Threat Newsletter March 23, 2026

Share
Threat Newsletter March 23, 2026
Photo by Nijwam Swargiary / Unsplash

This week’s threat landscape highlights a sharp mix of ransomware and extortion pressure, credential-driven breaches, and active exploitation of high-impact enterprise and management-plane vulnerabilities. Healthcare and service providers remain prime targets, while phishing and social engineering continue to enable account takeovers and sensitive data exposure. At the same time, defenders should plan for growing fraud and intrusion capacity as deepfake-enabled social engineering and AI-assisted offensive workflows accelerate.

Payload Ransomware Targets Healthcare: Royal Bahrain Hospital Hit

Payload Ransomware claims it breached Royal Bahrain Hospital and stole about 110 GB of data.

Key Takeaways

New Ransomware Group: Payload Ransomware says it posted proof on its Tor leak site regarding breaching Royal Bahrain Hospital and is threatening to publish the data if a ransom is not paid by March 23.

Why it matters: Healthcare breaches can quickly become patient data exposure + operational disruption risks, and “proof posted” often signals high likelihood of follow through if not mitigated.

Payload Ransomware claims the hack of Royal Bahrain Hospital
The Payload Ransomware group claims to have breached the Royal Bahrain Hospital (RBH), a leading healthcare facility in Bahrain.

Hackers Breach Loblaw Network Segment, Access Basic Customer Records

Loblaw disclosed an ongoing investigation into a breach where threat actors accessed a contained, non-critical segment of its IT network that stored customer records. The company says basic contact information was exfiltrated, while passwords, payment card data, and health or pharmacy data were not impacted.

Key takeaways

What was exposed: Customer names, email addresses, and phone numbers.

What was not exposed (per Loblaw): Passwords, credit card/payment data, and health/pharmacy information.

Why it matters: Stolen contact info often fuels phishing and smishing campaigns.

User action: Be cautious of messages claiming to be from Loblaw, and avoid clicking links or sharing login details.

Loblaw Data Breach - Hackers Accessed IT Network and Customer Information
Loblaw Companies Limited is investigating a corporate data breach after threat actors infiltrated part of its IT network.

Telus Digital Investigates Breach Amid 1 Petabyte Data-Theft Claim

Telus Digital confirmed it is investigating a security incident after ShinyHunters claimed a multi-month breach and theft of nearly 1 petabyte of data. The alleged dataset includes a wide mix of information tied to Telus Digital’s BPO operations and, reportedly, some Telus telecom-related call records. Telus says it has engaged forensics support, is working with law enforcement, and is notifying impacted customers as its investigation continues.

Key takeaways

Who: ShinyHunters claims responsibility; Telus Digital confirmed an incident.

Scale (unconfirmed): Threat actor claims ~1 PB stolen. The total size has not been independently verified.

Why it matters: BPO providers can be high-impact targets because they may store or access data for many customer organizations.

Initial access claim: ShinyHunters alleges it used Google Cloud credentials found in data from the Salesloft/Drift breach, then searched data for more secrets to pivot further.

Extortion: ShinyHunters reportedly demanded $65M; a source indicated Telus was not engaging.

Defender note: Expect potential downstream impacts to customer environments and increased risk of credential exposure, targeted phishing, and fraud tied to support/call-center datasets.

Telus Digital confirms breach after hacker claims 1 petabyte data theft
Canadian business process outsourcing giant Telus Digital has confirmed it suffered a security incident after threat actors claimed to have stolen nearly 1 petabyte of data from the company in a multi-month breach.

Attempted Breach at Poland Nuclear Research Institute Blocked by Security Controls

Poland’s National Center for Nuclear Research (NCBJ) reported an attempted cyberattack targeting its IT infrastructure. The institute says security systems and internal procedures detected and blocked the activity before systems were compromised, and operations of the MARIA research reactor were not impacted.

Key takeaways

Outcome: Attempted attack was thwarted, with no confirmed system integrity compromise reported.

Operational impact: NCBJ says the MARIA reactor continued operating safely.

Attribution: No official attribution. Reporting cited possible Iran-linked indicators, but investigators cautioned they could be false flags.

Response actions: Authorities notified, investigation opened, and internal teams placed on high alert.

Why it matters: Even unsuccessful activity against nuclear/critical research organizations is high-signal and may indicate follow-on attempts against related government or energy-sector targets.

Poland’s nuclear research centre targeted by cyberattack
Poland’s National Centre for Nuclear Research (NCBJ) says hackers targeted its IT infrastructure, but the attack was detected and blocked before causing any impact.

Starbucks Reports Employee Data Breach After Partner Central Phishing Attack

Starbucks disclosed a breach affecting employee (“partner”) accounts in its Partner Central portal after attackers used a phishing campaign with fake lookalike sites to steal credentials. Starbucks says its corporate network was not directly compromised, but the unauthorized access may have exposed employee personal data, and impacted employees are being offered identity protection services.

Key takeaways

How it happened: Phishing + credential theft led to unauthorized access to Partner Central accounts.

Who was impacted: Nearly 900 employees (per a filing with the Maine AG).

What data may be exposed: Name, Social Security number, date of birth, and bank account/routing details (per employee notifications).

Timeline: Unauthorized access occurred between Jan 19 and Feb 11, and Starbucks detected the issue on Feb 6.

Why it matters: This is a high-risk identity-theft dataset. Expect W-2/payroll scams, account takeover attempts, and targeted phishing.

Defender note: Reinforce anti-phishing controls, enforce MFA on employee portals, and monitor for credential reuse across SSO and payroll/benefits tooling.

Starbucks Breach Exposes Employee Data and Financial Info
Starbucks’ 2026 breach exploited phishing to steal employee credentials, compromising sensitive PII and financial data, increasing identity theft risk.

The New Wave of Deepfake Fraud: Voice Clones, Fake Videos, Real Losses

Deepfake-enabled fraud is accelerating as attackers use AI to convincingly impersonate people through voice, video, images, and text. IBM highlights how businesses are seeing growing losses from deepfake calls to bypass voice authentication, social engineering of help desks and finance teams, and AI-altered documents used to defeat KYC/AML controls.

Key takeaways

Where it’s hitting: Call centers and internal help desks are prime targets for voice-clone social engineering.

Common uses: Impersonating executives, bypassing bio-metrics, generating convincing phishing text at scale, and submitting AI-altered documents for account opening and fraud.

Why it’s growing: Deepfake tools are cheaper and easier to use, lowering the barrier for attackers.

Business impact: Financial theft, account takeovers, identity fraud, and reputational damage.

Defender note: Treat voice as a weak factor. Add out-of-band verification, strengthen help desk identity proofing, harden KYC/AML workflows, and adopt multi-modal deepfake detection (audio/video/image/text) where it supports business processes.

How a new wave of deepfake-driven cyber crime targets businesses | IBM
Dive into the world of deepfakes — how these attacks came into being and how to detect this dangerous synthesized content.

EU Sanctions iSoon and Other Firms for Supporting Cyberattacks in Europe

The European Council imposed sanctions on three companies (two in China, one in Iran) for allegedly supporting or carrying out cyberattacks affecting European countries. The sanctioned entities include Integrity Technology Group and Anxun Information Technology (iSoon), plus the Iranian firm Emennet Pasargad. The measures restrict doing business in the EU, freeze EU-based assets, and include travel bans for iSoon’s founders.

Key takeaways

Who was sanctioned: Two China-based firms (Integrity Technology Group, iSoon) and one Iran-based firm (Emennet Pasargad), plus two iSoon founders.

Why: Alleged support for, or execution of, cyberattacks impacting European targets.

What sanctions do: Ban EU business, freeze EU assets, and impose travel restrictions on named individuals.

Why it matters: Highlights the use of “private” companies as state-linked cyber capability providers and signals increased regulatory risk for vendors tied to offensive cyber operations.

Defender note: Sanctions rarely stop operations outright, but they can constrain funding, infrastructure, and partnerships. Track associated infrastructure and TTPs for potential follow-on activity and targeting.

Europe sanctions Chinese and Iranian firms for cyberattacks
The European Union Council has announced sanctions against three entities and two individuals for their involvement in cyberattacks targeting critical infrastructure in the region.

China-Linked Threat Actors Used Novel Backdoors to Persist in Southeast Asia Military Targets

Palo Alto Networks Unit 42 reported a long-running cyber espionage campaign targeting Southeast Asian military organizations, attributed with moderate confidence to China-nexus actors (tracked as CL-STA-1087). The activity dates back to at least 2020 and used novel backdoors and stealth techniques, including abuse of legitimate cloud/content services for command-and-control.

Key takeaways

Who/track: Unit 42 attributes the cluster to China-nexus actors with moderate confidence; tracked as CL-STA-1087.

Targets: Southeast Asian military organizations, focused on intelligence collection (not smash-and-grab theft).

Tools: New backdoors AppleChris and MemFun, plus a customized Getpass credential stealer.

Stealth & C2: Used dead-drop resolvers and legitimate services like Pastebin and Dropbox to hide C2, plus evasion like delayed execution and timestomping.

Why it matters: Long-dwell, high-discipline access suggests ongoing collection and potential follow-on operations against partner networks.

Defender note: Tighten controls/monitoring for “legit” services (Pastebin/Dropbox) if not business-required, and hunt for suspicious PowerShell, timestomping, and published IOCs.

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
China-linked CL-STA-1087 targets Southeast Asian militaries since 2020 using AppleChris and MemFun for espionage and credential theft.

New DarkSword iOS Exploit Kit Enables Full Device Takeover via Zero-Day Chain

Researchers reported a full-chain iOS exploit kit dubbed DarkSword that has been used since at least Nov 2025 by multiple actors, including commercial surveillance vendors and suspected state-linked operators. The kit chains six vulnerabilities (including three zero-days at the time) to gain privileged access on iPhones and rapidly steal a broad set of sensitive data, often via watering-hole style delivery through compromised websites.

Key takeaways

What it is: A full iOS exploit chain + infostealer (JavaScript-based) capable of full device takeover and fast data theft.

Who’s using it: Multiple clusters tied to espionage and commercial surveillance (e.g., UNC6353, UNC6748, and activity linked to PARS Defense).

Targets observed: Campaigns targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine.

How it works (high level): Web delivery via Safari → sandbox escapes → privilege escalation → data harvesting modules → exfiltration.

Vulns/patching: Chains 6 CVEs; 3 were zero-days before Apple patches (notably CVE-2026-20700, CVE-2025-43529, CVE-2025-14174). Ensure iOS devices are fully updated.

Why it matters: Demonstrates rapid exploit proliferation across actors and high risk to executives, journalists, dissidents, and high-value mobile users.

Defender note: Prioritize iOS patch compliance, monitor for watering-hole exposure, and consider mobile threat defense for high-risk users.

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover
DarkSword exploit targets iOS 18.4–18.7 using 6 flaws and 3 zero-days, enabling rapid data theft from iPhones across multiple countries.

Okta Helps Takedown ShieldGuard Infrastructure Used for Crypto Wallet Theft

Okta Threat Intelligence reported disrupting “ShieldGuard,” a crypto scam that promoted a browser extension marketed as wallet protection. Analysis showed the extension was designed to harvest wallet addresses and exfiltrate sensitive page content from major crypto platforms (and some Google services), enabling theft and fraud. Okta and partners worked to remove the extension and disrupt its command-and-control infrastructure.

Key takeaways

What it was: A malicious Chrome extension posing as a crypto wallet security tool.

Lure: Multi-level marketing + airdrop incentives to drive installs.

Data theft behavior:

  • Harvested wallet addresses via EIP-6963 wallet discovery.
  • Exfiltrated full page HTML (potentially balances and transaction history) from sites like Binance, Coinbase, OpenSea, Uniswap.

Control & evasion: Contacted a C2 at shieldguards[.]net to fetch scripts and run arbitrary code, while tracking users with persistent UUIDs.

Disruption actions: Extension removed from Chrome Web Store, domain/hosting/registrar actions taken to cut off C2, and sign-in functionality disabled.

Defender note: Enforce extension allowlisting on managed browsers, minimize plugins on high-risk workflows (finance/crypto), and monitor for suspicious traffic to content hosting/C2 infrastructure.

Disrupting ShieldGuard: a security extension primed to drain crypto wallets

North Korea’s Fake IT Worker Network Funnels $500M a Year and Infiltrates Western Firms

Researchers (IBM X-Force and Flare) detailed how North Korea-backed “fake IT worker” schemes place remote workers into Western companies using false or borrowed identities. Beyond generating revenue for the regime, these placements can also enable access to sensitive systems and data.

Key takeaways

Scale & funding: US government estimates suggest up to ~100,000 workers across many countries, generating ~$500M/year.

How the scheme works: An ecosystem of recruiters, facilitators, workers, and Western collaborators/brokers helps candidates obtain jobs and maintain access.

Tradecraft indicators: Use of stolen/synthetic identities, heavy reliance on translation tools, and coordination tooling (reported examples include North Korea-linked VPN tooling and lightweight messaging).

Why it matters: This is an insider access problem. Once hired, workers can gain privileged access and potentially support data theft or follow-on compromise.

Simple defensive steps: Strengthen remote hiring verification (identity and location checks), watch for interview anomalies (face/voice manipulation), validate resume claims, and require managed devices and least privilege for new hires.

North Korean’s 100k fake IT workers net $500M a year for Kim
: Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators

AI Outscores 99% of Humans in Elite Hacking Competitions

A report claims a startup’s AI system outperformed more than 99% of approximately 125,000 human competitors across six elite capture-the-flag (CTF) hacking competitions. The result suggests AI is increasingly capable at solving vulnerability-style challenges that resemble real-world attacker workflows.

Key takeaways

What happened: AI reportedly placed in the top 1% across six CTF events.

Why it matters: Strong CTF performance can translate into faster bug finding, exploit-chaining, and automation of repetitive attacker steps.

Defender impact: Expect shorter “time-to-exploit,” with more opportunistic scanning and faster weaponization once bugs are known.

Simple actions: Tighten patch SLAs for internet-exposed services, reduce exposed attack surface, and ensure detections cover exploit chains (web → privilege escalation → credential/data access).

This Startup’s AI Beat 99% Of Humans In Six Elite Hacking Competitions
Every year, more than 100,000 seasoned cybersecurity pros compete in global hacking competitions, designed to show off their abilities at picking apart

FBI/CISA Alert: Signal Account Takeovers Using Fake “Security Support” Messages

FBI and CISA warned of a phishing campaign attributed to Russian intelligence services that targets Signal users by stealing authentication codes or getting victims to scan malicious QR codes. Rather than breaking encryption, the actors aim to take over accounts by abusing Signal’s linked devices feature, giving them access to messages, groups, and contacts.

Key takeaways

The weakness isn’t encryption: The campaign focuses on social engineering and account takeover, not cryptographic compromise.

How it works: Fake “Signal Security/Support” messages create urgency and request an SMS code or QR scan to “verify” the account.

What attackers gain: Access to conversations and groups, plus the ability to impersonate the victim and phish trusted contacts.

Who is targeted: High-value individuals (government, military, political figures, journalists), but tactics can spread broadly.

Simple defenses: Never share verification codes, never scan unsolicited QR codes, and routinely check Signal’s linked devices list and remove anything unknown.

FBI, CISA Warn Russian Hackers Are Targeting High-Value Individuals Through Signal
FBI and CISA have recently released a joint cybersecurity advisory regarding a widespread phishing campaign.

Oracle Releases Emergency Patch for Critical Oracle Identity Manager RCE (CVE-2026-21992)

Oracle released an out-of-band security update for CVE-2026-21992, a critical, unauthenticated remote code execution (RCE) vulnerability affecting Oracle Identity Manager and Oracle Web Services Manager. With a CVSS 9.8 rating and no required authentication, exposed systems could be fully compromised if not patched quickly.

Key takeaways

Severity: Critical (CVSS 9.8) and remotely exploitable with no auth and no user interaction.

Affected products: Oracle Identity Manager (REST Web Services) and Web Services Manager (Web Services Security), including versions 12.2.1.4.0 and 14.1.2.1.0.

Impact: Successful exploitation could enable full system takeover, credential theft, and lateral movement.

What to do now: Apply Oracle’s patches immediately and prioritize any internet-facing middleware endpoints.

Mitigation while patching: Review and restrict HTTP/HTTPS exposure to the affected services, and monitor for suspicious requests to the relevant web service endpoints.

Oracle Issues Urgent Security Update for Critical RCE Flaw in Identity Manager and Web Services Manager
Oracle has issued an out-of-band Security Alert addressing a critical remote code execution (RCE) vulnerability, CVE-2026-21992, affecting two widely deployed Fusion Middleware components, Oracle Identity Manager and Oracle Web Services Manager.

CISA Warns Cisco Firewall Management 0-Day Is Being Exploited in Ransomware Attacks (CVE-2026-20131)

CISA warned that CVE-2026-20131 is being actively exploited in ransomware campaigns targeting Cisco firewall management products. The flaw is an unauthenticated deserialization issue in the web management interface that can allow remote code execution as root, making it a high-risk path to rapid network compromise.

Key takeaways

What’s vulnerable: Cisco Secure Firewall Management Center (FMC) and Security Cloud Control (SCC) Firewall Management.

Exploit impact: Unauthenticated remote root RCE via deserialization of untrusted data (CWE-502).

Why it matters: Management consoles provide centralized control. Compromise can enable policy tampering, lateral movement, and fast ransomware deployment.

Status: Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog due to active exploitation.

What to do now: Apply Cisco’s fixes/mitigations immediately. If patching is delayed, restrict access to the management interface (IP allowlists/VPN/admin network only) or take it offline until secured.

CISA Warns of Cisco Secure Firewall Management Center 0-Day Exploited in Ransomware Attacks
An urgent warning highlights a critical zero-day in Cisco products, now added to the CISA Known Exploited Vulnerabilities Catalog after active exploitation in ransomware campaigns.

Active Exploitation: Microsoft SharePoint RCE Vulnerability CVE-2026-20963

CISA warned that CVE-2026-20963, a critical SharePoint Server vulnerability patched in January 2026, is now being exploited in the wild. The flaw is an unauthenticated deserialization issue that can allow attackers to achieve remote code execution (RCE) on unpatched on-prem SharePoint servers.

Key takeaways

What’s vulnerable: SharePoint Enterprise Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition.

Exploit impact: Unauthenticated RCE in low-complexity, network-based attacks (deserialization of untrusted data).

Also at risk: SharePoint 2007/2010/2013 are vulnerable but end-of-support. Upgrade is required (no patches).

Status: Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, with an urgent patch deadline for US federal agencies.

What to do now: Patch immediately, audit for any exposed SharePoint servers, and reduce external exposure where possible.

Critical Microsoft SharePoint flaw now exploited in attacks
A critical Microsoft SharePoint vulnerability patched in January is now being exploited in attacks, the Cybersecurity and Infrastructure Security Agency (CISA) warned.

Patch Now: ScreenConnect Vulnerability Exposes Machine Keys, Enables Auth Bypass

ConnectWise warned of a critical ScreenConnect vulnerability (CVE-2026-3564) that could allow attackers to extract server-level machine keys and then forge or manipulate session authentication, enabling session hijacking and access bypass. The issue affects on-prem ScreenConnect deployments prior to 26.1; cloud-hosted instances have already been mitigated by ConnectWise.

Key takeaways

Severity: CVSS 9.0 (critical-to-important range), priority 1 advisory.

What’s vulnerable: ScreenConnect versions prior to 26.1 (on-prem).

What can happen: Attackers can extract machine keys and impersonate/hijack sessions by forging auth tokens.

Why it matters: Remote access tooling is high-value. Compromise can lead to rapid lateral movement and follow-on ransomware/credential theft.

What to do now: Upgrade to ScreenConnect 26.1 immediately, and audit for anomalous authentication/session activity.

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions
ConnectWise has issued an urgent security advisory for its ScreenConnect remote desktop software, disclosing a critical cryptographic vulnerability that could allow unauthenticated attackers to extract server-level machine keys and hijack session authentication.

LeakNet Ransomware Abuses ClickFix Lures to Deliver In-Memory Payloads

LeakNet ransomware operators are using the ClickFix social engineering technique via compromised websites to trick users into manually running malicious commands (often framed as fixing a fake error). Once executed, the intrusion chain can deploy a Deno-based in-memory loader that stages additional payloads with limited on-disk artifacts, leading into a repeatable post-exploitation sequence that can culminate in ransomware.

Key takeaways

Initial access: Compromised sites show fake CAPTCHA/verification prompts that instruct users to run a malicious msiexec command.

Execution technique: Uses a Deno (JavaScript runtime) loader to run Base64-encoded JavaScript in memory, reducing disk evidence.

Why it matters: This “wide net” technique reduces reliance on initial access brokers and can scale quickly.

Post-compromise pattern: Observed sequences include DLL side-loading, lateral movement via PsExec, data exfiltration, then encryption.

Defender note: Alert on unusual msiexec from Run dialogs, hunt for Deno/BYOR runtime usage, and watch for PsExec + klist activity and suspicious outbound traffic to cloud storage (e.g., S3).

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
LeakNet uses ClickFix via compromised sites to gain access, enabling stealth attacks and scalable ransomware operations.

New SILENTCONNECT Loader Deploys ScreenConnect Using PEB Masquerading and UAC Bypass

SILENTCONNECT is a multi-stage malware loader observed since at least March 2025 that uses phishing and living-off-the-land techniques to install ConnectWise ScreenConnect for hands-on remote access. It relies on VBScript and in-memory PowerShell execution, then uses PEB masquerading and a UAC bypass to evade defenses and establish persistent control.

Key takeaways

Initial access: Phishing link → fake Cloudflare Turnstile CAPTCHA → downloads a VBScript lure (e.g., “E-INVITE.vbs”).

Execution chain: VBScript triggers in-memory PowerShell that downloads/compiles a C# loader at runtime (minimal on-disk artifacts).

Defense evasion: Uses PEB masquerading (spoofs process/module names like winhlp32.exe) to hide from EDR that relies on PEB metadata.

Privilege & persistence: Performs a UAC bypass and adds Microsoft Defender exclusions before installing ScreenConnect.

Impact: ScreenConnect gives attackers full interactive control, enabling credential theft, lateral movement, and follow-on ransomware.

Defender note: Alert on VBScript-from-internet + PowerShell Add-Type, unexpected Defender exclusion changes, msiexec installing ScreenConnect, and outbound connections to unknown ScreenConnect servers (notably TCP/8041).

SILENTCONNECT Uses VBScript, PowerShell and PEB Masquerading to Deploy ScreenConnect
SILENTCONNECT uses VBScript and PowerShell to install ScreenConnect via phishing CAPTCHA, giving attackers full control of Windows PCs.

Read more