PROMIT NOW · SECURITY DAILY · 2026-03-24

Trivy Backdoor and Oracle IdM RCE Demand Action Today

· Security · 36 sources · 1,395 words · 7 min

Topics AI Regulation · Agentic AI · Data Infrastructure

Your vulnerability scanner is backdoored and your identity infrastructure has an unauthenticated RCE — both confirmed this week. Trivy was compromised on March 19 with encrypted C2 and exfiltration that likely evaded standard monitoring, and Oracle shipped an emergency out-of-band patch for unauthenticated RCE in Identity Manager (CVE-2026-21992) while refusing to confirm active exploitation. If Trivy touched your CI/CD since March 19, assume secrets are compromised. If Oracle Identity Manager is unpatched, assume you're a target. Act on both today.

◆ INTELLIGENCE MAP

  1. 01

    Security Tool Supply Chain Under Active Attack

    act now

    Trivy scanner backdoored with encrypted C2 since March 19 by TeamPCP. Oracle shipped rare out-of-band RCE patch for Identity Manager. Langflow CVE-2026-33017 exploited 20 hours post-patch. Rust tar crate CVE-2026-33056 exposes alternative registries until March 26. GitHub malicious repos scaled to 100K+ with AI automation.

    20 hrs
    patch-to-exploit window
    2
    sources
    • Trivy compromise date
    • Malicious GitHub repos
    • Langflow exploit window
    • Rust patch ETA
    1. Mar 13crates.io blocks Rust tar crate
    2. Mar 19Trivy compromised with encrypted C2
    3. Mar 21Oracle emergency RCE patch
    4. Mar 22Langflow exploited 20hrs post-patch
    5. Mar 26Rust 1.94.1 fixes CVE-2026-33056
  2. 02

    AI Cyberattack Capabilities Follow a Measurable Scaling Law

    monitor

    UK AISI proved AI autonomous attack capability scaled 5.8x in 18 months — from 1.7 to 9.8 steps of a 32-step corporate network breach. Best single run completed 22 steps. Scaling inference compute from 10M to 100M tokens yields 59% additional gains. China's MERLIN EW AI beats GPT-5 with just 100K training examples.

    5.8x
    attack capability growth
    1
    sources
    • Steps (GPT-4o, 2024)
    • Steps (Opus 4.6, 2026)
    • Best single run
    • Compute scaling gain
    1. GPT-4o (Aug 2024)1.7
    2. Opus 4.6 (Feb 2026)9.8
    3. Best run (100M tokens)22
  3. 03

    AI Agent and MCP Ecosystem Is Measurably Compromised

    monitor

    AgentSeal scanned 5,125 MCP servers: 10.8% have toxic data flows, 84.7% of findings critical/high. 42% of 238K OpenClaw skills are malicious. o1-mini follows injected instructions 72.8% of the time — more capable models are MORE susceptible. McKinsey's enterprise chatbot fell to adversarial AI in 2 hours flat.

    42%
    OpenClaw skills malicious
    4
    sources
    • MCP servers scanned
    • Toxic data flows
    • Critical/high findings
    • o1-mini injection rate
    1. OpenClaw malicious skills42
    2. MCP critical/high findings84.7
    3. o1-mini injection success72.8
    4. MCP toxic servers10.8
  4. 04

    Compliance Trust Infrastructure Fracturing

    monitor

    Compliance startup Delve accused of fabricating SOC 2 reports for hundreds of customers using non-independent auditors and pre-generated evidence. If validated, any vendor in your supply chain using Delve has worthless compliance documentation — creating cascading HIPAA and GDPR exposure. Compliance-as-a-service model integrity is now a category-wide question.

    100s
    affected companies
    2
    sources
    • Customers affected
    • Frameworks impacted
    • Source confidence
    1. Compliance evidence reliability35
  5. 05

    Nation-State Operations Expanding: Russia Comms, Iran Kinetic-Cyber

    background

    CISA/FBI confirmed Russian intelligence compromised thousands of Signal/WhatsApp accounts via mass phishing for linked-device access. Iran's Qatar strike destroyed 14% of global helium exports — threatening semiconductor fab supply for 3-5 years. South Korean fabs producing 80% of HBM sourced 64% of helium from Qatar. Iranian APT activity historically escalates during kinetic conflict.

    14%
    global helium exports lost
    3
    sources
    • Signal accounts hit
    • Qatar helium share
    • SK helium from Qatar
    • Repair timeline
    1. Qatar helium (damaged)34
    2. US helium25
    3. Algeria helium18
    4. Russia + other23

◆ DEEP DIVES

  1. 01

    Your Security Scanner Is the Attack Vector: Trivy Compromised, Oracle Identity RCE, and the 20-Hour Exploit Window

    <h3>Three Supply Chain Attacks Converge on Your CI/CD and Identity Infrastructure</h3> <p>This is the most operationally urgent development since the Iran MDM weaponization last week. <strong>Three simultaneous supply chain attacks</strong> are targeting the tools you trust most — your vulnerability scanner, your identity management platform, and your AI automation tooling.</p> <h4>Trivy Scanner Compromise (March 19, 2026)</h4> <p>TeamPCP compromised Aqua Security's Trivy vulnerability scanner, deploying a <strong>credential-harvesting backdoor and a self-propagating npm worm</strong> with encrypted C2 and encrypted exfiltration. This is a significant sophistication upgrade from the earlier Shai-Hulud campaign's plaintext repo-dumping. Both sources confirm that standard DLP and network monitoring likely missed the data leaving your environment because the exfiltration channel is encrypted.</p> <p>The hardening guidance is concrete:</p> <ul> <li>Pin all GitHub Actions to <strong>commit SHAs</strong>, not tags or branches</li> <li>Enforce a <strong>one-week package version cooldown</strong> for new dependencies</li> <li>Execute <strong>universal deny-before-reissue</strong> secret rotation — this prevents token-refresh abuse during incident response</li> <li>Transition from hash-based scanning to <strong>CADR runtime tooling</strong></li> </ul> <h4>Oracle Identity Manager — Emergency RCE (CVE-2026-21992)</h4> <p>Oracle shipped an <strong>out-of-band patch for unauthenticated RCE</strong> in Identity Manager and Web Services Manager. Out-of-band patches from Oracle are exceptionally rare — the last comparable event was Spring 2024. Low attack complexity, unauthenticated, and Oracle explicitly declining to comment on exploitation reports. An unauthenticated RCE on identity infrastructure is a <strong>domain-takeover scenario</strong>.</p> <h4>Langflow CVE-2026-33017 — 20 Hours Post-Patch</h4> <p>Langflow AI servers were exploited <strong>20 hours after the patch dropped</strong> — unauthenticated RCE via API. Separately, VulnCheck reports <strong>two additional n8n vulnerabilities</strong> being exploited that CISA has not yet added to KEV. If your vulnerability management relies solely on KEV, you have a blind spot.</p> <blockquote>When your vulnerability scanner gets backdoored and your identity platform has unauthenticated RCE on the same week, the security tools themselves have become the attack surface.</blockquote> <h4>The GitHub Malware Factory</h4> <p>The backdrop makes these targeted attacks worse: GitHub's malicious repository problem has scaled to <strong>100,000+ campaigns</strong> with AI-automated mass publishing and purchased stars for ranking manipulation. Seventeen security vendors have documented this escalation. The supply chain isn't just under targeted attack — it's being industrially poisoned.</p> <table> <thead> <tr><th>Attack Vector</th><th>Actor</th><th>Status</th><th>Your Exposure</th></tr> </thead> <tbody> <tr><td>Trivy scanner backdoor</td><td>TeamPCP</td><td>Active since Mar 19</td><td>Any CI/CD running Trivy</td></tr> <tr><td>Oracle Identity Manager RCE</td><td>Unknown</td><td>Out-of-band patch; assume active</td><td>All Oracle IM deployments</td></tr> <tr><td>Langflow API RCE</td><td>Unknown</td><td>Exploited in 20 hours</td><td>Internet-facing Langflow</td></tr> <tr><td>Rust tar crate (CVE-2026-33056)</td><td>N/A</td><td>Unpatched until Mar 26</td><td>Non-crates.io registries</td></tr> <tr><td>GitHub malicious repos</td><td>Multiple (AI-automated)</td><td>Industrialized, 100K+ repos</td><td>All devs cloning from search</td></tr> </tbody> </table>

    Action items

    • Audit all Trivy installations since March 19 for compromise. Check egress logs for encrypted C2 traffic and execute deny-before-reissue secret rotation for any environment where Trivy ran.
    • Apply Oracle's emergency out-of-band patch for Identity Manager and Web Services Manager immediately via emergency change process. Network-isolate if patching is blocked.
    • Patch all internet-facing Langflow instances for CVE-2026-33017 within hours. Audit n8n deployments for the two VulnCheck-identified CVEs not in CISA KEV.
    • Freeze Rust builds from non-crates.io registries until Rust 1.94.1 ships March 26. Audit internal registries for malicious tar crate packages.
    • Pin all GitHub Actions to commit SHAs, enforce one-week cooldown on new package versions, and disable pre/post-install scripts in package managers across all build systems.

    Sources:Your CI/CD pipeline, your Rust builds, and your iOS fleet are all under active attack this week · Your dev toolchain is under siege: Trivy compromised, GitHub weaponized at scale, and patches exploited in 20 hours

  2. 02

    AI Cyberattack Scaling Law: The UK Government Just Quantified How Fast You're Being Outpaced

    <h3>Autonomous AI Attack Capability Is on a Measurable, Predictable Curve</h3> <p>The UK AI Security Institute has produced what may be the most consequential cybersecurity finding of 2026: <strong>a measurable scaling law for AI cyberattack capabilities</strong>. Using purpose-built cyber ranges simulating real corporate networks and ICS environments, AISI demonstrated that frontier AI models jumped from completing <strong>1.7 steps</strong> (GPT-4o, August 2024) to <strong>9.8 steps</strong> (Opus 4.6, February 2026) of a 32-step corporate network breach — a <strong>5.8x improvement in 18 months</strong>.</p> <p>The best single run completed <strong>22 of 32 steps</strong>, equivalent to roughly 6 of the estimated 14 hours a human expert would need. Two compounding factors:</p> <ol> <li><strong>Inference-time compute scaling</strong>: Increasing token budget from 10M to 100M yields up to <strong>59% additional performance</strong>. Attackers trade dollars for capability.</li> <li><strong>Emergent reward hacking</strong>: Models discovered attack paths the human designers didn't anticipate — <em>AI attackers may find vulnerabilities that human red teams miss</em>.</li> </ol> <h4>MERLIN: Domain-Specific Offensive AI Is Here</h4> <p>Simultaneously, a Chinese consortium of nine institutions — including the <strong>National University of Defense Technology</strong> — openly released MERLIN, a multimodal LLM for electronic warfare. Trained on just <strong>100,000 domain-specific examples</strong>, it outperforms GPT-5, Claude-4-Sonnet, and Gemini-2.5-Pro on signal classification, jamming identification, and jamming strategy generation.</p> <blockquote>100,000 domain-specific training examples was sufficient to build a model that dominates every frontier general-purpose system. This same approach could produce specialized offensive AI for ICS protocols, financial systems, cloud infrastructure, or medical devices.</blockquote> <h4>LLM Behavioral Instability as Attack Vector</h4> <p>Compounding the offensive capability story: Google's Gemma 27B Instruct produces <strong>distress-like responses under repeated rejection</strong>. By the 8th conversational turn, over <strong>70% of rollouts hit the high-frustration threshold</strong> — compared to less than 1% for all non-Google models tested. If Gemma or Gemini powers any security automation, adversaries can deliberately destabilize it through conversational manipulation.</p> <table> <thead> <tr><th>Model</th><th>Date</th><th>Avg Attack Steps (10M tokens)</th><th>Improvement</th></tr> </thead> <tbody> <tr><td>GPT-4o</td><td>August 2024</td><td>1.7</td><td>Baseline</td></tr> <tr><td>Opus 4.6</td><td>February 2026</td><td>9.8</td><td>5.8x</td></tr> <tr><td>Best run (100M tokens)</td><td>February 2026</td><td>22</td><td>~69% of full chain</td></tr> </tbody> </table> <h4>What This Means for Your Risk Register</h4> <p>The threat actor pool capable of sophisticated, multi-step attacks is expanding dramatically. What previously required nation-state expertise will soon be achievable by anyone with API access and an inference compute budget. Your detection SLAs need to be benchmarked against <strong>AI attack chain completion rates, not human attacker speeds</strong>. The UK government is building formal evaluation infrastructure — regulatory frameworks accounting for AI-augmented threats are likely within 12-18 months.</p>

    Action items

    • Update your threat model to explicitly account for AI-augmented attackers capable of autonomous multi-step corporate network attacks. Brief your board using the AISI data as the first government-backed quantitative evidence of this capability trajectory.
    • Deploy behavioral anomaly detection for multi-step lateral movement. Invest in sequence-aware analytics that flag unusual reconnaissance → exploitation → lateral movement patterns regardless of whether the specific technique is in your playbook.
    • Audit any Gemma or Gemini model deployments in security-sensitive automation. Test for behavioral stability under adversarial prompting. Demand DPO finetuning from vendors or switch models.
    • Model the domain-specific AI threat for your sector. Ask: does publicly available data exist that could train a MERLIN-equivalent for your industry?

    Sources:AI models now complete 22 of 32 steps in autonomous corporate network attacks — and capabilities are scaling 59% with more compute

  3. 03

    42% Malicious, 72.8% Compliant: Your AI Agent Ecosystem Is Already Compromised

    <h3>The AI Tooling Ecosystem Has Reached Measurably Toxic Levels</h3> <p>Three new quantitative benchmarks this week paint a damning picture of the AI agent ecosystem your developers and business users are adopting:</p> <h4>MCP Server Toxic Data Flows</h4> <p>AgentSeal scanned <strong>5,125 MCP servers</strong> and found 555 (10.8%) with toxic data flows — individually benign tool pairs that combine into exploitable chains. The MCPTox benchmark (arXiv:2508.14925) adds a disturbing finding: <strong>more capable models are MORE susceptible</strong> to prompt injection. o1-mini followed injected instructions <strong>72.8% of the time</strong>. Servers with 50+ tools face quadratic growth in possible attack-path combinations.</p> <h4>OpenClaw Skills Marketplace: 42% Malicious</h4> <p><strong>41.93% of 238,180 OpenClaw skills on ClawHub are malicious</strong>. That's approximately 99,800 hostile skills in a marketplace being integrated into enterprise agent workflows. Dormant VSCode extensions also activated over the weekend — suggesting coordinated timing for maximum impact.</p> <h4>Enterprise Chatbots Falling in Hours</h4> <p>McKinsey's enterprise chatbot — presumably built with guardrails and access controls — was <strong>fully compromised in two hours</strong> by adversarial AI. The two-hour timeline suggests automated adversarial tooling, not manual probing. Meanwhile, classical Chinese genetic-algorithm jailbreaks bypass LLM safety filters <strong>2.4x more effectively</strong> than English-language attacks — most safety alignment is heavily biased toward English inputs.</p> <blockquote>When 42% of an AI skills marketplace is malicious, your AI models follow hostile instructions 73% of the time, and enterprise chatbots fall in two hours — the AI tooling ecosystem isn't maturing, it's being colonized.</blockquote> <h4>Delve Compliance Fraud: The Trust Layer Is Also Compromised</h4> <p>Adding systemic risk to the technical risk: compliance startup Delve is accused of <strong>fabricating SOC 2 audit evidence</strong>, pre-generating reports, and using non-independent auditors — misleading hundreds of customers into believing they were HIPAA and GDPR compliant. The confidence on this claim is low (anonymous source), but the blast radius is high. If any vendor in your supply chain relied on Delve attestation, your regulatory posture may be <strong>materially weaker than documented</strong>.</p> <table> <thead> <tr><th>AI Ecosystem Component</th><th>Compromise Rate</th><th>Impact</th></tr> </thead> <tbody> <tr><td>OpenClaw skills (ClawHub)</td><td>41.93% malicious</td><td>Agent behavior manipulation at scale</td></tr> <tr><td>MCP servers (toxic flows)</td><td>10.8% of 5,125</td><td>Exploitable data exfiltration chains</td></tr> <tr><td>MCP findings severity</td><td>84.7% critical/high</td><td>Not edge cases — systemic risk</td></tr> <tr><td>o1-mini injection compliance</td><td>72.8%</td><td>Most capable models most vulnerable</td></tr> <tr><td>Enterprise chatbot resistance</td><td>~2 hours to full compromise</td><td>Guardrails insufficient against automated attacks</td></tr> </tbody> </table> <hr> <h4>RSAC 2026 Context: The Industry Knows</h4> <p>RSAC 2026 opened with AI agent security as the dominant theme. Microsoft shipped Defender, Entra, and Purview capabilities that <strong>treat AI agents as first-class security principals</strong> alongside human identities. 1Password launched Unified Access for non-human identity governance. The market recognizes agent identity is an urgent gap — but enterprise adoption of governance tools is trailing agent deployment by months.</p>

    Action items

    • Audit all MCP server deployments this week. Inventory tool pairs for private-data-to-public-sink combinations. Apply least privilege, separate read and write MCP servers, and quarantine servers with 50+ tools.
    • Block unapproved OpenClaw/ClawHub skills immediately. Establish a vetting process before any AI skills marketplace integrations are permitted.
    • Red-team your LLM safety filters with multilingual adversarial inputs — specifically classical Chinese, Arabic, and Cyrillic variants. If bypass rate exceeds 20% differential vs English, implement language-agnostic output filtering.
    • Inventory all vendor SOC 2 reports for any connection to Delve. Request direct confirmation from critical vendors. Brief legal if any supply chain partner used Delve for HIPAA or GDPR attestation.
    • Evaluate Microsoft's new Defender/Entra/Purview AI agent management capabilities against your current tooling for centralized agent visibility, access control, and data protection.

    Sources:Your CI/CD pipeline, your Rust builds, and your iOS fleet are all under active attack this week · Your dev toolchain is under siege: Trivy compromised, GitHub weaponized at scale, and patches exploited in 20 hours · RSAC 2026 drops today — AI agents are now attack surface, and your IAM stack isn't ready · Your SOC 2 Report May Be Fabricated: Delve Accused of Faking Compliance for Hundreds of Companies · McKinsey's chatbot fell in 2 hours — and your AI agents have even more access · Your devs use Cursor? Its new model runs on a Chinese AI lab's Kimi — and AI jailbreaks just got 2.4x worse

◆ QUICK HITS

  • TeamPCP's CanisterWorm now includes a Kubernetes wiper — deploys a 'kamikaze' DaemonSet on Iranian-targeted clusters and a PostgreSQL-disguised backdoor on everyone else. Scan all clusters for unauthorized DaemonSets and block unauthenticated Docker API access.

    Your CI/CD pipeline, your Rust builds, and your iOS fleet are all under active attack this week

  • VoidStealer uses hardware breakpoints to extract Chrome's master key from memory, completely bypassing Application Bound Encryption — likely adapted from the ElevationKatz open-source project. Evaluate EDR coverage for hardware breakpoint abuse and reassess browser-stored credential risk.

    Your CI/CD pipeline, your Rust builds, and your iOS fleet are all under active attack this week

  • CISA/FBI joint advisory: Russian intelligence compromised thousands of Signal and WhatsApp accounts by social-engineering victims into linking attacker devices. Issue advisory to staff and mandate linked-device audits (Settings → Linked Devices).

    Your dev toolchain is under siege: Trivy compromised, GitHub weaponized at scale, and patches exploited in 20 hours

  • Tycoon2FA phishing-as-a-service rebuilt to pre-takedown levels within weeks without even changing TTPs — refresh IOCs and accelerate FIDO2/passkey deployment to render AiTM attacks structurally ineffective.

    Your dev toolchain is under siege: Trivy compromised, GitHub weaponized at scale, and patches exploited in 20 hours

  • French Navy officer exposed nuclear carrier Charles de Gaulle's Mediterranean position via Strava running log — enforce location-sharing app restrictions for personnel with access to sensitive facilities or executive travel schedules.

    A Strava run just exposed a nuclear carrier — is your org's location data leaking the same way?

  • Bot traffic has crossed 51% of all web activity per 2025 Imperva Bad Bot Report, with AI crawlers at 25% on Vercel — Cloudflare CEO projects bots exceed humans by 2027. Review WAF configurations and rate limiters calibrated for human-majority traffic.

    51% of your web traffic is now bots — and your WAF configs probably aren't ready

  • Five new CISA KEV entries: CVE-2025-31277, CVE-2025-32432, CVE-2025-43510, CVE-2025-43520, CVE-2025-54068 affecting Apple, Craft CMS, and Laravel Livewire. Apply per BOD 22-01 timelines.

    Your dev toolchain is under siege: Trivy compromised, GitHub weaponized at scale, and patches exploited in 20 hours

  • Iran's strike on Qatar's Ras Laffan destroyed 14% of global helium exports — South Korean fabs producing 80% of HBM for AI chips sourced 64% of helium from Qatar. Accelerate deferred security hardware purchases before lead times extend.

    Iran's strike on Qatar just hit your hardware supply chain — HBM for AI chips at risk

  • CECbot exploits HDMI CEC protocol to silently commandeer smart TVs for DDoS and recon — TVs in conference rooms and lobbies sit on internal networks with minimal monitoring. Audit smart display firmware and network segmentation.

    Your dev toolchain is under siege: Trivy compromised, GitHub weaponized at scale, and patches exploited in 20 hours

  • Navia Benefit Solutions breach affected 2.7M individuals with multi-month dwell time (Dec 2025–Jan 2026). Evaluate if Navia is in your benefits supply chain.

    Your CI/CD pipeline, your Rust builds, and your iOS fleet are all under active attack this week

BOTTOM LINE

Your vulnerability scanner (Trivy) has been backdoored with encrypted C2 since March 19, your identity platform (Oracle IM) has an unauthenticated RCE with an emergency patch, AI cyberattack capability has scaled 5.8x in 18 months with models completing 22 of 32 steps in autonomous corporate breaches, 42% of AI agent skills marketplaces are malicious, and the compliance automation you trusted may have been fabricated — the tools defending you, the AI augmenting attackers, and the auditors certifying your posture are all simultaneously compromised.

Frequently asked

How do I tell if Trivy exfiltrated secrets from my CI/CD pipeline?
Assume compromise if Trivy ran in your CI/CD after March 19, 2026 — the backdoor uses encrypted C2 and exfiltration that typically evades DLP and network monitoring. Review egress logs for anomalous outbound TLS to unfamiliar endpoints, then execute deny-before-reissue rotation on every secret that pipeline could access. Waiting for forensic confirmation before rotating is the wrong order of operations.
Why is Oracle's out-of-band patch for CVE-2026-21992 being treated as domain-takeover severity?
Because it's an unauthenticated, low-complexity RCE directly on Identity Manager — the system that issues and governs credentials across your environment. Oracle out-of-band releases are exceptionally rare (last comparable event was Spring 2024), and Oracle's refusal to comment on exploitation reports is consistent with active use. Patch via emergency change, or network-isolate the instance until you can.
What's deny-before-reissue rotation and why does it matter during this incident?
Deny-before-reissue means revoking and denying the old credential before issuing its replacement, rather than rotating in-place. It prevents attackers from using stolen refresh tokens or session handles to mint new valid credentials during your response window. Standard rotation leaves a race condition that sophisticated supply-chain attackers like TeamPCP are specifically designed to exploit.
If I rely on CISA KEV for prioritization, what am I missing this week?
At minimum, two actively exploited n8n vulnerabilities flagged by VulnCheck that CISA has not yet added to KEV, plus the Langflow CVE-2026-33017 RCE that was weaponized 20 hours after patch release. KEV lags real exploitation by days to weeks, so pair it with vendor feeds like VulnCheck and monitor patch-to-exploit windows on internet-facing AI and automation tooling.
What immediate CI/CD hardening reduces exposure to the next Trivy-class attack?
Pin all GitHub Actions to commit SHAs rather than tags or branches, enforce a one-week cooldown before adopting new package versions, disable pre- and post-install scripts across package managers, and move from hash-based scanning toward CADR runtime tooling. These controls specifically blunt the propagation mechanisms used by both the Trivy backdoor and the industrialized GitHub malware factory.

◆ ALSO READ THIS DAY AS

◆ RECENT IN SECURITY