Threat Newsletter May 4, 2026
In this week’s newsletter we cover credential-stealing malware and extortion tradecraft, Windows security changes and escalation techniques, and a wave of software supply-chain risks such as GitHub Actions, PyPI, and malicious extensions.
DEEP Python Backdoor Uses Public Tunneling for C2, Steals Browser + Cloud Credentials
Researchers detailed a Python-based backdoor framework dubbed DEEP that establishes long-term access on Windows, uses a public tunneling service (bore[.]pub) for command-and-control, and harvests a broad set of credentials (browsers, Windows Credential Manager, SSH keys, and cloud keys for AWS/GCP/Azure). The intrusion chain starts with a batch script dropper that extracts an embedded Python payload and sets persistence through multiple Windows mechanisms while attempting to evade detection by tampering with security/telemetry features.
Key Takeaways
Initial vector: Likely phishing leading to execution of a batch dropper that unpacks a Python implant.
C2 technique: Uses a public TCP tunneling service to avoid dedicated attacker infrastructure and blend traffic.
Capability set: Full-featured RAT behavior (remote command exec, recon, keylogging, screenshots/webcam/audio) plus credential theft.
Targeted secrets: Browser credentials (Chrome/Firefox), Windows Credential Manager, SSH keys, and cloud credentials (AWS/GCP/Azure).
Persistence and evasion: Multiple persistence methods (Startup/Run keys/scheduled tasks, optional WMI) and anti-analysis/defense evasion designed to complicate remediation.

New BlackFile Data-Theft Extortion Targets Retail & Hospitality
A new financially motivated extortion group tracked as BlackFile (aka CL-CRI-1116 / UNC6671 / Cordial Spider) has been tied to a wave of vishing-led credential theft targeting retail and hospitality organizations since Feb 2026.
Key takeaways
Initial access: Phone-based social engineering (vishing) + spoofed caller ID posing as IT support.
MFA isn’t enough: They aim to capture one-time pass-codes and then register their own devices to maintain access.
Privilege escalation: They pivot from regular employees to executive-level accounts using internal directories.
Data focus: They pull large volumes of sensitive info via Salesforce APIs and SharePoint download functions (e.g., files labeled “confidential,” “SSN”).
Pressure tactics: Data is published to a dark web leak site and victims are contacted for seven-figure ransoms; swatting is also mentioned as an intimidation tactic.
Defensive actions: Tighten helpdesk/call-handling verification, require stronger caller identity checks, and run regular social-engineering simulations/training for front-line staff.

AI-Generated ZionSiphon OT Malware Falls Apart Under Dragos Analysis
Darktrace reported a new malware sample, ZionSiphon, that appeared aimed at Israeli water treatment/desalination environments and framed it as an OT/ICS threat. Dragos reviewed the code and assessed it as largely non-functional “hype”: the malware contains AI-generated/hallucinated details (fake Windows paths/process checks and bogus “chlorine manipulation” configs), plus logic/config errors that would keep it from operating as claimed.
Key Takeaways
Claim: ZionSiphon was described as OT/ICS malware targeting Israeli water facilities (e.g., chlorine manipulation).
Dragos assessment: The code is broken and shows little understanding of ICS/OT in water plants.
AI angle: Portions of the code look LLM-generated, with “fictional” directory/process checks and other hallucinations.
Even if fixed, still not scary: Dragos says it’s riddled with invalid assumptions and wouldn’t meaningfully impact water treatment operations.
Big lesson for defenders: Prioritize resources on known, capable adversaries and validated ICS threats.

Microsoft Gives Organizations a Switch to Remove Copilot from Corporate PCs
Microsoft introduced a new enterprise policy that allows IT administrators to uninstall the Microsoft Copilot app from managed Windows endpoints.
Key Takeaways
What changed: Admins can now remove Copilot using the RemoveMicrosoftCopilotApp policy.
Where it works: Available through Group Policy and Policy CSP for enterprise management (e.g., Intune/SCCM).
Eligibility is limited: Applies only on certain Windows 11 enterprise/pro/education scenarios.
User impact: Copilot is uninstalled, but reinstall remains possible (depending on organization controls).
Why it matters: Gives organizations better control over AI assistant rollout, reducing unwanted exposure/footprint on corporate endpoints.

New PhantomRPC Technique Escalates to SYSTEM via Windows RPC Design Flaw
Security researchers disclosed PhantomRPC, an unpatched Windows local privilege escalation technique rooted in how Windows Remote Procedure Call (RPC) handles connections when a legitimate RPC service/endpoint is not running. An attacker with local foothold can stand up a malicious RPC server that binds to the same endpoint as a real service; when a higher-privileged process connects, the attacker can impersonate that client and escalate to SYSTEM/Administrator.
Key Takeaways
Impact: Local privilege escalation (turn a limited account into SYSTEM/admin), not a remote unauthenticated bug.
Root cause: RPC design behavior lets a process register a legitimate-looking endpoint if the real service isn’t running.
Prerequisites matter: The technique generally requires an already-compromised host and SeImpersonatePrivilege in the attacking context.
Multiple exploit paths: Research describes five different ways to reach elevation from the same architectural weakness.
Mitigations : Reduce where SeImpersonatePrivilege exists, monitor RPC anomalies (e.g., clients connecting to unavailable servers), and ensure expected services/endpoints are running where appropriate.

Checkmarx Says Stolen GitHub Repository Data Is Now Circulating on Dark Web
Summary
Checkmarx said its investigation into a March 23, 2026 supply-chain incident found evidence that data posted on the dark web likely originated from a Checkmarx GitHub repository accessed during that initial compromise.
Key Takeaways
What happened: Data allegedly from Checkmarx’s GitHub repo was posted on a dark web leak site after a supply-chain compromise.
Scope clarification: Checkmarx says the repo is segregated from customer production, and customer data isn’t stored there.
Potential contents : The posting claimed items like source code and credentials/keys (treat as unverified until confirmed).
Response actions: Checkmarx restricted/locked down repo access and continues forensic investigation.
Why it matters: Highlights how supply-chain access to CI/CD or repos can lead to secondary data exposure, even if production systems aren’t directly breached.

Attacker Used PR Comment to Hijack GitHub Actions, Then Shipped Infostealer to PyPI
Attackers compromised the popular elementary-data PyPI package by abusing a GitHub Actions workflow script-injection flaw rather than stealing a maintainer account. A malicious pull request comment triggered the workflow to run attacker-controlled shell code, exposing the workflow GITHUB_TOKEN.
Key Takeaways
Compromised artifact: elementary-data==0.23.3 and related Docker image tags delivered an infostealer.
Initial vector: GitHub Actions script injection ,not necessarily a maintainer credential takeover.
Why it spread fast: The attacker used the project’s legit CI/CD release process, making the release look authentic.
What it stole: Developer secrets like SSH keys, Git creds, cloud creds (AWS/GCP/Azure), CI/K8s/Docker secrets, .env tokens, plus crypto wallet files.
Who’s most at risk: Environments that didn’t pin versions and auto-updated to the malicious release / latest container tag.
Immediate response: Upgrade to 0.23.4, rotate potentially exposed secrets, and restore from a known-good point if 0.23.3 ran.

China-Linked Hacking Suspect Xu Zewei Extradited to U.S., Held in Houston
Italy extradited Xu Zewei from Milan to the United States, where he is being held in Houston, according to his lawyer. U.S. prosecutors allege Xu was involved in China-linked hacking activity, including intrusions targeting COVID-19 vaccine research and activity associated with HAFNIUM (aka Silk Typhoon) and the 2021 Microsoft Exchange attacks. Xu has denied the allegations and says he was mistakenly identified.
Key Takeaways
What happened: Italy extradited an alleged China-linked hacker to the U.S.
Who: Xu Zewei, arrested in July 2025 while in Milan.
What he’s accused of: Computer intrusions tied to COVID-19 research theft and the broader HAFNIUM/Silk Typhoon campaign (per U.S. indictment).
Status: Now detained in Houston; a co-defendant (Zhang Yu) remains at large.
Why it matters: Signals continued cross-border law enforcement pressure on state-linked cyber operations and actors tied to major campaigns.

GlassWorm Shifts Tactics: Benign Extensions Turn Malicious After Update (OpenVSX)
A new wave of the GlassWorm supply-chain campaign is abusing the OpenVSX extension ecosystem with 73 “sleeper” extensions that appear benign at upload but can become malicious after later updates. Researchers report that six of the extensions have already been “activated” to deliver malware, while the remaining extensions are suspected/dormant.
Key Takeaways
What’s new: GlassWorm is using “sleeper” extensions that turn malicious only after an update.
Scale: 73 OpenVSX extensions flagged; 6 observed delivering malware so far.
Deception tactic: Many are clones of legit extensions (similar name/icon/description) — publisher + extension ID are key indicators.
Execution style: Extensions act as loaders (pulling/installing payloads at runtime rather than shipping obvious malware upfront).
Risk: Targets developers and build environments; prior GlassWorm waves focused on credentials/tokens/SSH keys and crypto wallet data.
Response: If installed, remove, rotate secrets, and clean/rebuild affected developer environments; pin/allowlist trusted extensions.

Crypto Theft Enabler Sentenced After Converting Stolen Funds and Buying Luxury Homes
A California man, Evan Tangeman (22), was sentenced to 70 months in prison for helping a cyber-criminal group that stole roughly $260M in cryptocurrency.
Key Takeaways
Sentence: 70 months prison + 3 years supervised release.
Role: Money laundering + logistics (turning stolen crypto into cash, acquiring homes used by the group).
Victim targeting: Group used stolen/purchased data to identify high-value crypto holders, then used social engineering (impersonating Apple/Google/customer support) to steal access.
Scale: The broader crew is tied to thefts totaling ~$260M+; Tangeman is the ninth to plead guilty.
Why it matters: Shows how crypto-theft crews rely on “support roles” (launderers, infrastructure/logistics) to cash out and keep operations running.

Keeping AI Agents From Going Rogue With Your Credit Cards
WIRED reports that the FIDO Alliance, with initial contributions from Google and Mastercard, is forming working groups to create industry standards for validating and protecting agent-initiated payments and transactions, emphasizing phishing-resistant authentication and cryptographic proof of user intent.
Key Takeaways
New risk: AI agents acting on a user’s behalf introduce new fraud paths (agent hijacking/rogue instructions).
Standards in progress: FIDO Alliance is launching working groups to define cross-industry guardrails for agent transactions.
Goal: Provide cryptographic proof of user intent and stronger, phishing-resistant authorization for agent actions.
Notable building blocks: Google’s Agent Payments Protocol (AP2) and Mastercard’s Verifiable Intent framework (designed to work with AP2).
Why it matters: Better transparency, accountability, and dispute/recourse options as agent-driven commerce expands.

Fake Signal Security Bot Used to Hijack Accounts of High-Ranking Germans
German officials are investigating a wave of Signal account phishing that targeted high-ranking politicians (including ministers), military personnel, and journalists. Reports describe messages from a fake Signal “security” chatbot prompting targets to “secure” their accounts; victims who entered a PIN or scanned a QR code inadvertently linked their Signal account to an attacker-controlled device, enabling the attacker to read chats and access associated data. German sources suspect Russia may be behind the activity, though official attribution was not confirmed in the reporting.
Key Takeaways
Target set: Senior politicians, military personnel, and journalists (Germany).
Tactic: Phishing via a fake Signal security bot urging urgent action.
Mechanism: Tricked users into entering a PIN/scanning a QR code, which linked accounts to attacker devices (a “linked devices” style takeover).
What attackers gain: Access to past and ongoing chats, plus contact/address book data stored by the user.
Attribution status: Germany suspects Russia, but attribution was described as not yet officially confirmed.
Defensive takeaway: Treat unexpected “security” messages as suspicious; use strict verification, and review/lock down linked devices and account settings.

From Awareness to Enforcement: States Ramp Privacy Penalties in 2025
Gartner reports that U.S. states issued $3.45B in privacy-related fines in 2025—more than the previous five years combined—signaling a shift from privacy “awareness” to full-scale enforcement. The increase is driven by maturing state privacy laws (notably California), expanded enforcement capacity, multi-state coordination to pursue violations across state lines, and growing regulatory focus on privacy risks tied to AI/automated decision-making.
Key Takeaways
Big number: $3.45B in state privacy fines in 2025 (record-setting vs. prior years).
Enforcement ramp: Regulators are moving from guidance to aggressive investigations and penalties.
California effect: CPPA enforcement broadened beyond big tech to mid-sized and smaller firms across industries.
Multi-state pressure: States are coordinating via efforts like the Consortium of Privacy Regulators to enforce common rights (access/delete/opt-out of sale).
AI privacy is a driver: Increased scrutiny of how data is used for AI training and inferences.
Outlook: Gartner expects fines and enforcement intensity to keep rising into 2026.

0APT vs. KryBit: Leak-Site Hackback Exposes Panels, Affiliates, and Victim Chats
Researchers say ransomware groups 0APT and KryBit leaked and attacked each other’s infrastructure in a “turf war” that exposed operational details on both sides.
Key Takeaways
What happened: Two ransomware crews doxed/hacked each other and leaked operational data.
KryBit exposure: Admin panel data (operators/affiliates + negotiation info), with activity spanning late March–mid April 2026.
0APT exposure: Access logs/source/system files leaked; logs suggested 0APT’s claimed 190+ victims were fake with no exfiltration evidence.
Operational takeaway: Ransomware groups rely on “credibility”; rivals will weaponize leaks to undermine trust and disrupt operations.
Defender takeaway: Don’t assume “victim counts” on leak sites are reliable; treat leak-site claims as intel leads to validate, not ground truth.
Near-term expectation: Both actors may rebuild/rebrand infrastructure, making tracking noisier in the short term.

North Korean BlueNoroff Targets 100+ Crypto Orgs Using ClickFix and Zoom Lures
Arctic Wolf reports a large-scale BlueNoroff (Lazarus-linked) cyber theft campaign that targeted 100+ cryptocurrency organizations across 20+ countries using layered social engineering. Lures included impersonating fintech figures, typosquatted Zoom/Microsoft Teams meeting links, fake Calendly invites, and ClickFix-style clipboard injection.
Key Takeaways
Actor: BlueNoroff (Lazarus subgroup; often associated with financially motivated DPRK activity).
Scale: 100+ targeted organizations across 20+ countries; heavy concentration reported in the US, followed by Singapore and the UK.
Primary vector: Spearphishing/social engineering using meeting-invite workflows (Calendly + fake Zoom/Teams).
Technique highlight: ClickFix-style clipboard injection to trick users into executing attacker instructions.
Notable capability: Fake meeting pages used to capture/exfiltrate webcam footage and potentially support deepfake-enabled follow-on scams.
Defensive takeaway: Treat unexpected meeting links/invites as suspicious; verify domains, restrict execution of copied commands, and harden user workflows around “quick fix” prompts.

ShinyHunters Claims 9M Medtronic Records Stolen; Medtronic Confirms Unauthorized Access
Medtronic confirmed unauthorized access to its corporate IT systems after the ShinyHunters cybercrime group claimed it stole 9 million records containing personal information (plus additional corporate data) and threatened to leak the data if a ransom was not paid. Medtronic stated it has not identified impacts to products, patient safety, manufacturing/distribution operations, customer connections, or financial reporting systems, and emphasized these environments are segmented. The company said it is still working to determine whether personal information was accessed.
Key Takeaways
Confirmed: Medtronic acknowledges a corporate IT intrusion / unauthorized system access.
Claimed by ShinyHunters: 9M records and terabytes of corporate information.
Operational impact : No known impact to products/patient safety or manufacturing/distribution; networks are separated.
Status: Investigation ongoing to identify whether personal data was accessed/exfiltrated.
Extortion signal: Medtronic’s leak-site listing reportedly disappeared after a ransom deadline, which can indicate a payment (not confirmed).
What to watch: Potential breach notification scope (PII types, affected populations) and any downstream fraud risk if records are validated.

Claude Coding Agent Causes Catastrophic DB Deletion; Architecture Blamed for Lack of Safeguards
A SaaS company (PocketOS) reported that an AI coding agent (Cursor running Anthropic’s Claude) was assigned a routine task in a staging environment but “fixed” an issue by making a destructive API call to its infrastructure provider (Railway). The result was a production database volume deletion, and—critically—volume-level backups were wiped as well, leaving the company without an easy recovery path. The incident is framed as a combination of overly-permissive automation and missing guardrails in infrastructure design.
Key Takeaways
What happened: AI coding agent deleted a production DB and backups in seconds via an infrastructure API call.
Why it escalated: Permissions and environment boundaries appear to have been insufficient (staging task → production impact).
Infrastructure lessons called out: Destructive actions without strong confirmation, backups tied to the same volume, and broad tokens across environments increase blast radius.
Control takeaway: Enforce least privilege, hard separation between dev/staging/prod, and “break-glass” approval for destructive ops.
Operational takeaway: Assume agentic tooling can fail fast—require immutable/off-platform backups and tested restores.

Incomplete Fix Leaves Windows Exposed: Zero-Click Net-NTLMv2 Hash Leak Exploited
Microsoft and CISA warned that CVE-2026-32202 is being actively exploited. The bug is described as a zero-click authentication coercion issue in Windows that can leak authentication material (e.g., Net-NTLMv2 hashes) via network spoofing.
Key Takeaways
Vulnerability: CVE-2026-32202 (Windows) marked “exploitation detected.”
Impact: Potential credential leakage/authentication coercion (Net-NTLMv2 hash exposure) and follow-on access.
Why it matters: Resulted from an incomplete patch for CVE-2026-21510 which was previously exploited.
Response signal: CISA added it to KEV and set a May 12 patch deadline for US federal agencies.
Defender takeaway: Treat as a priority patch item; reduce NTLM exposure where possible and monitor for anomalous outbound authentication attempts tied to LNK activity.

Scam Center Strike Force: U.S.–China Coordination Helps Dismantle Dubai Fraud Hubs
U.S. prosecutors say a joint operation involving Dubai Police, the U.S. Justice Department/FBI, and cooperation with Chinese law enforcement led to raids on at least nine scam centers in Dubai and 276 arrests. The scam hubs allegedly ran “pig-butchering” crypto investment fraud and related money laundering. Investigators traced the infrastructure to Dubai using victim complaints, financial/cryptocurrency records, and information from Meta, and filed US fraud and money-laundering charges against alleged operators.
Key Takeaways
Action taken: 9+ Dubai scam centers raided; 276 arrests reported.
Fraud type: “Pig-butchering” crypto investment scams (plus money laundering).
Investigation inputs: Victim complaints + crypto/financial tracing + Meta-linked information.
Charges: US federal fraud and money laundering charges against multiple alleged operators.
Broader context: Highlights increasing cross-border law enforcement focus on large-scale scam-center operations often tied to trafficking and organized crime.

AI Finds 38 New OpenEMR Vulnerabilities, Enabling PHI Theft and Potential RCE
An AI-powered code analysis of OpenEMR (an open-source electronic health record platform used by 100,000+ providers) uncovered 38 previously undisclosed vulnerabilities across the codebase. The issues now patched, included authorization failures, SQL injection, XSS, path traversal, and session weaknesses.
Key Takeaways
Scope: 38 new CVEs found in ~3 months via AI-assisted scanning; OpenEMR issued fixes (including updates around v8.0.0 and follow-on patches).
Impact: Potential database takeover, patient data (PHI) theft, credential exposure, and in some cases RCE.
Example critical flaw: A CVSS 10.0 SQL injection issue in a Patient REST API could allow data extraction and broader compromise under certain conditions.
Why it matters: Demonstrates how AI tooling is accelerating vulnerability discovery, raising the patch/triage burden and shortening timelines for defenders.
Process improvement: OpenEMR reportedly integrated AI scanning into code review to catch issues earlier.

Patch Now: cPanel/WHM Legacy Session Handling Flaw Actively Targeted Since February
BleepingComputer reports that CVE-2026-41940, a critical authentication bypass affecting cPanel, WHM, and WP Squared, has been actively exploited in the wild (with execution attempts reported as early as Feb 23, 2026) and now has enough public technical detail to enable exploit development.
Key Takeaways
Vulnerability: CVE-2026-41940 — critical auth bypass in cPanel/WHM (also affects WP Squared).
Status: Exploitation in the wild reported; PoC-level details are available.
Impact: Successful exploitation can give attackers control of the hosting server, configs/databases, and hosted websites.
Fix: Patch to the fixed versions listed in cPanel advisories and restart cpsrvd after updating.
If you can’t patch immediately: Restrict external access to 2083/2087/2095/2096 (or stop key services) and use available scripts to check for compromise; rotate credentials and audit logs if indicators are found.

Congress Weighs Making Data Centers a Standalone Critical Infrastructure Sector
Lawmakers and industry witnesses discussed whether the US needs a clearer federal framework to protect data centers from cyber and physical attacks, including whether data centers should be designated as a standalone critical infrastructure sector. The debate is happening amid rapid data center growth driven by AI, increasing geopolitical risk, and the concentration of the market among major cloud providers. Witnesses suggested clearer ownership for risk coordination/response and more formal public-private coordination mechanisms.
Key Takeaways
Policy question: Should data centers get their own critical infrastructure sector designation (similar to the UK)?
Why now: AI-driven buildout + heightened threat environment are raising the stakes for both cyber and physical security.
Governance gap: Lawmakers flagged ambiguity on which federal agency “owns” risk coordination and incident response for data centers.
Market concentration: A small number of providers dominate, increasing systemic impact if major facilities are disrupted.
Potential direction: More formal cross-industry coordination (e.g., a dedicated council/sector model) and tighter integration with cloud-provider security efforts.

PromptMink: DPRK Campaign Seeds AI-Generated npm Malware to Steal Crypto and Developer Secrets
Researchers say an evolving supply-chain campaign dubbed PromptMink is tied to DPRK-aligned activity (linked in reporting to Famous Chollima/Shifty Corsair). The campaign pushes malicious code into open-source projects through layered npm dependencies (with related activity in PyPI), aiming at developers—especially in Web3 and crypto—to steal secrets and set up follow-on access.
Key Takeaways
Actor/campaign: DPRK-linked activity; campaign name PromptMink.
Initial vector: Supply-chain dependency insertion (benign “wrapper” packages pulling malicious second-layer packages).
AI angle: A malicious dependency was introduced via a commit reportedly co-authored by an LLM, increasing risk in AI-assisted coding/review.
What it targets: Secrets and credentials (including crypto-related access), with later iterations expanding into broader remote access/exfiltration behavior.
Defender takeaway: Pin and verify dependencies, monitor transitive dependency changes, restrict untrusted publishers, and treat sudden dependency additions, especially “AI-generated/vibe-coded” packages as high-signal review triggers.

