PROMIT NOW · SECURITY DAILY · 2026-04-14

APT41 Cloud IAM Harvester Evades AV; Adobe Ships 0-Day Fix

· Security · 39 sources · 1,732 words · 9 min

Topics Agentic AI · AI Regulation · Data Infrastructure

APT41 has deployed a cloud IAM credential harvester with 0/72 antivirus detection across AWS, GCP, and Azure — exfiltrating stolen keys via AES-256-encrypted SMTP to C2 at 43.99.48.196. If you haven't enforced IMDSv2 and blocked outbound SMTP port 25 from non-mail workloads, your cloud credentials are being siphoned right now. Simultaneously, Adobe shipped an emergency out-of-band patch for CVE-2026-34621 — a zero-day exploited silently since November 2025. Both require same-day action.

◆ INTELLIGENCE MAP

  1. 01

    APT41 Zero-Detection Cloud Backdoor + Supply Chain Compromise Cascade

    act now

    APT41's ELF backdoor scores 0/72 on VirusTotal while harvesting IAM creds across every major cloud provider. In the same cycle, three security scanners (Xygeni, Trivy, KICs) were supply-chained by TeamPCP, and CPUID's download site distributed STX RAT through trojanized sysadmin tools. Your security tools and trusted software sources are both compromised.

    0/72
    AV detection rate
    5
    sources
    • C2 IP
    • Exfil method
    • Scanners hit
    • CPUID window
    • Lateral move port
    1. 01APT41 IAM Harvester0/72 detection
    2. 02Xygeni/Trivy/KICsCI/CD pipeline
    3. 03OpenAI AxiosCode signing certs
    4. 04CPUID Watering HoleSTX RAT via sysadmin tools
    5. 05Anodot→Snowflake→RockstarSaaS pivot to cloud
  2. 02

    Emergency Patch Sprint: 5 CVEs With Active Exploitation or Same-Day PoCs

    act now

    Adobe CVE-2026-34621 was exploited for 5 months before today's emergency patch. nginx CVE-2026-27654 had a same-day PoC. Marimo CVE-2026-39987 was weaponized in under 10 hours. AI-assisted exploit development has collapsed your patch window to hours, not weeks. Traditional patch SLAs are structurally inadequate.

    <10hrs
    Marimo time-to-exploit
    6
    sources
    • Adobe exploitation
    • nginx PoC timeline
    • Marimo weaponized
    • Juniper patches
    • ActiveMQ bug age
    1. Adobe CVE-2026-346210.5
    2. nginx CVE-2026-2765424
    3. Marimo CVE-2026-3998710
    4. ActiveMQ RCE113880
  3. 03

    Hormuz Blockade Goes Live — Iranian APT Retaliation Window Opens

    monitor

    US naval blockade of all Iranian ports activated at 10am ET today. CyberAv3ngers (Iran) have evolved from fake hack claims in 2023 to actively exploiting Rockwell Automation ICS controllers in 2026. Every major US-Iran kinetic escalation in 15 years has triggered retaliatory cyber campaigns against US private sector. Crude at $105.

    $105
    crude oil per barrel
    4
    sources
    • Oil YTD change
    • Aramco 2012 damage
    • CyberAv3ngers stage
    • Blockade start
    1. 2012Shamoon destroys 35K Aramco endpoints + DDoS on US banks
    2. 2016-17Shamoon 2.0 targets Saudi government
    3. 2019-20Soleimani strike → CISA emergency directive on Iranian threats
    4. 2024CyberAv3ngers develop custom ICS malware
    5. Apr 13 2026Full naval blockade → retaliation probability: HIGH
  4. 04

    AI Agent Attack Surface Gets Its First Comprehensive Taxonomy

    monitor

    Google DeepMind published a 6-genre attack taxonomy against AI agents — from CSS/HTML content injection to multi-agent jigsaw attacks with no precedent in traditional cybersecurity. Separately, 9 LLM API routers are confirmed injecting malicious payloads and exfiltrating secrets. Your agent deployments face both architectural and supply chain compromise simultaneously.

    9
    compromised LLM routers
    5
    sources
    • Attack genres mapped
    • Compromised routers
    • Agent-to-human ratio
    • Capability timeline shift
    1. Content Injection90
    2. Semantic Manipulation70
    3. Cognitive State85
    4. Behavioural Control95
    5. Systemic/Multi-Agent95
    6. Human-in-the-Loop60
  5. 05

    DPRK Cyber Operations Reach Industrial Scale

    background

    North Korea is running parallel cyber workstreams at unprecedented scale: 390 fraudulent IT worker accounts generating $1M/month, APT37 using Facebook friend requests for RokRAT delivery, Contagious Interview expanded to Reddit, and malicious npm targeting Polymarket devs. This is a nation-state operating across your hiring pipeline, developer ecosystem, and social media simultaneously.

    $1M/mo
    DPRK IT worker revenue
    3
    sources
    • Fake IT accounts
    • Revenue per month
    • New social vector
    • Active malware
    1. IT Worker Fraud390
    2. Contagious Interview3
    3. APT37 RokRAT1
    4. npm Poisoning1

◆ DEEP DIVES

  1. 01

    APT41's Invisible Cloud Harvester + Five Supply Chain Compromises in One Cycle

    <h3>The Threat You Can't See</h3><p>APT41/Winnti has deployed a <strong>stripped x86-64 ELF backdoor with zero detections across 72 antivirus engines</strong> on VirusTotal. This implant specifically targets cloud identity systems, harvesting IAM and managed identity credentials by querying metadata APIs across <strong>AWS, GCP, Azure, and Alibaba Cloud</strong>. Stolen credentials are AES-256 encrypted and exfiltrated over <strong>SMTP port 25</strong> to C2 at <strong>43.99.48.196</strong> (Alibaba Cloud Singapore).</p><p>The tradecraft is mature. C2 infrastructure uses three NameSilo-registered typosquat domains — <code>ai.qianxing.co</code>, <code>ns1.a1iyun.top</code>, and <code>ai.aliyuncs.help</code> — designed to mimic legitimate Alibaba Cloud services. The C2 <strong>evades Shodan and Censys</strong> through selective EHLO token validation. Lateral movement uses <strong>UDP broadcasts to 255.255.255.255:6006</strong> for peer-to-peer propagation within cloud VPCs. This represents the latest in a 6-year Winnti ELF lineage: PWNLNX (2020) → KEYPLUG (2023) → this purpose-built cloud credential harvester.</p><blockquote>Your antivirus won't find it. Your internet scanners can't see the C2. And your cloud workloads are one metadata API call away from full IAM credential exfiltration.</blockquote><hr><h3>Five Supply Chain Compromises — Same Week</h3><p>The APT41 backdoor isn't operating in isolation. This cycle brought <strong>five distinct supply chain attacks</strong> targeting the tools your security and engineering teams trust:</p><table><thead><tr><th>Target</th><th>Vector</th><th>Actor</th><th>Impact</th></tr></thead><tbody><tr><td><strong>Xygeni / Trivy / KICs</strong></td><td>GitHub compromise → malicious builds</td><td>TeamPCP</td><td>CI/CD pipeline compromise; shared C2 with router botnet</td></tr><tr><td><strong>OpenAI (Axios)</strong></td><td>npm dependency poisoning in GitHub Actions</td><td>Unknown</td><td>macOS code-signing certs exposed; cert revoked</td></tr><tr><td><strong>CPUID (CPU-Z/HWMonitor)</strong></td><td>Website watering hole</td><td>Known cybercrime group</td><td>STX RAT to sysadmins with domain admin access</td></tr><tr><td><strong>Anodot → Snowflake → Rockstar</strong></td><td>SaaS tool pivot to cloud storage</td><td>ShinyHunters</td><td>Data theft and extortion via cloud cost tool</td></tr><tr><td><strong>npm (Polymarket-related)</strong></td><td>Malicious packages targeting devs</td><td>Famous Chollima (DPRK)</td><td>Developer workstation compromise</td></tr></tbody></table><p>The most alarming connection: the <strong>Xygeni vulnerability scanner compromise shares C2 infrastructure with an ASUS/TP-Link router proxy botnet</strong>. Same servers, same authentication secret. A group building residential proxy botnets is <em>also</em> compromising your security scanning tools. Xygeni was hit two weeks before Trivy and KICs — suggesting a deliberate campaign against security tooling, not opportunistic compromise.</p><p>The OpenAI Axios incident confirms that <strong>CI/CD signing pipelines remain high-value targets</strong>. A malicious version of the Axios npm library propagated through a GitHub Actions workflow with access to macOS code-signing and notarization credentials. OpenAI revoked the certificate — a drastic step signaling they couldn't fully rule out artifact tampering. Axios has <strong>hundreds of millions of weekly npm downloads</strong>; any org using it in CI/CD workflows handling secrets shares this attack surface.</p><hr><h3>Immediate Mitigations</h3><ol><li><strong>Enforce IMDSv2 across all AWS EC2 instances today.</strong> Audit equivalent metadata endpoint protections on GCP and Azure. This is the single most impactful control against APT41's credential harvesting.</li><li><strong>Ingest IOCs now:</strong> C2 IP <code>43.99.48.196</code>, domains <code>ai.qianxing.co</code>, <code>ns1.a1iyun.top</code>, <code>ai.aliyuncs.help</code>. Run retroactive hunts across 90 days of DNS, SMTP, and flow logs. Alert on UDP port 6006 broadcasts.</li><li><strong>Block outbound SMTP port 25</strong> from all non-mail workloads. This cuts the exfiltration channel.</li><li><strong>Audit CI/CD pipelines for Xygeni, Trivy, or KICs.</strong> Check versions against compromised releases. If compromised versions were used, rotate all secrets accessible from build environments — deployment creds, signing keys, API tokens.</li><li><strong>Scan for CPUID tool downloads</strong> in the past 7 days. Quarantine any endpoint that pulled CPU-Z or HWMonitor during the compromise window. These users likely have elevated privileges.</li></ol>

    Action items

    • Enforce IMDSv2 on all AWS EC2 instances and audit GCP/Azure metadata protections
    • Ingest APT41 IOCs (43.99.48.196, three typosquat domains) and run 90-day retroactive hunt across DNS/SMTP/flow logs
    • Block outbound SMTP port 25 from all non-mail cloud workloads
    • Audit CI/CD pipelines for Xygeni, Trivy, or KICs vulnerability scanners against compromised version lists
    • Pin all GitHub Actions dependencies to commit SHAs and implement SLSA Level 2+ build provenance

    Sources:APT41's 0/72-detection cloud backdoor is harvesting your IAM credentials right now · 5 actively-exploited CVEs, 4 supply chain compromises, and a Docker auth bypass from an incomplete patch · Patch Acrobat NOW (CVE-2026-34621 active exploitation), plus two supply chain compromises hitting your CI/CD and sysadmin tools · OpenAI's Signing Pipeline Got Popped via GitHub Actions · OpenAI's CI/CD pipeline leaked macOS signing creds

  2. 02

    Emergency Patch Sprint: CVE-2026-34621 Was Burning for 5 Months — Plus Exploit Windows Collapsing to Hours

    <h3>Adobe Acrobat Reader: 5 Months of Silent Exploitation</h3><p>Adobe issued an <strong>emergency out-of-band patch</strong> for CVE-2026-34621, a critical zero-day in Acrobat Reader confirmed under active exploitation since <strong>at least November 2025</strong>. That's five months of undetected exploitation against the most ubiquitous document reader in enterprise environments. Spotted by Expmon founder Haifei Li, this vulnerability warranted Adobe breaking its own Patch Tuesday cadence — a reliable severity indicator. Until your fleet is patched, <strong>every PDF opened in Acrobat Reader is a potential compromise vector</strong>.</p><blockquote>Adobe broke its own Patch Tuesday schedule to release this patch. That alone tells you the severity. Deploy it today — not this week, today.</blockquote><hr><h3>AI Has Collapsed Your Patch Window to Hours</h3><p>Three additional vulnerabilities illustrate the new reality of AI-accelerated exploitation:</p><table><thead><tr><th>CVE</th><th>Product</th><th>Time to Weaponize</th><th>Discovery Method</th><th>Status</th></tr></thead><tbody><tr><td><strong>CVE-2026-27654</strong></td><td>nginx (WebDAV)</td><td>Same day as patch</td><td>Claude AI</td><td>Public PoC</td></tr><tr><td><strong>CVE-2026-39987</strong></td><td>Marimo notebook</td><td>&lt;10 hours</td><td>Standard research</td><td>Active exploitation</td></tr><tr><td><strong>ActiveMQ RCE</strong></td><td>ActiveMQ Classic 6.0.0-6.1.1</td><td>Minutes (AI)</td><td>Claude AI</td><td>PoC available</td></tr></tbody></table><p>The nginx CVE-2026-27654 is a heap buffer overflow in the WebDAV module — an AI-assisted commit watcher generated a <strong>crashing PoC the same day the fix was published</strong>. Marimo's pre-auth RCE via unauthenticated WebSocket terminal was <strong>weaponized within 10 hours</strong> of disclosure, with Sysdig confirming active scanning. The ActiveMQ flaw sat dormant for <strong>13 years</strong> until Claude AI found it and built a working exploit in minutes.</p><p>Multiple sources converge on the same data point: attackers are exploiting <strong>2× the high/critical vulnerabilities in half the time</strong> compared to prior years. AI-assisted exploit development is the accelerant. If your current patch SLA allows 30 days for critical vulnerabilities on internet-facing systems, you're accepting 29 days of unnecessary exposure.</p><hr><h3>What This Means for Your Vulnerability Management Program</h3><p>The traditional model — vendor discloses, you triage, you test, you deploy over 14-30 days — was built for human-speed vulnerability research. That model is <strong>structurally inadequate</strong> when AI generates working PoCs on patch day. Your program needs two tracks:</p><ul><li><strong>Emergency track (0-24 hours):</strong> Internet-facing systems with critical/high CVEs that have public PoCs or confirmed exploitation</li><li><strong>Standard track (1-7 days):</strong> Everything else that's critical/high severity</li></ul><p>If you can't achieve 24-hour patching, implement <strong>virtual patching</strong> (WAF/IPS signatures) as a bridge. The AI-speed exploit reality means the gap between disclosure and exploitation is now measured in hours, not weeks.</p>

    Action items

    • Deploy Adobe Acrobat Reader emergency patch for CVE-2026-34621 across all endpoints today; use browser-native PDF viewers as interim mitigation where patching is delayed
    • Patch nginx CVE-2026-27654 on all internet-facing instances; disable ngx_http_dav_module if WebDAV is not required
    • Scan for Marimo notebook instances (v0.20.4) across your network and patch or isolate immediately
    • Inventory all Apache ActiveMQ Classic deployments and patch versions 6.0.0-6.1.1; restrict broker management interface access
    • Compress patch SLAs to 24 hours for internet-facing criticals; implement WAF/IPS virtual patching as standard bridge control

    Sources:Patch Acrobat NOW (CVE-2026-34621 active exploitation) · APT41's 0/72-detection cloud backdoor is harvesting your IAM credentials right now · 5 actively-exploited CVEs, 4 supply chain compromises · AI just weaponized a 13-year-old RCE in minutes · Docker AuthZ bypass is back from the dead

  3. 03

    Hormuz Blockade Activates Today — Your Iranian APT Detection Coverage Needs Validation Now

    <h3>The Trigger Event</h3><p>At <strong>10:00 AM ET today (April 13)</strong>, US Central Command activated a full naval blockade of the Strait of Hormuz and all Iranian ports. Peace talks in Pakistan collapsed after Iran refused to abandon its nuclear program. Iran explicitly warned that <strong>any military vessel approaching the strait constitutes a ceasefire violation</strong>. Crude oil stands at $104.97, up 83% YTD.</p><p>This isn't a geopolitics newsletter — but if you run a SOC, this is a <strong>threat trigger event</strong>. Every significant US-Iran kinetic escalation in 15 years has been accompanied by retaliatory cyber operations against US private sector targets.</p><hr><h3>Iranian Capability Has Matured</h3><p>The critical update that distinguishes this cycle from past escalations: <strong>CyberAv3ngers has completed a three-year capability build</strong> from hacktivism to operational ICS targeting.</p><table><thead><tr><th>Year</th><th>CyberAv3ngers Capability</th><th>Evidence</th></tr></thead><tbody><tr><td><strong>2023</strong></td><td>Default credential exploitation, fake hack claims</td><td>Public boasting with minimal real impact</td></tr><tr><td><strong>2024</strong></td><td>Custom ICS malware development</td><td>Tenable/Dragos reporting on purpose-built tools</td></tr><tr><td><strong>2026</strong></td><td>Active exploitation of Rockwell Automation controllers</td><td>Confirmed operational capability against production ICS</td></tr></tbody></table><p>Iran maintains at least four well-resourced APT groups: <strong>APT33</strong> (energy/aviation, Shamoon wiper), <strong>APT34</strong> (financial/government, DNS hijacking), <strong>APT35</strong> (defense/diplomats, cloud exploitation), and <strong>MuddyWater</strong> (government/MSPs, living-off-the-land). Their signature pattern is <strong>exploiting known CVEs in perimeter devices</strong> — Fortinet, Pulse Secure/Ivanti, Exchange — not burning zero-days.</p><blockquote>Iranian APTs exploit known vulnerabilities, not zero-days. Your unpatched VPN appliances and mail gateways are the first targets — validate them today.</blockquote><hr><h3>Historical Correlation Is Not Speculation</h3><ul><li><strong>2012:</strong> US/EU sanctions tighten → Shamoon destroys 35,000 Aramco endpoints + Operation Ababil DDoS hits major US banks</li><li><strong>2016-17:</strong> Renewed tensions → Shamoon 2.0 targeting Saudi government</li><li><strong>2019-20:</strong> Soleimani strike → CISA emergency directive on Iranian threats; wiper attempts detected</li><li><strong>2026 (today):</strong> Full naval blockade → cyber retaliation probability: <em>high</em></li></ul><hr><h3>Your Defensive Posture</h3><p>If you have OT/ICS environments, particularly with Rockwell Automation controllers, review CyberAv3ngers TTPs from Tenable and Dragos reporting and <strong>validate IT/OT network segmentation today</strong>. For all organizations: verify MFA enforcement on all remote access, validate offline backup integrity, and confirm your EDR can detect MBR/VBR overwrite patterns consistent with Shamoon/ZeroCleare variants.</p>

    Action items

    • Review CISA Iran cyber threat advisories (AA22-055A) and validate detection rules for Iranian APT TTPs — credential harvesting, VPN exploitation, wiper malware deployment
    • Verify offline/immutable backup integrity for all Tier-1 systems and test restoration of at least one critical system
    • Priority patch check on VPN appliances (Fortinet, Ivanti), Exchange servers, and any internet-facing OT/ICS interfaces
    • If operating Rockwell Automation controllers, validate OT/IT network segmentation and review CyberAv3ngers IOCs from Tenable/Dragos
    • Block AS213438 (ColocaTel, Seychelles) at perimeter firewall — 21 IPs responsible for >50% of global RDP scanning

    Sources:Hormuz blockade goes live today · 5 actively-exploited CVEs, 4 supply chain compromises, and a Docker auth bypass from an incomplete patch · Low Signal for Your SOC: Aviation Fuel Crisis Has No Direct Cyber Indicators · OpenAI's safety claims are under oath

  4. 04

    DeepMind Maps 6 Attack Genres Against Your AI Agents — While 9 LLM Routers Are Already Compromised

    <h3>The First Comprehensive AI Agent Threat Taxonomy</h3><p>Google DeepMind published a paper titled "AI Agent Traps" defining <strong>six distinct attack genres</strong> that exploit fundamental architectural weaknesses in how AI agents process inputs, maintain state, and interact with each other. This isn't a rehash of prompt injection — it's a full-spectrum offensive framework including multi-agent systemic attacks <strong>with no precedent in traditional cybersecurity</strong>.</p><table><thead><tr><th>Attack Genre</th><th>Key TTPs</th><th>Detection Difficulty</th></tr></thead><tbody><tr><td><strong>Content Injection</strong></td><td>Commands in CSS/HTML metadata; instructions in media binary data</td><td>High — exploits human/machine parsing gap</td></tr><tr><td><strong>Semantic Manipulation</strong></td><td>Authority language saturation; educational framing of malicious instructions</td><td>Medium — detectable with output monitoring</td></tr><tr><td><strong>Cognitive State</strong></td><td>Fabricated statements in retrieval corpora; poisoned few-shot demos</td><td>High — poisoned context looks legitimate</td></tr><tr><td><strong>Behavioural Control</strong></td><td>Orchestrator privilege takeover; attacker-controlled sub-agent creation</td><td>Critical — equivalent to lateral movement</td></tr><tr><td><strong>Systemic</strong></td><td>Jigsaw attacks across agents; agent identity fabrication; cascade disruption</td><td>Very High — individually benign, collectively malicious</td></tr><tr><td><strong>Human-in-the-Loop</strong></td><td>Exploiting human approval fatigue; manipulating trust boundaries</td><td>Medium — targets the human, not the system</td></tr></tbody></table><hr><h3>Your LLM Inference Pipeline Is Already Compromised</h3><p>Researchers behind the "Your Agent Is Mine" project confirmed <strong>9 LLM API routers — 1 paid, 8 free — actively injecting malicious code</strong> into LLM traffic. Capabilities include <strong>payload injection</strong> (modifying model responses), <strong>secret exfiltration</strong> (capturing API keys and prompts), and <strong>response poisoning</strong> (subtly altering outputs). If your engineering teams route LLM calls through third-party proxies for cost optimization, this is a <em>confirmed supply chain compromise</em> against your inference pipeline.</p><p>This intersects with the broader agent explosion: enterprises report <strong>100:1 agent-to-human ratios</strong>, with autonomous agents running via APIs, CLIs, and MCP servers — many as background processes without direct user oversight. Every one of these is a non-human identity your SOC wasn't built to monitor.</p><blockquote>AI agents are the new perimeter. They're under attack across six distinct genres, and no one on your team is monitoring inter-agent communication for jigsaw attacks.</blockquote><hr><h3>The Shadow AI Problem Compounds It</h3><p>Multiple sources confirm that non-technical employees are building custom automations via platforms like Perplexity Computer that require pre-authenticated OAuth connectors to <strong>Gmail, Slack, Notion, and Asana</strong> — all running in third-party cloud environments outside your security controls. Users are creating detailed "brain files" containing team structures, communication styles, and organizational context to feed AI agents. This is organizational intelligence being <strong>systematically uploaded to AI platforms you haven't assessed</strong>.</p><p>Meanwhile, Anthropic's Claude for Word add-in processes enterprise document content — including Track Changes metadata — through a third-party API directly within Microsoft Word. Your DLP was built for browser uploads and email attachments, <em>not for Office API calls to AI providers</em>.</p>

    Action items

    • Audit all LLM API routing infrastructure this week — enumerate every path between applications and LLM providers, verify no compromised routers exist, implement response integrity validation
    • Conduct AI agent threat model review using DeepMind's 6-genre taxonomy — map every deployed agent against each attack category and identify detection gaps
    • Audit OAuth grants in Google Workspace, M365, and Notion admin consoles for unauthorized AI platform authorizations (Perplexity Computer, OpenClaw, Claude for Word)
    • Lock down M365 add-in deployment to admin-managed only; explicitly block Claude for Word until Anthropic completes vendor security assessment
    • Establish non-human identity inventory for all AI agents with credential lifecycle management, least-privilege scoping, and behavioral baselines

    Sources:Google DeepMind just mapped 6 attack genres against your AI agents · 9 LLM API routers caught injecting malicious code · Your employees are connecting Gmail, Slack & Notion to unvetted AI platforms · Claude for Word just gave your users a new way to exfiltrate sensitive docs · Open-weight voice cloning, AI agents with shell access, and OAuth bugs

◆ QUICK HITS

  • Update: Docker CVE-2026-34040 is the specific CVE for the AuthZ bypass regression from CVE-2024-41110 — oversized HTTP requests grant privileged containers with host filesystem access; verify all Docker Engine instances are patched and don't trust your 2024 fix

    5 actively-exploited CVEs, 4 supply chain compromises, and a Docker auth bypass from an incomplete patch

  • ClickFix macOS attacks pivoted from Terminal to applescript:// URL scheme, auto-opening Script Editor with malware payloads — test whether your EDR fires on Script Editor launches from URL-scheme invocations, not just Terminal-based detection

    ClickFix just ditched Terminal for Script Editor

  • Block AS213438 (ColocaTel, Seychelles) at your perimeter — 21 IPs from this ASN responsible for more than 50% of all global RDP scanning traffic

    5 actively-exploited CVEs, 4 supply chain compromises

  • ServiceNow enabling AI features by default across its entire portfolio on April 15 — Context Engine feeds 85B workflow records to LLMs, and external IDEs (Cursor, Claude Code) can deploy agents into your tenant; review data flow controls before Wednesday

    OpenAI's Signing Pipeline Got Popped via GitHub Actions

  • Phishing campaigns weaponizing Datto CentraStage RMM tool — victims install a legitimate remote management agent giving attackers persistent, undetectable access; deploy allowlists for approved RMM tools and alert on unauthorized installations

    5 actively-exploited CVEs, 4 supply chain compromises

  • FBI IC3 reports $893M in AI-enabled fraud losses for 2025 — deepfake vishing, synthetic identities, and AI-augmented BEC are now measured threats; evaluate MITRE Fight Fraud Framework (F3) for detection alignment

    ClickFix just ditched Terminal for Script Editor

  • Juniper released 28 security updates Friday — prioritize patching based on your Juniper deployment footprint; no specific exploitation confirmed yet but batch this size signals serious exposure

    5 actively-exploited CVEs, 4 supply chain compromises

  • Update: Google accelerated its post-quantum cryptography deadline, forcing Cloudflare and others to scramble — if you haven't started your cryptographic inventory for PQC migration, Google's urgency suggests they know something about quantum compute timelines

    AI just weaponized a 13-year-old RCE in minutes

  • Voxtral TTS: Mistral's open-weight voice cloning model needs only 5 seconds of audio for zero-shot cloning across 9 languages, beating ElevenLabs on naturalness — open weights mean no vendor safety guardrails; update wire transfer verification to require out-of-band confirmation

    Open-weight voice cloning, AI agents with shell access, and OAuth bugs

  • Microsoft device code phishing campaigns targeting M365 — review conditional access policies to restrict or monitor device code authentication flows in Entra ID

    5 actively-exploited CVEs, 4 supply chain compromises

  • 68% of organizations have unprotected unstructured data per Thales/CSA report — cross-reference your data inventory with AI/LLM access paths; any unstructured data an AI agent can read is a potential exfiltration vector

    OpenAI's Signing Pipeline Got Popped via GitHub Actions

BOTTOM LINE

APT41 is harvesting your cloud IAM credentials with a backdoor no antivirus detects, three of your vulnerability scanners were supply-chained by the same group running a router botnet, Adobe's emergency patch reveals a zero-day that burned silently for five months, AI-generated exploits now arrive on patch day, the US just activated a naval blockade that historically triggers Iranian cyber retaliation within days, and 9 LLM API routers are confirmed injecting malicious code into your AI inference pipeline — your patch cycle, your supply chain trust model, and your geopolitical threat posture all need same-day attention.

Frequently asked

What's the fastest way to stop APT41's cloud credential harvester from exfiltrating IAM keys?
Block outbound SMTP port 25 from all non-mail cloud workloads and enforce IMDSv2 on AWS EC2 (plus equivalent metadata protections on GCP and Azure). The SMTP block cuts the exfiltration channel in minutes, and IMDSv2 defeats the metadata API queries the backdoor uses to harvest credentials. Then ingest IOCs — IP 43.99.48.196 and the typosquat domains ai.qianxing.co, ns1.a1iyun.top, and ai.aliyuncs.help — for a 90-day retroactive hunt.
Why is Adobe's out-of-band patch for CVE-2026-34621 being treated as same-day critical?
Adobe broke its own Patch Tuesday cadence to ship it, and the vulnerability has been under active exploitation since at least November 2025 — roughly five months of silent compromise via one of the most common document readers in enterprise environments. Until endpoints are patched, every PDF opened in Acrobat Reader is a potential compromise vector. Use browser-native PDF viewers as an interim mitigation where patch deployment lags.
How should patch SLAs change given AI-accelerated exploit development?
Split vulnerability management into two tracks: a 0–24 hour emergency track for internet-facing systems with critical or high CVEs that have public PoCs or confirmed exploitation, and a 1–7 day standard track for everything else. AI-generated PoCs now appear on patch day (nginx CVE-2026-27654) or within 10 hours (Marimo), so a 30-day cycle accepts nearly a month of unnecessary exposure. Use WAF/IPS virtual patching as a bridge when 24-hour deployment isn't feasible.
What cyber posture changes are warranted following the Hormuz blockade activation?
Validate detection coverage for Iranian APT TTPs (APT33, APT34, APT35, MuddyWater, CyberAv3ngers), priority-patch perimeter devices like Fortinet and Ivanti VPNs and Exchange servers, and verify offline backup integrity against Shamoon/ZeroCleare-style wipers. Every major US-Iran kinetic escalation in the past 15 years has been followed by retaliatory cyber operations against US private sector targets, and CyberAv3ngers now has confirmed operational capability against Rockwell Automation controllers.
What's the risk from compromised LLM API routers and how do I address it?
Nine LLM API routers (one paid, eight free) have been confirmed injecting malicious code into inference traffic — capable of payload injection, secret exfiltration, and response poisoning. If engineering teams route LLM calls through third-party proxies for cost optimization, your inference pipeline may already be a supply chain compromise. Enumerate every path between applications and LLM providers, remove unvetted routers, and implement response integrity validation this sprint.

◆ ALSO READ THIS DAY AS

◆ RECENT IN SECURITY