PROMIT NOW · SECURITY DAILY · 2026-03-28

MDM Consoles Become Top Attack Vector in Three Breaches

· Security · 44 sources · 1,571 words · 8 min

Topics Data Infrastructure · Agentic AI · AI Regulation

MDM platforms became this week's most devastating attack vector across three simultaneous incidents: Iranian hackers weaponized Microsoft Intune to wipe 200,000+ Stryker medical devices (cancelling surgeries), attackers breached Luxembourg's government MDM to push malware to 4,850+ phones, and two Ivanti EPMM zero-days (CVE-2026-1281, CVE-2026-1340) are confirmed actively exploited with WithSecure already running incident response. If your MDM admin console isn't hardened to domain-controller standards with phishing-resistant MFA and multi-party approval for bulk operations, you are one compromised admin from losing your entire managed fleet.

◆ INTELLIGENCE MAP

  1. 01

    MDM Platforms Weaponized in Three Simultaneous Attacks

    act now

    MDM emerged as a Tier 0 attack surface this week. Iranian actors wiped 200K+ Stryker devices via Intune, Luxembourg's gov MDM pushed malware to 4,850 phones, and Ivanti EPMM zero-days (CVE-2026-1281/1340) are under active exploitation. Your MDM is god-mode to every endpoint — treat it like Active Directory.

    200K+
    devices wiped via Intune
    4
    sources
    • Stryker devices wiped
    • Luxembourg devices hit
    • Ivanti EPMM zero-days
    • MDM incidents this week
    1. Stryker (Intune)200000
    2. Luxembourg (Gov MDM)4850
    3. Ivanti EPMM0
  2. 02

    PolyShell: WebRTC Exfiltration Bypassing Your Entire HTTP Stack

    act now

    PolyShell RCE is mass-exploiting Magento/Adobe Commerce, exfiltrating payment data via WebRTC DataChannels over DTLS-encrypted UDP. CSP, WAF, and HTTP DLP are all blind. 56.7% of vulnerable stores already compromised since March 19. No production patch — only beta 2.4.9-beta1.

    56.7%
    stores compromised
    2
    sources
    • Stores compromised
    • Exploitation started
    • Patch status
    • Exfil port
    1. Vulnerable stores compromised57
  3. 03

    Social Engineering Rewritten: ClickFix Goes Cross-Platform + Voice Cloning Hits Zero Cost

    monitor

    ClickFix is now the dominant malware delivery mechanism across five separate threat clusters including DPRK and Russia-linked actors, spanning Windows and macOS. Simultaneously, Mistral's open-weight Voxtral TTS clones any voice from 5 seconds of audio, runs locally on 3GB RAM with zero audit trail. Voice-based auth and verification are now broken by design.

    5
    ClickFix threat clusters
    5
    sources
    • ClickFix clusters
    • Voice clone threshold
    • Voxtral languages
    • Voxtral latency
    1. 01Scarlet GoldfinchClickFix migration
    2. 02Contagious Interview (DPRK)EtherRAT delivery
    3. 03Unknown cluster (Infiniti)macOS stealer
    4. 04Cluster 4Multiple payloads
    5. 05Cluster 5Multi-platform
  4. 04

    AI Development Pipeline: New Injection Vectors from MCP to SQL

    monitor

    Context Hub MCP server has zero sanitization — 59.8% of PRs merged, enabling poisoned docs to trick AI coding agents into installing malicious packages. LLM-to-database integrations create a new SQL injection primitive via prompt injection. Stripe/Ramp/Visa agent CLIs auto-provision credentials outside IAM. OpenClaw accumulated 104 CVEs in 18 days.

    59.8%
    poisoned PRs merged
    6
    sources
    • Context Hub merge rate
    • OpenClaw CVEs in 18d
    • Agent CLI vendors
    • M365 tenants hit
    1. OpenClaw (18 days)104
    2. LangChain (lifetime)3
    3. Ollama (lifetime)1
  5. 05

    APT Tooling Evolution: BPFdoor, PRISMEX, and VoidLink Go Public

    background

    Rapid7 calls Red Menshen's new BPFdoor variants on telecom backbones 'the most advanced malware our team has ever seen' — kernel-level BPF persistence invisible to standard EDR. APT28 deployed new PRISMEX framework against Ukraine defense supply chain and 6 NATO governments. VoidLink cloud-native Linux rootkit source code leaked publicly.

    3
    new APT frameworks
    5
    sources
    • BPFdoor target
    • PRISMEX targets
    • VoidLink status
    • Bearlyfy attacks
    1. 01BPFdoor (Red Menshen)Extreme
    2. 02PRISMEX (APT28)High
    3. 03VoidLink (leaked)High
    4. 04BRUSHWORMHigh

◆ DEEP DIVES

  1. 01

    MDM Is Now a Weapon: Three Attacks Prove Your Device Management Platform Needs Domain-Controller Hardening

    <h3>Three Incidents, One Lesson: MDM = God Mode</h3><p>In a single intelligence cycle, <strong>three separate MDM platform compromises</strong> demonstrated that device management infrastructure has crossed from IT convenience tool to crown-jewel attack surface. The pattern is unmistakable: compromise one admin console, own the entire fleet.</p><hr><h4>The Three Incidents</h4><table><thead><tr><th>Incident</th><th>Vector</th><th>Impact</th><th>Status</th></tr></thead><tbody><tr><td><strong>Stryker (Medtech)</strong></td><td>Iranian hackers compromised Microsoft Intune admin access</td><td>200,000+ devices wiped; surgeries cancelled; hospitals fell back to radios</td><td>Post-incident; Palo Alto Unit 42 cleared</td></tr><tr><td><strong>Luxembourg Government</strong></td><td>MDM platform breached, malware pushed to fleet</td><td>4,850+ phones/tablets infected across public sector</td><td>Remediated</td></tr><tr><td><strong>Ivanti EPMM Victims</strong></td><td>CVE-2026-1281 and CVE-2026-1340 (zero-days)</td><td>Full device management compromise; active IR at multiple orgs</td><td>Active exploitation; patches available</td></tr></tbody></table><h4>Why This Changes Your Risk Calculus</h4><p>MDM platforms can <strong>install software, change configurations, wipe devices, and push certificates</strong> to every managed endpoint. The Stryker attack weaponized Intune's legitimate device wipe capability — attackers didn't need to deploy malware to 200,000 endpoints. They pressed one button. The Luxembourg breach demonstrates the inverse: MDM used as a <strong>malware delivery mechanism</strong> to thousands of devices simultaneously.</p><blockquote>Your MDM admin console has the same blast radius as your domain admin account — but most organizations protect it with the same MFA they use for email.</blockquote><p>WithSecure's incident response findings from the Ivanti EPMM zero-days are particularly concerning because these are <strong>post-compromise IR reports</strong> — organizations were breached <em>before</em> patches existed. Ivanti's recurring zero-day pattern (EPMM, Connect Secure, Policy Secure) makes any Ivanti deployment a persistent concern requiring continuous validation, not just patch-and-forget.</p><h4>The Stryker Details Matter</h4><p>Iranian state hackers initially denied any malware involvement, but Stryker walked that back — <strong>malicious files were used to cover tracks</strong> during the Intune exploitation. The real-world consequences were severe: Maryland hospitals lost communications entirely, falling back to radios. Surgeries were cancelled because implant inventory systems were destroyed. This is a <strong>healthcare safety incident</strong> triggered through IT infrastructure compromise, demonstrating how MDM attacks have kinetic consequences in clinical environments.</p><hr><h4>Cross-Source Pattern</h4><p>Four independent intelligence sources corroborate this convergence. The consistency across sources — each independently highlighting MDM as this week's defining threat — reinforces that this isn't an isolated event but a <strong>systemic shift in attacker targeting</strong>. MDM platforms are now on adversary playbooks as Tier 0 targets.</p>

    Action items

    • Enforce phishing-resistant MFA (FIDO2/passkeys) on all MDM admin consoles — Intune, JAMF, VMware Workspace ONE, Ivanti EPMM — by end of week
    • Implement multi-party approval for all bulk MDM operations (wipe, retire, reset, mass policy push) exceeding 10 devices
    • Patch Ivanti EPMM for CVE-2026-1281 and CVE-2026-1340 immediately, then run IOC-based threat hunt using WithSecure's published findings
    • Reclassify your MDM platform as a Tier 0 asset in your incident response playbook, equivalent to domain controllers and identity providers

    Sources:Your CI/CD security scanner just became the attack vector: Trivy compromise chains into 3.4M-download LiteLLM · Your MDM is now an attack vector, your supply chain has TeamPCP in it, and Ivanti has two more zero-days · Your MDM platform is now an attack vector, your supply chain has new compromises, and Ivanti has two more zero-days — act now · Your CI/CD pipeline may already be compromised: Trivy supply chain attack hits 1,000+ SaaS environments

  2. 02

    PolyShell: The Magecart Campaign Your WAF Literally Cannot See

    <h3>WebRTC Exfiltration Breaks HTTP-Centric Security</h3><p>A mass exploitation campaign called <strong>PolyShell</strong> is actively compromising Magento Open Source and Adobe Commerce stores using a technique that exposes a <strong>fundamental architectural blind spot</strong> in HTTP-layer security. The numbers are stark: <strong>56.7% of vulnerable stores</strong> have been compromised since mass exploitation began March 19, and no production patch exists.</p><hr><h4>The Technical Breakthrough</h4><p>PolyShell starts with an <strong>unauthenticated RCE vulnerability</strong> — standard Magecart territory. What makes this campaign exceptional is the exfiltration channel. After initial compromise, the skimmer establishes <strong>WebRTC peer connections</strong> to <code>202.181.177[.]177</code> over <strong>DTLS-encrypted UDP port 3479</strong>, retrieves payment-harvesting JavaScript, and exfiltrates stolen card data through the same channel.</p><p>This is architecturally significant because WebRTC DataChannels operate <strong>outside the HTTP protocol entirely</strong>:</p><ul><li><strong>Content Security Policy</strong> directives don't apply to WebRTC connections</li><li><strong>WAF rules</strong> can't inspect non-HTTP traffic</li><li><strong>HTTP-based DLP</strong> never sees the payload delivery or data exfiltration</li><li><strong>Proxy-based inspection</strong> has no visibility into DTLS-encrypted UDP</li></ul><blockquote>This isn't a misconfiguration — it's a fundamental limitation of HTTP-layer security controls when facing non-HTTP protocols. Your security architecture has a protocol-layer blind spot.</blockquote><h4>The Patch Gap</h4><p>The fix exists only in <strong>Magento 2.4.9-beta1</strong>, released March 10 — nine days before mass exploitation began. It has <strong>not reached production</strong>. This creates a patch gap that attackers are exploiting at industrial scale. Organizations running Magento in PCI scope face a dual crisis: active compromise <em>and</em> the inability to deploy a vendor-supported fix.</p><h4>What This Means Beyond Magento</h4><p>Even if you don't run Magento, PolyShell demonstrates a vector your red team should test: <strong>WebRTC-based exfiltration from any web application</strong>. Any browser-based application that an attacker can inject JavaScript into could theoretically use WebRTC DataChannels to exfiltrate data through a channel your monitoring stack was never designed to see. This is the next evolution of browser-based attack techniques.</p>

    Action items

    • If running Magento/Adobe Commerce: block access to pub/media/custom_options/ and scan all web-accessible directories for web shells immediately
    • Deploy network monitoring for WebRTC/DTLS connections to 202.181.177[.]177 on UDP port 3479 across all e-commerce infrastructure
    • Document compensating controls for PCI DSS compliance if unable to deploy the beta patch
    • Commission a network-layer visibility assessment for non-HTTP exfiltration channels (WebRTC, QUIC, DNS tunneling) across your web application estate this quarter

    Sources:PolyShell is actively draining payment data from 57% of unpatched Magento stores — and your WAF can't see it · Your AI toolchain is leaking secrets: LangChain, Claude Extension, and BPFDoor all hit in one day

  3. 03

    Social Engineering's New Arsenal: ClickFix Goes Cross-Platform While Voice Cloning Hits Zero Cost

    <h3>Two Converging Shifts Rewrite Your Human-Layer Defenses</h3><p>The social engineering landscape underwent two simultaneous step-function changes this week. <strong>ClickFix</strong> has been adopted by five separate threat actor clusters across nation-state, criminal, and hacktivist categories — becoming the dominant malware delivery mechanism of 2026. Simultaneously, <strong>open-weight voice cloning</strong> crossed the quality threshold where a 3-5 second audio clip produces speech that beats commercial offerings in human preference tests — and runs locally for free.</p><hr><h4>ClickFix: The New Default</h4><p>Recorded Future documented <strong>five separate threat actor clusters</strong> using ClickFix campaigns. Red Canary profiled <strong>Scarlet Goldfinch</strong> migrating from fake browser updates to ClickFix. New malware delivered this week includes <strong>Infiniti Stealer</strong> (macOS, Malwarebytes) and <strong>EtherRAT</strong> (DPRK's Contagious Interview, eSentire). The technique — tricking users into pasting attacker-controlled commands into their terminal — has achieved <strong>cross-ecosystem adoption across Windows, macOS</strong>, and multiple threat actor categories.</p><p>ClickFix bypasses your email security stack because the <strong>payload execution originates from the user</strong>, not an attachment or link. The user copies a command from a fake CAPTCHA or verification page and pastes it into their terminal. No file download. No malicious attachment. No link click. Your detection needs to focus on <strong>clipboard-paste-to-terminal execution patterns</strong> and browser child processes spawning PowerShell or bash.</p><h4>Voice Cloning: The Cost Floor Just Hit Zero</h4><p>Mistral's <strong>Voxtral TTS</strong> is an open-weight voice cloning model requiring only <strong>3-5 seconds of reference audio</strong> to produce natural-sounding cloned speech across 9 languages. It runs on <strong>3GB of RAM with 90ms latency</strong> and requires no API, no cloud processing, and produces <strong>no audit trail</strong>.</p><table><thead><tr><th>Parameter</th><th>Previous State</th><th>Now (Voxtral TTS)</th><th>Security Impact</th></tr></thead><tbody><tr><td>Audio required</td><td>Minutes to hours</td><td>3-5 seconds</td><td>Any earnings call or podcast is sufficient</td></tr><tr><td>Cost</td><td>$0.15-0.30/min API</td><td>Free (open weights)</td><td>Zero economic friction for scale attacks</td></tr><tr><td>Deployment</td><td>Cloud API with logging</td><td>Local, 3GB RAM</td><td>No vendor audit trail or abuse detection</td></tr><tr><td>Languages</td><td>Mostly English</td><td>9 with cross-lingual accent</td><td>Clone CEO's voice, speak fluent Japanese</td></tr></tbody></table><p>The cross-lingual accent preservation is especially concerning for multinationals: a threat actor can clone your CEO's voice and have it speak fluent Japanese <em>while preserving their English accent</em>, targeting offices where the CEO's voice is recognized but language was previously a natural barrier.</p><blockquote>Every public earnings call, conference presentation, and podcast appearance by your executives is now a voice cloning seed. The cost to produce a convincing CEO fraud call just dropped from thousands of dollars to zero.</blockquote>

    Action items

    • Deploy ClickFix-specific detection rules: monitor for clipboard-paste-to-terminal execution, PowerShell/bash from browser child processes, and MSHTA/RunDLL32 abuse patterns by end of this sprint
    • Issue a targeted advisory to finance, treasury, and executive assistants about voice deepfake capabilities, mandating out-of-band callback verification for any voice-authorized transaction above your materiality threshold this week
    • Audit and deprecate all processes relying on voice recognition or phone-based verbal authorization within 30 days
    • Update security awareness training to include ClickFix lure demonstrations (fake CAPTCHAs, fake verification pages) and play cloned voice samples for executive leadership

    Sources:Your MDM is now an attack vector, your supply chain has TeamPCP in it · Your MDM platform is now an attack vector · 5 seconds of audio is all it takes: open-weight voice cloning just hit your vishing threat model · 3-second voice cloning is now open-source

  4. 04

    AI Development Pipeline Poisoning: From MCP Docs to SQL Injection via Prompt

    <h3>Three New Injection Vectors Targeting AI-Augmented Development</h3><p>The AI development pipeline is under coordinated assault from a new class of injection attacks that exploit the <strong>implicit trust between AI agents and the systems they interact with</strong>. Three distinct vectors emerged this week, each exploiting a different assumption in the AI-augmented development workflow.</p><hr><h4>1. Context Hub MCP: Poisoning the Documentation Layer</h4><p>Researcher Mickey Shmueli discovered that Andrew Ng's <strong>Context Hub</strong> — a service feeding API documentation to coding agents via MCP servers — has <strong>zero content sanitization</strong> in its pipeline. Of 97 closed pull requests, <strong>58 (59.8%) were merged</strong> without review. Shmueli's proof-of-concept successfully planted <strong>fake PyPI package names in Plaid and Stripe documentation</strong>.</p><p>The kill chain is elegant: poisoned documentation → consumed by AI coding agent → agent suggests malicious package → developer installs it. <em>No malware required. No exploit needed. Just a merged pull request.</em> This is <strong>dependency confusion via AI context injection</strong> — arguably the most dangerous AI supply chain vector demonstrated to date.</p><h4>2. LLM-to-SQL Injection: A New Attack Primitive</h4><p>When LLMs are integrated with databases — a pattern becoming extremely common in analytics and search features — a new injection vector emerges. Attackers use <strong>prompt injection</strong> to manipulate the LLM into generating malicious SQL. The attack chain is fundamentally different from traditional SQLi because <strong>the injection point is the model's output, not the user's input</strong>. Your WAF and input sanitization layers are looking in the wrong direction.</p><h4>3. Agent Credential Sprawl via Service CLIs</h4><p>In a single week, <strong>Stripe, Ramp, Visa, ElevenLabs, Sendblue, Kapso, and Google Workspace</strong> all launched CLIs designed for AI agents to autonomously provision services, obtain API keys, and establish billing relationships. Each invocation creates a new machine identity outside your IAM system, a new service account relationship outside your vendor management, and a new data processing relationship outside your compliance documentation. <em>None integrate with enterprise secrets management by default.</em></p><h4>4. OpenClaw: The Cautionary Tale</h4><p>OpenClaw, an autonomous AI agent with default shell execution and filesystem access, accumulated <strong>104 CVEs in 18 days</strong> — 200x faster than LangChain or Ollama across their entire lifetimes. The root cause in CVE-2026-27001: untrusted data embedded in LLM system prompts, exploitable via Unicode bidirectional markers. The patch strips control characters but <strong>leaves untrusted data in the instruction context</strong> — fundamentally incomplete.</p><blockquote>When an AI coding agent's documentation source has a 60% merge rate with zero sanitization, your supply chain risk isn't in your dependencies — it's in the AI's reading material.</blockquote>

    Action items

    • Audit all developer AI coding assistant configurations for MCP server connections and block Context Hub connections until upstream sanitization is implemented
    • Review all LLM-to-database integrations in production/staging — ensure LLM outputs are parameterized and never concatenated into SQL, and restrict LLM service accounts to read-only minimum
    • Inventory all agentic CLI tools (Stripe Projects.dev, Ramp CLI, etc.) in use by engineering and require all agent-provisioned credentials to be registered in secrets management within 24 hours of creation
    • Issue organizational policy requiring sandboxed execution, least-privilege, and mandatory security review for all autonomous AI agent deployments — use OpenClaw's 104 CVEs in 18 days as business justification

    Sources:PolyShell is actively draining payment data from 57% of unpatched Magento stores · Active M365 token theft bypasses your MFA · Your agents are getting CLI keys to Stripe, Visa, and Ramp · LiteLLM supply chain attack hit PyPI · AI Agents Now Have Keys to Your Repos, Slack, and IaC

◆ QUICK HITS

  • Update: TeamPCP blast radius expanded to 1,000+ SaaS environments per Mandiant, with 10x growth predicted — CanisterWorm now self-propagating through npm via stolen tokens

    Your CI/CD pipeline may already be compromised: Trivy supply chain attack hits 1,000+ SaaS environments

  • BIND 9: Four CVEs patched including CVE-2026-3104 and CVE-2026-1519 (both CVSS 7.5) — remote memory leak and CPU exhaustion via DNSSEC validation. Update to 9.18.47, 9.20.21, or 9.21.20

    Your CI/CD pipeline may already be compromised: Trivy supply chain attack hits 1,000+ SaaS environments

  • NVIDIA patched CVE-2025-33244 (Critical) in Apex plus high-severity CVEs across Triton Inference Server, NeMo Framework, and Megatron LM — your AI/ML infra team may not be tracking these

    PolyShell is actively draining payment data from 57% of unpatched Magento stores

  • VoidLink cloud-native Linux rootkit source code, binaries, and deployment scripts leaked publicly — expect commoditized kernel-level persistence variants targeting cloud workloads within weeks

    Your MDM is now an attack vector, your supply chain has TeamPCP in it

  • APT28 deploying new PRISMEX framework against Ukraine defense supply chain and six Eastern European NATO governments (CZ, PL, RO, SK, SI, TR)

    Your MDM is now an attack vector, your supply chain has TeamPCP in it

  • LangChain/LangGraph: Three disclosed vulnerabilities exposing filesystem data, environment secrets (.env files, API keys), and conversation history — audit all deployments and rotate accessible secrets

    Your AI toolchain is leaking secrets: LangChain, Claude Extension, and BPFDoor all hit in one day

  • GitHub fake CVE campaign: 2,000+ fake discussions using fabricated VS Code security alerts to trick developers into malicious updates — warn engineering teams to verify CVEs only through NVD/MITRE

    Your MDM is now an attack vector, your supply chain has TeamPCP in it

  • Fortinet devices under active campaign by Mora_001, a well-established ransomware affiliate across multiple RaaS platforms — cross-reference Fortgale IOCs and verify all appliance firmware

    Your MDM is now an attack vector, your supply chain has TeamPCP in it

  • Claude Mythos leak: Anthropic's CMS breach exposed details of a model they describe as carrying 'unprecedented cybersecurity risks' with 'dramatically higher' cybersecurity benchmark scores — update threat models for AI-augmented offensive capabilities

    Anthropic admits its next model carries 'unprecedented cybersecurity risks'

  • BRUSHWORM/BRUSHLOGGER: USB worm with air-gap bridging and keystroke capture found on South Asian financial institution network — air-gap bridging malware in 2026 should alarm banking and defense sectors

    Your MDM is now an attack vector, your supply chain has TeamPCP in it

  • Four former NSA directors (Alexander, Rogers, Nakasone, Haugh) publicly warned at RSAC that China has pre-positioned in US critical infrastructure and the US offensive cyber edge is eroding

    DarkSword leak just commoditized iPhone exploits

  • Leak Bazaar: New marketplace selling data ransomware groups couldn't ransom — creates secondary market incentivizing data theft even without successful extortion

    Your MDM is now an attack vector, your supply chain has TeamPCP in it

BOTTOM LINE

MDM platforms were weaponized three ways this week — wiping 200,000 medical devices via Intune, infecting 4,850 government phones through a breached admin console, and exploiting two Ivanti zero-days — while a Magecart campaign exfiltrates payment data through WebRTC channels your WAF literally cannot see, open-source voice cloning dropped the cost of CEO impersonation to zero, and AI coding agents are ingesting poisoned documentation with a 60% merge rate. The assumptions that management tools are trusted, HTTP inspection catches exfiltration, and voice verifies identity all broke simultaneously.

Frequently asked

Why should MDM platforms be treated as Tier 0 assets like domain controllers?
MDM admin consoles have the same blast radius as domain admin accounts — they can wipe, reconfigure, push software, and deliver certificates to every managed device in one operation. The Stryker wipe of 200,000+ devices was a single button press from a compromised Intune admin, and Luxembourg's 4,850-device malware push used MDM as a delivery mechanism. Treating MDM as mere IT tooling leaves a crown-jewel surface protected by ordinary email-grade MFA.
What makes PolyShell's WebRTC exfiltration invisible to typical web security controls?
PolyShell exfiltrates card data over DTLS-encrypted UDP via WebRTC DataChannels, which operate entirely outside HTTP. Content Security Policy directives don't govern WebRTC, WAFs can't inspect non-HTTP traffic, HTTP-based DLP never sees the payload, and proxy inspection has no visibility into DTLS-encrypted UDP. Detection requires network-layer monitoring for connections to 202.181.177.177 on UDP 3479, not application-layer controls.
How should we verify voice-authorized transactions now that open-weight cloning is free?
Require out-of-band callback verification to a pre-registered number for any voice-authorized transaction above your materiality threshold, and begin deprecating voice as an authentication factor entirely. Voxtral TTS needs only 3–5 seconds of reference audio, runs locally on 3GB of RAM with 90ms latency, preserves accent across 9 languages, and leaves no vendor audit trail — meaning every public earnings call is a viable cloning seed at zero cost.
Why does patching Ivanti EPMM's zero-days alone leave you exposed?
CVE-2026-1281 and CVE-2026-1340 were exploited in the wild before patches existed, so any vulnerable EPMM instance may already be compromised. WithSecure is running active incident response at affected organizations, and their published IOCs should drive retrospective threat hunts covering the pre-patch window. Apply fixes immediately, then hunt — patch-and-forget will miss established footholds.
Why is traditional input sanitization inadequate against LLM-to-SQL injection?
The injection point is the model's output, not the user's input, so WAFs and input validation look in the wrong direction entirely. An attacker uses prompt injection to steer the LLM into generating malicious SQL, which is then executed against the database. Mitigation requires parameterizing all LLM-generated queries, never concatenating model output into SQL, and restricting LLM service accounts to least-privilege read-only access.

◆ ALSO READ THIS DAY AS

◆ RECENT IN SECURITY