<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Cybersecurity News and Magazine</title>
	<atom:link href="https://thecyberexpress.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://thecyberexpress.com</link>
	<description>Trending Cybersecurity News, Updates, Magazine and More.</description>
	<lastBuildDate>Fri, 22 May 2026 11:44:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://thecyberexpress.com/wp-content/uploads/tce-favicon-75x75.jpg?crop=1</url>
	<title>The Cyber Express</title>
	<link>https://thecyberexpress.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">208869986</site>	<itunes:explicit>no</itunes:explicit><itunes:subtitle>Trending Cybersecurity News, Updates, Magazine and More.</itunes:subtitle><item>
		<title>The Cyber Express Weekly Roundup: Supply Chain Breaches, AI Content Enforcement, And Event Disruption Attacks</title>
		<link>https://thecyberexpress.com/tce-weekly-roundup-cybersecurity-supply-chain/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Fri, 22 May 2026 11:44:22 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[Data Breach News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[weekly roundup]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112299</guid>

					<description><![CDATA[<p><img width="1168" height="660" src="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="weekly roundup TCE The Cyber Express" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express.webp 1168w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-300x170.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1024x579.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-768x434.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-600x339.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-150x85.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-750x424.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1140x644.webp 1140w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express.webp 1168w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-300x170.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1024x579.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-768x434.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-600x339.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-150x85.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-750x424.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1140x644.webp 1140w" sizes="(max-width: 1168px) 100vw, 1168px" title="The Cyber Express Weekly Roundup: Supply Chain Breaches, AI Content Enforcement, And Event Disruption Attacks 1"></p><span data-contrast="auto">The global cybersecurity landscape continues to evolve rapidly as attackers expand their focus on developer ecosystems, public-facing institutions, and anonymization infrastructure. At the same time, regulators and law enforcement agencies are stepping up enforcement efforts around AI misuse and cybercrime-enabling services.</span>

<span data-contrast="auto">This week’s weekly roundup developments highlight how cyber threats are becoming increasingly distributed across platforms and industries, with supply chain compromises, operational disruptions, and policy enforcement actions shaping the broader risk environment.</span>
<h3 aria-level="2"><b><span data-contrast="none">The Cyber Express Weekly Roundup</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<h4 aria-level="3"><b><span data-contrast="none">Austria Blocks Hundreds of Cyberattacks During Eurovision Week in Vienna</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Austria successfully prevented nearly 500 <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-cyber-attack/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28433">cyberattack</a> attempts targeting systems connected to Eurovision operations during the contest week in Vienna. Officials stated that the attacks were intended to disrupt event infrastructure and associated services, but no major operational failures were recorded. </span><a href="https://thecyberexpress.com/austria-blocks-eurovision-cyberattack-attempts/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Massive npm Supply Chain Attack Hits AntV Ecosystem</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A large-scale software supply chain compromise has impacted more than 300 npm packages within the AntV ecosystem following the hijacking of a trusted maintainer account. The compromised packages were reportedly modified as part of the “Mini Shai-Hulud” <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28432">malware</a> campaign, which targeted developer environments and widely used JavaScript libraries. </span><a href="https://thecyberexpress.com/hundreds-of-antv-packages-compromised/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Chanhassen Dinner Theatres Cyberattack Disrupts Operations and Ticketing Systems</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A cyberattack targeting <a href="https://chanhassendt.com/" target="_blank" rel="nofollow noopener">Chanhassen Dinner Theatres</a> disrupted key operational systems, including ticketing, payment processing, and customer communications, forcing additional cancellations of scheduled performances of </span><i><span data-contrast="auto">“Guys and Dolls.” </span></i><span data-contrast="auto">The disruption comes amid concurrent operational challenges, including an illness outbreak affecting performers and attendees, further complicating recovery efforts. </span><a href="https://thecyberexpress.com/chanhassen-dinner-theatres-cyberattack/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">FTC Targets AI “Nudify” Platforms Over TAKE IT DOWN Act Violations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">The U.S. Federal Trade Commission has issued formal warnings to multiple AI-powered “nudify” platforms over alleged violations of the TAKE IT DOWN Act, which requires rapid removal of nonconsensual intimate content upon valid request. According to regulators, several platforms failed to implement compliant removal workflows, including the mandated 48-hour takedown requirement. </span><a href="https://thecyberexpress.com/take-it-down-act-drives-ftc-against-ai-content/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="2"><b><span data-contrast="none">GitHub Confirms Internal Repository Breach via Malicious VS Code Extension</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h4>
<span data-contrast="auto">GitHub has confirmed a security incident in which attackers accessed thousands of internal repositories after compromising an employee's device through a malicious Visual Studio Code extension. The company stated that there is no evidence of customer repository compromise or enterprise <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28430">data</a> exposure, and that the incident was contained following detection. </span><a href="https://thecyberexpress.com/github-cyberattack-teampcp/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">European Authorities Shut Down VPN Service Used in Ransomware Operations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">European law enforcement agencies have seized the infrastructure of a VPN service known as First VPN during “Operation Saffron,” targeting its alleged use in supporting <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ransomware/" target="_blank"  rel="noopener" title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28431">ransomware</a> and cybercriminal operations. Authorities dismantled 33 servers and detained the suspected administrator in Ukraine. </span><a href="https://thecyberexpress.com/first-vpn-service-seized/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Weekly Cybersecurity Takeaway</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">This week’s weekly roundup reflects a <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28429">cybersecurity</a> landscape defined by ecosystem-level compromise rather than isolated incidents. Supply chain attacks continue to target developer tooling and open-source ecosystems, while AI-related enforcement actions signal growing regulatory pressure around synthetic content abuse.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">At the same time, law enforcement actions against anonymization infrastructure demonstrate a stronger focus on disrupting the operational backbone of cybercriminal networks. Taken together, these <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-security-events/"   title="events" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28434">events</a> highlight a shifting threat environment where compromise of platforms, dependencies, and infrastructure can cascade across multiple industries simultaneously.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1168" height="660" src="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="weekly roundup TCE The Cyber Express" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express.webp 1168w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-300x170.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1024x579.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-768x434.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-600x339.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-150x85.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-750x424.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1140x644.webp 1140w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express.webp 1168w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-300x170.webp 300w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1024x579.webp 1024w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-768x434.webp 768w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-600x339.webp 600w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-150x85.webp 150w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-750x424.webp 750w, https://thecyberexpress.com/wp-content/uploads/weekly-roundup-TCE-The-Cyber-Express-1140x644.webp 1140w" sizes="(max-width: 1168px) 100vw, 1168px" title="The Cyber Express Weekly Roundup: Supply Chain Breaches, AI Content Enforcement, And Event Disruption Attacks 2"></p><span data-contrast="auto">The global cybersecurity landscape continues to evolve rapidly as attackers expand their focus on developer ecosystems, public-facing institutions, and anonymization infrastructure. At the same time, regulators and law enforcement agencies are stepping up enforcement efforts around AI misuse and cybercrime-enabling services.</span>

<span data-contrast="auto">This week’s weekly roundup developments highlight how cyber threats are becoming increasingly distributed across platforms and industries, with supply chain compromises, operational disruptions, and policy enforcement actions shaping the broader risk environment.</span>
<h3 aria-level="2"><b><span data-contrast="none">The Cyber Express Weekly Roundup</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<h4 aria-level="3"><b><span data-contrast="none">Austria Blocks Hundreds of Cyberattacks During Eurovision Week in Vienna</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">Austria successfully prevented nearly 500 <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-cyber-attack/"   title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28433">cyberattack</a> attempts targeting systems connected to Eurovision operations during the contest week in Vienna. Officials stated that the attacks were intended to disrupt event infrastructure and associated services, but no major operational failures were recorded. </span><a href="https://thecyberexpress.com/austria-blocks-eurovision-cyberattack-attempts/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Massive npm Supply Chain Attack Hits AntV Ecosystem</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A large-scale software supply chain compromise has impacted more than 300 npm packages within the AntV ecosystem following the hijacking of a trusted maintainer account. The compromised packages were reportedly modified as part of the “Mini Shai-Hulud” <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28432">malware</a> campaign, which targeted developer environments and widely used JavaScript libraries. </span><a href="https://thecyberexpress.com/hundreds-of-antv-packages-compromised/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">Chanhassen Dinner Theatres Cyberattack Disrupts Operations and Ticketing Systems</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">A cyberattack targeting <a href="https://chanhassendt.com/" target="_blank" rel="nofollow noopener">Chanhassen Dinner Theatres</a> disrupted key operational systems, including ticketing, payment processing, and customer communications, forcing additional cancellations of scheduled performances of </span><i><span data-contrast="auto">“Guys and Dolls.” </span></i><span data-contrast="auto">The disruption comes amid concurrent operational challenges, including an illness outbreak affecting performers and attendees, further complicating recovery efforts. </span><a href="https://thecyberexpress.com/chanhassen-dinner-theatres-cyberattack/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">FTC Targets AI “Nudify” Platforms Over TAKE IT DOWN Act Violations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">The U.S. Federal Trade Commission has issued formal warnings to multiple AI-powered “nudify” platforms over alleged violations of the TAKE IT DOWN Act, which requires rapid removal of nonconsensual intimate content upon valid request. According to regulators, several platforms failed to implement compliant removal workflows, including the mandated 48-hour takedown requirement. </span><a href="https://thecyberexpress.com/take-it-down-act-drives-ftc-against-ai-content/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="2"><b><span data-contrast="none">GitHub Confirms Internal Repository Breach via Malicious VS Code Extension</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h4>
<span data-contrast="auto">GitHub has confirmed a security incident in which attackers accessed thousands of internal repositories after compromising an employee's device through a malicious Visual Studio Code extension. The company stated that there is no evidence of customer repository compromise or enterprise <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28430">data</a> exposure, and that the incident was contained following detection. </span><a href="https://thecyberexpress.com/github-cyberattack-teampcp/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h4 aria-level="3"><b><span data-contrast="none">European Authorities Shut Down VPN Service Used in Ransomware Operations</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h4>
<span data-contrast="auto">European law enforcement agencies have seized the infrastructure of a VPN service known as First VPN during “Operation Saffron,” targeting its alleged use in supporting <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ransomware/" target="_blank"  rel="noopener" title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28431">ransomware</a> and cybercriminal operations. Authorities dismantled 33 servers and detained the suspected administrator in Ukraine. </span><a href="https://thecyberexpress.com/first-vpn-service-seized/"><b><span data-contrast="none">Read more...</span></b></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Weekly Cybersecurity Takeaway</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">This week’s weekly roundup reflects a <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28429">cybersecurity</a> landscape defined by ecosystem-level compromise rather than isolated incidents. Supply chain attacks continue to target developer tooling and open-source ecosystems, while AI-related enforcement actions signal growing regulatory pressure around synthetic content abuse.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">At the same time, law enforcement actions against anonymization infrastructure demonstrate a stronger focus on disrupting the operational backbone of cybercriminal networks. Taken together, these <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-security-events/"   title="events" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28434">events</a> highlight a shifting threat environment where compromise of platforms, dependencies, and infrastructure can cascade across multiple industries simultaneously.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112299</post-id>	</item>
		<item>
		<title>AI-Powered Marketing Service “Active Listening” Deceived Customers: FTC</title>
		<link>https://thecyberexpress.com/ftc-ai-powered-active-listening-case/</link>
		
		<dc:creator><![CDATA[Mihir Bagwe]]></dc:creator>
		<pubDate>Fri, 22 May 2026 11:27:11 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Active Listening]]></category>
		<category><![CDATA[AI-powered]]></category>
		<category><![CDATA[AI-Powered Marketing]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[FTC Ruling]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112288</guid>

					<description><![CDATA[<p><img width="800" height="533" src="https://thecyberexpress.com/wp-content/uploads/Active-Listening.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Active Listening, FTC, FTC Ruling, AI-Powered Marketing, Ai-Powered" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Active-Listening.webp 800w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-750x500.webp 750w, https://thecyberexpress.com/wp-content/uploads/Active-Listening.webp 800w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-750x500.webp 750w" sizes="(max-width: 800px) 100vw, 800px" title="AI-Powered Marketing Service “Active Listening” Deceived Customers: FTC 3"></p><p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The pitch for "Active Listening," an AI-powered advertising service that listened to consumers' real-world conversations through their smartphones and smart speakers and delivered targeted ads to those people within precise geographic areas, with consumers consent, was extremely compelling, but until it wasn't really what it claimed.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Federal Trade Commission will require Cox Media Group and two smaller marketing firms to pay a total of $930,000 to settle allegations they deceived customers by falsely claiming to offer an AI-powered service that could target localized ads based on conversations captured from consumers' smart devices and that consumers had opted into such targeting.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">"Not only did the product these companies marketed not do what they claimed it did, but they also misled potential customers by claiming consumers had opted into this service when it's clear they did not," <a href="https://www.ftc.gov/news-events/news/press-releases/2026/05/ftc-require-cox-media-group-two-other-firms-pay-nearly-1-million-settle-charges-they-deceived" target="_blank" rel="nofollow noopener">said</a> Christopher Mufarrige, Director of the FTC's Bureau of Consumer Protection.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Every material element of that pitch was false.</p>

<h5>Also read: <a href="https://thecyberexpress.com/ftc-probes-ai-chatbots-designed-as-companions/">FTC Probes AI Chatbots Designed as “Companions” for Children’s Safety</a></h5>
<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Was 'Active Listening' Actually Being Sold</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The case centers on a marketing product introduced in 2023 that CMG sold to local businesses. Through presentations, website materials and sales pitches, the company promoted "Active Listening" as a way for advertisers to identify potential customers at the precise moment they were discussing products or services around smart devices.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">According to the complaints, this service did not, in fact, listen in on consumers' conversations or use voice <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28427">data</a> at all and neither did the service accurately place ads in customers' desired locations. Instead, the service the companies provided consisted of reselling — at a significant markup — email lists obtained from other data brokers.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">FTC investigators say the service was pitched as a breakthrough tool powered by "voice data" and AI. According to the government, CMG told clients its technology partner could aggregate and analyze voice data from smartphones, tablets and other devices to determine when consumers were in the market for particular products. When prospective clients pressed sales representatives on how exactly the technology worked, FTC filings say sales presentations became increasingly specific when potential customers questioned how the technology worked.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The Consent Fabrication</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The fraudulent capability claim was compounded by a fraudulent consent claim. The companies told prospective clients that consumers had "opted in" to the Active Listening service. In fact, no consent was ever sought or obtained. The companies characterized routine click-through acceptance of app terms of service as affirmative opt-in consent to the collection of voice data — a characterization the FTC flatly rejected.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">This consent fabrication mattered legally in both directions. It deceived the businesses buying the service into believing they were running a legally compliant targeted advertising campaign. And it obscured from consumers that their conversations were purportedly being harvested and monetized — which those consumers had never agreed to.</p>

<h5>Also read: <a href="https://thecyberexpress.com/ftc-takes-action-against-adobe/">FTC Sues Adobe for ‘Trapping’ Users in Deceptive Subscription Practices</a></h5>
<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The FTC's Bluntest Finding</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The most pointed element of the FTC's action is not the settlement amount. It is the Commission's explicit statement that the illegality ran deeper than the <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28428">fraud</a> itself.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Commission noted that, had the service actually functioned as advertised, collecting voice data from consumers' homes without genuine consent would itself have violated Section 5 of the FTC Act. In other words, CMG and its partners were not just selling a fake product. They were selling a fake version of something that would have been illegal to sell as real.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Who Pays and Who Supplied the Deception</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Under the proposed consent orders, CMG must pay $880,000, while MindSift and 1010 Digital Works will each pay $25,000. The funds will be used to provide redress to CMG customers harmed by the practices. MindSift and 1010 Digital Works also face a second count for providing CMG with the "means and instrumentalities" to deceive customers through misleading marketing materials and sales presentations.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Active Listening enforcement action arrives at a moment when AI capability claims are proliferating faster than any regulator can evaluate them. Aattaching the phrase "AI-powered" to a product does not immunize that product from consumer protection law, and fabricating both technical capability and consumer consent simultaneously creates compounding liability — not just for the company selling the product but for the partners who built the sales materials that made the deception work.</p>]]></description>
										<content:encoded><![CDATA[<p><img width="800" height="533" src="https://thecyberexpress.com/wp-content/uploads/Active-Listening.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Active Listening, FTC, FTC Ruling, AI-Powered Marketing, Ai-Powered" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Active-Listening.webp 800w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-750x500.webp 750w, https://thecyberexpress.com/wp-content/uploads/Active-Listening.webp 800w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/Active-Listening-750x500.webp 750w" sizes="(max-width: 800px) 100vw, 800px" title="AI-Powered Marketing Service “Active Listening” Deceived Customers: FTC 4"></p><p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The pitch for "Active Listening," an AI-powered advertising service that listened to consumers' real-world conversations through their smartphones and smart speakers and delivered targeted ads to those people within precise geographic areas, with consumers consent, was extremely compelling, but until it wasn't really what it claimed.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Federal Trade Commission will require Cox Media Group and two smaller marketing firms to pay a total of $930,000 to settle allegations they deceived customers by falsely claiming to offer an AI-powered service that could target localized ads based on conversations captured from consumers' smart devices and that consumers had opted into such targeting.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">"Not only did the product these companies marketed not do what they claimed it did, but they also misled potential customers by claiming consumers had opted into this service when it's clear they did not," <a href="https://www.ftc.gov/news-events/news/press-releases/2026/05/ftc-require-cox-media-group-two-other-firms-pay-nearly-1-million-settle-charges-they-deceived" target="_blank" rel="nofollow noopener">said</a> Christopher Mufarrige, Director of the FTC's Bureau of Consumer Protection.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Every material element of that pitch was false.</p>

<h5>Also read: <a href="https://thecyberexpress.com/ftc-probes-ai-chatbots-designed-as-companions/">FTC Probes AI Chatbots Designed as “Companions” for Children’s Safety</a></h5>
<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Was 'Active Listening' Actually Being Sold</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The case centers on a marketing product introduced in 2023 that CMG sold to local businesses. Through presentations, website materials and sales pitches, the company promoted "Active Listening" as a way for advertisers to identify potential customers at the precise moment they were discussing products or services around smart devices.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">According to the complaints, this service did not, in fact, listen in on consumers' conversations or use voice <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28427">data</a> at all and neither did the service accurately place ads in customers' desired locations. Instead, the service the companies provided consisted of reselling — at a significant markup — email lists obtained from other data brokers.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">FTC investigators say the service was pitched as a breakthrough tool powered by "voice data" and AI. According to the government, CMG told clients its technology partner could aggregate and analyze voice data from smartphones, tablets and other devices to determine when consumers were in the market for particular products. When prospective clients pressed sales representatives on how exactly the technology worked, FTC filings say sales presentations became increasingly specific when potential customers questioned how the technology worked.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The Consent Fabrication</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The fraudulent capability claim was compounded by a fraudulent consent claim. The companies told prospective clients that consumers had "opted in" to the Active Listening service. In fact, no consent was ever sought or obtained. The companies characterized routine click-through acceptance of app terms of service as affirmative opt-in consent to the collection of voice data — a characterization the FTC flatly rejected.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">This consent fabrication mattered legally in both directions. It deceived the businesses buying the service into believing they were running a legally compliant targeted advertising campaign. And it obscured from consumers that their conversations were purportedly being harvested and monetized — which those consumers had never agreed to.</p>

<h5>Also read: <a href="https://thecyberexpress.com/ftc-takes-action-against-adobe/">FTC Sues Adobe for ‘Trapping’ Users in Deceptive Subscription Practices</a></h5>
<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>The FTC's Bluntest Finding</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The most pointed element of the FTC's action is not the settlement amount. It is the Commission's explicit statement that the illegality ran deeper than the <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28428">fraud</a> itself.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Commission noted that, had the service actually functioned as advertised, collecting voice data from consumers' homes without genuine consent would itself have violated Section 5 of the FTC Act. In other words, CMG and its partners were not just selling a fake product. They were selling a fake version of something that would have been illegal to sell as real.</p>

<h3 class="font-claude-response-body break-words whitespace-normal leading-[1.7]"><strong>Who Pays and Who Supplied the Deception</strong></h3>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">Under the proposed consent orders, CMG must pay $880,000, while MindSift and 1010 Digital Works will each pay $25,000. The funds will be used to provide redress to CMG customers harmed by the practices. MindSift and 1010 Digital Works also face a second count for providing CMG with the "means and instrumentalities" to deceive customers through misleading marketing materials and sales presentations.</p>
<p class="font-claude-response-body break-words whitespace-normal leading-[1.7]">The Active Listening enforcement action arrives at a moment when AI capability claims are proliferating faster than any regulator can evaluate them. Aattaching the phrase "AI-powered" to a product does not immunize that product from consumer protection law, and fabricating both technical capability and consumer consent simultaneously creates compounding liability — not just for the company selling the product but for the partners who built the sales materials that made the deception work.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112288</post-id>	</item>
		<item>
		<title>Vulnerability Exploitation Overtakes Stolen Credentials in AI-Driven Cyberattacks</title>
		<link>https://thecyberexpress.com/vulnerability-exploitation-tops-cyber-breach/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Fri, 22 May 2026 10:54:21 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[AI-powered attacks]]></category>
		<category><![CDATA[Cyber Threat Landscape]]></category>
		<category><![CDATA[Shadow AI]]></category>
		<category><![CDATA[Supply Chain Breaches]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[vulnerability exploitation]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112275</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Vulnerability Exploitation" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Vulnerability Exploitation Overtakes Stolen Credentials in AI-Driven Cyberattacks 5"></p>Vulnerability exploitation has officially become the leading cause of cybersecurity breaches for the first time in nearly two decades, according to the latest Data Breach Investigations Report (DBIR) released by Verizon. The findings highlight how artificial intelligence is rapidly reshaping the <a href="https://thecyberexpress.com/march-2026-threat-landscape/" target="_blank" rel="noopener">threat landscape</a>, enabling attackers to weaponize software flaws faster than security teams can respond.

The 19th edition of the DBIR revealed that 31% of all recorded breaches now begin with vulnerability exploitation, surpassing stolen credentials as the most common attack entry point. Researchers warned that AI-driven automation is dramatically reducing the time between <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28418">vulnerability</a> disclosure and active exploitation, shrinking defensive response windows from months to just hours.

The report paints a broader picture of an evolving cybersecurity environment where AI-powered attacks, mobile-focused <a href="https://thecyberexpress.com/social-engineering-in-the-age-of-ai/" target="_blank" rel="noopener">social engineering</a>, <a href="https://thecyberexpress.com/cybersecurity-in-2025-shadow-ai-deepfakes/" target="_blank" rel="noopener">shadow AI</a> usage, and supply chain compromises are all expanding organizational risk.
<h2>Vulnerability Exploitation Surpasses Stolen Credentials</h2>
For years, stolen usernames and passwords remained the primary method used by cybercriminals to breach corporate systems. However, the latest DBIR findings show a major shift in attacker behavior.

Researchers <a href="https://www.verizon.com/about/news/breach-industry-wide-dbir-finds" target="_blank" rel="nofollow noopener">found</a> that threat actors are increasingly prioritizing vulnerability exploitation because AI tools can quickly identify weak systems, automate reconnaissance, and accelerate exploit development.

According to the report, attackers are now moving much faster after <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28423">vulnerabilities</a> become public. Organizations that previously had weeks or months to deploy security patches are now facing exploitation attempts within hours of disclosure.

Security experts said this trend is creating significant pressure on security operations teams already struggling to manage patching priorities across complex environments.

Daniel Lawson, Senior Vice President of Global Solutions at Verizon Business, said the growing speed of cyberattacks reinforces the importance of strong <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28416">cybersecurity</a> fundamentals.

“While the velocity of cyber threats driven by AI and faster vulnerability exploitation is increasing, the foundational principles of security and strong <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28417">risk</a> management remain the most effective defense,” Lawson said.
<h2>AI Reshaping the Cyber Threat Landscape</h2>
The report repeatedly emphasized the growing influence of artificial intelligence on <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28422">cybercrime</a> operations.

Researchers noted that AI is not only helping defenders identify vulnerabilities more efficiently, but also allowing attackers to automate exploitation at unprecedented scale and speed.

The DBIR warned that AI-assisted attack workflows are creating what researchers described as a “capacity crisis” for many security teams. Organizations are being forced to process increasing numbers of vulnerabilities while facing shorter remediation timelines.

The report recommended that enterprises:
<ul>
 	<li>Strengthen patch management programs</li>
 	<li>Reduce overall attack surface exposure</li>
 	<li>Integrate AI into secure-by-design frameworks</li>
 	<li>Expand defense-in-depth strategies</li>
 	<li>Improve visibility into internet-facing assets</li>
</ul>
Researchers also highlighted rapid growth in AI bot activity across the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28425">internet</a>.

According to the report, AI bot crawler traffic is increasing by 21% month over month, while human-driven traffic growth remains almost flat at just 0.3%.
<h2>Mobile Social Engineering Attacks Rising</h2>
Beyond vulnerability exploitation, the DBIR identified major changes in <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-social-engineering/" target="_blank"  rel="noopener" title="social engineering" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28419">social engineering</a> tactics.

As users become more cautious about traditional <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28420">phishing</a> emails, attackers are increasingly shifting toward mobile-based scams involving text messages and voice calls.

The report found that conversational and interactive mobile attacks now achieve success rates roughly 40% higher than traditional email phishing campaigns.

Researchers said attackers are leveraging:
<ul>
 	<li>Fake SMS messages</li>
 	<li>Voice phishing calls</li>
 	<li>Messaging app impersonation</li>
 	<li>Mobile account verification scams</li>
</ul>
<a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="Cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28424">Cybersecurity</a> analysts warned that mobile devices continue to represent a major blind spot for many organizations because security monitoring on smartphones often remains less mature than on corporate desktops and servers.
<h2>Shadow AI Creates New Data Leakage Risks</h2>
Another major concern highlighted in the DBIR involves the rapid rise of “shadow AI” usage inside organizations.

The term refers to employees using unapproved artificial intelligence tools without formal oversight from security or compliance teams.

According to Verizon’s findings, frequent use of AI platforms by employees surged from 15% to 45% within a single year.

Researchers said shadow AI has now become the third most common cause of non-malicious <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28421">data</a> leakage incidents.

Security experts warned that employees may unknowingly expose:
<ul>
 	<li>Confidential corporate data</li>
 	<li>Customer information</li>
 	<li>Source code</li>
 	<li>Internal business documents</li>
 	<li>Sensitive communications</li>
</ul>
The report stressed that organizations need clearer governance policies around AI usage as adoption continues accelerating across workplaces.
<h2>Supply Chain Breaches Continue to Grow</h2>
The DBIR also documented a significant rise in third-party and supply chain compromises.

Researchers found that breaches involving external vendors increased by 60% compared to previous reporting periods. Third-party involvement now accounts for 48% of all recorded breaches.

As organizations rely more heavily on cloud providers, software vendors, and outsourced services, attackers are increasingly targeting weaker links within interconnected supply chains.

The report concluded that the cybersecurity industry is entering a period where resilience, rapid response capabilities, and basic security hygiene remain critical despite rapid advances in AI-powered attack techniques.

While artificial intelligence is changing the speed and scale of <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28426">cyber</a> threats, researchers stressed that organizations must continue focusing on foundational cybersecurity practices to defend against the growing wave of vulnerability exploitation and AI-driven attacks.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Vulnerability Exploitation" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Vulnerability-Exploitation-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="Vulnerability Exploitation Overtakes Stolen Credentials in AI-Driven Cyberattacks 6"></p>Vulnerability exploitation has officially become the leading cause of cybersecurity breaches for the first time in nearly two decades, according to the latest Data Breach Investigations Report (DBIR) released by Verizon. The findings highlight how artificial intelligence is rapidly reshaping the <a href="https://thecyberexpress.com/march-2026-threat-landscape/" target="_blank" rel="noopener">threat landscape</a>, enabling attackers to weaponize software flaws faster than security teams can respond.

The 19th edition of the DBIR revealed that 31% of all recorded breaches now begin with vulnerability exploitation, surpassing stolen credentials as the most common attack entry point. Researchers warned that AI-driven automation is dramatically reducing the time between <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28418">vulnerability</a> disclosure and active exploitation, shrinking defensive response windows from months to just hours.

The report paints a broader picture of an evolving cybersecurity environment where AI-powered attacks, mobile-focused <a href="https://thecyberexpress.com/social-engineering-in-the-age-of-ai/" target="_blank" rel="noopener">social engineering</a>, <a href="https://thecyberexpress.com/cybersecurity-in-2025-shadow-ai-deepfakes/" target="_blank" rel="noopener">shadow AI</a> usage, and supply chain compromises are all expanding organizational risk.
<h2>Vulnerability Exploitation Surpasses Stolen Credentials</h2>
For years, stolen usernames and passwords remained the primary method used by cybercriminals to breach corporate systems. However, the latest DBIR findings show a major shift in attacker behavior.

Researchers <a href="https://www.verizon.com/about/news/breach-industry-wide-dbir-finds" target="_blank" rel="nofollow noopener">found</a> that threat actors are increasingly prioritizing vulnerability exploitation because AI tools can quickly identify weak systems, automate reconnaissance, and accelerate exploit development.

According to the report, attackers are now moving much faster after <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28423">vulnerabilities</a> become public. Organizations that previously had weeks or months to deploy security patches are now facing exploitation attempts within hours of disclosure.

Security experts said this trend is creating significant pressure on security operations teams already struggling to manage patching priorities across complex environments.

Daniel Lawson, Senior Vice President of Global Solutions at Verizon Business, said the growing speed of cyberattacks reinforces the importance of strong <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28416">cybersecurity</a> fundamentals.

“While the velocity of cyber threats driven by AI and faster vulnerability exploitation is increasing, the foundational principles of security and strong <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28417">risk</a> management remain the most effective defense,” Lawson said.
<h2>AI Reshaping the Cyber Threat Landscape</h2>
The report repeatedly emphasized the growing influence of artificial intelligence on <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28422">cybercrime</a> operations.

Researchers noted that AI is not only helping defenders identify vulnerabilities more efficiently, but also allowing attackers to automate exploitation at unprecedented scale and speed.

The DBIR warned that AI-assisted attack workflows are creating what researchers described as a “capacity crisis” for many security teams. Organizations are being forced to process increasing numbers of vulnerabilities while facing shorter remediation timelines.

The report recommended that enterprises:
<ul>
 	<li>Strengthen patch management programs</li>
 	<li>Reduce overall attack surface exposure</li>
 	<li>Integrate AI into secure-by-design frameworks</li>
 	<li>Expand defense-in-depth strategies</li>
 	<li>Improve visibility into internet-facing assets</li>
</ul>
Researchers also highlighted rapid growth in AI bot activity across the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28425">internet</a>.

According to the report, AI bot crawler traffic is increasing by 21% month over month, while human-driven traffic growth remains almost flat at just 0.3%.
<h2>Mobile Social Engineering Attacks Rising</h2>
Beyond vulnerability exploitation, the DBIR identified major changes in <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-social-engineering/" target="_blank"  rel="noopener" title="social engineering" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28419">social engineering</a> tactics.

As users become more cautious about traditional <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-phishing/" target="_blank"  rel="noopener" title="phishing" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28420">phishing</a> emails, attackers are increasingly shifting toward mobile-based scams involving text messages and voice calls.

The report found that conversational and interactive mobile attacks now achieve success rates roughly 40% higher than traditional email phishing campaigns.

Researchers said attackers are leveraging:
<ul>
 	<li>Fake SMS messages</li>
 	<li>Voice phishing calls</li>
 	<li>Messaging app impersonation</li>
 	<li>Mobile account verification scams</li>
</ul>
<a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="Cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28424">Cybersecurity</a> analysts warned that mobile devices continue to represent a major blind spot for many organizations because security monitoring on smartphones often remains less mature than on corporate desktops and servers.
<h2>Shadow AI Creates New Data Leakage Risks</h2>
Another major concern highlighted in the DBIR involves the rapid rise of “shadow AI” usage inside organizations.

The term refers to employees using unapproved artificial intelligence tools without formal oversight from security or compliance teams.

According to Verizon’s findings, frequent use of AI platforms by employees surged from 15% to 45% within a single year.

Researchers said shadow AI has now become the third most common cause of non-malicious <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28421">data</a> leakage incidents.

Security experts warned that employees may unknowingly expose:
<ul>
 	<li>Confidential corporate data</li>
 	<li>Customer information</li>
 	<li>Source code</li>
 	<li>Internal business documents</li>
 	<li>Sensitive communications</li>
</ul>
The report stressed that organizations need clearer governance policies around AI usage as adoption continues accelerating across workplaces.
<h2>Supply Chain Breaches Continue to Grow</h2>
The DBIR also documented a significant rise in third-party and supply chain compromises.

Researchers found that breaches involving external vendors increased by 60% compared to previous reporting periods. Third-party involvement now accounts for 48% of all recorded breaches.

As organizations rely more heavily on cloud providers, software vendors, and outsourced services, attackers are increasingly targeting weaker links within interconnected supply chains.

The report concluded that the cybersecurity industry is entering a period where resilience, rapid response capabilities, and basic security hygiene remain critical despite rapid advances in AI-powered attack techniques.

While artificial intelligence is changing the speed and scale of <a class="wpil_keyword_link" href="https://thecyberexpress.com/cyber-news/"   title="cyber" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28426">cyber</a> threats, researchers stressed that organizations must continue focusing on foundational cybersecurity practices to defend against the growing wave of vulnerability exploitation and AI-driven attacks.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112275</post-id>	</item>
		<item>
		<title>Microsoft Patches Actively Exploited Defender Vulnerabilities Affecting Enterprise Systems</title>
		<link>https://thecyberexpress.com/cve-2026-41091-cve-2026-45498-cvss-exploit/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Fri, 22 May 2026 09:01:46 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[CVE-2026-41091]]></category>
		<category><![CDATA[CVE-2026-45498]]></category>
		<category><![CDATA[CVSS]]></category>
		<category><![CDATA[Microsoft Defender]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112276</guid>

					<description><![CDATA[<p><img width="1226" height="637" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-41091" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091.webp 1226w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-300x156.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1024x532.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-768x399.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-600x312.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-150x78.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-750x390.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1140x592.webp 1140w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091.webp 1226w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-300x156.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1024x532.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-768x399.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-600x312.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-150x78.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-750x390.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1140x592.webp 1140w" sizes="(max-width: 1226px) 100vw, 1226px" title="Microsoft Patches Actively Exploited Defender Vulnerabilities Affecting Enterprise Systems 7"></p><span data-contrast="auto">Microsoft has confirmed active exploitation of two security vulnerabilities in its security ecosystem, identified as CVE-2026-41091 and CVE-2026-45498, both evaluated under the CVSS scoring system. The issues affect Microsoft Defender and have raised concerns due to confirmed in-the-wild exploitation and potential impact on enterprise systems.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The first issue, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41091" target="_blank" rel="nofollow noopener">CVE-2026-41091 (CVSS 7.8)</a>, is a privilege escalation vulnerability affecting Microsoft Defender. If successfully exploited, it could allow a local attacker to obtain SYSTEM-level privileges. The flaw is rooted in improper link resolution before file access, commonly described as a “link following” issue.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Microsoft stated in its advisory:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">"Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally,"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The second vulnerability, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45498" target="_blank" rel="nofollow noopener">CVE-2026-45498 (CVSS 4.0)</a>, is a denial-of-service flaw impacting Microsoft Defender. While rated lower in severity under the CVSS framework, it has still been confirmed as actively exploited in real-world environments alongside CVE-2026-41091.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Both <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28411">vulnerabilities</a> have been addressed in updated releases of the Microsoft Defender Antimalware Platform, specifically versions 1.1.26040.8 and 4.18.26040.7, respectivel</span><span data-contrast="auto">y.</span>
<h3 aria-level="2"><b><span data-contrast="none">CVE-2026-41091, CVE-2026-45498, and CVSS Context</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Although Microsoft has not explicitly confirmed the link, the behavior associated with CVE-2026-41091 and CVE-2026-45498 overlaps with earlier publicly discussed issues named RedSun and UnDefend, which were disclosed by the threat research group Chaotic Eclipse (also known as Nightmare-Eclipse).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28412">Security</a> researchers from Huntress have reported active exploitation of both CVE-2026-41091 and CVE-2026-45498 in the wild. These observations also include exploitation</span><span data-contrast="auto"> </span><span data-contrast="auto">activity related to BlueHammer (CVE-2026-33825), suggesting a broader campaign targeting <a href="https://thecyberexpress.com/microsoft-storm-2949-azure-m365-cloud-breach/" target="_blank" rel="noopener">Microsoft Defender</a> components and adjacent security mechanisms.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Additional Security Findings</span></b></h3>
<span data-contrast="auto">Alongside the two actively exploited vulnerabilities CVE-2026-41091 and CVE-2026-45498, Microsoft also patched another flaw in the same Defender update cycle: CVE-2026-45584 (CVSS 8.1). This vulnerability is a heap-based buffer overflow that could allow <a href="https://thecyberexpress.com/cve-2026-45829-chromatoast-chromadb/" target="_blank" rel="noopener">remote code execution</a> if exploited. Unlike CVE-2026-41091 and CVE-2026-45498, there is currently no evidence that CVE-2026-45584 has been used in active attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Microsoft Defender systems that have been disabled are not affected by these vulnerabilities, according to the company. Microsoft also noted that no manual intervention is required for most users, as updates are delivered automatically through <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-malware/" target="_blank"  rel="noopener" title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28413">malware</a> definition updates and the Microsoft Malware Protection Engine.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">CVSS Updates and Security Guidance</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">To verify protection status against CVE-2026-41091 and CVE-2026-45498, Microsoft recommends users check their Microsoft Defender configuration using the Windows Security interface (Microsoft Windows Security). The recommended steps include navigating to Virus &amp; threat protection, checking protection updates, and verifying the Antimalware Client Version.</span>

<span data-contrast="auto">Microsoft credited five researchers for identifying CVE-2026-41091, including Sibusiso, Diffract, Andrew C. Dorman (also known as ACD421), Damir Moldovanov, and an anonymous contributor.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">CISA KEV Catalog</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The U.S. Cybersecurity and Infrastructure Security Agency (CISA) (Cybersecurity and Infrastructure Security Agency) has added both CVE-2026-41091 and CVE-2026-45498 to its <a href="https://www.cisa.gov/news-events/alerts/2026/05/20/cisa-adds-seven-known-exploited-vulnerabilities-catalog" target="_blank" rel="nofollow noopener">Known Exploited Vulnerabilities (KEV) catalog</a>. Federal Civilian Executive Branch (FCEB) agencies are required to apply mitigations by June 3, 2026, reflecting the urgency of addressing CVSS-rated threats that are already being exploited.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With this addition, three Microsoft vulnerabilities have been flagged as actively exploited within a single week, highlighting a concentrated wave of CVE-based attacks targeting Microsoft products.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Legacy Vulnerabilities </span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">CISA’s KEV catalog update also included several older but still relevant vulnerabilities:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">CVE-2010-0806</span></b><span data-contrast="auto">: <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="Internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28415">Internet</a> Explorer use-after-free flaw enabling remote code execution </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2010-0249</span></b><span data-contrast="auto">: Another Internet Explorer use-after-free <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28414">vulnerability</a> allowing arbitrary code execution </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2009-1537</span></b><span data-contrast="auto">: DirectX issue in QuickTime Movie Parser Filter via crafted media files </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2008-4250</span></b><span data-contrast="auto">: Windows Server Service buffer overflow via crafted RPC request </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2009-3459</span></b><span data-contrast="auto">: Adobe Acrobat and Reader heap-based buffer overflow via malicious PDF files </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">These legacy issues demonstrate that exploitation of older software remains relevant in modern <a href="https://thecyberexpress.com/sebi-new-guidelines-make-cti-essential/" target="_blank" rel="noopener">threat landscapes</a>, especially when combined with newer vulnerabilities like CVE-2026-41091 and CVE-2026-45498, both evaluated using CVSS metrics.</span>]]></description>
										<content:encoded><![CDATA[<p><img width="1226" height="637" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-41091" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091.webp 1226w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-300x156.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1024x532.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-768x399.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-600x312.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-150x78.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-750x390.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1140x592.webp 1140w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091.webp 1226w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-300x156.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1024x532.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-768x399.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-600x312.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-150x78.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-750x390.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-41091-1140x592.webp 1140w" sizes="(max-width: 1226px) 100vw, 1226px" title="Microsoft Patches Actively Exploited Defender Vulnerabilities Affecting Enterprise Systems 8"></p><span data-contrast="auto">Microsoft has confirmed active exploitation of two security vulnerabilities in its security ecosystem, identified as CVE-2026-41091 and CVE-2026-45498, both evaluated under the CVSS scoring system. The issues affect Microsoft Defender and have raised concerns due to confirmed in-the-wild exploitation and potential impact on enterprise systems.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The first issue, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41091" target="_blank" rel="nofollow noopener">CVE-2026-41091 (CVSS 7.8)</a>, is a privilege escalation vulnerability affecting Microsoft Defender. If successfully exploited, it could allow a local attacker to obtain SYSTEM-level privileges. The flaw is rooted in improper link resolution before file access, commonly described as a “link following” issue.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Microsoft stated in its advisory:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">"Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally,"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The second vulnerability, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45498" target="_blank" rel="nofollow noopener">CVE-2026-45498 (CVSS 4.0)</a>, is a denial-of-service flaw impacting Microsoft Defender. While rated lower in severity under the CVSS framework, it has still been confirmed as actively exploited in real-world environments alongside CVE-2026-41091.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Both <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28411">vulnerabilities</a> have been addressed in updated releases of the Microsoft Defender Antimalware Platform, specifically versions 1.1.26040.8 and 4.18.26040.7, respectivel</span><span data-contrast="auto">y.</span>
<h3 aria-level="2"><b><span data-contrast="none">CVE-2026-41091, CVE-2026-45498, and CVSS Context</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Although Microsoft has not explicitly confirmed the link, the behavior associated with CVE-2026-41091 and CVE-2026-45498 overlaps with earlier publicly discussed issues named RedSun and UnDefend, which were disclosed by the threat research group Chaotic Eclipse (also known as Nightmare-Eclipse).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto"><a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28412">Security</a> researchers from Huntress have reported active exploitation of both CVE-2026-41091 and CVE-2026-45498 in the wild. These observations also include exploitation</span><span data-contrast="auto"> </span><span data-contrast="auto">activity related to BlueHammer (CVE-2026-33825), suggesting a broader campaign targeting <a href="https://thecyberexpress.com/microsoft-storm-2949-azure-m365-cloud-breach/" target="_blank" rel="noopener">Microsoft Defender</a> components and adjacent security mechanisms.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Additional Security Findings</span></b></h3>
<span data-contrast="auto">Alongside the two actively exploited vulnerabilities CVE-2026-41091 and CVE-2026-45498, Microsoft also patched another flaw in the same Defender update cycle: CVE-2026-45584 (CVSS 8.1). This vulnerability is a heap-based buffer overflow that could allow <a href="https://thecyberexpress.com/cve-2026-45829-chromatoast-chromadb/" target="_blank" rel="noopener">remote code execution</a> if exploited. Unlike CVE-2026-41091 and CVE-2026-45498, there is currently no evidence that CVE-2026-45584 has been used in active attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Microsoft Defender systems that have been disabled are not affected by these vulnerabilities, according to the company. Microsoft also noted that no manual intervention is required for most users, as updates are delivered automatically through <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-malware/" target="_blank"  rel="noopener" title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28413">malware</a> definition updates and the Microsoft Malware Protection Engine.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">CVSS Updates and Security Guidance</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">To verify protection status against CVE-2026-41091 and CVE-2026-45498, Microsoft recommends users check their Microsoft Defender configuration using the Windows Security interface (Microsoft Windows Security). The recommended steps include navigating to Virus &amp; threat protection, checking protection updates, and verifying the Antimalware Client Version.</span>

<span data-contrast="auto">Microsoft credited five researchers for identifying CVE-2026-41091, including Sibusiso, Diffract, Andrew C. Dorman (also known as ACD421), Damir Moldovanov, and an anonymous contributor.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">CISA KEV Catalog</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The U.S. Cybersecurity and Infrastructure Security Agency (CISA) (Cybersecurity and Infrastructure Security Agency) has added both CVE-2026-41091 and CVE-2026-45498 to its <a href="https://www.cisa.gov/news-events/alerts/2026/05/20/cisa-adds-seven-known-exploited-vulnerabilities-catalog" target="_blank" rel="nofollow noopener">Known Exploited Vulnerabilities (KEV) catalog</a>. Federal Civilian Executive Branch (FCEB) agencies are required to apply mitigations by June 3, 2026, reflecting the urgency of addressing CVSS-rated threats that are already being exploited.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">With this addition, three Microsoft vulnerabilities have been flagged as actively exploited within a single week, highlighting a concentrated wave of CVE-based attacks targeting Microsoft products.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Legacy Vulnerabilities </span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">CISA’s KEV catalog update also included several older but still relevant vulnerabilities:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><b><span data-contrast="auto">CVE-2010-0806</span></b><span data-contrast="auto">: <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="Internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28415">Internet</a> Explorer use-after-free flaw enabling remote code execution </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2010-0249</span></b><span data-contrast="auto">: Another Internet Explorer use-after-free <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28414">vulnerability</a> allowing arbitrary code execution </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2009-1537</span></b><span data-contrast="auto">: DirectX issue in QuickTime Movie Parser Filter via crafted media files </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2008-4250</span></b><span data-contrast="auto">: Windows Server Service buffer overflow via crafted RPC request </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><b><span data-contrast="auto">CVE-2009-3459</span></b><span data-contrast="auto">: Adobe Acrobat and Reader heap-based buffer overflow via malicious PDF files </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">These legacy issues demonstrate that exploitation of older software remains relevant in modern <a href="https://thecyberexpress.com/sebi-new-guidelines-make-cti-essential/" target="_blank" rel="noopener">threat landscapes</a>, especially when combined with newer vulnerabilities like CVE-2026-41091 and CVE-2026-45498, both evaluated using CVSS metrics.</span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112276</post-id>	</item>
		<item>
		<title>European Agencies Shutter VPN Service Used for Ransomware Attacks</title>
		<link>https://thecyberexpress.com/first-vpn-service-seized/</link>
		
		<dc:creator><![CDATA[Mihir Bagwe]]></dc:creator>
		<pubDate>Fri, 22 May 2026 08:17:08 +0000</pubDate>
				<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Cyber Essentials]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[First VPN]]></category>
		<category><![CDATA[Operation Saffron]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112229</guid>

					<description><![CDATA[<p><img width="800" height="533" src="https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="First VPN, First VPN seized, VPN Seized, FBI, France, Dutch, Law Enforcement," decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized.webp 800w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-750x500.webp 750w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized.webp 800w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-750x500.webp 750w" sizes="(max-width: 800px) 100vw, 800px" title="European Agencies Shutter VPN Service Used for Ransomware Attacks 9"></p>The French and <a href="https://www.politie.nl/nieuws/2026/mei/21/criminele-vpn-dienst-first-vpn-offline-gehaald.html" target="_blank" rel="nofollow noopener">Dutch</a> law enforcement seized a large-scale virtual private network (VPN) service catering to cybercriminals, offering services to mask their illicit activities of scanning, botnets, denial of service attacks, scams, hacking and ransomware attacks.

Under the banner name "Operation Saffron," the authorities shuttered 33 critical servers of the First VPN service provider during the seizure and detained the alleged administrator of the service in Ukraine, in a coordinated operation.

First VPN advertised itself as a provider of anonymity, assuring its users non-cooperation with any law enforcement authorities, zero data storage, and no jurisdiction issues. The VPN Service was almost exclusively promoted in known Russian-language <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/dark-web-news/"   title="dark web" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28406">dark web</a> forums such as Exploit[.]in and XSS[.]is, which provide marketplaces for cybercriminals to buy and sell unauthorized access to computer systems, stolen personal identifying information, <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/"   title="hacking" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28409">hacking</a> tools, and contraband.

The U.S. Federal Bureau of Investigation in its <a href="https://www.ic3.gov/CSA/2026/260521.pdf" target="_blank" rel="nofollow noopener">Flash Alert</a> confirmed the service to be active since at least 2014 and provided exit node servers in 27 countries. It also concurred that an upwards of 25 <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28405">ransomware</a> groups, including Avaddon Ransomware, used First VPN Service infrastructure to perform network reconnaissance and intrusions.
<h5>Also read: <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/">Ransomware Attacks Have Soared 30% in Recent Months</a></h5>
Criminals used it to conceal their identities and infrastructure while carrying out ransomware attacks, large-scale <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28407">fraud</a>, data theft, and other serious offences," Europol said.

"For years, cybercriminals saw this VPN service as a gateway to anonymity," <a href="https://www.europol.europa.eu/media-press/newsroom/news/cybercriminal-vpn-used-ransomware-actors-dismantled-in-global-crackdown" target="_blank" rel="nofollow noopener">added</a> Edvardas Šileris, Head of Europol’s European Cybercrime Centre. "They believed it would keep them beyond the reach of law enforcement."

However, the First VPN service came up in almost every major <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28408">cybercrime</a> that the law enforcement authorities investigated in recent years, eventually leading to its take down.

The domain names seized during Operation Saffron includes:
<ul>
 	<li data-list-item-id="e780a04b57e40a2427a346a192b1d335e">1vpns[.]com</li>
 	<li data-list-item-id="e267a7615c7692e48271f1646762ba1d9">1vpns[.]net</li>
 	<li data-list-item-id="e82a0d75e016add9b0009e276b7c3ee31">1vpns[.]org</li>
 	<li data-list-item-id="ede0040789ffdc42fbc4c9472829c3039">and associated onion domains</li>
</ul>
The users coming to these domains are now greeted with a seizure banner that displays the names of all the agencies across Europe who worked actively in this operation.

[caption id="attachment_112259" align="aligncenter" width="500"]<img class="wp-image-112259" src="https://thecyberexpress.com/wp-content/uploads/First-VPN-seizure-banner.png" alt="First VPN, VPN, First VPN Seizure Banner, Operation Saffron" width="500" height="531" /> <em>Seizure banner on First VPN domains (Source: <a href="https://www.eurojust.europa.eu/news/eurojust-coordinated-investigation-shuts-down-criminal-vpn-network" target="_blank" rel="nofollow noopener">Eurojust</a>)</em>[/caption]

Europol said, that before it turned off the lights on First <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-get-a-vpn/"   title="VPN" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28410">VPN</a>, investigators gained access to the service and that led them to the user database, which also helped identify VPN connections used by several other cybercriminals.
<h5>Also read: <a href="https://thecyberexpress.com/stolen-vpn-credentials-most-common-ransomware-attack-vector/">Stolen VPN Credentials Most Common Ransomware Attack Vector</a></h5>
"The gathered intelligence exposed thousands of users linked to the cybercrime ecosystem and generated operational leads connected to ransomware attacks, fraud schemes, and other serious offences worldwide," Europol said.

The agency shared 83 intelligence packages since it initially began the operation, which also included information on 506 international users. Investigators in multiple jurisdictions are now using this intelligence to support further investigations, the Agency confirmed.]]></description>
										<content:encoded><![CDATA[<p><img width="800" height="533" src="https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="First VPN, First VPN seized, VPN Seized, FBI, France, Dutch, Law Enforcement," decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized.webp 800w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-750x500.webp 750w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized.webp 800w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-300x200.webp 300w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-768x512.webp 768w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-600x400.webp 600w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-150x100.webp 150w, https://thecyberexpress.com/wp-content/uploads/First-VPN-Seized-750x500.webp 750w" sizes="(max-width: 800px) 100vw, 800px" title="European Agencies Shutter VPN Service Used for Ransomware Attacks 11"></p>The French and <a href="https://www.politie.nl/nieuws/2026/mei/21/criminele-vpn-dienst-first-vpn-offline-gehaald.html" target="_blank" rel="nofollow noopener">Dutch</a> law enforcement seized a large-scale virtual private network (VPN) service catering to cybercriminals, offering services to mask their illicit activities of scanning, botnets, denial of service attacks, scams, hacking and ransomware attacks.

Under the banner name "Operation Saffron," the authorities shuttered 33 critical servers of the First VPN service provider during the seizure and detained the alleged administrator of the service in Ukraine, in a coordinated operation.

First VPN advertised itself as a provider of anonymity, assuring its users non-cooperation with any law enforcement authorities, zero data storage, and no jurisdiction issues. The VPN Service was almost exclusively promoted in known Russian-language <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/dark-web-news/"   title="dark web" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28406">dark web</a> forums such as Exploit[.]in and XSS[.]is, which provide marketplaces for cybercriminals to buy and sell unauthorized access to computer systems, stolen personal identifying information, <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/"   title="hacking" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28409">hacking</a> tools, and contraband.

The U.S. Federal Bureau of Investigation in its <a href="https://www.ic3.gov/CSA/2026/260521.pdf" target="_blank" rel="nofollow noopener">Flash Alert</a> confirmed the service to be active since at least 2014 and provided exit node servers in 27 countries. It also concurred that an upwards of 25 <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28405">ransomware</a> groups, including Avaddon Ransomware, used First VPN Service infrastructure to perform network reconnaissance and intrusions.
<h5>Also read: <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/">Ransomware Attacks Have Soared 30% in Recent Months</a></h5>
Criminals used it to conceal their identities and infrastructure while carrying out ransomware attacks, large-scale <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28407">fraud</a>, data theft, and other serious offences," Europol said.

"For years, cybercriminals saw this VPN service as a gateway to anonymity," <a href="https://www.europol.europa.eu/media-press/newsroom/news/cybercriminal-vpn-used-ransomware-actors-dismantled-in-global-crackdown" target="_blank" rel="nofollow noopener">added</a> Edvardas Šileris, Head of Europol’s European Cybercrime Centre. "They believed it would keep them beyond the reach of law enforcement."

However, the First VPN service came up in almost every major <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28408">cybercrime</a> that the law enforcement authorities investigated in recent years, eventually leading to its take down.

The domain names seized during Operation Saffron includes:
<ul>
 	<li data-list-item-id="e780a04b57e40a2427a346a192b1d335e">1vpns[.]com</li>
 	<li data-list-item-id="e267a7615c7692e48271f1646762ba1d9">1vpns[.]net</li>
 	<li data-list-item-id="e82a0d75e016add9b0009e276b7c3ee31">1vpns[.]org</li>
 	<li data-list-item-id="ede0040789ffdc42fbc4c9472829c3039">and associated onion domains</li>
</ul>
The users coming to these domains are now greeted with a seizure banner that displays the names of all the agencies across Europe who worked actively in this operation.

[caption id="attachment_112259" align="aligncenter" width="500"]<img class="wp-image-112259" src="https://thecyberexpress.com/wp-content/uploads/First-VPN-seizure-banner.png" alt="First VPN, VPN, First VPN Seizure Banner, Operation Saffron" width="500" height="531" /> <em>Seizure banner on First VPN domains (Source: <a href="https://www.eurojust.europa.eu/news/eurojust-coordinated-investigation-shuts-down-criminal-vpn-network" target="_blank" rel="nofollow noopener">Eurojust</a>)</em>[/caption]

Europol said, that before it turned off the lights on First <a class="wpil_keyword_link" href="https://thecyberexpress.com/how-to-get-a-vpn/"   title="VPN" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28410">VPN</a>, investigators gained access to the service and that led them to the user database, which also helped identify VPN connections used by several other cybercriminals.
<h5>Also read: <a href="https://thecyberexpress.com/stolen-vpn-credentials-most-common-ransomware-attack-vector/">Stolen VPN Credentials Most Common Ransomware Attack Vector</a></h5>
"The gathered intelligence exposed thousands of users linked to the cybercrime ecosystem and generated operational leads connected to ransomware attacks, fraud schemes, and other serious offences worldwide," Europol said.

The agency shared 83 intelligence packages since it initially began the operation, which also included information on 506 international users. Investigators in multiple jurisdictions are now using this intelligence to support further investigations, the Agency confirmed.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112229</post-id>	<enclosure length="608800" type="application/pdf" url="https://www.ic3.gov/CSA/2026/260521.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The French and Dutch law enforcement seized a large-scale virtual private network (VPN) service catering to cybercriminals, offering services to mask their illicit activities of scanning, botnets, denial of service attacks, scams, hacking and ransomware attacks. Under the banner name "Operation Saffron," the authorities shuttered 33 critical servers of the First VPN service provider during the seizure and detained the alleged administrator of the service in Ukraine, in a coordinated operation. First VPN advertised itself as a provider of anonymity, assuring its users non-cooperation with any law enforcement authorities, zero data storage, and no jurisdiction issues. The VPN Service was almost exclusively promoted in known Russian-language dark web forums such as Exploit[.]in and XSS[.]is, which provide marketplaces for cybercriminals to buy and sell unauthorized access to computer systems, stolen personal identifying information, hacking tools, and contraband. The U.S. Federal Bureau of Investigation in its Flash Alert confirmed the service to be active since at least 2014 and provided exit node servers in 27 countries. It also concurred that an upwards of 25 ransomware groups, including Avaddon Ransomware, used First VPN Service infrastructure to perform network reconnaissance and intrusions. Also read: Ransomware Attacks Have Soared 30% in Recent Months Criminals used it to conceal their identities and infrastructure while carrying out ransomware attacks, large-scale fraud, data theft, and other serious offences," Europol said. "For years, cybercriminals saw this VPN service as a gateway to anonymity," added Edvardas Šileris, Head of Europol’s European Cybercrime Centre. "They believed it would keep them beyond the reach of law enforcement." However, the First VPN service came up in almost every major cybercrime that the law enforcement authorities investigated in recent years, eventually leading to its take down. The domain names seized during Operation Saffron includes: 1vpns[.]com 1vpns[.]net 1vpns[.]org and associated onion domains The users coming to these domains are now greeted with a seizure banner that displays the names of all the agencies across Europe who worked actively in this operation. [caption id="attachment_112259" align="aligncenter" width="500"] Seizure banner on First VPN domains (Source: Eurojust)[/caption] Europol said, that before it turned off the lights on First VPN, investigators gained access to the service and that led them to the user database, which also helped identify VPN connections used by several other cybercriminals. Also read: Stolen VPN Credentials Most Common Ransomware Attack Vector "The gathered intelligence exposed thousands of users linked to the cybercrime ecosystem and generated operational leads connected to ransomware attacks, fraud schemes, and other serious offences worldwide," Europol said. The agency shared 83 intelligence packages since it initially began the operation, which also included information on 506 international users. Investigators in multiple jurisdictions are now using this intelligence to support further investigations, the Agency confirmed.</itunes:subtitle><itunes:summary>The French and Dutch law enforcement seized a large-scale virtual private network (VPN) service catering to cybercriminals, offering services to mask their illicit activities of scanning, botnets, denial of service attacks, scams, hacking and ransomware attacks. Under the banner name "Operation Saffron," the authorities shuttered 33 critical servers of the First VPN service provider during the seizure and detained the alleged administrator of the service in Ukraine, in a coordinated operation. First VPN advertised itself as a provider of anonymity, assuring its users non-cooperation with any law enforcement authorities, zero data storage, and no jurisdiction issues. The VPN Service was almost exclusively promoted in known Russian-language dark web forums such as Exploit[.]in and XSS[.]is, which provide marketplaces for cybercriminals to buy and sell unauthorized access to computer systems, stolen personal identifying information, hacking tools, and contraband. The U.S. Federal Bureau of Investigation in its Flash Alert confirmed the service to be active since at least 2014 and provided exit node servers in 27 countries. It also concurred that an upwards of 25 ransomware groups, including Avaddon Ransomware, used First VPN Service infrastructure to perform network reconnaissance and intrusions. Also read: Ransomware Attacks Have Soared 30% in Recent Months Criminals used it to conceal their identities and infrastructure while carrying out ransomware attacks, large-scale fraud, data theft, and other serious offences," Europol said. "For years, cybercriminals saw this VPN service as a gateway to anonymity," added Edvardas Šileris, Head of Europol’s European Cybercrime Centre. "They believed it would keep them beyond the reach of law enforcement." However, the First VPN service came up in almost every major cybercrime that the law enforcement authorities investigated in recent years, eventually leading to its take down. The domain names seized during Operation Saffron includes: 1vpns[.]com 1vpns[.]net 1vpns[.]org and associated onion domains The users coming to these domains are now greeted with a seizure banner that displays the names of all the agencies across Europe who worked actively in this operation. [caption id="attachment_112259" align="aligncenter" width="500"] Seizure banner on First VPN domains (Source: Eurojust)[/caption] Europol said, that before it turned off the lights on First VPN, investigators gained access to the service and that led them to the user database, which also helped identify VPN connections used by several other cybercriminals. Also read: Stolen VPN Credentials Most Common Ransomware Attack Vector "The gathered intelligence exposed thousands of users linked to the cybercrime ecosystem and generated operational leads connected to ransomware attacks, fraud schemes, and other serious offences worldwide," Europol said. The agency shared 83 intelligence packages since it initially began the operation, which also included information on 506 international users. Investigators in multiple jurisdictions are now using this intelligence to support further investigations, the Agency confirmed.</itunes:summary><itunes:keywords>Cyber News, Cyber Essentials, Eurojust, Europol, FBI, First VPN, Operation Saffron, VPN</itunes:keywords></item>
		<item>
		<title>Cisco Secure Workload Flaw CVE-2026-20223 Gets Maximum CVSS 10 Rating</title>
		<link>https://thecyberexpress.com/cisco-cve-2026-20223/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Fri, 22 May 2026 07:36:24 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[CVE-2026-20223]]></category>
		<category><![CDATA[CWE-306]]></category>
		<category><![CDATA[REST API]]></category>
		<category><![CDATA[Secure Workload]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112254</guid>

					<description><![CDATA[<p><img width="1236" height="633" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-20223" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223.webp 1236w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-300x154.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1024x524.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-768x393.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-600x307.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-150x77.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-750x384.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1140x584.webp 1140w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223.webp 1236w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-300x154.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1024x524.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-768x393.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-600x307.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-150x77.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-750x384.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1140x584.webp 1140w" sizes="(max-width: 1236px) 100vw, 1236px" title="Cisco Secure Workload Flaw CVE-2026-20223 Gets Maximum CVSS 10 Rating 12"></p><span data-contrast="auto">Cisco has released security updates to fix a critical vulnerability, tracked as CVE-2026-20223, affecting its Cisco Secure Workload platform. The flaw, which received the maximum CVSS score of 10.0, could allow an unauthenticated remote attacker to access sensitive information and make unauthorized configuration changes through vulnerable REST API endpoints.</span>

<span data-contrast="auto">The company said the issue originates from insufficient validation and authentication checks in internal REST API functions used by Secure Workload. The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28400">vulnerability</a> has also been classified under CWE-306, a category associated with missing authentication protections for critical operations.</span>

<span data-contrast="auto">According to Cisco, “an attacker could <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28404">exploit</a> this vulnerability if they can send a crafted API request to an affected endpoint.” The company added that a successful exploitation of CVE-2026-20223 could allow attackers to “read sensitive information and make configuration changes across tenant boundaries with the privileges of the Site Admin user.”</span>
<h3 aria-level="2"><b><span data-contrast="none">CVE-2026-20223 Impacts Internal Secure Workload REST API Functions</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto"><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csw-pnbsa-g8WEnuy" target="_blank" rel="nofollow noopener">Cisco stated in its advisory</a> that the vulnerability affects internal REST API endpoints within Cisco Secure Workload Cluster Software. The issue impacts both SaaS and on-premises deployments regardless of device configuration.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, the company clarified that the flaw does not affect the web-based management interface. Instead, the exposure is limited to internal API functions associated with Secure Workload infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The advisory, identified as “cisco-sa-csw-pnbsa-g8WEnuy,” was first published on May 20, 2026, at 16:00 GMT. Cisco assigned the flaw a base CVSS score of 10.0 due to the severity of the potential impact and the lack of authentication requirements needed for exploitation. The issue is internally tracked under Cisco Bug ID CSCwt99942.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Cisco explained that the root cause behind CVE-2026-20223 is “insufficient validation and authentication when accessing REST API endpoints.” Because of these missing protections, attackers may be able to bypass <a href="https://thecyberexpress.com/cve-2026-5140-pardus-linux-root-access-flaw/" target="_blank" rel="noopener">authorization</a> boundaries and gain access to site resources with Site Admin-level privileges.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Cisco Warns of Cross-Tenant Data Exposure Risks</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The company warned that exploitation of CVE-2026-20223 could allow unauthorized access to <a href="https://thecyberexpress.com/cve-2026-5140-pardus-linux-root-access-flaw/" target="_blank" rel="noopener">sensitive information</a> across tenant environments. Attackers could also modify configurations across tenant boundaries while operating with elevated Site Admin permissions.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The nature of the vulnerability makes it particularly severe in multi-tenant Secure Workload environments where administrative controls and segmentation are critical for protecting customer <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28401">data</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Cisco also confirmed that there are currently no workarounds available to mitigate the REST API vulnerability. As a result, organizations using affected Secure Workload releases are being advised to install fixed software versions as quickly as possible.</span>

<span data-contrast="auto">The company stated that temporary mitigations are not enough to fully remediate the issue and strongly recommended upgrading to patched releases to avoid future exposure related to CVE-2026-20223.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Fixed Secure Workload Versions for CVE-2026-20223</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Cisco released patches for affected Secure Workload versions and outlined the following fixed releases:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">Cisco Secure Workload Release 3.10 — fixed in version 3.10.8.3 </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Cisco Secure Workload Release 4.0 — fixed in version 4.0.3.17 </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Cisco Secure Workload Release 3.9 and earlier — customers are advised to migrate to a fixed release </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">The company also noted that the cloud-based Cisco Secure Workload SaaS deployment has already been secured against CVE-2026-20223. Cisco said no user action is required for SaaS customers because the fixes have already been applied to the hosted environment.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Customers requiring additional support were advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers for guidance regarding patch deployment and remediation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Cisco Says No Active Exploitation Has Been Detected</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Despite the maximum severity rating assigned to CVE-2026-20223, Cisco stated that its Product <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28403">Security</a> Incident Response Team (PSIRT) is “not aware of any public announcements or malicious use of the vulnerability” at the time of disclosure.</span>

<span data-contrast="auto">The company added that the vulnerability was identified during internal security testing rather than through reports of active attacks in the wild.</span>

<span data-contrast="auto">The disclosure highlights the increasing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28402">risks</a> associated with insecure REST API implementations in enterprise infrastructure products. Vulnerabilities tied to CWE-306 can become especially dangerous when authentication checks are absent from critical administrative functions.</span>

<span data-contrast="auto">As more organizations rely on APIs to manage workloads, automate infrastructure, and support cloud-native environments, flaws like CVE-2026-20223 demonstrate how authentication weaknesses in Secure Workload platforms can expose sensitive systems and tenant data to <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">unauthorized access</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Cisco published version 1.0 of the advisory as a final release on May 20, 2026, and has not indicated whether additional revisions related to the Secure Workload REST API vulnerability are expected.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></description>
										<content:encoded><![CDATA[<p><img width="1236" height="633" src="https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CVE-2026-20223" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223.webp 1236w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-300x154.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1024x524.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-768x393.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-600x307.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-150x77.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-750x384.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1140x584.webp 1140w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223.webp 1236w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-300x154.webp 300w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1024x524.webp 1024w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-768x393.webp 768w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-600x307.webp 600w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-150x77.webp 150w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-750x384.webp 750w, https://thecyberexpress.com/wp-content/uploads/CVE-2026-20223-1140x584.webp 1140w" sizes="(max-width: 1236px) 100vw, 1236px" title="Cisco Secure Workload Flaw CVE-2026-20223 Gets Maximum CVSS 10 Rating 13"></p><span data-contrast="auto">Cisco has released security updates to fix a critical vulnerability, tracked as CVE-2026-20223, affecting its Cisco Secure Workload platform. The flaw, which received the maximum CVSS score of 10.0, could allow an unauthenticated remote attacker to access sensitive information and make unauthorized configuration changes through vulnerable REST API endpoints.</span>

<span data-contrast="auto">The company said the issue originates from insufficient validation and authentication checks in internal REST API functions used by Secure Workload. The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28400">vulnerability</a> has also been classified under CWE-306, a category associated with missing authentication protections for critical operations.</span>

<span data-contrast="auto">According to Cisco, “an attacker could <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28404">exploit</a> this vulnerability if they can send a crafted API request to an affected endpoint.” The company added that a successful exploitation of CVE-2026-20223 could allow attackers to “read sensitive information and make configuration changes across tenant boundaries with the privileges of the Site Admin user.”</span>
<h3 aria-level="2"><b><span data-contrast="none">CVE-2026-20223 Impacts Internal Secure Workload REST API Functions</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto"><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csw-pnbsa-g8WEnuy" target="_blank" rel="nofollow noopener">Cisco stated in its advisory</a> that the vulnerability affects internal REST API endpoints within Cisco Secure Workload Cluster Software. The issue impacts both SaaS and on-premises deployments regardless of device configuration.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, the company clarified that the flaw does not affect the web-based management interface. Instead, the exposure is limited to internal API functions associated with Secure Workload infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The advisory, identified as “cisco-sa-csw-pnbsa-g8WEnuy,” was first published on May 20, 2026, at 16:00 GMT. Cisco assigned the flaw a base CVSS score of 10.0 due to the severity of the potential impact and the lack of authentication requirements needed for exploitation. The issue is internally tracked under Cisco Bug ID CSCwt99942.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Cisco explained that the root cause behind CVE-2026-20223 is “insufficient validation and authentication when accessing REST API endpoints.” Because of these missing protections, attackers may be able to bypass <a href="https://thecyberexpress.com/cve-2026-5140-pardus-linux-root-access-flaw/" target="_blank" rel="noopener">authorization</a> boundaries and gain access to site resources with Site Admin-level privileges.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Cisco Warns of Cross-Tenant Data Exposure Risks</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">The company warned that exploitation of CVE-2026-20223 could allow unauthorized access to <a href="https://thecyberexpress.com/cve-2026-5140-pardus-linux-root-access-flaw/" target="_blank" rel="noopener">sensitive information</a> across tenant environments. Attackers could also modify configurations across tenant boundaries while operating with elevated Site Admin permissions.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The nature of the vulnerability makes it particularly severe in multi-tenant Secure Workload environments where administrative controls and segmentation are critical for protecting customer <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28401">data</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Cisco also confirmed that there are currently no workarounds available to mitigate the REST API vulnerability. As a result, organizations using affected Secure Workload releases are being advised to install fixed software versions as quickly as possible.</span>

<span data-contrast="auto">The company stated that temporary mitigations are not enough to fully remediate the issue and strongly recommended upgrading to patched releases to avoid future exposure related to CVE-2026-20223.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Fixed Secure Workload Versions for CVE-2026-20223</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Cisco released patches for affected Secure Workload versions and outlined the following fixed releases:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<ul>
 	<li><span data-contrast="auto">Cisco Secure Workload Release 3.10 — fixed in version 3.10.8.3 </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Cisco Secure Workload Release 4.0 — fixed in version 4.0.3.17 </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
 	<li><span data-contrast="auto">Cisco Secure Workload Release 3.9 and earlier — customers are advised to migrate to a fixed release </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li>
</ul>
<span data-contrast="auto">The company also noted that the cloud-based Cisco Secure Workload SaaS deployment has already been secured against CVE-2026-20223. Cisco said no user action is required for SaaS customers because the fixes have already been applied to the hosted environment.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Customers requiring additional support were advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers for guidance regarding patch deployment and remediation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Cisco Says No Active Exploitation Has Been Detected</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<span data-contrast="auto">Despite the maximum severity rating assigned to CVE-2026-20223, Cisco stated that its Product <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28403">Security</a> Incident Response Team (PSIRT) is “not aware of any public announcements or malicious use of the vulnerability” at the time of disclosure.</span>

<span data-contrast="auto">The company added that the vulnerability was identified during internal security testing rather than through reports of active attacks in the wild.</span>

<span data-contrast="auto">The disclosure highlights the increasing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28402">risks</a> associated with insecure REST API implementations in enterprise infrastructure products. Vulnerabilities tied to CWE-306 can become especially dangerous when authentication checks are absent from critical administrative functions.</span>

<span data-contrast="auto">As more organizations rely on APIs to manage workloads, automate infrastructure, and support cloud-native environments, flaws like CVE-2026-20223 demonstrate how authentication weaknesses in Secure Workload platforms can expose sensitive systems and tenant data to <a href="https://thecyberexpress.com/situsamc-data-breach/" target="_blank" rel="noopener">unauthorized access</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Cisco published version 1.0 of the advisory as a final release on May 20, 2026, and has not indicated whether additional revisions related to the Secure Workload REST API vulnerability are expected.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112254</post-id>	</item>
		<item>
		<title>EMEA Emerges as Global Hotspot for Financial Services DDoS Attacks</title>
		<link>https://thecyberexpress.com/financial-services-ddos-attacks/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Fri, 22 May 2026 07:28:46 +0000</pubDate>
				<category><![CDATA[Bug Bounty & Rewards]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Ransomware News]]></category>
		<category><![CDATA[AI-powered attack]]></category>
		<category><![CDATA[AI-powered botnets]]></category>
		<category><![CDATA[Akamai Research]]></category>
		<category><![CDATA[API security incident]]></category>
		<category><![CDATA[API-related cyber risks]]></category>
		<category><![CDATA[Financial Sector Cybersecurity]]></category>
		<category><![CDATA[Financial Services DDoS Attacks]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112241</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Financial Services DDoS Attacks" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="EMEA Emerges as Global Hotspot for Financial Services DDoS Attacks 14"></p>The global financial sector is facing a sharp rise in Financial Services DDoS Attacks, with cybercriminals increasingly targeting banks, payment systems, and online financial platforms through larger, longer, and more attacks, according to new research from Akamai.

In its latest State of the Internet (SOTI) Security report titled <em>AI-Empowered Botnets and API Visibility Gaps: Attack Trends in Financial Services</em>, research warned that AI-powered botnets and politically motivated <a href="https://thecyberexpress.com/cyberattacks-on-the-nato-summit/" target="_blank" rel="noopener">hacktivist groups</a> are intensifying the cyber threat landscape for the banking and financial services industry.

Researchers found that Financial Services DDoS Attacks have become more persistent and operationally disruptive, particularly across Layers 3 and 4 web and API infrastructure.
<h2>Financial Services DDoS Attacks Top the Chart</h2>
According to the report, financial services organizations are now the most targeted industry for web and API <a href="https://thecyberexpress.com/why-is-ddos-topper-among-cyberattacks-in-2022/" target="_blank" rel="noopener">distributed denial-of-service attacks</a>.

Akamai revealed that the median duration of global Layers 3 and 4 Financial Services <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ddos-attack/" target="_blank"  rel="noopener" title="DDoS" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28394">DDoS</a> Attacks has increased by 738% since 2024. The company attributed the surge to <a href="https://thecyberexpress.com/americas-cyber-threat-landscape-cyble-webinar/" target="_blank" rel="noopener">AI-powered attack</a> infrastructure and growing hacktivist activity, including campaigns linked to pro-Iran cyber groups.

Security researchers <a href="https://www.akamai.com/newsroom/press-release/financial-services-at-risk-ddos-attacks-are-bigger-longer-and-more-complex-akamai-research-finds" target="_blank" rel="nofollow noopener">said</a> attackers are increasingly focusing on:
<ul>
 	<li>Online banking systems</li>
 	<li>Real-time payment platforms</li>
 	<li>API infrastructure</li>
 	<li>Customer-facing financial applications</li>
</ul>
The report noted that while financial institutions continue expanding digital banking and payment services, the growing reliance on APIs and cloud-connected infrastructure has also expanded the attack surface available to <a href="https://thecyberexpress.com/microsoft-smartscreen-vulnerability/" target="_blank" rel="noopener">threat actors</a>.
<h2>API-Related Cyber Risks Emerging as Major Security Weakness</h2>
One of the strongest findings in the report involved API-related cyber <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28399">risks</a>.

According to reserach’s 2026 API Security Impact Study, 96% of financial service leaders surveyed reported at least one <a href="https://thecyberexpress.com/cybersecurity-weekly-roundup/" target="_blank" rel="noopener">API security incident</a> within the past year. That figure was the highest recorded among all industries included in the research.

The report also found that:
<ul>
 	<li>60% of all web attacks in 2025 targeted banking institutions</li>
 	<li>83% of attacks against API endpoints focused on financial organizations</li>
</ul>
Researchers warned that APIs are increasingly becoming high-value targets because they support critical services such as digital payments, account management, authentication systems, and mobile banking applications.

Steve Winterfeld, Advisory Chief Information <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28393">Security</a> Officer at Akamai, said APIs are now central to modern cyberattacks against financial institutions.

“Cybercriminals and hacktivists continue to escalate DDoS from nuisance attacks to a sustained siege encompassing both hacktivism and <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28397">cybercrime</a>, and financial services are in the crosshairs,” Winterfeld said.

He added that artificial intelligence is accelerating existing <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-are-cyber-threats/" target="_blank"  rel="noopener" title="cybersecurity threats" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28396">cybersecurity threats</a> rather than replacing them.
<h2>AI Botnets Driving DDoS Campaigns</h2>
The report highlighted how AI-driven infrastructure is helping attackers automate and scale malicious operations more effectively.

Researchers observed a 147% surge in advanced bot activity during late 2025. In one case study referenced by Akamai, nearly 96% of all traffic reaching a targeted website was identified as malicious scraping bot activity.

The company warned that AI-powered botnets are making Financial Services DDoS Attacks more difficult to detect and mitigate because attackers can dynamically adapt attack patterns and traffic behavior.

These botnets are also being used to:
<ul>
 	<li>Overwhelm infrastructure</li>
 	<li>Disrupt payment systems</li>
 	<li>Target APIs</li>
 	<li>Scrape sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28398">data</a></li>
 	<li>Launch credential abuse campaigns</li>
</ul>
Cybersecurity experts have increasingly warned that <a href="https://thecyberexpress.com/the-global-commerce-vulnerability-window/" target="_blank" rel="noopener">AI-enabled automation</a> allows threat actors to launch large-scale attacks with fewer technical resources.
<h2>Attack Patterns Differ Across Global Regions</h2>
Research also identified major regional differences in <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-cyber-attack/" target="_blank"  rel="noopener" title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28395">cyberattack</a> patterns targeting financial institutions.

The report found:
<ul>
 	<li>Europe, the Middle East, and Africa accounted for 62% of Layers 3 and 4 DDoS attacks</li>
 	<li>Asia-Pacific experienced 52% of Layer 7 DDoS attacks</li>
 	<li>North America recorded the highest volume of web attacks at 44%</li>
</ul>
Researchers said these differences reflect varying attacker strategies, infrastructure deployment patterns, and regional cybersecurity maturity levels.

The report also revealed that nearly 80% of financial institutions experienced <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/" target="_blank" rel="noopener">ransomware attacks</a> during the past two years. However, fewer than half of surveyed organizations reported adopting advanced cybersecurity technologies capable of handling modern attack methods.
<h2>Growing Pressure on Financial Sector Cybersecurity</h2>
The latest findings add to growing concerns around operational resilience within the global financial industry.

As banks and financial institutions continue accelerating digital transformation initiatives, cybersecurity teams are being forced to defend increasingly complex environments that rely heavily on APIs, cloud platforms, automated infrastructure, and third-party integrations.

Research said organizations must improve visibility into APIs, strengthen DDoS mitigation strategies, and modernize threat detection capabilities to address the evolving threat landscape.

The SOTI report also includes guidance on<a href="https://thecyberexpress.com/dns-security-guidance-nist-sp-800-81r3-update/" target="_blank" rel="noopener"> DNS security</a>, DDoS mitigation practices, AI architecture security considerations, and insights from financial sector cybersecurity experts, including contributions from the FS-ISAC.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Financial Services DDoS Attacks" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks.webp 1376w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/Financial-Services-DDoS-Attacks-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="EMEA Emerges as Global Hotspot for Financial Services DDoS Attacks 15"></p>The global financial sector is facing a sharp rise in Financial Services DDoS Attacks, with cybercriminals increasingly targeting banks, payment systems, and online financial platforms through larger, longer, and more attacks, according to new research from Akamai.

In its latest State of the Internet (SOTI) Security report titled <em>AI-Empowered Botnets and API Visibility Gaps: Attack Trends in Financial Services</em>, research warned that AI-powered botnets and politically motivated <a href="https://thecyberexpress.com/cyberattacks-on-the-nato-summit/" target="_blank" rel="noopener">hacktivist groups</a> are intensifying the cyber threat landscape for the banking and financial services industry.

Researchers found that Financial Services DDoS Attacks have become more persistent and operationally disruptive, particularly across Layers 3 and 4 web and API infrastructure.
<h2>Financial Services DDoS Attacks Top the Chart</h2>
According to the report, financial services organizations are now the most targeted industry for web and API <a href="https://thecyberexpress.com/why-is-ddos-topper-among-cyberattacks-in-2022/" target="_blank" rel="noopener">distributed denial-of-service attacks</a>.

Akamai revealed that the median duration of global Layers 3 and 4 Financial Services <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-ddos-attack/" target="_blank"  rel="noopener" title="DDoS" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28394">DDoS</a> Attacks has increased by 738% since 2024. The company attributed the surge to <a href="https://thecyberexpress.com/americas-cyber-threat-landscape-cyble-webinar/" target="_blank" rel="noopener">AI-powered attack</a> infrastructure and growing hacktivist activity, including campaigns linked to pro-Iran cyber groups.

Security researchers <a href="https://www.akamai.com/newsroom/press-release/financial-services-at-risk-ddos-attacks-are-bigger-longer-and-more-complex-akamai-research-finds" target="_blank" rel="nofollow noopener">said</a> attackers are increasingly focusing on:
<ul>
 	<li>Online banking systems</li>
 	<li>Real-time payment platforms</li>
 	<li>API infrastructure</li>
 	<li>Customer-facing financial applications</li>
</ul>
The report noted that while financial institutions continue expanding digital banking and payment services, the growing reliance on APIs and cloud-connected infrastructure has also expanded the attack surface available to <a href="https://thecyberexpress.com/microsoft-smartscreen-vulnerability/" target="_blank" rel="noopener">threat actors</a>.
<h2>API-Related Cyber Risks Emerging as Major Security Weakness</h2>
One of the strongest findings in the report involved API-related cyber <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28399">risks</a>.

According to reserach’s 2026 API Security Impact Study, 96% of financial service leaders surveyed reported at least one <a href="https://thecyberexpress.com/cybersecurity-weekly-roundup/" target="_blank" rel="noopener">API security incident</a> within the past year. That figure was the highest recorded among all industries included in the research.

The report also found that:
<ul>
 	<li>60% of all web attacks in 2025 targeted banking institutions</li>
 	<li>83% of attacks against API endpoints focused on financial organizations</li>
</ul>
Researchers warned that APIs are increasingly becoming high-value targets because they support critical services such as digital payments, account management, authentication systems, and mobile banking applications.

Steve Winterfeld, Advisory Chief Information <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28393">Security</a> Officer at Akamai, said APIs are now central to modern cyberattacks against financial institutions.

“Cybercriminals and hacktivists continue to escalate DDoS from nuisance attacks to a sustained siege encompassing both hacktivism and <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/" target="_blank"  rel="noopener" title="cybercrime" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28397">cybercrime</a>, and financial services are in the crosshairs,” Winterfeld said.

He added that artificial intelligence is accelerating existing <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-are-cyber-threats/" target="_blank"  rel="noopener" title="cybersecurity threats" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28396">cybersecurity threats</a> rather than replacing them.
<h2>AI Botnets Driving DDoS Campaigns</h2>
The report highlighted how AI-driven infrastructure is helping attackers automate and scale malicious operations more effectively.

Researchers observed a 147% surge in advanced bot activity during late 2025. In one case study referenced by Akamai, nearly 96% of all traffic reaching a targeted website was identified as malicious scraping bot activity.

The company warned that AI-powered botnets are making Financial Services DDoS Attacks more difficult to detect and mitigate because attackers can dynamically adapt attack patterns and traffic behavior.

These botnets are also being used to:
<ul>
 	<li>Overwhelm infrastructure</li>
 	<li>Disrupt payment systems</li>
 	<li>Target APIs</li>
 	<li>Scrape sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28398">data</a></li>
 	<li>Launch credential abuse campaigns</li>
</ul>
Cybersecurity experts have increasingly warned that <a href="https://thecyberexpress.com/the-global-commerce-vulnerability-window/" target="_blank" rel="noopener">AI-enabled automation</a> allows threat actors to launch large-scale attacks with fewer technical resources.
<h2>Attack Patterns Differ Across Global Regions</h2>
Research also identified major regional differences in <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-a-cyber-attack/" target="_blank"  rel="noopener" title="cyberattack" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28395">cyberattack</a> patterns targeting financial institutions.

The report found:
<ul>
 	<li>Europe, the Middle East, and Africa accounted for 62% of Layers 3 and 4 DDoS attacks</li>
 	<li>Asia-Pacific experienced 52% of Layer 7 DDoS attacks</li>
 	<li>North America recorded the highest volume of web attacks at 44%</li>
</ul>
Researchers said these differences reflect varying attacker strategies, infrastructure deployment patterns, and regional cybersecurity maturity levels.

The report also revealed that nearly 80% of financial institutions experienced <a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/" target="_blank" rel="noopener">ransomware attacks</a> during the past two years. However, fewer than half of surveyed organizations reported adopting advanced cybersecurity technologies capable of handling modern attack methods.
<h2>Growing Pressure on Financial Sector Cybersecurity</h2>
The latest findings add to growing concerns around operational resilience within the global financial industry.

As banks and financial institutions continue accelerating digital transformation initiatives, cybersecurity teams are being forced to defend increasingly complex environments that rely heavily on APIs, cloud platforms, automated infrastructure, and third-party integrations.

Research said organizations must improve visibility into APIs, strengthen DDoS mitigation strategies, and modernize threat detection capabilities to address the evolving threat landscape.

The SOTI report also includes guidance on<a href="https://thecyberexpress.com/dns-security-guidance-nist-sp-800-81r3-update/" target="_blank" rel="noopener"> DNS security</a>, DDoS mitigation practices, AI architecture security considerations, and insights from financial sector cybersecurity experts, including contributions from the FS-ISAC.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112241</post-id>	</item>
		<item>
		<title>INJ3CTOR3 Deploys JOMANGY Webshell in Advanced FreePBX Attacks</title>
		<link>https://thecyberexpress.com/inj3ctor3-jomangy-freepbx/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Fri, 22 May 2026 07:20:35 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Dark Web News]]></category>
		<category><![CDATA[FreePBX systems]]></category>
		<category><![CDATA[INJ3CTOR3]]></category>
		<category><![CDATA[JOMANGY]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[ZenharR malware]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112238</guid>

					<description><![CDATA[<p><img width="1284" height="629" src="https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="INJ3CTOR3" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3.webp 1284w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-300x147.webp 300w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1024x502.webp 1024w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-768x376.webp 768w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-600x294.webp 600w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-150x73.webp 150w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-750x367.webp 750w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1140x558.webp 1140w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3.webp 1284w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-300x147.webp 300w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1024x502.webp 1024w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-768x376.webp 768w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-600x294.webp 600w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-150x73.webp 150w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-750x367.webp 750w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1140x558.webp 1140w" sizes="(max-width: 1284px) 100vw, 1284px" title="INJ3CTOR3 Deploys JOMANGY Webshell in Advanced FreePBX Attacks 16"></p><span data-contrast="auto">Researchers at Cyble Research &amp; Intelligence Labs (CRIL) have uncovered an advanced cyber campaign targeting FreePBX systems and, with high confidence, linked the activity to the threat actor INJ3CTOR3. The operation introduces a previously undocumented PHP webshell family named JOMANGY and deploys the ZenharR malware toolkit, which has previously been associated with the same actor.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Unlike conventional malware campaigns centered on ransomware or <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28385">data</a> theft, this operation is designed to hijack telephony infrastructure and abuse victims’ SIP trunks to generate fraudulent outbound calls billed directly to affected organizations. Researchers said the campaign demonstrates an unusually persistent architecture capable of surviving cleanup attempts and restoring infections within minutes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">INJ3CTOR3 Builds a Self-Healing Persistence Framework</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">At the center of the operation is a multi-stage Bash-based infection chain that installs six separate persistence mechanisms across compromised FreePBX systems. These mechanisms continuously reinforce one another, creating what researchers described as a “self-healing” <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28390">malware</a> ecosystem.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The persistence channels include cron-based command-and-control polling every one to three minutes, shell profile injections triggered during reboots and root logins, immutable crontab backups protected with </span><span data-contrast="auto">chattr +i</span><span data-contrast="auto">, watchdog processes that automatically relaunch <a href="https://thecyberexpress.com/north-korean-hackers-deploy-drone-malware/" target="_blank" rel="noopener">malware components</a>, multiple immutable copies of JOMANGY webshells scattered across the server, and a self-reinstalling PHP executor embedded into the environment.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/05/02-1024x238.png" alt="JOMANGY Webshell Operator Panel" width="1024" height="238" /> Image source: Cyble[/caption]

<span data-contrast="auto">Researchers noted that partial remediation efforts are ineffective because any surviving component can rapidly rebuild the full compromise. Even if administrators remove several malicious files or cron jobs, remaining persistence layers can silently restore the infection.</span>
<h3 aria-level="2"><b><span data-contrast="none">Attackers Create 18 Backdoor Accounts Across FreePBX Systems</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The campaign also establishes extensive unauthorized access using 18 separate <a href="https://thecyberexpress.com/attackers-deploy-backdoors-in-ivanti-epmm/" target="_blank" rel="noopener">backdoor accounts</a> spread across multiple privilege levels. Nine of these accounts possess UID-0 privileges, effectively granting root-level access to the attackers.</span>

<span data-contrast="auto">Another eight accounts imitate legitimate service accounts commonly found in FreePBX systems, while one additional account is inserted directly into the FreePBX MySQL database to provide administrative web-panel access. To avoid suspicion, the attackers used names such as “asterisk,” “freepbxuser,” “spamfilter,” and “sangoma,” allowing the malicious accounts to blend into ordinary PBX administrative environments.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Researchers believe this approach significantly reduces the chances of casual detection during routine inspections.</span>
<h3 aria-level="2"><b><span data-contrast="none">JOMANGY Introduces a New PHP Webshell Family</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">CRIL researchers identified JOMANGY as a previously undocumented malware family, making this investigation the first publicly known analysis of the toolset. Every recovered sample used a double-obfuscation technique involving Base64 encoding layered over ROT13 transformations.</span>

<span data-contrast="auto">All identified payloads also contained the watermark string </span><span data-contrast="auto">trace_e1ebf9066a951be519a24140711839ea</span><span data-contrast="auto">, linking the malware samples to a common development source.</span>

<span data-contrast="auto">Beyond persistence and remote command execution, JOMANGY contains active toll <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28387">fraud</a> functionality capable of initiating outbound calls through compromised PBX infrastructure. Researchers observed commands such as:</span>

<span data-contrast="auto">asterisk -rx "channel originate Local/&lt;num&gt;@&lt;context&gt;"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This capability allows attackers to abuse victims’ telephony infrastructure directly for <a href="https://thecyberexpress.com/surge-mekotio-banking-trojan-latin-america/" target="_blank" rel="noopener">financial gain</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Large-Scale Reconnaissance Suggests Mass Exploitation</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Researchers also discovered a command-and-control-hosted inventory file named </span><span data-contrast="auto">people2.txt</span><span data-contrast="auto"> containing 3,080 <a href="https://thecyberexpress.com/russia-weaponizes-ukrainian-ip-addresses/" target="_blank" rel="noopener">IP addresses</a> believed to represent automated reconnaissance results.</span>

<span data-contrast="auto">Approximately 39 percent of the listed systems were hosted on Alibaba Cloud infrastructure located in China, Hong Kong, and Singapore, suggesting a geographically broad scanning operation. The findings indicate that INJ3CTOR3 is pursuing mass exploitation rather than highly selective targeting.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Additional evidence recovered from stolen Elastix databases and references to Issabel and Sangoma environments suggests the campaign targets a wide range of PBX deployments across Latin America, Southeast Asia, and the Middle East.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Infrastructure Overlaps Tie the Campaign to INJ3CTOR3</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The malware infrastructure demonstrated strong operational continuity with earlier INJ3CTOR3 campaigns. The Stage 1 dropper aggressively removed competing malware families and defensive tooling before deploying its own payloads.</span>

<span data-contrast="auto">Researchers found that more than 50 webshell signatures were deleted from infected systems, while <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-firewall/" target="_blank"  rel="noopener" title="firewall" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28388">firewall</a> rules blocked 11 rival command-and-control IP addresses.</span>

<span data-contrast="auto">Interestingly, the malware also removed artifacts associated with the actor’s own January 2026 campaign. Researchers believe this indicates that the operators migrated infrastructure from Brazilian-hosted systems to Dutch-hosted servers while attempting to erase remnants of older compromises.</span>

<span data-contrast="auto">Attribution to INJ3CTOR3 is supported by several overlapping indicators. Researchers identified the marker string </span><span data-contrast="auto">bm2cjjnRXac1WW3KT7k6MKTR</span><span data-contrast="auto">, previously documented by Fortinet during analysis of the encystPHP campaign in January 2026.</span>

[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/05/06-1024x278.png" alt="Disable Endpoint Module (EncystPHP)" width="1024" height="278" /> Source: Cyble[/caption]

<span data-contrast="auto">Additional overlaps involving command-and-control infrastructure, file paths, credential implantation patterns, and binary names matched prior reporting from Palo Alto Networks Unit 42, Check Point Research, and SANS <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="Internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28392">Internet</a> Storm Center.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Stage 1 Establishes Initial Control and Persistence</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The infection chain unfolds in multiple stages. Stage 1 begins with a large Bash dropper that removes competing implants, creates unauthorized accounts, deploys persistence mechanisms, and wipes evidence from system logs.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The malware modifies </span><span data-contrast="auto">.bash_profile</span><span data-contrast="auto">, </span><span data-contrast="auto">.bashrc</span><span data-contrast="auto">, and </span><span data-contrast="auto">/etc/rc.local</span><span data-contrast="auto"> to ensure execution during reboots and root logins. It also installs recurring cron jobs that continuously retrieve additional payloads from the command-and-control infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Researchers said the malware additionally creates immutable crontab backups and deploys watchdog processes capable of restoring deleted components automatically.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Stage 2 Deploys JOMANGY Across Legitimate FreePBX Directories</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Stage 2 is delivered through </span><span data-contrast="auto">k.php</span><span data-contrast="auto">, which introduces the JOMANGY webshell family into compromised FreePBX systems.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The <a href="https://thecyberexpress.com/malicious-actors-macropack-red-team-payloads/" target="_blank" rel="noopener">payload</a> first re-executes portions of Stage 1 to reinforce persistence before writing obfuscated PHP backdoors into legitimate FreePBX web directories. One major target is </span><span data-contrast="auto">/var/www/html/admin/views/ajax.php</span><span data-contrast="auto">, a legitimate administrative file frequently accessed in FreePBX environments.</span>

<span data-contrast="auto">Additional JOMANGY copies are deployed into locations such as </span><span data-contrast="auto">rest_phones/ajax.php</span><span data-contrast="auto">, </span><span data-contrast="auto">admin/modules/h/</span><span data-contrast="auto">, and several PBX management directories. The attackers also implement </span><span data-contrast="auto">.htaccess</span><span data-contrast="auto"> rewrite rules that redirect arbitrary requests toward hidden webshell copies, improving accessibility and survivability.</span>

<span data-contrast="auto">Researchers observed that </span><span data-contrast="auto">k.php</span><span data-contrast="auto"> actively reinstalls malicious MySQL backdoor accounts whenever the payload executes, ensuring administrative access is recreated even if defenders remove <a href="https://thecyberexpress.com/chatgpt-hacked-compromised-accounts-dark-web/" target="_blank" rel="noopener">compromised accounts</a>.</span>
<h3 aria-level="2"><b><span data-contrast="none">Possible Exploitation Paths Remain Under Investigation</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Researchers could not conclusively identify the initial exploitation vector because relevant web logs and <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28389">exploit</a> payloads were unavailable during analysis. However, two <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28384">vulnerabilities</a> emerged as likely candidates.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The first is CVE-2025-64328, a post-authentication command injection flaw affecting the FreePBX filestore module. The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28386">vulnerability</a> had previously been exploited during earlier INJ3CTOR3 operations.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The second is CVE-2025-57819, a pre-authentication <a href="https://thecyberexpress.com/sql-injection-in-fortra-filecatalyst-workflow/" target="_blank" rel="noopener">SQL injection vulnerability</a> in the FreePBX Endpoint module capable of inserting malicious cron jobs into the scheduler.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">CRIL researchers believe CVE-2025-57819 may be particularly relevant because the campaign’s persistence architecture closely mirrors the scheduling abuse associated with the flaw. Earlier malware variants reportedly disabled the Endpoint module after exploitation, while the latest campaign leaves it active.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">ZenharR Malware Toolkit Expands the Infection</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Stage 3 of the campaign is delivered through </span><span data-contrast="auto">wr.php</span><span data-contrast="auto">, a Bash-based dropper associated with the ZenharR malware toolkit.</span>

<span data-contrast="auto">Like earlier stages, the payload reruns portions of the infection chain before deploying additional malware components. ZenharR webshells are written into key FreePBX directories, including </span><span data-contrast="auto">/var/www/html/digium_phones/ajax.php</span><span data-contrast="auto"> and </span><span data-contrast="auto">/var/www/html/admin/views/some.php</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, researchers noted that the propagation logic also replicated the already-installed JOMANGY webshell into 15 additional locations across the <a href="https://thecyberexpress.com/cve-2025-65606-totolink-ex200-firmware/" target="_blank" rel="noopener">web root</a>. As a result, both JOMANGY and the ZenharR malware toolkit operate side by side on infected systems.</span>

<span data-contrast="auto">Another payload named </span><span data-contrast="auto">wor.php</span><span data-contrast="auto"> was also discovered on the command-and-control server, although researchers could not identify an active trigger mechanism during analysis.</span>
<h3 aria-level="2"><b><span data-contrast="none">license.php Functions as a Privileged Persistence Mechanism</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The </span><span data-contrast="auto">license.php</span><span data-contrast="auto"> component acts as a highly privileged PHP command executor embedded within the FreePBX HA infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Unlike browser-accessible JOMANGY and ZenharR webshells, </span><span data-contrast="auto">license.php</span><span data-contrast="auto"> contains no authentication controls and relies on remotely supplied format-string placeholders before activation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Once triggered, the component enables arbitrary command execution with elevated privileges. <a href="https://cyble.com/blog/jomangy-inj3ctor3s-self-healing-freepbx-toll-fraud-campaign/" target="_blank" rel="nofollow noopener">Researchers observed</a> that it could delete competing accounts, reset passwords for service users and even the root account, promote accounts to UID-0 privileges, modify SSH settings to preserve root access, and install dual-track cron persistence for both </span><span data-contrast="auto">k.php</span><span data-contrast="auto"> and </span><span data-contrast="auto">wr.php</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The malware also repeatedly scrubbed Apache logs and communicated with </span><span data-contrast="auto">root.php</span><span data-contrast="auto"> on the command-and-control infrastructure.</span>
<h3 aria-level="2"><b><span data-contrast="none">Obfuscation and Evasion Techniques Reduce Detection Rates</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The campaign’s evasion methods were carefully optimized rather than excessively complex. In Stage 1, Base64 encoding was selectively applied only to highly suspicious commands, including </span><span data-contrast="auto">useradd</span><span data-contrast="auto"> instructions responsible for creating UID-0 accounts.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

[caption id="" align="alignnone" width="919"]<img src="https://cyble.com/wp-content/uploads/2026/05/16.png" alt="JOMANGY base64 decoded rot13 output" width="919" height="989" /> Source: Cyble[/caption]

<span data-contrast="auto">Cron payloads were hidden inside encoded variables, causing malicious crontab entries to appear relatively benign during casual inspection.</span>

<span data-contrast="auto">JOMANGY’s double-obfuscation design represents a notable evolution over earlier malware associated with INJ3CTOR3. Many automated analysis tools decode only the outer Base64 layer, leaving unreadable ROT13 output rather than functional PHP code.</span>

[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/05/17-1024x496.png" alt="STAGE 1 dropper detections" width="1024" height="496" /> Source: Cyble[/caption]

<span data-contrast="auto">Combined with dead-code anti-analysis logic, these techniques contributed to extremely low antivirus detection rates. Researchers reported that both </span><span data-contrast="auto">k.php</span><span data-contrast="auto"> and </span><span data-contrast="auto">wr.php</span><span data-contrast="auto"> showed zero detections on VirusTotal during analysis, while the Stage 1 dropper was detected by only four out of 76 <a href="https://thecyberexpress.com/miningdropper-android-malware/" target="_blank" rel="noopener">antivirus engines</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">VoIP Toll Fraud Continues to Grow Globally</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The broader implications of the campaign are substantial. Industry estimates place global telecom fraud losses at more than $41 billion annually, with VoIP toll fraud representing a major segment of the underground economy.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Unlike <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28391">ransomware</a> campaigns that generate immediate visibility, toll fraud operations provide cybercriminals with a quieter and more sustainable revenue stream by routing calls through premium-rate numbers or third-party fraud networks.</span>

<span data-contrast="auto">FreePBX systems remain particularly attractive targets because many organizations expose management interfaces directly to the internet while running outdated or poorly secured deployments.</span>

<span data-contrast="auto">According to data from the Shadowserver Foundation collected in early 2026, more than 900 FreePBX systems were actively compromised by related campaigns, while over 700 remained infected months after public disclosure and remediation guidance.</span>

<span data-contrast="auto">Researchers concluded that INJ3CTOR3 continues to evolve its tooling, infrastructure, and persistence techniques. The introduction of JOMANGY alongside the ZenharR malware toolkit demonstrates a highly mature threat operation specifically engineered for resilience, monetization, and long-term control over vulnerable FreePBX systems.</span>]]></description>
										<content:encoded><![CDATA[<p><img width="1284" height="629" src="https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="INJ3CTOR3" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3.webp 1284w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-300x147.webp 300w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1024x502.webp 1024w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-768x376.webp 768w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-600x294.webp 600w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-150x73.webp 150w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-750x367.webp 750w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1140x558.webp 1140w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3.webp 1284w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-300x147.webp 300w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1024x502.webp 1024w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-768x376.webp 768w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-600x294.webp 600w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-150x73.webp 150w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-750x367.webp 750w, https://thecyberexpress.com/wp-content/uploads/INJ3CTOR3-1140x558.webp 1140w" sizes="(max-width: 1284px) 100vw, 1284px" title="INJ3CTOR3 Deploys JOMANGY Webshell in Advanced FreePBX Attacks 21"></p><span data-contrast="auto">Researchers at Cyble Research &amp; Intelligence Labs (CRIL) have uncovered an advanced cyber campaign targeting FreePBX systems and, with high confidence, linked the activity to the threat actor INJ3CTOR3. The operation introduces a previously undocumented PHP webshell family named JOMANGY and deploys the ZenharR malware toolkit, which has previously been associated with the same actor.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Unlike conventional malware campaigns centered on ransomware or <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28385">data</a> theft, this operation is designed to hijack telephony infrastructure and abuse victims’ SIP trunks to generate fraudulent outbound calls billed directly to affected organizations. Researchers said the campaign demonstrates an unusually persistent architecture capable of surviving cleanup attempts and restoring infections within minutes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">INJ3CTOR3 Builds a Self-Healing Persistence Framework</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">At the center of the operation is a multi-stage Bash-based infection chain that installs six separate persistence mechanisms across compromised FreePBX systems. These mechanisms continuously reinforce one another, creating what researchers described as a “self-healing” <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-malware/"   title="malware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28390">malware</a> ecosystem.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The persistence channels include cron-based command-and-control polling every one to three minutes, shell profile injections triggered during reboots and root logins, immutable crontab backups protected with </span><span data-contrast="auto">chattr +i</span><span data-contrast="auto">, watchdog processes that automatically relaunch <a href="https://thecyberexpress.com/north-korean-hackers-deploy-drone-malware/" target="_blank" rel="noopener">malware components</a>, multiple immutable copies of JOMANGY webshells scattered across the server, and a self-reinstalling PHP executor embedded into the environment.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/05/02-1024x238.png" alt="JOMANGY Webshell Operator Panel" width="1024" height="238" /> Image source: Cyble[/caption]

<span data-contrast="auto">Researchers noted that partial remediation efforts are ineffective because any surviving component can rapidly rebuild the full compromise. Even if administrators remove several malicious files or cron jobs, remaining persistence layers can silently restore the infection.</span>
<h3 aria-level="2"><b><span data-contrast="none">Attackers Create 18 Backdoor Accounts Across FreePBX Systems</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The campaign also establishes extensive unauthorized access using 18 separate <a href="https://thecyberexpress.com/attackers-deploy-backdoors-in-ivanti-epmm/" target="_blank" rel="noopener">backdoor accounts</a> spread across multiple privilege levels. Nine of these accounts possess UID-0 privileges, effectively granting root-level access to the attackers.</span>

<span data-contrast="auto">Another eight accounts imitate legitimate service accounts commonly found in FreePBX systems, while one additional account is inserted directly into the FreePBX MySQL database to provide administrative web-panel access. To avoid suspicion, the attackers used names such as “asterisk,” “freepbxuser,” “spamfilter,” and “sangoma,” allowing the malicious accounts to blend into ordinary PBX administrative environments.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Researchers believe this approach significantly reduces the chances of casual detection during routine inspections.</span>
<h3 aria-level="2"><b><span data-contrast="none">JOMANGY Introduces a New PHP Webshell Family</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">CRIL researchers identified JOMANGY as a previously undocumented malware family, making this investigation the first publicly known analysis of the toolset. Every recovered sample used a double-obfuscation technique involving Base64 encoding layered over ROT13 transformations.</span>

<span data-contrast="auto">All identified payloads also contained the watermark string </span><span data-contrast="auto">trace_e1ebf9066a951be519a24140711839ea</span><span data-contrast="auto">, linking the malware samples to a common development source.</span>

<span data-contrast="auto">Beyond persistence and remote command execution, JOMANGY contains active toll <a class="wpil_keyword_link" href="https://cyble.com/cybercrime/fraud/" target="_blank"  rel="noopener" title="fraud" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28387">fraud</a> functionality capable of initiating outbound calls through compromised PBX infrastructure. Researchers observed commands such as:</span>

<span data-contrast="auto">asterisk -rx "channel originate Local/&lt;num&gt;@&lt;context&gt;"</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">This capability allows attackers to abuse victims’ telephony infrastructure directly for <a href="https://thecyberexpress.com/surge-mekotio-banking-trojan-latin-america/" target="_blank" rel="noopener">financial gain</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Large-Scale Reconnaissance Suggests Mass Exploitation</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Researchers also discovered a command-and-control-hosted inventory file named </span><span data-contrast="auto">people2.txt</span><span data-contrast="auto"> containing 3,080 <a href="https://thecyberexpress.com/russia-weaponizes-ukrainian-ip-addresses/" target="_blank" rel="noopener">IP addresses</a> believed to represent automated reconnaissance results.</span>

<span data-contrast="auto">Approximately 39 percent of the listed systems were hosted on Alibaba Cloud infrastructure located in China, Hong Kong, and Singapore, suggesting a geographically broad scanning operation. The findings indicate that INJ3CTOR3 is pursuing mass exploitation rather than highly selective targeting.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Additional evidence recovered from stolen Elastix databases and references to Issabel and Sangoma environments suggests the campaign targets a wide range of PBX deployments across Latin America, Southeast Asia, and the Middle East.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Infrastructure Overlaps Tie the Campaign to INJ3CTOR3</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The malware infrastructure demonstrated strong operational continuity with earlier INJ3CTOR3 campaigns. The Stage 1 dropper aggressively removed competing malware families and defensive tooling before deploying its own payloads.</span>

<span data-contrast="auto">Researchers found that more than 50 webshell signatures were deleted from infected systems, while <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-firewall/" target="_blank"  rel="noopener" title="firewall" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28388">firewall</a> rules blocked 11 rival command-and-control IP addresses.</span>

<span data-contrast="auto">Interestingly, the malware also removed artifacts associated with the actor’s own January 2026 campaign. Researchers believe this indicates that the operators migrated infrastructure from Brazilian-hosted systems to Dutch-hosted servers while attempting to erase remnants of older compromises.</span>

<span data-contrast="auto">Attribution to INJ3CTOR3 is supported by several overlapping indicators. Researchers identified the marker string </span><span data-contrast="auto">bm2cjjnRXac1WW3KT7k6MKTR</span><span data-contrast="auto">, previously documented by Fortinet during analysis of the encystPHP campaign in January 2026.</span>

[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/05/06-1024x278.png" alt="Disable Endpoint Module (EncystPHP)" width="1024" height="278" /> Source: Cyble[/caption]

<span data-contrast="auto">Additional overlaps involving command-and-control infrastructure, file paths, credential implantation patterns, and binary names matched prior reporting from Palo Alto Networks Unit 42, Check Point Research, and SANS <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-internet/"   title="Internet" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28392">Internet</a> Storm Center.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Stage 1 Establishes Initial Control and Persistence</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The infection chain unfolds in multiple stages. Stage 1 begins with a large Bash dropper that removes competing implants, creates unauthorized accounts, deploys persistence mechanisms, and wipes evidence from system logs.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The malware modifies </span><span data-contrast="auto">.bash_profile</span><span data-contrast="auto">, </span><span data-contrast="auto">.bashrc</span><span data-contrast="auto">, and </span><span data-contrast="auto">/etc/rc.local</span><span data-contrast="auto"> to ensure execution during reboots and root logins. It also installs recurring cron jobs that continuously retrieve additional payloads from the command-and-control infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Researchers said the malware additionally creates immutable crontab backups and deploys watchdog processes capable of restoring deleted components automatically.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Stage 2 Deploys JOMANGY Across Legitimate FreePBX Directories</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Stage 2 is delivered through </span><span data-contrast="auto">k.php</span><span data-contrast="auto">, which introduces the JOMANGY webshell family into compromised FreePBX systems.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The <a href="https://thecyberexpress.com/malicious-actors-macropack-red-team-payloads/" target="_blank" rel="noopener">payload</a> first re-executes portions of Stage 1 to reinforce persistence before writing obfuscated PHP backdoors into legitimate FreePBX web directories. One major target is </span><span data-contrast="auto">/var/www/html/admin/views/ajax.php</span><span data-contrast="auto">, a legitimate administrative file frequently accessed in FreePBX environments.</span>

<span data-contrast="auto">Additional JOMANGY copies are deployed into locations such as </span><span data-contrast="auto">rest_phones/ajax.php</span><span data-contrast="auto">, </span><span data-contrast="auto">admin/modules/h/</span><span data-contrast="auto">, and several PBX management directories. The attackers also implement </span><span data-contrast="auto">.htaccess</span><span data-contrast="auto"> rewrite rules that redirect arbitrary requests toward hidden webshell copies, improving accessibility and survivability.</span>

<span data-contrast="auto">Researchers observed that </span><span data-contrast="auto">k.php</span><span data-contrast="auto"> actively reinstalls malicious MySQL backdoor accounts whenever the payload executes, ensuring administrative access is recreated even if defenders remove <a href="https://thecyberexpress.com/chatgpt-hacked-compromised-accounts-dark-web/" target="_blank" rel="noopener">compromised accounts</a>.</span>
<h3 aria-level="2"><b><span data-contrast="none">Possible Exploitation Paths Remain Under Investigation</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Researchers could not conclusively identify the initial exploitation vector because relevant web logs and <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28389">exploit</a> payloads were unavailable during analysis. However, two <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28384">vulnerabilities</a> emerged as likely candidates.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The first is CVE-2025-64328, a post-authentication command injection flaw affecting the FreePBX filestore module. The <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28386">vulnerability</a> had previously been exploited during earlier INJ3CTOR3 operations.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The second is CVE-2025-57819, a pre-authentication <a href="https://thecyberexpress.com/sql-injection-in-fortra-filecatalyst-workflow/" target="_blank" rel="noopener">SQL injection vulnerability</a> in the FreePBX Endpoint module capable of inserting malicious cron jobs into the scheduler.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">CRIL researchers believe CVE-2025-57819 may be particularly relevant because the campaign’s persistence architecture closely mirrors the scheduling abuse associated with the flaw. Earlier malware variants reportedly disabled the Endpoint module after exploitation, while the latest campaign leaves it active.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">ZenharR Malware Toolkit Expands the Infection</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Stage 3 of the campaign is delivered through </span><span data-contrast="auto">wr.php</span><span data-contrast="auto">, a Bash-based dropper associated with the ZenharR malware toolkit.</span>

<span data-contrast="auto">Like earlier stages, the payload reruns portions of the infection chain before deploying additional malware components. ZenharR webshells are written into key FreePBX directories, including </span><span data-contrast="auto">/var/www/html/digium_phones/ajax.php</span><span data-contrast="auto"> and </span><span data-contrast="auto">/var/www/html/admin/views/some.php</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">However, researchers noted that the propagation logic also replicated the already-installed JOMANGY webshell into 15 additional locations across the <a href="https://thecyberexpress.com/cve-2025-65606-totolink-ex200-firmware/" target="_blank" rel="noopener">web root</a>. As a result, both JOMANGY and the ZenharR malware toolkit operate side by side on infected systems.</span>

<span data-contrast="auto">Another payload named </span><span data-contrast="auto">wor.php</span><span data-contrast="auto"> was also discovered on the command-and-control server, although researchers could not identify an active trigger mechanism during analysis.</span>
<h3 aria-level="2"><b><span data-contrast="none">license.php Functions as a Privileged Persistence Mechanism</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The </span><span data-contrast="auto">license.php</span><span data-contrast="auto"> component acts as a highly privileged PHP command executor embedded within the FreePBX HA infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Unlike browser-accessible JOMANGY and ZenharR webshells, </span><span data-contrast="auto">license.php</span><span data-contrast="auto"> contains no authentication controls and relies on remotely supplied format-string placeholders before activation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Once triggered, the component enables arbitrary command execution with elevated privileges. <a href="https://cyble.com/blog/jomangy-inj3ctor3s-self-healing-freepbx-toll-fraud-campaign/" target="_blank" rel="nofollow noopener">Researchers observed</a> that it could delete competing accounts, reset passwords for service users and even the root account, promote accounts to UID-0 privileges, modify SSH settings to preserve root access, and install dual-track cron persistence for both </span><span data-contrast="auto">k.php</span><span data-contrast="auto"> and </span><span data-contrast="auto">wr.php</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The malware also repeatedly scrubbed Apache logs and communicated with </span><span data-contrast="auto">root.php</span><span data-contrast="auto"> on the command-and-control infrastructure.</span>
<h3 aria-level="2"><b><span data-contrast="none">Obfuscation and Evasion Techniques Reduce Detection Rates</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The campaign’s evasion methods were carefully optimized rather than excessively complex. In Stage 1, Base64 encoding was selectively applied only to highly suspicious commands, including </span><span data-contrast="auto">useradd</span><span data-contrast="auto"> instructions responsible for creating UID-0 accounts.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

[caption id="" align="alignnone" width="919"]<img src="https://cyble.com/wp-content/uploads/2026/05/16.png" alt="JOMANGY base64 decoded rot13 output" width="919" height="989" /> Source: Cyble[/caption]

<span data-contrast="auto">Cron payloads were hidden inside encoded variables, causing malicious crontab entries to appear relatively benign during casual inspection.</span>

<span data-contrast="auto">JOMANGY’s double-obfuscation design represents a notable evolution over earlier malware associated with INJ3CTOR3. Many automated analysis tools decode only the outer Base64 layer, leaving unreadable ROT13 output rather than functional PHP code.</span>

[caption id="" align="alignnone" width="1024"]<img src="https://cyble.com/wp-content/uploads/2026/05/17-1024x496.png" alt="STAGE 1 dropper detections" width="1024" height="496" /> Source: Cyble[/caption]

<span data-contrast="auto">Combined with dead-code anti-analysis logic, these techniques contributed to extremely low antivirus detection rates. Researchers reported that both </span><span data-contrast="auto">k.php</span><span data-contrast="auto"> and </span><span data-contrast="auto">wr.php</span><span data-contrast="auto"> showed zero detections on VirusTotal during analysis, while the Stage 1 dropper was detected by only four out of 76 <a href="https://thecyberexpress.com/miningdropper-android-malware/" target="_blank" rel="noopener">antivirus engines</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">VoIP Toll Fraud Continues to Grow Globally</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The broader implications of the campaign are substantial. Industry estimates place global telecom fraud losses at more than $41 billion annually, with VoIP toll fraud representing a major segment of the underground economy.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Unlike <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-ransomware-how-it-work/"   title="ransomware" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28391">ransomware</a> campaigns that generate immediate visibility, toll fraud operations provide cybercriminals with a quieter and more sustainable revenue stream by routing calls through premium-rate numbers or third-party fraud networks.</span>

<span data-contrast="auto">FreePBX systems remain particularly attractive targets because many organizations expose management interfaces directly to the internet while running outdated or poorly secured deployments.</span>

<span data-contrast="auto">According to data from the Shadowserver Foundation collected in early 2026, more than 900 FreePBX systems were actively compromised by related campaigns, while over 700 remained infected months after public disclosure and remediation guidance.</span>

<span data-contrast="auto">Researchers concluded that INJ3CTOR3 continues to evolve its tooling, infrastructure, and persistence techniques. The introduction of JOMANGY alongside the ZenharR malware toolkit demonstrates a highly mature threat operation specifically engineered for resilience, monetization, and long-term control over vulnerable FreePBX systems.</span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112238</post-id>	</item>
		<item>
		<title>UK Cybersecurity Innovation SilentGlass Goes Global After Licensing Deal</title>
		<link>https://thecyberexpress.com/cyber-security-device-silentglass-goes-global/</link>
		
		<dc:creator><![CDATA[Samiksha Jain]]></dc:creator>
		<pubDate>Fri, 22 May 2026 06:21:07 +0000</pubDate>
				<category><![CDATA[Cyber Essentials]]></category>
		<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[cyber security device]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[plug-and-play hardware device]]></category>
		<category><![CDATA[SilentGlass]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<category><![CDATA[UK Government]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112232</guid>

					<description><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/cyber-security-device.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="cyber security device" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/cyber-security-device.webp 1376w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device.webp 1376w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="UK Cybersecurity Innovation SilentGlass Goes Global After Licensing Deal 22"></p>The UK government has officially licensed SilentGlass, a government-developed cyber security device, for global commercial use, marking a major step in expanding public sector cybersecurity innovation into international markets.

Developed by the <a href="https://thecyberexpress.com/agentic-ai-expands-enterprise-attack-surface/" target="_blank" rel="noopener">National Cyber Security Centre</a>, a part of Government Communications Headquarters, SilentGlass was originally designed to protect sensitive government systems from <a href="https://thecyberexpress.com/?s=cyber+threats" target="_blank" rel="noopener">cyber threats</a> linked to smart display connections. The technology is now being commercialized with support from the Government Office for Technology Transfer through a global intellectual property licensing agreement with a UK-based company.

The launch highlights growing concerns around hardware-based cyber <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28379">risks</a> in modern workplaces, especially as organizations increasingly adopt hybrid work environments, shared office spaces, and connected devices.
<h2>SilentGlass Designed to Block Video Connection Cyber Threats</h2>
According to the <a href="https://www.gov.uk/government/case-studies/hm-government-licensing-cyber-security-tech-for-a-global-market" target="_blank" rel="nofollow noopener">NCSC</a>, the cyber security device was created to address risks associated with modern smart monitors and digital video connections.

<a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28382">Security</a> experts have warned that video connections between laptops and monitors can potentially be exploited by attackers to compromise connected systems. The threat becomes more serious in environments where devices with different security levels are connected to shared displays.

SilentGlass works as a small plug-and-play hardware device positioned between a laptop and monitor. Its primary role is to prevent the physical video connection from being used as a pathway for cyberattacks.

By blocking that attack route, the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cyber security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28383">cyber security</a> device helps organizations reduce exposure to hardware-level threats while enabling safer flexible working arrangements, including hot desking and remote work setups.

The NCSC stated that the technology was initially developed for internal government operations before demonstrating broader commercial potential across multiple sectors.
<h2>UK Government Expands Cyber Security Innovation to Global Market</h2>
Following a competitive commercial process, the UK government approved a global intellectual property licensing agreement for SilentGlass with a UK-based company.

The agreement allows the cyber security device to be distributed internationally, expanding access to technology that was originally built for high-security government environments.

Officials said the move reflects a wider effort to commercialize public sector innovation while ensuring strong governance and protection of government-developed intellectual property.

The NCSC noted that SilentGlass could support:
<ul>
 	<li>Government departments</li>
 	<li>Public sector organizations</li>
 	<li>Critical national infrastructure operators</li>
 	<li>Businesses with advanced <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28380">cybersecurity</a> requirements</li>
 	<li>Employers supporting hybrid work environments</li>
</ul>
The technology is expected to benefit sectors where device trust, <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-network-security/"   title="network security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28381">network security</a>, and hardware protection are considered critical operational requirements.
<h2>GOTT Supported Commercialization of SilentGlass</h2>
The Government Office for Technology Transfer played a key role in helping the NCSC bring the cyber security device to market.

According to officials, GOTT supported the project by advising on intellectual property licensing strategies, funding commercialization initiatives, and connecting the NCSC with technology transfer and investment experts.

The organization also provided mentoring support for knowledge asset management and helped guide the licensing process through market engagement and competitive partner selection.

The UK government has increasingly focused on turning public sector-developed technologies into commercially viable products that can deliver broader economic and security benefits.
<h2>Growing Focus on Hardware-Level Cybersecurity</h2>
The release of SilentGlass comes as cybersecurity experts continue raising concerns about hardware-level attack vectors that are often overlooked in traditional cybersecurity strategies.

Modern monitors, docking stations, USB-connected devices, and display interfaces are increasingly viewed as potential entry points for attackers targeting enterprise and government systems.

As hybrid work models expand globally, organizations are under pressure to secure not only software environments but also physical device connections used in day-to-day operations.

The NCSC said SilentGlass was specifically designed to address these emerging risks without requiring complex deployment or major infrastructure changes.
<h2>NCSC Highlights Future Commercialization Plans</h2>
Ollie Whitehouse, Chief Technology Officer at the NCSC, described the commercialization of SilentGlass as an example of how government-developed innovation can support both national cybersecurity and economic growth.

According to Whitehouse, the partnership demonstrates how UK government departments can derive greater value from intellectual property while making advanced security technologies more widely available.

The NCSC also indicated that additional government-developed cybersecurity technologies could be commercialized in the future following the success of the SilentGlass initiative.]]></description>
										<content:encoded><![CDATA[<p><img width="1376" height="768" src="https://thecyberexpress.com/wp-content/uploads/cyber-security-device.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="cyber security device" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/cyber-security-device.webp 1376w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1140x636.webp 1140w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device.webp 1376w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-300x167.webp 300w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1024x572.webp 1024w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-768x429.webp 768w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-600x335.webp 600w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-150x84.webp 150w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-750x419.webp 750w, https://thecyberexpress.com/wp-content/uploads/cyber-security-device-1140x636.webp 1140w" sizes="(max-width: 1376px) 100vw, 1376px" title="UK Cybersecurity Innovation SilentGlass Goes Global After Licensing Deal 23"></p>The UK government has officially licensed SilentGlass, a government-developed cyber security device, for global commercial use, marking a major step in expanding public sector cybersecurity innovation into international markets.

Developed by the <a href="https://thecyberexpress.com/agentic-ai-expands-enterprise-attack-surface/" target="_blank" rel="noopener">National Cyber Security Centre</a>, a part of Government Communications Headquarters, SilentGlass was originally designed to protect sensitive government systems from <a href="https://thecyberexpress.com/?s=cyber+threats" target="_blank" rel="noopener">cyber threats</a> linked to smart display connections. The technology is now being commercialized with support from the Government Office for Technology Transfer through a global intellectual property licensing agreement with a UK-based company.

The launch highlights growing concerns around hardware-based cyber <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risks" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28379">risks</a> in modern workplaces, especially as organizations increasingly adopt hybrid work environments, shared office spaces, and connected devices.
<h2>SilentGlass Designed to Block Video Connection Cyber Threats</h2>
According to the <a href="https://www.gov.uk/government/case-studies/hm-government-licensing-cyber-security-tech-for-a-global-market" target="_blank" rel="nofollow noopener">NCSC</a>, the cyber security device was created to address risks associated with modern smart monitors and digital video connections.

<a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28382">Security</a> experts have warned that video connections between laptops and monitors can potentially be exploited by attackers to compromise connected systems. The threat becomes more serious in environments where devices with different security levels are connected to shared displays.

SilentGlass works as a small plug-and-play hardware device positioned between a laptop and monitor. Its primary role is to prevent the physical video connection from being used as a pathway for cyberattacks.

By blocking that attack route, the <a class="wpil_keyword_link" href="https://cyble.com/knowledge-hub/what-is-cybersecurity/" target="_blank"  rel="noopener" title="cyber security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28383">cyber security</a> device helps organizations reduce exposure to hardware-level threats while enabling safer flexible working arrangements, including hot desking and remote work setups.

The NCSC stated that the technology was initially developed for internal government operations before demonstrating broader commercial potential across multiple sectors.
<h2>UK Government Expands Cyber Security Innovation to Global Market</h2>
Following a competitive commercial process, the UK government approved a global intellectual property licensing agreement for SilentGlass with a UK-based company.

The agreement allows the cyber security device to be distributed internationally, expanding access to technology that was originally built for high-security government environments.

Officials said the move reflects a wider effort to commercialize public sector innovation while ensuring strong governance and protection of government-developed intellectual property.

The NCSC noted that SilentGlass could support:
<ul>
 	<li>Government departments</li>
 	<li>Public sector organizations</li>
 	<li>Critical national infrastructure operators</li>
 	<li>Businesses with advanced <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/"   title="cybersecurity" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28380">cybersecurity</a> requirements</li>
 	<li>Employers supporting hybrid work environments</li>
</ul>
The technology is expected to benefit sectors where device trust, <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-network-security/"   title="network security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28381">network security</a>, and hardware protection are considered critical operational requirements.
<h2>GOTT Supported Commercialization of SilentGlass</h2>
The Government Office for Technology Transfer played a key role in helping the NCSC bring the cyber security device to market.

According to officials, GOTT supported the project by advising on intellectual property licensing strategies, funding commercialization initiatives, and connecting the NCSC with technology transfer and investment experts.

The organization also provided mentoring support for knowledge asset management and helped guide the licensing process through market engagement and competitive partner selection.

The UK government has increasingly focused on turning public sector-developed technologies into commercially viable products that can deliver broader economic and security benefits.
<h2>Growing Focus on Hardware-Level Cybersecurity</h2>
The release of SilentGlass comes as cybersecurity experts continue raising concerns about hardware-level attack vectors that are often overlooked in traditional cybersecurity strategies.

Modern monitors, docking stations, USB-connected devices, and display interfaces are increasingly viewed as potential entry points for attackers targeting enterprise and government systems.

As hybrid work models expand globally, organizations are under pressure to secure not only software environments but also physical device connections used in day-to-day operations.

The NCSC said SilentGlass was specifically designed to address these emerging risks without requiring complex deployment or major infrastructure changes.
<h2>NCSC Highlights Future Commercialization Plans</h2>
Ollie Whitehouse, Chief Technology Officer at the NCSC, described the commercialization of SilentGlass as an example of how government-developed innovation can support both national cybersecurity and economic growth.

According to Whitehouse, the partnership demonstrates how UK government departments can derive greater value from intellectual property while making advanced security technologies more widely available.

The NCSC also indicated that additional government-developed cybersecurity technologies could be commercialized in the future following the success of the SilentGlass initiative.]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112232</post-id>	</item>
		<item>
		<title>Hackers Exploit Butter Network Bridge to Mint Massive MAPO Supply</title>
		<link>https://thecyberexpress.com/mapo-token-crash/</link>
		
		<dc:creator><![CDATA[Ashish Khaitan]]></dc:creator>
		<pubDate>Thu, 21 May 2026 09:25:50 +0000</pubDate>
				<category><![CDATA[Firewall Daily]]></category>
		<category><![CDATA[Cyber News]]></category>
		<category><![CDATA[Butter Network]]></category>
		<category><![CDATA[cryptocurrency market]]></category>
		<category><![CDATA[ETH]]></category>
		<category><![CDATA[Map Protocol]]></category>
		<category><![CDATA[MAPO token]]></category>
		<category><![CDATA[The Cyber Express]]></category>
		<category><![CDATA[The Cyber Express News]]></category>
		<guid isPermaLink="false">https://thecyberexpress.com/?p=112221</guid>

					<description><![CDATA[<p><img width="1180" height="640" src="https://thecyberexpress.com/wp-content/uploads/Map-Protocol.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="MAPO token" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Map-Protocol.webp 1180w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-300x163.webp 300w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1024x555.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-768x417.webp 768w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-600x325.webp 600w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-150x81.webp 150w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-750x407.webp 750w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1140x618.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol.webp 1180w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-300x163.webp 300w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1024x555.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-768x417.webp 768w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-600x325.webp 600w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-150x81.webp 150w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-750x407.webp 750w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1140x618.webp 1140w" sizes="(max-width: 1180px) 100vw, 1180px" title="Hackers Exploit Butter Network Bridge to Mint Massive MAPO Supply 24"></p><span data-contrast="auto">The cryptocurrency market witnessed another major security breach this week after the MAPO token collapsed by 96% following an exploit tied to the Butter Network cross-chain bridge. The incident resulted in the unauthorized minting of a quadrillion MAPO tokens, flooding the market with a supply vastly larger than the legitimate circulating amount and causing severe disruption across decentralized finance ecosystems connected to ETH and other blockchains.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">According to <a href="https://cointelegraph.com/news/map-protocol-loses-96-of-its-value-after-quadrillion-token-mint-exploit?utm_campaign=rss_partner_inbound&amp;utm_medium=rss&amp;utm_source=rss_feed" target="_blank" rel="nofollow noopener">blockchain security researchers</a>, the exploit enabled the attacker to generate tens of thousands of times more MAPO tokens than the official supply. As panic selling intensified, the price of the Map Protocol token dropped from nearly $0.003 to around $0.0001 within hours, based on market tracking data from <a href="https://www.coingecko.com/en/coins/map-protocol" target="_blank" rel="nofollow noopener">CoinGecko</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Attacker Drains ETH From Liquidity Pools</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The attack primarily targeted the Butter Network bridge infrastructure, a cross-chain protocol associated with Map Protocol. <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28374">Security</a> platform Blockaid reported that the exploiter used a newly created externally-owned account (EOA) to offload approximately one billion MAPO tokens into decentralized exchanges.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">During the process, the attacker reportedly drained nearly 52 ETH from Uniswap liquidity pools, an amount valued at roughly $180,000 at the time of the incident. Despite the liquidation of a portion of tokens, <a href="https://thecyberexpress.com/blockchain-technology-help-safeguard-data/" target="_blank" rel="noopener">blockchain</a> analysts noted that the attacker still retained close to a trillion MAPO tokens.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Those remaining holdings continue to create risks for additional liquidity pools and potential exchange listings linked to the Map Protocol token ecosystem. The sudden flood of tokens severely impacted market confidence and highlighted ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28375">vulnerabilities</a> within cross-chain bridge infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">MAPO Exploit Adds to Growing List of DeFi Attacks</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28376">exploit</a> comes during an already damaging month for decentralized finance projects. Reports indicate that at least 18 DeFi and <a href="https://thecyberexpress.com/siblings-siphon-25m-from-ethereum-blockchain/" target="_blank" rel="noopener">blockchain protocols</a> have been compromised in recent weeks.</span>

<span data-contrast="auto">Among the affected projects are THORChain, Verus Protocol, Transit Finance, TrustedVolumes, Ekubo, Echo Protocol, and RetoSwap.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The repeated attacks have intensified concerns surrounding interoperability protocols, especially those handling assets across ETH, Bitcoin, and other blockchain ecosystems. Cross-chain bridges remain frequent targets because of the complexity involved in validating transactions between multiple networks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Map Protocol Pauses Mainnet Operations</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">In response to the breach, Map Protocol confirmed that the <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28378">vulnerability</a> originated in the Solidity contract layer. The project announced that it had paused its mainnet and initiated a migration process while the investigation continues.</span>

<span data-contrast="auto">Butter Network also suspended ButterSwap operations, although the team stated that user funds were not directly at <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28373">risk</a>.</span>

<span data-contrast="auto">In its latest statement, the Map Protocol team said it would announce a new contract address and later conduct an asset snapshot. The project added that “any remaining tokens held by attacker-controlled addresses will be fully invalidated and will not be included in any future snapshot or conversion process.”</span>

<span data-contrast="auto">Blockchain <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28377">data</a> further revealed that approximately one billion MAPO tokens were transferred to Uniswap shortly after the quadrillion-token mint occurred.</span>
<h3 aria-level="2"><b><span data-contrast="none">How the MAPO Mint Exploit Happened</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Security researchers later outlined how the attack unfolded. According to Blockaid, the attacker initially submitted a legitimate oracle multisig-signed message before deploying a malicious smart contract at a carefully chosen address.</span>

<span data-contrast="auto">The exploiter then resent a modified “retry” message that appeared identical in transaction hash but had actually been manipulated. Because the cross-chain bridge incorrectly verified the altered message as authentic, the system approved the minting of the massive MAPO supply.</span>

<span data-contrast="auto">Researchers stressed that no private keys were stolen and no light clients were compromised during the attack. Instead, the incident was described as a “classic Solidity vulnerability involving multiple dynamic fields.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The exploit once again demonstrated how weaknesses in smart contract validation can place both MAPO and ETH liquidity ecosystems at risk.</span>]]></description>
										<content:encoded><![CDATA[<p><img width="1180" height="640" src="https://thecyberexpress.com/wp-content/uploads/Map-Protocol.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="MAPO token" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/Map-Protocol.webp 1180w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-300x163.webp 300w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1024x555.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-768x417.webp 768w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-600x325.webp 600w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-150x81.webp 150w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-750x407.webp 750w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1140x618.webp 1140w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol.webp 1180w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-300x163.webp 300w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1024x555.webp 1024w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-768x417.webp 768w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-600x325.webp 600w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-150x81.webp 150w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-750x407.webp 750w, https://thecyberexpress.com/wp-content/uploads/Map-Protocol-1140x618.webp 1140w" sizes="(max-width: 1180px) 100vw, 1180px" title="Hackers Exploit Butter Network Bridge to Mint Massive MAPO Supply 25"></p><span data-contrast="auto">The cryptocurrency market witnessed another major security breach this week after the MAPO token collapsed by 96% following an exploit tied to the Butter Network cross-chain bridge. The incident resulted in the unauthorized minting of a quadrillion MAPO tokens, flooding the market with a supply vastly larger than the legitimate circulating amount and causing severe disruption across decentralized finance ecosystems connected to ETH and other blockchains.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">According to <a href="https://cointelegraph.com/news/map-protocol-loses-96-of-its-value-after-quadrillion-token-mint-exploit?utm_campaign=rss_partner_inbound&amp;utm_medium=rss&amp;utm_source=rss_feed" target="_blank" rel="nofollow noopener">blockchain security researchers</a>, the exploit enabled the attacker to generate tens of thousands of times more MAPO tokens than the official supply. As panic selling intensified, the price of the Map Protocol token dropped from nearly $0.003 to around $0.0001 within hours, based on market tracking data from <a href="https://www.coingecko.com/en/coins/map-protocol" target="_blank" rel="nofollow noopener">CoinGecko</a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Attacker Drains ETH From Liquidity Pools</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The attack primarily targeted the Butter Network bridge infrastructure, a cross-chain protocol associated with Map Protocol. <a class="wpil_keyword_link" href="https://thecyberexpress.com/"   title="Security" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28374">Security</a> platform Blockaid reported that the exploiter used a newly created externally-owned account (EOA) to offload approximately one billion MAPO tokens into decentralized exchanges.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">During the process, the attacker reportedly drained nearly 52 ETH from Uniswap liquidity pools, an amount valued at roughly $180,000 at the time of the incident. Despite the liquidation of a portion of tokens, <a href="https://thecyberexpress.com/blockchain-technology-help-safeguard-data/" target="_blank" rel="noopener">blockchain</a> analysts noted that the attacker still retained close to a trillion MAPO tokens.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">Those remaining holdings continue to create risks for additional liquidity pools and potential exchange listings linked to the Map Protocol token ecosystem. The sudden flood of tokens severely impacted market confidence and highlighted ongoing <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/"   title="vulnerabilities" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28375">vulnerabilities</a> within cross-chain bridge infrastructure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">MAPO Exploit Adds to Growing List of DeFi Attacks</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">The <a class="wpil_keyword_link" href="https://cyble.com/exploit/" target="_blank"  rel="noopener" title="exploit" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28376">exploit</a> comes during an already damaging month for decentralized finance projects. Reports indicate that at least 18 DeFi and <a href="https://thecyberexpress.com/siblings-siphon-25m-from-ethereum-blockchain/" target="_blank" rel="noopener">blockchain protocols</a> have been compromised in recent weeks.</span>

<span data-contrast="auto">Among the affected projects are THORChain, Verus Protocol, Transit Finance, TrustedVolumes, Ekubo, Echo Protocol, and RetoSwap.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The repeated attacks have intensified concerns surrounding interoperability protocols, especially those handling assets across ETH, Bitcoin, and other blockchain ecosystems. Cross-chain bridges remain frequent targets because of the complexity involved in validating transactions between multiple networks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>
<h3 aria-level="2"><b><span data-contrast="none">Map Protocol Pauses Mainnet Operations</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">In response to the breach, Map Protocol confirmed that the <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/vulnerabilities/"   title="vulnerability" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28378">vulnerability</a> originated in the Solidity contract layer. The project announced that it had paused its mainnet and initiated a migration process while the investigation continues.</span>

<span data-contrast="auto">Butter Network also suspended ButterSwap operations, although the team stated that user funds were not directly at <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/"   title="risk" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28373">risk</a>.</span>

<span data-contrast="auto">In its latest statement, the Map Protocol team said it would announce a new contract address and later conduct an asset snapshot. The project added that “any remaining tokens held by attacker-controlled addresses will be fully invalidated and will not be included in any future snapshot or conversion process.”</span>

<span data-contrast="auto">Blockchain <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/"   title="data" data-wpil-keyword-link="linked"  data-wpil-monitor-id="28377">data</a> further revealed that approximately one billion MAPO tokens were transferred to Uniswap shortly after the quadrillion-token mint occurred.</span>
<h3 aria-level="2"><b><span data-contrast="none">How the MAPO Mint Exploit Happened</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}"> </span></h3>
<span data-contrast="auto">Security researchers later outlined how the attack unfolded. According to Blockaid, the attacker initially submitted a legitimate oracle multisig-signed message before deploying a malicious smart contract at a carefully chosen address.</span>

<span data-contrast="auto">The exploiter then resent a modified “retry” message that appeared identical in transaction hash but had actually been manipulated. Because the cross-chain bridge incorrectly verified the altered message as authentic, the system approved the minting of the massive MAPO supply.</span>

<span data-contrast="auto">Researchers stressed that no private keys were stolen and no light clients were compromised during the attack. Instead, the incident was described as a “classic Solidity vulnerability involving multiple dynamic fields.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span>

<span data-contrast="auto">The exploit once again demonstrated how weaknesses in smart contract validation can place both MAPO and ETH liquidity ecosystems at risk.</span>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">112221</post-id>	</item>
	</channel>
</rss>