ctipilot.chSwitzerland · Europe · Public sector

Kaspersky Q1 2026 Exploits and Vulnerabilities Report

annual-report · annual-report:kaspersky-q1-2026-exploits

Coverage timeline
1
first 2026-05-08 → last 2026-05-08
Briefs
1
1 distinct
Sources cited
11
6 hosts
Sections touched
1
research
Co-occurring entities
1
see Related entities below

Story timeline

  1. 2026-05-08CTI Daily Brief — 2026-05-08
    researchFirst and only treatment. Document-based exploit resurgence; Office Protected View bypass dominant Q1 2026; +34% browser exploitation QoQ; RaaS groups acquiring zero-days directly from brokers. [SINGLE-SOURCE-OTHER]

Where this entity is cited

  • research1

Source distribution

  • securelist.com5 (45%)
  • kaspersky.com2 (18%)
  • bleepingcomputer.com1 (9%)
  • helpnetsecurity.com1 (9%)
  • thehackernews.com1 (9%)
  • therecord.media1 (9%)

Related entities

All cited sources (11)

Items in briefs about Kaspersky Q1 2026 Exploits and Vulnerabilities Report (2)

Kaspersky Q1 2026 Exploits and Vulnerabilities Report: document-based exploits resurge; RaaS acquires zero-days

From CTI Daily Brief — 2026-05-08 · published 2026-05-10 · view item permalink →

Kaspersky's quarterly exploitation analysis for Q1 2026 identifies a marked resurgence in document-based exploit delivery, with Microsoft Office and PDF readers accounting for the largest share of initial-access exploit deployments. The most exploited CVE class involved Office Protected View bypass chains (multiple CVEs published in January 2026 Patch Tuesday). Browser exploitation via V8 memory corruption grew 34% quarter-on-quarter. A significant structural trend: ransomware-as-a-service operators are increasingly acquiring zero-day exploits directly from private brokers rather than relying on publicly available PoC code, shortening the detection window between disclosure and mass exploitation. The report includes Excel macro delivery via cloud storage abuse as an emerging initial-access technique.

Amazon SES weaponised for authenticated phishing and BEC (Kaspersky, 2026-05-04, ~96 h)

From CTI Daily Brief — 2026-05-08 · published 2026-05-10 · view item permalink →

Kaspersky researchers documented a campaign technique using legitimate Amazon Simple Email Service (SES) accounts to deliver attacker-crafted phishing and business-email-compromise (BEC) lures. Because messages originate from genuine SES infrastructure, SPF and DKIM authentication passes and messages evade most email security gateway filters based on sender reputation. Attackers obtain SES API credentials from publicly exposed AWS configuration files (S3 bucket misconfigurations, leaked GitHub repositories). Observed campaign goals include invoice-fraud lures targeting finance departments and credential phishing pages hosted on AWS infrastructure. Kaspersky observed targeting of finance departments at European manufacturing firms. This report is approximately 96 hours old at publication; first coverage in this brief series.