PROMIT NOW · SECURITY DAILY · 2026-03-07

MuddyWater's Dindoor Backdoor Hits US Banks and Airports

· Security · 50 sources · 1,546 words · 8 min

Topics AI Regulation · Agentic AI · AI Safety

MuddyWater's new Dindoor backdoor has been confirmed inside US banks, airports, and non-profits — not as a theoretical threat, but as existing footholds — during an active US-Iran shooting war that has already physically destroyed an AWS data center in the Gulf. Simultaneously, VMware Aria Operations and Cisco Secure Firewall Management Center both have unauthenticated RCE vulnerabilities under active exploitation or at CVSS 10/10, and 100,000+ n8n automation servers are exposed with a sandbox-escape-to-root flaw. If you're in financial services, aviation, or run any of these products, your patch and threat-hunt windows are measured in hours.

◆ INTELLIGENCE MAP

  1. 01

    Iran's Dual-Domain War: Dindoor in US Banks + Drones Hit AWS

    act now

    MuddyWater confirmed inside US banks, airports, and non-profits via new Dindoor backdoor. Iranian drones physically destroyed an AWS Gulf data center — first kinetic strike on a US hyperscaler. Iranian groups are mass-scanning Hikvision/Dahua cameras across six countries for missile targeting. Israel reportedly bombed Iran's Cyber and Electronic Warfare HQ in Tehran.

    6
    countries camera-scanned
    12
    sources
    • Dindoor victim sectors
    • Camera scan targets
    • AWS regions hit
    1. Dindoor deployedMuddyWater confirmed in US banks, airports
    2. Camera scanningHikvision/Dahua across 6 countries
    3. AWS struckGulf data center physically destroyed
    4. Cyber HQ bombedIsrael strikes Iran's cyber command
  2. 02

    New Critical CVEs: VMware Aria RCE, Cisco FMC 10/10, 100K n8n Exposed

    act now

    VMware Aria Operations CVE-2026-22719 is an unauth RCE confirmed exploited 10 days after patch — now in CISA KEV. Cisco shipped 27 advisories including two CVSS 10/10 Secure Firewall Management Center bugs. Over 100K n8n AI automation servers remain internet-exposed with CVE-2026-27495 enabling sandbox escape to full host compromise. CVE-2026-0628 lets Chrome extensions hijack Gemini for camera, mic, and file access.

    100K+
    n8n servers exposed
    6
    sources
    • Cisco advisories
    • Cisco FMC CVSS
    • VMware exploit lag
    1. Cisco FMC #110
    2. Cisco FMC #210
    3. VMware Aria9.8
    4. n8n Sandbox9.8
    5. Chrome Gemini8.8
  3. 03

    AI Supply Chain Weaponized: Prompt Injection → npm Token → 4,000 Machines

    monitor

    A prompt injection in a GitHub issue title hijacked an AI triage bot, stole an npm publish token, and trojanized Cline — compromising ~4,000 developer machines with OpenClaw malware. Separately, GPT-5.4 scored 75% on OSWorld (above 72.4% human baseline), making AI-driven desktop exploitation viable. Nemesis 2.2 now automates Chrome 137+ App-Bound Encryption bypass for full credential theft. The Shai-Hulud worm hit thousands of npm packages.

    4,000
    dev machines compromised
    9
    sources
    • GPT-5.4 OSWorld
    • Shai-Hulud packages
    • Attack date
    1. GPT-5.4 Desktop Nav75
    2. Human Baseline72.4
  4. 04

    2025 Zero-Day Report: Enterprise Targeting Highest Ever, Malvertising Overtakes Email

    background

    Google Mandiant tracked 90 zero-days exploited in 2025. Nearly half targeted enterprise infrastructure — the highest share ever recorded. Browser exploitation dropped while network device zero-days surged to 23%. Separately, malvertising surpassed email as the #1 malware delivery vector at 60% of all observed campaigns. State-sponsored groups and commercial spyware vendors each accounted for one-third of zero-day usage.

    90
    zero-days exploited in 2025
    5
    sources
    • Enterprise share
    • Edge device share
    • Malvertising share
    1. Enterprise infra45
    2. Desktop OS27
    3. Edge/network23
    4. Other5

◆ DEEP DIVES

  1. 01

    Iran's Dual-Domain War: Dindoor Backdoor Inside US Critical Infrastructure While Drones Destroy Cloud Data Centers

    <h3>Situation Overview</h3><p>An <strong>unprecedented convergence of cyber and kinetic warfare</strong> is targeting US infrastructure simultaneously. Symantec and Carbon Black have jointly confirmed that Iranian APT MuddyWater (Seedworm) has deployed a previously unknown backdoor called <strong>Dindoor</strong> inside at least one US bank, one airport, one non-profit, and the Israeli branch of a US software company. This is not a warning about future activity — <strong>they are already inside</strong>. In parallel, Iranian drones physically struck an <strong>AWS data center in the Gulf region</strong> (me-south-1, Bahrain), the first confirmed military attack on a US hyperscaler's infrastructure.</p><hr><h3>Three Iranian Attack Vectors Operating Simultaneously</h3><h4>1. Dindoor: Pre-Positioned Access in US Critical Infrastructure</h4><p>MuddyWater's Dindoor backdoor likely replaces or augments their previously known implants, meaning <strong>existing detection signatures may not cover it</strong>. The Ctrl-Alt-Intel team separately dumped contents from misconfigured MuddyWater C2 servers, providing fresh IOCs. Confirmed victim sectors — banking, aviation, non-profit — suggest intelligence collection and <strong>pre-positioning for retaliatory operations</strong>, consistent with Iran's historical pattern during geopolitical escalation.</p><h4>2. Camera Networks as Battlefield Intelligence</h4><p>Iranian state-linked groups have spiked scanning of internet-exposed <strong>Hikvision and Dahua cameras</strong> across Israel, Qatar, Bahrain, Kuwait, UAE, and Cyprus — the exact countries involved in kinetic strikes. They are exploiting <strong>old, already-patched vulnerabilities</strong>, meaning the only victims are organizations with firmware patch lag. Multiple sources confirm this tactic is now <strong>mature and multi-actor</strong>: Russia has used it across Ukraine for four years, Israel reportedly operated a data center collecting Tehran camera feeds, and even Hamas used camera hacking operationally.</p><blockquote>Internet-exposed cameras from Hikvision and Dahua are effectively unintentional SIGINT platforms. Hundreds of exploitation attempts have been logged since recent missile strikes.</blockquote><h4>3. Kinetic Targeting of Cloud Infrastructure</h4><p>The Iranian drone strike on Amazon's Bahrain data center explicitly cited the company's <strong>"support of US military and intelligence activities."</strong> This crosses a threshold: cloud providers' shared responsibility model assumed natural disasters and criminal actors, not <strong>state-directed military strikes targeting commercial cloud</strong>. Reports indicate debris also struck civilian buildings in Dubai. Most cyber insurance policies contain <strong>war exclusion clauses</strong> that likely apply.</p><hr><h3>Geopolitical Context</h3><p>Iran's Supreme Leader was killed in an Israeli airstrike. Iran has closed the <strong>Strait of Hormuz</strong> (20% of global oil). Iran's foreign minister says <strong>no ceasefire</strong>. Israel reportedly <strong>bombed Iran's Cyber and Electronic Warfare HQ</strong> in Tehran — if confirmed, the first known kinetic strike on a nation's cyber command center. Iranian cyber units may be operating under disrupted coordination, making them <strong>more unpredictable</strong>. DHS Secretary Noem was fired and replaced by someone with no cybersecurity background, creating a <strong>CISA coordination gap</strong> during the highest-threat period in years.</p><hr><h3>Parallel Chinese APT Activity</h3><p>While Iran dominates the threat picture, a China-linked APT has been operating inside <strong>South American telecommunications infrastructure since 2024</strong> using three cross-platform tools: TernDoor, PeerTime, and BruteEntry — targeting Windows, Linux, and edge devices. The FBI also confirmed suspicious activity on networks managing <strong>wiretaps and FISA warrants</strong>, potentially linked to Salt Typhoon's 2024 campaign. A senior State Department official confirmed China is actively executing <strong>harvest-now-decrypt-later campaigns</strong> against encrypted data.</p>

    Action items

    • Initiate a Dindoor threat hunt using Broadcom and Ctrl-Alt-Intel published IOCs — prioritize financial services, aviation, and non-profit environments
    • Audit and patch all Hikvision and Dahua camera firmware; segment camera VLANs from corporate networks with no internet exposure
    • Validate multi-region DR plans for any cloud workloads in Middle East AWS/Azure/GCP regions — run a tabletop assuming complete region destruction
    • Review cyber insurance war exclusion clauses with your broker — specifically Lloyd's Y5381 language on state-backed attacks
    • Elevate SOC monitoring for Iranian APT TTPs: spearphishing with geopolitical lures, VPN/edge device exploitation, and PowerShell-based lateral movement

    Sources:Five active exploits hit your network stack today · VMware Aria & Cisco SD-WAN under active exploit while Iranian APTs burrow into US banks and airports · Iran just hit Amazon data centers · Iranian Drones Hit AWS Data Centers · FBI surveillance systems targeted again · Iran conflict day 6: Your SOC should be hunting for Iranian APT activity right now

  2. 02

    Patch Triage: VMware Aria RCE, Cisco FMC 10/10, and 100K Exposed n8n Servers

    <h3>New Critical Vulnerabilities Requiring Immediate Action</h3><p>Beyond the Cisco SD-WAN vulnerabilities reported previously (now with <strong>two additional CVEs confirmed exploited</strong>), three distinct critical vulnerabilities emerged today that demand emergency patching. These are separate from Friday's advisory coverage and represent <strong>new active exploitation or maximum-severity threats</strong>.</p><hr><h4>VMware Aria Operations — CVE-2026-22719 (Actively Exploited)</h4><p>An <strong>unauthenticated remote code execution</strong> vulnerability via command injection in VMware Aria Operations was patched on February 24 — and is already being exploited in the wild just <strong>10 days later</strong>. CISA added it to KEV. If you run Aria Operations (formerly vRealize Operations), your management interface is an active target. The attack requires no credentials — only network reachability to the management plane.</p><h4>Cisco Secure Firewall Management Center — Two CVSS 10/10</h4><p>Cisco's 27-advisory batch release this cycle includes <strong>two perfect 10.0 CVSS scores</strong> in Secure Firewall Management Center (FMC). Your firewall management plane — the system that controls your entire perimeter defense — has critical vulnerabilities. Details are still emerging, but CVSS 10 means unauthenticated, remote, with maximum impact. This comes alongside the Cisco firewall web management interface vulnerabilities granting <strong>unauthenticated remote root access</strong> reported by multiple sources — no credentials needed, full device compromise.</p><blockquote>When your firewall management plane has two CVSS 10 vulnerabilities in the same advisory cycle, the question isn't 'when do we patch' — it's 'are we already compromised.'</blockquote><h4>n8n Automation — CVE-2026-27495 (100K+ Exposed)</h4><p>The n8n AI workflow automation platform has a critical <strong>sandbox escape vulnerability</strong> that escalates to full host compromise in default configuration. Over <strong>100,000 n8n instances</strong> remain internet-exposed and unpatched. This is a shadow IT problem — engineering teams deploy n8n without security review. One source notes the default configuration is vulnerable, meaning most exposed instances are likely exploitable.</p><h4>Chrome Gemini Panel — CVE-2026-0628</h4><p>Chrome extensions with <strong>basic, already-granted permissions</strong> can hijack Chrome's Gemini AI panel and access the device's camera, microphone, local files, take screenshots of any HTTPS site, and launch phishing attacks. No additional user consent required. The blast radius is enormous given Chrome's enterprise dominance and Gemini's default enablement in growing deployments.</p><hr><h3>Consolidated Patch Priority Matrix</h3><table><thead><tr><th>CVE</th><th>Product</th><th>CVSS</th><th>Status</th><th>Deadline</th></tr></thead><tbody><tr><td>2x unnamed</td><td>Cisco Secure FMC</td><td>10.0</td><td>Patch available</td><td>24 hours</td></tr><tr><td>CVE-2026-22719</td><td>VMware Aria Ops</td><td>Critical</td><td>CISA KEV, exploited</td><td>24 hours</td></tr><tr><td>CVE-2026-27495</td><td>n8n automation</td><td>Critical</td><td>100K+ exposed</td><td>48 hours</td></tr><tr><td>CVE-2026-0628</td><td>Chrome/Gemini</td><td>High</td><td>Patch available</td><td>48 hours</td></tr><tr><td>CVE-2026-20127/28/22</td><td>Cisco SD-WAN</td><td>High-Critical</td><td>All actively exploited</td><td>24 hours</td></tr></tbody></table>

    Action items

    • Patch VMware Aria Operations against CVE-2026-22719 immediately; if maintenance window required, restrict management interface to dedicated management VLAN with MFA-protected jump hosts
    • Apply Cisco Secure FMC patches for both CVSS 10/10 vulnerabilities and audit management interface exposure — no FMC web interface should be reachable from untrusted networks
    • Run emergency asset discovery for n8n instances across your environment — patch CVE-2026-27495 and remove all internet-exposed instances immediately
    • Patch Chrome fleet-wide and evaluate disabling Gemini AI panel via Chrome Enterprise policy unless explicitly risk-accepted

    Sources:VMware Aria & Cisco SD-WAN under active exploit while Iranian APTs burrow into US banks and airports · Cisco firewalls just gave attackers unauthenticated root · Five active exploits hit your network stack today · Cisco SD-WAN under active exploitation + Nemesis 2.2 · CVE-2026-0628 lets Chrome extensions hijack Gemini

  3. 03

    The Cline Attack Is a Landmark: AI Agents in Your SDLC Are Now Proven Supply Chain Weapons

    <h3>A New TTP Class Is Now Confirmed at Scale</h3><p>On <strong>February 17, 2026</strong>, an attacker crafted a prompt injection payload inside a GitHub issue title. An AI triage bot read it, interpreted the injected prompt as an instruction, and executed it — exfiltrating the project's <strong>npm publish token</strong>. The attacker used the stolen token to publish a trojanized Cline package to npm, installing the <strong>OpenClaw malware on approximately 4,000 developer machines</strong> before detection. A patch was deployed within 30 minutes of public disclosure, but critically, <strong>compromised API keys were not rotated</strong>, leaving a post-patch exploitation window.</p><blockquote>Every AI bot in your SDLC with access to secrets is a prompt injection away from becoming an insider threat — and the Cline attack just proved it at scale.</blockquote><hr><h3>Why This Matters Beyond One Incident</h3><p>The Cline attack establishes <strong>prompt injection against AI development automation</strong> as a proven initial access technique. Map it to MITRE ATT&CK: Supply Chain Compromise (T1195.002) via a novel sub-technique — using prompt injection against AI-powered bots to achieve Credential Access (T1552). The AI bot is both the vulnerability and the exploitation mechanism. This attack chain applies to <strong>every organization</strong> running AI triage bots, PR reviewers, or CI/CD agents that process untrusted user input and have access to secrets.</p><h3>Compounding Threat: GPT-5.4 Superhuman Desktop Control</h3><p>Released March 6, GPT-5.4 scored <strong>75% on OSWorld-Verified</strong> — above the 72.4% human baseline — for autonomous desktop navigation. Combined with a 1M-token context window and "x-high" reasoning enabling <strong>multi-hour autonomous execution</strong>, this means AI agents can now navigate operating systems, harvest credentials from password managers, perform GUI-based lateral movement (bypassing network-layer EDR), and execute patient low-and-slow operations at zero marginal cost. Your behavioral detection stack — keystroke cadence, session duration patterns, task timing — was <strong>calibrated against human operators</strong>. That calibration is now obsolete.</p><h3>Nemesis 2.2: Post-Compromise Credential Theft Automated</h3><p>Nemesis 2.2 now automates the <strong>complete Windows DPAPI decryption chain</strong> including Chrome 137+'s App-Bound Encryption bypass. It accepts SYSTEM masterkeys, user masterkeys, CNG keys, offline registry hives, LSASS dumps, and domain backup keys. The critical escalation: submitting a <strong>domain DPAPI backup key</strong> to Nemesis unlocks all existing and future masterkey blobs across the entire domain. This makes the domain backup key a Tier 0 asset — single point of compromise with retroactive and forward-looking impact.</p><h3>Chrome Extension Supply Chain: Zero Vetting on Ownership Transfers</h3><p>Research reveals Chrome extension developers can <strong>sell extensions to new owners with zero vetting by Google</strong>. The Quick Lens extension (7,000 users, Google-featured) was sold and immediately weaponized with C2 infrastructure, security stripping, and pixel-perfect man-in-the-browser capability — <strong>pushed silently via auto-update</strong>. Your extension allowlist is a point-in-time snapshot, not a continuous control.</p><hr><h3>The Pattern: AI Agents Are the New Unmanaged Principals</h3><p>Cursor's cloud agents run in full VMs with stored secrets, MCP integrations to Datadog and Slack, and can run for <strong>up to three continuous days</strong> creating PRs and tagging humans. Agent-generated code has already <strong>broken Cursor's own CI/CD pipeline</strong> under volume. The company is exploring agents that edit their own system prompts and plans to enable recursive agent spawning. Industry data shows 99% of dev teams use AI code assistants but only <strong>29% have formal AI security controls</strong> — a 70-point gap.</p>

    Action items

    • Hunt for Cline/OpenClaw exposure: query endpoint telemetry for Cline npm installations from mid-February 2026, force-rotate all API keys and tokens Cline had access to
    • Inventory every AI bot in your SDLC that processes untrusted input (issue titles, PR descriptions, commit messages) and has access to secrets — document each one's access scope and input sanitization posture
    • Protect your domain DPAPI backup key as a Tier 0 asset: restrict access to Domain Admins with PAW-enforced access and deploy SIEM alerts on any access to masterkey blob enumeration patterns
    • Conduct an emergency Chrome extension audit: cross-reference ownership/developer changes in the last 12 months and implement continuous monitoring for extension ownership transfers
    • Stress-test CI/CD security gates (SAST, SCA, secrets scanning) under 5-10x current PR volume to verify they don't silently fail under agent-generated load

    Sources:Prompt injection in a GitHub issue title just compromised 4,000 dev machines · Cline vuln left keys unrotated, memory poisoning persists jailbreaks · GPT-5.4 navigates desktops better than humans · CVE-2026-0628 lets Chrome extensions hijack Gemini · Cursor's Cloud Agents Just Gave Every Dev Root Access · Shai-Hulud worm hit your npm supply chain

◆ QUICK HITS

  • Update: Cisco SD-WAN now has 3 CVEs actively exploited (CVE-2026-20127, -20128, -20122) including a zero-day patched last week — read-only accounts can now overwrite arbitrary files

    Cisco SD-WAN under active exploitation + Nemesis 2.2

  • Update: Anthropic supply chain risk designation — Lockheed Martin confirmed compliance, 7 non-defense agencies (State, HHS, GSA, NASA, OPM, Treasury, ITA) dropped Claude; Anthropic suing Pentagon

    Anthropic declared a Pentagon 'supply chain risk'

  • Shai-Hulud worm compromised thousands of npm packages via self-propagating supply chain attack — Trigger's full post-mortem now available; audit package-lock.json against indicator list immediately

    Shai-Hulud worm hit your npm supply chain

  • ByteDance's Pangle SDK ships device fingerprints under fake encryption (AES key included in payload) in 40+ apps including Duolingo, BeReal, and Character.AI — GDPR exposure if your apps embed it

    Cisco SD-WAN under active exploitation + Nemesis 2.2

  • KodexGlobal law enforcement accounts selling for $2,000 each — enables unauthorized subpoenas and emergency data requests that your compliance team would process as legitimate

    VMware Aria & Cisco SD-WAN under active exploit while Iranian APTs burrow into US banks and airports

  • Malvertising surpassed email as primary malware delivery vector at 60% of all observed campaigns, with AI-generated deepfake ads accelerating the trend — DNS filtering and browser isolation now essential

    VMware Aria & Cisco SD-WAN under active exploit while Iranian APTs burrow into US banks and airports

  • State Dept official confirms China is actively executing harvest-now-decrypt-later campaigns — treat data with sensitivity horizons beyond 2030 as requiring post-quantum crypto migration now

    FBI surveillance systems targeted again

  • HHS elevated cybersecurity to parity with physical disasters via RISC 2.0 Toolkit aligned with NIST CSF 2.0 — healthcare orgs: complete the free assessment this quarter before it becomes mandatory

    FBI surveillance systems targeted again

  • Congress unanimously passed $250M in rural utility cybersecurity grants plus DOE cyber authority consolidation — energy sector MSSPs should pre-position for grant applications

    FBI surveillance systems targeted again

  • Shannon, an open-source AI pen-testing tool, scores 96.15% on XBOW benchmark and found 20+ vulns in OWASP Juice Shop — evaluate for red team use and assume adversaries will strip guardrails within 3-6 months

    Shannon AI pen-test tool scores 96% on XBOW

  • Wikipedia forced into read-only mode after mass admin account compromise — audit your own privileged accounts for phishing-resistant MFA and session token lifetime controls

    Wikipedia's mass admin compromise just validated every concern you have about privileged account sprawl

  • Proton Mail payment metadata helped FBI identify a user — E2E encryption protects content, not account identity; decouple payment from communication identity for sensitive channels

    Your vendor risk just shifted: Oracle cash crunch, Anthropic blacklisted, and a JS worm hit Wikipedia

BOTTOM LINE

Iranian cyber operators are confirmed inside US banks and airports with a new backdoor during a shooting war that has physically destroyed an AWS data center, your firewall management plane has two CVSS 10/10 vulnerabilities in the same advisory cycle, and a prompt injection in a GitHub issue title just proved that every AI bot with access to secrets is a supply chain weapon — the question isn't which to address first, it's whether your segmentation and hunt teams are already running.

Frequently asked

What IOCs and hunt priorities should I use for the Dindoor backdoor?
Use the IOCs published jointly by Broadcom/Symantec and Carbon Black, plus the C2 dumps released by Ctrl-Alt-Intel from misconfigured MuddyWater servers. Prioritize hunts in financial services, aviation, and non-profit environments, since Dindoor is confirmed present in at least one US bank, one airport, and one non-profit. Assume existing MuddyWater signatures miss it — Dindoor appears to replace or augment prior implants.
Does cyber insurance cover a drone strike on a cloud data center?
Probably not. Most policies contain war exclusion clauses — notably Lloyd's LMA5564/Y5381-style language covering state-backed attacks — which will almost certainly be invoked for the Iranian drone strike on AWS me-south-1 in Bahrain. Review your policy wording with your broker now, before a claim event, because the kinetic-on-cloud threshold has been crossed and insurers will test these clauses aggressively.
Which of today's vulnerabilities should get patched in the next 24 hours?
Three: VMware Aria Operations (CVE-2026-22719, unauthenticated RCE, CISA KEV, actively exploited 10 days after patch), both CVSS 10.0 flaws in Cisco Secure Firewall Management Center, and the actively exploited Cisco SD-WAN CVEs (CVE-2026-20127/20128/20122). n8n (CVE-2026-27495) and Chrome/Gemini (CVE-2026-0628) follow within 48 hours.
How is the Cline incident different from a normal npm supply chain attack?
The initial access was prompt injection via a GitHub issue title read by an AI triage bot, which then exfiltrated the npm publish token on the attacker's behalf. This makes the AI bot itself both the vulnerability and the exploitation mechanism — a new MITRE sub-technique combining Supply Chain Compromise (T1195.002) with Credential Access (T1552) driven by prompt injection. Any AI automation in your SDLC that reads untrusted input and holds secrets is exposed to the same pattern.
Why is the domain DPAPI backup key now a Tier 0 asset?
Because Nemesis 2.2 automates the full DPAPI decryption chain, including Chrome 137+ App-Bound Encryption bypass, and accepts a domain DPAPI backup key as input. Submitting that one key unlocks every existing and future masterkey blob across the entire domain — retroactive and forward-looking compromise from a single artifact. Restrict access to Domain Admins on privileged access workstations and alert on any masterkey enumeration.

◆ ALSO READ THIS DAY AS

◆ RECENT IN SECURITY