-contrast="auto">These operations were initially indiscriminate. However, the attackers implemented automated filtering mechanisms to identify DNS queries of intelligence value. For selected targets, the malicious DNS resolvers returned fraudulent records for domains, particularly those mimicking Microsoft Outlook services, to facilitate adversary-in-the-middle attacks against encrypted <a href="https://thecyberexpress.com/voxbeam-robocall-case-fcc-fines-firm/" target="_blank" rel="noopener">traffic</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Through this approach, APT28 was able to harvest unencrypted passwords, authentication tokens, emails, and other sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27535">data</a> from devices connected to compromised routers.</span>
<h3 aria-level="2"><b><span data-contrast="none">Official Statements on the Threat</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">U.S. officials described the campaign as both persistent and dangerous. Assistant Attorney <a class="wpil_keyword_link" href="https://cyble.com/general/" target="_blank"  rel="noopener" title="General" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27536">General</a> John A. Eisenberg stated, “The GRU’s predatory use of networks in American homes and businesses for its malicious <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27534">cyber</a> operations remains a serious and persistent threat.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">U.S. Attorney David Metcalf added, “Russian military intelligence once again hijacked Americans’ hardware to commandeer critical data,” emphasizing that the government would continue to respond aggressively to nation-state cyber threats.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">FBI officials also stressed the scale of the campaign. Assistant Director Brett Leatherman noted that compromised routers were used globally for <a href="https://thecyberexpress.com/russia-and-china-cyberespionage-finland/" target="_blank" rel="noopener">espionage</a>, while Special Agent Ted E. Docks highlighted that devices across more than 23 U.S. states had been weaponized.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">How the FBI Disrupted the DNS Hijacking Network</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">As part of the court-authorized operation, referred to as Operation Masquerade, the FBI deployed technical measures to neutralize the U.S. portion of APT28’s infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">According to court documents:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">The FBI sent commands to compromised routers to collect evidence of APT28 activity.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
 	<li><span data-contrast="auto">Reset DNS settings, removing malicious resolvers and restoring legitimate ISP configurations.</span></li>
 	<li><span data-contrast="auto">Blocked the actors’ ability to regain <a href="https://thecyberexpress.com/intesa-sanpaolo-data-breach-missed-for-2-years/" target="_blank" rel="noopener">unauthorized access</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">The operation was carefully tested on affected TP-Link devices to ensure that it did not disrupt normal functionality or collect user content. Importantly, the remediation steps can be reversed by users through factory resets or manual configuration changes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Continued Router Exploitation and Infrastructure Tactics</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">These developments align closely with earlier findings from the NCSC, which <a href="https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations" target="_blank" rel="nofollow noopener">documented how APT28 used Virtual Private Servers (VPSs)</a> as malicious DNS infrastructure. Two main clusters were identified:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">Cluster One:</span></b><span data-contrast="auto"> Focused on modifying DHCP DNS settings in SOHO routers, enabling selective DNS hijacking and adversary-in-the-middle attacks. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Cluster Two:</span></b><span data-contrast="auto"> Involved forwarding DNS traffic through a layered infrastructure, with some operations targeting high-value devices, including those in Ukraine. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">APT28’s activity has also included exploitation of vulnerabilities such as CVE-2023-50224 in <a href="https://thecyberexpress.com/chinese-cyberattacks-risk/" target="_blank" rel="noopener">TP-Link routers</a>, allowing attackers to extract credentials and reconfigure DNS settings via crafted HTTP requests.</span>
<h3 aria-level="2"><b><span data-contrast="none">Targeted Services and Indicators</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">APT28’s DNS hijacking campaigns have frequently targeted Microsoft Outlook-related domains, including:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">autodiscover-s.outlook[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">imap-mail.outlook[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">outlook.live[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">outlook.office[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">outlook.office365[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">These targets reflect a clear focus on email-based intelligence gathering. Supporting infrastructure includes numerous malicious <a href="https://thecyberexpress.com/who-is-handala-hackers-in-stryker-cyberattack/" target="_blank" rel="noopener">IP ranges</a> and identifiable server configurations, such as unusual SSH ports and “dnsmasq-2.85” DNS services.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Mitigation and Security Recommendations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Both the FBI and the NCSC recommend immediate steps to mitigate <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27538">risks</a> associated with DNS hijacking and adversary-in-the-middle attacks:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">Replace end-of-life or unsupported routers </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Update firmware to the latest available versions </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Verify DNS settings to ensure they point to legitimate resolvers </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Disable or secure remote management interfaces </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Implement <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-firewall/" target="_blank"  rel="noopener" title="firewall" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27537">firewall</a> rules to limit exposure </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Enable multi-factor authentication (MFA) to reduce credential abuse </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Users are also encouraged to monitor their networks and report suspected compromises to appropriate authorities.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>]]></description>
										<content:encoded><![CDATA[<p><img width="1500" height="1001" src="https://thecyberexpress.com/wp-content/uploads/APT28.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="APT28" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/APT28.webp 1500w, https://thecyberexpress.com/wp-content/uploads/APT28-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/APT28-1024x683.webp 1024w, https://thecyberexpress.com/wp-content/uploads/APT28-768x513.webp 768w, https://thecyberexpress.com/wp-content/uploads/APT28-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/APT28-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/APT28-750x501.webp 750w, https://thecyberexpress.com/wp-content/uploads/APT28-1140x761.webp 1140w, https://thecyberexpress.com/wp-content/uploads/APT28.webp 1500w, https://thecyberexpress.com/wp-content/uploads/APT28-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/APT28-1024x683.webp 1024w, https://thecyberexpress.com/wp-content/uploads/APT28-768x513.webp 768w, https://thecyberexpress.com/wp-content/uploads/APT28-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/APT28-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/APT28-750x501.webp 750w, https://thecyberexpress.com/wp-content/uploads/APT28-1140x761.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="FBI Takes Down APT28 Network Behind Global DNS Hijacking Attacks 6"></p><span data-contrast="auto">The Russian-linked threat group APT28 has continued to leverage vulnerable network devices to carry out large-scale DNS hijacking campaigns, enabling adversary-in-the-middle attacks. Recent developments show that these operations have drawn direct intervention from U.S. authorities.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The U.S. Department of Justice and the FBI announced a court-authorized operation to disrupt a network of compromised routers controlled by Russia’s military intelligence unit, widely known as APT28. According to findings aligned with prior reporting from the NCSC, the group has been exploiting routers to intercept communications, harvest credentials, and target individuals and organizations of intelligence interest.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">DNS Hijacking and Adversary-in-the-Middle Tactics</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">APT28’s operations include DNS hijacking, a technique that manipulates how domain names are resolved into <a href="https://thecyberexpress.com/russia-weaponizes-ukrainian-ip-addresses/" target="_blank" rel="noopener">IP addresses</a>. By altering DNS settings, often at the router level, attackers redirect legitimate traffic through malicious infrastructure.</span>

<span data-contrast="auto">This enables adversary-in-the-middle (AitM) attacks, where victims unknowingly connect to spoofed services. These malicious endpoints are designed to imitate legitimate platforms, allowing attackers to intercept login sessions and extract <a href="https://thecyberexpress.com/ai-driven-phishing-campaign/" target="_blank" rel="noopener">sensitive data</a>, including passwords, OAuth tokens, and emails.</span>

<span data-contrast="auto">Both the FBI and the NCSC have noted that these attacks can impact browser sessions and desktop applications alike, increasing the scale and effectiveness of credential harvesting.</span>
<h3 aria-level="2"><b><span data-contrast="none">U.S. Operation Targets APT28 Infrastructure</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The disruption effort, publicly disclosed by the <a href="https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled" target="_blank" rel="nofollow noopener">Department of Justice</a>, targeted a network of small office/home office (SOHO) routers compromised by APT28, also known as Fancy Bear, Sofacy, Sednit, STRONTIUM, Forest Blizzard, and Pawn Storm. The group is widely attributed to Russia’s GRU Unit 26165.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Since at least 2024, APT28 actors have exploited known <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27539">vulnerabilities</a> to gain access to thousands of TP-Link routers globally. After stealing credentials, they modified router configurations to redirect DNS traffic to malicious servers under their control.</span>

<span data-contrast="auto">These operations were initially indiscriminate. However, the attackers implemented automated filtering mechanisms to identify DNS queries of intelligence value. For selected targets, the malicious DNS resolvers returned fraudulent records for domains, particularly those mimicking Microsoft Outlook services, to facilitate adversary-in-the-middle attacks against encrypted <a href="https://thecyberexpress.com/voxbeam-robocall-case-fcc-fines-firm/" target="_blank" rel="noopener">traffic</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Through this approach, APT28 was able to harvest unencrypted passwords, authentication tokens, emails, and other sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27535">data</a> from devices connected to compromised routers.</span>
<h3 aria-level="2"><b><span data-contrast="none">Official Statements on the Threat</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">U.S. officials described the campaign as both persistent and dangerous. Assistant Attorney <a class="wpil_keyword_link" href="https://cyble.com/general/" target="_blank"  rel="noopener" title="General" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27536">General</a> John A. Eisenberg stated, “The GRU’s predatory use of networks in American homes and businesses for its malicious <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27534">cyber</a> operations remains a serious and persistent threat.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">U.S. Attorney David Metcalf added, “Russian military intelligence once again hijacked Americans’ hardware to commandeer critical data,” emphasizing that the government would continue to respond aggressively to nation-state cyber threats.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">FBI officials also stressed the scale of the campaign. Assistant Director Brett Leatherman noted that compromised routers were used globally for <a href="https://thecyberexpress.com/russia-and-china-cyberespionage-finland/" target="_blank" rel="noopener">espionage</a>, while Special Agent Ted E. Docks highlighted that devices across more than 23 U.S. states had been weaponized.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">How the FBI Disrupted the DNS Hijacking Network</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">As part of the court-authorized operation, referred to as Operation Masquerade, the FBI deployed technical measures to neutralize the U.S. portion of APT28’s infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">According to court documents:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">The FBI sent commands to compromised routers to collect evidence of APT28 activity.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
 	<li><span data-contrast="auto">Reset DNS settings, removing malicious resolvers and restoring legitimate ISP configurations.</span></li>
 	<li><span data-contrast="auto">Blocked the actors’ ability to regain <a href="https://thecyberexpress.com/intesa-sanpaolo-data-breach-missed-for-2-years/" target="_blank" rel="noopener">unauthorized access</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">The operation was carefully tested on affected TP-Link devices to ensure that it did not disrupt normal functionality or collect user content. Importantly, the remediation steps can be reversed by users through factory resets or manual configuration changes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Continued Router Exploitation and Infrastructure Tactics</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">These developments align closely with earlier findings from the NCSC, which <a href="https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations" target="_blank" rel="nofollow noopener">documented how APT28 used Virtual Private Servers (VPSs)</a> as malicious DNS infrastructure. Two main clusters were identified:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">Cluster One:</span></b><span data-contrast="auto"> Focused on modifying DHCP DNS settings in SOHO routers, enabling selective DNS hijacking and adversary-in-the-middle attacks. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">Cluster Two:</span></b><span data-contrast="auto"> Involved forwarding DNS traffic through a layered infrastructure, with some operations targeting high-value devices, including those in Ukraine. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">APT28’s activity has also included exploitation of vulnerabilities such as CVE-2023-50224 in <a href="https://thecyberexpress.com/chinese-cyberattacks-risk/" target="_blank" rel="noopener">TP-Link routers</a>, allowing attackers to extract credentials and reconfigure DNS settings via crafted HTTP requests.</span>
<h3 aria-level="2"><b><span data-contrast="none">Targeted Services and Indicators</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">APT28’s DNS hijacking campaigns have frequently targeted Microsoft Outlook-related domains, including:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">autodiscover-s.outlook[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">imap-mail.outlook[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">outlook.live[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">outlook.office[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">outlook.office365[.]com </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">These targets reflect a clear focus on email-based intelligence gathering. Supporting infrastructure includes numerous malicious <a href="https://thecyberexpress.com/who-is-handala-hackers-in-stryker-cyberattack/" target="_blank" rel="noopener">IP ranges</a> and identifiable server configurations, such as unusual SSH ports and “dnsmasq-2.85” DNS services.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Mitigation and Security Recommendations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Both the FBI and the NCSC recommend immediate steps to mitigate <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27538">risks</a> associated with DNS hijacking and adversary-in-the-middle attacks:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">Replace end-of-life or unsupported routers </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Update firmware to the latest available versions </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Verify DNS settings to ensure they point to legitimate resolvers </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Disable or secure remote management interfaces </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Implement <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-firewall/" target="_blank"  rel="noopener" title="firewall" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27537">firewall</a> rules to limit exposure </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Enable multi-factor authentication (MFA) to reduce credential abuse </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Users are also encouraged to monitor their networks and report suspected compromises to appropriate authorities.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111135</post-id>	</item>
		<item>
		<title>Researchers Find a Zero-Day Attack Targeting Adobe Reader Users</title>
		<link>https://thecyberexpress.com/zero-day-fingerprinting-attack-on-adobe-reader/</link>
		
		<dc:creator><![CDATA[Mihir Bagwe]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 05:47:47 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Threat Actors]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Adobe Reader]]></category>
		<category><![CDATA[Adobe Zero-Day]]></category>
		<category><![CDATA[Exploit Chain]]></category>
		<category><![CDATA[Zero Day]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111115</guid>

					<description><![CDATA[<p><img width="1920" height="1293" src="https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Adobe Reader, SessionReaper, Adobe, Magento, Vulnerabilities Exploitation, SessionReaper Exploitation" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper.webp 1920w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-300x202.webp 300w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1024x690.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-768x517.webp 768w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1536x1034.webp 1536w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-600x404.webp 600w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-150x101.webp 150w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-750x505.webp 750w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1140x768.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper.webp 1920w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-300x202.webp 300w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1024x690.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-768x517.webp 768w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1536x1034.webp 1536w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-600x404.webp 600w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-150x101.webp 150w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-750x505.webp 750w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1140x768.webp 1140w" sizes="(max-width: 1920px) 100vw, 1920px" title="Researchers Find a Zero-Day Attack Targeting Adobe Reader Users 7"></p><div class="flex flex-col text-sm pb-25"><section class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" data-turn-id="request-WEB:1a83884b-1beb-4e91-bd20-dfe6914a4428-8" data-testid="conversation-turn-2" data-scroll-anchor="true" data-turn="assistant">
<div class="text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)">
<div class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex max-w-full flex-col gap-4 grow">
<div class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1" dir="auto" tabindex="0" data-message-author-role="assistant" data-message-id="fb7cdc99-df84-4ce6-98a6-9ae03fd838f1" data-message-model-slug="gpt-5-3" data-turn-start-message="true">
<div class="flex w-full flex-col gap-1 empty:hidden">
<div class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling">
<p data-start="94" data-end="354">A newly uncovered zero-day attack targeting Adobe Reader has raised alarms across enterprise security teams, as researchers identified an exploit chain that bypasses traditional detection controls and executes malicious code through seemingly benign PDF files.</p>
<p data-start="356" data-end="721">Security analysts tracking the campaign report that the vulnerability enables attackers to trigger remote code execution, a method that allows hackers to run commands on a victim’s system without authorization. In this case, the exploit requires no user interaction beyond opening the file, which significantly increases its success rate in enterprise environments.</p>
<p data-start="723" data-end="989">The attack surfaced through independent research <a href="https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html" target="_blank" rel="nofollow noopener">published</a> and has since circulated among threat intelligence communities monitoring advanced persistent threats.</p>
<p data-start="991" data-end="1351">Researchers noted that the <a class="wpil_keyword_link" title="exploit" href="https://cyble.com/exploit/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27527">exploit</a> leverages a memory corruption flaw inside Adobe Reader. Memory corruption occurs when a program mishandles <a class="wpil_keyword_link" title="data" href="https://thecyberexpress.com/what-is-data/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27525">data</a> in memory, allowing attackers to overwrite critical areas and execute arbitrary code. This class of <a class="wpil_keyword_link" title="vulnerability" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27524">vulnerability</a> remains a preferred entry point for threat actors due to its reliability and stealth.</p>
<p data-start="1353" data-end="1675">The exploit chain shows signs of deliberate engineering. Analysts observed multiple layers of obfuscation designed to evade both static and behavioral detection systems. Threat actors embedded the payload inside a crafted PDF structure that appears legitimate under standard inspection. Once opened, the file initiates a sequence that bypasses sandbox protections and proceeds to execute shellcode directly in memory.</p>
<p data-start="2000" data-end="2295">The campaign reflects a broader shift toward file-based initial access vectors, especially in environments where email filtering and endpoint detection have matured. Attackers increasingly rely on trusted file formats such as PDFs to deliver payloads that blend into everyday business workflows.</p>

<h5 data-start="2000" data-end="2295">Also read: <a href="https://thecyberexpress.com/adobe-commerce-flaw-cve-2025-54236/">Adobe Issues Urgent Patch for ‘SessionReaper’ Vulnerability in Commerce and Magento</a></h5>
<p data-start="2297" data-end="2585">Early indicators suggest that traditional antivirus engines fail to flag the malicious file, while endpoint detection and response systems show limited visibility into the exploit’s initial execution phase. This gap stems from the exploit’s use of in-memory execution. Unlike traditional <a class="wpil_keyword_link" title="malware" href="https://thecyberexpress.com/what-is-malware/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27531">malware</a> that writes files to disk, in-memory attacks operate entirely within a system’s RAM, leaving fewer artifacts for security tools to detect.</p>
<p data-start="2816" data-end="3077">Researchers also identified potential links to nation-state-level tradecraft. While attribution remains inconclusive, the sophistication of the exploit chain — combined with its targeted delivery method — suggests involvement from a well-resourced <a class="wpil_keyword_link" title="threat actor" href="https://cyble.com/threat-actor/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27532">threat actor</a>. The use of zero-day <a class="wpil_keyword_link" title="vulnerabilities" href="https://thecyberexpress.com/what-are-vulnerabilities/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27526">vulnerabilities</a> further supports this assessment.</p>
<p data-start="3324" data-end="3561">Organizations continue to rely heavily on PDF workflows for documentation, legal processes and internal communications, making Adobe Reader a high-value target across industries. <a class="wpil_keyword_link" title="Security" href="https://thecyberexpress.com/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27533">Security</a> practitioners have begun analyzing the exploit’s behavior to develop detection signatures. Early recommendations include monitoring abnormal memory allocations, unusual process spawning from PDF readers and deviations in application behavior patterns.</p>
<p data-start="3825" data-end="4055">Network-level detection also plays a critical role. Analysts advise organizations to inspect outbound connections initiated by PDF reader processes, especially those attempting to communicate with unfamiliar or suspicious domains.</p>
<p data-start="4057" data-end="4297">Despite regular patching cycles, complex applications like Adobe Reader maintain large attack surfaces that adversaries continue to probe for weaknesses. Cloud-based <a class="wpil_keyword_link" title="document" href="https://thecyberexpress.com/how-to-password-protect-a-word-document/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27530">document</a> handling systems may also face indirect exposure. Organizations that process PDFs through cloud storage or collaboration platforms must evaluate whether infected files could propagate across shared environments.</p>
<p data-start="5421" data-end="5653"><a class="wpil_keyword_link" title="Incident response" href="https://cyble.com/knowledge-hub/what-is-incident-response/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27528">Incident response</a> teams must prepare for potential exploitation scenarios. Organizations should review logging capabilities, ensure visibility into endpoint activity and validate response playbooks for file-based attacks.</p>
<p data-start="6133" data-end="6372">From a strategic perspective, the campaign aligns with trends observed in <a class="wpil_keyword_link" title="cyber" href="https://thecyberexpress.com/cyber-news/" target="_blank" rel="nofollow noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27529">cyber</a> espionage operations. Threat actors increasingly deploy stealthy, targeted exploits to gain initial access and maintain persistence within high-value networks.</p>
<p data-start="6374" data-end="6629">Persistence mechanisms — methods that allow attackers to remain within a system over time — often follow initial exploitation. While researchers have not fully mapped this stage of the attack, they expect additional payloads to establish long-term access.</p>
<p data-start="8565" data-end="8799">For now, the Adobe Reader zero-day serves as a stark reminder of the persistent <a class="wpil_keyword_link" title="risks" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27523">risks</a> embedded within everyday tools. Even widely trusted applications can become vectors for advanced attacks when adversaries uncover hidden weaknesses.</p>

</div>
</div>
</div>
</div>
</div>
</div>
</section></div>]]></description>
										<content:encoded><![CDATA[<p><img width="1920" height="1293" src="https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Adobe Reader, SessionReaper, Adobe, Magento, Vulnerabilities Exploitation, SessionReaper Exploitation" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper.webp 1920w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-300x202.webp 300w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1024x690.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-768x517.webp 768w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1536x1034.webp 1536w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-600x404.webp 600w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-150x101.webp 150w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-750x505.webp 750w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1140x768.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper.webp 1920w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-300x202.webp 300w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1024x690.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-768x517.webp 768w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1536x1034.webp 1536w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-600x404.webp 600w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-150x101.webp 150w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-750x505.webp 750w, https://thecyberexpress.com/wp-content/uploads/Adobe-SessionReaper-1140x768.webp 1140w" sizes="(max-width: 1920px) 100vw, 1920px" title="Researchers Find a Zero-Day Attack Targeting Adobe Reader Users 8"></p><div class="flex flex-col text-sm pb-25"><section class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" data-turn-id="request-WEB:1a83884b-1beb-4e91-bd20-dfe6914a4428-8" data-testid="conversation-turn-2" data-scroll-anchor="true" data-turn="assistant">
<div class="text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)">
<div class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex max-w-full flex-col gap-4 grow">
<div class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1" dir="auto" tabindex="0" data-message-author-role="assistant" data-message-id="fb7cdc99-df84-4ce6-98a6-9ae03fd838f1" data-message-model-slug="gpt-5-3" data-turn-start-message="true">
<div class="flex w-full flex-col gap-1 empty:hidden">
<div class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling">
<p data-start="94" data-end="354">A newly uncovered zero-day attack targeting Adobe Reader has raised alarms across enterprise security teams, as researchers identified an exploit chain that bypasses traditional detection controls and executes malicious code through seemingly benign PDF files.</p>
<p data-start="356" data-end="721">Security analysts tracking the campaign report that the vulnerability enables attackers to trigger remote code execution, a method that allows hackers to run commands on a victim’s system without authorization. In this case, the exploit requires no user interaction beyond opening the file, which significantly increases its success rate in enterprise environments.</p>
<p data-start="723" data-end="989">The attack surfaced through independent research <a href="https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html" target="_blank" rel="nofollow noopener">published</a> and has since circulated among threat intelligence communities monitoring advanced persistent threats.</p>
<p data-start="991" data-end="1351">Researchers noted that the <a class="wpil_keyword_link" title="exploit" href="https://cyble.com/exploit/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27527">exploit</a> leverages a memory corruption flaw inside Adobe Reader. Memory corruption occurs when a program mishandles <a class="wpil_keyword_link" title="data" href="https://thecyberexpress.com/what-is-data/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27525">data</a> in memory, allowing attackers to overwrite critical areas and execute arbitrary code. This class of <a class="wpil_keyword_link" title="vulnerability" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27524">vulnerability</a> remains a preferred entry point for threat actors due to its reliability and stealth.</p>
<p data-start="1353" data-end="1675">The exploit chain shows signs of deliberate engineering. Analysts observed multiple layers of obfuscation designed to evade both static and behavioral detection systems. Threat actors embedded the payload inside a crafted PDF structure that appears legitimate under standard inspection. Once opened, the file initiates a sequence that bypasses sandbox protections and proceeds to execute shellcode directly in memory.</p>
<p data-start="2000" data-end="2295">The campaign reflects a broader shift toward file-based initial access vectors, especially in environments where email filtering and endpoint detection have matured. Attackers increasingly rely on trusted file formats such as PDFs to deliver payloads that blend into everyday business workflows.</p>

<h5 data-start="2000" data-end="2295">Also read: <a href="https://thecyberexpress.com/adobe-commerce-flaw-cve-2025-54236/">Adobe Issues Urgent Patch for ‘SessionReaper’ Vulnerability in Commerce and Magento</a></h5>
<p data-start="2297" data-end="2585">Early indicators suggest that traditional antivirus engines fail to flag the malicious file, while endpoint detection and response systems show limited visibility into the exploit’s initial execution phase. This gap stems from the exploit’s use of in-memory execution. Unlike traditional <a class="wpil_keyword_link" title="malware" href="https://thecyberexpress.com/what-is-malware/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27531">malware</a> that writes files to disk, in-memory attacks operate entirely within a system’s RAM, leaving fewer artifacts for security tools to detect.</p>
<p data-start="2816" data-end="3077">Researchers also identified potential links to nation-state-level tradecraft. While attribution remains inconclusive, the sophistication of the exploit chain — combined with its targeted delivery method — suggests involvement from a well-resourced <a class="wpil_keyword_link" title="threat actor" href="https://cyble.com/threat-actor/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27532">threat actor</a>. The use of zero-day <a class="wpil_keyword_link" title="vulnerabilities" href="https://thecyberexpress.com/what-are-vulnerabilities/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27526">vulnerabilities</a> further supports this assessment.</p>
<p data-start="3324" data-end="3561">Organizations continue to rely heavily on PDF workflows for documentation, legal processes and internal communications, making Adobe Reader a high-value target across industries. <a class="wpil_keyword_link" title="Security" href="https://thecyberexpress.com/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27533">Security</a> practitioners have begun analyzing the exploit’s behavior to develop detection signatures. Early recommendations include monitoring abnormal memory allocations, unusual process spawning from PDF readers and deviations in application behavior patterns.</p>
<p data-start="3825" data-end="4055">Network-level detection also plays a critical role. Analysts advise organizations to inspect outbound connections initiated by PDF reader processes, especially those attempting to communicate with unfamiliar or suspicious domains.</p>
<p data-start="4057" data-end="4297">Despite regular patching cycles, complex applications like Adobe Reader maintain large attack surfaces that adversaries continue to probe for weaknesses. Cloud-based <a class="wpil_keyword_link" title="document" href="https://thecyberexpress.com/how-to-password-protect-a-word-document/" data-wpil-keyword-link="linked" data-wpil-monitor-id="27530">document</a> handling systems may also face indirect exposure. Organizations that process PDFs through cloud storage or collaboration platforms must evaluate whether infected files could propagate across shared environments.</p>
<p data-start="5421" data-end="5653"><a class="wpil_keyword_link" title="Incident response" href="https://cyble.com/knowledge-hub/what-is-incident-response/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27528">Incident response</a> teams must prepare for potential exploitation scenarios. Organizations should review logging capabilities, ensure visibility into endpoint activity and validate response playbooks for file-based attacks.</p>
<p data-start="6133" data-end="6372">From a strategic perspective, the campaign aligns with trends observed in <a class="wpil_keyword_link" title="cyber" href="https://thecyberexpress.com/cyber-news/" target="_blank" rel="nofollow noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27529">cyber</a> espionage operations. Threat actors increasingly deploy stealthy, targeted exploits to gain initial access and maintain persistence within high-value networks.</p>
<p data-start="6374" data-end="6629">Persistence mechanisms — methods that allow attackers to remain within a system over time — often follow initial exploitation. While researchers have not fully mapped this stage of the attack, they expect additional payloads to establish long-term access.</p>
<p data-start="8565" data-end="8799">For now, the Adobe Reader zero-day serves as a stark reminder of the persistent <a class="wpil_keyword_link" title="risks" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="27523">risks</a> embedded within everyday tools. Even widely trusted applications can become vectors for advanced attacks when adversaries uncover hidden weaknesses.</p>

</div>
</div>
</div>
</div>
</div>
</div>
</section></div>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111115</post-id>	</item>
		<item>
		<title>Iran-Linked Hackers Breach U.S. Industrial Systems, Trigger Disruptions</title>
		<link>https://thecyberexpress.com/iranian-affiliated-apt-targeting-plcs/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 05:47:24 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber Threat Priorities]]></category>
		<category><![CDATA[CyberAv3ngers group]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Iranian-affiliated APT targeting PLCs]]></category>
		<category><![CDATA[OT Security]]></category>
		<category><![CDATA[PLC project files]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111113</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Iranian-affiliated APT targeting PLCs" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Iran-Linked Hackers Breach U.S. Industrial Systems, Trigger Disruptions 9"></p>A new U.S. government advisory has raised fresh concerns over Iranian-affiliated APT targeting PLCs, warning that <a href="https://thecyberexpress.com/?s=Cyberattacks" target="_blank" rel="noopener">cyberattacks</a> are now moving beyond data theft into direct disruption of industrial systems.

Issued on April 7, 2026, the joint alert from the <a href="https://thecyberexpress.com/fbi-internet-crime-report-2025/" target="_blank" rel="noopener">FBI</a>, <a href="https://thecyberexpress.com/phishing-campaign-targeting-messaging-apps/" target="_blank" rel="noopener">CISA</a>, <a href="https://thecyberexpress.com/national-security-agency-new-deputy-director/" target="_blank" rel="noopener">NSA</a> and other agencies confirms that Iran-linked threat actors are actively exploiting internet-facing programmable logic controllers (PLCs), with incidents already impacting multiple <a href="https://thecyberexpress.com/cisa-cisr-month-for-critical-infrastructure/" target="_blank" rel="noopener">critical infrastructure</a> sectors.

This is not a theoretical threat. According to the advisory, several organizations have experienced operational disruptions and even financial losses after attackers interfered with industrial processes.
<h3><strong>From Network Access to Operational Disruption</strong></h3>
What makes this <a href="https://www.ic3.gov/CSA/2026/260407.pdf" target="_blank" rel="nofollow noopener">campaign</a> stand out is its intent. The Iranian-affiliated <a class="wpil_keyword_link" href="https://cyble.com/apt/" target="_blank"  rel="noopener" title="APT" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27520">APT</a> targeting PLCs activity is not focused on espionage, it is designed to disrupt.

Attackers have been manipulating PLC project files and altering data displayed on human machine interface (HMI) and supervisory control and data acquisition (<a class="wpil_keyword_link" href="https://cyble.com/cyberwarfare/ics-scada/" target="_blank"  rel="noopener" title="SCADA" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27517">SCADA</a>) systems. In practice, this means operators could be relying on inaccurate <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27522">data</a> while underlying processes are being changed in real time.

The affected sectors include government services, water and wastewater systems, and energy, areas where even minor disruptions can have significant downstream impact.

[caption id="attachment_111119" align="aligncenter" width="600"]<img class="wp-image-111119 size-full" src="https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLCs-e1775625723490.webp" alt="Iranian-affiliated APT targeting PLCs" width="600" height="600" /> Image Source: FBI[/caption]
<h3><strong>How the Attacks Are Carried Out</strong></h3>
The entry point is often simple: <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27521">internet</a> exposure.

The advisory notes that attackers are scanning for publicly accessible PLCs, particularly models such as CompactLogix and Micro850—and connecting to them using legitimate engineering tools like Studio 5000 Logix Designer.

Once inside, the activity becomes more deliberate. Threat actors extract configuration files, modify logic, and establish persistence. In some cases, they deploy tools like Dropbear SSH to maintain <a class="wpil_keyword_link" href="https://cyble.com/remote-access-trojan/" target="_blank"  rel="noopener" title="remote access" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27518">remote access</a> through port 22.

The attacks rely on commonly used industrial communication ports, including 44818, 2222, 102, 22, and 502, allowing malicious traffic to blend in with normal OT operations.

Investigators also observed the use of overseas <a href="https://thecyberexpress.com/russia-weaponizes-ukrainian-ip-addresses/" target="_blank" rel="noopener">IP addresses </a>and leased third-party infrastructure, suggesting a coordinated and sustained effort rather than opportunistic scanning.
<h3><strong>A Campaign That Has Been Building Over Time</strong></h3>
The current activity is not happening in isolation. U.S. agencies link it to earlier <a href="https://thecyberexpress.com/middle-east-iran-us-israel-hybrid-warfare/" target="_blank" rel="noopener">Iran-aligned operations</a>, including campaigns attributed to the <a href="https://thecyberexpress.com/iec-data-breach-israels-power-attack/" target="_blank" rel="noopener">CyberAv3ngers group</a> that targeted PLCs in 2023.

What has changed is the persistence. The latest advisory tracks activity spanning from at least January 2025 through March 2026, with ongoing incidents reported as recently as March.

Officials suggest the escalation may be tied to broader geopolitical tensions, but the technical pattern is clear: industrial control systems are becoming a repeated target.
<h3><strong>Exposure and Weak OT Security</strong></h3>
The Iranian-affiliated APT targeting PLCs campaign exposes a long-standing weakness in critical infrastructure, too many industrial devices remain directly accessible from the internet.

In many cases, attackers did not need sophisticated exploits. They gained access because systems lacked basic protections like network segmentation, strong authentication, or restricted remote access.

The result is a dangerous scenario where adversaries can move from initial access to operational control with relatively little resistance.
<h3><strong>What Organizations Are Being Urged to Do</strong></h3>
The advisory calls for immediate action, starting with visibility.

Organizations are urged to review logs for suspicious traffic, especially connections originating from overseas infrastructure, and check for unusual activity on key OT ports.

More broadly, the guidance reinforces a set of practical steps: removing PLCs from direct internet exposure, routing access through secure gateways, enabling stronger authentication controls, and maintaining offline backups of PLC logic and configurations.

In some cases, even operational settings matter, such as ensuring controllers remain in “run” mode to prevent unauthorized remote changes.
<h3><strong>A Shift in Cyber Threat Priorities</strong></h3>
The bigger takeaway is the shift in attacker focus. By targeting PLCs, threat actors are going straight to the systems that control physical processes.

This marks a move from <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27519">cyber</a> intrusion to potential real-world disruption.

The advisory also highlight the role of manufacturers, urging a stronger push toward “secure-by-design” systems that are not exposed by default.

For now, the warning is clear: as long as industrial systems remain exposed, campaigns like Iranian-affiliated APT targeting PLCs are likely to continue, and could become more disruptive over time.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Iranian-affiliated APT targeting PLCs" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLC-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Iran-Linked Hackers Breach U.S. Industrial Systems, Trigger Disruptions 11"></p>A new U.S. government advisory has raised fresh concerns over Iranian-affiliated APT targeting PLCs, warning that <a href="https://thecyberexpress.com/?s=Cyberattacks" target="_blank" rel="noopener">cyberattacks</a> are now moving beyond data theft into direct disruption of industrial systems.

Issued on April 7, 2026, the joint alert from the <a href="https://thecyberexpress.com/fbi-internet-crime-report-2025/" target="_blank" rel="noopener">FBI</a>, <a href="https://thecyberexpress.com/phishing-campaign-targeting-messaging-apps/" target="_blank" rel="noopener">CISA</a>, <a href="https://thecyberexpress.com/national-security-agency-new-deputy-director/" target="_blank" rel="noopener">NSA</a> and other agencies confirms that Iran-linked threat actors are actively exploiting internet-facing programmable logic controllers (PLCs), with incidents already impacting multiple <a href="https://thecyberexpress.com/cisa-cisr-month-for-critical-infrastructure/" target="_blank" rel="noopener">critical infrastructure</a> sectors.

This is not a theoretical threat. According to the advisory, several organizations have experienced operational disruptions and even financial losses after attackers interfered with industrial processes.
<h3><strong>From Network Access to Operational Disruption</strong></h3>
What makes this <a href="https://www.ic3.gov/CSA/2026/260407.pdf" target="_blank" rel="nofollow noopener">campaign</a> stand out is its intent. The Iranian-affiliated <a class="wpil_keyword_link" href="https://cyble.com/apt/" target="_blank"  rel="noopener" title="APT" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27520">APT</a> targeting PLCs activity is not focused on espionage, it is designed to disrupt.

Attackers have been manipulating PLC project files and altering data displayed on human machine interface (HMI) and supervisory control and data acquisition (<a class="wpil_keyword_link" href="https://cyble.com/cyberwarfare/ics-scada/" target="_blank"  rel="noopener" title="SCADA" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27517">SCADA</a>) systems. In practice, this means operators could be relying on inaccurate <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27522">data</a> while underlying processes are being changed in real time.

The affected sectors include government services, water and wastewater systems, and energy, areas where even minor disruptions can have significant downstream impact.

[caption id="attachment_111119" align="aligncenter" width="600"]<img class="wp-image-111119 size-full" src="https://thecyberexpress.com/wp-content/uploads/Iranian-affiliated-APT-targeting-PLCs-e1775625723490.webp" alt="Iranian-affiliated APT targeting PLCs" width="600" height="600" /> Image Source: FBI[/caption]
<h3><strong>How the Attacks Are Carried Out</strong></h3>
The entry point is often simple: <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27521">internet</a> exposure.

The advisory notes that attackers are scanning for publicly accessible PLCs, particularly models such as CompactLogix and Micro850—and connecting to them using legitimate engineering tools like Studio 5000 Logix Designer.

Once inside, the activity becomes more deliberate. Threat actors extract configuration files, modify logic, and establish persistence. In some cases, they deploy tools like Dropbear SSH to maintain <a class="wpil_keyword_link" href="https://cyble.com/remote-access-trojan/" target="_blank"  rel="noopener" title="remote access" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27518">remote access</a> through port 22.

The attacks rely on commonly used industrial communication ports, including 44818, 2222, 102, 22, and 502, allowing malicious traffic to blend in with normal OT operations.

Investigators also observed the use of overseas <a href="https://thecyberexpress.com/russia-weaponizes-ukrainian-ip-addresses/" target="_blank" rel="noopener">IP addresses </a>and leased third-party infrastructure, suggesting a coordinated and sustained effort rather than opportunistic scanning.
<h3><strong>A Campaign That Has Been Building Over Time</strong></h3>
The current activity is not happening in isolation. U.S. agencies link it to earlier <a href="https://thecyberexpress.com/middle-east-iran-us-israel-hybrid-warfare/" target="_blank" rel="noopener">Iran-aligned operations</a>, including campaigns attributed to the <a href="https://thecyberexpress.com/iec-data-breach-israels-power-attack/" target="_blank" rel="noopener">CyberAv3ngers group</a> that targeted PLCs in 2023.

What has changed is the persistence. The latest advisory tracks activity spanning from at least January 2025 through March 2026, with ongoing incidents reported as recently as March.

Officials suggest the escalation may be tied to broader geopolitical tensions, but the technical pattern is clear: industrial control systems are becoming a repeated target.
<h3><strong>Exposure and Weak OT Security</strong></h3>
The Iranian-affiliated APT targeting PLCs campaign exposes a long-standing weakness in critical infrastructure, too many industrial devices remain directly accessible from the internet.

In many cases, attackers did not need sophisticated exploits. They gained access because systems lacked basic protections like network segmentation, strong authentication, or restricted remote access.

The result is a dangerous scenario where adversaries can move from initial access to operational control with relatively little resistance.
<h3><strong>What Organizations Are Being Urged to Do</strong></h3>
The advisory calls for immediate action, starting with visibility.

Organizations are urged to review logs for suspicious traffic, especially connections originating from overseas infrastructure, and check for unusual activity on key OT ports.

More broadly, the guidance reinforces a set of practical steps: removing PLCs from direct internet exposure, routing access through secure gateways, enabling stronger authentication controls, and maintaining offline backups of PLC logic and configurations.

In some cases, even operational settings matter, such as ensuring controllers remain in “run” mode to prevent unauthorized remote changes.
<h3><strong>A Shift in Cyber Threat Priorities</strong></h3>
The bigger takeaway is the shift in attacker focus. By targeting PLCs, threat actors are going straight to the systems that control physical processes.

This marks a move from <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27519">cyber</a> intrusion to potential real-world disruption.

The advisory also highlight the role of manufacturers, urging a stronger push toward “secure-by-design” systems that are not exposed by default.

For now, the warning is clear: as long as industrial systems remain exposed, campaigns like Iranian-affiliated APT targeting PLCs are likely to continue, and could become more disruptive over time.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111113</post-id>	<enclosure length="827447" type="application/pdf" url="https://www.ic3.gov/CSA/2026/260407.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>A new U.S. government advisory has raised fresh concerns over Iranian-affiliated APT targeting PLCs, warning that cyberattacks are now moving beyond data theft into direct disruption of industrial systems. Issued on April 7, 2026, the joint alert from the FBI, CISA, NSA and other agencies confirms that Iran-linked threat actors are actively exploiting internet-facing programmable logic controllers (PLCs), with incidents already impacting multiple critical infrastructure sectors. This is not a theoretical threat. According to the advisory, several organizations have experienced operational disruptions and even financial losses after attackers interfered with industrial processes. From Network Access to Operational Disruption What makes this campaign stand out is its intent. The Iranian-affiliated APT targeting PLCs activity is not focused on espionage, it is designed to disrupt. Attackers have been manipulating PLC project files and altering data displayed on human machine interface (HMI) and supervisory control and data acquisition (SCADA) systems. In practice, this means operators could be relying on inaccurate data while underlying processes are being changed in real time. The affected sectors include government services, water and wastewater systems, and energy, areas where even minor disruptions can have significant downstream impact. [caption id="attachment_111119" align="aligncenter" width="600"] Image Source: FBI[/caption] How the Attacks Are Carried Out The entry point is often simple: internet exposure. The advisory notes that attackers are scanning for publicly accessible PLCs, particularly models such as CompactLogix and Micro850—and connecting to them using legitimate engineering tools like Studio 5000 Logix Designer. Once inside, the activity becomes more deliberate. Threat actors extract configuration files, modify logic, and establish persistence. In some cases, they deploy tools like Dropbear SSH to maintain remote access through port 22. The attacks rely on commonly used industrial communication ports, including 44818, 2222, 102, 22, and 502, allowing malicious traffic to blend in with normal OT operations. Investigators also observed the use of overseas IP addresses and leased third-party infrastructure, suggesting a coordinated and sustained effort rather than opportunistic scanning. A Campaign That Has Been Building Over Time The current activity is not happening in isolation. U.S. agencies link it to earlier Iran-aligned operations, including campaigns attributed to the CyberAv3ngers group that targeted PLCs in 2023. What has changed is the persistence. The latest advisory tracks activity spanning from at least January 2025 through March 2026, with ongoing incidents reported as recently as March. Officials suggest the escalation may be tied to broader geopolitical tensions, but the technical pattern is clear: industrial control systems are becoming a repeated target. Exposure and Weak OT Security The Iranian-affiliated APT targeting PLCs campaign exposes a long-standing weakness in critical infrastructure, too many industrial devices remain directly accessible from the internet. In many cases, attackers did not need sophisticated exploits. They gained access because systems lacked basic protections like network segmentation, strong authentication, or restricted remote access. The result is a dangerous scenario where adversaries can move from initial access to operational control with relatively little resistance. What Organizations Are Being Urged to Do The advisory calls for immediate action, starting with visibility. Organizations are urged to review logs for suspicious traffic, especially connections originating from overseas infrastructure, and check for unusual activity on key OT ports. More broadly, the guidance reinforces a set of practical steps: removing PLCs from direct internet exposure, routing access through secure gateways, enabling stronger authentication controls, and maintaining offline backups of PLC logic and configurations. In some cases, even operational settings matter, such as ensuring controllers remain in “run” mode to prevent unauthorized remote changes. A Shift in Cyber Threat Priorities The bigger takeaway is the shift in attacker focus. By targeting PLCs, threat actors are going straight to the systems that control physical processes. This marks a move from cyber intrusion to potential real-world disruption. The advisory also highlight the role of manufacturers, urging a stronger push toward “secure-by-design” systems that are not exposed by default. For now, the warning is clear: as long as industrial systems remain exposed, campaigns like Iranian-affiliated APT targeting PLCs are likely to continue, and could become more disruptive over time.</itunes:subtitle><itunes:summary>A new U.S. government advisory has raised fresh concerns over Iranian-affiliated APT targeting PLCs, warning that cyberattacks are now moving beyond data theft into direct disruption of industrial systems. Issued on April 7, 2026, the joint alert from the FBI, CISA, NSA and other agencies confirms that Iran-linked threat actors are actively exploiting internet-facing programmable logic controllers (PLCs), with incidents already impacting multiple critical infrastructure sectors. This is not a theoretical threat. According to the advisory, several organizations have experienced operational disruptions and even financial losses after attackers interfered with industrial processes. From Network Access to Operational Disruption What makes this campaign stand out is its intent. The Iranian-affiliated APT targeting PLCs activity is not focused on espionage, it is designed to disrupt. Attackers have been manipulating PLC project files and altering data displayed on human machine interface (HMI) and supervisory control and data acquisition (SCADA) systems. In practice, this means operators could be relying on inaccurate data while underlying processes are being changed in real time. The affected sectors include government services, water and wastewater systems, and energy, areas where even minor disruptions can have significant downstream impact. [caption id="attachment_111119" align="aligncenter" width="600"] Image Source: FBI[/caption] How the Attacks Are Carried Out The entry point is often simple: internet exposure. The advisory notes that attackers are scanning for publicly accessible PLCs, particularly models such as CompactLogix and Micro850—and connecting to them using legitimate engineering tools like Studio 5000 Logix Designer. Once inside, the activity becomes more deliberate. Threat actors extract configuration files, modify logic, and establish persistence. In some cases, they deploy tools like Dropbear SSH to maintain remote access through port 22. The attacks rely on commonly used industrial communication ports, including 44818, 2222, 102, 22, and 502, allowing malicious traffic to blend in with normal OT operations. Investigators also observed the use of overseas IP addresses and leased third-party infrastructure, suggesting a coordinated and sustained effort rather than opportunistic scanning. A Campaign That Has Been Building Over Time The current activity is not happening in isolation. U.S. agencies link it to earlier Iran-aligned operations, including campaigns attributed to the CyberAv3ngers group that targeted PLCs in 2023. What has changed is the persistence. The latest advisory tracks activity spanning from at least January 2025 through March 2026, with ongoing incidents reported as recently as March. Officials suggest the escalation may be tied to broader geopolitical tensions, but the technical pattern is clear: industrial control systems are becoming a repeated target. Exposure and Weak OT Security The Iranian-affiliated APT targeting PLCs campaign exposes a long-standing weakness in critical infrastructure, too many industrial devices remain directly accessible from the internet. In many cases, attackers did not need sophisticated exploits. They gained access because systems lacked basic protections like network segmentation, strong authentication, or restricted remote access. The result is a dangerous scenario where adversaries can move from initial access to operational control with relatively little resistance. What Organizations Are Being Urged to Do The advisory calls for immediate action, starting with visibility. Organizations are urged to review logs for suspicious traffic, especially connections originating from overseas infrastructure, and check for unusual activity on key OT ports. More broadly, the guidance reinforces a set of practical steps: removing PLCs from direct internet exposure, routing access through secure gateways, enabling stronger authentication controls, and maintaining offline backups of PLC logic and configurations. In some cases, even operational settings matter, such as ensuring controllers remain in “run” mode to prevent unauthorized remote changes. A Shift in Cyber Threat Priorities The bigger takeaway is the shift in attacker focus. By targeting PLCs, threat actors are going straight to the systems that control physical processes. This marks a move from cyber intrusion to potential real-world disruption. The advisory also highlight the role of manufacturers, urging a stronger push toward “secure-by-design” systems that are not exposed by default. For now, the warning is clear: as long as industrial systems remain exposed, campaigns like Iranian-affiliated APT targeting PLCs are likely to continue, and could become more disruptive over time.</itunes:summary><itunes:keywords>Cyber News, Cyber Warfare, Firewall Daily, Cyber Threat Priorities, CyberAv3ngers group, FBI, Iranian-affiliated APT targeting PLCs, OT Security, PLC project files, The Cyber Express, The Cyber Express News</itunes:keywords></item>
		<item>
		<title>Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise</title>
		<link>https://thecyberexpress.com/eu-csam-law-gap-child-sexual-exploitation-risk/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 08:07:47 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[child safety]]></category>
		<category><![CDATA[child sexual abuse material]]></category>
		<category><![CDATA[CSAM]]></category>
		<category><![CDATA[EU Law]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111105</guid>

					<description><![CDATA[<p><img width="1500" height="998" src="https://thecyberexpress.com/wp-content/uploads/CSAM.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CSAM" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CSAM.webp 1500w, https://thecyberexpress.com/wp-content/uploads/CSAM-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/CSAM-1024x681.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CSAM-768x511.webp 768w, https://thecyberexpress.com/wp-content/uploads/CSAM-600x399.webp 600w, https://thecyberexpress.com/wp-content/uploads/CSAM-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/CSAM-750x499.webp 750w, https://thecyberexpress.com/wp-content/uploads/CSAM-1140x758.webp 1140w, https://thecyberexpress.com/wp-content/uploads/CSAM.webp 1500w, https://thecyberexpress.com/wp-content/uploads/CSAM-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/CSAM-1024x681.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CSAM-768x511.webp 768w, https://thecyberexpress.com/wp-content/uploads/CSAM-600x399.webp 600w, https://thecyberexpress.com/wp-content/uploads/CSAM-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/CSAM-750x499.webp 750w, https://thecyberexpress.com/wp-content/uploads/CSAM-1140x758.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise 12"></p><span data-contrast="auto">A growing surge in CSAM (Child Sexual Abuse Material) circulating online has become an urgent concern for authorities and child protection organizations across the EU. As digital platforms continue to play a central role in communication, the challenge of tackling child sexual exploitation has intensified.</span>

<span data-contrast="auto">The main issue lies in the expiration of a temporary EU legal framework that allowed online service providers to scan private communications for CSAM voluntarily. This legislation, originally introduced as a derogation under ePrivacy rules in 2021, officially lapsed on April 3, 2026.</span>

<span data-contrast="auto">With lawmakers failing to agree on an extension, technology companies now face an uncertain legal environment that could undermine years of progress in combating child sexual exploitation online.</span>
<h3 aria-level="2"><b><span data-contrast="none">Expiry of EU Law Leaves CSAM Detection in Limbo</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The <a href="https://www.europol.europa.eu/media-press/newsroom/news/combatting-child-sexual-exploitation-statement-catherine-de-bolle" target="_blank" rel="nofollow noopener">now-expired framework</a> had enabled major technology firms to proactively identify and report Child Sexual Abuse Material using tools such as hash-matching technology. This method relies on digital fingerprints to detect known abusive content with high accuracy, while still maintaining user <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-privacy/"   title="privacy" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27514">privacy</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Law enforcement agencies have consistently described such detection systems as “vital” in identifying perpetrators and rescuing victims. Without a clear legal basis, however, companies <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27515">risk</a> operating in a grey area where continuing these practices may expose them to legal challenges.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Despite this uncertainty, several major firms, including Google, Meta, Microsoft, and Snap, <a href="https://blogs.microsoft.com/eupolicy/2026/04/03/reaffirming-our-commitment-to-child-safety-in-the-face-of-european-union-inaction/" target="_blank" rel="nofollow noopener">have stated they will continue voluntary efforts</a> to detect CSAM. In a joint statement, they emphasized the urgency for EU institutions to establish a stable regulatory framework, noting that <a href="https://thecyberexpress.com/dsa-child-protection-investigation/" target="_blank" rel="noopener">child safety</a> cannot be compromised due to political delays.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Sharp Decline in CSAM Reports Expected</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Authorities warn that the absence of legal clarity could lead to a dramatic drop in reports related to child sexual exploitation. <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="Data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27516">Data</a> from previous years highlights the scale of the</span><span data-contrast="auto"> </span><span data-contrast="auto">issue. In 2025 alone, Europol processed approximately 1.1 million CyberTips received from the U.S.-based National Center for Missing &amp; Exploited Children (NCMEC). These reports included files, videos, and images linked to Child Sexual Abuse Material, and were relevant to investigations across 24 European countries.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Officials have warned that this scenario is not hypothetical. A similar lapse in legal provisions in 2021 led to a noticeable decline in reporting, demonstrating how dependent <a href="https://thecyberexpress.com/french-police-raid-x-grok-investigations/" target="_blank" rel="noopener">investigations</a> are on cooperation from digital platforms.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Widespread Criticism of EU Inaction</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The failure of EU lawmakers to renew the legislation has sparked strong reactions from policymakers, advocacy groups, and industry leaders alike. European Home Affairs Commissioner Magnus Brunner described the situation as “hard to understand,” while child protection organizations labeled it an “abject political failure.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">A coalition of <a href="https://childsafetyineurope.com/wp-content/uploads/2026/03/2026.04.01_Joint-Statement-on-the-end-of-EU-legal-basis-to-detect-CSA.pdf" target="_blank" rel="nofollow noopener">247 organizations</a> dedicated to children’s rights issued a joint statement condemning the lapse. They argued that the inability to maintain detection mechanisms creates a “deeply alarming and irresponsible gap” in efforts to combat Child Sexual Abuse Material.</span>

<span data-contrast="auto">According to the coalition, detection at scale is foundational in addressing child sexual exploitation. It enables companies to remove <a href="https://thecyberexpress.com/enforceable-codes-for-harmful-content/" target="_blank" rel="noopener">harmful content</a>, report cases to authorities, and prevent the redistribution of abusive material. Without it, millions of illegal files could continue circulating unchecked, prolonging the suffering of victims.</span>
<h3 aria-level="2"><b><span data-contrast="none">Real-World Consequences for Victims</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Behind every instance of CSAM is a real child subjected to abuse. The continued circulation of such material forces victims to relive their trauma repeatedly. Advocacy groups stress that failing to detect and remove this content effectively denies children their fundamental rights, including privacy and protection.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The absence of robust detection tools also means that many victims may remain unidentified and trapped in abusive environments. Law enforcement agencies rely heavily on digital evidence to locate and rescue affected individuals. Any disruption in this process directly impacts their ability to intervene.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Commitment Amid Uncertainty</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Despite the legal ambiguity, technology companies have reaffirmed their commitment to tackling Child Sexual Abuse Material. They argue that voluntary detection practices have been in place for nearly two decades and remain a cornerstone of online safety.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">These companies maintain that tools like hash-matching are essential for identifying known CSAM and preventing its spread. They also emphasize that such systems are designed to balance safety with privacy, countering concerns about overreach.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, industry leaders have made it clear that a long-term solution must come from <a href="https://thecyberexpress.com/bonnie-butlin-interview/" target="_blank" rel="noopener">policymakers</a>. Without a consistent legal framework in the EU, even well-intentioned efforts at risk are becoming unsustainable.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1500" height="998" src="https://thecyberexpress.com/wp-content/uploads/CSAM.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CSAM" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CSAM.webp 1500w, https://thecyberexpress.com/wp-content/uploads/CSAM-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/CSAM-1024x681.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CSAM-768x511.webp 768w, https://thecyberexpress.com/wp-content/uploads/CSAM-600x399.webp 600w, https://thecyberexpress.com/wp-content/uploads/CSAM-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/CSAM-750x499.webp 750w, https://thecyberexpress.com/wp-content/uploads/CSAM-1140x758.webp 1140w, https://thecyberexpress.com/wp-content/uploads/CSAM.webp 1500w, https://thecyberexpress.com/wp-content/uploads/CSAM-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/CSAM-1024x681.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CSAM-768x511.webp 768w, https://thecyberexpress.com/wp-content/uploads/CSAM-600x399.webp 600w, https://thecyberexpress.com/wp-content/uploads/CSAM-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/CSAM-750x499.webp 750w, https://thecyberexpress.com/wp-content/uploads/CSAM-1140x758.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise 13"></p><span data-contrast="auto">A growing surge in CSAM (Child Sexual Abuse Material) circulating online has become an urgent concern for authorities and child protection organizations across the EU. As digital platforms continue to play a central role in communication, the challenge of tackling child sexual exploitation has intensified.</span>

<span data-contrast="auto">The main issue lies in the expiration of a temporary EU legal framework that allowed online service providers to scan private communications for CSAM voluntarily. This legislation, originally introduced as a derogation under ePrivacy rules in 2021, officially lapsed on April 3, 2026.</span>

<span data-contrast="auto">With lawmakers failing to agree on an extension, technology companies now face an uncertain legal environment that could undermine years of progress in combating child sexual exploitation online.</span>
<h3 aria-level="2"><b><span data-contrast="none">Expiry of EU Law Leaves CSAM Detection in Limbo</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The <a href="https://www.europol.europa.eu/media-press/newsroom/news/combatting-child-sexual-exploitation-statement-catherine-de-bolle" target="_blank" rel="nofollow noopener">now-expired framework</a> had enabled major technology firms to proactively identify and report Child Sexual Abuse Material using tools such as hash-matching technology. This method relies on digital fingerprints to detect known abusive content with high accuracy, while still maintaining user <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-privacy/"   title="privacy" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27514">privacy</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Law enforcement agencies have consistently described such detection systems as “vital” in identifying perpetrators and rescuing victims. Without a clear legal basis, however, companies <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27515">risk</a> operating in a grey area where continuing these practices may expose them to legal challenges.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Despite this uncertainty, several major firms, including Google, Meta, Microsoft, and Snap, <a href="https://blogs.microsoft.com/eupolicy/2026/04/03/reaffirming-our-commitment-to-child-safety-in-the-face-of-european-union-inaction/" target="_blank" rel="nofollow noopener">have stated they will continue voluntary efforts</a> to detect CSAM. In a joint statement, they emphasized the urgency for EU institutions to establish a stable regulatory framework, noting that <a href="https://thecyberexpress.com/dsa-child-protection-investigation/" target="_blank" rel="noopener">child safety</a> cannot be compromised due to political delays.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Sharp Decline in CSAM Reports Expected</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Authorities warn that the absence of legal clarity could lead to a dramatic drop in reports related to child sexual exploitation. <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="Data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27516">Data</a> from previous years highlights the scale of the</span><span data-contrast="auto"> </span><span data-contrast="auto">issue. In 2025 alone, Europol processed approximately 1.1 million CyberTips received from the U.S.-based National Center for Missing &amp; Exploited Children (NCMEC). These reports included files, videos, and images linked to Child Sexual Abuse Material, and were relevant to investigations across 24 European countries.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Officials have warned that this scenario is not hypothetical. A similar lapse in legal provisions in 2021 led to a noticeable decline in reporting, demonstrating how dependent <a href="https://thecyberexpress.com/french-police-raid-x-grok-investigations/" target="_blank" rel="noopener">investigations</a> are on cooperation from digital platforms.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Widespread Criticism of EU Inaction</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The failure of EU lawmakers to renew the legislation has sparked strong reactions from policymakers, advocacy groups, and industry leaders alike. European Home Affairs Commissioner Magnus Brunner described the situation as “hard to understand,” while child protection organizations labeled it an “abject political failure.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">A coalition of <a href="https://childsafetyineurope.com/wp-content/uploads/2026/03/2026.04.01_Joint-Statement-on-the-end-of-EU-legal-basis-to-detect-CSA.pdf" target="_blank" rel="nofollow noopener">247 organizations</a> dedicated to children’s rights issued a joint statement condemning the lapse. They argued that the inability to maintain detection mechanisms creates a “deeply alarming and irresponsible gap” in efforts to combat Child Sexual Abuse Material.</span>

<span data-contrast="auto">According to the coalition, detection at scale is foundational in addressing child sexual exploitation. It enables companies to remove <a href="https://thecyberexpress.com/enforceable-codes-for-harmful-content/" target="_blank" rel="noopener">harmful content</a>, report cases to authorities, and prevent the redistribution of abusive material. Without it, millions of illegal files could continue circulating unchecked, prolonging the suffering of victims.</span>
<h3 aria-level="2"><b><span data-contrast="none">Real-World Consequences for Victims</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Behind every instance of CSAM is a real child subjected to abuse. The continued circulation of such material forces victims to relive their trauma repeatedly. Advocacy groups stress that failing to detect and remove this content effectively denies children their fundamental rights, including privacy and protection.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The absence of robust detection tools also means that many victims may remain unidentified and trapped in abusive environments. Law enforcement agencies rely heavily on digital evidence to locate and rescue affected individuals. Any disruption in this process directly impacts their ability to intervene.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Commitment Amid Uncertainty</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Despite the legal ambiguity, technology companies have reaffirmed their commitment to tackling Child Sexual Abuse Material. They argue that voluntary detection practices have been in place for nearly two decades and remain a cornerstone of online safety.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">These companies maintain that tools like hash-matching are essential for identifying known CSAM and preventing its spread. They also emphasize that such systems are designed to balance safety with privacy, countering concerns about overreach.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, industry leaders have made it clear that a long-term solution must come from <a href="https://thecyberexpress.com/bonnie-butlin-interview/" target="_blank" rel="noopener">policymakers</a>. Without a consistent legal framework in the EU, even well-intentioned efforts at risk are becoming unsustainable.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111105</post-id>	<enclosure length="348679" type="application/pdf" url="https://childsafetyineurope.com/wp-content/uploads/2026/03/2026.04.01_Joint-Statement-on-the-end-of-EU-legal-basis-to-detect-CSA.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>A growing surge in CSAM (Child Sexual Abuse Material) circulating online has become an urgent concern for authorities and child protection organizations across the EU. As digital platforms continue to play a central role in communication, the challenge of tackling child sexual exploitation has intensified. The main issue lies in the expiration of a temporary EU legal framework that allowed online service providers to scan private communications for CSAM voluntarily. This legislation, originally introduced as a derogation under ePrivacy rules in 2021, officially lapsed on April 3, 2026. With lawmakers failing to agree on an extension, technology companies now face an uncertain legal environment that could undermine years of progress in combating child sexual exploitation online. Expiry of EU Law Leaves CSAM Detection in Limbo  The now-expired framework had enabled major technology firms to proactively identify and report Child Sexual Abuse Material using tools such as hash-matching technology. This method relies on digital fingerprints to detect known abusive content with high accuracy, while still maintaining user privacy.  Law enforcement agencies have consistently described such detection systems as “vital” in identifying perpetrators and rescuing victims. Without a clear legal basis, however, companies risk operating in a grey area where continuing these practices may expose them to legal challenges.  Despite this uncertainty, several major firms, including Google, Meta, Microsoft, and Snap, have stated they will continue voluntary efforts to detect CSAM. In a joint statement, they emphasized the urgency for EU institutions to establish a stable regulatory framework, noting that child safety cannot be compromised due to political delays.  Sharp Decline in CSAM Reports Expected  Authorities warn that the absence of legal clarity could lead to a dramatic drop in reports related to child sexual exploitation. Data from previous years highlights the scale of the issue. In 2025 alone, Europol processed approximately 1.1 million CyberTips received from the U.S.-based National Center for Missing &amp;amp; Exploited Children (NCMEC). These reports included files, videos, and images linked to Child Sexual Abuse Material, and were relevant to investigations across 24 European countries.  Officials have warned that this scenario is not hypothetical. A similar lapse in legal provisions in 2021 led to a noticeable decline in reporting, demonstrating how dependent investigations are on cooperation from digital platforms.  Widespread Criticism of EU Inaction  The failure of EU lawmakers to renew the legislation has sparked strong reactions from policymakers, advocacy groups, and industry leaders alike. European Home Affairs Commissioner Magnus Brunner described the situation as “hard to understand,” while child protection organizations labeled it an “abject political failure.”  A coalition of 247 organizations dedicated to children’s rights issued a joint statement condemning the lapse. They argued that the inability to maintain detection mechanisms creates a “deeply alarming and irresponsible gap” in efforts to combat Child Sexual Abuse Material. According to the coalition, detection at scale is foundational in addressing child sexual exploitation. It enables companies to remove harmful content, report cases to authorities, and prevent the redistribution of abusive material. Without it, millions of illegal files could continue circulating unchecked, prolonging the suffering of victims. Real-World Consequences for Victims  Behind every instance of CSAM is a real child subjected to abuse. The continued circulation of such material forces victims to relive their trauma repeatedly. Advocacy groups stress that failing to detect and remove this content effectively denies children their fundamental rights, including privacy and protection.  The absence of robust detection tools also means that many victims may remain unidentified and trapped in abusive environments. Law enforcement agencies rely heavily on digital evidence to locate and rescue affected individuals. Any disruption in this process directly impacts their ability to intervene.  Commitment Amid Uncertainty  Despite the legal ambiguity, technology companies have reaffirmed their commitment to tackling Child Sexual Abuse Material. They argue that voluntary detection practices have been in place for nearly two decades and remain a cornerstone of online safety.  These companies maintain that tools like hash-matching are essential for identifying known CSAM and preventing its spread. They also emphasize that such systems are designed to balance safety with privacy, countering concerns about overreach.  However, industry leaders have made it clear that a long-term solution must come from policymakers. Without a consistent legal framework in the EU, even well-intentioned efforts at risk are becoming unsustainable. </itunes:subtitle><itunes:summary>A growing surge in CSAM (Child Sexual Abuse Material) circulating online has become an urgent concern for authorities and child protection organizations across the EU. As digital platforms continue to play a central role in communication, the challenge of tackling child sexual exploitation has intensified. The main issue lies in the expiration of a temporary EU legal framework that allowed online service providers to scan private communications for CSAM voluntarily. This legislation, originally introduced as a derogation under ePrivacy rules in 2021, officially lapsed on April 3, 2026. With lawmakers failing to agree on an extension, technology companies now face an uncertain legal environment that could undermine years of progress in combating child sexual exploitation online. Expiry of EU Law Leaves CSAM Detection in Limbo  The now-expired framework had enabled major technology firms to proactively identify and report Child Sexual Abuse Material using tools such as hash-matching technology. This method relies on digital fingerprints to detect known abusive content with high accuracy, while still maintaining user privacy.  Law enforcement agencies have consistently described such detection systems as “vital” in identifying perpetrators and rescuing victims. Without a clear legal basis, however, companies risk operating in a grey area where continuing these practices may expose them to legal challenges.  Despite this uncertainty, several major firms, including Google, Meta, Microsoft, and Snap, have stated they will continue voluntary efforts to detect CSAM. In a joint statement, they emphasized the urgency for EU institutions to establish a stable regulatory framework, noting that child safety cannot be compromised due to political delays.  Sharp Decline in CSAM Reports Expected  Authorities warn that the absence of legal clarity could lead to a dramatic drop in reports related to child sexual exploitation. Data from previous years highlights the scale of the issue. In 2025 alone, Europol processed approximately 1.1 million CyberTips received from the U.S.-based National Center for Missing &amp;amp; Exploited Children (NCMEC). These reports included files, videos, and images linked to Child Sexual Abuse Material, and were relevant to investigations across 24 European countries.  Officials have warned that this scenario is not hypothetical. A similar lapse in legal provisions in 2021 led to a noticeable decline in reporting, demonstrating how dependent investigations are on cooperation from digital platforms.  Widespread Criticism of EU Inaction  The failure of EU lawmakers to renew the legislation has sparked strong reactions from policymakers, advocacy groups, and industry leaders alike. European Home Affairs Commissioner Magnus Brunner described the situation as “hard to understand,” while child protection organizations labeled it an “abject political failure.”  A coalition of 247 organizations dedicated to children’s rights issued a joint statement condemning the lapse. They argued that the inability to maintain detection mechanisms creates a “deeply alarming and irresponsible gap” in efforts to combat Child Sexual Abuse Material. According to the coalition, detection at scale is foundational in addressing child sexual exploitation. It enables companies to remove harmful content, report cases to authorities, and prevent the redistribution of abusive material. Without it, millions of illegal files could continue circulating unchecked, prolonging the suffering of victims. Real-World Consequences for Victims  Behind every instance of CSAM is a real child subjected to abuse. The continued circulation of such material forces victims to relive their trauma repeatedly. Advocacy groups stress that failing to detect and remove this content effectively denies children their fundamental rights, including privacy and protection.  The absence of robust detection tools also means that many victims may remain unidentified and trapped in abusive environments. Law enforcement agencies rely heavily on digital evidence to locate and rescue affected individuals. Any disruption in this process directly impacts their ability to intervene.  Commitment Amid Uncertainty  Despite the legal ambiguity, technology companies have reaffirmed their commitment to tackling Child Sexual Abuse Material. They argue that voluntary detection practices have been in place for nearly two decades and remain a cornerstone of online safety.  These companies maintain that tools like hash-matching are essential for identifying known CSAM and preventing its spread. They also emphasize that such systems are designed to balance safety with privacy, countering concerns about overreach.  However, industry leaders have made it clear that a long-term solution must come from policymakers. Without a consistent legal framework in the EU, even well-intentioned efforts at risk are becoming unsustainable. </itunes:summary><itunes:keywords>Firewall Daily, Cyber News, child safety, child sexual abuse material, CSAM, EU Law, The Cyber Express, The Cyber Express News</itunes:keywords></item>
		<item>
		<title>Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs</title>
		<link>https://thecyberexpress.com/revil-ransomware-gang-leader-identified/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 07:14:03 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Ransomware News]]></category>
		<category><![CDATA[Double Extortion]]></category>
		<category><![CDATA[GandCrab Ransomware]]></category>
		<category><![CDATA[German authorities]]></category>
		<category><![CDATA[ransomware gangs]]></category>
		<category><![CDATA[ransomware investigation]]></category>
		<category><![CDATA[REvil ransomware gang]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111093</guid>

					<description><![CDATA[<p><img width="1408" height="768" src="https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="REvil ransomware gang" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang.webp 1408w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1140x622.webp 1140w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang.webp 1408w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1140x622.webp 1140w" sizes="(max-width: 1408px) 100vw, 1408px" title="Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs 14"></p>German authorities have named a key figure behind some of the most notorious ransomware operations in recent years, linking a real identity to the REvil ransomware gang and its predecessor, the GandCrab ransomware network.

According to Germany’s Federal Criminal Police (BKA), a 31-year-old Russian national, <a href="https://www.bka.de/DE/IhreSicherheit/Fahndungen/Personen/BekanntePersonen/CC_BW/DMS/Sachverhalt.html?nn=26874#detailinformationen265540" target="_blank" rel="nofollow noopener">Daniil Maksimovich Shchukin</a>, has been identified as the individual operating under the alias “UNKN” or “UNKNOWN.” Investigators say he led both ransomware gangs and was directly involved in at least 130 cyberattacks targeting victims in Germany between 2019 and 2021.

The identification marks a significant development in the long-running investigation into the REvil ransomware gang, which at its peak was one of the most aggressive and financially successful cybercrime operations globally.
<h3><strong>Inside the REvil Ransomware Gang’s Operations</strong></h3>
<a href="https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/" target="_blank" rel="nofollow noopener">Authorities allege</a> that Shchukin, along with another suspect, <a href="https://www.bka.de/DE/IhreSicherheit/Fahndungen/Personen/BekanntePersonen/CC_BW/ASK/Sachverhalt.html?nn=26874#detailinformationen265536" target="_blank" rel="nofollow noopener">Anatoly Sergeevitsch Kravchuk</a>, carried out coordinated attacks that extorted nearly €2 million, while causing more than €35 million in economic damage.

The <a href="https://thecyberexpress.com/revil-ransomware-trial-tesla-bribe-attempt/" target="_blank" rel="noopener">REvil ransomware</a> gang and GandCrab ransomware group were among the first to popularize “double extortion”, a tactic that changed the ransomware landscape. Victims were not only asked to pay for decryption keys but also pressured to pay again to prevent stolen <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27511">data</a> from being published.

This model has since become standard across <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ransomware/" target="_blank"  rel="noopener" title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27509">ransomware</a> gangs, making attacks more damaging and recovery more difficult for victims.
<h3><strong>From GandCrab to REvil: Evolution of a Cybercrime Enterprise</strong></h3>
The GandCrab <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27513">ransomware</a> operation first appeared in 2018 and quickly gained traction through an affiliate model. Hackers were offered a share of profits in exchange for breaching corporate systems, while the core operators maintained and improved the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27510">malware</a>.

Over time, GandCrab released multiple versions of its <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/" target="_blank" rel="noopener">ransomware</a>, each designed to evade detection and improve effectiveness. By May 2019, the group claimed to have earned over $2 billion before announcing its shutdown.

Soon after, the REvil ransomware gang emerged. Many <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27508">cybersecurity</a> experts viewed it as a direct continuation or rebranding of GandCrab. Operating under the same alias “UNKNOWN,” the group expanded its reach and began targeting larger organizations with deeper pockets.

REvil became known for “big-game hunting”—focusing on enterprises with significant revenues and <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27512">cyber</a> insurance coverage, increasing the likelihood of large payouts.
<h3><strong>Industrialization of Ransomware Gangs</strong></h3>
What makes the REvil ransomware gang particularly significant is how it operated more like a business than a traditional cybercriminal group.

Ransomware developers outsourced tasks such as gaining initial access, encrypting systems, and laundering payments. Specialized actors—like access brokers and crypto laundering services—formed an entire underground ecosystem supporting these attacks.

This structure allowed ransomware gangs to scale operations quickly, reinvest profits, and continuously improve their tools. As a result, attacks became more targeted, more sophisticated, and more difficult to stop.
<h3><strong>High-Profile Attacks and Law Enforcement Response</strong></h3>
One of the most notable incidents linked to the REvil ransomware gang was the 2021 attack on Kaseya, which impacted over 1,500 businesses worldwide. The scale of the breach demonstrated how ransomware could disrupt entire supply chains.

However, the same attack also marked the beginning of REvil’s decline. The FBI later revealed it had gained access to the group’s infrastructure before the incident but could not act immediately without compromising its investigation.

Subsequent actions, including the release of a free decryption key, weakened the group’s operations significantly.
<h3><strong>Following the Money and Identity Trail</strong></h3>
Shchukin’s name had previously surfaced in a 2023 U.S. Department of Justice filing related to cryptocurrency seizures tied to REvil activities. Authorities linked him to digital wallets holding over $317,000 in illicit funds.

Despite the identification, German authorities believe Shchukin remains in Russia, beyond immediate reach. “Based on the investigations so far, it is assumed that the wanted person is abroad, presumably in Russia,” the BKA noted.
<h3><strong>What This Means for the Ransomware Landscape</strong></h3>
The exposure of a suspected leader behind the REvil ransomware gang is a rare win for law enforcement in a space where attribution is often difficult.

But the broader issue remains. The structure pioneered by GandCrab ransomware and refined by REvil continues to influence modern ransomware gangs. The tools, tactics, and business models are still widely used.

Even as individual operators are identified, the ecosystem they helped build continues to operate.

The takeaway is clear: ransomware is no longer just a technical threat—it is an organized, evolving industry.]]></description>
										<content:encoded><![CDATA[<p><img width="1408" height="768" src="https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="REvil ransomware gang" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang.webp 1408w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1140x622.webp 1140w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang.webp 1408w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/REvil-ransomware-gang-1140x622.webp 1140w" sizes="(max-width: 1408px) 100vw, 1408px" title="Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs 15"></p>German authorities have named a key figure behind some of the most notorious ransomware operations in recent years, linking a real identity to the REvil ransomware gang and its predecessor, the GandCrab ransomware network.

According to Germany’s Federal Criminal Police (BKA), a 31-year-old Russian national, <a href="https://www.bka.de/DE/IhreSicherheit/Fahndungen/Personen/BekanntePersonen/CC_BW/DMS/Sachverhalt.html?nn=26874#detailinformationen265540" target="_blank" rel="nofollow noopener">Daniil Maksimovich Shchukin</a>, has been identified as the individual operating under the alias “UNKN” or “UNKNOWN.” Investigators say he led both ransomware gangs and was directly involved in at least 130 cyberattacks targeting victims in Germany between 2019 and 2021.

The identification marks a significant development in the long-running investigation into the REvil ransomware gang, which at its peak was one of the most aggressive and financially successful cybercrime operations globally.
<h3><strong>Inside the REvil Ransomware Gang’s Operations</strong></h3>
<a href="https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/" target="_blank" rel="nofollow noopener">Authorities allege</a> that Shchukin, along with another suspect, <a href="https://www.bka.de/DE/IhreSicherheit/Fahndungen/Personen/BekanntePersonen/CC_BW/ASK/Sachverhalt.html?nn=26874#detailinformationen265536" target="_blank" rel="nofollow noopener">Anatoly Sergeevitsch Kravchuk</a>, carried out coordinated attacks that extorted nearly €2 million, while causing more than €35 million in economic damage.

The <a href="https://thecyberexpress.com/revil-ransomware-trial-tesla-bribe-attempt/" target="_blank" rel="noopener">REvil ransomware</a> gang and GandCrab ransomware group were among the first to popularize “double extortion”, a tactic that changed the ransomware landscape. Victims were not only asked to pay for decryption keys but also pressured to pay again to prevent stolen <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27511">data</a> from being published.

This model has since become standard across <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ransomware/" target="_blank"  rel="noopener" title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27509">ransomware</a> gangs, making attacks more damaging and recovery more difficult for victims.
<h3><strong>From GandCrab to REvil: Evolution of a Cybercrime Enterprise</strong></h3>
The GandCrab <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27513">ransomware</a> operation first appeared in 2018 and quickly gained traction through an affiliate model. Hackers were offered a share of profits in exchange for breaching corporate systems, while the core operators maintained and improved the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27510">malware</a>.

Over time, GandCrab released multiple versions of its <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/" target="_blank" rel="noopener">ransomware</a>, each designed to evade detection and improve effectiveness. By May 2019, the group claimed to have earned over $2 billion before announcing its shutdown.

Soon after, the REvil ransomware gang emerged. Many <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27508">cybersecurity</a> experts viewed it as a direct continuation or rebranding of GandCrab. Operating under the same alias “UNKNOWN,” the group expanded its reach and began targeting larger organizations with deeper pockets.

REvil became known for “big-game hunting”—focusing on enterprises with significant revenues and <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27512">cyber</a> insurance coverage, increasing the likelihood of large payouts.
<h3><strong>Industrialization of Ransomware Gangs</strong></h3>
What makes the REvil ransomware gang particularly significant is how it operated more like a business than a traditional cybercriminal group.

Ransomware developers outsourced tasks such as gaining initial access, encrypting systems, and laundering payments. Specialized actors—like access brokers and crypto laundering services—formed an entire underground ecosystem supporting these attacks.

This structure allowed ransomware gangs to scale operations quickly, reinvest profits, and continuously improve their tools. As a result, attacks became more targeted, more sophisticated, and more difficult to stop.
<h3><strong>High-Profile Attacks and Law Enforcement Response</strong></h3>
One of the most notable incidents linked to the REvil ransomware gang was the 2021 attack on Kaseya, which impacted over 1,500 businesses worldwide. The scale of the breach demonstrated how ransomware could disrupt entire supply chains.

However, the same attack also marked the beginning of REvil’s decline. The FBI later revealed it had gained access to the group’s infrastructure before the incident but could not act immediately without compromising its investigation.

Subsequent actions, including the release of a free decryption key, weakened the group’s operations significantly.
<h3><strong>Following the Money and Identity Trail</strong></h3>
Shchukin’s name had previously surfaced in a 2023 U.S. Department of Justice filing related to cryptocurrency seizures tied to REvil activities. Authorities linked him to digital wallets holding over $317,000 in illicit funds.

Despite the identification, German authorities believe Shchukin remains in Russia, beyond immediate reach. “Based on the investigations so far, it is assumed that the wanted person is abroad, presumably in Russia,” the BKA noted.
<h3><strong>What This Means for the Ransomware Landscape</strong></h3>
The exposure of a suspected leader behind the REvil ransomware gang is a rare win for law enforcement in a space where attribution is often difficult.

But the broader issue remains. The structure pioneered by GandCrab ransomware and refined by REvil continues to influence modern ransomware gangs. The tools, tactics, and business models are still widely used.

Even as individual operators are identified, the ecosystem they helped build continues to operate.

The takeaway is clear: ransomware is no longer just a technical threat—it is an organized, evolving industry.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111093</post-id>	</item>
		<item>
		<title>FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE</title>
		<link>https://thecyberexpress.com/forticlientems-flaws-under-active-exploitation/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 06:26:21 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[Access Control Vulnerability]]></category>
		<category><![CDATA[CVE-2026-21643]]></category>
		<category><![CDATA[CVE-2026-35616]]></category>
		<category><![CDATA[FortiClientEMS]]></category>
		<category><![CDATA[SQL Injection]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111091</guid>

					<description><![CDATA[<p><img width="1500" height="844" src="https://thecyberexpress.com/wp-content/uploads/FortiClientEMS.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="FortiClientEMS" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/FortiClientEMS.webp 1500w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1140x641.webp 1140w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS.webp 1500w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1140x641.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE 16"></p><span data-contrast="auto">A newly disclosed set of vulnerabilities affecting Fortinet’s endpoint management platform has raised serious concerns among cybersecurity professionals, particularly as both flaws are already being actively exploited. </span>

<span data-contrast="auto">The issues, tracked as CVE-2026-35616 and CVE-2026-21643, impact FortiClientEMS and expose systems to unauthenticated remote code execution (RCE), with attackers requiring no prior access to compromise affected servers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">One of the vulnerabilities, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21643" target="_blank" rel="nofollow noopener">CVE-2026-21643</a>, stems from an improper neutralization of special elements in SQL commands, commonly referred to as a SQL Injection flaw (CWE-89). This weakness exists within the administrative interface of FortiClientEMS, allowing unauthenticated attackers to send specially crafted HTTP requests and execute unauthorized code or commands.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Critical SQL Injection Flaw in FortiClientEMS (CVE-2026-21643)</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Security researchers have confirmed that this <a href="https://thecyberexpress.com/devolutions-server-sql-injection-flaw/" target="_blank" rel="noopener">SQL Injection</a> issue is not just theoretical. It has already been observed being exploited in real-world attacks, increasing the urgency for mitigation. Because the flaw does not require authentication, attackers can directly target exposed systems, making it a particularly dangerous entry point.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">In terms of affected versions, <a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1142" target="_blank" rel="nofollow noopener">FortiClientEMS 7.4.4</a> is vulnerable and requires an upgrade to version 7.4.5 or later. Versions 8.0 and 7.2 are not affected by this issue. The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27505">vulnerability</a> was internally discovered and reported by Gwendal Guégniaud of Fortinet’s Product Security team. The initial advisory was published on February 6, 2026, with a subsequent clarification removing FortiEMS Cloud from the affected products list.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Improper Access Control Vulnerability (CVE-2026-35616)</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The second major flaw, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35616" target="_blank" rel="nofollow noopener">CVE-2026-35616</a>, involves improper access control (CWE-284) in FortiClientEMS. This vulnerability enables attackers to bypass API authentication and authorization mechanisms, again allowing unauthenticated execution of arbitrary code or commands through crafted requests.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Like the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-sql-injection/"   title="SQL Injection" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27507">SQL Injection</a> flaw, CVE-2026-35616 has also been confirmed to be actively exploited in the wild. The potential impact is severe, as successful exploitation could lead to a complete compromise of the FortiClientEMS server.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The vulnerability was officially published on April 4, 2026, and later added to the <a href="https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank" rel="nofollow noopener">Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) Catalog</a> on April 6, 2026. CISA noted that such <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27506">vulnerabilities</a> are frequently used by malicious actors and pose significant risks, particularly to federal enterprise environments.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Government and Industry Response</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The Cyber Security Agency of Singapore (CSA) issued an alert on April 6, 2026, warning of the active exploitation of <a href="https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2026-031/" target="_blank" rel="nofollow noopener">CVE-2026-35616 in FortiClientEMS deployments</a>. The advisory noted the critical nature of the vulnerability and urged organizations to take immediate action.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">According to the alert, “successful exploitation of this vulnerability could allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests, potentially resulting in a full compromise of the FortiClient EMS server.” The agency also reiterated that exploitation activity has already been observed in the wild.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Affected Versions and Mitigation Steps</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The improper access control vulnerability CVE-2026-35616 affects FortiClientEMS versions 7.4.5 through 7.4.6. Organizations using these versions are advised to apply the available hotfix immediately and upgrade to version 7.4.7 or later once it becomes available.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Fortinet has provided specific guidance for applying fixes through its official release notes for versions 7.4.5 and 7.4.6. The company has indicated that the upcoming FortiClientEMS 7.4.7 release will include a permanent fix, while the currently available hotfix is sufficient to fully mitigate the issue in the interim.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">For CVE-2026-21643, upgrading from version 7.4.4 to 7.4.5 or above resolves the SQL Injection vulnerability.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1500" height="844" src="https://thecyberexpress.com/wp-content/uploads/FortiClientEMS.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="FortiClientEMS" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/FortiClientEMS.webp 1500w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1140x641.webp 1140w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS.webp 1500w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-300x169.webp 300w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1024x576.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-768x432.webp 768w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-600x338.webp 600w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-750x422.webp 750w, https://thecyberexpress.com/wp-content/uploads/FortiClientEMS-1140x641.webp 1140w" sizes="(max-width: 1500px) 100vw, 1500px" title="FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE 17"></p><span data-contrast="auto">A newly disclosed set of vulnerabilities affecting Fortinet’s endpoint management platform has raised serious concerns among cybersecurity professionals, particularly as both flaws are already being actively exploited. </span>

<span data-contrast="auto">The issues, tracked as CVE-2026-35616 and CVE-2026-21643, impact FortiClientEMS and expose systems to unauthenticated remote code execution (RCE), with attackers requiring no prior access to compromise affected servers.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">One of the vulnerabilities, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21643" target="_blank" rel="nofollow noopener">CVE-2026-21643</a>, stems from an improper neutralization of special elements in SQL commands, commonly referred to as a SQL Injection flaw (CWE-89). This weakness exists within the administrative interface of FortiClientEMS, allowing unauthenticated attackers to send specially crafted HTTP requests and execute unauthorized code or commands.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Critical SQL Injection Flaw in FortiClientEMS (CVE-2026-21643)</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Security researchers have confirmed that this <a href="https://thecyberexpress.com/devolutions-server-sql-injection-flaw/" target="_blank" rel="noopener">SQL Injection</a> issue is not just theoretical. It has already been observed being exploited in real-world attacks, increasing the urgency for mitigation. Because the flaw does not require authentication, attackers can directly target exposed systems, making it a particularly dangerous entry point.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">In terms of affected versions, <a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1142" target="_blank" rel="nofollow noopener">FortiClientEMS 7.4.4</a> is vulnerable and requires an upgrade to version 7.4.5 or later. Versions 8.0 and 7.2 are not affected by this issue. The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27505">vulnerability</a> was internally discovered and reported by Gwendal Guégniaud of Fortinet’s Product Security team. The initial advisory was published on February 6, 2026, with a subsequent clarification removing FortiEMS Cloud from the affected products list.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Improper Access Control Vulnerability (CVE-2026-35616)</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The second major flaw, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35616" target="_blank" rel="nofollow noopener">CVE-2026-35616</a>, involves improper access control (CWE-284) in FortiClientEMS. This vulnerability enables attackers to bypass API authentication and authorization mechanisms, again allowing unauthenticated execution of arbitrary code or commands through crafted requests.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Like the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-sql-injection/"   title="SQL Injection" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27507">SQL Injection</a> flaw, CVE-2026-35616 has also been confirmed to be actively exploited in the wild. The potential impact is severe, as successful exploitation could lead to a complete compromise of the FortiClientEMS server.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The vulnerability was officially published on April 4, 2026, and later added to the <a href="https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank" rel="nofollow noopener">Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) Catalog</a> on April 6, 2026. CISA noted that such <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27506">vulnerabilities</a> are frequently used by malicious actors and pose significant risks, particularly to federal enterprise environments.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Government and Industry Response</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The Cyber Security Agency of Singapore (CSA) issued an alert on April 6, 2026, warning of the active exploitation of <a href="https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2026-031/" target="_blank" rel="nofollow noopener">CVE-2026-35616 in FortiClientEMS deployments</a>. The advisory noted the critical nature of the vulnerability and urged organizations to take immediate action.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">According to the alert, “successful exploitation of this vulnerability could allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests, potentially resulting in a full compromise of the FortiClient EMS server.” The agency also reiterated that exploitation activity has already been observed in the wild.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Affected Versions and Mitigation Steps</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The improper access control vulnerability CVE-2026-35616 affects FortiClientEMS versions 7.4.5 through 7.4.6. Organizations using these versions are advised to apply the available hotfix immediately and upgrade to version 7.4.7 or later once it becomes available.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Fortinet has provided specific guidance for applying fixes through its official release notes for versions 7.4.5 and 7.4.6. The company has indicated that the upcoming FortiClientEMS 7.4.7 release will include a permanent fix, while the currently available hotfix is sufficient to fully mitigate the issue in the interim.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">For CVE-2026-21643, upgrading from version 7.4.4 to 7.4.5 or above resolves the SQL Injection vulnerability.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111091</post-id>	</item>
		<item>
		<title>$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report</title>
		<link>https://thecyberexpress.com/fbi-internet-crime-report-2025/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 05:37:26 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[Ransomware News]]></category>
		<category><![CDATA[AI-Enabled Scams]]></category>
		<category><![CDATA[cryptocurrency investment fraud]]></category>
		<category><![CDATA[Cyber-Enabled Fraud]]></category>
		<category><![CDATA[FBI Internet Crime Report 2025]]></category>
		<category><![CDATA[Internet Crime Complaint Center]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111080</guid>

					<description><![CDATA[<p><img width="1408" height="768" src="https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="FBI Internet Crime Report 2025" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025.webp 1408w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1140x622.webp 1140w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025.webp 1408w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1140x622.webp 1140w" sizes="(max-width: 1408px) 100vw, 1408px" title="$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report 18"></p>The FBI Internet Crime Report 2025 shows just how expensive cybercrime has become. In 2025, the <a href="https://thecyberexpress.com/?s=Internet+Crime+Complaint+Center" target="_blank" rel="nofollow noopener">FBI’s Internet Crime Complaint Center</a> (IC3) received over one million complaints, with reported losses touching $20.8 billion, the highest ever recorded.

That figure is not just a statistic. It reflects everyday incidents, individuals losing life savings to investment scams, businesses wiring money to fraudulent accounts, and organizations dealing with disruptions from <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/" target="_blank" rel="noopener">ransomware attacks</a>. What used to be isolated cases are now happening at scale.

The FBI Internet Crime Report 2025 also shows how the nature of <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27494">cybercrime</a> is changing. <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="Fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27500">Fraud</a> is no longer limited to suspicious emails or obvious scams. Criminals are using social platforms, messaging apps, and now even <a href="https://thecyberexpress.com/how-train-employees-artificial-intelligence/" target="_blank" rel="noopener">artificial intelligence</a> to make their operations look legitimate. In many cases, victims don’t realize they are being targeted until the money is already gone.

At the same time, the report highlights that law enforcement is trying to keep pace. Operations targeting <a href="https://thecyberexpress.com/us-seizes-225-million-from-crypto-scams/" target="_blank" rel="noopener">crypto scams</a> and international fraud networks are making an impact, but the overall trend shows that cybercrime is expanding faster than it is being contained.
<h3><strong>Cyber-Enabled Fraud Remains the Biggest Driver</strong></h3>
A large share of these losses comes from cyber-enabled fraud, which alone accounts for nearly <a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf" target="_blank" rel="nofollow noopener">85% of the total financial damage</a>, or about $17.7 billion.

Investment fraud continues to cause the most damage. In 2025, it led to $8.6 billion in losses, followed by business email compromise (BEC) and <a class="wpil_keyword_link" href="https://cyble.com/tech-scam/" target="_blank"  rel="noopener" title="tech" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27499">tech</a> support scams.

Within this, <a href="https://thecyberexpress.com/cryptocurrency-fraud-two-estonians/" target="_blank" rel="noopener">cryptocurrency investment</a> fraud stands out. Losses linked to crypto scams reached $7.2 billion, making it the biggest single category.

[caption id="attachment_111088" align="aligncenter" width="577"]<img class="size-full wp-image-111088" src="https://thecyberexpress.com/wp-content/uploads/Cyber-Enabled-Fraud.webp" alt="Cyber-Enabled Fraud" width="577" height="486" /> Image Source: FBI Report[/caption]

These scams are no longer basic <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27502">phishing</a> attempts. Attackers spend time building trust, approaching victims through social media, messaging apps, or even dating platforms. Once trust is established, victims are guided toward fake investment platforms that show fabricated profits. By the time withdrawals are attempted, the money is gone.
<h3><strong>AI-Enabled Scams Are Growing Fast</strong></h3>
The FBI Internet Crime Report 2025 includes a separate section on <a href="https://thecyberexpress.com/the-global-commerce-vulnerability-window/" target="_blank" rel="noopener">AI-enabled scams</a> for the first time, and the early numbers are already concerning.
<ul>
 	<li>More than 22,000 complaints linked to AI</li>
 	<li>Around $893 million in losses</li>
</ul>
AI is making scams more convincing. Fake profiles, cloned voices, and realistic conversations can now be created quickly and at scale. This allows attackers to run highly targeted campaigns without much effort.

The challenge is that these scams often look legitimate, making it harder for individuals and even businesses to identify red flags in time.
<h3><strong>Ransomware Continues to Target Critical Sectors</strong></h3>
<a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="Ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27495">Ransomware</a> remains a steady threat, especially for critical infrastructure.
<ul>
 	<li>Over 3,600 complaints reported in 2025</li>
 	<li>Losses crossed $32 million</li>
</ul>
The actual impact is likely much higher. Many organizations do not report full losses, especially indirect costs like downtime or recovery expenses.

The report also notes 63 new <a href="https://thecyberexpress.com/?s=ransomware+variants" target="_blank" rel="noopener">ransomware variants </a>identified during the year, showing how quickly these attacks continue to evolve.

Sectors such as healthcare, manufacturing, and government facilities remain frequent targets, where even short disruptions can have serious consequences.
<h3><strong>FBI Operations Are Preventing Some Losses</strong></h3>
The report also highlights efforts by law enforcement to limit the damage.

One example is Operation Level Up, focused on <a href="https://thecyberexpress.com/justice-dept-targets-confidence-scams/" target="_blank" rel="noopener">cryptocurrency investment scams</a>. Since its launch in 2024, the initiative has helped reduce potential losses by more than $500 million.

In many cases, victims did not realize they were being scammed until they were contacted. This reflects a larger issue, many <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27497">cyber</a> fraud cases go unnoticed until significant financial damage has already occurred.
<h3><strong>Cybercrime Is Becoming More Structured</strong></h3>
The report also points to broader trends. <a href="https://thecyberexpress.com/nation-state-hackers-weaponize-winrar-flaw/" target="_blank" rel="noopener">Cybercriminal groups</a> are operating more like organized businesses. At the same time, state-linked actors are becoming more active, targeting infrastructure and sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27501">data</a>.

One example highlighted is the DPRK IT worker <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-scam-tips-for-safety/"   title="scam" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27496">scam</a>, where individuals posing as remote IT workers gain access to company systems and use that access for data theft or further attacks.

These developments show that <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27503">cybercrime</a> is no longer limited to isolated incidents. It is part of a larger, global ecosystem.
<h3><strong>A Growing Gap Between Threats and Preparedness</strong></h3>
The FBI <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="Internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27504">Internet</a> Crime Report 2025 shows a clear pattern—cybercrime is scaling faster than awareness and response.
<ul>
 	<li>Fraud tactics are becoming more personal and long-term</li>
 	<li>AI is helping attackers improve success rates</li>
 	<li>Cryptocurrency is making transactions harder to trace</li>
</ul>
While recovery efforts and law enforcement actions are improving, most interventions still happen after the damage is done.
<h3><strong>Final Take on FBI Internet Crime Report 2025</strong></h3>
The FBI Internet Crime Report 2025 highlights a shift in how cybercrime operates today. The scale—over $20 billion in losses—is significant, but the methods behind these numbers are just as important.

From cyber-enabled fraud to AI-enabled scams and cryptocurrency investment fraud, attackers are using a mix of technology and human psychology to succeed.

For individuals and organizations, the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27498">risk</a> is no longer occasional—it is constant, and it is evolving.]]></description>
										<content:encoded><![CDATA[<p><img width="1408" height="768" src="https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="FBI Internet Crime Report 2025" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025.webp 1408w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1140x622.webp 1140w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025.webp 1408w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/FBI-Internet-Crime-Report-2025-1140x622.webp 1140w" sizes="(max-width: 1408px) 100vw, 1408px" title="$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report 20"></p>The FBI Internet Crime Report 2025 shows just how expensive cybercrime has become. In 2025, the <a href="https://thecyberexpress.com/?s=Internet+Crime+Complaint+Center" target="_blank" rel="nofollow noopener">FBI’s Internet Crime Complaint Center</a> (IC3) received over one million complaints, with reported losses touching $20.8 billion, the highest ever recorded.

That figure is not just a statistic. It reflects everyday incidents, individuals losing life savings to investment scams, businesses wiring money to fraudulent accounts, and organizations dealing with disruptions from <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/" target="_blank" rel="noopener">ransomware attacks</a>. What used to be isolated cases are now happening at scale.

The FBI Internet Crime Report 2025 also shows how the nature of <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27494">cybercrime</a> is changing. <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="Fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27500">Fraud</a> is no longer limited to suspicious emails or obvious scams. Criminals are using social platforms, messaging apps, and now even <a href="https://thecyberexpress.com/how-train-employees-artificial-intelligence/" target="_blank" rel="noopener">artificial intelligence</a> to make their operations look legitimate. In many cases, victims don’t realize they are being targeted until the money is already gone.

At the same time, the report highlights that law enforcement is trying to keep pace. Operations targeting <a href="https://thecyberexpress.com/us-seizes-225-million-from-crypto-scams/" target="_blank" rel="noopener">crypto scams</a> and international fraud networks are making an impact, but the overall trend shows that cybercrime is expanding faster than it is being contained.
<h3><strong>Cyber-Enabled Fraud Remains the Biggest Driver</strong></h3>
A large share of these losses comes from cyber-enabled fraud, which alone accounts for nearly <a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf" target="_blank" rel="nofollow noopener">85% of the total financial damage</a>, or about $17.7 billion.

Investment fraud continues to cause the most damage. In 2025, it led to $8.6 billion in losses, followed by business email compromise (BEC) and <a class="wpil_keyword_link" href="https://cyble.com/tech-scam/" target="_blank"  rel="noopener" title="tech" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27499">tech</a> support scams.

Within this, <a href="https://thecyberexpress.com/cryptocurrency-fraud-two-estonians/" target="_blank" rel="noopener">cryptocurrency investment</a> fraud stands out. Losses linked to crypto scams reached $7.2 billion, making it the biggest single category.

[caption id="attachment_111088" align="aligncenter" width="577"]<img class="size-full wp-image-111088" src="https://thecyberexpress.com/wp-content/uploads/Cyber-Enabled-Fraud.webp" alt="Cyber-Enabled Fraud" width="577" height="486" /> Image Source: FBI Report[/caption]

These scams are no longer basic <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27502">phishing</a> attempts. Attackers spend time building trust, approaching victims through social media, messaging apps, or even dating platforms. Once trust is established, victims are guided toward fake investment platforms that show fabricated profits. By the time withdrawals are attempted, the money is gone.
<h3><strong>AI-Enabled Scams Are Growing Fast</strong></h3>
The FBI Internet Crime Report 2025 includes a separate section on <a href="https://thecyberexpress.com/the-global-commerce-vulnerability-window/" target="_blank" rel="noopener">AI-enabled scams</a> for the first time, and the early numbers are already concerning.
<ul>
 	<li>More than 22,000 complaints linked to AI</li>
 	<li>Around $893 million in losses</li>
</ul>
AI is making scams more convincing. Fake profiles, cloned voices, and realistic conversations can now be created quickly and at scale. This allows attackers to run highly targeted campaigns without much effort.

The challenge is that these scams often look legitimate, making it harder for individuals and even businesses to identify red flags in time.
<h3><strong>Ransomware Continues to Target Critical Sectors</strong></h3>
<a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="Ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27495">Ransomware</a> remains a steady threat, especially for critical infrastructure.
<ul>
 	<li>Over 3,600 complaints reported in 2025</li>
 	<li>Losses crossed $32 million</li>
</ul>
The actual impact is likely much higher. Many organizations do not report full losses, especially indirect costs like downtime or recovery expenses.

The report also notes 63 new <a href="https://thecyberexpress.com/?s=ransomware+variants" target="_blank" rel="noopener">ransomware variants </a>identified during the year, showing how quickly these attacks continue to evolve.

Sectors such as healthcare, manufacturing, and government facilities remain frequent targets, where even short disruptions can have serious consequences.
<h3><strong>FBI Operations Are Preventing Some Losses</strong></h3>
The report also highlights efforts by law enforcement to limit the damage.

One example is Operation Level Up, focused on <a href="https://thecyberexpress.com/justice-dept-targets-confidence-scams/" target="_blank" rel="noopener">cryptocurrency investment scams</a>. Since its launch in 2024, the initiative has helped reduce potential losses by more than $500 million.

In many cases, victims did not realize they were being scammed until they were contacted. This reflects a larger issue, many <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27497">cyber</a> fraud cases go unnoticed until significant financial damage has already occurred.
<h3><strong>Cybercrime Is Becoming More Structured</strong></h3>
The report also points to broader trends. <a href="https://thecyberexpress.com/nation-state-hackers-weaponize-winrar-flaw/" target="_blank" rel="noopener">Cybercriminal groups</a> are operating more like organized businesses. At the same time, state-linked actors are becoming more active, targeting infrastructure and sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27501">data</a>.

One example highlighted is the DPRK IT worker <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-scam-tips-for-safety/"   title="scam" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27496">scam</a>, where individuals posing as remote IT workers gain access to company systems and use that access for data theft or further attacks.

These developments show that <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27503">cybercrime</a> is no longer limited to isolated incidents. It is part of a larger, global ecosystem.
<h3><strong>A Growing Gap Between Threats and Preparedness</strong></h3>
The FBI <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="Internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27504">Internet</a> Crime Report 2025 shows a clear pattern—cybercrime is scaling faster than awareness and response.
<ul>
 	<li>Fraud tactics are becoming more personal and long-term</li>
 	<li>AI is helping attackers improve success rates</li>
 	<li>Cryptocurrency is making transactions harder to trace</li>
</ul>
While recovery efforts and law enforcement actions are improving, most interventions still happen after the damage is done.
<h3><strong>Final Take on FBI Internet Crime Report 2025</strong></h3>
The FBI Internet Crime Report 2025 highlights a shift in how cybercrime operates today. The scale—over $20 billion in losses—is significant, but the methods behind these numbers are just as important.

From cyber-enabled fraud to AI-enabled scams and cryptocurrency investment fraud, attackers are using a mix of technology and human psychology to succeed.

For individuals and organizations, the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27498">risk</a> is no longer occasional—it is constant, and it is evolving.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111080</post-id>	<enclosure length="3383108" type="application/pdf" url="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The FBI Internet Crime Report 2025 shows just how expensive cybercrime has become. In 2025, the FBI’s Internet Crime Complaint Center (IC3) received over one million complaints, with reported losses touching $20.8 billion, the highest ever recorded. That figure is not just a statistic. It reflects everyday incidents, individuals losing life savings to investment scams, businesses wiring money to fraudulent accounts, and organizations dealing with disruptions from ransomware attacks. What used to be isolated cases are now happening at scale. The FBI Internet Crime Report 2025 also shows how the nature of cybercrime is changing. Fraud is no longer limited to suspicious emails or obvious scams. Criminals are using social platforms, messaging apps, and now even artificial intelligence to make their operations look legitimate. In many cases, victims don’t realize they are being targeted until the money is already gone. At the same time, the report highlights that law enforcement is trying to keep pace. Operations targeting crypto scams and international fraud networks are making an impact, but the overall trend shows that cybercrime is expanding faster than it is being contained. Cyber-Enabled Fraud Remains the Biggest Driver A large share of these losses comes from cyber-enabled fraud, which alone accounts for nearly 85% of the total financial damage, or about $17.7 billion. Investment fraud continues to cause the most damage. In 2025, it led to $8.6 billion in losses, followed by business email compromise (BEC) and tech support scams. Within this, cryptocurrency investment fraud stands out. Losses linked to crypto scams reached $7.2 billion, making it the biggest single category. [caption id="attachment_111088" align="aligncenter" width="577"] Image Source: FBI Report[/caption] These scams are no longer basic phishing attempts. Attackers spend time building trust, approaching victims through social media, messaging apps, or even dating platforms. Once trust is established, victims are guided toward fake investment platforms that show fabricated profits. By the time withdrawals are attempted, the money is gone. AI-Enabled Scams Are Growing Fast The FBI Internet Crime Report 2025 includes a separate section on AI-enabled scams for the first time, and the early numbers are already concerning. More than 22,000 complaints linked to AI Around $893 million in losses AI is making scams more convincing. Fake profiles, cloned voices, and realistic conversations can now be created quickly and at scale. This allows attackers to run highly targeted campaigns without much effort. The challenge is that these scams often look legitimate, making it harder for individuals and even businesses to identify red flags in time. Ransomware Continues to Target Critical Sectors Ransomware remains a steady threat, especially for critical infrastructure. Over 3,600 complaints reported in 2025 Losses crossed $32 million The actual impact is likely much higher. Many organizations do not report full losses, especially indirect costs like downtime or recovery expenses. The report also notes 63 new ransomware variants identified during the year, showing how quickly these attacks continue to evolve. Sectors such as healthcare, manufacturing, and government facilities remain frequent targets, where even short disruptions can have serious consequences. FBI Operations Are Preventing Some Losses The report also highlights efforts by law enforcement to limit the damage. One example is Operation Level Up, focused on cryptocurrency investment scams. Since its launch in 2024, the initiative has helped reduce potential losses by more than $500 million. In many cases, victims did not realize they were being scammed until they were contacted. This reflects a larger issue, many cyber fraud cases go unnoticed until significant financial damage has already occurred. Cybercrime Is Becoming More Structured The report also points to broader trends. Cybercriminal groups are operating more like organized businesses. At the same time, state-linked actors are becoming more active, targeting infrastructure and sensitive data. One example highlighted is the DPRK IT worker scam, where individuals posing as remote IT workers gain access to company systems and use that access for data theft or further attacks. These developments show that cybercrime is no longer limited to isolated incidents. It is part of a larger, global ecosystem. A Growing Gap Between Threats and Preparedness The FBI Internet Crime Report 2025 shows a clear pattern—cybercrime is scaling faster than awareness and response. Fraud tactics are becoming more personal and long-term AI is helping attackers improve success rates Cryptocurrency is making transactions harder to trace While recovery efforts and law enforcement actions are improving, most interventions still happen after the damage is done. Final Take on FBI Internet Crime Report 2025 The FBI Internet Crime Report 2025 highlights a shift in how cybercrime operates today. The scale—over $20 billion in losses—is significant, but the methods behind these numbers are just as important. From cyber-enabled fraud to AI-enabled scams and cryptocurrency investment fraud, attackers are using a mix of technology and human psychology to succeed. For individuals and organizations, the risk is no longer occasional—it is constant, and it is evolving.</itunes:subtitle><itunes:summary>The FBI Internet Crime Report 2025 shows just how expensive cybercrime has become. In 2025, the FBI’s Internet Crime Complaint Center (IC3) received over one million complaints, with reported losses touching $20.8 billion, the highest ever recorded. That figure is not just a statistic. It reflects everyday incidents, individuals losing life savings to investment scams, businesses wiring money to fraudulent accounts, and organizations dealing with disruptions from ransomware attacks. What used to be isolated cases are now happening at scale. The FBI Internet Crime Report 2025 also shows how the nature of cybercrime is changing. Fraud is no longer limited to suspicious emails or obvious scams. Criminals are using social platforms, messaging apps, and now even artificial intelligence to make their operations look legitimate. In many cases, victims don’t realize they are being targeted until the money is already gone. At the same time, the report highlights that law enforcement is trying to keep pace. Operations targeting crypto scams and international fraud networks are making an impact, but the overall trend shows that cybercrime is expanding faster than it is being contained. Cyber-Enabled Fraud Remains the Biggest Driver A large share of these losses comes from cyber-enabled fraud, which alone accounts for nearly 85% of the total financial damage, or about $17.7 billion. Investment fraud continues to cause the most damage. In 2025, it led to $8.6 billion in losses, followed by business email compromise (BEC) and tech support scams. Within this, cryptocurrency investment fraud stands out. Losses linked to crypto scams reached $7.2 billion, making it the biggest single category. [caption id="attachment_111088" align="aligncenter" width="577"] Image Source: FBI Report[/caption] These scams are no longer basic phishing attempts. Attackers spend time building trust, approaching victims through social media, messaging apps, or even dating platforms. Once trust is established, victims are guided toward fake investment platforms that show fabricated profits. By the time withdrawals are attempted, the money is gone. AI-Enabled Scams Are Growing Fast The FBI Internet Crime Report 2025 includes a separate section on AI-enabled scams for the first time, and the early numbers are already concerning. More than 22,000 complaints linked to AI Around $893 million in losses AI is making scams more convincing. Fake profiles, cloned voices, and realistic conversations can now be created quickly and at scale. This allows attackers to run highly targeted campaigns without much effort. The challenge is that these scams often look legitimate, making it harder for individuals and even businesses to identify red flags in time. Ransomware Continues to Target Critical Sectors Ransomware remains a steady threat, especially for critical infrastructure. Over 3,600 complaints reported in 2025 Losses crossed $32 million The actual impact is likely much higher. Many organizations do not report full losses, especially indirect costs like downtime or recovery expenses. The report also notes 63 new ransomware variants identified during the year, showing how quickly these attacks continue to evolve. Sectors such as healthcare, manufacturing, and government facilities remain frequent targets, where even short disruptions can have serious consequences. FBI Operations Are Preventing Some Losses The report also highlights efforts by law enforcement to limit the damage. One example is Operation Level Up, focused on cryptocurrency investment scams. Since its launch in 2024, the initiative has helped reduce potential losses by more than $500 million. In many cases, victims did not realize they were being scammed until they were contacted. This reflects a larger issue, many cyber fraud cases go unnoticed until significant financial damage has already occurred. Cybercrime Is Becoming More Structured The report also points to broader trends. Cybercriminal groups are operating more like organized businesses. At the same time, state-linked actors are becoming more active, targeting infrastructure and sensitive data. One example highlighted is the DPRK IT worker scam, where individuals posing as remote IT workers gain access to company systems and use that access for data theft or further attacks. These developments show that cybercrime is no longer limited to isolated incidents. It is part of a larger, global ecosystem. A Growing Gap Between Threats and Preparedness The FBI Internet Crime Report 2025 shows a clear pattern—cybercrime is scaling faster than awareness and response. Fraud tactics are becoming more personal and long-term AI is helping attackers improve success rates Cryptocurrency is making transactions harder to trace While recovery efforts and law enforcement actions are improving, most interventions still happen after the damage is done. Final Take on FBI Internet Crime Report 2025 The FBI Internet Crime Report 2025 highlights a shift in how cybercrime operates today. The scale—over $20 billion in losses—is significant, but the methods behind these numbers are just as important. From cyber-enabled fraud to AI-enabled scams and cryptocurrency investment fraud, attackers are using a mix of technology and human psychology to succeed. For individuals and organizations, the risk is no longer occasional—it is constant, and it is evolving.</itunes:summary><itunes:keywords>Cyber News, Dark Web News, Data Breach News, Firewall Daily, Hacker News, Ransomware News, AI-Enabled Scams, cryptocurrency investment fraud, Cyber-Enabled Fraud, FBI Internet Crime Report 2025, Internet Crime Complaint Center, ransomware attacks, The Cyber Express, The Cyber Express News</itunes:keywords></item>
		<item>
		<title>75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says</title>
		<link>https://thecyberexpress.com/uae-phishing-emails-cyberattacks/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 11:02:06 +0000</pubDate>
				<category><![CDATA[Governance]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[cyber campaigns]]></category>
		<category><![CDATA[email fraud]]></category>
		<category><![CDATA[phishing emails]]></category>
		<category><![CDATA[phishing emails cyberattacks]]></category>
		<category><![CDATA[scanning QR codes]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[UAE Cyber Security Council]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=111074</guid>

					<description><![CDATA[<p><img width="1408" height="768" src="https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="phishing emails cyberattacks" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks.webp 1408w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1140x622.webp 1140w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks.webp 1408w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1140x622.webp 1140w" sizes="(max-width: 1408px) 100vw, 1408px" title="75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says 21"></p>The scale of phishing emails cyberattacks is growing, and the <a href="https://thecyberexpress.com/uae-cyber-security-council-cyberattack/" target="_blank" rel="noopener">UAE Cyber Security Council</a> is making it clear that the threat is far from under control. In a recent warning, the Council told Emirates News Agency (WAM) that more than 75% of cyberattacks now begin with <a href="https://thecyberexpress.com/how-to-stop-and-report-phishing-emails/" target="_blank" rel="noopener">phishing emails</a> or <a href="https://thecyberexpress.com/phishing-chatgpt-how-to-spot-malicious-emails/" target="_blank" rel="noopener">fraudulent messages</a>, underlining how attackers continue to rely on simple, deceptive tactics to gain access to sensitive systems.

The advisory, <a href="https://www.wam.ae/en/article/bzkavgz-uae-cyber-security-council-75-cyberattacks-start" target="_blank" rel="nofollow noopener">shared</a> with WAM, points to <a href="https://thecyberexpress.com/baiyewu-convicted-in-money-laundering/" target="_blank" rel="noopener">email fraud</a> as a primary entry point for breaches involving personal accounts, financial data, and institutional systems. These messages are often designed to look legitimate, making them difficult to detect at a glance and easy to act on without verification.
<h3><strong>Phishing Emails Cyberattacks Continue at Massive Scale</strong></h3>
The numbers behind <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27492">phishing</a> emails cyberattacks highlight why the problem persists. According to the Council, more than 3.4 billion phishing messages are sent globally every day, targeting individuals across sectors and regions.

These messages are not limited to basic scams. Many are crafted to steal login credentials, distribute malware, or collect personal information that can later be used in identity theft, extortion, or broader <a href="https://thecyberexpress.com/middle-east-cyber-warfare-escalates-rapidly/" target="_blank" rel="noopener">cyber campaigns</a>. The volume ensures that even a small success rate can lead to significant impact.

The Council noted that this type of <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27491">fraud</a> continues to spread widely, often taking advantage of gaps in user awareness and digital behaviour rather than weaknesses in technology alone.
<h3><strong>How Phishing Emails Cyberattacks Trick Users</strong></h3>
The UAE <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="Cyber Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27488">Cyber Security</a> Council outlined how phishing emails cyberattacks are typically structured to push users into quick action. Messages may request urgent payments, prompt users to verify accounts, or direct them to login pages through embedded links.

In many cases, these emails imitate trusted entities such as banks or service providers. Others rely on offers that appear unusually attractive, drawing users into clicking links or sharing information without proper checks.

The Council also pointed to common red flags, including emails with spelling or grammatical errors, unclear sender identities, and requests for personal <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27489">data</a> without valid justification. Despite being widely recognised indicators, such tactics continue to be used because they still manage to bypass user caution.
<h3><strong>User Awareness Remains Central to Prevention</strong></h3>
The phishing emails cyberattacks trend places significant responsibility on users, particularly as attackers continue to refine how these messages are presented. The Council stressed that individuals and employees remain a primary target, making awareness a critical part of any defence strategy.

To reduce exposure, the Council advised users to avoid interacting with suspicious links or messages and to refrain from <a href="https://thecyberexpress.com/secure-coding-practices-2023/" target="_blank" rel="noopener">scanning QR codes</a> in untrusted environments. It also emphasised the importance of keeping login credentials private and enabling multi-factor authentication across accounts.

Regular system updates and application patches were also highlighted as necessary steps to limit <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27490">vulnerabilities</a> that may be exploited following a phishing attempt.
<h3><strong>Reporting Plays a Key Role in Limiting Damage</strong></h3>
Beyond prevention, the UAE Cyber <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27493">Security</a> Council underlined the importance of timely reporting in addressing phishing emails cyberattacks. Users who identify suspicious messages are encouraged to report them immediately rather than ignore or delete them.

Early reporting allows security teams to analyse patterns, identify ongoing campaigns, and take steps to block further attacks. In large-scale phishing operations, even a single reported message can help trace and disrupt wider activity.

The Council reiterated that quick action at the user level can significantly reduce the overall impact of these attacks.
<h3><strong>Phishing Emails Cyberattacks Remain a Persistent Threat</strong></h3>
The continued dominance of phishing emails cyberattacks reflects a broader trend in the <a href="https://thecyberexpress.com/uae-cybersecurity-council-flags-privacy-risks/" target="_blank" rel="noopener">cybersecurity</a> landscape. While organisations invest in advanced tools and systems, attackers continue to rely on methods that require minimal technical effort but deliver consistent results.

The Council noted that safety in cyberspace has become an ongoing challenge, particularly as digital communication channels expand. Email remains one of the most widely used platforms, making it a reliable target for threat actors.

The warning serves as a reminder that phishing is not a declining threat. It remains active, widespread, and closely tied to how users interact with everyday digital tools.]]></description>
										<content:encoded><![CDATA[<p><img width="1408" height="768" src="https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="phishing emails cyberattacks" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks.webp 1408w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1140x622.webp 1140w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks.webp 1408w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-300x164.webp 300w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1024x559.webp 1024w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-768x419.webp 768w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-600x327.webp 600w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-150x82.webp 150w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-750x409.webp 750w, https://thecyberexpress.com/wp-content/uploads/phishing-emails-cyberattacks-1140x622.webp 1140w" sizes="(max-width: 1408px) 100vw, 1408px" title="75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says 22"></p>The scale of phishing emails cyberattacks is growing, and the <a href="https://thecyberexpress.com/uae-cyber-security-council-cyberattack/" target="_blank" rel="noopener">UAE Cyber Security Council</a> is making it clear that the threat is far from under control. In a recent warning, the Council told Emirates News Agency (WAM) that more than 75% of cyberattacks now begin with <a href="https://thecyberexpress.com/how-to-stop-and-report-phishing-emails/" target="_blank" rel="noopener">phishing emails</a> or <a href="https://thecyberexpress.com/phishing-chatgpt-how-to-spot-malicious-emails/" target="_blank" rel="noopener">fraudulent messages</a>, underlining how attackers continue to rely on simple, deceptive tactics to gain access to sensitive systems.

The advisory, <a href="https://www.wam.ae/en/article/bzkavgz-uae-cyber-security-council-75-cyberattacks-start" target="_blank" rel="nofollow noopener">shared</a> with WAM, points to <a href="https://thecyberexpress.com/baiyewu-convicted-in-money-laundering/" target="_blank" rel="noopener">email fraud</a> as a primary entry point for breaches involving personal accounts, financial data, and institutional systems. These messages are often designed to look legitimate, making them difficult to detect at a glance and easy to act on without verification.
<h3><strong>Phishing Emails Cyberattacks Continue at Massive Scale</strong></h3>
The numbers behind <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27492">phishing</a> emails cyberattacks highlight why the problem persists. According to the Council, more than 3.4 billion phishing messages are sent globally every day, targeting individuals across sectors and regions.

These messages are not limited to basic scams. Many are crafted to steal login credentials, distribute malware, or collect personal information that can later be used in identity theft, extortion, or broader <a href="https://thecyberexpress.com/middle-east-cyber-warfare-escalates-rapidly/" target="_blank" rel="noopener">cyber campaigns</a>. The volume ensures that even a small success rate can lead to significant impact.

The Council noted that this type of <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27491">fraud</a> continues to spread widely, often taking advantage of gaps in user awareness and digital behaviour rather than weaknesses in technology alone.
<h3><strong>How Phishing Emails Cyberattacks Trick Users</strong></h3>
The UAE <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="Cyber Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27488">Cyber Security</a> Council outlined how phishing emails cyberattacks are typically structured to push users into quick action. Messages may request urgent payments, prompt users to verify accounts, or direct them to login pages through embedded links.

In many cases, these emails imitate trusted entities such as banks or service providers. Others rely on offers that appear unusually attractive, drawing users into clicking links or sharing information without proper checks.

The Council also pointed to common red flags, including emails with spelling or grammatical errors, unclear sender identities, and requests for personal <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27489">data</a> without valid justification. Despite being widely recognised indicators, such tactics continue to be used because they still manage to bypass user caution.
<h3><strong>User Awareness Remains Central to Prevention</strong></h3>
The phishing emails cyberattacks trend places significant responsibility on users, particularly as attackers continue to refine how these messages are presented. The Council stressed that individuals and employees remain a primary target, making awareness a critical part of any defence strategy.

To reduce exposure, the Council advised users to avoid interacting with suspicious links or messages and to refrain from <a href="https://thecyberexpress.com/secure-coding-practices-2023/" target="_blank" rel="noopener">scanning QR codes</a> in untrusted environments. It also emphasised the importance of keeping login credentials private and enabling multi-factor authentication across accounts.

Regular system updates and application patches were also highlighted as necessary steps to limit <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27490">vulnerabilities</a> that may be exploited following a phishing attempt.
<h3><strong>Reporting Plays a Key Role in Limiting Damage</strong></h3>
Beyond prevention, the UAE Cyber <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="27493">Security</a> Council underlined the importance of timely reporting in addressing phishing emails cyberattacks. Users who identify suspicious messages are encouraged to report them immediately rather than ignore or delete them.

Early reporting allows security teams to analyse patterns, identify ongoing campaigns, and take steps to block further attacks. In large-scale phishing operations, even a single reported message can help trace and disrupt wider activity.

The Council reiterated that quick action at the user level can significantly reduce the overall impact of these attacks.
<h3><strong>Phishing Emails Cyberattacks Remain a Persistent Threat</strong></h3>
The continued dominance of phishing emails cyberattacks reflects a broader trend in the <a href="https://thecyberexpress.com/uae-cybersecurity-council-flags-privacy-risks/" target="_blank" rel="noopener">cybersecurity</a> landscape. While organisations invest in advanced tools and systems, attackers continue to rely on methods that require minimal technical effort but deliver consistent results.

The Council noted that safety in cyberspace has become an ongoing challenge, particularly as digital communication channels expand. Email remains one of the most widely used platforms, making it a reliable target for threat actors.

The warning serves as a reminder that phishing is not a declining threat. It remains active, widespread, and closely tied to how users interact with everyday digital tools.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">111074</post-id>	</item>
	</channel>
</rss>