<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — Defense</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed-defense.xml" rel="self" type="application/rss+xml"/><description>Items affecting defense, intelligence, military supply chain.</description><language>en</language><lastBuildDate>Sun, 10 May 2026 19:33:31 +0000</lastBuildDate><item><title>Bauman University &quot;Department No. 4&quot; — leaked GRU cyber-operator training pipeline reveals direct line to Sandworm and APT28 operations against European targets</title><link>https://ctipilot.ch/briefs/2026-05-10/bauman-university-department-no-4-leaked-gru-cyber-operator-training-pipeline-re/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/bauman-university-department-no-4-leaked-gru-cyber-operator-training-pipeline-re/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>nation-state</category><category>espionage</category><category>russia-nexus</category><category>europe</category><category>global</category><description><![CDATA[<p>A six-publisher investigative consortium (The Insider, The Guardian, Le Monde, Der Spiegel, VSquare, Frontstory) published more than 2 000 leaked internal documents from Bauman Moscow State Technical University on 2026-05-07 detailing a structured GRU recruitment-and-training pipeline operating under the cover of &quot;Department No. 4 — Special Training&quot; (<a href="https://meduza.io/amp/en/feature/2026/05/07/secret-gru-linked-department-at-top-russian-university-trains-hackers-and-saboteurs-investigation-finds" target="_blank" rel="noopener noreferrer">Meduza (English), 2026-05-07</a> · <a href="https://www.theguardian.com/world/2026/may/07/revealed-russia-top-secret-spy-school-hacking-western-electoral-interference" target="_blank" rel="noopener noreferrer">The Guardian, 2026-05-07</a> · <a href="https://www.lemonde.fr/en/m-le-mag/article/2026/05/07/moscow-s-bauman-university-the-clandestine-school-training-russian-hackers_6753208_117.html" target="_blank" rel="noopener noreferrer">Le Monde, 2026-05-07</a> · <a href="https://www.spiegel.de/ausland/hybrider-krieg-moskau-bildet-in-einem-geheimen-uni-programm-spione-und-hacker-aus-a-2de79023-aa56-4ed6-b5de-d7c222402e63" target="_blank" rel="noopener noreferrer">Der Spiegel, 2026-05-07</a> · <a href="https://www.heise.de/news/Cyberkrieg-Medien-zitieren-Interna-aus-Russlands-Geheimdienstausbildung-11285528.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-07</a>). Each year 10–15 graduates are placed directly into Russian military intelligence units. The 144-hour core curriculum, labelled in the documents &quot;Countering Technical Intelligence&quot;, covers password attacks, CVE-driven exploitation using Metasploit <em>against US DoD network architectures by name</em>, custom trojan development, DDoS methodologies, penetration testing against Western targets, computer-virus construction, and propaganda/manipulation training. Candidates are physically assessed at a mandatory training camp; each placement requires explicit GRU approval.</p>]]></description><content:encoded><![CDATA[<p>A six-publisher investigative consortium (The Insider, The Guardian, Le Monde, Der Spiegel, VSquare, Frontstory) published more than 2 000 leaked internal documents from Bauman Moscow State Technical University on 2026-05-07 detailing a structured GRU recruitment-and-training pipeline operating under the cover of &quot;Department No. 4 — Special Training&quot; (<a href="https://meduza.io/amp/en/feature/2026/05/07/secret-gru-linked-department-at-top-russian-university-trains-hackers-and-saboteurs-investigation-finds" target="_blank" rel="noopener noreferrer">Meduza (English), 2026-05-07</a> · <a href="https://www.theguardian.com/world/2026/may/07/revealed-russia-top-secret-spy-school-hacking-western-electoral-interference" target="_blank" rel="noopener noreferrer">The Guardian, 2026-05-07</a> · <a href="https://www.lemonde.fr/en/m-le-mag/article/2026/05/07/moscow-s-bauman-university-the-clandestine-school-training-russian-hackers_6753208_117.html" target="_blank" rel="noopener noreferrer">Le Monde, 2026-05-07</a> · <a href="https://www.spiegel.de/ausland/hybrider-krieg-moskau-bildet-in-einem-geheimen-uni-programm-spione-und-hacker-aus-a-2de79023-aa56-4ed6-b5de-d7c222402e63" target="_blank" rel="noopener noreferrer">Der Spiegel, 2026-05-07</a> · <a href="https://www.heise.de/news/Cyberkrieg-Medien-zitieren-Interna-aus-Russlands-Geheimdienstausbildung-11285528.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-07</a>). Each year 10–15 graduates are placed directly into Russian military intelligence units. The 144-hour core curriculum, labelled in the documents &quot;Countering Technical Intelligence&quot;, covers password attacks, CVE-driven exploitation using Metasploit <em>against US DoD network architectures by name</em>, custom trojan development, DDoS methodologies, penetration testing against Western targets, computer-virus construction, and propaganda/manipulation training. Candidates are physically assessed at a mandatory training camp; each placement requires explicit GRU approval.</p>
<p>The leaked assignment records explicitly link graduates to <strong>GRU Unit 74455</strong> (Sandworm / VoodooBear — responsible for the 2015–2016 Ukraine power-grid attacks, 2017 NotPetya global wiper, and 2023 Kyivstar telecom outage) and to <strong>APT28</strong> (Fancy Bear — responsible for the 2016 Bundestag hack and the 2017 Macron campaign breach, with continuing 2025–2026 activity against EU government and election-adjacent targets). For European defenders the salient operational point is that the curriculum <em>trains specifically against Western and US-DoD topologies</em> — meaning the training pipeline is producing operators whose default mental model of a target network is a NATO-aligned environment, not a generic enterprise. The investigation does not change short-term defensive priorities but reframes the long-running attribution debate: GRU cyber units are not ad-hoc-recruited contractors, they are graduates of a structured technical-intelligence training stream with measurable annual throughput.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://meduza.io/amp/en/feature/2026/05/07/secret-gru-linked-department-at-top-russian-university-trains-hackers-and-saboteurs-investigation-finds" target="_blank" rel="noopener noreferrer">Meduza (English), 2026-05-07</a> · <a class="src-additional" href="https://www.theguardian.com/world/2026/may/07/revealed-russia-top-secret-spy-school-hacking-western-electoral-interference" target="_blank" rel="noopener noreferrer">The Guardian, 2026-05-07</a> · <a class="src-additional" href="https://www.lemonde.fr/en/m-le-mag/article/2026/05/07/moscow-s-bauman-university-the-clandestine-school-training-russian-hackers_6753208_117.html" target="_blank" rel="noopener noreferrer">Le Monde, 2026-05-07</a> · <a class="src-additional" href="https://www.spiegel.de/ausland/hybrider-krieg-moskau-bildet-in-einem-geheimen-uni-programm-spione-und-hacker-aus-a-2de79023-aa56-4ed6-b5de-d7c222402e63" target="_blank" rel="noopener noreferrer">Der Spiegel, 2026-05-07</a> · <a class="src-additional" href="https://www.heise.de/news/Cyberkrieg-Medien-zitieren-Interna-aus-Russlands-Geheimdienstausbildung-11285528.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-07</a></span></aside>]]></content:encoded></item><item><title>UPDATE: CVE-2026-0300 — Palo Alto PAN-OS Captive Portal KEV deadline TODAY (2026-05-09); no patch exists; first patches expected 2026-05-13; CL-STA-1132 post-exploitation detail</title><link>https://ctipilot.ch/briefs/2026-05-09/update-cve-2026-0300-palo-alto-pan-os-captive-portal-kev-deadline-today-2026-05/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/update-cve-2026-0300-palo-alto-pan-os-captive-portal-kev-deadline-today-2026-05/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>cisa-kev</category><category>pre-auth</category><category>rce</category><category>zero-day</category><category>global</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-07):</strong></p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-07):</strong></p>
<p>The CISA KEV deadline for CVE-2026-0300 (Palo Alto PAN-OS Captive Portal unauthenticated root RCE, CVSS 9.3) is <strong>today, 2026-05-09</strong>. Palo Alto Networks has <strong>not yet released a firmware patch</strong>; the vendor statement from 2026-05-08 confirmed the earliest expected maintenance release containing a code fix is <strong>PAN-OS 10.1.14 / 10.2.12 / 11.0.5 / 11.1.4</strong>, expected 2026-05-13. Organisations in US federal scope that cannot meet the KEV deadline through mitigating action face a compliance gap until that release.</p>
<p>Palo Alto&#39;s mitigation guidance remains: disable Captive Portal (<code>Device &gt; User Identification &gt; Captive Portal Settings &gt; uncheck Enable Captive Portal</code>) or disable GlobalProtect and Captive Portal if not operationally needed. Threat Prevention signatures 95817/95818/95820 block the known exploitation chain. PA-Series hardware appliances running content update &lt; 8765-9032 are not covered by the signatures.</p>
<p>Post-exploitation detail added: Palo Alto Unit 42 published a threat bulletin on 2026-05-08 confirming <strong>CL-STA-1132</strong> (a China-nexus cluster it tracks separately from previous PAN-OS attackers) as the primary exploitation actor. Unit 42 observed this cluster: creating rogue admin accounts via the GlobalProtect daemon (bypassing normal <code>admin-role</code> RBAC), exporting full running configurations including pre-shared keys, installing Python-based tunnelling implants under <code>/tmp/.update-service</code>, and performing internal reconnaissance via OSPF route table queries. The cluster&#39;s dwell time before detection was 4–17 days across confirmed victims. The rogue admin account naming pattern (<code>svc-health-check-[6-digit-numeric]</code>) has been observed consistently and can be used as a hunting indicator.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Security Advisory — CVE-2026-0300 update, 2026-05-08</a> · <a class="src-additional" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener noreferrer">CISA KEV catalog</a></span></aside>]]></content:encoded></item></channel></rss>