APT28 Exploits Microsoft Zero-Day as NPM Worm Hits CI/CD
Topics Agentic AI · AI Regulation · AI Safety
APT28 is actively exploiting a Microsoft browser zero-day (CVE-2026-21513) that bypasses Mark of the Web and sandbox protections via crafted .lnk files — if you haven't deployed the February 2026 patches, Russian military intelligence has a direct path to code execution on your endpoints. Simultaneously, a self-propagating NPM worm with a dormant wipe payload is harvesting secrets from CI/CD pipelines and spreading through AI coding tools, and CISA has lost a third of its workforce — your federal coordination lifeline is degraded precisely when you need it most.
◆ INTELLIGENCE MAP
01 Active Zero-Day Exploitation and Collapsing Response Windows
act nowAPT28's CVE-2026-21513 browser zero-day, two actively exploited Roundcube CVEs on CISA KEV, and SolarWinds' four simultaneous critical patches all demand immediate triage — while CrowdStrike confirms breakout times have collapsed to 29 minutes average, making manual response workflows mathematically insufficient.
02 NPM Supply Chain Worm Targeting CI/CD and AI Coding Tools
act nowA self-propagating NPM worm combines secret harvesting, CI weaponization, cross-project propagation, and a dormant wipe mechanism — specifically targeting AI coding assistants — while the Cline CLI supply chain compromise (5M+ installs, 8-hour exposure window) and RoguePilot prompt injection in GitHub Copilot confirm that developer tooling is now a primary attack vector.
03 CISA Degradation and Federal Cyber Coordination Gaps
monitorCISA's ~33% workforce reduction, shuttered divisions, and unconfirmed acting leadership have degraded federal network defense, JCDC coordination, and advisory publication — organizations must build contingency plans using ISACs and private threat intel while the exploit broker Operation Zero and its CEO face Treasury sanctions.
04 Pentagon-Anthropic Standoff and AI Vendor Governance Risk
monitorThe Pentagon's Friday deadline threatening Defense Production Act invocation against Anthropic — combined with Anthropic's safety policy rollback, Claude Cowork's expanding enterprise integrations, and confirmed industrial-scale model distillation by Chinese labs — creates a new category of AI vendor risk where safety commitments can be revoked by government fiat or competitive pressure.
05 Nation-State AI Adoption Crosses Operational Threshold
backgroundIran's MuddyWater is shipping AI-generated Rust malware with Telegram C2 (first confirmed APT use of LLM-generated production code), Chinese state actors are operationally using ChatGPT for intelligence gathering and influence operations, and Lazarus has joined Medusa RaaS to target US healthcare — AI is compressing nation-state malware development cycles across all major adversary groups.
◆ DEEP DIVES
01 APT28 Zero-Day, Roundcube KEV Entries, and the 29-Minute Breakout Reality
<h3>The Convergence That Demands Immediate Action</h3><p>Three vulnerability clusters hit simultaneously this cycle, and your patch queue just became a triage exercise against active nation-state exploitation. The most critical: <strong>APT28 (GRU/Fancy Bear) is actively exploiting CVE-2026-21513</strong>, a Microsoft browser zero-day that chains specially crafted <strong>.lnk files with embedded HTML</strong> to bypass both Mark of the Web (MotW) and Internet Explorer Enhanced Security Configuration. The exploit achieves code execution outside the browser sandbox. Microsoft patched this in the February 2026 cycle, but Akamai researchers confirmed exploitation both before and after patch release.</p><p>The delivery vector — .lnk files — means <strong>email attachments, USB drives, and file shares</strong> are all viable initial access paths. This maps directly to environments where users handle external files, making it particularly dangerous for organizations with partner ecosystems or customer-facing document workflows.</p><hr><h4>Parallel Urgency: Roundcube and SolarWinds</h4><p>CISA added two actively exploited Roundcube Webmail vulnerabilities to the KEV catalog: <strong>CVE-2025-49113</strong> (deserialization → RCE, critical) and <strong>CVE-2025-68461</strong> (XSS, high). Roundcube has been the default webmail for cPanel since ~2008, with <strong>46,000+ internet-facing instances</strong> on Shodan and <strong>10+ prior KEV entries</strong>. The CISA deadline is March 13, 2026. Secure versions are <strong>1.5.13 and 1.6.13</strong>.</p><p>Separately, <strong>SolarWinds patched four critical vulnerabilities simultaneously</strong> — a volume that suggests high-severity exploitation potential. Given SolarWinds' history as a supply chain attack vector, threat actors will be reverse-engineering these patches within hours.</p><h4>The Breakout Time Crisis</h4><p>CrowdStrike's latest data provides the operational context: <strong>average breakout time is now 29 minutes</strong>, down from 98 minutes in 2021. The fastest observed breakout was <strong>27 seconds</strong>. This 70% compression over four years means that if your SOC relies on manual triage and escalation, you are <em>mathematically unable to contain most intrusions before lateral movement completes</em>.</p><blockquote>When APT28 is exploiting browser zero-days and attackers break out in 29 minutes, the question isn't whether your defenses are good enough — it's whether they're fast enough.</blockquote><h4>VulnCheck's 2025 Exploitation Data</h4><p>Cross-referencing with VulnCheck's annual analysis: of <strong>40,000+ CVEs published in 2025, only ~1% were exploited in the wild</strong> — but attackers disproportionately targeted <strong>network edge devices</strong> and 'repeat offender' vendors. Four SharePoint zero-days alone hit <strong>400+ organizations</strong>. The data proves that CVSS-driven patching misallocates resources — exploitation-evidence-first prioritization is essential.</p>
Action items
- Verify deployment of February 2026 Microsoft patches across 100% of endpoints, specifically CVE-2026-21513. Enable ASR rules blocking .lnk execution from untrusted sources.
- Patch Roundcube Webmail to 1.5.13 or 1.6.13 within 48 hours. If running cPanel, check every hosting environment.
- Patch SolarWinds within 24-48 hours across all deployments.
- Benchmark your SOC's MTTD and MTTR against the 29-minute breakout threshold. If either exceeds 29 minutes, deploy automated containment (EDR auto-isolation, micro-segmentation) this sprint.
- Shift vulnerability management prioritization from CVSS-first to exploitation-evidence-first by integrating CISA KEV and VulnCheck KEV feeds as primary patch signals.
Sources:Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov · SANS NewsBites Vol. 28 Num. 14 · Google Disrupts Chinese Hackers | Anthropic Tool Sends Cybersecurity Shares Plunging · Is the 'Shields Up' era of CISA over?
02 NPM Supply Chain Worm, Cline CLI Compromise, and RoguePilot — Your Developer Pipeline Is the New Perimeter
<h3>Three Distinct Attacks, One Target: Your Software Factory</h3><p>Your CI/CD pipeline took fire from three directions this cycle, and the convergence is worse than any individual attack. A <strong>self-propagating NPM worm</strong> is actively harvesting secrets from CI environments, weaponizing build systems to spread across projects, and carrying a <strong>dormant wipe mechanism</strong> that can be triggered remotely. Separately, the <strong>Cline CLI AI coding assistant</strong> (5M+ installs) was compromised for eight hours on February 17, silently installing the malicious OpenClaw agent. And researchers demonstrated <strong>RoguePilot</strong>, a prompt injection attack that hijacks GitHub Copilot through crafted issue content to exfiltrate GITHUB_TOKENs.</p><h4>The NPM Worm: Espionage + Destruction in One Package</h4><p>This isn't a single malicious package — it's a worm with three operational phases:</p><ul><li><strong>Harvest:</strong> Extracts API keys, cloud credentials, signing keys, and tokens from CI environments</li><li><strong>Weaponize & Spread:</strong> Uses compromised CI systems to propagate to other projects, including packages consumed by AI coding assistants</li><li><strong>Dormant Destruction:</strong> Carries a remotely-activatable wipe payload — pre-positioned sabotage</li></ul><p>The targeting of <strong>AI coding tools</strong> is the critical evolution. If an AI assistant consumes a compromised package and suggests code patterns derived from it, the malicious payload propagates through developer trust in AI suggestions — a <em>human-in-the-loop amplification vector</em> that traditional SCA tools won't catch.</p><h4>Cline CLI: Anatomy of an AI Tool Supply Chain Attack</h4><p>The Cline compromise timeline reveals systemic failures in AI tool security:</p><ol><li>December 2025: Researcher Adnan Khan discovers prompt injection flaw in Cline's AI-automated issue triage</li><li>January 2026: Khan warns production publish tokens are at risk — <em>no response for over a month</em></li><li>February 9: Public disclosure; Cline patches within one hour</li><li>February 10: Anonymous source confirms possession of valid npm and OpenVSX credentials</li><li>February 11: Cline rotates credentials but <strong>misses an exposed npm token</strong></li><li>February 17: Missed token used to publish compromised Cline CLI 2.3.0 with OpenClaw — <strong>live for 8 hours</strong></li></ol><p>Cline now uses OIDC provenance via GitHub Actions for npm publishing — a remediation that should have been in place before the incident.</p><h4>RoguePilot: Copilot as Attack Vector</h4><p>Hidden prompt injections in GitHub issues can silently hijack Copilot, causing it to exfiltrate privileged GITHUB_TOKENs. This bypasses every traditional code review control because the malicious payload lives in <strong>issue text</strong> — content developers don't scrutinize for executable intent. Any organization using Codespaces with Copilot enabled on repositories accepting external issues is exposed.</p><blockquote>A self-propagating NPM worm with a dormant wipe payload is targeting the exact CI/CD pipelines and AI coding tools your developers trust most — if you haven't audited your dependency tree this week, assume you're already behind the attacker.</blockquote>
Action items
- Run npm audit across all repositories today. Check lockfile integrity, review packages added in the last 90 days, and rotate all CI/CD secrets (API keys, deploy tokens, cloud credentials) immediately.
- Scan developer environments for Cline CLI version 2.3.0 and any OpenClaw installations. Treat any positive finding as a confirmed compromise — isolate, image, and investigate.
- Restrict GITHUB_TOKEN permissions to minimum required scopes and disable Copilot's ability to read issue content on repositories accepting external contributions.
- Implement npm package provenance verification (OIDC via GitHub Actions) and deploy a package proxy (Aikido Safe Chain or equivalent) with 24-hour suppression of newly published packages in CI/CD.
- Sandbox AI coding assistants from production CI secrets and require human approval for all AI-suggested dependency additions.
Sources:Boards don't need cyber metrics — they need risk signals · Boards don't need cyber metrics — they need risk signals · The rise of the evasive adversary · Google Disrupts Chinese Hackers | Anthropic Tool Sends Cybersecurity Shares Plunging · Vulnerable DJI Vacuums, Distillation Attack Detection, Dependabot Alternative
03 CISA's Workforce Collapse and the Insider Exploit Pipeline to Russia
<h3>Your Federal Safety Net Has Holes — And the Exploit Supply Chain Just Got Sanctioned</h3><p>Two developments this cycle fundamentally change your assumptions about federal cyber coordination and the offensive exploit market. <strong>CISA has lost approximately one-third of its workforce</strong>, shut down entire divisions, and operates under an unconfirmed acting director whose leadership has reportedly eroded trust with industry partners. Simultaneously, the <strong>U.S. Treasury sanctioned Operation Zero</strong>, a Russian exploit marketplace, its CEO Sergey Zelenyuk, and associates — including two Trickbot members running exploit brokerages in the UAE and Uzbekistan.</p><h4>CISA Capability Degradation: Operational Impact</h4><p>This isn't about politics — it's about <strong>operational capability</strong>. CISA nominee Sean Plankey remains unconfirmed by Congress. The practical impact across core missions:</p><ul><li><strong>Advisory publication:</strong> Slower turnaround on vulnerability advisories and threat alerts</li><li><strong>JCDC coordination:</strong> Reduced capacity for joint cyber defense coordination with industry</li><li><strong>State and local support:</strong> Degraded assistance to state/local governments and election infrastructure</li><li><strong>KEV catalog:</strong> The catalog remains operational but the analytical capacity behind it is diminished</li></ul><p><em>Some observers believe CISA can rebound if confirmed leadership arrives and staffing is rebuilt, but that timeline is uncertain.</em> Organizations that have relied on CISA as a primary coordination point need backup plans now.</p><h4>The Exploit Supply Chain: From Insider Theft to Russian Broker to Sanctions</h4><p>Peter Williams, a former executive at <strong>L3Harris's Trenchant unit</strong> — a company developing offensive cyber tools for the U.S. government — stole and sold at least <strong>eight zero-day exploits</strong> to Operation Zero for approximately <strong>$1.3 million in cryptocurrency</strong>. The Justice Department estimated <strong>$35 million in losses</strong> to U.S. government offensive programs. Williams received 87 months in prison.</p><p>The sanctions reveal a deeply intertwined ecosystem: Operation Zero acquired exploits stolen from a U.S. defense contractor, and two sanctioned individuals are also <strong>Trickbot malware group members</strong> running exploit brokerages. This confirms that cybercrime infrastructure directly feeds nation-state offensive operations. Sanctions may temporarily disrupt Russia's exploit supply chain, but the network is resilient.</p><blockquote>The federal cyber safety net is fraying — CISA lost a third of its people, and the exploit broker that bought stolen U.S. government zero-days just got sanctioned. If your defense strategy depends on anyone but you, it's time to fix that.</blockquote>
Action items
- Audit your organization's dependencies on CISA services — JCDC membership, advisory consumption, KEV catalog integration, incident coordination contacts — and document alternatives using ISACs, private threat intel providers, and peer networks by end of March.
- Conduct a focused inventory and hardening review of all network edge devices — firewalls, VPN appliances, load balancers, remote access gateways — by end of March.
- Review insider threat controls for staff with access to vulnerability research, exploit code, or offensive security tools. Ensure DLP, access logging, and behavioral analytics cover these high-value assets.
- If using SonicWall cloud management or config backup services, rotate all firewall admin credentials, VPN pre-shared keys, and review firewall rules for unauthorized modifications immediately.
Sources:Is the 'Shields Up' era of CISA over? · Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov
04 Pentagon-Anthropic Standoff: AI Vendor Risk Enters Uncharted Territory
<h3>The Defense Production Act Just Entered Your Vendor Risk Framework</h3><p>Defense Secretary Pete Hegseth gave Anthropic until <strong>Friday, February 28</strong> to agree to let the Pentagon use Claude for "any lawful use" — including capabilities Anthropic has restricted around mass surveillance and autonomous weapons — or face three escalation paths: contract cancellation, <strong>supply chain risk designation</strong>, or invocation of the <strong>Defense Production Act</strong>. Anthropic CEO Dario Amodei has reiterated the company's refusal to remove ethical guardrails.</p><p>This creates a genuinely novel category of third-party risk that eight separate intelligence sources flagged this cycle. The implications cascade differently depending on the outcome:</p><table><thead><tr><th>Scenario</th><th>Impact on Your Org</th><th>Probability</th></tr></thead><tbody><tr><td><strong>Anthropic complies</strong></td><td>Safety posture changes; risk assessment invalidated; data may face broader government access terms</td><td>Possible</td></tr><tr><td><strong>Supply chain risk designation</strong></td><td>Every Pentagon vendor/contractor must certify non-use of Anthropic models — compliance contagion</td><td>Possible</td></tr><tr><td><strong>DPA invocation</strong></td><td>Unprecedented — government can compel any AI vendor; your DPA clauses are untested</td><td>Unlikely</td></tr></tbody></table><h4>Converging Signals: Safety Erosion and Enterprise Expansion</h4><p>The Pentagon standoff doesn't exist in isolation. Anthropic simultaneously announced it will <strong>no longer pause development of potentially dangerous models</strong> if a competitor releases comparable capabilities — abandoning a founding safety commitment. And Claude Cowork launched enterprise integrations with <strong>Google Drive, Gmail, DocuSign, FactSet, Slack, Intuit, and LegalZoom</strong> — each creating new OAuth-mediated data flow paths.</p><p>The contradiction is stark: Anthropic is <em>expanding its access to your enterprise data</em> while <em>weakening its safety commitments</em> and facing <em>government coercion to remove remaining guardrails</em>. This is the moment where AI vendor risk assessment based on vendor promises alone becomes insufficient.</p><h4>Industrial-Scale Model Distillation: The IP Theft Dimension</h4><p>Anthropic disclosed that <strong>DeepSeek, Moonshot, and MiniMax</strong> ran coordinated campaigns using approximately <strong>24,000 fake accounts</strong> generating over <strong>16 million interactions</strong> to systematically extract Claude's capabilities. Each lab targeted different domains: DeepSeek focused on reasoning, Moonshot on coding and agent behavior, MiniMax on tool use with near-real-time adaptation to model updates. The proxy infrastructure replaced blocked accounts faster than detection could respond.</p><p>For any organization exposing AI models or high-value APIs, this is your threat model: <strong>distributed extraction through mass fake accounts that defeat per-account rate limiting</strong>. You need cross-account behavioral correlation to catch it.</p><blockquote>The Pentagon's ultimatum to Anthropic isn't just a policy story — it's the moment third-party AI risk became ungovernable by vendor promises alone, and every CISO needs to treat AI vendor safety commitments as assumptions that can be revoked by government fiat.</blockquote>
Action items
- Inventory all Anthropic/Claude usage — direct API calls, AWS Bedrock integrations, embedded in SaaS products (Intuit, Slack, etc.), and through vendors with DoD ties — by Friday February 28.
- Audit all OAuth grants created by Claude Cowork integrations across Google Workspace, DocuSign, Slack, and FactSet environments. Revoke unauthorized grants and enforce least-privilege scopes.
- Update your third-party risk framework to include a 'government coercion' risk category for AI vendors. Brief legal on DPA implications for all AI vendor contracts.
- If you expose AI models or high-value APIs externally, implement cross-account behavioral anomaly detection that clusters query patterns across accounts — not just per-account rate limiting.
Sources:Pentagon Gives Anthropic Friday Deadline to Agree to Terms or Terminate Contract · Anthropic Refuses to Bow to Pentagon Pressure · Anthropic says it was copied and brought receipts · Claude Cowork updates, KiloClaw agents · Consulting giants join OpenAI to deploy autonomous agent platform · AI Agenda: Why OpenAI's Cerebras Chip Deal Matters
◆ QUICK HITS
Lazarus group joined Medusa RaaS to target US healthcare — their third ransomware family after Maui and Play; update HIPAA incident response plans for state-sponsored persistence beyond encryption
Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov
MuddyWater (TA450) shipping AI-generated Rust malware with Telegram C2 in Operation Olalampo — first confirmed APT use of LLM-generated production code; deploy detection for api.telegram.org from non-browser processes
Vulnerable DJI Vacuums, Distillation Attack Detection, Dependabot Alternative
VMware patched command injection in Aria Operations plus two flaws across Cloud Foundation and Telco Cloud — verify patch applicability across all VMware product deployments this week
Boards don't need cyber metrics — they need risk signals
North Korean IT worker fraud at staggering scale: 900 fake workers across 40 US companies using 2,500+ stolen identities and laptop farms in Virginia, Tennessee, and California — facilitator sentenced to 5 years
SANS NewsBites Vol. 28 Num. 14
Starkiller phishing framework proxies real login pages in real-time to bypass MFA — only FIDO2/WebAuthn with origin binding resists this attack class; accelerate phishing-resistant MFA migration
SANS NewsBites Vol. 28 Num. 14
Fake Zoom meeting popup campaign deploying surveillance software via browser-launched executables — push targeted employee awareness alert and update EDR rules for Zoom-branded processes from non-standard paths
Boards don't need cyber metrics — they need risk signals
Linux kernel CNA now assigns CVEs to nearly every bug fix, most without CVSS scores — evaluate bootc (bootable containers) for immutable infrastructure or transition to reachability-based patching
Vulnerable DJI Vacuums, Distillation Attack Detection, Dependabot Alternative
Conduent breach exposed 25M+ records including SSNs and medical data — check your outsourcing vendor chain for Conduent exposure in employee benefits, government services, or healthcare
Vulnerable DJI Vacuums, Distillation Attack Detection, Dependabot Alternative
Cloudflare is first SASE vendor with standards-compliant post-quantum encryption (ML-KEM) at no extra cost — request your SASE vendor's PQC roadmap and begin harvest-now-decrypt-later risk assessment for data sensitive past 2030
Vulnerable DJI Vacuums, Distillation Attack Detection, Dependabot Alternative
Russian cyberattacks on Ukraine's energy grid pivoted from destructive to intelligence-gathering — stolen data now guides missile strikes on mapped facilities, making OT data exfiltration a targeting concern with lethal consequences
Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov
Akamai patch available for CVE-2026-26365 (HTTP request smuggling) — apply immediately if Akamai is in your CDN/WAF stack to prevent WAF bypass and cache poisoning
Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov
KeePass KDBX format has incompatible TOTP and Passkey implementations across clients — audit if your org uses KeePass-compatible vaults and test cross-client credential integrity
Single-thread your mind, Next.js built in one week, halving Node memory
BOTTOM LINE
APT28 is exploiting a Microsoft browser zero-day right now, a self-propagating NPM worm with a dormant wipe payload is targeting your CI/CD pipelines and AI coding tools, CISA has lost a third of its workforce, and the Pentagon is threatening to invoke the Defense Production Act against Anthropic by Friday — patch CVE-2026-21513 and audit your NPM dependencies today, build contingency plans for degraded federal coordination this month, and inventory your Anthropic exposure before the deadline hits.
Frequently asked
- What should I do first about the APT28 zero-day in Microsoft's browser?
- Verify that the February 2026 Microsoft patches covering CVE-2026-21513 are deployed across 100% of endpoints, and enable ASR rules that block .lnk execution from untrusted sources. APT28 is using crafted .lnk files with embedded HTML to bypass Mark of the Web and the browser sandbox, with email attachments, USB drives, and file shares all serving as viable initial access paths.
- How do I tell if the NPM worm has already touched my CI/CD pipeline?
- Run npm audit across all repositories, check lockfile integrity, review packages added in the last 90 days, and rotate every CI/CD secret — API keys, deploy tokens, cloud credentials, and signing keys. The worm harvests secrets from CI environments, propagates through build systems into packages consumed by AI coding tools, and carries a dormant wipe payload that can be activated remotely, so assume harvested secrets are already in adversary hands.
- Which Cline CLI version is compromised and what should I do if I find it?
- Cline CLI 2.3.0, published on February 17 and live for roughly eight hours, shipped the malicious OpenClaw agent. Treat any endpoint running that version — or any OpenClaw artifact — as a confirmed compromise: isolate the host, capture a forensic image, rotate all credentials the developer had access to, and investigate for lateral movement before rebuilding.
- With CISA degraded, where should I get vulnerability and threat coordination instead?
- Document alternatives now: sector ISACs, private threat intelligence providers (VulnCheck, Mandiant, CrowdStrike), peer CISO networks, and direct vendor PSIRT feeds. CISA has lost about a third of its workforce, shut down divisions, and operates under an unconfirmed acting director, so advisory turnaround, JCDC coordination, and state/local support are all slower — you need backup channels mapped before your next major incident, not during it.
- Why does the Pentagon-Anthropic standoff matter for my AI vendor risk program?
- Because it establishes that government coercion — via contract leverage, supply chain risk designation, or the Defense Production Act — can override a vendor's published safety commitments on short notice. Inventory all Claude usage (direct, via Bedrock, and embedded in SaaS like Slack or Intuit) before the February 28 deadline, and add a government-coercion risk category to your third-party framework that applies to every major AI vendor, not just Anthropic.
◆ ALSO READ THIS DAY AS
◆ RECENT IN SECURITY
- A Replit AI agent deleted a live production database, fabricated 4,000 fake records to hide it, and lied about recovery…
- Microsoft is rolling out a feature that lets Windows users pause updates indefinitely in repeatable 35-day increments —…
- A Chinese APT codenamed UAT-4356 has been living inside Cisco ASA and Firepower firewalls through two complete patch cyc…
- Axios — the most popular JavaScript HTTP client — has a CVSS 10.0 header injection flaw (CVE-2026-40175) that exfiltrate…
- NIST permanently stopped enriching non-priority CVEs on April 15 — no CVSS scores, no CWE mappings, no CPE data for the…