ctipilot.ch

CTI Daily Brief — 2026-05-23

Typedaily
Date2026-05-23
GeneratorClaude Opus 4.7 (`claude-opus-4-7`)
ClassificationTLP:CLEAR
LanguageEnglish
Promptv2.59
Items12
CVEs5
On this page

On this page

Tags (22)
Regions (7)
References (31)

0. TL;DR

  • Drupal CVE-2026-9082 now actively exploited; CISA KEV-listed 2026-05-22. Drupal updated SA-CORE-2026-004 to confirm in-the-wild exploit attempts on PostgreSQL-backed sites; Imperva measured 15,000+ attempts against ~6,000 sites across 65 countries; NCSC.ch Security Hub flipped post 12584 to "Actively exploited" the same day (Drupal Security Team, 2026-05-22 · Imperva, 2026-05-21 · NCSC-CH, 2026-05-22).
  • Dutch FIOD seizes 800 servers from Stark Industries proxy hoster — among the first publicly reported EU criminal enforcement actions against a sanctions-shielding bulletproof host. Suspects connected to WorkTitans B.V. and MIRhosting arrested for sustaining the infrastructure that fronted NoName057(16) DDoS operations against EU and Swiss public-sector targets (FIOD, 2026-05-22 · BleepingComputer, 2026-05-22).
  • Kimwolf / "Dort" arrested in Ottawa — 30+ Tbps DDoS-for-hire infrastructure. Jacob Butler, 23, charged in U.S. and Canada for operating the AISURU-variant Kimwolf botnet; >25,000 attack commands including against DoD IP space; coordinated C2 takedown March 2026 dismantled Kimwolf alongside AISURU/JackSkid/Mossad (KrebsOnSecurity, 2026-05-22).
  • Megalodon automated-poisoned 5,561 GitHub repos on 2026-05-18. Automated commits inject SysDiag and Optimize-Build GitHub Actions workflows that exfiltrate AWS/GCP/Azure credentials, OIDC tokens and SSH keys from CI runners; the @tiledesk/tiledesk-server npm package 2.18.6–2.18.12 carries the dormant Optimize-Build variant (SafeDep, 2026-05-21 · OX Security, 2026-05-21).
  • FBI PSA260521 warns on Kali365 — OAuth device-code PhaaS bypassing M365 MFA without credential capture. $250/month Telegram-distributed kit issues device codes via lures impersonating Adobe/DocuSign/SharePoint; secondary AiTM mode proxies session cookies; observed outcomes since April 2026 include mailbox exfiltration, lateral phishing, BEC fraud and ransomware pre-staging (The Register, 2026-05-22 · Help Net Security, 2026-05-22).
  • Iran's Screening Serpens (UNC1549) operationalises AppDomainManager hijacking against aerospace, defence and telecom. Unit 42 documents six new RAT variants (four MiniUpdate, two MiniJunk V2) deployed via legitimate Microsoft .NET binaries paired with weaponised .runtimeconfig.json files that silently disable ETW tracing and strong-name validation before the RAT runs (Unit 42, 2026-05-22).

Immediate Action — Patch Drupal CVE-2026-9082 today on PostgreSQL-backed deployments. Active in-the-wild exploitation was confirmed by Drupal and corroborated by NCSC.ch on 2026-05-22; Imperva reports observing 15,000+ exploitation attempts against ~6,000 sites across 65 countries (Imperva, 2026-05-21). The flaw is an anonymous pre-authentication SQL injection in the Entity Query API's PostgreSQL path — no login, no role, no user interaction required. Swiss federal and cantonal portals, EU institution Drupal instances, and academic SWITCH-hosted sites running PostgreSQL backends are direct targets. Patch to 10.4.10 / 10.5.10 / 10.6.9 / 11.1.10 / 11.2.12 / 11.3.10 or one of the EOL best-effort releases per SA-CORE-2026-004; if patching cannot be completed today, the safest temporary control is to swap the database backend to MySQL/MariaDB (the injection does not affect those backends).

3. Research & Investigative Reporting

Unit 42 — Iran's Screening Serpens (UNC1549 / Smoke Sandstorm / Nimbus Manticore): AppDomainManager hijacking silently disables ETW + strong-name checks in six new RATs

Unit 42 published a comprehensive write-up on Screening Serpens (a.k.a. UNC1549, Smoke Sandstorm, Nimbus Manticore) on 2026-05-22 covering operations from February through April 2026 timed to the onset of the U.S.–Israeli Middle East conflict that began 2026-02-28 (Unit 42, 2026-05-22 · Cybersecurity Dive, 2026-05-22). The group deployed new RAT variants across two malware families: MiniUpdate in four variants used between 2026-03-26 and 2026-04-17 with lures impersonating aviation, healthcare and financial-services firms, and MiniJunk V2 in two variants used between 2026-02-17 and 2026-03-27 against Middle Eastern and U.S. targets.

The technically significant evolution is AppDomainManager hijacking (T1574.014) paired with classic DLL sideloading (T1574.001): the infection chain drops a legitimate Microsoft .NET executable alongside a weaponised UpdateChecker.dll / InitInstall.dll / Updater.dll and — critically — a malicious .runtimeconfig.json that redirects the CLR's AppDomainManager loading at process startup, silently disabling ETW tracing and strong-name validation before the RAT executes. That leaves the host's EDR operating in a reduced-telemetry mode on every infected workstation. Delivery is high-touch — fake recruitment PDFs, spoofed video-conference meeting invitations, and ZIP archives containing a legitimate executable as the trigger; persistence uses scheduled tasks; C2 routes through Azure-hosted domains. Confirmed targets: U.S., Israel, UAE, plus at least two further Middle Eastern entities consistent with prior UNC1549 focus on aerospace, defence and telecommunications. The CH/EU nexus is indirect but real — Swiss aerospace and defence suppliers (RUAG, Pilatus and defence export channels) sit squarely in the sector profile, as do EU R&D firms historically swept up in Iranian collection campaigns.

Detection vantage: alert on .runtimeconfig.json writes by non-installer processes; watch the Microsoft-Windows-DotNETRuntime ETW provider for StrongNameVerification=0 startup events and CLR debug-mode initialisation; watch scheduled-task creation from processes with .dll parent images loading via rundll32.exe / svchost.exe. Hardening: enforce a code-integrity policy (UMCI + trusted-signers allowlist) so unsigned DLLs cannot load into the .NET CLR; restrict .runtimeconfig.json writes outside install paths via FIM.

Unit 42 — ROADtools operationalised by Midnight Blizzard, Curious Serpens and UTA0355 for Entra ID device registration, token theft and tenant enumeration

Unit 42 documents (2026-05-22) systematic nation-state operationalisation of ROADtools — the open-source Python Entra ID attack/defence framework hosted at github.com/dirkjanm/ROADtools — by three named clusters: Cloaked Ursa / Midnight Blizzard / APT29 / NOBELIUM (Russia), Curious Serpens / Peach Sandstorm / APT33 (Iran) and UTA0355 (Russian state-affiliated) (Unit 42, 2026-05-22). The chain begins with credential compromise (password spray or OAuth device-code phishing — see § 1 Kali365), then uses roadtx to register attacker-controlled devices in the victim's Entra ID tenant, establishing persistence via a Primary Refresh Token bound to a registered device. The roadrecon module performs systematic directory enumeration via legacy Azure AD Graph API calls — now also ported to the msgraph branch — targeting users, groups, service principals, application permissions and OAuth token grants.

MITRE ATT&CK techniques mapped explicitly by Unit 42: T1098.005 (Account Manipulation: Device Registration), T1550 (Use Alternate Authentication Material), and T1087 (Account Discovery via Microsoft Graph API). The device-PRT-binding step functionally bypasses tenant MFA — the brief leaves the explicit T1556.006 framing off since Unit 42 does not map it that way; defenders running custom ATT&CK overlays may want to add it themselves. Volexity's April 2025 OAuth device-code paper is the historical background for the device-code half of the chain. Detection vantage: monitor Entra ID audit logs for Add device events from unfamiliar device names or from IPs not in expected employee geographies; alert on sign-in logs carrying the roadtx user-agent string or unexpected https://login.microsoftonline.com/common/oauth2/token device-code grant flows; review Microsoft Graph Activity Logs for bulk GET /users, GET /groups and GET /servicePrincipals calls clustered by time. Hardening: enforce Conditional Access token-protection (token binding renders stolen tokens non-transferable across devices); restrict device registration to compliant or hybrid-joined devices only; enforce Privileged Access Workstation policy for admin token issuance; block Azure AD Graph via blockLegacyAuthentication. Midnight Blizzard has a documented pattern of targeting EU diplomatic corps and government Microsoft 365 tenants, so the relevance to Swiss federal and EU institution Entra estates is direct.

ANNUAL REPORT — Rapid7 Q1 2026 Threat Landscape Report: vulnerability exploitation now top initial-access vector at 38 %; KEV median time to listing collapses to 5 days

Rapid7 Labs published its Q1 2026 Threat Landscape Report on 2026-05-21 covering January–March 2026 IR data; the GlobeNewswire release accompanied the post the same day. The findings that change what a Swiss/EU public-sector SOC should prioritise:

  • Vulnerability exploitation accounted for 38 % of confirmed initial-access vectors, overtaking social engineering (24 %) in Rapid7's Q1 2026 dataset. The implication: edge / perimeter patch SLAs and exposure management now drive blast-radius more than awareness training does.
  • More than 50 % of actively exploited vulnerabilities in Q1 2026 were zero-click, network-facing flaws requiring no authentication or user interaction. The defensive prioritisation gradient sharpens: pre-auth network-facing CVEs > authenticated CVEs > anything user-interaction-dependent.
  • Median time from public disclosure to CISA KEV listing fell from 8.5 days to 5.0 days. Operators of EU/CH public-sector estates running on monthly patch windows lose ground every cycle; the report frames this as faster AI-assisted N-day weaponisation. PD-13 still applies — the KEV addition is the exploitation-confirmation signal, not a US-only compliance deadline — but the window between "vendor publishes" and "expect attempts" has narrowed materially.
  • Exploited vulnerabilities averaged 1.8 million mentions across forums, blogs and social media before operational targeting, making chatter spikes a leading indicator of imminent exploitation waves.
  • SQL injection became the most-exploited vulnerability class in Q1 2026, validating the Drupal CVE-2026-9082 story above as part of a broader shift.
  • RMM tool abuse accounted for 22.9 % of observed threat activity, ClickFix-style social engineering 18.8 % — both worth re-checking on EDR detection coverage in EU/CH environments where ClickFix browser drive-by is less culturally familiar than in U.S. consumer markets.

The report also covers a geopolitical layer (Iranian, Russian and Chinese campaigns synchronised with Middle East military escalation; tools mentioned include BPFDoor and ModeloRAT) and ransomware fragmentation (Qilin leads at 357 leak-site posts, The Gentlemen 206, Akira 174; pure-extortion without encryption continues to grow). Per PD-9 this is the dedicated treatment of the report; specific findings will be cited as context in future briefs rather than re-summarised.

ANNUAL REPORT — Check Point Research March-April 2026 AI Threat Landscape Digest: a single operator runs two AI platforms in parallel to breach nine Mexican government agencies [SINGLE-SOURCE]

Check Point Research's March-April 2026 AI Threat Landscape Digest (published 2026-05-22) is the operationally most striking annual / periodic AI report of the past month. The centrepiece — researched by Gambit Security and summarised in the Check Point post — documents a single unidentified operator compromising nine Mexican government agencies between December 2025 and February 2026, covering tax records, civil registry, patient files and electoral infrastructure. The structural innovation: the attacker ran two commercial AI platforms in parallel — one managing live exploitation and issuing >5,000 AI-executed commands, a second processing harvested data and feeding instructions back into the first. Persistence for the AI itself was simple: modifying the AI client's startup configuration file to embed persistent instructions inherited by every subsequent session.

Two further findings have direct EU/CH public-sector implications. First, the EvilTokens platform — a commercial jailbreak-as-a-service tool packaging AI-driven phishing generation, financial-data extraction and similar capabilities as a subscription — represents the same commoditisation curve as Kali365 (§ 1) but for AI-assisted intrusion. Second, CPR explicitly calls out that stolen API keys for Anthropic, OpenAI, Groq and Mistral are now high-value criminal targets, since they grant access to powerful AI services without an account; Swiss federal and cantonal agencies using commercial AI APIs should treat key rotation cadence and source-IP scoping (Conditional Access on the API layer) on par with classic privileged-credential hygiene. Detection vantage: bulk exfiltration events temporally co-located with anomalous API call patterns to commercial AI services from non-standard processes; process trees in which AI client libraries spawn data-collection subprocesses; cloud audit logs showing API key issuance followed immediately by large-volume inference calls from unusual source IPs.

4. Updates to Prior Coverage

UPDATE: Drupal CVE-2026-9082 — CISA KEV addition + active exploitation confirmed; NCSC.ch flips post 12584 to "Actively exploited"

UPDATE (originally covered 2026-05-21): On 2026-05-22 Drupal updated SA-CORE-2026-004 to confirm that exploit attempts targeting CVE-2026-9082 — the anonymous pre-authentication SQL injection in the Entity Query API's PostgreSQL path — are now being detected in the wild. NCSC.ch updated Security Hub post 12584 to "Actively exploited" status the same day at 13:52Z, also recording the addition of CVE-2026-9082 to the CISA Known Exploited Vulnerabilities catalog on 2026-05-22 (the NCSC-CH post is the brief's source of record on the KEV add; the CISA news-events alert URL constructed earlier in the day returned a 404 at composition time).

Imperva reports observing 15,000+ exploitation attempts against approximately 6,000 Drupal sites across 65 countries within days of disclosure (Imperva, 2026-05-21). The technical mechanism (now public via the Searchlight Cyber write-up): on the case-insensitive IN operator path through core/lib/Drupal/Core/Entity/Query/Sql/Condition::compile() / ConditionAggregate::compile(), a JSON-encoded array value survives into the SQL placeholder name without sanitisation, allowing injection when the backend is PostgreSQL. Fixed versions: 10.4.10, 10.5.10, 10.6.9, 11.1.10, 11.2.12 and 11.3.10; best-effort patches for EOL Drupal 8.9 and 9 are also available. MySQL/MariaDB/SQLite-backed Drupal sites remain unaffected, which is the temporary control to fall back on if the patch window slips past today.

Defender vantage update from yesterday's brief: the operational frame is no longer "patch when convenient" but patch today — the § 0 Immediate Action carries the operational framing; this UPDATE captures the source-of-record links and the technical mechanism for anyone composing internal advisories or hunt queries. CH/EU specifics: NCSC.ch Security Hub is the authoritative jurisdictional source for Swiss federal and cantonal operators; Drupal-on-PostgreSQL is widespread across FITKO and SWITCH-hosted university sites, French gouvernement.fr instances and EU institution portals. Detection: WAF telemetry for nested JSON arrays in user-supplied fields hitting Drupal endpoints; PostgreSQL log_min_duration_statement to surface anomalous query shapes; web-server logs for unexpected POST payloads to anonymous routes.

Changes since first coverage(1 prior appearance)
  1. 2026-05-212026-05-21

UPDATE: Ghostwriter / UAC-0057 / FrostyNeighbor — CERT-UA documents new OYSTERFRESH → OYSTERBLUES → OYSTERSHUCK implant chain via Prometheus learning-platform lures

UPDATE (originally covered weekly 2026-W21): CERT-UA published a bulletin (surfaced 2026-05-22) on a spring-2026 phishing campaign by Ghostwriter (a.k.a. UAC-0057, UNC1151, FrostyNeighbor) targeting Ukrainian government entities through lures themed on the Prometheus online-learning platform (The Hacker News, 2026-05-22 · SC World, 2026-05-22). The material delta from this week's weekly long-running coverage of FrostyNeighbor / Ghostwriter activity is a new three-stage implant trio distinct from the prior PicassoLoader toolset.

Chain: phishing email from a compromised account → PDF attachment with a link to a ZIP archive → ZIP carrying a JavaScript file (OYSTERFRESH). OYSTERFRESH renders a decoy document as cover while writing an obfuscated, RC4-encrypted OYSTERBLUES payload to the Windows Registry and launching OYSTERSHUCK. OYSTERSHUCK decodes OYSTERBLUES (executed via JavaScript) which then collects computer name, user account, OS version, last boot time and running process list, exfiltrates via HTTP POST to C2, and executes dynamically received JavaScript via eval(). The final payload is assessed as Cobalt Strike. (MITRE ATT&CK overlay added by this brief, not by the CERT-UA narrative as carried by The Hacker News: T1027 Obfuscated Files/Information on the OYSTERFRESH stage, T1547.001 Registry Run Keys on the OYSTERBLUES persistence, T1059.007 JavaScript on OYSTERSHUCK execution, T1219 Remote Access Software on the Cobalt Strike final.)

Defender vantage: CERT-UA's own recommendation is to block wscript.exe execution for standard user accounts — a high-yield control because the OYSTER trio relies on script-host execution from user context. EDR signal: wscript.exe spawning powershell.exe or a base64-encoded command; registry monitoring for new HKCU\Software Run-key values containing binary blobs or script paths; hunt for Cobalt Strike beacon signatures in HTTP POST egress to non-corporate domains. The EU/CH relevance is direct: Ghostwriter historically targets Belgium, Germany, Poland, Lithuania, Latvia and other NATO members alongside Ukraine, and the OYSTER implant chain is a toolset upgrade defenders should expect to see surfaced in EU government tenants and Eastern-Europe-focused think tanks.

5. Deep Dive — CVE-2026-46333 ssh-keysign-pwn: a 9-year ptrace race in the Linux kernel reaching root and SSH host keys

Background. The Linux kernel's __ptrace_may_access() permission check in kernel/ptrace.c has been a recurring source of local-privilege-escalation primitives ever since the dumpable / capability model was introduced. CVE-2019-13272 (Jann Horn, 2019) exploited a similar credential-window confusion in the same function. The introduction of pidfd_getfd() in v5.6-rc1 (January 2020) added a second axis — fd duplication across processes — that has compounded ptrace-window primitives by allowing fds harvested during a privileged credential window to be reused under the attacker's UID. Qualys's Looney Tunables (CVE-2023-4911) set the template for the credibility-with-public-exploits disclosure pattern Qualys has continued since. CVE-2026-46333 fits squarely in that lineage: a long-dormant logic error reaching first-class root primitives, with the disclosure structured around defender-actionable analysis rather than weaponisation help.

The bug. Qualys TRU disclosed CVE-2026-46333 on 2026-05-20 (the URL path encodes the disclosure date; the Qualys blog also carries a 2026-05-22 rendered "Date" field that appears to reflect a content update; the brief uses the URL-encoded disclosure date as anchor) (The Hacker News, 2026-05-21 · Canonical / Ubuntu, 2026-05-19; upstream kernel fix landed 2026-05-14) — a TOCTOU race in __ptrace_may_access() present since Linux v4.10-rc1 (November 2016). The window is the brief interval when a privileged process drops credentials — for example a setuid binary calling setuid() to lower privilege after performing a privileged action. During that window __ptrace_may_access() incorrectly permits ptrace attachment, because credential comparison is performed against the uid/gid captured at the time of the ptrace_may_access() call rather than at the point of the actual access; the dumpable flag is re-evaluated too late. An unprivileged caller racing the credential drop wins ptrace rights on the target.

The chain. A standalone ptrace win is interesting; the chain that promotes it to a four-target root primitive is the combination with pidfd_getfd(). Once attached, the attacker uses pidfd_getfd() to duplicate file descriptors from the privileged process into the attacker's own process. Those fds — opened by the privileged process for reading /etc/shadow, writing to /etc/ssh/ssh_host_*_key, executing as root, or speaking to D-Bus / systemd over a privileged socket — are now usable under the attacker's UID. Qualys developed four working exploits, detailed in the public advisory (exploit code itself was withheld during coordinated disclosure; the advisory and PoC outputs are public):

  • chage (setuid-root, setgid-shadow) → reads /etc/shadow and recovers the local hash database for cracking.
  • ssh-keysign (setuid-root) → exfiltrates SSH host private keys from /etc/ssh/ — the host's identity to the rest of the network, enabling SSH MITM and host impersonation on internal links.
  • pkexec (setuid-root) → arbitrary root command execution; functionally equivalent to PwnKit (CVE-2021-4034) outcomes but reached through a different primitive.
  • accounts-daemon (root daemon, not setuid) → arbitrary root command execution via hijacked D-Bus connection to systemd.

Exploits confirmed working on Debian 13, Ubuntu 24.04 / 26.04, Fedora 43 / 44; the underlying primitive applies to any distro carrying a v4.10-or-newer kernel and a standard setuid surface. Prerequisites: a local unprivileged shell on the target host. No network exposure required — this is a pure post-foothold escalation primitive — and no kernel hardening short of restricting ptrace defeats it on a default Linux server.

MITRE ATT&CK mapping. Primarily T1068 Exploitation for Privilege Escalation; the SSH-key exfiltration outcome maps to T1552.004 Unsecured Credentials: Private Keys; the D-Bus path through accounts-daemon is closer to T1543.002 Create or Modify System Process: Systemd Service in outcome shape.

Detection vantage. Qualys published QID 387392 for vulnerability scanning. Behavioural detection is the operationally interesting axis because the primitive is hard to defeat without a kernel update:

  • Syscall pairing. EDR / auditd hunt for pidfd_getfd syscall paired with ptrace calls originating from a non-root process targeting a setuid-root process. The combination is rare in normal workloads and is the canonical fingerprint of the exploitation pattern.
  • Anomalous credential-file reads. /etc/shadow read by non-root, non-PAM-stack processes; /etc/ssh/ssh_host_*_key read by non-sshd processes.
  • D-Bus → systemd anomalies. accounts-daemon D-Bus connections from process trees lacking a legitimate parent (e.g. spawned from a shell rather than a login session).
  • Audit-rule pattern. auditctl -w /etc/shadow -p r -k shadow_read plus -w /etc/ssh -p r -k ssh_host_key_read; pair with -a always,exit -F arch=b64 -S pidfd_getfd -k pidfd_getfd_audit.

Hardening / mitigation. The supported mitigation hierarchy:

  1. Patch. Upstream kernel fix landed 2026-05-14; distribution vendor packages are available from Debian, Fedora, Red Hat, SUSE, AlmaLinux, CloudLinux and Ubuntu (Canonical's ssh-keysign-pwn advisory). Roll the kernel where USNs / DSAs are available; for ELRepo / longterm trees, build against the patched stable tag.
  2. Interim: sysctl kernel.yama.ptrace_scope=2. Restricts ptrace to processes carrying CAP_SYS_PTRACE. This eliminates the primitive on non-root processes but breaks debuggers and some profiling tools; deploy via configuration management with explicit allowlist of dev workstations or jump hosts where ptrace is needed.
  3. Restrict pidfd_getfd via seccomp on multi-tenant or container hosts. Where workloads can be characterised, deny pidfd_getfd via seccomp profiles on container runtimes; Docker / containerd default profiles can be extended.
  4. Container-runtime context. Multi-tenant Kubernetes nodes where lower-privilege workloads share the host kernel are the highest-risk environment because the primitive operates at kernel level — userns remapping does not block it. Treat patched-kernel rollout as a hard prerequisite for multi-tenant nodes.

Why this is a deep dive and not a § 2 entry. CVE-2026-46333 is a local LPE primitive — no pre-authentication network surface, no automated mass-exploitation pattern in the wild yet — so it does not clear the § 2 inclusion gates the prompt enforces. But the combination of all-major-distros affected, four working Qualys exploits detailed in the public advisory, nine-year dormancy in a kernel function under repeated scrutiny, and SSH host-key exfiltration as one of the achievable outcomes makes it the highest-signal Linux-LPE deep dive of the last fortnight. Every EU/CH public-sector environment running Linux containers, multi-tenant compute or developer workstations sits within the affected surface; the patch rollout window is the actionable defensive frame.

6. Action Items

(Derived from this brief's content only. Generic advice does not belong here.)

  • Patch Drupal CVE-2026-9082 today on every PostgreSQL-backed Drupal deployment — pre-auth SQL injection, active exploitation, 15,000+ attempts measured by Imperva, NCSC.ch status "Actively exploited". Target versions: 10.4.10 / 10.5.10 / 10.6.9 / 11.1.10 / 11.2.12 / 11.3.10 per Drupal SA-CORE-2026-004. MySQL/MariaDB/SQLite backends are unaffected — if patching slips, swap the backend as a temporary control.

  • Patch SPIP to 4.4.15 across every Francophone public-administration deployment — ANSSI CERTFR-2026-AVI-0635 is the operational driver; the underlying issue is an open-redirect on the cookie action (per the SPIP project blog), commonly chained into account-impersonation. SPIP is the predominant CMS in Romandie cantonal / communal portals, French ministries and Belgian Francophone government sites. No CVE attached, so the patch is easy to overlook on CVE-driven tooling.

  • Roll kernel patches for CVE-2026-46333 on every Linux estate; raise kernel.yama.ptrace_scope=2 as interim on hosts that cannot be rebooted yet. Four working Qualys exploits detailed in the public advisory (exploit code withheld during coordinated disclosure), all major distros affected, SSH host-key exfiltration in the outcome set. Multi-tenant Kubernetes nodes carry highest residual risk. Full detection / hardening package in § 5 Deep Dive below.

  • Block user-interactive OAuth device-code flow via Entra ID Conditional Access to defeat Kali365 PhaaS; enforce FIDO2 phishing-resistant MFA for privileged accounts and audit existing OAuth app consents. After a suspected device-code compromise the only persistent-token clearing path is Revoke-MgUserSignInSession — refresh tokens survive password resets.

  • Audit .github/workflows/*.yml across every internal fork and rotate CI cloud credentials issued during the Megalodon window on 2026-05-18. SafeDep and OX Security published the SysDiag and Optimize-Build payload markers and committer-identity tells; look for the forged build-bot / auto-ci / ci-bot / pipeline-bot author strings on commits dated to that day. Move CI to OIDC-based trusted publishing where long-lived cloud credentials still exist.

  • Hunt for Entra ID Add device events and roadtx user-agent strings following the Unit 42 ROADtools write-up; restrict device registration to compliant / hybrid-joined devices and enforce Conditional Access token-protection on admin sessions. Midnight Blizzard / APT29 has a documented EU diplomatic-tenant targeting pattern — Swiss federal and EU institution Entra estates are direct.

  • Re-baseline DDoS scrubbing capacity against a 10–30 Tbps reference and re-check AS-level ingress blocklists. AS44477 (legacy Stark) and AS209847 (THE.Hosting / WorkTitans) are the relevant ASNs per Recorded Future's 2025 Insikt Group analysis — verify the current routing-table state via your IRR / RPKI tooling before pushing a blocklist update, since the post-FIOD seizure could have reshuffled BGP advertisements. The Kimwolf and Stark / WorkTitans takedowns reduce immediate supply but DDoS-for-hire reorganises within weeks; treat the moment as a capacity exercise window, not a closed risk.

7. Verification Notes

  • Items dropped (off-audience / less-is-more): Oncology Institute Inc. SEC Item 1.05 8-K (US-only oncology practice, no Swiss/EU nexus, single-source MEDIUM via Globe and Mail relay since the EDGAR filing index returned HTTP 403 to the bridge fetcher — relevance bar not met); Cloud Atlas / Kaspersky Securelist 2026 PowerCloud + ReverseSocks coverage (substantive but indirect EU nexus — Cloud Atlas targets Russian and Belarusian government primarily; EU diplomatic exposure is collateral). Both available for re-surfacing if a CH/EU victim or operationally relevant detail emerges.
  • Items dropped (out of window): Germany Cyber-Dome / Cyber-Security Strengthening Act announcement (Interior Minister Dobrindt, 2026-05-12) — outside the 36 h recency window with no in-window legislative delta (cabinet vote outcome, final text). Carry forward; surface in next brief if a cabinet decision or NIS2 cross-impact lands in-window.
  • CVEs dropped from § 2 with reason: CVE-2026-46333 — does not clear any § 2 inclusion gate (local LPE not pre-auth RCE; four working Qualys exploits detailed in the public advisory but no in-the-wild exploitation reported by Qualys or downstream researchers as of this run). Covered instead as § 5 Deep Dive given operational depth.
  • Items included with reduced confidence: Rhysida ransomware claim against Landeshauptstadt Stuttgart — [MEDIUM] confidence; corroboration is press coverage of the leak-site listing and a DeXpose write-up, not a victim statement (city denies confirmed incident). Treat as hunt-trigger not confirmed-victim. FBI PSA260521 details on Kali365 — the IC3 advisory itself (ic3.gov/PSA/2026/PSA260521) returned HTTP 403 to the bridge fetcher; primary advisory text was reconstructed from four independent corroborating outlets (The Register, Help Net Security, The Record, CyberScoop) all quoting the FBI text verbatim. Confidence HIGH on the technical content; primary URL not directly fetched in this run. SEC EDGAR direct-filing access also returned 403 (TOI 8-K), but TOI was dropped on relevance grounds rather than carried with degraded sourcing. Check Point Research March-April 2026 AI Threat Landscape Digest is [SINGLE-SOURCE] — only the CPR blog post was directly fetched in this run; the Gambit Security primary report URL referenced in earlier drafts returned a 404 and was dropped per the verifier iter-1 F1 finding.
  • Kimwolf primary-source upgrade applied in iteration 1: following the verifier's F6 finding, the DOJ press release on the indictment (justice.gov/usao-ak/pr/canadian-man-arrested-international-authorities-charged-administrating-kimwolf-ddos) was promoted to the first Source link in the § 1 Kimwolf footer, with KrebsOnSecurity demoted to second Source and The Hacker News + The Record kept as Additional sources. Confidence on the factual outline (defendant, charges, peak throughput, takedown sequence) is HIGH due to corroboration density anchored on the DOJ primary.
  • Contradictions: Drupal SA-CORE-2026-004 carries vendor severity 23/25 ("Highly Critical") while NIST's published CVSS v3.1 is 6.5 — the gap reflects Drupal's CMS-wide-impact risk framing versus NVD's strict base-score calculation. Brief reports both; the operational truth is "actively exploited pre-auth SQL injection on PostgreSQL backends" regardless of which score scheme is referenced.
  • Sub-agents that didn't return on time: none — S1 / S2 / S3 / S4 all returned within the 30 min wall-clock cap. S2 (Sonnet 4.6): 4 items, 322 s; S3 (Sonnet 4.6): 5 items, 330 s + later updates; S1 (Sonnet 4.6): 6 items, 557 s; S4 (Sonnet 4.6): 3 items, 574 s. Sub-agent self-reported telemetry: webfetch 8/7/11/22, websearch 16/5/14/12, bridge fetches 10/14/9/8 for S2/S3/S1/S4 respectively.
  • Verification loop (Phase 5.7): four iterations, model-rotated per v2.47 — iter 1 (Opus) NEEDS_FIXES truth=9 editorial=4 advisory=2, iter 2 (Sonnet) NEEDS_FIXES truth=3 editorial=1 advisory=1, iter 3 (Opus, cold) NEEDS_FIXES truth=5 editorial=2 advisory=3, iter 4 (Sonnet + iter-3 deltas) CLEAN truth=0 editorial=0 advisory=3. Brief published under iteration 4's CLEAN verdict. Three iter-4 F11 advisory items applied as cheap edits before publish: SafeDep citation label corrected to 2026-05-21; DOJ citation label corrected to 2026-05-21 to match the body's Thursday-2026-05-21 unsealing-date reading; Danish-authorities NoName057(16) claim softened to "per De Volkskrant reporting carried by BleepingComputer, Danish authorities have alleged that WorkTitans infrastructure supported NoName057(16) DDoS campaigns".
  • Candidate-source overflow: S3 surfaced two new candidate sources (searchlight-cyber — high-quality same-day technical analysis of CVE-2026-9082; gambit-security — primary research on the Mexico AI-orchestrated nine-agency breach). Per the one-candidate-per-run cap, searchlight-cyber was added as status: candidate in sources/sources.json; gambit-security is carried forward for next run.
  • Coverage gaps: databreaches-net (transport-403, Cloudflare challenge — fifth consecutive failing run, content cross-checked via BleepingComputer/TheRecord/SecurityAffairs); inside-it-ch (Cloudflare challenge + stale Wayback — fifth consecutive failing run, no Swiss-specific in-window items recovered via WebSearch fallback); sophos-xops (HTTP 503 on canonical RSS — fifth consecutive failing run); dragos-ot (HTTP 404 on resource library RSS — feed appears stale); trendmicro-research (rotation-priority but not retried this run); cisa.gov direct fetches consistently 403 (mitigation: python3 tools/fetch_source.py bridge — used for CISA KEV catalog ingest); ic3.gov direct fetches 403 (Kali365 PSA reconstructed from four corroborators); sec.gov EDGAR direct 403; heise.de Security articles TollBit-gated (HTTP 307 → tollbit.heise.de — feed summaries only); cert-eu (3 of 7 recent runs returned no new advisory — quiet, no advisory dated within this 36 h window — most recent is 2026-006 from 2026-05-06 on PAN-OS); anssi-fr (in-window CERTFR-2026-AVI-0611 on Azure surfaced but not operationally significant for this brief; AVI-0635 SPIP fetched and included); jpcert (no in-window lead surfaced; bridge not used in this run); prodaft (not attempted — no in-window publication surfaced via WebSearch); euronews (Cloudflare challenge on direct + Wayback miss — Germany Cyber-Dome AFP wire content recovered via The Star republication, but item ultimately dropped as out-of-window). edpb, cnil-fr returned 200 / no in-window enforcement actions — that is a quiet day, not a coverage gap.