ctipilot.ch

CTI Daily Brief — 2026-05-22

Typedaily
Date2026-05-22
GeneratorClaude Sonnet 4.6 (`claude-sonnet-4-6`)
ClassificationTLP:CLEAR
LanguageEnglish
Promptv2.59
Items9
CVEs16
On this page

0. TL;DR

  • Operation Saffron seizes First VPN — Europol/Eurojust-coordinated takedown of criminal anonymisation VPN present in "nearly every major cybercrime investigation"; 33+ servers seized across 27 countries (server-host), 5,000+ user accounts captured; Switzerland one of seven JIT participants; Phobos RaaS infrastructure link confirmed (Help Net Security, 2026-05-21).
  • CISA KEV: Trend Micro Apex One On-Premise directory traversal (CVE-2026-34926) actively exploited — management server compromise injects malicious code propagated fleet-wide to all managed agents via built-in update mechanism; JPCERT confirmed ITW exploitation 2026-05-21; patch to build 17079 required (CISA KEV, 2026-05-21).
  • Cisco Secure Workload CVSS 10.0 (CVE-2026-20223) — unauthenticated REST API call grants Site Admin access across all tenants; no workaround; on-prem deployments must upgrade to 3.10.8.3 / 4.0.3.17 or migrate from 3.9 (Cisco PSIRT, 2026-05-20).
  • Calypso/Red Lamassu deploys Showboat (Linux) + JFMBackdoor (Windows) against telecoms — multi-year Chinese espionage campaign targeting ISPs in Middle East, Central Asia; kworker-masquerading ELF implant with SOCKS5 proxy and Pastebin dead-drop rootkit loader; Lumen Black Lotus Labs + PwC joint disclosure (BleepingComputer, 2026-05-21).
  • Langflow CORS/token-hijack (CVE-2025-34291) added to CISA KEV — Flodric botnet deployed through compromised AI workflow instances; allow_origins='*' with SameSite=None cookie enables cross-origin token theft with no interaction beyond page visit; upgrade to >= 1.7.0 (CISA, 2026-05-21).

Immediate Action — Patch Trend Micro Apex One On-Premise management server to build 17079. JPCERT/CC confirmed on 2026-05-21 that CVE-2026-34926 (CISA KEV, added 2026-05-21) is being actively exploited in the wild: an authenticated attacker with administrative access to the Apex One management server traverses the server's directory structure to modify a key table and inject malicious code that Apex One's own update mechanism then deploys to every managed agent in the fleet — one compromised management console equals fleet-wide code execution. Admin credentials to the Apex One server are the entry prerequisite; attackers obtain them via phishing, credential theft, or brute force. The SaaS variant is not affected; only on-premises server and agent builds below 17079 require immediate action. Apply the Trend Micro patch (KA-0023430) and restrict local network access to the Apex One management console to trusted management VLANs.

3. Research & Investigative Reporting

No new qualifying primary research with operational defender impact in the 36-hour window — section intentionally left empty.

4. Updates to Prior Coverage

UPDATE: TeamPCP Mini Shai-Hulud — Unit 42 and StepSecurity confirm SLSA Build Level 3 attestation invalidated as integrity gate

UPDATE (originally covered 2026-05-19, updated 2026-05-21): Unit 42 (Palo Alto Networks) and StepSecurity published concurrent technical analyses on 2026-05-21 of the TeamPCP Mini Shai-Hulud npm supply-chain campaign, establishing the defining novelty of this wave: the first documented case of malicious npm packages carrying valid SLSA Build Level 3 provenance attestations (Unit 42, 2026-05-21). Attackers compromised TanStack's legitimate GitHub Actions CI/CD pipeline's trusted OIDC identity mid-workflow — without stealing developer credentials — making the SLSA attestation genuine while the package payload was malicious. This invalidates "package carries valid provenance attestation" as a sufficient supply-chain integrity gate.

The execution chain runs tanstack_runner.js under the Bun JavaScript runtime, enumerating stored credentials including gh auth token capture (T1552.001 Unsecured Credentials: Credentials In Files); stolen npm tokens and GitHub PATs are used to backdoor every package the victim account can publish (T1650 Acquire Access), making the worm self-propagating across the npm ecosystem. By end of the 2026-05-11 wave, 373 malicious package versions across 169 npm packages and PyPI mirrors were active (Unit 42, 2026-05-21).

Defender actions from this technical update: (a) SLSA attestation verification is now insufficient as a sole gate — add runtime behavioural scanning of npm install scripts alongside provenance checks; (b) Pin GitHub Actions to commit SHAs, not mutable tags, to prevent mid-workflow OIDC identity hijack; (c) If pipelines ran npm publish during 2026-05-11 to 2026-05-12, rotate npm tokens and GitHub PATs and audit owned packages for unauthorised versions; (d) In environments where Bun is not an approved runtime, flag any bun or bun.js process execution from a CI runner context (Sysmon EID 1 process-name filter).

UPDATE: Microsoft Defender CVE-2026-41091 + CVE-2026-45498 — both CVEs confirmed exploited, out-of-band engine update 4.18.26040.7 confirmed as fix

UPDATE (originally covered 2026-05-20): Both Microsoft Defender vulnerabilities confirmed as actively exploited in the wild in a combined out-of-band engine update (The Hacker News, 2026-05-21). CVE-2026-41091 (CVSS 7.8, CWE-59 improper link resolution / link following in MsMpEng.exe) allows an authorized local standard-user to abuse Defender's privileged process's symbolic-link resolution during file-system operations to elevate to NT AUTHORITY\SYSTEM (T1068 Exploitation for Privilege Escalation). CVE-2026-45498 (CVSS 4.0, local DoS) was exploited alongside CVE-2026-41091 in observed attacks. Fixed: CVE-2026-41091 (LPE) requires Defender Antimalware Engine >= 1.1.26040.8; CVE-2026-45498 (DoS) requires Antimalware Platform >= 4.18.26040.7. Verify both via Get-MpComputerStatus | Select AMEngineVersion, AMProductVersion — environments with delayed WSUS/Intune update rings must confirm the engine version, not only the platform version, to confirm the LPE patch is applied. Environments with delayed auto-update channels (WSUS/Intune with manual approval) or air-gapped Defender deployments are at risk. Hunt signal: Sysmon EID 1 for SYSTEM-level process spawns from MsMpEng.exe as parent.

Changes since first coverage(1 prior appearance)
  1. 2026-05-202026-05-20First-coverage; MSRC 2026-05-19 publication with exploited=Yes, publiclyDisclosed=Yes

UPDATE: West Pharmaceutical Services — 8-K/A confirms full operational restoration, data investigation ongoing

UPDATE (originally covered 2026-W21): West Pharmaceutical Services (NYSE: WST) filed an 8-K/A amendment under SEC Item 1.05 on 2026-05-20 confirming full operational restoration across all manufacturing, supply chain, and commercial sites globally after the May 4 ransomware intrusion (SEC EDGAR 8-K/A, 2026-05-20). No unauthorized activity observed since 2026-05-05. Data exfiltration scope and threat actor attribution remain under investigation; Palo Alto Networks Unit 42 is conducting the forensic response. The 8-K/A marks formal closure of the containment phase under the SEC's mandatory cyber-incident disclosure cycle; data impact scope will require a further disclosure when the investigation concludes.

5. Deep Dive — Red Lamassu (Calypso/Bronze Medley): Showboat + JFMBackdoor telco espionage implant pair

Background. Calypso (also tracked as Red Lamassu and Bronze Medley) is a China-aligned espionage cluster active since at least mid-2022 based on Lumen's binary upload and victim telemetry — the Showboat/JFMBackdoor campaign dates to this period. The group has previously been linked to intrusions against government entities, energy companies, and telecommunications operators in Central Asia, South Asia, and the Middle East using commodity and bespoke tooling including PlugX and ShadowPad variants. Lumen Black Lotus Labs and PwC Threat Intelligence disclosed the Showboat/JFMBackdoor toolset on 2026-05-21 based on infrastructure analysis, binary upload telemetry, and victim telemetry (Lumen Black Lotus Labs, 2026-05-21 · PwC Threat Intelligence, 2026-05-21).

Linux implant: Showboat. Showboat is a modular post-exploitation ELF binary. On disk, the process name is kworker, directly impersonating Linux kernel worker threads to evade basic process-list inspection (T1036.005 Masquerade: Match Legitimate Name or Location). The implant contacts its C2 server, collects basic system information, and encodes the beacon data as Base64 inside PNG image field bytes — blending C2 beaconing with image-format traffic (T1001.002 Steganography). Functional modules provide: (1) remote shell (T1059.004 Unix Shell); (2) bidirectional file transfer; (3) SOCKS5 proxy and port-forwarding (T1090.001 Internal Proxy) — enabling the attacker to tunnel through the compromised telecom server into internal network segments without direct external access to those targets; (4) a hide command that fetches a rootkit payload from a Pastebin or forum-style dead-drop at runtime (T1102.001 Dead Drop Resolver), pulling additional capability after initial deployment rather than shipping it on disk. C2 infrastructure is geolocated to Chengdu, Sichuan province, consistent with prior Calypso campaigns. X.509 certificate SAN/CN clustering links the campaign's confirmed victim set.

Windows implant: JFMBackdoor. JFMBackdoor is delivered via DLL sideloading (T1574.002 Hijack Execution Flow: DLL Side-Loading): a batch script drops a legitimate vendor-signed executable alongside a malicious DLL in a writable path; the signed binary loads the DLL, providing the attacker with remote shell, file operations, SOCKS5 proxy, screenshot capture, and self-removal capability. The use of a vendor-signed loader binary defeats application allowlisting based on signing alone.

Kill-chain pattern. Initial access vector is not publicly confirmed; the long-running nature (mid-2022 to 2026) and focus on network-exposed telecom infrastructure suggest exploitation of public-facing services (T1190) or credential-based entry. Post-access, Showboat provides the persistent Linux bridgehead; from there SOCKS5 tunnels are used for lateral movement into internal segments (T1090.001). Data collection via T1560 Archive Collected Data and exfiltration via the C2 covert channel completes the chain.

Detection for EU/telco SOCs. (1) Linux: kworker processes whose parent is not kthreadd (PID 2) are anomalous — legitimate kernel workers are exclusively children of kthreadd; any kworker-named process with a user-space parent (e.g., bash, sshd, any application binary) is high-confidence suspicious. Enumerate via auditd EXECVE rules or Sysmon for Linux EID 1 with parent-pid cross-check. (2) Linux: SOCKS5 connection establishment from application-layer daemon processes (not expected proxy services) to non-standard ports is a lateral-movement pivot indicator. (3) Linux: DNS queries or HTTP GET to pastebin.com from processes running as root or as non-web-facing service accounts are anomalous — no production daemon should be fetching Pastebin content. (4) Windows: Sysmon EID 7 (ImageLoad) showing a signed process binary loading an unsigned DLL from a writable user-controlled path (e.g., AppData, Temp, or any path not under %SystemRoot%) warrants investigation. (5) Network: X.509 certificate attribute hunting against the Chengdu IP ranges described by Lumen Black Lotus Labs; if your threat-intel platform supports cert-fingerprint or SAN searches, use the campaign's known certificate clustering pattern as a pivot.

Hardening. On Linux telecom servers: (a) enforce process-name uniqueness checks via auditd rules that alert on EXECVE where comm matches kworker but ppid != 2; (b) egress-filter server processes to block outbound connections to hosting services (Pastebin, paste sites, general code-hosting) from root-context processes. On Windows: (c) require DLL signature enforcement via Windows Defender Application Control (WDAC) RequireSignedCode policy; (d) restrict writable paths in the DLL search order through AppLocker or WDAC deny-list rules on AppData\Roaming, Temp, and user-writable directories. Across the estate: (e) enforce strict outbound firewall rules on telecom infrastructure servers limiting egress to known management and update destinations.

6. Action Items

  • Patch Trend Micro Apex One On-Premise to server/agent build 17079 — CVE-2026-34926 is actively exploited ITW (JPCERT, 2026-05-22); a compromised management console deploys attacker code to all managed endpoints. Verify version via Apex One management console's product version page; apply KA-0023430. Treat the Apex One server host as Tier-0 — restrict management VLAN access before patch is applied.

Source: JPCERT/CC, 2026-05-22 · Tags: actively-exploited, vulnerabilities, cisa-kev · Region: global

  • Upgrade Langflow to >= 1.7.0 (or 1.9.3) — CVE-2025-34291 in CISA KEV (added 2026-05-21); Flodric botnet actively exploiting exposed Langflow instances via CORS token theft. If Langflow is internet-exposed, block access immediately and patch before re-exposing. Check langflow --version; update via pip install langflow --upgrade.

Source: CISA KEV, 2026-05-21 · Tags: actively-exploited, vulnerabilities, cisa-kev · Region: global

  • Restrict network access to Cisco Secure Workload REST API management plane — CVE-2026-20223 is CVSS 10.0 zero-auth; on-prem deployments require manual upgrade to 3.10.8.3 or 4.0.3.17 (3.9 and earlier: migrate). Until patched, firewall the Secure Workload cluster API endpoints to trusted management hosts only. See § 2 for affected version table.

Source: Cisco PSIRT, 2026-05-20 · Tags: vulnerabilities, rce, pre-auth · Region: global

  • Verify Defender Antimalware Engine >= 1.1.26040.8 (LPE fix) AND Platform >= 4.18.26040.7 (DoS fix) — CVE-2026-41091 (SYSTEM LPE via MsMpEng.exe link-following) confirmed ITW; run Get-MpComputerStatus | Select AMEngineVersion, AMProductVersion on all Windows endpoints. AMProductVersion alone does not confirm the LPE is patched — check AMEngineVersion. Environments using delayed-approval WSUS/Intune update rings may not have received the out-of-band engine update yet — approve immediately.

Source: Microsoft MSRC, 2026-05-19 · Tags: actively-exploited, vulnerabilities, lpe · Region: global

  • Hunt for kworker process anomalies on Linux telecom and infrastructure servers — Showboat (Calypso/Red Lamassu) masquerades as kworker; legitimate kernel workers are exclusively children of kthreadd (PID 2). Any kworker-named process with a user-space parent is high-confidence suspicious. Deploy auditd EXECVE rule checking ppid != 2 when comm = kworker, or Sysmon for Linux EID 1 with parent-pid filter. Flag egress DNS/HTTP to pastebin.com from daemon-context processes.

Source: BleepingComputer, 2026-05-21 · Tags: nation-state, espionage, china-nexus · Region: europe, middle-east · Sector: telco

  • Rotate npm tokens and GitHub PATs if your pipeline ran npm publish during 2026-05-11 to 2026-05-12 — TeamPCP Mini Shai-Hulud stole tokens via gh auth token capture in CI runners; self-propagating worm backdoored packages across every account the stolen token could reach. Audit owned npm packages for unauthorised versions published in that window.

7. Verification Notes

  • Coverage window: standard (gap to prior brief: 24 h, window: 36 h).
  • Items dropped — out-of-window primary source (all primary sources outside 36 h window):
    • ICO fine £963,900 vs. South Staffordshire Water (Cl0p, 20-month dwell) — ICO primary 2026-05-11, outside window. No in-window fresh development found.
    • Microsoft DART / HPE Operations Manager third-party intrusion case study (123-day dwell) — Microsoft Security Blog primary 2026-05-12, outside window. No in-window news coverage found.
    • Fortinet FortiAuthenticator CVE-2026-44277 (CVSS 9.8) + FortiSandbox CVE-2026-26083 (CVSS 9.1) — Fortinet PSIRT primary 2026-05-13, outside window. Not in CISA KEV; no confirmed exploitation in window.
    • SAP May 2026 Patch Day (CVE-2026-34260 SQL injection S/4HANA CVSS 9.6; CVE-2026-34263 unauthenticated RCE Commerce Cloud CVSS 9.6) — SAP Security Notes primary 2026-05-12, outside window.
  • Verizon 2026 DBIR (published 2026-05-19–20, S4 found, in-window): covered in weekly 2026-W21 as annual-report entry (PD-9 — no re-treatment in daily). Not re-summarised.
  • CVE-2026-45585 (YellowKey BitLocker bypass): previously covered as UPDATE on 2026-05-20; S2 sources (MSRC 2026-05-20, NCSC-NL 2026-05-20) are same-day as prior coverage — no material new delta; excluded.
  • Microsoft Entra ID / Azure cloud CVSS 10.0 cluster (CVE-2026-42901, CVE-2026-47280, CVE-2026-23652, CVE-2026-40411, CVE-2026-42823 — MSRC 2026-05-21): already mitigated server-side by Microsoft, no customer action required, no exploitation, ENISA EUVD status unverified. Excluded from § 2; operators monitoring Azure/Entra posture should review May 2026 MSRC release.
  • Single-source items: ICO POCA confiscation (Rizwan Manjra) — ICO is the primary disclosing party for its own enforcement action; no other source covered in window.
  • Coverage gaps: sophos-xops (HTTP 503, 4 consecutive failures, no bridge available); inside-it-ch (HTTP 403, 5 consecutive failures, no Wayback snapshot); databreaches-net (HTTP 403, bridge also 403, 4 consecutive failures, rotation-priority — WebSearch fallback found no in-window items); recordedfuture (RSS 404). Note: Lumen Black Lotus Labs blog previously recorded as redirect-to-homepage during research sub-agent phase; verification sub-agent (iter 1) confirmed the full blog URL resolves — Lumen and PwC Threat Intelligence are now promoted as primary sources for the Showboat/JFMBackdoor item in § 1 and § 5.
  • Verification iteration 1 (2026-05-22T06:40:29Z–06:46:02Z, Claude Opus 4.7): NEEDS_FIXES — 4 truth, 4 editorial, 1 advisory. All applied.
  • Verification iteration 2 (2026-05-22T06:54:52Z–07:00:28Z, Claude Sonnet 4.6): NEEDS_FIXES — 1 truth, 2 editorial. Findings: JPCERT advisory misplaced in Langflow footer (removed); HKCERT Evidence quote had no backing URL (HKCERT advisory URL added to § 0 callout footer); Defender AMEngineVersion check missing for LPE CVE (added). All applied.
  • Verification iteration 3 (2026-05-22T07:07:09Z–07:11:40Z, Claude Opus 4.7): CLEAN — 0 truth, 0 editorial, 0 advisory. All iter 1 and iter 2 remediations confirmed correct; all primary source facts independently verified.
  • CVE-2025-34291 (Langflow) source quality gap (iter 2 advisory F4): CISA KEV is the only non-NVD primary reachable in this run; the JPCERT advisory in url-liveness.tsv covers only Apex One. Trend Micro's Flodric botnet analysis was not reachable as a primary URL. Reduced confidence on Flodric attribution specifics — the core CORS/token-theft CVE details are from the CISA KEV description, which directly quotes the Langflow security bulletin.