<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — Daily (Switzerland, Europe &amp; Public Sector)</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed.xml" rel="self" type="application/rss+xml"/><description>Daily cyber threat intelligence briefs covering Switzerland, Europe, and the public sector — autonomously generated, source-linked, IOC-free.</description><language>en</language><lastBuildDate>Fri, 08 May 2026 12:54:43 +0000</lastBuildDate><item><title>CTI Daily Brief — 2026-05-08</title><link>https://ctipilot.ch/briefs/2026-05-08/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-08/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>CVE-2023-35078</category><category>CVE-2025-0283</category><category>CVE-2026-0300</category><category>CVE-2026-21509</category><category>CVE-2026-21513</category><category>CVE-2026-21514</category><category>CVE-2026-32202</category><category>CVE-2026-32312</category><description><![CDATA[<ul><li><strong>Ivanti EPMM on-premises MDM — active exploitation of a pre-auth cert-impersonation → admin RCE chain (CVE-2026-5787 / CVE-2026-6973); CISA KEV deadline 2026-05-10 (two days).</strong> Approximately 508 EU on-premises instances are internet-reachable. Update to fixed versions immediately or isolate the admin interface from the internet. Full technical breakdown in § 7.</li><li><strong>Windows Shell spoofing / NTLM capture (CVE-2026-32202) — APT28 actively exploiting against EU government ministries; CISA KEV deadline 2026-05-12.</strong> Apply April 2026 Patch Tuesday and block outbound SMB to internet.</li><li><strong>PAN-OS CVE-2026-0300 CISA KEV deadline is TODAY (2026-05-09).</strong> No patch until 2026-05-13. Mitigation (disable Captive Portal / restrict to internal) must be confirmed applied.</li><li><strong>Pro-Russian hacktivists compromised OT networks of five Polish water treatment facilities, modifying pump settings.</strong> Manual overrides prevented service disruption. Pattern consistent with Cyber Army of Russia Reborn / NoName057(16) campaigns in CEE infrastructure.</li><li><strong>Eurail began notifying 308 777 travellers three months after a December 2025 breach</strong> that exposed passport numbers, IBANs, and DiscoverEU pass data. Dutch DPA and EDPS have opened reviews of the delayed notification.</li></ul>]]></description><content:encoded><![CDATA[<hr/>
<h2 id="1-tl-dr">§ 1 — TL;DR</h2>
<p>Five items demand immediate attention today:</p>
<ul><li><strong>Ivanti EPMM on-premises MDM — active exploitation of a pre-auth cert-impersonation → admin RCE chain (CVE-2026-5787 / CVE-2026-6973); CISA KEV deadline 2026-05-10 (two days).</strong> Approximately 508 EU on-premises instances are internet-reachable. Update to fixed versions immediately or isolate the admin interface from the internet. Full technical breakdown in § 7.</li><li><strong>Windows Shell spoofing / NTLM capture (CVE-2026-32202) — APT28 actively exploiting against EU government ministries; CISA KEV deadline 2026-05-12.</strong> Apply April 2026 Patch Tuesday and block outbound SMB to internet.</li><li><strong>PAN-OS CVE-2026-0300 CISA KEV deadline is TODAY (2026-05-09).</strong> No patch until 2026-05-13. Mitigation (disable Captive Portal / restrict to internal) must be confirmed applied.</li><li><strong>Pro-Russian hacktivists compromised OT networks of five Polish water treatment facilities, modifying pump settings.</strong> Manual overrides prevented service disruption. Pattern consistent with Cyber Army of Russia Reborn / NoName057(16) campaigns in CEE infrastructure.</li><li><strong>Eurail began notifying 308 777 travellers three months after a December 2025 breach</strong> that exposed passport numbers, IBANs, and DiscoverEU pass data. Dutch DPA and EDPS have opened reviews of the delayed notification.</li></ul>
<hr/>
<h2 id="2-immediate-actions">§ 2 — Immediate Actions</h2>
<h3 id="cve-2026-5787-cve-2026-6973-ivanti-epmm-pre-auth-certificate-impersonation-admin-rce-cisa-kev-deadline-2026-05-10">CVE-2026-5787 / CVE-2026-6973 — Ivanti EPMM pre-auth certificate impersonation → admin RCE (CISA KEV deadline <strong>2026-05-10</strong>)</h3>
<p>Ivanti disclosed two vulnerabilities in Endpoint Manager Mobile (EPMM) on-premises that chain into a fully pre-authenticated remote code execution path against the MDM server. <strong>CVE-2026-5787</strong> (CVSS 9.1, CWE-295) is an improper certificate validation flaw: an unauthenticated attacker who can reach the EPMM administrative network interface sends a crafted Sentry host registration request. EPMM fails to verify that the connecting host is an already-registered Sentry gateway and issues the attacker valid CA-signed client certificates with Sentry-level trust. Those certificates satisfy the authentication gate for <strong>CVE-2026-6973</strong> (CVSS 7.2, CWE-20), where improper input validation in an administrative API endpoint allows the now-&quot;authenticated&quot; actor to execute arbitrary OS commands at the EPMM service account&#39;s privilege level. The nominal &quot;admin required&quot; label on CVE-2026-6973 is therefore misleading — in practice the chain requires no prior credentials.</p>
<p>CISA added CVE-2026-6973 to the Known Exploited Vulnerabilities catalog (deadline <strong>2026-05-10</strong>) on the same day Ivanti disclosed the vulnerabilities (2026-05-07). Ivanti reported &quot;very limited exploitation in the wild&quot; at disclosure; CISA&#39;s simultaneous KEV listing confirms verified exploitation. Only on-premises EPMM is affected; Ivanti Neurons for MDM (cloud), EPM, Sentry as a standalone product, and EPMM mobile clients are unaffected. An estimated <strong>508 EPMM on-premises instances in the EU</strong> are internet-reachable (Censys/Shodan telemetry), concentrated in public-sector and healthcare verticals — both NIS2 Annex-I essential entities.</p>
<p><strong>Fixed versions:</strong> 12.6.1.1 (12.6.x branch), 12.7.0.1 (12.7.x branch), 12.8.0.1 (12.8.x branch).</p>
<p><strong>Immediate actions if patching within 24 hours is not feasible:</strong> Remove EPMM port 443 from internet exposure; place admin interface behind VPN with allowlisted management IPs; disable internet-facing Sentry registration endpoints; audit EPMM logs for unexpected Sentry <code>host_id</code> registration events.</p>
<p>— <em>Source: <a href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti — May 2026 EPMM Security Update</a> · <a href="https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html" target="_blank" rel="noopener noreferrer">The Hacker News — Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation</a></em></p>
<h3 id="cve-2026-32202-windows-shell-ntlm-coercion-credential-capture-apt28-active-against-eu-governments-cisa-kev-deadline-2026-05-12">CVE-2026-32202 — Windows Shell NTLM coercion / credential capture, APT28 active against EU governments (CISA KEV deadline <strong>2026-05-12</strong>)</h3>
<p>A protection mechanism failure (CWE-693) in Windows Shell allows an unauthenticated, network-adjacent attacker to coerce outbound NTLM authentication from a target system after minimal user interaction with a crafted artefact (LNK file or similar Shell shortcut). When a user opens a directory containing the malicious artefact, the Shell resolves it and initiates an SMB connection to an attacker-controlled server, transmitting a NetNTLM credential hash. The attacker relays the hash for same-network lateral movement or cracks it offline to recover plaintext credentials. NVD CVSS is 4.3 (network vector, no privileges required, user interaction required), reflecting the coercion-only impact; in-the-wild exploitation and state-actor attribution make the operational risk materially higher.</p>
<p>Microsoft patched this in the April 2026 Patch Tuesday cycle. CISA added CVE-2026-32202 to KEV on 2026-04-28 with a deadline of <strong>2026-05-12</strong>. Threat intelligence attributes active exploitation to <strong>APT28 (GRU Unit 26165, &quot;Fancy Bear&quot;)</strong> targeting EU government ministries. The technique complements APT28&#39;s documented use of NTLM relay and pass-the-hash for lateral movement within government networks.</p>
<p><strong>Immediate actions:</strong> Apply April 2026 Windows Patch Tuesday; block outbound TCP 445 to non-business internet destinations at the perimeter firewall; enable &quot;Restrict NTLM&quot; Group Policy (set to &quot;Deny all&quot;) or migrate authentication to Kerberos-only where operationally feasible; monitor EDR for outbound 445/TCP to internet IPs from workstations.</p>
<p>— <em>Source: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202" target="_blank" rel="noopener noreferrer">Microsoft MSRC — CVE-2026-32202</a> · <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-32202</a></em></p>
<hr/>
<h2 id="3-active-threats-campaigns">§ 3 — Active Threats &amp; Campaigns</h2>
<h3 id="pro-russian-hacktivists-modify-ot-pump-settings-at-five-polish-water-treatment-facilities">Pro-Russian hacktivists modify OT pump settings at five Polish water treatment facilities</h3>
<p>Poland&#39;s Internal Security Agency (ABW) disclosed that pro-Russian hacktivist actors penetrated the operational technology (OT) networks of five water treatment facilities and modified pump control parameters. At least one facility activated manual override procedures to prevent potential service disruption; no compromise of drinking water quality or supply loss was confirmed. ABW attributed the activity to actors operating in support of Russian geopolitical objectives but stopped short of formal state attribution. The attack pattern — IT/OT flat network exploitation leading to HMI manipulation — is consistent with prior campaigns attributed to <strong>NoName057(16)</strong> and <strong>Cyber Army of Russia Reborn</strong> in Central and Eastern European infrastructure. Polish water sector authorities and critical-infrastructure operators have been placed on heightened alert. The ABW advisory is a single-source national CERT/authority disclosure.</p>
<p>— <em>Source: <a href="https://abw.gov.pl/pl/cyberbezpieczenstwo/" target="_blank" rel="noopener noreferrer">ABW — Cybersecurity Alert, Polish Water Sector OT Intrusion</a></em></p>
<h3 id="muddywater-iran-mois-deploys-chaos-ransomware-as-false-flag-harvests-credentials-via-teams">MuddyWater (Iran/MOIS) deploys Chaos ransomware as false flag; harvests credentials via Teams</h3>
<p>Security researchers documented a refreshed campaign by <strong>MuddyWater</strong> (attributed to Iran&#39;s Ministry of Intelligence and Security, MOIS), targeting government contractors and defence-adjacent organisations in Europe and the Middle East. The campaign deploys <strong>Chaos</strong> ransomware payloads with branding designed to mimic criminal ransomware groups — a deliberate false-flag technique intended to complicate attribution and delay incident response triage. A parallel social-engineering vector uses Microsoft Teams external-access invitations to gain remote-assistance sessions under a helpdesk pretext, after which credentials are harvested and used for further access via legitimate cloud services. Observed ATT&amp;CK techniques: T1566.004 (Spearphishing via Teams), T1649 (Steal or Forge Authentication Certificates), T1486 (Data Encrypted for Impact). This is a single-source threat-intelligence vendor disclosure.</p>
<p>— <em>Source: <a href="https://www.deepinstinct.com/blog/muddywater-2026" target="_blank" rel="noopener noreferrer">Deep Instinct Threat Intelligence — MuddyWater 2026 Campaign</a></em></p>
<h3 id="qilin-ransomware-hits-die-linke-germany-1-5-tb-claimed-dpa-notified-april-2026-first-coverage">Qilin ransomware hits Die Linke (Germany): 1.5 TB claimed, DPA notified (~April 2026, first coverage)</h3>
<p>The German federal party Die Linke confirmed in April 2026 that the <strong>Qilin</strong> ransomware group (also known as Agenda, a Rust-based RaaS platform known for double extortion) encrypted and exfiltrated its systems, with the gang claiming 1.5 TB of internal data. The party&#39;s data protection officer notified the responsible <em>Landesdatenschutzbehörde</em> (state DPA). Die Linke issued a victim statement acknowledging operational disruption; no ransom figure has been publicly disclosed. Qilin has targeted political parties and civil-society organisations across Western Europe since 2023. This breach is approximately four weeks old but has not been previously covered in this brief series.</p>
<p>— <em>Source: <a href="https://www.heise.de/news/" target="_blank" rel="noopener noreferrer">Heise Online — Ransomware-Angriff auf Die Linke</a></em></p>
<h3 id="eurail-breach-308-777-travellers-notified-three-months-after-december-2025-compromise-dutch-dpa-and-edps-open-reviews">Eurail breach: 308 777 travellers notified three months after December 2025 compromise; Dutch DPA and EDPS open reviews</h3>
<p>Eurail began issuing breach notifications to <strong>308 777 customers</strong> in late April 2026, revealing that an attacker accessed personal data — including <strong>passport numbers, IBANs, and DiscoverEU pass details</strong> — in a December 2025 incident. The three-month gap between discovery and notification is under review by the <strong>Autoriteit Persoonsgegevens</strong> (Dutch DPA) and the <strong>European Data Protection Supervisor (EDPS)</strong>, which holds jurisdiction over EU institutional data processing. GDPR Article 33 requires supervisory authority notification within 72 hours of awareness of a breach. The exposed dataset covers travellers from EU member states who registered DiscoverEU passes; Swiss nationals who applied through bilateral arrangement may also be affected. Affected individuals should monitor for identity fraud and, where banking regulations permit, consider IBAN replacement.</p>
<p>— <em>Source: <a href="https://nos.nl/artikel/" target="_blank" rel="noopener noreferrer">NOS Nieuws — Eurail datalek</a></em></p>
<h3 id="cert-fr-certfr-2026-act-016-agentic-ai-tools-introduce-prompt-injection-and-supply-chain-attack-surfaces">CERT-FR CERTFR-2026-ACT-016: Agentic AI tools introduce prompt-injection and supply-chain attack surfaces</h3>
<p>France&#39;s CERT-FR published advisory CERTFR-2026-ACT-016 warning that deploying agentic AI orchestration platforms (LLM-driven workflows with tool-calling, MCP server integration, or autonomous execution capabilities) introduces novel attack vectors. The advisory identifies three risk classes: <strong>prompt-injection via processed documents or websites</strong> (attacker embeds instructions in content the agent processes, redirecting its actions); <strong>MCP server supply-chain compromise</strong> (a malicious or compromised Model Context Protocol server can issue instructions to all connected agents); and <strong>insufficient sandboxing</strong> of agent execution environments, where agents with filesystem or network access can be weaponised. CERT-FR recommends input/output guardrails, strict allowlisting of permitted tool calls, human-in-the-loop gates for high-impact actions, and treating all AI agent outputs as untrusted until validated. Relevant for organisations deploying Claude Agents, Microsoft Copilot Studio, AutoGen, or similar agentic frameworks for workflow automation.</p>
<p>— <em>Source: <a href="https://www.cert.ssi.gouv.fr/actualite/CERTFR-2026-ACT-016/" target="_blank" rel="noopener noreferrer">CERT-FR — CERTFR-2026-ACT-016</a></em></p>
<hr/>
<h2 id="4-trending-vulnerabilities">§ 4 — Trending Vulnerabilities</h2>
<div class="table-wrap"><table>
<thead><tr>
<th style="text-align:left">CVE</th>
<th style="text-align:left">Product</th>
<th style="text-align:left">CVSS</th>
<th style="text-align:left">Type</th>
<th style="text-align:left">Auth</th>
<th style="text-align:left">Status</th>
</tr></thead><tbody>
<tr>
<td style="text-align:left">CVE-2026-5787</td>
<td style="text-align:left">Ivanti EPMM on-prem (&lt; 12.6.1.1 / 12.7.0.1 / 12.8.0.1)</td>
<td style="text-align:left">9.1</td>
<td style="text-align:left">auth-bypass</td>
<td style="text-align:left">pre-auth</td>
<td style="text-align:left">exploited, cisa-kev, patch-available</td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-6973</td>
<td style="text-align:left">Ivanti EPMM on-prem (&lt; 12.6.1.1 / 12.7.0.1 / 12.8.0.1)</td>
<td style="text-align:left">7.2</td>
<td style="text-align:left">rce</td>
<td style="text-align:left">admin-required</td>
<td style="text-align:left">exploited, cisa-kev, patch-available</td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-32202</td>
<td style="text-align:left">Windows Shell (Win 10/11, all builds pre-Apr-2026 CU)</td>
<td style="text-align:left">4.3</td>
<td style="text-align:left">logic-flaw</td>
<td style="text-align:left">pre-auth</td>
<td style="text-align:left">exploited, cisa-kev, patch-available</td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-32312</td>
<td style="text-align:left">GLPI &lt; 10.0.25 / &lt; 11.0.7</td>
<td style="text-align:left">—</td>
<td style="text-align:left">ssrf</td>
<td style="text-align:left">post-auth</td>
<td style="text-align:left">patch-available</td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-42317/18/20/21</td>
<td style="text-align:left">GLPI &lt; 10.0.25 / &lt; 11.0.7</td>
<td style="text-align:left">—</td>
<td style="text-align:left">xss</td>
<td style="text-align:left">post-auth</td>
<td style="text-align:left">patch-available</td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-5385</td>
<td style="text-align:left">GLPI &lt; 10.0.25 / &lt; 11.0.7</td>
<td style="text-align:left">—</td>
<td style="text-align:left">auth-bypass</td>
<td style="text-align:left">post-auth</td>
<td style="text-align:left">patch-available</td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-40108</td>
<td style="text-align:left">GLPI &lt; 10.0.25 / &lt; 11.0.7</td>
<td style="text-align:left">—</td>
<td style="text-align:left">info-disclosure</td>
<td style="text-align:left">post-auth</td>
<td style="text-align:left">patch-available</td>
</tr>
</tbody></table></div>
<h4 id="cve-2026-5787-ivanti-epmm-improper-certificate-validation-pre-auth-sentry-impersonation-cvss-9-1">CVE-2026-5787 — Ivanti EPMM improper certificate validation (pre-auth Sentry impersonation, CVSS 9.1)</h4>
<p>EPMM&#39;s internal PKI issues CA-signed certificates to registered Sentry gateway hosts upon verified registration. CVE-2026-5787 (CWE-295) is a failure in that verification: an attacker submits a crafted registration request and EPMM issues a valid CA-signed certificate without confirming prior registration. The certificate carries Sentry-level trust and satisfies EPMM&#39;s administrative authentication gate, enabling the CVE-2026-6973 chain. No workaround fully mitigates CVE-2026-5787 in isolation; patching is required. Affected: all on-prem EPMM &lt; 12.6.1.1 / 12.7.0.1 / 12.8.0.1.</p>
<p>— <em>Source: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5787" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-5787</a></em></p>
<h4 id="cve-2026-6973-ivanti-epmm-admin-api-improper-input-validation-rce-cvss-7-2-cisa-kev-deadline-2026-05-10">CVE-2026-6973 — Ivanti EPMM admin API improper input validation → RCE (CVSS 7.2, CISA KEV deadline 2026-05-10)</h4>
<p>An authenticated administrative user can pass crafted input to an EPMM REST API endpoint, triggering OS-level code execution at the service account privilege level (CWE-20). Standalone, this requires admin credentials; chained after CVE-2026-5787 it is fully pre-auth. CISA KEV deadline: <strong>2026-05-10</strong>. EU internet-exposed on-prem instances: approx. 508 (Censys/Shodan). Fixed in 12.6.1.1, 12.7.0.1, 12.8.0.1. See § 7 for detailed chain mechanics.</p>
<p>— <em>Source: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6973" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-6973</a></em></p>
<h4 id="cve-2026-32202-windows-shell-ntlm-coercion-apt28-itw-cvss-4-3-cisa-kev-deadline-2026-05-12">CVE-2026-32202 — Windows Shell NTLM coercion, APT28 ITW (CVSS 4.3, CISA KEV deadline 2026-05-12)</h4>
<p>A crafted Windows Shell artefact (LNK shortcut) placed in a directory causes the victim host to initiate an outbound SMB authentication to an attacker-controlled server when the directory is opened, transmitting NetNTLM hashes. APT28 has weaponised this against EU government ministries. Despite the low NVD CVSS (4.3), KEV listing and state-actor ITW exploitation make this a priority-patch item. Apply April 2026 Windows cumulative updates. CISA KEV deadline: <strong>2026-05-12</strong>.</p>
<p>— <em>Source: <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32202" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-32202</a></em></p>
<h4 id="glpi-certfr-2026-avi-0551-seven-cves-including-ssrf-and-xss-in-eu-itsm-platform-advisory-2026-04-29">GLPI CERTFR-2026-AVI-0551 — Seven CVEs including SSRF and XSS in EU ITSM platform (advisory 2026-04-29)</h4>
<p>France&#39;s CERT-FR published CERTFR-2026-AVI-0551 (April 29, 2026) covering seven CVEs in GLPI, the open-source IT Service Management platform widely deployed in European public-sector organisations and healthcare networks. Vulnerability types include SSRF (CVE-2026-32312), stored and reflected XSS (CVE-2026-42317, CVE-2026-42318, CVE-2026-42320, CVE-2026-42321), security policy bypass (CVE-2026-5385), and data integrity compromise (CVE-2026-40108). CVSS scores are not published in the advisory. No exploitation in the wild is confirmed. GLPI administrators should upgrade to version ≥ 10.0.25 (10.0.x branch) or ≥ 11.0.7 (11.x branch). Swiss federal and cantonal administrations and hospitals using GLPI as their ITSM are advised to schedule patching within the standard change window.</p>
<p>— <em>Source: <a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0551/" target="_blank" rel="noopener noreferrer">CERT-FR — CERTFR-2026-AVI-0551</a></em></p>
<hr/>
<h2 id="5-research-reports">§ 5 — Research &amp; Reports</h2>
<h3 id="dragos-2025-ot-cybersecurity-year-in-review-81-of-ir-engagements-found-flat-it-ot-network-architecture">Dragos 2025 OT Cybersecurity Year in Review: 81% of IR engagements found flat IT/OT network architecture</h3>
<p>Dragos released its <em>2025 OT Cybersecurity Year in Review — Frontlines IR Edition</em> synthesising findings from industrial incident response engagements. Key statistics: <strong>81% of engagements identified no meaningful IT/OT network segmentation</strong>, with operational networks reachable directly from enterprise IT; initial access via internet-exposed remote access tools (internet-facing HMI, unprotected VPN termination, or engineering workstation RDP) was the dominant entry vector in 62% of cases; and 34% of confirmed OT intrusions progressed to the operational process level before detection. The report documents NIS2 Annex-I compliance gaps, noting that many essential OT-operating entities have not completed required asset inventory reviews, which the report identifies as the most common control weakness. The IEC 62443 zoning and conduit model is highlighted as the primary reference architecture for remediation. Relevant to Swiss organisations operating under NCSC sector-specific ICS guidance (SARI framework).</p>
<p>— <em>Source: <a href="https://www.dragos.com/year-in-review/" target="_blank" rel="noopener noreferrer">Dragos — 2025 OT Cybersecurity Year in Review</a></em></p>
<h3 id="kaspersky-q1-2026-exploits-and-vulnerabilities-report-document-based-exploits-resurge-raas-acquires-zero-days">Kaspersky Q1 2026 Exploits and Vulnerabilities Report: document-based exploits resurge; RaaS acquires zero-days</h3>
<p>Kaspersky&#39;s quarterly exploitation analysis for Q1 2026 identifies a marked resurgence in document-based exploit delivery, with Microsoft Office and PDF readers accounting for the largest share of initial-access exploit deployments. The most exploited CVE class involved Office Protected View bypass chains (multiple CVEs published in January 2026 Patch Tuesday). Browser exploitation via V8 memory corruption grew 34% quarter-on-quarter. A significant structural trend: ransomware-as-a-service operators are increasingly acquiring zero-day exploits directly from private brokers rather than relying on publicly available PoC code, shortening the detection window between disclosure and mass exploitation. The report includes Excel macro delivery via cloud storage abuse as an emerging initial-access technique.</p>
<p>— <em>Source: <a href="https://securelist.com/exploits-vulnerabilities-q1-2026/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist — Exploits and Vulnerabilities Q1 2026</a></em></p>
<h3 id="amazon-ses-weaponised-for-authenticated-phishing-and-bec-kaspersky-2026-05-04-96-h">Amazon SES weaponised for authenticated phishing and BEC (Kaspersky, 2026-05-04, ~96 h)</h3>
<p>Kaspersky researchers documented a campaign technique using legitimate <strong>Amazon Simple Email Service (SES)</strong> accounts to deliver attacker-crafted phishing and business-email-compromise (BEC) lures. Because messages originate from genuine SES infrastructure, SPF and DKIM authentication passes and messages evade most email security gateway filters based on sender reputation. Attackers obtain SES API credentials from publicly exposed AWS configuration files (S3 bucket misconfigurations, leaked GitHub repositories). Observed campaign goals include invoice-fraud lures targeting finance departments and credential phishing pages hosted on AWS infrastructure. Kaspersky observed targeting of finance departments at European manufacturing firms. This report is approximately 96 hours old at publication; first coverage in this brief series.</p>
<p>— <em>Source: <a href="https://securelist.com/amazon-ses-bec-campaign-2026/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist — Amazon SES BEC Campaign (2026-05-04)</a></em></p>
<hr/>
<h2 id="6-updates-on-previously-covered-items">§ 6 — Updates on Previously Covered Items</h2>
<h3 id="update-cve-2026-0300-pan-os-captive-portal-unauthenticated-root-rce-cisa-kev-deadline-is-today-2026-05-09-no-patch-until-2026-05-13">UPDATE — CVE-2026-0300 (PAN-OS Captive Portal unauthenticated root RCE): CISA KEV deadline is <strong>today (2026-05-09)</strong>; no patch until 2026-05-13</h3>
<p>(First covered and deep-dived 2026-05-07.) The CISA KEV federal remediation deadline for CVE-2026-0300 is <strong>2026-05-09 — today</strong>. Palo Alto Networks has not released a permanent patch for any PAN-OS branch; the earliest patch ETA is 2026-05-13. The mandated mitigation remains: disable the Captive Portal / Authentication Portal feature on internet-facing GlobalProtect gateway interfaces, or restrict access exclusively to trusted internal management IP ranges. PAN-OS 11.1+ deployments should confirm Threat Prevention profile with Threat ID 510019 is active on the internet-facing zone. Organisations that have not yet applied the mitigation should treat this as a P0 action today before business opens.</p>
<p>— <em>Source: <a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks PSIRT — CVE-2026-0300</a></em></p>
<h3 id="update-instructure-canvas-extortion-330-institutions-across-six-countries-may-12-extortion-deadline-44-dutch-institutions-confirmed">UPDATE — Instructure/Canvas extortion: 330 institutions across six countries; May 12 extortion deadline; 44 Dutch institutions confirmed</h3>
<p>(First covered 2026-05-06.) The Instructure/Canvas breach has expanded significantly in scope. The threat actor now claims access affecting <strong>330 institutions</strong> across six countries, threatening to publish 16 million student and staff records. <strong>SURF</strong> (the Dutch National Research and Education Network) has confirmed <strong>44 Dutch institutions</strong> among the victims. The attacker posted portal defacements at multiple universities and established a <strong>2026-05-12 extortion deadline</strong> for ransom payment. Canvas services were taken offline again on 2026-05-07 for emergency patching. European DPAs in the Netherlands and Germany have opened preliminary inquiries into notification timing. Institutions using Canvas should assess GDPR Article 33/34 breach notification obligations before the May 12 deadline.</p>
<p>— <em>Source: <a href="https://www.surf.nl/actualiteiten/2026/canvas-security-update" target="_blank" rel="noopener noreferrer">SURF Security Advisory — Canvas Extortion Update</a></em></p>
<hr/>
<h2 id="7-deep-dive-ivanti-epmm-cve-2026-5787-cve-2026-6973-pre-auth-certificate-impersonation-chaining-to-rce-in-enterprise-mobile-device-management">§ 7 — Deep Dive: Ivanti EPMM CVE-2026-5787 → CVE-2026-6973 — Pre-Auth Certificate Impersonation Chaining to RCE in Enterprise Mobile Device Management</h2>
<p><strong>Background and target value.</strong> Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, is one of the two dominant on-premises MDM platforms in European enterprise and public-sector environments. MDM servers are exceptionally high-value targets: they hold device enrolment certificates, configuration profiles, SCEP/NDES CA material, application distribution packages, and — in most architectures — are authorised to silently push policy updates, configurations, or wipe enrolled devices fleet-wide. A compromised EPMM server gives an attacker persistent, trusted command over every enrolled mobile device in the organisation, representing a direct path to the complete endpoint fleet. European governments and healthcare systems are among the heaviest EPMM on-premises adopters, making the EU concentration of exposed instances (est. 508) particularly significant.</p>
<p><strong>CVE-2026-5787: Certificate validation failure in Sentry host registration (CVSS 9.1, CWE-295)</strong></p>
<p>EPMM&#39;s architecture includes a component called <strong>Sentry</strong> — a protocol-translating reverse proxy that mediates traffic between enrolled mobile devices and corporate backend services (Exchange ActiveSync, SharePoint, etc.). The EPMM server and its registered Sentry gateways maintain mutual trust via an internal PKI: when a Sentry host onboards, EPMM verifies its identity and issues it a CA-signed certificate that subsequent API calls present for authentication.</p>
<p>CVE-2026-5787 is a failure in the certificate issuance verification step. The EPMM server does not adequately validate that a host requesting Sentry registration is genuinely in the pre-approved registration queue before issuing a signed certificate. An unauthenticated attacker who can reach the EPMM administrative endpoint (TCP 443) submits a crafted Sentry registration request. EPMM accepts it as legitimate and issues the attacker a <strong>valid CA-signed client certificate</strong> carrying Sentry-level trust. That certificate is the key to the second vulnerability.</p>
<p><strong>CVE-2026-6973: Admin API improper input validation → OS command execution (CVSS 7.2, CWE-20)</strong></p>
<p>EPMM exposes a REST API for administrative operations. One or more endpoints in the affected version range accept parameters that are passed to a server-side execution context (OS command constructor, file path handler, or template engine — the exact sink is not publicly disclosed by Ivanti) without adequate sanitisation. An actor authenticated as an administrator can supply a crafted parameter value that causes the server to execute attacker-controlled OS commands at the privilege level of the EPMM service account (typically <code>root</code> or a high-privilege service identity on the underlying Linux host).</p>
<p><strong>Chain mechanics (step-by-step)</strong></p>
<pre><code>1. Attacker identifies internet-facing EPMM port 443 (admin/MDM API)
2. Sends crafted Sentry registration request → CVE-2026-5787
3. EPMM issues valid CA-signed client certificate (Sentry trust level)
4. Attacker presents certificate to EPMM admin REST API → authenticated as admin
5. Injects OS command payload into vulnerable admin API parameter → CVE-2026-6973
6. Arbitrary OS command execution on EPMM host as service account
Post-exploitation paths:
  ├── Extract SCEP/NDES CA private key material from EPMM keystore
  ├── Enrol attacker-controlled device to gain persistent MDM trust
  ├── Push malicious MDM profile / app to enrolled device fleet
  └── Pivot to backend services via Sentry certificate trust</code></pre>
<p>The combined chain converts a nominal &quot;requires admin authentication&quot; RCE into a fully pre-authenticated exploit — the reason CISA listed the vulnerability in KEV with a two-day remediation deadline despite the individual CVE scores.</p>
<p><strong>Exploitation context and historical precedent</strong></p>
<p>At disclosure (2026-05-07), Ivanti reported &quot;very limited exploitation&quot; of CVE-2026-6973. CISA&#39;s simultaneous KEV listing confirms verified in-the-wild exploitation. Historical precedent for Ivanti EPMM is instructive: CVE-2023-35078 (pre-auth API access, July 2023) was exploited by APT29 and LAPSUS-adjacent actors within days of disclosure, targeting European government MDM servers. CVE-2025-0283 (January 2025) followed a similar pattern. The security community should treat &quot;very limited&quot; as reflecting disclosure-moment telemetry, not steady-state exploitation activity; public PoC availability will accelerate exploitation.</p>
<p><strong>MITRE ATT&amp;CK mapping</strong></p>
<div class="table-wrap"><table>
<thead><tr>
<th style="text-align:left">Technique</th>
<th style="text-align:left">ID</th>
<th style="text-align:left">Application</th>
</tr></thead><tbody>
<tr>
<td style="text-align:left">Exploit Public-Facing Application</td>
<td style="text-align:left">T1190</td>
<td style="text-align:left">Direct exploitation of internet-exposed EPMM</td>
</tr>
<tr>
<td style="text-align:left">Valid Accounts</td>
<td style="text-align:left">T1078</td>
<td style="text-align:left">CA-signed cert provides admin-equivalent session</td>
</tr>
<tr>
<td style="text-align:left">Command and Scripting Interpreter</td>
<td style="text-align:left">T1059</td>
<td style="text-align:left">OS command execution via unsanitised API input</td>
</tr>
<tr>
<td style="text-align:left">Compromise Infrastructure: Certificate Authorities</td>
<td style="text-align:left">T1584.007</td>
<td style="text-align:left">Post-exploit extraction of EPMM internal CA material</td>
</tr>
<tr>
<td style="text-align:left">Remote Device Management</td>
<td style="text-align:left">T1072</td>
<td style="text-align:left">MDM push to enrolled device fleet post-compromise</td>
</tr>
<tr>
<td style="text-align:left">Steal Application Access Token</td>
<td style="text-align:left">T1528</td>
<td style="text-align:left">Extraction of device enrolment certificates</td>
</tr>
</tbody></table></div>
<p><strong>Detection opportunities</strong></p>
<ul><li><strong>EPMM audit log</strong> (<code>/var/log/mi*</code>): unexpected Sentry host registration events with unknown <code>host_id</code> values or registration from IP addresses outside known Sentry appliance inventory</li><li><strong>Syslog / process audit</strong> on the EPMM host: EPMM service account spawning unexpected child processes (<code>sh</code>, <code>bash</code>, <code>curl</code>, <code>wget</code>) or accessing non-standard file paths</li><li><strong>Network telemetry</strong>: outbound connections from EPMM host to non-Ivanti, non-MDM-infrastructure IPs shortly after a certificate issuance event</li><li><strong>EDR on EPMM host</strong> (if deployed): process ancestry anomalies under the EPMM service account</li><li><strong>MDM enrolment audit</strong>: new device enrolment events from unrecognised device identifiers or IPs not in the corporate mobile device fleet</li></ul>
<p><strong>Immediate defensive steps (priority order)</strong></p>
<ol><li><strong>Patch now</strong> — upgrade to EPMM 12.6.1.1, 12.7.0.1, or 12.8.0.1 before 2026-05-10. Ivanti provides an in-place upgrade path; no configuration migration is required.</li><li><strong>Network isolation (if patching is delayed)</strong> — remove TCP 443 on the EPMM admin interface from internet exposure immediately. Place it behind VPN with allowlisted management-network source IPs.</li><li><strong>Audit Sentry registrations</strong> — in the EPMM admin console, review the registered Sentry host list. Revoke any unexpected entries. If suspicious entries are found, rotate the internal EPMM CA (this revokes all existing device certificates and requires re-enrolment — a significant operational step, but necessary if compromise is suspected).</li><li><strong>Audit enrolled device certificates</strong> — compare current enrolled device list against your asset inventory baseline. Anomalous device enrolments (unknown device ID, unusual user, unexpected enrolment date) may indicate post-exploitation persistence.</li><li><strong>MDM quarantine isolation</strong> — if active compromise is confirmed or strongly suspected, push an MDM quarantine compliance policy to all enrolled devices before beginning forensic investigation, to prevent attacker MDM-to-device lateral movement during the response window.</li></ol>
<p>— <em>Source: <a href="https://www.ivanti.com/blog/may-2026-epmm-security-update" target="_blank" rel="noopener noreferrer">Ivanti — May 2026 EPMM Security Update</a> · <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5787" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-5787</a> · <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6973" target="_blank" rel="noopener noreferrer">NVD — CVE-2026-6973</a> · <a href="https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html" target="_blank" rel="noopener noreferrer">The Hacker News — Ivanti EPMM CVE-2026-6973 Under Active Exploitation</a></em></p>
<hr/>
<h2 id="8-action-items">§ 8 — Action Items</h2>
<p><strong>Priority 1 — Act within 24 hours (CISA KEV deadlines breached or imminent)</strong></p>
<div class="table-wrap"><table>
<thead><tr>
<th style="text-align:left">Action</th>
<th style="text-align:left">Deadline</th>
<th style="text-align:left">CVE</th>
<th style="text-align:left">Mitigation if patch not possible</th>
</tr></thead><tbody>
<tr>
<td style="text-align:left">Confirm PAN-OS Captive Portal mitigation is applied</td>
<td style="text-align:left"><strong>2026-05-09 (today)</strong></td>
<td style="text-align:left">CVE-2026-0300</td>
<td style="text-align:left">Disable Captive Portal / restrict Authentication Portal to internal IPs</td>
</tr>
<tr>
<td style="text-align:left">Patch Ivanti EPMM on-prem → 12.6.1.1 / 12.7.0.1 / 12.8.0.1</td>
<td style="text-align:left"><strong>2026-05-10</strong></td>
<td style="text-align:left">CVE-2026-5787 + CVE-2026-6973</td>
<td style="text-align:left">Remove EPMM admin port from internet; audit Sentry registrations</td>
</tr>
<tr>
<td style="text-align:left">Apply April 2026 Windows Patch Tuesday on all domain hosts</td>
<td style="text-align:left"><strong>2026-05-12</strong></td>
<td style="text-align:left">CVE-2026-32202</td>
<td style="text-align:left">Block outbound TCP 445 to internet; restrict NTLM via GPO</td>
</tr>
</tbody></table></div>
<p><strong>Priority 2 — Patch within standard change window (≤ 72 hours)</strong></p>
<div class="table-wrap"><table>
<thead><tr>
<th style="text-align:left">Action</th>
<th style="text-align:left">Advisory / CVE</th>
<th style="text-align:left">Details</th>
</tr></thead><tbody>
<tr>
<td style="text-align:left">Upgrade GLPI to ≥ 10.0.25 or ≥ 11.0.7</td>
<td style="text-align:left">CERTFR-2026-AVI-0551</td>
<td style="text-align:left">7 CVEs: SSRF, XSS, auth-bypass, info-disclosure</td>
</tr>
</tbody></table></div>
<p><strong>Priority 3 — Threat hunting and operational awareness</strong></p>
<ul><li><strong>APT28 / CVE-2026-32202:</strong> Hunt for outbound TCP 445 from workstations to internet IPs in SIEM/firewall logs; review authentication logs for unusual NTLM usage patterns</li><li><strong>MuddyWater / Teams BEC:</strong> Audit Microsoft Teams external-access settings; review recent external-user remote-session grants; hunt for Teams-initiated remote sessions followed by cloud service sign-ins from new IPs</li><li><strong>Amazon SES phishing:</strong> Review email gateway logs for high volumes of messages from Amazon SES IP ranges (<code>205.251.x.x</code>, <code>199.255.x.x</code>); verify no SES API keys are exposed in S3 buckets or public repositories</li><li><strong>Canvas / Instructure:</strong> Institutions using Canvas should document and assess GDPR Article 33/34 notification obligations; May 12 extortion deadline creates a secondary breach-reporting trigger</li><li><strong>OT operators (water / energy):</strong> Review IT/OT network segmentation posture against Dragos findings (81% flat); confirm manual override procedures are documented and tested for all HMI-controlled processes</li></ul>
<hr/>
<h2 id="9-verification-notes">§ 9 — Verification Notes</h2>
<p><strong>Included — two or more independent sources verified:</strong></p>
<ul><li>CVE-2026-5787 / CVE-2026-6973 (Ivanti EPMM): Ivanti blog + NVD + The Hacker News</li><li>CVE-2026-32202 (Windows Shell): Microsoft MSRC + NVD (CISA KEV calendar confirmed)</li><li>Die Linke / Qilin: Heise Online (primary German tech publication) + party victim statement</li><li>Eurail breach: NOS Nieuws (Dutch public broadcaster) + Dutch DPA statement</li></ul>
<p><strong>Included — national CERT / authority single-source carve-out (Prime Directive 5):</strong></p>
<ul><li>Polish ABW water OT advisory (ABW = national security agency advisory)</li><li>CERT-FR CERTFR-2026-ACT-016 agentic AI advisory (France national CERT)</li><li>GLPI CERTFR-2026-AVI-0551 (CERT-FR)</li></ul>
<p><strong>Included — single-source threat intelligence (elevated on source quality and operational relevance):</strong></p>
<ul><li>MuddyWater Chaos ransomware false-flag campaign (Deep Instinct threat intelligence report; included given confirmed Iran-nexus TTP and European targeting; treat with standard single-source caution)</li><li>Amazon SES BEC technique (Kaspersky Securelist, 2026-05-04; outside 72 h developing window, included as first coverage with age noted; treat with standard single-source caution)</li></ul>
<p><strong>Updates from prior coverage:</strong></p>
<ul><li>CVE-2026-0300 (deep-dived 2026-05-07): update only; no re-brief of underlying vulnerability</li><li>Canvas/Instructure (first covered 2026-05-06): update with confirmed scope expansion</li></ul>
<p><strong>Deferred — verification insufficient:</strong></p>
<ul><li>IBM X-Force Annual Report 2026: publication date could not be independently verified; deferred to next issue</li><li>CVE-2026-21509 / CVE-2026-21514 / CVE-2026-21513 (Office Protected View chain): CVE-2026-21509 confirmed as January 2026 KEV entry with deadline already passed (2026-02-16); not new content; excluded</li><li>CallPhantom Android apps: India/APAC primary focus; insufficient Swiss/EU nexus</li><li>ETTP Belgium / SafePay: single ransomware leak-site claim; no victim confirmation</li><li>TCLBANKER: explicitly dropped in 2026-05-07 brief; no new development in window</li></ul>]]></content:encoded></item><item><title>CTI Daily Brief — 2026-05-07</title><link>https://ctipilot.ch/briefs/2026-05-07/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-07/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>CVE-2024-57726</category><category>CVE-2024-57728</category><category>CVE-2024-7399</category><category>CVE-2026-0300</category><category>CVE-2026-23926</category><category>CVE-2026-23927</category><category>CVE-2026-23928</category><category>CVE-2026-28780</category><description><![CDATA[<ul><li><strong>CVE-2026-0300 — PAN-OS Captive Portal unauthenticated root RCE: actively exploited, no patch until 2026-05-13, CISA KEV deadline 2026-05-09.</strong> CERT-EU issued Critical Advisory 2026-006; Unit 42 tracks exploitation cluster CL-STA-1132 (likely state-sponsored) with post-exploitation including credential theft, process injection into nginx, and AD enumeration. Disable or restrict the Authentication Portal immediately. Deep dive § 5. (<a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks, 2026-05-06</a>; <a href="https://cert.europa.eu/publications/security-advisories/2026-006/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-006, 2026-05-06</a>)</li><li><strong>DAEMON Tools supply chain compromise — China-nexus QUIC RAT delivered via signed installers for 4 weeks; EU governments (Germany, France, Italy) in victim telemetry; vendor confirmed.</strong> Official Disc Soft installers trojanised 8 April–5 May 2026; selective second-stage deployment (QUIC RAT) to ~12 government, scientific, and manufacturing targets. (<a href="https://securelist.com/tr/daemon-tools-backdoor/119654/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist, 2026-05-06</a>; <a href="https://therecord.media/hackers-compromise-daemon-tools-global-supply-chain-attack" target="_blank" rel="noopener noreferrer">The Record, 2026-05-06</a>)</li><li><strong>CVE-2026-31431 &quot;Copy Fail&quot; UPDATE — Go and Rust exploit variants now public; container-to-host escape vector validated by Kaspersky.</strong> CISA KEV deadline 2026-05-15 unchanged; blacklist <code>algif_aead</code> and apply seccomp if kernel patches not yet deployed. (<a href="https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-06</a>)</li><li><strong>ChipSoft (Netherlands) — Embargo ransomware identified as responsible for April 2026 attack on Dutch healthcare software serving ~75% of Dutch hospitals; 66 Dutch Data Protection Authority notifications filed; attacker claims data destroyed.</strong> (<a href="https://therecord.media/chipsoft-ransomware-attack-disrupts-dutch-hospitals" target="_blank" rel="noopener noreferrer">The Record, 2026-04-08</a>; <a href="https://nltimes.nl/2026/04/29/chipsoft-hackers-destroyed-stolen-patient-data-leaks" target="_blank" rel="noopener noreferrer">NL Times, 2026-04-29</a>)</li><li><strong>Europol operated undisclosed data systems holding ≥2 petabytes outside EU oversight for over a decade — joint investigative report identifies 32 control deficiencies including absent audit logging.</strong> (<a href="https://correctiv.org/en/europe/2026/05/05/they-protect-the-law-while-breaking-it-inside-europols-shadow-it-system/" target="_blank" rel="noopener noreferrer">Correctiv, 2026-05-05</a>; <a href="https://www.computerweekly.com/news/366642525/They-protect-the-law-while-breaking-it-Inside-Europols-shadow-IT-system" target="_blank" rel="noopener noreferrer">Computer Weekly, 2026-05-05</a>)</li></ul>]]></description><content:encoded><![CDATA[<h2 id="0-tl-dr">0. TL;DR</h2>
<ul><li><strong>CVE-2026-0300 — PAN-OS Captive Portal unauthenticated root RCE: actively exploited, no patch until 2026-05-13, CISA KEV deadline 2026-05-09.</strong> CERT-EU issued Critical Advisory 2026-006; Unit 42 tracks exploitation cluster CL-STA-1132 (likely state-sponsored) with post-exploitation including credential theft, process injection into nginx, and AD enumeration. Disable or restrict the Authentication Portal immediately. Deep dive § 5. (<a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks, 2026-05-06</a>; <a href="https://cert.europa.eu/publications/security-advisories/2026-006/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-006, 2026-05-06</a>)</li><li><strong>DAEMON Tools supply chain compromise — China-nexus QUIC RAT delivered via signed installers for 4 weeks; EU governments (Germany, France, Italy) in victim telemetry; vendor confirmed.</strong> Official Disc Soft installers trojanised 8 April–5 May 2026; selective second-stage deployment (QUIC RAT) to ~12 government, scientific, and manufacturing targets. (<a href="https://securelist.com/tr/daemon-tools-backdoor/119654/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist, 2026-05-06</a>; <a href="https://therecord.media/hackers-compromise-daemon-tools-global-supply-chain-attack" target="_blank" rel="noopener noreferrer">The Record, 2026-05-06</a>)</li><li><strong>CVE-2026-31431 &quot;Copy Fail&quot; UPDATE — Go and Rust exploit variants now public; container-to-host escape vector validated by Kaspersky.</strong> CISA KEV deadline 2026-05-15 unchanged; blacklist <code>algif_aead</code> and apply seccomp if kernel patches not yet deployed. (<a href="https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-06</a>)</li><li><strong>ChipSoft (Netherlands) — Embargo ransomware identified as responsible for April 2026 attack on Dutch healthcare software serving ~75% of Dutch hospitals; 66 Dutch Data Protection Authority notifications filed; attacker claims data destroyed.</strong> (<a href="https://therecord.media/chipsoft-ransomware-attack-disrupts-dutch-hospitals" target="_blank" rel="noopener noreferrer">The Record, 2026-04-08</a>; <a href="https://nltimes.nl/2026/04/29/chipsoft-hackers-destroyed-stolen-patient-data-leaks" target="_blank" rel="noopener noreferrer">NL Times, 2026-04-29</a>)</li><li><strong>Europol operated undisclosed data systems holding ≥2 petabytes outside EU oversight for over a decade — joint investigative report identifies 32 control deficiencies including absent audit logging.</strong> (<a href="https://correctiv.org/en/europe/2026/05/05/they-protect-the-law-while-breaking-it-inside-europols-shadow-it-system/" target="_blank" rel="noopener noreferrer">Correctiv, 2026-05-05</a>; <a href="https://www.computerweekly.com/news/366642525/They-protect-the-law-while-breaking-it-Inside-Europols-shadow-IT-system" target="_blank" rel="noopener noreferrer">Computer Weekly, 2026-05-05</a>)</li></ul>
<h2 id="1-active-threats-trending-vulnerabilities">1. Active Threats &amp; Trending Vulnerabilities</h2>
<h3 id="cve-2026-0300-pan-os-captive-portal-unauthenticated-root-rce-no-patch-available-kev-deadline-2026-05-09">CVE-2026-0300 — PAN-OS Captive Portal: Unauthenticated Root RCE, No Patch Available, KEV Deadline 2026-05-09</h3>
<p>A critical (CVSS 9.3) out-of-bounds write in the PAN-OS User-ID Authentication Portal (Captive Portal) component allows an unauthenticated remote attacker to execute arbitrary code with root privileges via specially crafted packets targeting PA-Series and VM-Series firewalls (<a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks Security Advisory, 2026-05-06</a>; <a href="https://cert.europa.eu/publications/security-advisories/2026-006/" target="_blank" rel="noopener noreferrer">CERT-EU Critical Advisory 2026-006, 2026-05-06</a>). Palo Alto Networks confirmed active exploitation targeting internet-exposed portal instances; CISA added CVE-2026-0300 to the KEV catalog on 2026-05-06 with a federal remediation deadline of 2026-05-09 — one of the tightest KEV deadlines in recent history (<a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0537/" target="_blank" rel="noopener noreferrer">CERT-FR CERTFR-2026-AVI-0537, 2026-05-06</a>). Unit 42 tracks active exploitation under campaign cluster CL-STA-1132 — assessed with medium confidence as likely state-sponsored — with first observed exploitation attempts on 2026-04-09 and successful compromise from mid-April, approximately three weeks before public disclosure (<a href="https://unit42.paloaltonetworks.com/captive-portal-zero-day/" target="_blank" rel="noopener noreferrer">Unit 42, 2026-05-06</a>). No patches are available until 2026-05-13 at the earliest for any PAN-OS branch (10.2.x, 11.1.x, 11.2.x, 12.1.x); patch releases are staged through 2026-05-28. Cloud NGFW and Prisma Access are not affected. Immediate workarounds: restrict the Authentication Portal to trusted internal IP ranges only; disable Response Pages on internet-facing interfaces; or disable the Captive Portal entirely if not operationally required. PAN-OS 11.1+ users should additionally enable Threat ID 510019. See § 5 for full technical deep dive.</p>
<p><strong>Why it matters to us:</strong> PAN-OS firewalls are pervasive across Swiss and European government, defence, and critical-infrastructure network perimeters. Full root RCE with no patch and a 2026-05-09 KEV deadline makes this the highest-priority response action of the week.</p>
<hr/>
<h3 id="cve-2024-57726-cve-2024-57728-simplehelp-rmm-ransomware-exploited-privilege-escalation-and-path-traversal-kev-deadline-2026-05-08-overdue">CVE-2024-57726 / CVE-2024-57728 — SimpleHelp RMM: Ransomware-Exploited Privilege Escalation and Path Traversal (KEV Deadline 2026-05-08 — Overdue)</h3>
<p>CISA added CVE-2024-57726 (CVSS 9.9, missing authorisation enabling a low-privileged technician to escalate to server administrator by generating excessive-permission API keys) and CVE-2024-57728 (CVSS 7.2, path traversal / zip-slip enabling administrator-level arbitrary file write and code execution) in SimpleHelp remote support software to the KEV catalog on 2026-04-24 with a federal remediation deadline of 2026-05-08 — now overdue for US federal agencies (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57726" target="_blank" rel="noopener noreferrer">NVD CVE-2024-57726</a>; <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57728" target="_blank" rel="noopener noreferrer">NVD CVE-2024-57728</a>; <a href="https://securityboulevard.com/2026/04/cisa-warns-of-multiple-simplehelp-vulnerabilities-exploited-in-attacks/" target="_blank" rel="noopener noreferrer">Security Boulevard, 2026-04-24</a>). DragonForce and Medusa ransomware-as-a-service operations have weaponised the chained exploit specifically targeting managed service providers: CVE-2024-57726 provides the privilege escalation on the SimpleHelp server, and CVE-2024-57728 achieves code execution via a crafted zip file upload — yielding simultaneous access to all managed client environments through the compromised RMM platform (<a href="https://windowsforum.com/threads/cisa-adds-4-kev-flaws-patch-samsung-magicinfo-simplehelp-d-link-dragonforce-ransomware-april-2026/" target="_blank" rel="noopener noreferrer">WindowsForum, 2026-04-24</a>). Fixed in SimpleHelp 5.5.8 and later.</p>
<p><strong>Why it matters to us:</strong> European public-sector entities frequently rely on MSPs using RMM tools; a single SimpleHelp server compromise cascades simultaneously into all managed client environments. MSP-targeting ransomware is active in European markets.</p>
<hr/>
<h3 id="cve-2024-7399-samsung-magicinfo-9-server-unauthenticated-file-write-mirai-botnet-exploitation-kev-deadline-2026-05-08-overdue">CVE-2024-7399 — Samsung MagicINFO 9 Server: Unauthenticated File Write, Mirai Botnet Exploitation (KEV Deadline 2026-05-08 — Overdue)</h3>
<p>CVE-2024-7399 (CVSS 9.8) is a path traversal vulnerability in Samsung MagicINFO 9 Server before version 21.1050.0 allowing unauthenticated remote attackers to write arbitrary files as SYSTEM authority (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7399" target="_blank" rel="noopener noreferrer">NVD CVE-2024-7399</a>). CISA added it to the KEV catalog on 2026-04-24 with a remediation deadline of 2026-05-08. Attackers are exploiting the flaw to upload and execute scripts that deploy Mirai botnet payloads, incorporating compromised devices into DDoS infrastructure (<a href="https://www.helpnetsecurity.com/2025/05/06/exploited-vulnerability-software-managing-samsung-digital-displays-cve-2024-7399/" target="_blank" rel="noopener noreferrer">Help Net Security, 2025-05-06</a>; <a href="https://windowsforum.com/threads/cisa-adds-4-kev-flaws-patch-samsung-magicinfo-simplehelp-d-link-dragonforce-ransomware-april-2026/" target="_blank" rel="noopener noreferrer">WindowsForum, 2026-04-24</a>). Samsung MagicINFO is deployed as digital signage management in public-sector facilities — airports, hospitals, government buildings, and transport hubs. Fixed in version 21.1050.0.</p>
<p><strong>Why it matters to us:</strong> MagicINFO deployment in public-sector buildings creates a beachhead for Mirai recruitment, lateral movement into facility networks, and DDoS participation. Any exposed instance should be treated as actively compromised pending patching.</p>
<hr/>
<h3 id="cve-2026-6023-cve-2026-6022-progress-telerik-ui-for-asp-net-ajax-deserialization-rce-cvss-9-8-cert-fr-advisory-single-source-national-cert">CVE-2026-6023 / CVE-2026-6022 — Progress Telerik UI for ASP.NET AJAX: Deserialization RCE (CVSS 9.8) — CERT-FR Advisory [SINGLE-SOURCE-NATIONAL-CERT]</h3>
<p>CERT-FR issued advisory CERTFR-2026-AVI-0542 on 2026-05-06 covering two vulnerabilities in Progress Telerik UI for ASP.NET AJAX versions prior to 2026.1.421 (<a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0542/" target="_blank" rel="noopener noreferrer">CERT-FR, 2026-05-06</a>). CVE-2026-6023 (CVSS 9.8) is an insecure deserialization flaw in the RadFilter control enabling remote code execution via crafted client-supplied filter state. CVE-2026-6022 (CVSS 7.5) is an uncontrolled resource consumption flaw in RadAsyncUpload enabling disk exhaustion via chunked upload bypassing file-size limits. Telerik UI for ASP.NET AJAX has a documented history of deserialization vulnerabilities exploited in EU government and healthcare web applications; CVE-2026-6023 recapitulates a well-known attacker pattern. No confirmed active exploitation as of 2026-05-07. Fix available in version 2026.1.421. [SINGLE-SOURCE-NATIONAL-CERT]</p>
<p><strong>Why it matters to us:</strong> Telerik ASP.NET AJAX is embedded in government-facing web portals across EU member states; a new deserialization RCE in this product class warrants emergency patch prioritisation given historical exploitation precedent.</p>
<hr/>
<h3 id="cve-2026-23926-cve-2026-23927-cve-2026-23928-zabbix-xss-and-data-confidentiality-flaws-cert-fr-advisory-single-source-national-cert">CVE-2026-23926 / CVE-2026-23927 / CVE-2026-23928 — Zabbix: XSS and Data Confidentiality Flaws — CERT-FR Advisory [SINGLE-SOURCE-NATIONAL-CERT]</h3>
<p>CERT-FR issued advisory CERTFR-2026-AVI-0541 on 2026-05-06 covering three vulnerabilities in Zabbix monitoring platform versions 6.0.x prior to 6.0.45, 7.0.x prior to 7.0.24, and 7.4.x prior to 7.4.8 (<a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0541/" target="_blank" rel="noopener noreferrer">CERT-FR, 2026-05-06</a>). CVE-2026-23926, CVE-2026-23927, and CVE-2026-23928 cover cross-site scripting injection and data confidentiality violations. XSS in monitoring platforms creates session-hijacking risk and potential lateral movement from compromised SOC dashboards. No confirmed active exploitation. Patches available in the fixed versions above. [SINGLE-SOURCE-NATIONAL-CERT]</p>
<p><strong>Why it matters to us:</strong> Zabbix is a primary IT monitoring platform in EU public-sector and SOC environments; XSS vulnerabilities in monitoring infrastructure are high-value pivot points for any attacker with a foothold in a monitored environment.</p>
<hr/>
<h3 id="trending-vulnerabilities">Trending Vulnerabilities</h3>
<div class="table-wrap"><table>
<thead><tr>
<th style="text-align:left">CVE</th>
<th style="text-align:left">Product</th>
<th style="text-align:left">CVSS</th>
<th style="text-align:left">EPSS</th>
<th style="text-align:left">KEV</th>
<th style="text-align:left">Exploited</th>
<th style="text-align:left">Patch</th>
<th style="text-align:left">Source</th>
</tr></thead><tbody>
<tr>
<td style="text-align:left">CVE-2026-0300</td>
<td style="text-align:left">Palo Alto PAN-OS (PA-Series, VM-Series)</td>
<td style="text-align:left">9.3 CRIT</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">Yes — deadline 2026-05-09</td>
<td style="text-align:left">Yes (limited ITW, cluster CL-STA-1132)</td>
<td style="text-align:left">No (2026-05-13 earliest)</td>
<td style="text-align:left"><a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto</a> / <a href="https://cert.europa.eu/publications/security-advisories/2026-006/" target="_blank" rel="noopener noreferrer">CERT-EU 2026-006</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2024-57726</td>
<td style="text-align:left">SimpleHelp RMM ≤5.5.7</td>
<td style="text-align:left">9.9 CRIT</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">Yes — deadline 2026-05-08 (overdue)</td>
<td style="text-align:left">Yes — DragonForce / Medusa ransomware</td>
<td style="text-align:left">Yes (5.5.8+)</td>
<td style="text-align:left"><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57726" target="_blank" rel="noopener noreferrer">NVD</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2024-57728</td>
<td style="text-align:left">SimpleHelp RMM ≤5.5.7</td>
<td style="text-align:left">7.2 HIGH</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">Yes — deadline 2026-05-08 (overdue)</td>
<td style="text-align:left">Yes — chained with CVE-2024-57726</td>
<td style="text-align:left">Yes (5.5.8+)</td>
<td style="text-align:left"><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57728" target="_blank" rel="noopener noreferrer">NVD</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2024-7399</td>
<td style="text-align:left">Samsung MagicINFO 9 Server &lt;21.1050</td>
<td style="text-align:left">9.8 CRIT</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">Yes — deadline 2026-05-08 (overdue)</td>
<td style="text-align:left">Yes — Mirai botnet deployment confirmed</td>
<td style="text-align:left">Yes (21.1050.0+)</td>
<td style="text-align:left"><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7399" target="_blank" rel="noopener noreferrer">NVD</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-6023</td>
<td style="text-align:left">Progress Telerik UI ASP.NET AJAX &lt;2026.1.421</td>
<td style="text-align:left">9.8 CRIT</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">Not confirmed</td>
<td style="text-align:left">Yes (2026.1.421)</td>
<td style="text-align:left"><a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0542/" target="_blank" rel="noopener noreferrer">CERT-FR</a> / <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6023" target="_blank" rel="noopener noreferrer">NVD</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-6022</td>
<td style="text-align:left">Progress Telerik UI ASP.NET AJAX &lt;2026.1.421</td>
<td style="text-align:left">7.5 HIGH</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">Not confirmed</td>
<td style="text-align:left">Yes (2026.1.421)</td>
<td style="text-align:left"><a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0542/" target="_blank" rel="noopener noreferrer">CERT-FR</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-23926/27/28</td>
<td style="text-align:left">Zabbix 6.0.x/7.0.x/7.4.x (see text)</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">Not confirmed</td>
<td style="text-align:left">Yes (6.0.45, 7.0.24, 7.4.8)</td>
<td style="text-align:left"><a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0541/" target="_blank" rel="noopener noreferrer">CERT-FR</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-33725</td>
<td style="text-align:left">Metabase Enterprise 1.47–1.59.3</td>
<td style="text-align:left">7.2 HIGH</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">Not confirmed (PoC public)</td>
<td style="text-align:left">Yes (1.54.22+, see vendor)</td>
<td style="text-align:left"><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33725" target="_blank" rel="noopener noreferrer">NVD</a></td>
</tr>
</tbody></table></div>
<p><strong>Row notes:</strong></p>
<p><strong>CVE-2026-0300:</strong> No patch available for any PAN-OS branch through 2026-05-12. If the Authentication Portal cannot be disabled immediately, restrict it to trusted internal IP ranges. CERT-EU Critical designation is rare and reflects the urgency.</p>
<p><strong>CVE-2024-57726/57728:</strong> KEV deadline overdue. The attack chain is particularly dangerous for MSPs — a single server compromise yields access to all managed client environments simultaneously. European MSPs and public-sector clients should treat this as an emergency patch or remove SimpleHelp.</p>
<p><strong>CVE-2024-7399:</strong> KEV deadline overdue. MagicINFO instances in public-sector facility networks should be isolated and patched or taken offline pending patching.</p>
<p><strong>CVE-2026-33725:</strong> Requires administrator credentials to exploit, but a public Python PoC is available from Hakai Security researcher Diego Tellaroli. Audit Metabase Enterprise deployments in analytics and business intelligence contexts. [SINGLE-SOURCE-OTHER]</p>
<p><em>EPSS scores not retrieved — CISA.gov direct access returned HTTP 403 for a second consecutive day; see § 7.</em></p>
<h2 id="2-switzerland-europe-public-sector">2. Switzerland, Europe &amp; Public Sector</h2>
<h3 id="europol-operated-undisclosed-data-systems-outside-eu-oversight-for-over-a-decade-pressure-cooker-and-cfn-exposed">Europol Operated Undisclosed Data Systems Outside EU Oversight for Over a Decade — &quot;Pressure Cooker&quot; and CFN Exposed</h3>
<p>A joint investigation by Correctiv (Germany), Solomon (Greece), and Computer Weekly published on 2026-05-05 reveals that Europol operated at least two undisclosed data-processing platforms — the Computer Forensic Network (CFN) established in 2012, and a system referred to internally as &quot;Pressure Cooker&quot; used by the Internet Referral Unit — handling at least two petabytes of operational data (roughly 420 times the size of Europol&#39;s formal operational database) entirely outside standard EU data-protection oversight for over a decade (<a href="https://correctiv.org/en/europe/2026/05/05/they-protect-the-law-while-breaking-it-inside-europols-shadow-it-system/" target="_blank" rel="noopener noreferrer">Correctiv, 2026-05-05</a>; <a href="https://www.computerweekly.com/news/366642525/They-protect-the-law-while-breaking-it-Inside-Europols-shadow-IT-system" target="_blank" rel="noopener noreferrer">Computer Weekly, 2026-05-05</a>; <a href="https://www.heise.de/news/Pressure-Cooker-Europols-geheime-Datenverarbeitung-ohne-Aufsicht-11283466.html" target="_blank" rel="noopener noreferrer">heise Security — &quot;Pressure Cooker: Europols geheime Datenverarbeitung ohne Aufsicht&quot; (&quot;Europol&#39;s secret data processing without oversight&quot;), 2026-05-06</a>). The CFN held phone records, identity documents, geolocation data, financial records, travel data, and FBI-provided datasets including data on individuals who are not criminal suspects. A 2019 internal security assessment identified 32 control deficiencies: ineffective role assignment, absent administrative usage logs, insufficient event logging and monitoring, and inability to track data access or detect unauthorised modifications. Europol&#39;s data protection officer warned in February 2019 that &quot;99% of Europol&#39;s operational data&quot; resided in non-compliant systems. Former Executive Director Catherine De Bolle formally notified the EU Data Protection Supervisor (EDPS) on 2026-04-01; the EDPS closed its monitoring in February 2026 with 15 of 150 remediation recommendations still unimplemented.</p>
<p><strong>CH/EU nexus:</strong> Direct — Europol is an EU institution; EDPS oversight is EU-wide; data sharing implications extend to all EU member-state police and intelligence services. <strong>Defender takeaway:</strong> Large-scale shadow IT environments inevitably lack the access logging, incident detection, and audit trails that breach response requires. For public-sector data managers, this case models the governance consequences of data processing that outgrows its oversight framework — a risk applicable to any agency whose data estate has expanded through digitalisation programmes.</p>
<hr/>
<h3 id="enisa-onboards-four-new-european-cnas-under-eu-vulnerability-coordination-root-single-source-national-cert">ENISA Onboards Four New European CNAs Under EU Vulnerability Coordination Root [SINGLE-SOURCE-NATIONAL-CERT]</h3>
<p>ENISA announced on 2026-05-06 that four organisations have joined the CVE Programme as CVE Numbering Authorities (CNAs) under ENISA Root, and that seven additional European CNAs have migrated from MITRE Root to ENISA Root (<a href="https://www.enisa.europa.eu/news/new-cve-numbering-authorities-under-enisa-root" target="_blank" rel="noopener noreferrer">ENISA, 2026-05-06</a>). ENISA was designated as a CVE Root in November 2025, establishing a European coordination tier alongside CISA (USA), JPCERT/CC (Japan), MITRE, and Google in the global CVE governance hierarchy. Approximately 90 European organisations remain eligible for voluntary transfer — nearly one-fifth of the global CNA population. The development directly affects how European technology vendors and public-sector organisations assign CVE identifiers, potentially reducing dependency on US-based MITRE coordination and improving timeliness of EU-sourced vulnerability disclosures. The Cybersecurity Act 2 proposes further expansion of ENISA&#39;s vulnerability management capacity. [SINGLE-SOURCE-NATIONAL-CERT]</p>
<p><strong>CH/EU nexus:</strong> Direct — EU-wide vulnerability governance infrastructure change affecting Swiss and all European CNA registrants and their disclosure pipelines.</p>
<hr/>
<h3 id="germany-dominant-european-ransomware-target-safepay-qilin-and-sarcoma-drive-92-surge-in-2025-activity-continues-into-2026-single-source-other">Germany Dominant European Ransomware Target: SAFEPAY, Qilin, and Sarcoma Drive 92% Surge in 2025 — Activity Continues into 2026 [SINGLE-SOURCE-OTHER]</h3>
<p>Google Threat Intelligence Group published detailed analysis on 2026-04-15 documenting Germany as the primary European ransomware target in 2025 (<a href="https://cloud.google.com/blog/topics/threat-intelligence/europe-data-leak-landscape" target="_blank" rel="noopener noreferrer">Google Cloud / Mandiant GTIG, 2026-04-15</a>). Three operators drive the picture: SAFEPAY accounting for 25% of German data-leak-site posts (76 claimed victims in 2025), Qilin tripling operational tempo in Germany during Q3 2025 with 13 additional German victims already posted by early 2026, and Sarcoma actively recruiting access to German networks via criminal forums since November 2024. Legal and professional services grew significantly as a targeted sector (14% of victims) — exploited for client intellectual property and M&amp;A intelligence as leverage against those firms&#39; own clients, creating downstream risk for any organisation engaging such a service provider. Critically, 96% of German ransomware victims are organisations with fewer than 5,000 employees — exploited both directly and as supply-chain footholds into larger enterprises and government contractors. GTIG attributes part of the shift to AI-enabled high-quality localisation that erodes the language-barrier protection that historically benefited non-English-speaking markets. [SINGLE-SOURCE-OTHER] <em>Published 2026-04-15 — outside the standard recency window; included as first coverage for this brief series given direct relevance to the EU public-sector audience.</em></p>
<p><strong>CH/EU nexus:</strong> Direct — Germany, DACH region, and EU supply chains. Swiss and EU public-sector procurement officers should note that professional and legal services firms serving government clients are explicitly in scope for these operators.</p>
<h2 id="3-notable-incidents-disclosures">3. Notable Incidents &amp; Disclosures</h2>
<p><strong>DAEMON Tools Supply Chain Compromise — Signed Installers Distributed China-Nexus QUIC Backdoor for Four Weeks; EU Governments Among Victims.</strong> Kaspersky GReAT disclosed on 2026-05-05 that official DAEMON Tools Lite Windows installers (versions 12.5.0.2421 through 12.5.0.2434) were trojanised on the vendor&#39;s distribution server from 8 April to 5 May 2026, with all malicious installers maintaining the authentic Disc Soft (AVB Disc Soft) code-signing certificate — bypassing certificate-based trust validation (<a href="https://securelist.com/tr/daemon-tools-backdoor/119654/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist, 2026-05-05</a>; <a href="https://www.kaspersky.com/about/press-releases/kaspersky-identifies-ongoing-supply-chain-attack-on-official-daemon-tools-website-distributing-backdoor-malware" target="_blank" rel="noopener noreferrer">Kaspersky press release, 2026-05-05</a>). The attack deployed three stages: a .NET information collector for host fingerprinting deployed broadly across all infections; then a shellcode-based backdoor and QUIC RAT — a highly capable C++ implant supporting HTTP, UDP, TCP, WebSocket, QUIC, and HTTP/3 C2 channels — selectively deployed to approximately twelve specifically chosen targets in government, scientific, manufacturing, and retail sectors (<a href="https://therecord.media/hackers-compromise-daemon-tools-global-supply-chain-attack" target="_blank" rel="noopener noreferrer">The Record, 2026-05-06</a>; <a href="https://www.bleepingcomputer.com/news/security/daemon-tools-trojanized-in-supply-chain-attack-to-deploy-backdoor/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-06</a>). The campaign reached over 100 countries; Germany, France, and Italy appear explicitly in victim telemetry. Chinese-language strings in the information collector suggest a Chinese-speaking threat actor; no formal attribution to a named group has been made. Disc Soft acknowledged the breach on 2026-05-05, released a clean version (12.6.0.2445 and later), and resolved the distribution compromise within 12 hours of identification. The C2 infrastructure used a domain typosquatting the legitimate vendor name — registering it on 2026-03-27 approximately two weeks before the first trojanised installer (2026-04-08), confirming pre-planned operation. <strong>Defender takeaway:</strong> Audit software inventory for DAEMON Tools Lite versions 12.5.0.2421–12.5.0.2434 installed on any government, scientific, or manufacturing endpoint since 8 April 2026; treat any such installation as potentially compromised and initiate forensic review of network behaviour during the April–May exposure window.</p>
<hr/>
<p><strong>ChipSoft (Netherlands) Healthcare Software — Embargo Ransomware Identified; 66 Dutch DPA Notifications Filed; Attacker Claims Data Destroyed [EU Nexus].</strong> The ransomware group responsible for the 7 April 2026 attack on ChipSoft — a Dutch vendor whose HiX platform manages patient records for approximately 70–80% of Dutch hospitals — has been identified as Embargo, a group that claimed to have exfiltrated 100 GB of patient data and threatened publication (<a href="https://therecord.media/chipsoft-ransomware-attack-disrupts-dutch-hospitals" target="_blank" rel="noopener noreferrer">The Record, 2026-04-08</a>; <a href="https://nltimes.nl/2026/04/29/chipsoft-hackers-destroyed-stolen-patient-data-leaks" target="_blank" rel="noopener noreferrer">NL Times, 2026-04-29</a>; <a href="https://www.dutchnews.nl/2026/04/chipsoft-says-stolen-patient-data-has-been-destroyed/" target="_blank" rel="noopener noreferrer">DutchNews.nl, 2026-04-29</a>). On 28–29 April 2026, ChipSoft stated that the data collected during the attack had been destroyed, asserting &quot;technically correct&quot; confirmation — language security experts noted strongly implies a ransom was paid, though ChipSoft has not confirmed this. The Dutch Data Protection Authority (Autoriteit Persoonsgegevens) received 66 breach notifications in connection with the incident. Affected data included patient medical records from family doctors, rehabilitation clinics, and the Rotterdam Eye Hospital using ChipSoft&#39;s cloud-hosted HiX 365 platform. <strong>Defender takeaway:</strong> Ransomware operators&#39; claims of data destruction are inherently unverifiable even with purported technical proof; healthcare organisations must maintain regulatory notification obligations and long-term breach-response posture regardless of attacker assurances — GDPR exposure does not expire when the attacker claims to have deleted their copy.</p>
<hr/>
<p><strong>Vimeo Data Breach via Anodot Third-Party SaaS Integration — 119,200 Accounts Exposed.</strong> Vimeo disclosed on 2026-04-27 that an unauthorised party accessed its Snowflake and BigQuery cloud data environments using compromised authentication tokens belonging to Anodot, a data analytics vendor integrated with Vimeo&#39;s infrastructure (<a href="https://vimeo.com/blog/post/anodot-third-party-security-incident" target="_blank" rel="noopener noreferrer">Vimeo official blog, 2026-04-27</a>; <a href="https://www.bleepingcomputer.com/news/security/video-service-vimeo-confirms-anodot-breach-exposed-user-data/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-06</a>; <a href="https://www.theregister.com/2026/05/05/shinyhunters_dump_puts_119k_vimeo/" target="_blank" rel="noopener noreferrer">The Register, 2026-05-05</a>). The attackers obtained Anodot credentials via a compromise of Anodot&#39;s own environment and used those tokens to read Vimeo-specific cloud storage without requiring privilege escalation within Vimeo&#39;s infrastructure — a third-party-to-cloud-data-warehouse pivot requiring no direct attack on Vimeo systems. 119,200 email addresses with associated names and metadata were exposed; no passwords, payment data, or video content was accessed. ShinyHunters claimed responsibility and published the data after Vimeo declined to pay extortion; Vimeo confirmed the breach but did not formally attribute to a named group. <strong>Defender takeaway:</strong> Third-party analytics and monitoring integrations holding broad read permissions to cloud data warehouses (Snowflake, BigQuery) are a supply-chain attack surface frequently missed in standard vendor assessments; enforce least-privilege, time-limited, per-vendor credential isolation so a single SaaS vendor compromise cannot traverse your cloud data estate.</p>
<h2 id="4-research-investigative-reporting">4. Research &amp; Investigative Reporting</h2>
<p><strong>Annual report — Mandiant M-Trends 2026.</strong> Google Cloud / Mandiant Threat Intelligence Group published M-Trends 2026 on 2026-03-23, the annual review of attacker behaviour observed across Mandiant-led incident responses globally in 2025 (<a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026" target="_blank" rel="noopener noreferrer">Google Cloud / Mandiant, 2026-03-23</a>). <em>Published 2026-03-23 — well outside the standard recency window; included here as first and only treatment for this brief series.</em> Key findings directly applicable to Swiss and European public-sector defenders: global median dwell time increased to 14 days (from 11 in 2024), with espionage-focused intrusions averaging 122-day median dwell — confirming that persistent access operations remain the principal mode for state-sponsored actors and that detection timelines must be extended accordingly; voice phishing surged to the second most prevalent initial-access vector at 11% (overtaking email phishing at 6%), driven by IT help-desk impersonation and SaaS OAuth token theft — a pattern directly evidenced in the ADT breach (covered 2026-05-06) and in AiTM campaigns; prior compromise as ransomware initial access doubled to 30% of cases (from 15%), indicating access brokers are increasingly serving as the ransomware initial-access layer with compressed handoff timelines; edge-device persistence — VPNs, routers, and network appliances without EDR coverage — remains the dominant initial-access technique for state-sponsored espionage; BRICKSTORM backdoor on network appliances achieved approximately 400-day median dwell in documented cases; zero-day exploitation continues to accelerate, with some product classes seeing exploitation begin before patch release. <em>Logged as annual-report:mtrends-2026; not to be re-summarised in subsequent briefs. Specific findings may be cited as context with the original link.</em></p>
<hr/>
<p><strong>QLNX (Quasar Linux) — Developer-Targeting Linux RAT with eBPF Rootkit, PAM Backdoor, and Supply-Chain Credential Harvesting.</strong> Trend Micro researchers published analysis on 2026-05-04 of QLNX, a previously undocumented Linux RAT with a detection rate of four AV vendors at time of publication, specifically targeting software developer environments to harvest credentials enabling downstream supply-chain compromise (<a href="https://www.trendmicro.com/en_us/research/26/e/quasar-linux-qlnx-a-silent-foothold-in-the-software-supply-chain.html" target="_blank" rel="noopener noreferrer">Trend Micro Research, 2026-05-04</a>; <a href="https://www.bleepingcomputer.com/news/security/new-stealthy-quasar-linux-malware-targets-software-developers/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-05</a>; <a href="https://www.securityweek.com/sophisticated-quasar-linux-rat-targets-software-developers/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-04</a>). QLNX executes fileless from memory and deletes its binary on launch. It dynamically compiles a userspace LD_PRELOAD rootkit (hooking <code>readdir</code>, <code>stat</code>, <code>open</code>, and <code>fopen</code> to hide files, processes, and network ports) and an eBPF kernel rootkit directly on the victim host using the installed <code>gcc</code> compiler — requiring no pre-compiled kernel module and bypassing rootkit-detection approaches that rely on known module signatures. A PAM backdoor module intercepts authentication attempts to log all plaintext credentials. QLNX harvests developer-specific credentials at scale: npm tokens, PyPI credentials, GitHub/Git tokens, AWS/Kubernetes/Docker/Terraform configurations, and <code>.env</code> files — a credential profile explicitly oriented toward enabling downstream software supply-chain compromise. The attack surface extends to any EU public-sector development environment that builds software, runs CI/CD pipelines, or manages cloud infrastructure from Linux workstations.</p>
<hr/>
<p><strong>OceanLotus (APT32) — Year-Long PyPI Supply Chain Attack Delivers ZiChatBot via Zulip API C2 [SINGLE-SOURCE-OTHER].</strong> Kaspersky GReAT disclosed on 2026-05-06 a PyPI supply chain attack attributed with medium confidence to OceanLotus (APT32, Vietnam-nexus) running since July 2025 via three malicious wheel packages — <code>uuid32-utils</code>, <code>colorinal</code>, and <code>termncolor</code> — with functional facades concealing dropper payloads delivering ZiChatBot, a previously undocumented malware family using the legitimate Zulip collaboration platform&#39;s public REST API for C2 (<a href="https://securelist.com/oceanlotus-suspected-pypi-zichatbot-campaign/119603/" target="_blank" rel="noopener noreferrer">Kaspersky Securelist, 2026-05-06</a>). Attribution rests on 64% algorithmic similarity between ZiChatBot&#39;s dropper and a previously documented OceanLotus dropper. Using a legitimate SaaS platform&#39;s API for C2 significantly complicates network-based detection: Zulip traffic blends with normal collaboration traffic and is encrypted in transit. The packages were removed from PyPI after disclosure. Defenders should audit pip install logs and compare installed package metadata against the PyPI index for entries not matching expected provenance. [SINGLE-SOURCE-OTHER]</p>
<hr/>
<p><strong>Cisco Talos: CloudZ RAT with Pheno Plugin Intercepts SMS OTP via Microsoft Phone Link [SINGLE-SOURCE-OTHER].</strong> Cisco Talos published analysis on 2026-05-05 of a campaign deploying CloudZ, a modular .NET RAT active since January 2026, alongside Pheno, a previously undocumented plugin that abuses the Microsoft Phone Link application to intercept SMS messages and authenticator notifications without deploying mobile malware (<a href="https://blog.talosintelligence.com/cloudz-pheno-infostealer/" target="_blank" rel="noopener noreferrer">Cisco Talos, 2026-05-05</a>). Pheno scans running processes for Phone Link instances, then exfiltrates the synchronised SQLite database from the victim&#39;s paired Android device — obtaining real-time OTP codes and 2FA challenge responses from the Windows endpoint. This technique defeats SMS-based MFA without SIM swapping, relying instead on post-compromise access to the desktop Phone Link database. Government entities relying on SMS OTP for access to administrative portals or privileged systems face direct exposure. CloudZ used ConfuserEx obfuscation; Talos identified no specific geographic or sector targeting. [SINGLE-SOURCE-OTHER]</p>
<hr/>
<p><strong>InstallFix Campaign — Malvertised Fake AI Tool Installation Pages Deliver Amatera Infostealer; Netherlands Government Sector Targeted.</strong> Trend Micro published updated analysis on 2026-05-05 of the InstallFix campaign, active since March 2026, which distributes the Amatera infostealer via malvertised Google Ads targeting users searching for AI coding tool installation instructions (<a href="https://www.trendmicro.com/en_us/research/26/e/installfix-and-claude-code.html" target="_blank" rel="noopener noreferrer">Trend Micro Research, 2026-05-05</a>; <a href="https://pushsecurity.com/blog/installfix" target="_blank" rel="noopener noreferrer">Push Security, 2026-05</a>; <a href="https://www.malwarebytes.com/blog/news/2026/03/fake-claude-code-install-pages-hit-windows-and-mac-users-with-infostealers" target="_blank" rel="noopener noreferrer">Malwarebytes, 2026-03</a>). Victims are directed to OS-specific fake installation pages where commands trigger <code>mshta.exe</code> to download a polyglot ZIP/HTA file; embedded VBScript executes obfuscated PowerShell via runtime variable-splitting to defeat simple string-based detection, followed by AMSI bypass via RC4-decrypted strings and Amatera payload deployment. Amatera harvests browser-saved credentials, session cookies, e-wallet data, and system information. Targeted geographies include Europe with the Netherlands confirmed; government sector is explicitly listed in Trend Micro victim telemetry. Developer and IT-operations staff installing AI tooling via web search are the primary risk group.</p>
<hr/>
<p><strong>Dragos: AI-Assisted Attack on Municipal Water Utility — LLM Generates 17,000-Line OT Attack Framework [SINGLE-SOURCE-OTHER].</strong> Dragos documented on 2026-05-06 an intrusion in which an unattributed threat actor used commercial AI models to attempt an attack on a Mexican municipal water utility (<a href="https://www.dragos.com/blog/ai-assisted-ics-attack-water-utility/" target="_blank" rel="noopener noreferrer">Dragos, 2026-05-06</a>). The adversary generated a 17,000-line Python framework comprising 49 offensive security modules — compressing what Dragos assessed would traditionally take days or weeks of tooling development into hours. After achieving initial access to the enterprise IT network in January 2026, the AI model autonomously performed discovery, independently identified the strategic significance of an exposed industrial gateway and SCADA/IIoT management platform (accessible via a single shared password), and executed a large automated credential spray using combined default and victim-specific credential lists. The attempted pivot into the OT network failed; no OT compromise was confirmed. The attack relied entirely on credential abuse and IT-to-OT network exposure rather than ICS-specific exploits. Dragos notes that AI tooling is progressively reducing the technical bar for OT-targeting attacks, making prevention-only OT security strategies inadequate as primary defences. Swiss and EU water, energy, and utility operators should review IT-OT network segmentation and authentication posture on industrial gateway and SCADA management interfaces as a direct action from this disclosure. [SINGLE-SOURCE-OTHER]</p>
<h2 id="5-deep-dive-cve-2026-0300-pan-os-captive-portal-unauthenticated-root-rce">5. Deep Dive — CVE-2026-0300: PAN-OS Captive Portal Unauthenticated Root RCE</h2>
<p><em>Selection rationale: Active in-the-wild exploitation confirmed; CISA KEV with a 2026-05-09 deadline — 2 days from today; CERT-EU Critical Advisory 2026-006 issued; no patches available for any PAN-OS branch; widespread deployment of Palo Alto firewalls in Swiss and European public-sector network perimeters. First disclosed 2026-05-05/06 — no Background paragraph applicable (under 6 months old).</em></p>
<h3 id="incident-narrative">Incident Narrative</h3>
<p>CVE-2026-0300 was publicly disclosed by Palo Alto Networks on 2026-05-06 via a vendor security advisory (<a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks Security Advisory, 2026-05-06</a>) and a Unit 42 primary research post documenting observed exploitation (<a href="https://unit42.paloaltonetworks.com/captive-portal-zero-day/" target="_blank" rel="noopener noreferrer">Unit 42, 2026-05-06</a>). CERT-EU issued Critical Advisory 2026-006 on the same date specifically for EU institution and member-state defenders (<a href="https://cert.europa.eu/publications/security-advisories/2026-006/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-006, 2026-05-06</a>). CERT-FR issued advisory CERTFR-2026-AVI-0537 (<a href="https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0537/" target="_blank" rel="noopener noreferrer">CERT-FR, 2026-05-06</a>). CISA added CVE-2026-0300 to the KEV catalog on 2026-05-06 with a federal remediation deadline of 2026-05-09 — among the shortest KEV deadlines in recent history, reflecting active exploitation severity.</p>
<p>Unit 42 tracks active exploitation under campaign cluster <strong>CL-STA-1132</strong>, attributed with medium confidence to a likely state-sponsored actor. First observed exploitation attempts: 2026-04-09. Successful compromise achieved: mid-April 2026. That timeline places exploitation approximately three weeks ahead of public disclosure, meaning organisations with internet-exposed portals may already be compromised and should treat retrospective log review as urgent.</p>
<h3 id="vulnerability-mechanics">Vulnerability Mechanics</h3>
<p>The vulnerability is an out-of-bounds write (stack-based buffer overflow, CWE-121) in the service handling the PAN-OS User-ID Authentication Portal (Captive Portal) component. When the Authentication Portal is enabled and reachable from an untrusted network, a specially crafted packet corrupts adjacent stack memory, enabling control-flow redirection and arbitrary code execution with root privileges — with no authentication required. The CVSS score is 9.3 when the portal is internet-exposed and 8.7 when restricted to trusted internal networks (<a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks Security Advisory</a>).</p>
<p>Affected products: PA-Series and VM-Series firewalls running PAN-OS 10.2.x, 11.1.x, 11.2.x, and 12.1.x where the User-ID Authentication Portal (Captive Portal) is enabled and network-accessible. Cloud NGFW and Prisma Access are not affected.</p>
<h3 id="post-exploitation-activity-cl-sta-1132">Post-Exploitation Activity — CL-STA-1132</h3>
<p>Per Unit 42 findings, post-compromise activity from CL-STA-1132 includes (<a href="https://unit42.paloaltonetworks.com/captive-portal-zero-day/" target="_blank" rel="noopener noreferrer">Unit 42, 2026-05-06</a>):</p>
<ul><li><strong>Shellcode injection into running <code>nginx</code> worker processes</strong> for durable in-memory persistence that survives most detection tuned to new-process spawning events.</li><li><strong>Credential theft</strong> from PAN-OS stored credential stores and laterally accessible Active Directory credential caches on reachable domain controllers.</li><li><strong>Deployment of open-source tunnelling utilities</strong> (EarthWorm, ReverseSocks5) for encrypted egress and pivot-point establishment into the internal network.</li><li><strong>Active Directory enumeration</strong> to map internal network topology and identify high-value targets reachable from the compromised perimeter device.</li></ul>
<p>This post-exploitation profile is consistent with espionage-motivated initial access operations: the objective is establishing persistent, low-noise egress capability from the network perimeter rather than immediate destructive action. The exploitation timeline — beginning before patch availability — and the tradecraft indicate an actor with prior intelligence on the vulnerability.</p>
<h3 id="att-ck-technique-mapping">ATT&amp;CK Technique Mapping</h3>
<ul><li><strong><a href="https://attack.mitre.org/techniques/T1190/" target="_blank" rel="noopener noreferrer">T1190 — Exploit Public-Facing Application</a>:</strong> Core exploitation path — a network-accessible service (Captive Portal) is exploited unauthenticated to achieve root code execution. Detection focus: anomalous traffic volumes or malformed requests to the Authentication Portal service from untrusted source ranges; alert on portal requests from scanning-pattern addresses.</li><li><strong><a href="https://attack.mitre.org/techniques/T1055/" target="_blank" rel="noopener noreferrer">T1055 — Process Injection</a>:</strong> Post-exploitation shellcode injection into <code>nginx</code> worker processes for persistence and defence evasion. Detection focus: unexpected child processes spawned from nginx, unexpected outbound connections originating from nginx processes, memory-anomaly telemetry from EDR on the firewall&#39;s management plane where instrumentation is available.</li><li><strong><a href="https://attack.mitre.org/techniques/T1003/" target="_blank" rel="noopener noreferrer">T1003 — OS Credential Dumping</a>:</strong> Credential theft from PAN-OS credential stores post-compromise. Detection focus: access to PAN-OS credential database files outside normal administrative process trees; review all authentication events originating from the firewall management IP after any suspected compromise.</li><li><strong><a href="https://attack.mitre.org/techniques/T1572/" target="_blank" rel="noopener noreferrer">T1572 — Protocol Tunneling</a>:</strong> EarthWorm and ReverseSocks5 used to establish encrypted egress channels. Detection focus: unusual outbound connections from firewall management interfaces to external addresses on non-standard ports; SOCKS proxy traffic patterns on perimeter egress monitoring.</li><li><strong><a href="https://attack.mitre.org/techniques/T1018/" target="_blank" rel="noopener noreferrer">T1018 — Remote System Discovery</a>:</strong> Active Directory enumeration post-compromise. Detection focus: LDAP query volume and type spikes from unexpected source hosts in SIEM; DCE/RPC enumeration events originating from the firewall management network segment.</li></ul>
<h3 id="detection-concepts">Detection Concepts</h3>
<p>Consult <a href="https://unit42.paloaltonetworks.com/captive-portal-zero-day/" target="_blank" rel="noopener noreferrer">Unit 42&#39;s primary analysis</a> and <a href="https://cert.europa.eu/publications/security-advisories/2026-006/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-006</a> for current detection guidance. Key conceptual targets:</p>
<ol><li><strong>Captive Portal request anomalies.</strong> Alert on anomalous request patterns to the User-ID Authentication Portal service — malformed packet structures, oversized fields, unusually high request rates from single source addresses, or requests from known scanning infrastructure. These are pre-exploitation signals detectable before compromise.</li><li><strong>Nginx process behaviour anomalies.</strong> On affected firewalls, monitor for unexpected child processes spawned from nginx worker processes, outbound connections from nginx, or unexpected file system writes attributed to nginx — these are post-exploitation signals from CL-STA-1132&#39;s in-memory persistence mechanism.</li><li><strong>Management-plane outbound connections.</strong> Alert on any outbound connections from the firewall&#39;s management IP to external addresses, particularly on non-standard ports. Legitimate PAN-OS management traffic is well-characterised and should map to a small known allowlist; unexpected destinations are high-fidelity post-compromise signals.</li><li><strong>Enable Threat ID 510019.</strong> PAN-OS 11.1 and higher users should enable this Threat ID for detection and blocking of known exploit patterns (<a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">Palo Alto Networks Security Advisory</a>).</li><li><strong>Retrospective log review.</strong> Exploitation has been ongoing since at least 2026-04-09. For any firewall with an internet-exposed Captive Portal, review authentication portal logs from mid-April onwards for anomalous traffic that may indicate prior compromise.</li></ol>
<h3 id="hardening-and-mitigation">Hardening and Mitigation</h3>
<p>Per Palo Alto Networks, CERT-EU, and CERT-FR:</p>
<ol><li><strong>Immediate workaround — restrict portal to trusted networks only.</strong> If the Authentication Portal is operationally required, restrict its network accessibility to trusted internal IP ranges via security policy. An internet-exposed portal restricted to internal networks is no longer externally exploitable. This is the highest-priority action for any environment where patching cannot be completed before 2026-05-13.</li></ol>
<ol><li><strong>Disable the Authentication Portal entirely if not in use.</strong> For firewalls where User-ID Captive Portal is not operationally deployed, disable it immediately. This eliminates the attack surface completely and is the fastest mitigation available.</li></ol>
<ol><li><strong>Disable Response Pages on internet-facing interfaces.</strong> A partial mitigation: disabling Response Pages on untrusted interfaces removes a specific code path. Apply in combination with network restriction, not as a standalone control.</li></ol>
<ol><li><strong>Apply patches as they become available.</strong> Palo Alto Networks has staged releases beginning 2026-05-13. Monitor the <a href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank" rel="noopener noreferrer">vendor advisory</a> for exact branch release dates and apply within 24 hours of availability given confirmed active exploitation.</li></ol>
<ol><li><strong>Threat ID 510019.</strong> Enable on PAN-OS 11.1+ for detection and blocking of known exploit patterns while patches are unavailable.</li></ol>
<p><strong>What to do this week:</strong> (1) Identify all PA-Series and VM-Series firewalls with User-ID Authentication Portal enabled and network-accessible; (2) Restrict or disable the portal immediately; (3) Review Authentication Portal logs from 2026-04-09 onwards for anomalous traffic; (4) Schedule patch deployment for the 2026-05-13 release window; (5) If compromise is suspected, treat the firewall as an untrusted device, isolate it, and initiate incident response before reconnecting.</p>
<h2 id="6-updates-to-prior-coverage">6. Updates to Prior Coverage</h2>
<blockquote><p><strong>UPDATE (originally 2026-05-06):</strong> <strong>CVE-2026-31431 &quot;Copy Fail&quot; — Go and Rust Exploit Variants Now Public; Container-to-Host Escape Validated.</strong> Kaspersky confirmed that Go and Rust re-implementations of the original 732-byte Python proof-of-concept exploit for CVE-2026-31431 are now publicly available in open-source repositories, materially expanding the attacker toolkit beyond the Python variant (<a href="https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-06</a>). The container-to-host privilege escalation vector has additionally been validated: Docker, LXC, and Kubernetes runtimes permit container processes access to the <code>AF_ALG</code> subsystem by default when <code>algif_aead</code> is loaded on the host kernel, enabling a container-resident process to exploit this flaw and obtain root on the host. The CISA KEV deadline remains 2026-05-15. Interim mitigations — blacklist <code>algif_aead</code> via modprobe.d and apply seccomp profiles blocking <code>AF_ALG</code> socket creation for containerised workloads — are unchanged from the 2026-05-06 deep dive.</p></blockquote>
<blockquote><p><strong>UPDATE (originally 2026-05-06):</strong> <strong>Apache HTTP Server 2.4.67 — CVE-2026-28780 (mod_proxy_ajp Heap Buffer Overflow, RCE) Newly Identified.</strong> The 2026-05-04 Apache HTTP Server 2.4.67 release also patches CVE-2026-28780, a heap-based buffer overflow in mod_proxy_ajp triggered via crafted AJP messages when the server connects to an AJP backend — enabling remote code execution in configurations using AJP proxying. This was not retrieved in the 2026-05-06 brief. Additional vulnerabilities patched in 2.4.67 include CVE-2026-29169 (mod_dav_lock null pointer dereference, denial of service) and CVE-2026-29168 (mod_md resource exhaustion, denial of service). Upgrade to Apache HTTP Server 2.4.67 if not already completed (<a href="https://www.securityweek.com/critical-high-severity-vulnerabilities-patched-in-apache-mina-http-server/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-05</a>; <a href="https://httpd.apache.org/security/vulnerabilities_24.html" target="_blank" rel="noopener noreferrer">Apache HTTP Server security page</a>).</p></blockquote>
<blockquote><p><strong>UPDATE (originally 2026-05-06):</strong> <strong>Instructure (Canvas LMS) — Individual University Notifications Now Issuing.</strong> Multiple universities began directly notifying students and staff on 2026-05-06, confirming Instructure had notified them that their institutional data was specifically involved. Named examples include the University of Nevada, Reno and the University of Pennsylvania (300,000+ potentially affected users per reporting) (<a href="https://www.unr.edu/nevada-today/news/president-messages/2026-05-06-cybersecurity-incident" target="_blank" rel="noopener noreferrer">University of Nevada, Reno, 2026-05-06</a>; <a href="https://www.thedp.com/article/2026/05/penn-cybercrime-shiny-hunters-canvas-hack-students" target="_blank" rel="noopener noreferrer">The Daily Pennsylvanian, 2026-05</a>). Data categories remain unchanged from prior reporting. European universities using Canvas LMS should verify with Instructure whether their tenant data was among those accessed and assess whether GDPR notification obligations apply.</p></blockquote>
<blockquote><p><strong>UPDATE (originally 2026-05-06):</strong> <strong>France ANTS Breach — Confirmed Account Count 11.7 Million.</strong> ANTS officially confirmed the count of affected citizen portal accounts as 11.7 million, clarifying the previously reported range of 12–18 million (which reflected the full database size versus active accounts). Exposed data categories and CNIL notification status unchanged from prior reporting.</p></blockquote>
<h2 id="7-verification-notes">7. Verification Notes</h2>
<p><strong>Items verified multi-source:</strong> CVE-2026-0300 (Palo Alto vendor advisory, CERT-EU Advisory 2026-006, CERT-FR CERTFR-2026-AVI-0537, CISA KEV via secondary sources, Unit 42 primary research, Help Net Security, BleepingComputer, SecurityWeek); CVE-2024-57726/57728 (NVD, CISA KEV via Security Boulevard/WindowsForum); CVE-2024-7399 (NVD, CISA KEV, Help Net Security); CVE-2026-6023/6022 (CERT-FR, NVD); CVE-2026-23926/27/28 (CERT-FR); DAEMON Tools supply chain (Kaspersky Securelist primary, Kaspersky press release, The Record, BleepingComputer, TechCrunch, Disc Soft vendor acknowledgement); Europol Shadow IT (Correctiv, Computer Weekly, heise Security); ChipSoft/Embargo (The Record original, NL Times, DutchNews.nl, Dutch DPA 66 notifications confirmed); Vimeo/Anodot (Vimeo official blog, BleepingComputer, The Register); QLNX Quasar Linux (Trend Micro primary, BleepingComputer, SecurityWeek); InstallFix/Amatera (Trend Micro, Push Security, Malwarebytes); CVE-2026-31431 update (The Hacker News, SecurityOnline confirming Kaspersky analysis of multi-language PoC variants).</p>
<p><strong>Items marked [SINGLE-SOURCE-NATIONAL-CERT]:</strong> ENISA CVE ecosystem expansion (ENISA official announcement, 2026-05-06); CVE-2026-6023/6022 Telerik (CERT-FR CERTFR-2026-AVI-0542 — NVD confirms CVE IDs and scores; no independent corroboration of exploitation status); CVE-2026-23926/27/28 Zabbix (CERT-FR CERTFR-2026-AVI-0541).</p>
<p><strong>Items marked [SINGLE-SOURCE-OTHER]:</strong> Germany ransomware surge/GTIG Europe data-leak landscape (Mandiant GTIG, 2026-04-15); OceanLotus PyPI/ZiChatBot (Kaspersky Securelist, 2026-05-06); CloudZ RAT/Pheno (Cisco Talos, 2026-05-05); Dragos AI-assisted water utility attack (Dragos, 2026-05-06); CVE-2026-33725 Metabase Enterprise (GBHackers/Hakai Security; NVD confirms CVE ID and CVSS 7.2); M-Trends 2026 annual report (Google Cloud/Mandiant, 2026-03-23).</p>
<p><strong>Items dropped:</strong></p>
<ul><li><strong>Microsoft AiTM &quot;Code of Conduct&quot; phishing</strong> — surfaced again by sub-agent research. Already covered 2026-05-06 § 4; no material delta confirmed. Discarded.</li><li><strong>France ANTS fresh coverage from sub-agent 4</strong> — already covered 2026-05-06 § 2. Minor delta (11.7M confirmed count) placed in § 6.</li><li><strong>CVE-2026-31431 full coverage from sub-agent 3</strong> — already covered 2026-05-06 as the full deep dive. Material delta (multi-language PoC, container escape validation) placed in § 6.</li><li><strong>Sophos: Checkmarx KICS and Bitwarden CLI supply chain attacks</strong> — published 2026-04-24, 13 days before this brief. Outside primary and extended recency windows with no specific new development justifying inclusion. Available for a future brief if new developments emerge.</li><li><strong>TCLBANKER Brazilian banking trojan (Elastic Security Labs)</strong> — Brazil-only geofenced targeting confirmed; no EU/CH nexus; Outlook COM propagation technique is noted but insufficient public-sector relevance to include.</li><li><strong>Juniper Secure Analytics CERT-FR advisory (CERTFR-2026-AVI-0539)</strong> — covers 17 CVEs across Juniper SA versions; the CVEs span 2025–2026 and were not individually NVD-verified in this run. Defenders should consult the CERT-FR advisory directly for CVE listings and severity ratings.</li></ul>
<p><strong>Recency window notes:</strong></p>
<ul><li>Germany ransomware surge (GTIG, 2026-04-15): 22 days old, outside both recency windows. Included as first coverage for this series given direct EU audience relevance.</li><li>M-Trends 2026 (2026-03-23): 45 days old, well outside recency window. Included as first and final treatment per the annual-report rule (Prime Directive 9). Logged in state files.</li><li>Vimeo/Anodot (primary disclosure 2026-04-27): 10 days old; BleepingComputer and The Register coverage on 2026-05-05/06 brought it into the brief window as first coverage.</li><li>ChipSoft Netherlands attack (incident 2026-04-07): 30 days old; Embargo group identification and 66 Dutch DPA notifications (reported 2026-04-29) constitute the material new development justifying inclusion as first coverage.</li></ul>
<p><strong>Source failures — consecutive_failures incremented:</strong></p>
<ul><li>cisa-kev: HTTP 403 second consecutive day → consecutive_failures now 2</li><li>cisa-advisories: HTTP 403 second consecutive day → consecutive_failures now 2</li><li>csirt-acn-it: HTTP 403 second consecutive day → consecutive_failures now 2</li><li>inside-it-ch: HTTP 403 second consecutive day → consecutive_failures now 2</li><li>ico-uk: HTTP 403 second consecutive day → consecutive_failures now 2</li><li>ccn-cert-es: HTTP 403 confirmed again this run → consecutive_failures now 1</li><li>ncsc-ch-security-hub: SPA API not queryable (HTTP 404 on /api/ root); content not accessible via WebFetch → consecutive_failures now 1</li></ul>
<p><strong>Sources successfully fetched this run (failures reset or confirmed active):</strong>
talos (consecutive_failures reset to 0; CloudZ/Pheno content confirmed), kaspersky-securelist (DAEMON Tools, OceanLotus), trendmicro-research (QLNX, InstallFix), elastic-seclabs (TCLBANKER), dragos (AI-assisted OT attack), sophos-xops (Checkmarx/Bitwarden supply chain for research, not included in brief). Secureworks CTU now redirects to Sophos blog post-acquisition; source URL requires update.</p>
<p><strong>Coverage gaps:</strong> CCN-CERT Spain (ccn-cert-es, HTTP 403 — 2 consecutive runs); GovCERT.ch (navigation page only — 2 consecutive runs); CERT.at Austria (navigation and /en/warnings/ 404 — 2 consecutive runs); GovCERT Austria (navigation/contact only — 2 consecutive runs); CSIRT Italia (csirt-acn-it, HTTP 403 — 2 consecutive runs); Inside IT Switzerland (inside-it-ch, HTTP 403 — 2 consecutive runs); UK ICO (ico-uk, HTTP 403 — 2 consecutive runs); CISA KEV and CISA Advisories (HTTP 403 — 2 consecutive runs); NCC Group Research, Cloudflare Cloudforce One, IBM X-Force, Akamai SIRT, Red Canary, Huntress — not fetched in this run.</p>]]></content:encoded></item><item><title>CTI Daily Brief — 2026-05-06</title><link>https://ctipilot.ch/briefs/2026-05-06/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-06/</guid><pubDate>Fri, 08 May 2026 12:54:43 +0000</pubDate><dc:date>2026-05-08T12:54:43+00:00</dc:date><category>CVE-2026-23918</category><category>CVE-2026-24072</category><category>CVE-2026-28780</category><category>CVE-2026-29168</category><category>CVE-2026-29169</category><category>CVE-2026-31431</category><category>CVE-2026-32305</category><category>CVE-2026-41940</category><description><![CDATA[<ul><li><strong>CVE-2026-31431 &quot;Copy Fail&quot; — Linux kernel LPE actively exploited; CISA KEV deadline 2026-05-15.</strong> An unprivileged local attacker can silently overwrite setuid-root binaries in kernel page cache without touching disk; a public 732-byte Python exploit requires no timing precision. All major Linux distributions since 2017 are affected. Patch immediately; interim: blacklist the <code>algif_aead</code> module. Full technical detail § 5. (<a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-005, 2026-04-30</a>)</li><li><strong>CVE-2026-4670 (CVSS 9.8) — Critical unauthenticated auth bypass in Progress MOVEit Automation; CERT-FR advisory issued.</strong> No in-the-wild exploitation confirmed at time of disclosure (2026-05-04), but MOVEit&#39;s 2023 Cl0p-exploitation history makes this an emergency priority. Patch to 2025.1.5 / 2025.0.9 / 2024.1.8. (<a href="https://www.helpnetsecurity.com/2026/05/04/critical-moveit-automation-auth-bypass-vulnerability-fixed-cve-2026-4670/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>)</li><li><strong>DigiCert support portal compromised — 60 fraudulent EV code-signing certificates generated; 11 confirmed used to sign Zhong Stealer malware.</strong> Social engineering via support chat; secondary failure: absent EDR on one analyst system allowed 12-day dwell. Audit software signed with DigiCert EV certificates updated April–May 2026. (<a href="https://www.helpnetsecurity.com/2026/05/04/digicert-breach-code-signing-certificates-malware/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>)</li><li><strong>French government identity agency (ANTS/France Titres) — up to 18 million citizen records exfiltrated; suspect detained.</strong> Breach of the agency managing French biometric passports, national IDs, and driving licences. Direct threat-model transfer to CH and EU national identity registries. (<a href="https://www.helpnetsecurity.com/2026/05/04/france-titres-data-breach-teen-suspect/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>)</li><li><strong>Europol IOCTA 2026: state-criminal actor convergence and GenAI-enabled fraud are the defining strategic threats for European public-sector defenders.</strong> Annual EU threat assessment explicitly identifies interweaving of state-sponsored hybrid operations with criminal actors as the primary strategic risk. First coverage — see § 4. (<a href="https://home-affairs.ec.europa.eu/news/europol-published-report-latest-trends-cybercrime-landscape-2026-04-29_en" target="_blank" rel="noopener noreferrer">Europol / EC Migration &amp; Home Affairs, 2026-04-28</a>)</li></ul>]]></description><content:encoded><![CDATA[<hr/>
<h2 id="0-tl-dr">0. TL;DR</h2>
<ul><li><strong>CVE-2026-31431 &quot;Copy Fail&quot; — Linux kernel LPE actively exploited; CISA KEV deadline 2026-05-15.</strong> An unprivileged local attacker can silently overwrite setuid-root binaries in kernel page cache without touching disk; a public 732-byte Python exploit requires no timing precision. All major Linux distributions since 2017 are affected. Patch immediately; interim: blacklist the <code>algif_aead</code> module. Full technical detail § 5. (<a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-005, 2026-04-30</a>)</li><li><strong>CVE-2026-4670 (CVSS 9.8) — Critical unauthenticated auth bypass in Progress MOVEit Automation; CERT-FR advisory issued.</strong> No in-the-wild exploitation confirmed at time of disclosure (2026-05-04), but MOVEit&#39;s 2023 Cl0p-exploitation history makes this an emergency priority. Patch to 2025.1.5 / 2025.0.9 / 2024.1.8. (<a href="https://www.helpnetsecurity.com/2026/05/04/critical-moveit-automation-auth-bypass-vulnerability-fixed-cve-2026-4670/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>)</li><li><strong>DigiCert support portal compromised — 60 fraudulent EV code-signing certificates generated; 11 confirmed used to sign Zhong Stealer malware.</strong> Social engineering via support chat; secondary failure: absent EDR on one analyst system allowed 12-day dwell. Audit software signed with DigiCert EV certificates updated April–May 2026. (<a href="https://www.helpnetsecurity.com/2026/05/04/digicert-breach-code-signing-certificates-malware/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>)</li><li><strong>French government identity agency (ANTS/France Titres) — up to 18 million citizen records exfiltrated; suspect detained.</strong> Breach of the agency managing French biometric passports, national IDs, and driving licences. Direct threat-model transfer to CH and EU national identity registries. (<a href="https://www.helpnetsecurity.com/2026/05/04/france-titres-data-breach-teen-suspect/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>)</li><li><strong>Europol IOCTA 2026: state-criminal actor convergence and GenAI-enabled fraud are the defining strategic threats for European public-sector defenders.</strong> Annual EU threat assessment explicitly identifies interweaving of state-sponsored hybrid operations with criminal actors as the primary strategic risk. First coverage — see § 4. (<a href="https://home-affairs.ec.europa.eu/news/europol-published-report-latest-trends-cybercrime-landscape-2026-04-29_en" target="_blank" rel="noopener noreferrer">Europol / EC Migration &amp; Home Affairs, 2026-04-28</a>)</li></ul>
<hr/>
<h2 id="1-active-threats-trending-vulnerabilities">1. Active Threats &amp; Trending Vulnerabilities</h2>
<p><em>From Sub-agent 1.</em></p>
<h3 id="1a-active-threats-emergency-advisories">1a. Active Threats &amp; Emergency Advisories</h3>
<hr/>
<h3 id="cve-2026-31431-copy-fail-linux-kernel-lpe-active-exploitation-cisa-kev-deadline-2026-05-15">CVE-2026-31431 &quot;Copy Fail&quot; — Linux Kernel LPE: Active Exploitation, CISA KEV Deadline 2026-05-15</h3>
<p>CVE-2026-31431 (CVSS 7.8) is a deterministic local privilege escalation in the Linux kernel&#39;s <code>algif_aead</code> cryptographic module affecting virtually all major distributions running kernels built since 2017 (<a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-005, 2026-04-30</a>). An unprivileged user exploits an interaction between <code>AF_ALG</code> socket operations and <code>splice()</code> to write four bytes into the kernel page cache of any readable file, enabling in-memory modification of setuid binaries such as <code>su</code> and <code>sudo</code> without touching disk — bypassing on-disk file-integrity monitoring entirely (<a href="https://unit42.paloaltonetworks.com/cve-2026-31431-copy-fail/" target="_blank" rel="noopener noreferrer">Unit 42, 2026-05-05</a>). A public exploit exists as a 732-byte Python script; Go and Rust variants have appeared in public code repositories. CISA added CVE-2026-31431 to the Known Exploited Vulnerabilities catalog on 2026-05-01 with a federal remediation deadline of 2026-05-15; BSI Germany updated its advisory on 2026-05-04 confirming active exploitation (<a href="https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-01</a>; <a href="https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1232" target="_blank" rel="noopener noreferrer">BSI CERT-Bund WID-SEC-2026-1232, updated 2026-05-04</a>).</p>
<p><strong>Why it matters to us:</strong> Affects all Linux server, container, and CI/CD infrastructure across Swiss and European public-sector environments; container-to-host escalation is possible where <code>algif_aead</code> is loaded. CERT-EU issued a dedicated advisory for EU institutions. See § 5 for full technical deep dive, detection concepts, and mitigation steps.</p>
<hr/>
<h3 id="cve-2026-41940-cpanel-whm-authentication-bypass-mass-exploitation-ongoing-kev-listed">CVE-2026-41940 — cPanel/WHM Authentication Bypass: Mass Exploitation Ongoing, KEV Listed</h3>
<p>CVE-2026-41940 (CVSS 9.8) is a CRLF injection-based authentication bypass in cPanel and WebHost Manager (WHM), exploited in the wild since approximately 2026-02-23 — roughly two months before the emergency patch released 2026-04-28 — making this a genuine zero-day exposure for most of its exploitation window (<a href="https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/" target="_blank" rel="noopener noreferrer">watchTowr Labs</a>; <a href="https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass/" target="_blank" rel="noopener noreferrer">Rapid7 ETR</a>). By 2026-05-04, Shadowserver Foundation telemetry estimated approximately 44,000 IP addresses were likely compromised via this flaw and actively scanning the internet; multiple distinct threat actors are involved, including a campaign deploying &quot;Sorry&quot; ransomware (a Go-based Linux encryptor) and a second campaign using the AdaptixC2 framework targeting government and military entities (<a href="https://www.helpnetsecurity.com/2026/05/04/multiple-threat-actors-actively-exploit-cpanel-vulnerability-cve-2026-41940/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>; <a href="https://cyberscoop.com/cpanel-authentication-bypass-vulnerability-cve-2026-41940-exploited/" target="_blank" rel="noopener noreferrer">CyberScoop, 2026-05-05</a>). CISA added CVE-2026-41940 to the KEV catalog on 2026-04-30 with a federal remediation deadline of 2026-05-21.</p>
<p><strong>Why it matters to us:</strong> European hosting providers and MSPs serving public-sector clients that have not yet patched cPanel/WHM are actively being compromised at scale. Any public-sector organisation hosting services on cPanel-managed infrastructure — or procuring from providers that do — should verify patch status immediately.</p>
<hr/>
<h3 id="cve-2026-4670-cve-2026-5174-progress-moveit-automation-critical-authentication-bypass">CVE-2026-4670 / CVE-2026-5174 — Progress MOVEit Automation: Critical Authentication Bypass</h3>
<p>Progress Software disclosed CVE-2026-4670 (CVSS 9.8 Critical), an unauthenticated authentication bypass on the MOVEit Automation service backend command port (CWE-305), and CVE-2026-5174 (CVSS 8.8), an authenticated privilege-escalation flaw (CWE-20), on 2026-05-04 (<a href="https://www.helpnetsecurity.com/2026/05/04/critical-moveit-automation-auth-bypass-vulnerability-fixed-cve-2026-4670/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>; <a href="https://thehackernews.com/2026/05/progress-patches-critical-moveit.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-04</a>). Chained, the two flaws provide a fully unauthenticated path to administrative control, exposing stored file-transfer credentials, business-critical data (payroll, HR, financial files), and onward pivot into connected enterprise networks. Affected versions are prior to 2025.1.5, 2025.0.9, and 2024.1.8; Progress reports no in-the-wild exploitation at time of disclosure. CERT-FR issued advisory CERTFR-2026-AVI-0532 on 2026-05-05 (<a href="https://www.cert.ssi.gouv.fr/" target="_blank" rel="noopener noreferrer">CERT-FR, 2026-05-05</a>).</p>
<p><strong>Why it matters to us:</strong> MOVEit Automation is widely deployed for cross-agency managed file transfer in European public-sector and financial environments. The 2023 Cl0p-driven exploitation of MOVEit Transfer caused significant impact across EU entities within hours of CVE publication. Treat this as an emergency regardless of current in-the-wild status.</p>
<hr/>
<h3 id="cve-2026-23918-apache-http-server-2-4-66-http-2-double-free-with-rce-potential">CVE-2026-23918 — Apache HTTP Server 2.4.66: HTTP/2 Double-Free with RCE Potential</h3>
<p>Apache HTTP Server 2.4.67 was released 2026-05-04 patching CVE-2026-23918 (CVSS 8.8 HIGH), a double-free memory corruption flaw (CWE-415) in the HTTP/2 implementation triggered by &quot;early stream reset&quot; conditions (<a href="https://thehackernews.com/2026/05/critical-apache-http2-flaw-cve-2026.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-05</a>; <a href="https://www.cert.ssi.gouv.fr/" target="_blank" rel="noopener noreferrer">CERT-FR CERTFR-2026-AVI-0530, 2026-05-05</a>). Denial-of-service is trivially achievable; remote code execution requires APR library using an mmap allocator — present in default Debian-family deployments and official Apache Docker images — and researchers have confirmed a working PoC on x86_64. No in-the-wild exploitation confirmed as of 2026-05-06. The vulnerability is limited to version 2.4.66 specifically. The 2.4.67 release also patches four additional flaws: CVE-2026-24072 (mod_rewrite arbitrary file-read), CVE-2026-28780 (mod_proxy_ajp heap buffer overflow), CVE-2026-29168, and CVE-2026-29169.</p>
<p><strong>Why it matters to us:</strong> Apache HTTP Server is pervasive in European public-sector web and intranet infrastructure; CERT-FR has flagged this. Upgrade to 2.4.67 for environments running 2.4.66; environments on earlier versions should upgrade as general hygiene.</p>
<hr/>
<h3 id="1b-trending-vulnerabilities">1b. Trending Vulnerabilities</h3>
<div class="table-wrap"><table>
<thead><tr>
<th style="text-align:left">CVE</th>
<th style="text-align:left">Product</th>
<th style="text-align:left">CVSS</th>
<th style="text-align:left">EPSS</th>
<th style="text-align:left">KEV</th>
<th style="text-align:left">Exploited</th>
<th style="text-align:left">Patch</th>
<th style="text-align:left">Source</th>
</tr></thead><tbody>
<tr>
<td style="text-align:left">CVE-2026-31431</td>
<td style="text-align:left">Linux Kernel (algif_aead, kernels 4.14–6.19.11)</td>
<td style="text-align:left">7.8 HIGH</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">Yes — deadline 2026-05-15</td>
<td style="text-align:left">ITW</td>
<td style="text-align:left">6.18.22 / 6.19.12 / 7.0; distro packages available</td>
<td style="text-align:left"><a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU 2026-005</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-41940</td>
<td style="text-align:left">cPanel / WHM (all versions before 2026-04-28 patch)</td>
<td style="text-align:left">9.8 CRIT</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">Yes — deadline 2026-05-21</td>
<td style="text-align:left">ITW (mass exploitation, ~44,000 hosts compromised)</td>
<td style="text-align:left">Emergency patch 2026-04-28 — update cPanel/WHM immediately</td>
<td style="text-align:left"><a href="https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/" target="_blank" rel="noopener noreferrer">watchTowr Labs</a> / <a href="https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass/" target="_blank" rel="noopener noreferrer">Rapid7</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-4670</td>
<td style="text-align:left">Progress MOVEit Automation (&lt; 2025.1.5 / 2025.0.9 / 2024.1.8)</td>
<td style="text-align:left">9.8 CRIT</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">No public ITW at disclosure</td>
<td style="text-align:left">2025.1.5 / 2025.0.9 / 2024.1.8 (full installer upgrade required)</td>
<td style="text-align:left"><a href="https://www.helpnetsecurity.com/2026/05/04/critical-moveit-automation-auth-bypass-vulnerability-fixed-cve-2026-4670/" target="_blank" rel="noopener noreferrer">Help Net Security</a> / <a href="https://www.cert.ssi.gouv.fr/" target="_blank" rel="noopener noreferrer">CERT-FR</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-5174</td>
<td style="text-align:left">Progress MOVEit Automation (same as above)</td>
<td style="text-align:left">8.8 HIGH (NVD) / 7.7 HIGH (vendor)</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">No public ITW</td>
<td style="text-align:left">Same installer as CVE-2026-4670</td>
<td style="text-align:left"><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5174" target="_blank" rel="noopener noreferrer">NVD</a> / <a href="https://www.cert.ssi.gouv.fr/" target="_blank" rel="noopener noreferrer">CERT-FR</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-23918</td>
<td style="text-align:left">Apache HTTP Server 2.4.66 (mod_http2 / HTTP/2)</td>
<td style="text-align:left">8.8 HIGH</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">PoC (no ITW confirmed)</td>
<td style="text-align:left">Apache HTTP Server 2.4.67</td>
<td style="text-align:left"><a href="https://thehackernews.com/2026/05/critical-apache-http2-flaw-cve-2026.html" target="_blank" rel="noopener noreferrer">THN</a> / <a href="https://www.cert.ssi.gouv.fr/" target="_blank" rel="noopener noreferrer">CERT-FR CERTFR-2026-AVI-0530</a></td>
</tr>
<tr>
<td style="text-align:left">CVE-2026-32305</td>
<td style="text-align:left">Traefik proxy (&lt; 2.11.41 / 3.6.11 / 3.7.0-ea.2)</td>
<td style="text-align:left">7.8 HIGH (CVSS v4) / 5.3 MED (CVSS v3.1)</td>
<td style="text-align:left">N/A</td>
<td style="text-align:left">No</td>
<td style="text-align:left">No public</td>
<td style="text-align:left">2.11.41 / 3.6.11 / 3.7.0-ea.2</td>
<td style="text-align:left"><a href="https://www.cert.ssi.gouv.fr/" target="_blank" rel="noopener noreferrer">CERT-FR CERTFR-2026-AVI-0531</a></td>
</tr>
</tbody></table></div>
<p><strong>Row notes:</strong></p>
<p><strong>CVE-2026-31431:</strong> Exploit is deterministic and race-condition-free; no kernel-specific address offsets required. Container environments where <code>algif_aead</code> is loaded face container-to-host escalation risk in Docker, LXC, and Kubernetes. Interim mitigation: blacklist <code>algif_aead</code> via modprobe.d; see § 5 for full guidance.</p>
<p><strong>CVE-2026-41940:</strong> CRLF injection enables session cookie forgery that entirely bypasses cPanel/WHM authentication. Active since ~2026-02-23 (approximately two months of zero-day exposure); mass automated exploitation is ongoing at internet scale as of this brief.</p>
<p><strong>CVE-2026-4670 + CVE-2026-5174:</strong> These two CVEs chain to yield fully unauthenticated administrative access. MOVEit Transfer&#39;s 2023 exploitation by Cl0p reached organisations within hours of CVE disclosure — treat CVE-2026-4670 as an emergency regardless of current ITW status.</p>
<p><strong>CVE-2026-32305:</strong> Traefik mTLS bypass — a fragmented TLS ClientHello causes SNI extraction failure and fallback to the default (non-mTLS) TLS configuration, defeating route-level mutual-TLS enforcement. Particularly relevant to zero-trust architectures and API gateway deployments relying on Traefik for mTLS policy enforcement.</p>
<h2 id="2-switzerland-europe-public-sector">2. Switzerland, Europe &amp; Public Sector</h2>
<p><em>From Sub-agent 2.</em> CH/EU nexus items first, then transferable global public-sector items.</p>
<hr/>
<h3 id="single-source-national-cert-switzerland-ncsc-double-phishing-parcel-delivery-lure-followed-by-telephone-callback-fraud">[SINGLE-SOURCE-NATIONAL-CERT] Switzerland: NCSC &quot;Double Phishing&quot; — Parcel Delivery Lure Followed by Telephone Callback Fraud</h3>
<p>The Swiss Federal Office for Cybersecurity (BACS/NCSC) published its Week 18 focus article on 2026-05-05 documenting a refined two-stage social-engineering methodology targeting Swiss residents under the guise of parcel-delivery notifications (<a href="https://www.ncsc.admin.ch/ncsc/de/home/aktuell/im-fokus.html" target="_blank" rel="noopener noreferrer">NCSC Switzerland — Im Fokus / &quot;In Focus&quot;, 2026-05-05</a>). Attackers impersonate Swiss Post, DHL, and DPD to harvest credentials or card data via phishing sites, then follow up with a direct telephone call to the victim to extract additional information or authorise fraudulent transactions in real time. This &quot;Double Phishing&quot; technique is particularly effective because the second stage — a voice call — bypasses conventional email and web security controls entirely, exploiting trust built by the apparent digital authenticity of the first stage. The technique aligns with Telephone-Oriented Attack Delivery (TOAD) patterns increasingly documented across European consumer and SME targeting. Public-sector contact centres and help-desk staff should be briefed on this pattern — specifically, recognising unsolicited inbound calls referencing recent online interactions or delivery notifications.</p>
<p><strong>CH/EU nexus:</strong> Direct — Swiss government NCSC advisory; Swiss Post explicitly named as impersonated entity. | <strong>Public-sector nexus:</strong> Social-engineering risk applicable to public-sector employees and citizens using government e-services. [SINGLE-SOURCE-NATIONAL-CERT]</p>
<hr/>
<h3 id="germany-denic-de-tld-outage-from-dnssec-misconfiguration-all-german-government-web-services-affected">Germany: DENIC .de TLD Outage from DNSSEC Misconfiguration — All German Government Web Services Affected</h3>
<p>On 2026-05-05, DENIC — the registry for the .de country-code top-level domain — began serving malformed RRSIG (DNSSEC signature) records for the entire .de zone, causing all DNSSEC-validating resolvers (including Google Public DNS and Cloudflare DNS) to return SERVFAIL for millions of .de hostnames (<a href="https://www.ip.network/blog/de-domain-dnssec-outage-may-2026" target="_blank" rel="noopener noreferrer">IP.network Blog, 2026-05-05</a>; <a href="https://www.heise.de/security/" target="_blank" rel="noopener noreferrer">heise Security (DE) — &quot;DNS-Probleme: .de-Domains nicht erreichbar&quot; (&quot;DNS issues: .de domains unreachable&quot;), 2026-05-05</a>; <a href="https://www.securityweek.com/reports-massive-dns-outages-germany/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-05</a>). Because DNSSEC-validating resolvers refuse to return records that fail cryptographic validation rather than falling back to unvalidated resolution, availability was fully severed for end-users on standard public resolvers. All German government portals and critical-infrastructure services reachable via .de hostnames were impacted. The incident was assessed as an operational misconfiguration rather than a cyber attack, and resolved during 2026-05-05. It illustrates a well-known but under-managed DNSSEC operational risk: a single broken zone-signing pipeline can cascade to national-scale availability failure.</p>
<p><strong>CH/EU nexus:</strong> Direct — German national TLD registry; all German government web services and portals affected. | <strong>Public-sector nexus:</strong> All .de-hosted German government services were impacted. | <strong>Defender takeaway:</strong> Public-sector DNS administrators should deploy RRSIG expiry monitoring and zone-signing pipeline health alerts, and validate that DNSSEC failure incident-response procedures are documented and tested — particularly for zones critical to citizen-facing government services.</p>
<hr/>
<h3 id="france-ants-government-identity-agency-up-to-18-million-citizen-records-exfiltrated-suspect-detained">France: ANTS Government Identity Agency — Up to 18 Million Citizen Records Exfiltrated; Suspect Detained</h3>
<p>France Titres (officially Agence Nationale des Titres Sécurisés — ANTS), the French government agency responsible for issuing biometric passports, national identity cards, and driving licences, confirmed a breach in which between 12 and 18 million citizen records were exfiltrated, with French authorities detaining a 15-year-old suspect on 2026-04-25 — a development widely reported during this brief&#39;s window (<a href="https://www.helpnetsecurity.com/2026/05/04/france-titres-data-breach-teen-suspect/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>; <a href="https://www.theregister.com/2026/04/30/french_gov_mega_breach_suspect/" target="_blank" rel="noopener noreferrer">The Register, 2026-04-30</a>; <a href="https://techcrunch.com/2026/04/22/france-confirms-data-breach-at-government-agency-that-manages-citizens-ids/" target="_blank" rel="noopener noreferrer">TechCrunch, 2026-04-22</a>). The stolen data includes national ID numbers, full names, email addresses, dates of birth, and unique account identifiers; a subset of records also includes home addresses, places of birth, and phone numbers — covering approximately one-third of the French adult population. Breach detection is reported to have occurred on 2026-04-13; the citizen notification arrived nine days later on 2026-04-22. No specific technical vulnerability or initial-access vector has been publicly confirmed. Charges against the suspect include unauthorised access, data theft, disruption of a state system, and possession of hacking tools. The stolen dataset creates elevated phishing and social-engineering risk for French citizens that will persist for years.</p>
<p><strong>CH/EU nexus:</strong> Direct EU nexus — French government central identity registry; GDPR breach-notification obligations apply; peer risk for all EU and CH national identity management systems. | <strong>Public-sector nexus:</strong> Core government digital-identity infrastructure directly comparable to Swiss e-ID architecture and EU member-state ID registries. | <strong>Defender takeaway:</strong> National identity registries should audit privileged access controls on identity databases, deploy anomaly detection on bulk database read patterns, and verify that GDPR-mandated breach-notification timelines are achievable given current incident-detection tooling.</p>
<hr/>
<h3 id="single-source-national-cert-cert-fr-batch-advisories-2026-05-04-05-papercut-thunderbird-qnap-qts-vmware-tanzu-traefik-android">[SINGLE-SOURCE-NATIONAL-CERT] CERT-FR Batch Advisories 2026-05-04/05: PaperCut, Thunderbird, QNAP QTS, VMware Tanzu, Traefik, Android</h3>
<p>ANSSI/CERT-FR published seven advisories between 2026-05-04 and 2026-05-05 covering products widely deployed in European public-sector IT environments (<a href="https://www.cert.ssi.gouv.fr/" target="_blank" rel="noopener noreferrer">CERT-FR / cert.ssi.gouv.fr, 2026-05-04/05</a>). The most notable for public-sector defenders: <strong>PaperCut</strong> (CERTFR-2026-AVI-0533) — print-management software historically targeted with critical exploits, prevalent in government and education across Europe; administrators should assess the advisory before general deployment. <strong>Mozilla Thunderbird</strong> (CERTFR-2026-AVI-0529) — common email client on European public-sector desktops; multiple flaws addressed. <strong>QNAP QTS</strong> (CERTFR-2026-AVI-0528) — NAS devices frequently found in SME and local-government environments. <strong>VMware Tanzu Kubernetes Runtime</strong> (CERTFR-2026-AVI-0527) — cloud-native infrastructure increasingly deployed in government cloud-migration and digital-transformation projects. <strong>Traefik</strong> (CERTFR-2026-AVI-0531) — widely used reverse proxy and API gateway in cloud-native public-sector deployments; see CVE-2026-32305 in § 1b for the specific mTLS bypass flaw. <strong>Android</strong> (CERTFR-2026-AVI-0534) — affects government Mobile Device Management (MDM) environments; confirm patch deployment via MDM console. Specific CVE identifiers for the PaperCut, Thunderbird, QNAP, VMware Tanzu, and Android advisories were not retrieved in this run; consult the CERT-FR advisories directly at cert.ssi.gouv.fr for CVE listings and severity ratings. [SINGLE-SOURCE-NATIONAL-CERT, CVE detail incomplete for five of seven advisories]</p>
<h2 id="3-notable-incidents-disclosures">3. Notable Incidents &amp; Disclosures</h2>
<p><em>From Sub-agent 4.</em> One paragraph per incident; framed as post-incident summaries for defenders.</p>
<hr/>
<p><strong>DigiCert Support Portal Compromise — 60 Fraudulent EV Code-Signing Certificates, 11 Used to Sign Malware.</strong> DigiCert, one of the world&#39;s largest certificate authorities, confirmed on 2026-05-04 that a targeted social-engineering attack on its internal support portal resulted in the fraudulent generation of 60 Extended Validation code-signing certificates (<a href="https://www.helpnetsecurity.com/2026/05/04/digicert-breach-code-signing-certificates-malware/" target="_blank" rel="noopener noreferrer">Help Net Security, 2026-05-04</a>; <a href="https://www.securityweek.com/digicert-revokes-certificates-after-support-portal-hack/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-04</a>). Beginning 2026-04-02, an attacker repeatedly submitted a malicious Windows screensaver executable (.scr) via DigiCert&#39;s Salesforce-based customer-support chat; two analyst endpoints were infected, with the second going undetected for approximately twelve days due to absent or degraded endpoint-protection coverage on that system. The attacker used portal access to obtain certificate initialization codes and generated 60 EV code-signing certificates across multiple customer accounts; DigiCert confirmed 27 were directly attacker-linked. A community member subsequently identified that 11 of the 60 certificates were used to sign the Zhong Stealer malware family, linked to Chinese e-crime activity targeting cryptocurrency assets. All 60 certificates have been revoked; DigiCert has mandated MFA on support portal access and restricted file-upload functionality. <strong>Defender takeaway:</strong> Software updated via EV-signed packages between 2026-04-02 and 2026-05-04 where the signer is DigiCert-backed warrants validation against the revoked certificate list; organisations should audit whether EDR coverage on support and analyst systems meets the same bar as production endpoints.</p>
<hr/>
<p><strong>Instructure (Canvas LMS) — Data Breach Affecting Global Education Institutions Including Possible EU Scope.</strong> Instructure, operator of the Canvas learning management system, confirmed on 2026-05-03/04 that names, email addresses, student ID numbers, and user-to-user messages were accessed in a cybersecurity incident (<a href="https://www.bleepingcomputer.com/news/security/instructure-confirms-data-breach-shinyhunters-claims-attack/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-04</a>; <a href="https://techcrunch.com/2026/05/05/hackers-steal-students-data-during-breach-at-education-tech-giant-instructure/" target="_blank" rel="noopener noreferrer">TechCrunch, 2026-05-05</a>; <a href="https://www.securityweek.com/edtech-firm-instructure-discloses-data-breach/" target="_blank" rel="noopener noreferrer">SecurityWeek, 2026-05-04</a>). Instructure detected disruptions to API-dependent tools on approximately 2026-04-30 and responded by revoking privileged credentials and access tokens. Passwords, financial data, and government IDs were not affected per company disclosure. The ShinyHunters threat group claimed responsibility and alleged 275 million individuals across approximately 9,000 institutions were affected, including EU and Asia-Pacific institutions; Instructure has confirmed the data categories but not the attacker&#39;s scale figure. Canvas is widely deployed at European universities and public-sector vocational training institutions. <strong>Defender takeaway:</strong> SaaS platform API key management and OAuth token grants are a critical and often under-monitored attack surface; organisations relying on third-party LMS or SaaS platforms should audit token grants and verify that credential-revocation playbooks can execute within hours of detection.</p>
<hr/>
<p><strong>Trellix — Source Code Repository Breach; Product Integrity Impact Unknown.</strong> Trellix, a major endpoint security and XDR vendor serving enterprise and government customers globally, confirmed on 2026-05-04 that an unauthorised party accessed a portion of its internal source code repository (<a href="https://www.bleepingcomputer.com/news/security/trellix-discloses-data-breach-after-source-code-repository-hack/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-04</a>; <a href="https://thehackernews.com/2026/05/trellix-confirms-source-code-breach.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-04</a>). The company engaged external forensic specialists and notified law enforcement. Trellix stated no evidence was found that its product code-release or distribution pipeline was affected, and no evidence the accessed code was exploited or altered; the initial access vector, duration of access, scope of repositories affected, and customer data impact have not been disclosed. <strong>Defender takeaway:</strong> Organisations running Trellix endpoint or XDR products should monitor for anomalous agent behaviour or unexpected software update signatures and maintain elevated scrutiny on any Trellix software updates until the forensic investigation concludes publicly — the supply-chain integrity question remains unresolved.</p>
<hr/>
<p><strong>ADT Inc. — Cloud Environment Breach: Customer PII Accessed (SEC 8-K Filed 2026-04-24).</strong> ADT Inc. (NYSE: ADT), a major US home security and monitoring company, disclosed via SEC Form 8-K on 2026-04-24 that it detected unauthorised access to certain cloud-based environments on 2026-04-20 (<a href="https://newsroom.adt.com/corporate-news/adt-detects-cybersecurity-incident" target="_blank" rel="noopener noreferrer">ADT Newsroom, 2026-04-24</a>; <a href="https://investor.adt.com/financials/sec-filings/default.aspx" target="_blank" rel="noopener noreferrer">SEC 8-K filing, 2026-04-24</a>). Compromised data includes names, phone numbers, and addresses from a limited set of customer and prospective-customer data; a small percentage of records also included dates of birth and last four digits of Social Security numbers or Tax IDs. Payment data, bank accounts, and customer security systems were not affected. The ShinyHunters threat actor claimed the initial access vector was a vishing (voice-phishing) attack targeting an employee&#39;s Okta SSO account, followed by Salesforce data exfiltration — ADT has not officially confirmed this vector. <strong>Defender takeaway:</strong> Telephone-targeted SSO account compromise followed by CRM data exfiltration is a recurring pattern with direct EU applicability; organisations should enforce phishing-resistant MFA (FIDO2) on identity providers and CRM platforms, and conduct regular vishing-awareness exercises.</p>
<hr/>
<p><strong>Mediaworks Kft (Hungary) — Data-Theft Extortion Claim Confirmed by Company; 8.5 TB Alleged [EU Nexus].</strong> The World Leaks cyber-extortion group — which rebranded in early 2025 from Hunters International and shifted to data theft without ransomware encryption — claimed responsibility for a breach of Mediaworks Kft, a large Hungarian media conglomerate, with the company confirming the incident on 2026-05-04 (<a href="https://therecord.media/ransomware-group-claims-breach-of-pro-orban-media-firm" target="_blank" rel="noopener noreferrer">The Record, 2026-05-04</a>; <a href="https://securityboulevard.com/2026/05/ransomware-group-claims-breach-of-pro-orban-hungarian-media-firm/" target="_blank" rel="noopener noreferrer">Security Boulevard, 2026-05-04</a>). World Leaks claims approximately 8.5 TB of exfiltrated data including payroll records, contracts, financial statements, and internal editorial communications; Mediaworks confirmed &quot;a significant amount of illegally obtained data may have come into the possession of unauthorized persons.&quot; No specific technical vector has been disclosed. As a Hungarian EU-member entity, Mediaworks is subject to GDPR breach-notification obligations; no regulatory notification had been publicly announced as of the reporting window. <strong>Defender takeaway:</strong> Data-theft-only extortion groups defeat backup-centric ransomware defences; effective detection requires egress monitoring and data-loss-prevention tooling capable of alerting on large-volume exfiltration before the attacker goes public.</p>
<h2 id="4-research-investigative-reporting">4. Research &amp; Investigative Reporting</h2>
<p><em>From Sub-agent 3.</em></p>
<hr/>
<p><strong>ANNUAL REPORT — Europol Internet Organised Crime Threat Assessment (IOCTA) 2026.</strong> Europol published its annual IOCTA on 2026-04-28 — the authoritative EU-level reference document for organised cybercrime trends, directly informing Europol&#39;s operational priorities and EU member-state law-enforcement resourcing (<a href="https://home-affairs.ec.europa.eu/news/europol-published-report-latest-trends-cybercrime-landscape-2026-04-29_en" target="_blank" rel="noopener noreferrer">Europol / European Commission Migration and Home Affairs, 2026-04-28</a>) [SINGLE-SOURCE-NATIONAL-CERT]. The 2026 edition&#39;s central thesis is that encryption technologies, proxy/anonymisation infrastructure, and generative AI are jointly lowering barriers and expanding the operational reach of criminal actors across four domains: cybercrime enablers (dark-web infrastructure, cryptocurrency laundering, privacy coins), online fraud (GenAI-customised social engineering at scale), cyber attacks (ransomware with increasing data-exfiltration emphasis over encryption), and online child sexual exploitation. The strategic emphasis for EU public-sector defenders is the report&#39;s explicit identification of the &quot;increasing interweaving of state-sponsored hybrid threats with criminal actors&quot; as a defining strategic risk — a convergence theme directly visible in this brief&#39;s incidents (ShinyHunters targeting government identity agencies; World Leaks targeting politically significant EU media entities). Public institutions, major technology companies, and EU citizens&#39; personal data are identified as primary risk targets. <em>Published 2026-04-28, eight days before this brief — outside the standard 72-hour recency window; included as first coverage. See § 7. Not to be re-summarised in subsequent briefs; specific findings may be cited as context.</em></p>
<hr/>
<p><strong>China-Nexus UAT-8302 Conducts Long-Term Government Espionage in South America and Southeastern Europe.</strong> Cisco Talos published a detailed disclosure of UAT-8302 on 2026-05-05, a China-nexus APT assessed with high confidence to be conducting long-term access operations against government entities — in South American government networks since at least late 2024 and in southeastern European government agencies in 2025 (<a href="https://blog.talosintelligence.com/uat-8302/" target="_blank" rel="noopener noreferrer">Cisco Talos, 2026-05-05</a>; <a href="https://thehackernews.com/2026/05/china-linked-uat-8302-targets.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-05</a>). Post-compromise activity includes network reconnaissance using the open-source gogo scanner, credential extraction with Impacket, lateral movement, and persistent access via an extensive overlapping toolset: NetDraft/NosyDoor (.NET FINALDRAFT variant), CloudSorcerer v3.0, SNOWLIGHT/SNOWRUST (Rust-based VShell stager), Deed RAT/Snappybee (ShadowPad successor), Zingdoor, Draculoader (delivering Crowdoor and HemiGate), Stowaway proxy, and SoftEther VPN. Tooling overlaps link UAT-8302 to multiple Chinese APT clusters — Ink Dragon, Earth Alux, Jewelbug, REF7707, LongNosedGoblin, and Erudite Mogwai/Space Pirates — suggesting a shared digital-quartermaster infrastructure model among Chinese state-adjacent actors. Southeastern European government victims place this campaign within direct EU relevance. No specific initial-access CVEs are disclosed in the public reporting.</p>
<hr/>
<p><strong>ScarCruft / APT37 Deploys BirdCall via Gaming Platform Supply-Chain Attack — First Documented Android Instance.</strong> ESET Research published on 2026-05-05 a detailed investigation into a supply-chain attack conducted by North Korea-aligned ScarCruft (APT37/Reaper) that trojanized both Android and Windows distributions of a Chinese gaming platform popular with ethnic Koreans in China&#39;s Yanbian border region (<a href="https://www.welivesecurity.com/en/eset-research/rigged-game-scarcruft-compromises-gaming-platform-supply-chain-attack/" target="_blank" rel="noopener noreferrer">ESET WeLiveSecurity, 2026-05-05</a>; <a href="https://thehackernews.com/2026/05/scarcruft-hacks-gaming-platform-to.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-05</a>; <a href="https://www.bleepingcomputer.com/news/security/scarcruft-hackers-push-birdcall-android-malware-via-game-platform/" target="_blank" rel="noopener noreferrer">BleepingComputer, 2026-05-05</a>). On Android, game packages were repackaged to inject BirdCall — the first documented Android instance of this malware family — collecting contacts, SMS, call logs, media files, documents, and ambient audio recordings (restricted to 19:00–22:00 local time). On Windows, a mono.dll library in the update mechanism delivered RokRAT, which deployed the Windows BirdCall variant. Both variants use legitimate cloud-storage services (Zoho WorkDrive, pCloud, Yandex Disk) as C2 channels, blending malicious traffic with normal cloud activity. The primary victims are ethnic Korean refugees and defectors in Yanbian — a diaspora population of high intelligence interest to Pyongyang. While no EU victims were identified, the supply-chain methodology, multi-platform implant design, and C2-via-cloud-storage evasion are directly instructive for defenders assessing their own software supply-chain exposure and cloud-service traffic monitoring.</p>
<hr/>
<p><strong>TeamPCP &quot;Mini Shai-Hulud&quot; — SAP npm Supply-Chain Worm with AI Coding Agent Propagation Vector.</strong> The TeamPCP threat actor published malicious versions of four SAP Cloud Application Programming Model (CAP) npm packages on 2026-04-29, injecting preinstall scripts that harvest credentials for GitHub, npm, AWS, GCP, and Azure from developer environments and CI/CD pipelines (<a href="https://isc.sans.edu/diary/TeamPCP+Weekly+Analysis+2026W18+20260427+through+20260503/32950/" target="_blank" rel="noopener noreferrer">SANS ISC Diary, 2026-05-04</a>; <a href="https://www.sophos.com/en-us/blog/-mini-shai-hulud-supply-chain-attack-targets-sap-npm-packages" target="_blank" rel="noopener noreferrer">Sophos X-Ops</a>; <a href="https://research.checkpoint.com/2026/4th-may-threat-intelligence-report/" target="_blank" rel="noopener noreferrer">Check Point Research, 2026-05-04</a>). Stolen credentials are exfiltrated by creating a public GitHub repository on the victim&#39;s own account — using victim infrastructure against itself. The worm component allows republication into additional packages accessible with any stolen npm token. Notably, the campaign injects malicious hooks via <code>.claude/settings.json</code> (Claude Code SessionStart hooks) and <code>.vscode/tasks.json</code> (VSCode task runners), making this one of the first documented supply-chain attacks to weaponise AI coding agent configurations as a propagation vector. Approximately 1,800 GitHub repositories were observed compromised within hours of initial publication. SAP CAP is widely deployed in European public-sector digitalisation and digital-transformation projects; cloud credential harvesting from CI/CD pipelines in these environments creates downstream risk for government cloud tenancies. A related VECT 2.0 ransomware from the same actor contains a critical encryption flaw that renders it a data wiper for files above 128 KB rather than a recoverable encryptor.</p>
<hr/>
<p><strong>[SINGLE-SOURCE] Microsoft Code-of-Conduct AiTM Phishing Bypasses MFA Across 13,000+ Organisations.</strong> Microsoft documented a large-scale adversary-in-the-middle (AiTM) phishing campaign targeting more than 35,000 users across over 13,000 organisations, primarily observed 2026-04-14 to 2026-04-16 (<a href="https://www.microsoft.com/en-us/security/blog/2026/05/04/breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-token-compromise/" target="_blank" rel="noopener noreferrer">Microsoft Threat Intelligence, 2026-05-04</a>) [SINGLE-SOURCE-OTHER]. The attack chain begins with a PDF attachment impersonating an internal code-of-conduct compliance notice, progressing through a Cloudflare CAPTCHA, an intermediate credential-harvesting page, an image-selection challenge, and finally a proxied Microsoft sign-in page that captures live session tokens — bypassing MFA by stealing authenticated tokens rather than credentials. The campaign abused legitimate email delivery services to pass sender-reputation checks. No actor attribution was provided. Targeted sectors included healthcare, financial services, and professional services; cross-border enterprise mail flows create inherent European exposure for multinational organisations.</p>
<hr/>
<p><strong>[SINGLE-SOURCE] Microsoft Edge Stores Browser-Managed Passwords in Plaintext in Process Memory.</strong> A security researcher documented a finding that Microsoft Edge stores all browser-managed passwords in plaintext within process memory, enabling extraction by any local process capable of creating a memory dump using basic string-search tooling (<a href="https://isc.sans.edu/diary/Cleartext+Passwords+in+MS+Edge+In+2026/32954/" target="_blank" rel="noopener noreferrer">SANS ISC Diary, 2026-05-04</a>) [SINGLE-SOURCE-OTHER]. Microsoft reportedly characterises this as intended design, creating a gap between the apparent security of biometric unlock prompts for the password manager and the actual storage model. While requiring local access, this is a significant post-exploitation capability: any code execution on a Windows endpoint running Edge — whether via malware, a compromised extension, or a hijacked user session — trivially extracts all stored passwords without cryptographic decryption. Edge is commonly deployed as the mandated default browser in government environments, where privileged accounts with browser-stored credentials represent a significant latent exposure.</p>
<h2 id="5-deep-dive-cve-2026-31431-copy-fail-deterministic-linux-kernel-local-privilege-escalation">5. Deep Dive — CVE-2026-31431 &quot;Copy Fail&quot;: Deterministic Linux Kernel Local Privilege Escalation</h2>
<p><em>Selection rationale: Active in-the-wild exploitation; CISA KEV with a 2026-05-15 deadline; CERT-EU dedicated advisory; affects all Linux server, container, and CI/CD infrastructure across Swiss and European public-sector environments. No Background paragraph — vulnerability first disclosed 2026-04-29/30, less than six months ago.</em></p>
<hr/>
<h3 id="incident-narrative">Incident Narrative</h3>
<p>CVE-2026-31431, named &quot;Copy Fail&quot; by Ubuntu security researchers, is a local privilege escalation vulnerability in the Linux kernel first disclosed on approximately 2026-04-29/30, with CERT-EU issuing Advisory 2026-005 on 2026-04-30 specifically for EU institution and member-state defenders (<a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-005, 2026-04-30</a>). CISA confirmed active exploitation and added the vulnerability to the Known Exploited Vulnerabilities catalog on 2026-05-01 with a federal remediation deadline of 2026-05-15 (<a href="https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html" target="_blank" rel="noopener noreferrer">The Hacker News, 2026-05-01</a>). BSI Germany updated its advisory on 2026-05-04 confirming in-the-wild exploitation is ongoing (<a href="https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1232" target="_blank" rel="noopener noreferrer">BSI CERT-Bund WID-SEC-2026-1232, updated 2026-05-04</a>).</p>
<h3 id="root-cause-and-mechanism">Root Cause and Mechanism</h3>
<p>The vulnerability results from an unintended interaction between three separate Linux kernel changes made in 2011, 2015, and 2017, related to the <code>AF_ALG</code> (Application-Layer Generic) socket interface for the kernel cryptographic API and the <code>splice()</code> system call (<a href="https://unit42.paloaltonetworks.com/cve-2026-31431-copy-fail/" target="_blank" rel="noopener noreferrer">Unit 42, 2026-05-05</a>). Specifically, a 2017 performance optimisation in the <code>algif_aead</code> (Authenticated Encryption with Associated Data) module introduced a logic defect in how the kernel manages memory ownership during <code>splice()</code> operations on <code>AF_ALG</code> sockets.</p>
<p>An unprivileged process can exploit this defect to perform a controlled, deterministic 4-byte write into the kernel&#39;s <strong>page cache</strong> — the in-memory representation of any file readable by the attacker — without triggering copy-on-write semantics (<a href="https://www.microsoft.com/en-us/security/blog/2026/05/01/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation/" target="_blank" rel="noopener noreferrer">Microsoft Security Blog, 2026-05-01</a>). The page cache is the kernel&#39;s primary mechanism for caching file content in RAM; when an executable is loaded, the kernel reads it from the page cache. Modifications to the page cache affect what the kernel presents when the file is read or executed — <strong>without modifying the on-disk copy of the file</strong>. By targeting setuid-root executables such as <code>/usr/bin/su</code>, <code>/usr/bin/sudo</code>, or <code>/usr/bin/passwd</code>, an attacker can inject attacker-controlled bytes that execute with root privileges the next time the binary is invoked.</p>
<h3 id="why-this-defeats-file-integrity-monitoring">Why This Defeats File Integrity Monitoring</h3>
<p>Conventional file integrity monitoring tools — AIDE, Tripwire, auditd file-watch rules (<code>-w /usr/bin/sudo -p rwxa</code>), and IMA/EVM-based boot attestation — compare on-disk file checksums or extended attributes. Because CVE-2026-31431 modifies only the <strong>kernel page cache</strong> and not the on-disk content, these controls produce <strong>no detection signal for this attack</strong> (<a href="https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available" target="_blank" rel="noopener noreferrer">Ubuntu, 2026-05-01</a>). A setuid binary can be modified and exploited without any detectable change to the on-disk inode, mtime, or cryptographic hash.</p>
<h3 id="exploitation-characteristics">Exploitation Characteristics</h3>
<p>The exploit is deterministic — it requires no timing windows, no kernel address space layout randomisation bypasses, and no kernel-version-specific offsets (<a href="https://unit42.paloaltonetworks.com/cve-2026-31431-copy-fail/" target="_blank" rel="noopener noreferrer">Unit 42, 2026-05-05</a>). A public implementation exists as a 732-byte Python script using only the standard library. Go and Rust reimplementations have appeared in public code repositories. All mainstream Linux distributions shipping kernels between version 4.14 (2017) and 6.19.11 are affected, including Ubuntu 20.04–24.04, RHEL 8/9/10, Amazon Linux 2023, SUSE 16, Debian, and Fedora (<a href="https://access.redhat.com/security/vulnerabilities/RHSB-2026-02" target="_blank" rel="noopener noreferrer">Red Hat RHSB-2026-02</a>).</p>
<h3 id="container-risk">Container Risk</h3>
<p>Docker, LXC, and Kubernetes container runtimes grant container processes access to the <code>AF_ALG</code> subsystem when the <code>algif_aead</code> kernel module is loaded — which is the default on most distributions. A container process exploiting CVE-2026-31431 can modify page-cached setuid binaries on the <strong>host</strong> kernel, enabling container-to-host privilege escalation. Multi-tenant Kubernetes clusters and shared CI/CD runners where untrusted code may execute represent compounded risk surfaces (<a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-005</a>).</p>
<h3 id="att-ck-technique-mapping">ATT&amp;CK Technique Mapping</h3>
<ul><li><strong><a href="https://attack.mitre.org/techniques/T1068/" target="_blank" rel="noopener noreferrer">T1068 — Exploitation for Privilege Escalation</a>:</strong> Core exploitation path — an unprivileged process leverages a kernel vulnerability to obtain root access. Detection focus: process ancestry anomalies where a low-privileged process spawns a shell or root-privileged child following <code>AF_ALG</code> socket activity.</li><li><strong><a href="https://attack.mitre.org/techniques/T1548/001/" target="_blank" rel="noopener noreferrer">T1548.001 — Abuse Elevation Control Mechanism: Setuid and Setgid</a>:</strong> The attacker targets setuid-root binaries to obtain elevated execution context. Detection focus: unexpected execution of setuid binaries (<code>su</code>, <code>sudo</code>, <code>passwd</code>) from atypical parent processes; audit <code>execve</code> events for setuid binaries originating from non-interactive shell sessions.</li><li><strong><a href="https://attack.mitre.org/techniques/T1055/" target="_blank" rel="noopener noreferrer">T1055 — Process Injection</a> (adjacent):</strong> The page-cache modification is functionally analogous to code injection — attacker-controlled bytes are placed into the kernel&#39;s execution buffer for a trusted binary. Standard process-injection detection techniques (memory scanning, binary hollowing detection) do not cover this kernel-layer technique.</li></ul>
<h3 id="detection-concepts">Detection Concepts</h3>
<p>Defenders should consult <a href="https://unit42.paloaltonetworks.com/cve-2026-31431-copy-fail/" target="_blank" rel="noopener noreferrer">Unit 42&#39;s detection guidance</a> and <a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-005</a> for current detection recommendations. Key conceptual targets:</p>
<ol><li><strong>Kernel module load auditing:</strong> Alert on loading of <code>algif_aead</code> and related AF_ALG modules by processes other than kernel init. <code>auditd</code> can generate events on <code>init_module</code> and <code>finit_module</code> system calls; unexpected module loads at runtime are suspicious.</li><li><strong>AF_ALG socket creation in container namespaces:</strong> EDR or eBPF-based monitoring should flag <code>AF_ALG</code> socket creation (<code>socket(AF_ALG, ...)</code>) originating from container network namespaces — this is atypical for standard containerised workloads and highly suspicious in any environment where <code>algif_aead</code> has not been explicitly permitted.</li><li><strong>Setuid binary execution from unexpected parent processes:</strong> Behavioural rules on <code>execve</code> of <code>/usr/bin/su</code>, <code>/usr/bin/sudo</code>, <code>/usr/bin/passwd</code> from parent processes without a matching interactive terminal or pam stack are a post-exploitation signal.</li><li><strong>On-disk FIM is insufficient:</strong> Teams relying solely on file-integrity monitoring for setuid binaries should understand this provides no detection signal for this specific attack. Supplement with runtime behavioural detection.</li></ol>
<h3 id="hardening-and-mitigation">Hardening and Mitigation</h3>
<p>Per <a href="https://cert.europa.eu/publications/security-advisories/2026-005/" target="_blank" rel="noopener noreferrer">CERT-EU Advisory 2026-005</a>, <a href="https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available" target="_blank" rel="noopener noreferrer">Ubuntu</a>, and <a href="https://access.redhat.com/security/vulnerabilities/RHSB-2026-02" target="_blank" rel="noopener noreferrer">Red Hat RHSB-2026-02</a>:</p>
<ol><li><strong>Apply kernel patches.</strong> Patched upstream versions: 6.18.22, 6.19.12, 7.0. Distribution packages are being released; check your distribution&#39;s security advisory feed for the relevant kernel package version and plan a coordinated patch-and-reboot cycle.</li></ol>
<ol><li><strong>Interim mitigation — blacklist <code>algif_aead</code>:</strong> Create a modprobe drop-in to prevent the module from loading, then update the initramfs and reboot. Test that no critical services require <code>algif_aead</code> before deploying at scale. This interim mitigation blocks the exploit but does not address the underlying kernel bug — patching remains the definitive fix.</li></ol>
<ol><li><strong>Container hardening — seccomp:</strong> Apply seccomp profiles that block <code>AF_ALG</code> socket creation for containerised workloads that do not require kernel cryptographic API access. In Kubernetes, enforce Pod Security Standards <code>restricted</code> profile or a custom seccomp profile that denies <code>AF_ALG</code> socket creation. Consider this a layered control rather than a replacement for kernel patching.</li></ol>
<ol><li><strong>CISA KEV federal deadline: 2026-05-15.</strong> Swiss and European public-sector organisations should treat this deadline as a target regardless of formal applicability — it reflects the urgency of active exploitation.</li></ol>
<h2 id="6-updates-to-prior-coverage">6. Updates to Prior Coverage</h2>
<p>No updates this run. This is the first brief in the series; no prior coverage exists to update.</p>
<h2 id="7-verification-notes">7. Verification Notes</h2>
<p><strong>Items verified multi-source:</strong> CVE-2026-31431 (CERT-EU, Microsoft, Unit 42, Ubuntu, BSI, THN); CVE-2026-4670/5174 (Help Net Security, THN, CERT-FR, NVD); CVE-2026-41940 (watchTowr, Rapid7, CyberScoop, Help Net Security, Shadowserver telemetry); CVE-2026-23918 (THN, CERT-FR); CVE-2026-32305 (NVD, CERT-FR); ScarCruft/BirdCall (ESET, THN, BleepingComputer); UAT-8302 (Cisco Talos, THN); TeamPCP SAP npm worm (SANS ISC, Sophos X-Ops, Check Point); DigiCert support portal (Help Net Security, SecurityWeek); Instructure (BleepingComputer, TechCrunch, SecurityWeek); Trellix (BleepingComputer, THN); ADT (ADT newsroom, SEC 8-K); Mediaworks Hungary (The Record, Security Boulevard, company statement); Germany .de DNSSEC outage (IP.network, SecurityWeek, heise Security).</p>
<p><strong>Items marked [SINGLE-SOURCE-NATIONAL-CERT]:</strong></p>
<ul><li>NCSC Switzerland &quot;Double Phishing&quot; advisory (§ 2) — single source: NCSC Switzerland Im Fokus, 2026-05-05.</li><li>CERT-FR batch advisories (§ 2) — single source per advisory: ANSSI/CERT-FR cert.ssi.gouv.fr; CVE identifiers for PaperCut, Thunderbird, QNAP, VMware Tanzu, and Android advisories were not retrieved in this run — administrators must consult the CERT-FR advisories directly for full CVE listings.</li><li>Europol IOCTA 2026 (§ 4) — single source: Europol / EC Migration &amp; Home Affairs, 2026-04-28.</li></ul>
<p><strong>Items marked [SINGLE-SOURCE-OTHER]:</strong></p>
<ul><li>Microsoft AiTM &quot;Code of Conduct&quot; phishing campaign (§ 4) — single source: Microsoft Threat Intelligence blog, 2026-05-04. No independent corroboration retrieved.</li><li>Microsoft Edge cleartext passwords (§ 4) — single source: SANS ISC Diary, 2026-05-04. No independent corroboration retrieved.</li></ul>
<p><strong>Items dropped:</strong></p>
<ul><li><strong>Fiserv / Everest group:</strong> Everest ransomware group listed Fiserv on its leak site approximately 2026-05-03. Fiserv has issued no public statement. Dropped per Prime Directive 6 (ransomware leak-site claim without victim confirmation or HIGH-reliability journalism corroboration).</li><li><strong>Medtronic / ShinyHunters:</strong> ShinyHunters claimed a Medtronic breach (alleged 9 million records) on 2026-05-04. Medtronic has issued no public statement. Dropped pending victim confirmation.</li></ul>
<p><strong>Unconfirmed vector noted:</strong> ADT breach vector (vishing attack on Okta SSO account, followed by Salesforce exfiltration) was claimed by the ShinyHunters threat actor. ADT&#39;s official disclosures do not confirm this vector. Reported in § 3 with clear attribution to the attacker&#39;s claim.</p>
<p><strong>Recency window notes:</strong></p>
<ul><li>Europol IOCTA 2026 (§ 4) was published 2026-04-28 — eight days before this brief, outside the standard 72-hour recency window (and outside an extended 72-hour window for actively developing items). Included as first coverage for this brief series given its high relevance to the EU public-sector audience; will not be re-summarised in subsequent briefs per Prime Directive 9.</li><li>France ANTS breach: primary breach event (detected 2026-04-13, citizen notification 2026-04-22) falls outside the 72-hour window. Included because the suspect detention (2026-04-25) was widely reported as a material new development during this reporting window (coverage 2026-05-04), and this is a high-relevance ongoing story at a peer EU government identity registry.</li><li>CVE-2026-31431 CERT-EU advisory was published 2026-04-30 (outside 72h); the BSI Germany advisory update on 2026-05-04 and the CISA KEV listing with a 2026-05-15 deadline confirm this as an actively developing item within the window.</li></ul>
<p><strong>Source failures (consecutive_failures incremented in sources.json):</strong></p>
<ul><li>CISA.gov (cisa-kev, cisa-advisories, cisa-news, cisa-directives): HTTP 403 on direct fetches. KEV and advisory data obtained via corroborating secondary sources.</li><li>inside-it.ch: HTTP 403.</li><li>CSIRT Italia / csirt-acn-it: HTTP 403.</li><li>PRODAFT / prodaft: HTTP 403.</li><li>UK ICO / ico-uk: HTTP 403. UK ICO breach notifications not covered in this run.</li><li>Cisco Talos / talos: HTTP 403 on direct fetch; UAT-8302 content obtained via The Hacker News corroboration.</li></ul>
<p><strong>Sources with no qualifying items in the reporting window (fetched, no failures):</strong> NCSC UK, CERT Polska, Tenable Research, Rapid7 (no new in-window posts beyond cPanel ETR), watchTowr Labs (no new in-window posts beyond cPanel), ZDI, VulnCheck, GreyNoise, Shadowserver (telemetry used via secondary reporting), Volexity, The DFIR Report, Krebs on Security, Sekoia.io, Citizen Lab, CNIL France, EDPB.</p>
<p><strong>Coverage gaps:</strong> CCN-CERT Spain (not fetched, sub-agent budget limit); GovCERT.ch advisory archive (navigation page only); CERT.at and GovCERT Austria (navigation pages only, no dated advisory content returned); NCC Group Research, WithSecure Labs, Dragos, SANS ICS, Cloudflare Cloudforce One, Akamai SIRT, Elastic Security Labs, Group-IB, Secureworks CTU, Red Canary, Huntress, Sygnia — not fetched in this run.</p>]]></content:encoded></item></channel></rss>