ctipilot.ch

CTI Daily Brief — 2026-05-19

Typedaily
Date2026-05-19
GeneratorClaude Opus 4.7 (`claude-opus-4-7`)
ClassificationTLP:CLEAR
LanguageEnglish
Promptv2.59
Items10
CVEs15
On this page

On this page

Tags (25)
Regions (7)
References (34)

0. TL;DR

  • ARWINI prescription-review body (Lower Saxony) — investigators confirm data exfiltration, ~70,000 GDPR Art. 9 patient records likely affected; Kairos ransomware group claims theft of 2.87 TB (Deutsches Ärzteblatt, 2026-05-18; Heise Security, 2026-05-18). Statutory health-insurance auditor for KVN/AOK; Polizeidirektion Hannover is the investigating authority; data offered for sale on Kairos leak site.
  • BigBlueButton ≥ 3.0.21 / 3.0.23 fix three flaws in widely-deployed EU academic & government virtual-classroom platform (BBB GHSA-7959-pf2v-xc4h, 2026-05-17). Weak sessionToken randomness (CVE-2026-46351, CVSS 8.1), presentationUploadExternalUrl checksum bypass (CVE-2026-46353, CVSS 8.1), SSRF in presentation URL validation (CVE-2026-46404, CVSS 6.8); BSI corroborated 2026-05-18.
  • n8n self-hosted automation — five chained critical CVEs (all CVSS 9.4) covering authenticated-to-RCE via xml2js + Git-node SSH plus a separate Git-node arbitrary file read (n8n GHSA-q5f4-99jv-pgg5, 2026-05-18). Patches split across two trains: -42231/-42232 in 1.123.32 / 2.17.4 / 2.18.1; -44789/-44790/-44791 in 1.123.43 / 2.20.7 / 2.22.1. Apply the later train. See deep dive.
  • 7-Eleven confirms ShinyHunters breach of 600,000+ Salesforce franchise-application records (SecurityWeek, 2026-05-18). Part of the broader ShinyHunters Salesforce-targeting campaign with co-victims Instructure, Vimeo, Wynn Resorts, Vercel, Medtronic — phishing / OAuth / misconfiguration, not Salesforce-product vulnerabilities.
  • CISA contractor (Nightwing) exposed AWS GovCloud admin keys and internal credentials for ~6 months via public GitHub repo (Krebs on Security, 2026-05-18). GitGuardian found credentials to three GovCloud accounts, plaintext passwords for dozens of internal CISA systems, and the LZ-DSO Artifactory build-package repo; keys validated live 48h after takedown.
  • TeamPCP/Shai-Hulud copycat wave begins — first imitator drops Phantom Bot DDoS and SSH/cloud-credential stealers in four typosquatted npm packages (OX Security, 2026-05-17). chalk-tempalte is a direct clone of the leaked Shai-Hulud worm source code that Datadog Security Labs analysed on 2026-05-13.

3. Research & Investigative Reporting

Symantec / Carbon Black document Fast16 hook engine targeting LS-DYNA/AUTODYN nuclear-simulation codes; Kim Zetter corrects "pre-Stuxnet" framing to contemporaneous-and-simulation-sabotage

Background. Fast16 — a Lua-based sabotage framework — was first disclosed by SentinelOne at LABScon 2026 in April 2026 and originally framed as a Stuxnet predecessor by approximately two years. Earlier reporting also speculated that the malware operated against physical centrifuge equipment. Both framings now appear incorrect on closer expert review.

Broadcom's Symantec and Carbon Black teams published a technical analysis on 2026-05-18 documenting the framework's operating envelope and target selection (Broadcom Security, 2026-05-18; The Hacker News, 2026-05-18). The architecture: a service binary embedding an early Lua 5.0 VM; a boot-start filesystem driver intercepting executable code as it is read from disk; and a rule-driven hook engine rewriting specific instruction sequences inside narrowly targeted simulation applications. The hook engine selectively intercepts execution inside LS-DYNA and AUTODYN — the canonical high-explosive simulation codes used for weapons design — and activates only when the simulated material density exceeds 30 g/cm³, the threshold reachable only under implosion shock-compression conditions relevant to weapons-grade uranium. Kim Zetter's investigative analysis on 2026-05-16 separately corrected the historical framing of the campaign (Kim Zetter / ZERO DAY, 2026-05-16): Fast16 was contemporaneous with Stuxnet, not a predecessor, and was engineered to feed false output to weapons engineers rather than to physically alter nuclear infrastructure. Defender relevance is narrow but specific: Broadcom appears to describe the first publicly-documented use of a filesystem-driver-level instruction-rewriting hook engine to corrupt scientific-simulation output — a sabotage technique class distinct from data exfiltration, ransomware, or DoS. Operators of national-laboratory research-computing environments, defence-related HPC clusters, and reactor-physics-modelling labs should add filesystem-driver-load monitoring (Sysmon EID 6, Windows boot-start driver enumeration) and integrity checking of long-running simulation binaries to their threat models.

4. Updates to Prior Coverage

UPDATE: TeamPCP / Shai-Hulud — first copycat wave (Phantom Bot + SSH/cloud stealers), Checkmarx Jenkins plugin trojanised again, PCPJack rival worm hits exposed cloud services

UPDATE (originally covered 2026-05-13, 2026-05-15): Three concurrent developments show the TeamPCP / Shai-Hulud campaign has entered an open-source-imitator phase following Datadog Security Labs' 2026-05-13 analysis of the leaked Shai-Hulud worm source code. First, OX Security disclosed on 2026-05-17 four malicious npm packages published by deadcode09284814chalk-tempalte, @deadcode09284814/axios-util, axois-utils, and color-style-utils — combined weekly downloads ~3,000 (OX Security, 2026-05-17; The Hacker News, 2026-05-18). chalk-tempalte is a near-unmodified clone of the leaked Shai-Hulud worm with a modified C2 server and a new attacker-controlled key embedded in the code — the two primary sources disagree on whether this is a public or private key (see § 7); axois-utils bundles "Phantom Bot," a Golang HTTP/TCP/UDP/Reset-flood DDoS tool with Windows Startup folder and Linux scheduled-task persistence that survives package removal; the other two harvest SSH keys, cloud-provider credentials (AWS/GCP/Azure), and cryptocurrency wallet data.

Second, SANS ISC synthesised a 2026-05-18 campaign update confirming that Checkmarx officially acknowledged on 2026-05-11 that its Jenkins AST Scanner plugin had been trojanised — version 2026.5.09, compromise window 2026-05-09 01:25 UTC to 2026-05-10 08:47 UTC — making this TeamPCP's third confirmed Checkmarx intrusion in three months (SANS Internet Storm Center, 2026-05-18; Checkmarx, 2026-05-12). Hundreds of Jenkins controllers installed the malicious plugin before removal; remediated builds 2.0.13-848 and 2.0.13-847 are safe. CxSAST on-premise was unaffected; the cloud-integrated checkmarx/ast-github-action, checkmarx/kics-github-action, and VS Code extensions were all trojaned.

Third, SentinelLabs disclosed on 2026-05-07 — also folded into the SANS ISC summary — "PCPJack," a rival cloud worm that scans for exposed Docker, Kubernetes, Redis, MongoDB and RayML services and chains five CVEs (CVE-2025-29927 Next.js middleware auth bypass; CVE-2025-55182 Next.js Server Actions deserialization; CVE-2026-1357 WPVivid arbitrary file upload; CVE-2025-9501 W3 Total Cache RCE; CVE-2025-48703 CentOS Web Panel command injection) for initial access, then explicitly kills TeamPCP processes and removes TeamPCP artefacts before harvesting credentials — assessed by SentinelLabs with moderate confidence as possibly a former TeamPCP affiliate. Defender takeaway for the Swiss/EU public-sector SOC: developer endpoints and CI/CD runners with installed Checkmarx plugin should be audited for plugin versions outside the known-safe SHA range during the 2026-05-09 → 2026-05-10 window; npm audit and SBOM scans should flag the deadcode09284814 author/scope; egress from CI runners to *.lhr.life hostnames is a high-fidelity hunt pivot for the npm worm wave; Docker/Kubernetes/Redis/MongoDB endpoints exposed to the internet should be inventoried and removed from public exposure (PCPJack's scan list). MITRE T1195.002 (Supply Chain Compromise), T1552.001 (Credentials in Files), T1041 (Exfiltration over C2 Channel).

UPDATE: Grafana Labs CoinbaseCartel breach — victim confirms source-code-only theft, no customer data, ransom rejected

UPDATE (originally covered 2026-W21): Grafana Labs issued an official 2026-05-18 confirmation of the GitHub Pwn-Request breach previously reported in the 2026-W21 weekly summary (SecurityWeek, 2026-05-18; BleepingComputer, 2026-05-18; The Register, 2026-05-18). The material new disclosures in the 2026-05-18 confirmation: Grafana explicitly states (a) only source code was accessed — "no personal or customer information was stolen"; (b) the incident has not impacted customer systems or operations; (c) the ransom was refused. The technical-mechanism details (pull_request_target workflow misconfiguration, forked-PR injection of a curl command, harvested write-scoped GitHub token, canary-token detection) were previously reported in the 2026-W21 weekly summary citing THN's earlier coverage (The Hacker News, 2026-05-17); they are repeated here as context for defenders who did not catch the weekly. CoinbaseCartel is assessed by THN as an offshoot of the ShinyHunters / Scattered Spider / LAPSUS$ ecosystem and has accumulated ~170 victims since September 2025.

Defender takeaway: Grafana OSS is the de facto monitoring/observability platform in EU/CH public-sector SOC and NOC environments; defenders should monitor non-official Grafana plugin updates and unsigned Grafana agent builds for the next 30 days as a potential supply-chain trojanisation follow-on. The Pwn-Request attack pattern is the same class of CI/CD misconfiguration covered by SentinelOne's Living off the Pipeline taxonomy (referenced 2026-05-16); audit every pull_request_target workflow to ensure no privileged steps run on untrusted-fork code, set permissions: read-all at workflow level and elevate only as needed, and separate privilege-requiring steps into a second workflow_run workflow gated on merged code. MITRE T1195.002 / T1552.004 / T1567.

UPDATE: Chaotic Eclipse Windows zero-days — MiniPlasma is third PoC in series; cldflt.sys CfAbortHydration path, claimed re-exploitable CVE-2020-17103 regression

UPDATE (originally covered 2026-05-15): Researcher "Chaotic Eclipse" / "Nightmare Eclipse" released a third unpatched Windows LPE PoC on 2026-05-17 — MiniPlasma — extending the YellowKey and GreenPlasma series covered in the 2026-05-15 daily (BleepingComputer, 2026-05-17; The Hacker News, 2026-05-18). The material new technical detail: MiniPlasma targets the cldflt.sys Cloud Filter Mini Filter Driver — specifically the HsmOsBlockPlaceholderAccess routine — and abuses the undocumented CfAbortHydration API to create arbitrary registry keys in the .DEFAULT user hive without proper ACL checks, escalating from standard user to SYSTEM. The flaw was originally reported by Google Project Zero (James Forshaw) in September 2020 and nominally patched in December 2020 as CVE-2020-17103; Chaotic Eclipse asserts the exact same code path remains exploitable on fully-patched Windows 11 with May 2026 cumulative updates applied. Will Dormann independently confirmed the PoC opens a SYSTEM cmd.exe reliably on Windows 11 Pro fully patched. The exploit reportedly fails on the latest Insider Preview Canary builds, suggesting Microsoft has a fix in the pipeline but has not yet released an out-of-band patch. ThreatLocker published two registry-path hunt pivots: \Registry\User\Software\Policies\Microsoft\CloudFiles\BlockedApps* and \Registry\User\.DEFAULT\Volatile Environment*.

Defender takeaway: the proliferation of unpatched LPEs from one researcher signals an extended period of SYSTEM-shell availability for any attacker that lands user-level execution on Windows endpoints. Sysmon EID 13 (RegistryEvent / SetValue) on the .DEFAULT hive from non-SYSTEM processes is the primary hunt pivot; Sysmon EID 6 driver-load monitoring catches related driver-abuse paths. Hardening: BitLocker PIN mitigates the companion YellowKey BitLocker bypass; disabling Cloud Files / OneDrive integration removes the MiniPlasma attack surface but is not practical in most environments. MITRE T1068 (Exploitation for Privilege Escalation).

Changes since first coverage(1 prior appearance)
  1. 2026-05-182026-W21

5. Deep Dive — n8n prototype-pollution chain (CVE-2026-42231 et al.): authenticated-to-RCE on a workflow-automation platform that Swiss/EU agencies increasingly stand up as their integration bus

n8n is an open-source / fair-code workflow automation platform — visual flow editor, hundreds of "nodes" wrapping SaaS APIs, file processing, code execution, Git operations and HTTP calls — increasingly deployed by Swiss/EU public-sector teams as a low-code integration bus, by federal data offices for pipeline orchestration, and by university research groups as a lab automation glue layer. n8n disclosed five Critical CVEs at CVSS 9.4 each on 2026-05-18, split across two patch trains: the primary chain (-42231 / -42232) and a follow-on cluster (-44789 / -44790 / -44791) addressing additional prototype-pollution and file-read primitives (n8n GHSA-q5f4-99jv-pgg5, 2026-05-18; The Hacker News, 2026-05-18).

Vulnerability class and component. The root flaw, CVE-2026-42231 (GHSA-q5f4-99jv-pgg5, CWE-1321 Prototype Pollution), is a prototype-pollution primitive reachable via crafted XML supplied to the xml2js library used by n8n's webhook handler to parse XML request bodies. By embedding __proto__ / constructor.prototype payloads into the parsed XML, an authenticated user with permission to create or modify workflows can pollute the global JavaScript object prototype on the n8n process. The advisory's stated chain pivots into the n8n Git node's SSH operations: once the prototype is polluted, the Git node's SSH invocation path consumes attacker-controlled values and achieves RCE on the n8n host. CVE-2026-42232 (GHSA-hqr4-h3xv-9m3r, "XML Node Prototype Pollution to RCE") is a companion XML-Node prototype-pollution flaw exercising the same primitive in a second sink. The follow-on advisories address additional sinks: CVE-2026-44789 (GHSA-c8xv-5998-g76h) is "HTTP Request Node Pagination Prototype Pollution to RCE" — a second prototype-pollution path through the pagination logic; CVE-2026-44790 (GHSA-57g9-58c2-xjg3) is "Arbitrary File Read via Git Node" — a separate file-read primitive distinct from the RCE chain; CVE-2026-44791 (GHSA-wrwr-h859-xh2r) is "XML Node Prototype Pollution Patch Bypass" — a regression / bypass of the initial xml2js fix. The vendor's published CVSS vector for CVE-2026-42231 is CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H = 9.4 — network attack, low complexity, low privileges required (a workflow editor account), no user interaction, high confidentiality / integrity / availability impact on both the n8n host and subsequent systems.

Exploitation prerequisites. Authenticated access to the n8n instance at the workflow-editor role or higher, plus reachability to a webhook endpoint that accepts XML content-type bodies. n8n self-hosted deployments commonly expose webhook endpoints to the public internet (the Webhook Trigger node is the canonical way to ingest events) — so any compromised editor credential, or any internal user account on an unrestricted n8n instance, is the entry point. Patched versions: the primary chain (-42231, -42232) is fixed in n8n 1.123.32 / 2.17.4 / 2.18.1; the follow-on cluster (-44789, -44790, -44791) is fixed in 1.123.43 / 2.20.7 / 2.22.1. Operators must apply the later branch train to cover the full chain; applying only the initial fixes leaves the pagination prototype-pollution path, the Git-node arbitrary file read, and the XML-node patch-bypass exposed. Upgrade is the only remediation; no workaround.

Kill chain and ATT&CK mapping. T1190 Exploit Public-Facing Application — webhook handler as the initial-access exposure for the prototype pollution. T1059.007 Command and Scripting Interpreter: JavaScript — prototype-pollution primitive lives in the JS runtime. T1068 Exploitation for Privilege Escalation — pollution-to-Git-SSH-chain crosses from editor-role workflow context to host-process command execution. T1611 Escape to Host is relevant for the (common) Docker-deployed n8n: RCE on the n8n container can pivot to host depending on socket / mount exposure.

Hunt and detection concepts. Inspect n8n webhook HTTP request bodies (or upstream WAF logs) for XML content-type payloads containing __proto__, constructor.prototype, or prototype literal strings as XML element / attribute names — most legitimate XML payloads do not contain those tokens. From an EDR perspective, the high-confidence signal is the n8n process (Node.js node parent) spawning unexpected ssh or git child processes outside of approved Git node workflows; correlate with the user identity that triggered the workflow at the same timestamp. Container deployments should monitor n8n container egress to unfamiliar SSH hosts and unexpected ssh-keygen / ~/.ssh/known_hosts modifications. n8n's own audit log retains workflow create/modify events for the editor account — pivot from any spike in workflow modifications back to the originating account.

Hardening. Apply the vendor patch (n8n 1.123.32 / 2.17.4 / 2.18.1) — that is the only remediation. Beyond patch: enforce SSO / MFA on the n8n editor role; restrict workflow creation/modification to a small administrative group; place the n8n webhook surface behind an authenticated reverse proxy with WAF coverage for prototype-pollution literals; disable the Git node if not required; for container deployments, run n8n as a non-root user with no Docker socket access and a read-only root filesystem.

Why this matters for Swiss/EU public-sector defenders. n8n is a fast-growing automation substrate inside agencies that have replaced bespoke ETL with low-code orchestration. A single editor-role credential — typically a federated SSO account — yields RCE on the host that holds connection strings to every system the n8n instance integrates with: SharePoint, M365 Graph, Salesforce, internal databases, GitHub Actions tokens, OpenAI / Azure OpenAI keys. Expect downstream national-CERT advisories (ANSSI / BSI / NCSC-CH) to amplify the patch urgency in the coming days.

6. Action Items

(Derived from this brief's content only. Generic advice does not belong here.)

  • Patch self-hosted n8n now — apply the later train 1.123.43 / 2.20.7 / 2.22.1 which covers all five CVSS 9.4 CVEs in the cluster. The earlier patch (1.123.32 / 2.17.4 / 2.18.1) addresses only -42231 / -42232 and leaves the follow-on cluster (-44789 pagination prototype pollution, -44790 Git-node arbitrary file read, -44791 XML-node patch bypass) exposed. See § 2 entry and § 5 deep dive in this brief. Additional: enforce SSO+MFA on the editor role, restrict workflow create/modify to a small admin group, disable Git node if not required.

  • Upgrade BigBlueButton to ≥ 3.0.21 (CVE-2026-46351, CVE-2026-46353) and ≥ 3.0.23 (CVE-2026-46404) across cantonal Volksschule, university and Länder e-learning deployments. Audit bbb-web logs for anomalous joins using predicted sessionTokens, API calls to presentationUploadExternalUrl with unexpected URL parameters, and egress from the BBB server process to RFC1918 / 169.254/16 addresses.

  • Audit every pull_request_target GitHub Actions workflow on agency / OSS-component repositories for write-scoped tokens reachable from external forked-PR code. Set permissions: read-all at workflow level; separate privileged steps into a second workflow_run-gated workflow that runs only on merged code; require CODEOWNERS approval before CI on external PRs. Grafana Labs (§ 4 UPDATE in this brief) is the second high-profile Pwn-Request loss this week.

  • Audit Checkmarx Jenkins AST plugin installations across CI/CD estate for any version installed during 2026-05-09 01:25 UTC → 2026-05-10 08:47 UTC; flag version 2026.5.09. Inventory checkmarx/ast-github-action and checkmarx/kics-github-action consumers; remediated builds are 2.0.13-848 / 2.0.13-847. CxSAST on-premise is unaffected; the trojanised surfaces are the Marketplace plugins and GitHub Actions. See § 4 TeamPCP/Shai-Hulud UPDATE in this brief.

  • Scan internal npm caches and lockfiles for packages by deadcode09284814 (chalk-tempalte, @deadcode09284814/axios-util, axois-utils, color-style-utils); inspect .vscode/tasks.json and ~/.claude/settings.json on developer endpoints for injected persistence hooks. Block egress from CI runners and developer workstations to *.lhr.life and other suspicious tunnel-provider domains used as commodity C2 channels.

  • Audit Salesforce Connected App OAuth grants and Event Monitoring across public-sector Salesforce tenants — particularly third-party AI / RPA SaaS integrations. Alert on bulk Report Export events and high-volume SOQL API calls; enforce IP-range / Trusted-IP session policies; consider Salesforce Shield field-level encryption for partner/supplier PII. The ShinyHunters Salesforce-targeting pattern hitting 7-Eleven, Instructure, Vimeo, Wynn Resorts, Vercel, Medtronic is identity-side, not Salesforce-product-side.

  • Hunt for MiniPlasma / Chaotic Eclipse Windows LPE PoC use via Sysmon EID 13 (RegistryEvent / SetValue) on the .DEFAULT user hive from non-SYSTEM processes; pivot on registry keys under \Registry\User\Software\Policies\Microsoft\CloudFiles\BlockedApps* and \Registry\User\.DEFAULT\Volatile Environment* (ThreatLocker hunt guidance). No vendor patch yet; mitigations are limited.

  • Inventory GKV / cantonal health-insurance and prescription-audit data-processor relationships as in-scope NIS2 / KRITIS critical suppliers; rehearse the 72-hour GDPR Art. 33 breach-notification clock starting from a third-party's detection event, not your own. ARWINI (§ 1 in this brief) follows the NMDL/IGJ Netherlands pattern from 2026-05-14.

7. Verification Notes

  • Items dropped — CVE-2026-41702 (VMware Fusion 25H2 macOS, TOCTOU SETUID race condition, CVSS 7.8, Broadcom VMSA-2026-0003 dated 2026-05-14): dropped from § 2 — did not clear § 2 inclusion gates (no in-the-wild exploitation, not CISA KEV, not ENISA EUVD exploited=true, CVSS < 9.0, local-only attack vector on developer-workstation product, not pre-auth-RCE-on-edge-software).
  • Single-source items — none in this run.
  • Reduced-confidence items — ARWINI (S2) MULTI-SOURCE but no direct ARWINI press release retrieved; investigating-authority statement (Polizeidirektion Hannover) reported via Deutsches Ärzteblatt and Heise Security; ARWINI's own quote on Art. 9 data scope is via Borns IT Blog citing the ARWINI statement, not the statement page itself.
  • Contradictionschalk-tempalte attacker-key descriptor: OX Security (blog post) describes the embedded key as a "public key"; The Hacker News (article), reporting on the same OX research, describes it as a "private key". Brief reports the attacker-controlled-key fact without taking a side on the key-type modifier; defenders cross-checking the brief should expect both descriptors in coverage.
  • Stalled sub-agents — none. All four Phase-1 sub-agents returned within wall-clock budget (S1 504s · S2 482s · S3 219s · S4 590s).
  • Verification — five iterations ran with model rotation (Opus / Sonnet / Opus / Sonnet / Opus); each iteration's findings were applied as remediations before the next spawn. Iteration 5 (final, Opus) returned NEEDS_FIXES with two residual findings (truth=1, editorial=1): F1 (CVE-2026-42232 component attribution) — applied post-cap, the brief now describes it as "XML Node Prototype Pollution to RCE" matching the cited GHSA title; F2 (per-GHSA permalink specificity) — applied post-cap, CVE Summary Table rows now link to each specific GHSA permalink instead of the advisories listing index. Per v2.50 cap-breach policy the brief publishes after the cap regardless; verification_residual_count = 2 reflects the iteration-5 verdict, not the post-cap state of the brief.
  • Models reported — main agent Claude Opus 4.7 (claude-opus-4-7); all four research sub-agents Claude Sonnet 4.6 (claude-sonnet-4-6).
  • Coverage gaps: bright-talk-dbir (403 on Verizon DBIR 2026 webinar URL); verizon-dbir-2026 (full PDF not yet available at run time — landing-page summary only); anssi-fr (no in-window advisories — newest 2026-05-13); bsi-de (only updates to already-covered advisories in window); cert-eu (RSS empty for in-window — newest item 2026-05-06); inside-it-ch (known 403, no bridge subcommand); heise-sec (TollBit-gated per-article URLs — used RSS summary + WebSearch corroboration); sophos-xops (rotation-priority empty — no in-window content); trendmicro-research (rotation-priority SPA shell with no RSS); databreaches-net (rotation-priority 403, Wayback empty); dark-reading (article 403 on Iran ATG fuel-tank campaign expansion — corroborated via WebSearch summaries but freshest CNN/Security-Magazine primary is dated outside the 36 h window so the item was dropped); sec-disclosures-edgar (no Item 1.05 8-K filings in window); ico-uk (no enforcement actions in window — newest action 2026-05-11 outside window).