Cybersecurity Alert: Surge in Attacks, New Malware, FTC Settlement, and Industrial Vulnerabilities

Cybersecurity Alert: Edge Password Vulnerability, ICS Zero-Days, and Urgent Patch Updates

The cybersecurity landscape is witnessing a surge in attacks exploiting familiar vulnerabilities, underscoring the need for heightened vigilance. Threat actors are leveraging outdated software, deceptive applications, and compromised credentials to infiltrate systems. The rapid advancement of AI tools has further accelerated the discovery and exploitation of these vulnerabilities, compelling organizations to expedite their patching processes.

1. Credential Theft Campaign: Emergence of MicroStealer

A new malware variant, MicroStealer, has been identified targeting the education and telecommunications sectors. First detected in December 2025, MicroStealer specializes in exfiltrating browser credentials, active session data, screenshots, cryptocurrency wallets, and system information. Its sophisticated multi-stage delivery mechanism allows it to spread rapidly with low detection rates, utilizing Discord webhooks and attacker-controlled servers for data exfiltration.

2. Location Data Misuse: FTC and Kochava Settlement

The Federal Trade Commission (FTC) has reached a settlement with location data broker Kochava and its subsidiary, Collective Data Solutions. The agreement prohibits the companies from selling, sharing, or disclosing sensitive location data without explicit consumer consent. Investigations revealed that Kochava had been illegally collecting and selling consumers’ annual incomes, mobile device IDs, app usage, and near real-time geolocation data within a 10-meter accuracy, all without user consent. As part of the settlement, Kochava is required to implement a data retention schedule mandating the deletion of consumer data within a predetermined timeframe.

3. Advancements in Email Security: Proton Mail’s Post-Quantum Encryption

Proton Mail has introduced optional support for post-quantum encryption (PQC) to enhance email security. This feature enables the generation and use of post-quantum-ready keys for new encrypted emails, safeguarding personal and business communications against current threats and potential future vulnerabilities in public-key cryptography. It’s important to note that enabling PQC protects new encrypted emails moving forward and does not retroactively re-encrypt existing emails in the mailbox.

4. Strengthening Supply Chain Security: pnpm 11’s New Measures

The release of pnpm 11 introduces new security measures aimed at mitigating supply chain attacks. Key features include setting a default minimum release age of 24 hours to reduce the risk of installing compromised packages and blocking exotic sub-dependencies that resolve from non-standard sources, such as Git repositories or direct tarball URLs. This approach aims to prevent the immediate installation of potentially malicious packages, thereby enhancing overall security.

5. Legal Actions Against Cybercrime: South Korean Court’s Ruling

South Korea’s highest court has upheld a one-year prison sentence for Oh Dae-hyun, who hired a North Korean cybercriminal to attack rival game servers. Between October 2014 and March 2015, Oh paid over $16,300 to the hacker to conduct distributed denial-of-service (DDoS) attacks on competing gaming servers. The North Korean national involved is believed to be a head of the development team at a trading company under the Workers’ Party of Korea, which has been implicated in creating and selling DDoS attack programs and cyberterrorism tools to generate revenue for Pyongyang.

6. Industrial Control Systems Vulnerabilities: Eclipse BaSyx V2 Flaws

Two critical security vulnerabilities have been identified in Eclipse BaSyx V2, posing significant risks to industrial environments. The vulnerabilities include an unauthenticated path traversal flaw (CVE-2026-7411) that could allow arbitrary file writing leading to code execution, and a blind server-side request forgery (SSRF) flaw (CVE-2026-7412) that forces the BaSyx server to act as a proxy, executing HTTP POST requests to arbitrary internal or external targets. These issues have been addressed in version 2.0.0-milestone-10. Exploitation of these flaws could enable attackers to bypass network segmentation, potentially sending unauthorized commands to isolated Programmable Logic Controllers (PLCs) and industrial sensors, thereby threatening physical manufacturing lines.

7. Exposure of MOVEit Automation Instances

Censys, an attack surface management platform, has observed fewer than 100 exposed MOVEit Automation web admin interfaces globally, with nearly two-thirds located in the U.S. This development follows the discovery of CVE-2026-4670, a critical authentication bypass vulnerability in MOVEit Automation that could result in unauthorized access, administrative control, and data exposure.

8. Ransomware Encryption Flaws: VECT 2.0 Analysis

An analysis of VECT 2.0 ransomware binaries has uncovered multiple critical flaws in both full and intermittent encryption modes, rendering data recovery impossible even if a ransom is paid. The FULL encryptor contains an insufficient memory allocation flaw that restricts successful encryption to files 32 KB or smaller.

9. Surge in Smishing Attacks: Global Campaigns

Scammers are sending tens of thousands of fraudulent text messages to mobile users across 12 countries, impersonating transport authorities, toll operators, and parking services. This mass smishing campaign, dubbed Operation Road Trap, has been active since December 2025, with over 79,000 fraudulent messages detected in 40 distinct SMS scam campaigns. Targeted countries include the U.S., Canada, Australia, New Zealand, France, Spain, Colombia, Brazil, India, the U.K., Ireland, and Luxembourg. The messages aim to persuade recipients to pay fake fines, disclose sensitive information, or install spyware.

10. Supply Chain Threats: Malicious NuGet Packages

Five malicious NuGet packages, published under the account bmrxntfj, have been found to typosquat widely used Chinese .NET UI and infrastructure libraries. Each package incorporates a .NET Reactor-protected infostealer payload grafted onto a decompiled copy of a legitimate open-source library. The stealer targets saved credentials across 12 browsers, 8 desktop cryptocurrency wallets, 5 browser wallet extensions, and exfiltrates data to a newly-registered command and control domain. Collectively, these packages have been downloaded approximately 65,000 times.

11. Salesforce Marketing Cloud Vulnerabilities

Five

Article X Post:
Hashtags:
Article Key Phrase:
Category: Security News