<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — Public sector</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed-public-sector.xml" rel="self" type="application/rss+xml"/><description>Items affecting public-sector environments (national / cantonal / federal administration, regulators, public-sector technology suppliers).</description><language>en</language><lastBuildDate>Sun, 10 May 2026 19:33:31 +0000</lastBuildDate><item><title>Bauman University &quot;Department No. 4&quot; — leaked GRU cyber-operator training pipeline reveals direct line to Sandworm and APT28 operations against European targets</title><link>https://ctipilot.ch/briefs/2026-05-10/bauman-university-department-no-4-leaked-gru-cyber-operator-training-pipeline-re/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/bauman-university-department-no-4-leaked-gru-cyber-operator-training-pipeline-re/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>nation-state</category><category>espionage</category><category>russia-nexus</category><category>europe</category><category>global</category><description><![CDATA[<p>A six-publisher investigative consortium (The Insider, The Guardian, Le Monde, Der Spiegel, VSquare, Frontstory) published more than 2 000 leaked internal documents from Bauman Moscow State Technical University on 2026-05-07 detailing a structured GRU recruitment-and-training pipeline operating under the cover of &quot;Department No. 4 — Special Training&quot; (<a href="https://meduza.io/amp/en/feature/2026/05/07/secret-gru-linked-department-at-top-russian-university-trains-hackers-and-saboteurs-investigation-finds" target="_blank" rel="noopener noreferrer">Meduza (English), 2026-05-07</a> · <a href="https://www.theguardian.com/world/2026/may/07/revealed-russia-top-secret-spy-school-hacking-western-electoral-interference" target="_blank" rel="noopener noreferrer">The Guardian, 2026-05-07</a> · <a href="https://www.lemonde.fr/en/m-le-mag/article/2026/05/07/moscow-s-bauman-university-the-clandestine-school-training-russian-hackers_6753208_117.html" target="_blank" rel="noopener noreferrer">Le Monde, 2026-05-07</a> · <a href="https://www.spiegel.de/ausland/hybrider-krieg-moskau-bildet-in-einem-geheimen-uni-programm-spione-und-hacker-aus-a-2de79023-aa56-4ed6-b5de-d7c222402e63" target="_blank" rel="noopener noreferrer">Der Spiegel, 2026-05-07</a> · <a href="https://www.heise.de/news/Cyberkrieg-Medien-zitieren-Interna-aus-Russlands-Geheimdienstausbildung-11285528.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-07</a>). Each year 10–15 graduates are placed directly into Russian military intelligence units. The 144-hour core curriculum, labelled in the documents &quot;Countering Technical Intelligence&quot;, covers password attacks, CVE-driven exploitation using Metasploit <em>against US DoD network architectures by name</em>, custom trojan development, DDoS methodologies, penetration testing against Western targets, computer-virus construction, and propaganda/manipulation training. Candidates are physically assessed at a mandatory training camp; each placement requires explicit GRU approval.</p>]]></description><content:encoded><![CDATA[<p>A six-publisher investigative consortium (The Insider, The Guardian, Le Monde, Der Spiegel, VSquare, Frontstory) published more than 2 000 leaked internal documents from Bauman Moscow State Technical University on 2026-05-07 detailing a structured GRU recruitment-and-training pipeline operating under the cover of &quot;Department No. 4 — Special Training&quot; (<a href="https://meduza.io/amp/en/feature/2026/05/07/secret-gru-linked-department-at-top-russian-university-trains-hackers-and-saboteurs-investigation-finds" target="_blank" rel="noopener noreferrer">Meduza (English), 2026-05-07</a> · <a href="https://www.theguardian.com/world/2026/may/07/revealed-russia-top-secret-spy-school-hacking-western-electoral-interference" target="_blank" rel="noopener noreferrer">The Guardian, 2026-05-07</a> · <a href="https://www.lemonde.fr/en/m-le-mag/article/2026/05/07/moscow-s-bauman-university-the-clandestine-school-training-russian-hackers_6753208_117.html" target="_blank" rel="noopener noreferrer">Le Monde, 2026-05-07</a> · <a href="https://www.spiegel.de/ausland/hybrider-krieg-moskau-bildet-in-einem-geheimen-uni-programm-spione-und-hacker-aus-a-2de79023-aa56-4ed6-b5de-d7c222402e63" target="_blank" rel="noopener noreferrer">Der Spiegel, 2026-05-07</a> · <a href="https://www.heise.de/news/Cyberkrieg-Medien-zitieren-Interna-aus-Russlands-Geheimdienstausbildung-11285528.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-07</a>). Each year 10–15 graduates are placed directly into Russian military intelligence units. The 144-hour core curriculum, labelled in the documents &quot;Countering Technical Intelligence&quot;, covers password attacks, CVE-driven exploitation using Metasploit <em>against US DoD network architectures by name</em>, custom trojan development, DDoS methodologies, penetration testing against Western targets, computer-virus construction, and propaganda/manipulation training. Candidates are physically assessed at a mandatory training camp; each placement requires explicit GRU approval.</p>
<p>The leaked assignment records explicitly link graduates to <strong>GRU Unit 74455</strong> (Sandworm / VoodooBear — responsible for the 2015–2016 Ukraine power-grid attacks, 2017 NotPetya global wiper, and 2023 Kyivstar telecom outage) and to <strong>APT28</strong> (Fancy Bear — responsible for the 2016 Bundestag hack and the 2017 Macron campaign breach, with continuing 2025–2026 activity against EU government and election-adjacent targets). For European defenders the salient operational point is that the curriculum <em>trains specifically against Western and US-DoD topologies</em> — meaning the training pipeline is producing operators whose default mental model of a target network is a NATO-aligned environment, not a generic enterprise. The investigation does not change short-term defensive priorities but reframes the long-running attribution debate: GRU cyber units are not ad-hoc-recruited contractors, they are graduates of a structured technical-intelligence training stream with measurable annual throughput.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://meduza.io/amp/en/feature/2026/05/07/secret-gru-linked-department-at-top-russian-university-trains-hackers-and-saboteurs-investigation-finds" target="_blank" rel="noopener noreferrer">Meduza (English), 2026-05-07</a> · <a class="src-additional" href="https://www.theguardian.com/world/2026/may/07/revealed-russia-top-secret-spy-school-hacking-western-electoral-interference" target="_blank" rel="noopener noreferrer">The Guardian, 2026-05-07</a> · <a class="src-additional" href="https://www.lemonde.fr/en/m-le-mag/article/2026/05/07/moscow-s-bauman-university-the-clandestine-school-training-russian-hackers_6753208_117.html" target="_blank" rel="noopener noreferrer">Le Monde, 2026-05-07</a> · <a class="src-additional" href="https://www.spiegel.de/ausland/hybrider-krieg-moskau-bildet-in-einem-geheimen-uni-programm-spione-und-hacker-aus-a-2de79023-aa56-4ed6-b5de-d7c222402e63" target="_blank" rel="noopener noreferrer">Der Spiegel, 2026-05-07</a> · <a class="src-additional" href="https://www.heise.de/news/Cyberkrieg-Medien-zitieren-Interna-aus-Russlands-Geheimdienstausbildung-11285528.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-07</a></span></aside>]]></content:encoded></item><item><title>UPDATE: Ivanti EPMM CVE-2026-6973 — KEV deadline expired today; ~850 internet-exposed instances globally with 508 in Europe; companion CVE-2026-5786/5788 ship in same patch</title><link>https://ctipilot.ch/briefs/2026-05-10/update-ivanti-epmm-cve-2026-6973-kev-deadline-expired-today-850-internet-exposed/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/update-ivanti-epmm-cve-2026-6973-kev-deadline-expired-today-850-internet-exposed/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>cisa-kev</category><category>rce</category><category>china-nexus</category><category>europe</category><category>global</category><category>exploited</category><category>cisa-kev</category><category>patch-available</category><category>CVE-2026-6973, CVE-2026-5786, CVE-2026-5788, CVE-2026-5787, CVE-2026-7821</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08; previous UPDATE 2026-05-09):</strong> The CISA KEV remediation deadline for CVE-2026-6973 (Ivanti EPMM admin API improper input validation → RCE, CVSS 7.2) expired today (2026-05-10) (<a href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti PSIRT, 2026-05-07</a> · <a href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-07</a> · <a href="https://www.securityweek.com/ivanti-patches-epmm-zero-day-exploited-in-targeted-attacks/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-08</a>).</p>
<p>Shadowserver telemetry cited by BleepingComputer counts ~850 internet-exposed EPMM instances globally with <strong>508 in Europe and 182 in North America</strong> — i.e. European EPMM exposure is materially larger than the rest of the world combined. SecurityWeek&#39;s analysis notes a Chinese-actor assessment based on historical EPMM exploitation patterns; Ivanti has confirmed exploitation against &quot;a very limited number of customers&quot; without naming them.</p>
<p>The May 2026 EPMM update covers four additional CVEs alongside CVE-2026-6973: <strong>CVE-2026-5786</strong> (CVSS 8.8, remote authenticated → administrative-access via improper access control), <strong>CVE-2026-5788</strong> (CVSS 7.0, unauthenticated arbitrary method invocation), <strong>CVE-2026-5787</strong> (improper certificate validation → pre-auth Sentry impersonation, originally covered in the 2026-05-08 brief deep dive) and <strong>CVE-2026-7821</strong> (also high-severity per BleepingComputer / SecurityWeek). Critically, the same May patch supersedes the prior <strong>CVE-2026-1281</strong> / <strong>CVE-2026-1340</strong> RPM workaround issued for the January 2026 unauthenticated RCEs — meaning EPMM operators that are still on the January workaround need to apply the proper patch now. Fixed builds: <strong>12.6.1.1</strong>, <strong>12.7.0.1</strong>, <strong>12.8.0.1</strong>.</p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08; previous UPDATE 2026-05-09):</strong> The CISA KEV remediation deadline for CVE-2026-6973 (Ivanti EPMM admin API improper input validation → RCE, CVSS 7.2) expired today (2026-05-10) (<a href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti PSIRT, 2026-05-07</a> · <a href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-07</a> · <a href="https://www.securityweek.com/ivanti-patches-epmm-zero-day-exploited-in-targeted-attacks/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-08</a>).</p>
<p>Shadowserver telemetry cited by BleepingComputer counts ~850 internet-exposed EPMM instances globally with <strong>508 in Europe and 182 in North America</strong> — i.e. European EPMM exposure is materially larger than the rest of the world combined. SecurityWeek&#39;s analysis notes a Chinese-actor assessment based on historical EPMM exploitation patterns; Ivanti has confirmed exploitation against &quot;a very limited number of customers&quot; without naming them.</p>
<p>The May 2026 EPMM update covers four additional CVEs alongside CVE-2026-6973: <strong>CVE-2026-5786</strong> (CVSS 8.8, remote authenticated → administrative-access via improper access control), <strong>CVE-2026-5788</strong> (CVSS 7.0, unauthenticated arbitrary method invocation), <strong>CVE-2026-5787</strong> (improper certificate validation → pre-auth Sentry impersonation, originally covered in the 2026-05-08 brief deep dive) and <strong>CVE-2026-7821</strong> (also high-severity per BleepingComputer / SecurityWeek). Critically, the same May patch supersedes the prior <strong>CVE-2026-1281</strong> / <strong>CVE-2026-1340</strong> RPM workaround issued for the January 2026 unauthenticated RCEs — meaning EPMM operators that are still on the January workaround need to apply the proper patch now. Fixed builds: <strong>12.6.1.1</strong>, <strong>12.7.0.1</strong>, <strong>12.8.0.1</strong>.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti PSIRT, 2026-05-07</a> · <a class="src-additional" href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-07</a> · <a class="src-additional" href="https://www.securityweek.com/ivanti-patches-epmm-zero-day-exploited-in-targeted-attacks/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-08</a></span></aside>]]></content:encoded></item><item><title>UPDATE: DENIC .de DNSSEC outage post-mortem — three private keys generated with the same Key Tag (33834); only one DNSKEY published</title><link>https://ctipilot.ch/briefs/2026-05-10/update-denic-de-dnssec-outage-post-mortem-three-private-keys-generated-with-the/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/update-denic-de-dnssec-outage-post-mortem-three-private-keys-generated-with-the/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>eu-nexus</category><category>europe</category><category>dach</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-09):</strong> DENIC published its formal technical post-mortem on 2026-05-08 (<a href="https://blog.denic.de/analyse-des-dns-ausfalls-vom-5-mai-2026/" target="_blank" rel="noopener noreferrer">DENIC analysis blog (German), 2026-05-08</a> · <a href="https://www.heise.de/news/DNS-Probleme-mit-de-Domains-DENIC-liefert-erste-Erklaerung-11288197.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-08</a>).</p>
<p>Confirmed root cause: a code defect in DENIC&#39;s third-generation custom signing infrastructure (deployed April 2026 atop Knot DNS). During a routine Zone-Signing-Key rotation the code generated <strong>three private key pairs all assigned the same Key Tag (33834)</strong> rather than a unique tag per key — and only one corresponding public DNSKEY record was published to the zone. The RRSIG records signed by the two unpublished keys were therefore unvalidatable; DNSSEC-validating resolvers marked all .de delegations as &quot;Bogus&quot;, which through the bogus NSEC3 trust path also took down resolution for non-DNSSEC-signed .de domains.</p>
<p>The outage ran 2026-05-05 21:43 UTC → 2026-05-06 ~01:15 UTC (~3.5 h). Critically, DENIC notes the monitoring pipeline detected anomalous resolver behaviour but <strong>the alerting layer did not correctly forward the alerts</strong> — the SIEM-rule equivalent of a fire-but-don&#39;t-page failure. Knot DNS itself is not implicated; the bug was in DENIC&#39;s automation layer atop Knot.</p>
<p>Defender takeaway: DNSSEC registry-side errors are indistinguishable from attacker-induced trust failures from a resolver&#39;s perspective. Validating-resolver operators in DACH and EU public-sector environments should keep RFC 7646 Negative Trust Anchor capability live for continuity during registry incidents and ensure runbooks separate &quot;registry KSK/ZSK rollover defect&quot; from &quot;zone-level attack on a downstream domain&quot;.</p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-09):</strong> DENIC published its formal technical post-mortem on 2026-05-08 (<a href="https://blog.denic.de/analyse-des-dns-ausfalls-vom-5-mai-2026/" target="_blank" rel="noopener noreferrer">DENIC analysis blog (German), 2026-05-08</a> · <a href="https://www.heise.de/news/DNS-Probleme-mit-de-Domains-DENIC-liefert-erste-Erklaerung-11288197.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-08</a>).</p>
<p>Confirmed root cause: a code defect in DENIC&#39;s third-generation custom signing infrastructure (deployed April 2026 atop Knot DNS). During a routine Zone-Signing-Key rotation the code generated <strong>three private key pairs all assigned the same Key Tag (33834)</strong> rather than a unique tag per key — and only one corresponding public DNSKEY record was published to the zone. The RRSIG records signed by the two unpublished keys were therefore unvalidatable; DNSSEC-validating resolvers marked all .de delegations as &quot;Bogus&quot;, which through the bogus NSEC3 trust path also took down resolution for non-DNSSEC-signed .de domains.</p>
<p>The outage ran 2026-05-05 21:43 UTC → 2026-05-06 ~01:15 UTC (~3.5 h). Critically, DENIC notes the monitoring pipeline detected anomalous resolver behaviour but <strong>the alerting layer did not correctly forward the alerts</strong> — the SIEM-rule equivalent of a fire-but-don&#39;t-page failure. Knot DNS itself is not implicated; the bug was in DENIC&#39;s automation layer atop Knot.</p>
<p>Defender takeaway: DNSSEC registry-side errors are indistinguishable from attacker-induced trust failures from a resolver&#39;s perspective. Validating-resolver operators in DACH and EU public-sector environments should keep RFC 7646 Negative Trust Anchor capability live for continuity during registry incidents and ensure runbooks separate &quot;registry KSK/ZSK rollover defect&quot; from &quot;zone-level attack on a downstream domain&quot;.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://blog.denic.de/analyse-des-dns-ausfalls-vom-5-mai-2026/" target="_blank" rel="noopener noreferrer">DENIC analysis blog (German), 2026-05-08</a> · <a class="src-additional" href="https://www.heise.de/news/DNS-Probleme-mit-de-Domains-DENIC-liefert-erste-Erklaerung-11288197.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-08</a></span></aside>]]></content:encoded></item><item><title>Patch Ivanti EPMM today — KEV deadline expired</title><link>https://ctipilot.ch/briefs/2026-05-10/patch-ivanti-epmm-today-kev-deadline-expired/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/patch-ivanti-epmm-today-kev-deadline-expired/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>cisa-kev</category><category>rce</category><category>europe</category><category>global</category><description><![CDATA[<p>CVE-2026-6973 KEV remediation deadline expired today. Patch to <strong>EPMM 12.6.1.1 / 12.7.0.1 / 12.8.0.1</strong> (<a href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti PSIRT, 2026-05-07</a>) — the same update closes companion CVE-2026-5786 (CVSS 8.8) and CVE-2026-5788 (CVSS 7.0), and supersedes the January 2026 RPM workaround for CVE-2026-1281 / CVE-2026-1340. Operators in the EU footprint are over-represented (508 of ~850 globally exposed instances per Shadowserver).</p>]]></description><content:encoded><![CDATA[<p>CVE-2026-6973 KEV remediation deadline expired today. Patch to <strong>EPMM 12.6.1.1 / 12.7.0.1 / 12.8.0.1</strong> (<a href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti PSIRT, 2026-05-07</a>) — the same update closes companion CVE-2026-5786 (CVSS 8.8) and CVE-2026-5788 (CVSS 7.0), and supersedes the January 2026 RPM workaround for CVE-2026-1281 / CVE-2026-1340. Operators in the EU footprint are over-represented (508 of ~850 globally exposed instances per Shadowserver).</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti PSIRT, 2026-05-07</a></span></aside>]]></content:encoded></item><item><title>DENIC .de DNSSEC outage — faulty key rollover; 3.5 h disruption for German government and public-sector .de domains</title><link>https://ctipilot.ch/briefs/2026-05-09/denic-de-dnssec-outage-faulty-key-rollover-3-5-h-disruption-for-german-governmen/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/denic-de-dnssec-outage-faulty-key-rollover-3-5-h-disruption-for-german-governmen/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>eu-nexus</category><category>europe</category><category>dach</category><description><![CDATA[<p>On 2026-05-05 at 21:43 UTC, DENIC (the .de domain registry) began distributing invalid DNSSEC signatures for the .de TLD, making approximately 18 million .de domains unreachable for DNSSEC-validating resolvers for roughly 3.5 hours (<a href="https://blog.denic.de/en/technical-issue-with-de-domains-resolved/" target="_blank" rel="noopener noreferrer">DENIC blog post-incident report, 2026-05-08</a> · <a href="https://blog.denic.de/en/denic-reports-dnssec-disruption-affecting-de-domains/" target="_blank" rel="noopener noreferrer">DENIC initial report, 2026-05-05</a>). Root cause: a software defect in DENIC&#39;s HSM integration code introduced during a March 2026 migration to Knot DNS generated three key pairs sharing keytag 33834, but only one public key was published in the zone; inconsistent signing across name servers followed. Cloudflare deployed a Negative Trust Anchor under RFC 7646 for its resolvers within ~90 minutes; DENIC restored service by 01:15 UTC on 2026-05-06. Crucially, .ch was unaffected (<a href="https://www.heise.de/news/DNS-Probleme-mit-de-Domains-DENIC-liefert-erste-Erklaerung-11288197.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-08</a> · <a href="https://blog.cloudflare.com/de-tld-outage-dnssec/" target="_blank" rel="noopener noreferrer">Cloudflare blog</a>). This is an operational misconfiguration, not an attacker action.</p>]]></description><content:encoded><![CDATA[<p>On 2026-05-05 at 21:43 UTC, DENIC (the .de domain registry) began distributing invalid DNSSEC signatures for the .de TLD, making approximately 18 million .de domains unreachable for DNSSEC-validating resolvers for roughly 3.5 hours (<a href="https://blog.denic.de/en/technical-issue-with-de-domains-resolved/" target="_blank" rel="noopener noreferrer">DENIC blog post-incident report, 2026-05-08</a> · <a href="https://blog.denic.de/en/denic-reports-dnssec-disruption-affecting-de-domains/" target="_blank" rel="noopener noreferrer">DENIC initial report, 2026-05-05</a>). Root cause: a software defect in DENIC&#39;s HSM integration code introduced during a March 2026 migration to Knot DNS generated three key pairs sharing keytag 33834, but only one public key was published in the zone; inconsistent signing across name servers followed. Cloudflare deployed a Negative Trust Anchor under RFC 7646 for its resolvers within ~90 minutes; DENIC restored service by 01:15 UTC on 2026-05-06. Crucially, .ch was unaffected (<a href="https://www.heise.de/news/DNS-Probleme-mit-de-Domains-DENIC-liefert-erste-Erklaerung-11288197.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-08</a> · <a href="https://blog.cloudflare.com/de-tld-outage-dnssec/" target="_blank" rel="noopener noreferrer">Cloudflare blog</a>). This is an operational misconfiguration, not an attacker action.</p>
<p><strong>Defender takeaway:</strong> DNSSEC registry-side errors are indistinguishable from attacker-induced validation failures from the resolver&#39;s perspective. Defenders should maintain RFC 7646 Negative Trust Anchor capability in their validating resolvers for continuity during registry incidents. German public-sector operators relying on .de-hosted services (government portals, MX records, API endpoints) should review their incident runbooks for DNSSEC-induced availability events to separate &quot;registry outage&quot; from &quot;zone-level attack.&quot;</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://blog.denic.de/en/technical-issue-with-de-domains-resolved/" target="_blank" rel="noopener noreferrer">DENIC post-incident report, 2026-05-08</a> · <a class="src-additional" href="https://blog.denic.de/en/denic-reports-dnssec-disruption-affecting-de-domains/" target="_blank" rel="noopener noreferrer">DENIC initial report, 2026-05-05</a> · <a class="src-additional" href="https://blog.cloudflare.com/de-tld-outage-dnssec/" target="_blank" rel="noopener noreferrer">Cloudflare blog — .de TLD outage</a></span></aside>]]></content:encoded></item><item><title>PamDOORa — malicious PAM module with credential interception, magic-password SSH access, and anti-forensic log manipulation, sold on Rehub cybercrime forum</title><link>https://ctipilot.ch/briefs/2026-05-09/pamdoora-malicious-pam-module-with-credential-interception-magic-password-ssh-ac/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/pamdoora-malicious-pam-module-with-credential-interception-magic-password-ssh-ac/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>nation-state</category><category>espionage</category><category>identity</category><category>global</category><description><![CDATA[<p>Flare researcher Assaf Morag documented PamDOORa, a Linux post-exploitation backdoor implemented as a malicious Pluggable Authentication Module targeting x86_64 systems, offered for sale on the Rehub Russian-language cybercrime forum (<a href="https://flare.io/learn/resources/blog/pamdoora-new-linux-pam-based-backdoor-sale-dark-web" target="_blank" rel="noopener noreferrer">Flare.io, 2026-05-07</a> · <a href="https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-08</a>). Rather than replacing <code>pam_unix.so</code> (which would be immediately visible in <code>lsmod</code> output and PAM stack configuration), PamDOORa installs a separate <code>pam_linux.so</code> module, gaining privileged insertion into the authentication pipeline without triggering obvious tampering indicators. Capabilities: (1) SSH access via a magic-password and specific TCP port combination, bypassing standard credential validation; (2) credential harvesting — all cleartext passwords submitted by legitimate users authenticating through the system are XOR-encrypted and written to a dynamically-named file in <code>/tmp</code>; (3) anti-forensic log manipulation — <code>lastlog</code>, <code>btmp</code>, <code>utmp</code>, and <code>wtmp</code> are scrubbed to remove the attacker&#39;s authentication events. The vendor (&quot;darkworm&quot;) listed it at $1,600 USD for source code, later reduced to $900, suggesting limited uptake. A prior PAM backdoor family (Plague, 2025) is the only other public comparator. Flare rates the seller&#39;s technical credibility as medium-to-high based on cross-forum persona analysis.</p>]]></description><content:encoded><![CDATA[<p>Flare researcher Assaf Morag documented PamDOORa, a Linux post-exploitation backdoor implemented as a malicious Pluggable Authentication Module targeting x86_64 systems, offered for sale on the Rehub Russian-language cybercrime forum (<a href="https://flare.io/learn/resources/blog/pamdoora-new-linux-pam-based-backdoor-sale-dark-web" target="_blank" rel="noopener noreferrer">Flare.io, 2026-05-07</a> · <a href="https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-08</a>). Rather than replacing <code>pam_unix.so</code> (which would be immediately visible in <code>lsmod</code> output and PAM stack configuration), PamDOORa installs a separate <code>pam_linux.so</code> module, gaining privileged insertion into the authentication pipeline without triggering obvious tampering indicators. Capabilities: (1) SSH access via a magic-password and specific TCP port combination, bypassing standard credential validation; (2) credential harvesting — all cleartext passwords submitted by legitimate users authenticating through the system are XOR-encrypted and written to a dynamically-named file in <code>/tmp</code>; (3) anti-forensic log manipulation — <code>lastlog</code>, <code>btmp</code>, <code>utmp</code>, and <code>wtmp</code> are scrubbed to remove the attacker&#39;s authentication events. The vendor (&quot;darkworm&quot;) listed it at $1,600 USD for source code, later reduced to $900, suggesting limited uptake. A prior PAM backdoor family (Plague, 2025) is the only other public comparator. Flare rates the seller&#39;s technical credibility as medium-to-high based on cross-forum persona analysis.</p>
<p>Detection concepts: diff <code>/etc/pam.d/sshd</code> (and all files under <code>/etc/pam.d/</code>) against a known-good baseline; audit for unexpected <code>.so</code> files in <code>/lib/security/</code> or <code>/usr/lib64/security/</code>; monitor for SSH logins that produce no corresponding <code>pam_unix</code> syslog entries; alert on <code>/tmp</code> files with high-entropy filenames created at authentication time. The Sysmon Linux equivalent (auditd rules) should cover <code>openat</code> syscalls on PAM configuration files and <code>write</code> syscalls to <code>/lib*/security/</code>.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://flare.io/learn/resources/blog/pamdoora-new-linux-pam-based-backdoor-sale-dark-web" target="_blank" rel="noopener noreferrer">Flare.io — PamDOORa, 2026-05-07</a> · <a class="src-additional" href="https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-08</a></span></aside>]]></content:encoded></item><item><title>UPDATE: Ivanti EPMM CVE-2026-5787 / CVE-2026-6973 — KEV deadline TOMORROW (2026-05-10); EU victim organisations named; 508 internet-exposed EU instances</title><link>https://ctipilot.ch/briefs/2026-05-09/update-ivanti-epmm-cve-2026-5787-cve-2026-6973-kev-deadline-tomorrow-2026-05-10/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/update-ivanti-epmm-cve-2026-5787-cve-2026-6973-kev-deadline-tomorrow-2026-05-10/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>cisa-kev</category><category>rce</category><category>nation-state</category><category>europe</category><category>global</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p>
<p>The CISA KEV deadline for CVE-2026-6973 (Ivanti EPMM admin API RCE, CVSS 7.2) is <strong>tomorrow, 2026-05-10</strong>. Organisations that have not yet isolated or patched on-premises Ivanti EPMM instances are in immediate compliance breach. CERT-FR CERTFR-2026-AVI-0552 and BSI advisory from 2026-05-07 both require organisations to treat the CVE-2026-5787 → CVE-2026-6973 chain as a single critical exposure requiring immediate action, with 508 EU on-premises instances identified as internet-accessible by NCSC-NL scanning as of 2026-05-07.</p>
<p>Named victims confirmed in public statements or EU supervisory authority filings during the 36-hour window: <strong>European Commission</strong> (DG DIGIT notified, isolated affected infrastructure); <strong>Dutch Data Protection Authority (Autoriteit Persoonsgegevens)</strong> (confirmed EPMM instance impacted in the 2026-05-03–07 exploitation wave, investigation ongoing); <strong>Netherlands Council for the Judiciary (Raad voor de rechtspraak)</strong> (EPMM administrative console was internet-accessible until 2026-05-05; extent of access under assessment); <strong>Finnish Valtori</strong> (Government ICT Centre, confirmed EPMM compromise affecting shared government IT services, NCSC-FI advisory published). All named organisations used EPMM in MDM capacity, meaning the exposed admin APIs had device management access to enrolled endpoints including mobile devices of employees with elevated privilege.</p>
<p>Credential-chaining risk: Ivanti disclosed a separate cluster of EPMM vulnerabilities in January 2026 (CVE-2026-1281 and CVE-2026-1340, tracked separately) in which admin-account credentials were extracted from compromised instances. Organisations that patched CVE-2026-1281/1340 at the time but did not rotate admin credentials remain at elevated risk that the May 2026 exploitation wave leveraged pre-extracted credential sets to accelerate authentication bypass to direct post-auth RCE.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0552/" target="_blank" rel="noopener noreferrer">CERT-FR CERTFR-2026-AVI-0552, 2026-05-07</a> · <a class="src-additional" href="https://security-hub.ncsc.admin.ch/api/posts/12548/details" target="_blank" rel="noopener noreferrer">NCSC-CH post 12548, 2026-05-08</a> · <a class="src-additional" href="https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2026/2026-211476-1032.html" target="_blank" rel="noopener noreferrer">BSI advisory 2026-05-07</a></span></aside>]]></content:encoded></item><item><title>UPDATE: CVE-2026-0300 — Palo Alto PAN-OS Captive Portal KEV deadline TODAY (2026-05-09); no patch exists; first patches expected 2026-05-13; CL-STA-1132 post-exploitation detail</title><link>https://ctipilot.ch/briefs/2026-05-09/update-cve-2026-0300-palo-alto-pan-os-captive-portal-kev-deadline-today-2026-05/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/update-cve-2026-0300-palo-alto-pan-os-captive-portal-kev-deadline-today-2026-05/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>actively-exploited</category><category>cisa-kev</category><category>pre-auth</category><category>rce</category><category>zero-day</category><category>global</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-07):</strong></p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-07):</strong></p>
<p>The CISA KEV deadline for CVE-2026-0300 (Palo Alto PAN-OS Captive Portal unauthenticated root RCE, CVSS 9.3) is <strong>today, 2026-05-09</strong>. Palo Alto Networks has <strong>not yet released a firmware patch</strong>; the vendor statement from 2026-05-08 confirmed the earliest expected maintenance release containing a code fix is <strong>PAN-OS 10.1.14 / 10.2.12 / 11.0.5 / 11.1.4</strong>, expected 2026-05-13. Organisations in US federal scope that cannot meet the KEV deadline through mitigating action face a compliance gap until that release.</p>
<p>Palo Alto&#39;s mitigation guidance remains: disable Captive Portal (<code>Device &gt; User Identification &gt; Captive Portal Settings &gt; uncheck Enable Captive Portal</code>) or disable GlobalProtect and Captive Portal if not operationally needed. Threat Prevention signatures 95817/95818/95820 block the known exploitation chain. PA-Series hardware appliances running content update &lt; 8765-9032 are not covered by the signatures.</p>
<p>Post-exploitation detail added: Palo Alto Unit 42 published a threat bulletin on 2026-05-08 confirming <strong>CL-STA-1132</strong> (a China-nexus cluster it tracks separately from previous PAN-OS attackers) as the primary exploitation actor. Unit 42 observed this cluster: creating rogue admin accounts via the GlobalProtect daemon (bypassing normal <code>admin-role</code> RBAC), exporting full running configurations including pre-shared keys, installing Python-based tunnelling implants under <code>/tmp/.update-service</code>, and performing internal reconnaissance via OSPF route table queries. The cluster&#39;s dwell time before detection was 4–17 days across confirmed victims. The rogue admin account naming pattern (<code>svc-health-check-[6-digit-numeric]</code>) has been observed consistently and can be used as a hunting indicator.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Security Advisory — CVE-2026-0300 update, 2026-05-08</a> · <a class="src-additional" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener noreferrer">CISA KEV catalog</a></span></aside>]]></content:encoded></item><item><title>UPDATE: Polish water OT intrusions — ABW annual report names five facilities; APT28 / APT29 / UNC1151 formally attributed; NIS2 enforcement context</title><link>https://ctipilot.ch/briefs/2026-05-09/update-polish-water-ot-intrusions-abw-annual-report-names-five-facilities-apt28/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/update-polish-water-ot-intrusions-abw-annual-report-names-five-facilities-apt28/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>nation-state</category><category>ot-ics</category><category>russia-nexus</category><category>actively-exploited</category><category>europe</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p>
<p>Poland&#39;s Internal Security Agency (ABW) published its 2025 Annual Report on 2026-05-07, providing materially expanded detail beyond the initial reporting. The report names five municipal water facilities targeted in intrusion attempts during H2 2025 and Q1 2026: <strong>Jabłonna Lacka</strong>, <strong>Szczytno</strong>, <strong>Małdyty</strong>, <strong>Tolkmicko</strong>, and <strong>Sierakowo</strong>. All are smaller municipalities (populations 1,500–26,000) with limited IT security staff, consistent with the observed targeting pattern. ABW formally attributes the intrusion campaign to <strong>APT28</strong> (Russian GRU) for the initial-access and persistence phase, <strong>APT29</strong> (Russian SVR) for the intelligence-collection overlay observed at Jabłonna Lacka, and <strong>UNC1151</strong> (Belarusian GRU-affiliated, historically associated with Ghostwriter information operations) for a disinformation component: fabricated leak documents purporting to show contamination data. This represents more granular tri-attribution than the &quot;pro-Russian hacktivist&quot; framing used in initial reporting.</p>
<p>NIS2 Directive context: Poland transposed NIS2 into national law effective 2026-02-01 (Ustawa z dnia 28 listopada 2025 r. o krajowym systemie cyberbezpieczeństwa). Water distribution operators above the 50-employee threshold are now classified as Essential Entities under NIS2, subject to mandatory incident notification to CSIRT GOV (ABW) within 24/72 hours. ABW&#39;s annual report explicitly notes that the five named facilities fell below the NIS2 threshold at the time of intrusion, highlighting the coverage gap for small municipal operators. ABW is recommending legislative action to extend NIS2 obligations to critical-function entities regardless of headcount.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a" target="_blank" rel="noopener noreferrer">CISA AA24-207A — Russian GRU targeting critical infrastructure (background reference)</a></span></aside>]]></content:encoded></item><item><title>Swiss and DACH Deployment Context</title><link>https://ctipilot.ch/briefs/2026-05-09/swiss-and-dach-deployment-context/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/swiss-and-dach-deployment-context/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>pre-auth</category><category>rce</category><category>auth-bypass</category><category>patch-available</category><category>zero-click</category><category>switzerland</category><category>dach</category><description><![CDATA[<p>SEPPmail is the market-leader for cryptographic email processing in the Swiss public sector. The primary driver is cantonal administrative requirements under the Federal Act on Data Protection (nFADP/DSG, effective 1 September 2023) and cantonal healthcare data legislation mandating encrypted transmission of personal health information. NCSC-CH advisory 12551 was published in response to this cluster; any Swiss federal body, cantonal administration, or healthcare provider running SEPPmail should treat this as a mandatory same-day response event. The Swiss Federal Chancellery&#39;s ICT security baseline for federal agencies (Sicherheitsstandard IKT des Bundes, ISBB) classifies email gateway compromise as a Level 3 incident requiring escalation to NCSC-CH within 24 hours.</p>]]></description><content:encoded><![CDATA[<p>SEPPmail is the market-leader for cryptographic email processing in the Swiss public sector. The primary driver is cantonal administrative requirements under the Federal Act on Data Protection (nFADP/DSG, effective 1 September 2023) and cantonal healthcare data legislation mandating encrypted transmission of personal health information. NCSC-CH advisory 12551 was published in response to this cluster; any Swiss federal body, cantonal administration, or healthcare provider running SEPPmail should treat this as a mandatory same-day response event. The Swiss Federal Chancellery&#39;s ICT security baseline for federal agencies (Sicherheitsstandard IKT des Bundes, ISBB) classifies email gateway compromise as a Level 3 incident requiring escalation to NCSC-CH within 24 hours.</p>
<p>For DACH-region organisations: BSI IT-Grundschutz includes email encryption gateways in the APP.4.4 component scope; a known RCE cluster in such a gateway qualifies for an extraordinary IT-Grundschutz gap notification under ISMS procedures.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://security-hub.ncsc.admin.ch/api/posts/12551/details" target="_blank" rel="noopener noreferrer">NCSC-CH Security Hub post 12551, 2026-05-08</a> · <a class="src-additional" href="https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#security" target="_blank" rel="noopener noreferrer">SEPPmail release notes v15.0</a></span></aside>]]></content:encoded></item></channel></rss>