Threat Newsletter May 4, 2026

Share
Threat Newsletter May 4, 2026
Photo by Tarik Haiga / Unsplash

In this week’s newsletter we cover credential-stealing malware and extortion tradecraft, Windows security changes and escalation techniques, and a wave of software supply-chain risks such as GitHub Actions, PyPI, and malicious extensions.


DEEP Python Backdoor Uses Public Tunneling for C2, Steals Browser + Cloud Credentials

Researchers detailed a Python-based backdoor framework dubbed DEEP that establishes long-term access on Windows, uses a public tunneling service (bore[.]pub) for command-and-control, and harvests a broad set of credentials (browsers, Windows Credential Manager, SSH keys, and cloud keys for AWS/GCP/Azure). The intrusion chain starts with a batch script dropper that extracts an embedded Python payload and sets persistence through multiple Windows mechanisms while attempting to evade detection by tampering with security/telemetry features.

Key Takeaways

Initial vector: Likely phishing leading to execution of a batch dropper that unpacks a Python implant.

C2 technique: Uses a public TCP tunneling service to avoid dedicated attacker infrastructure and blend traffic.

Capability set: Full-featured RAT behavior (remote command exec, recon, keylogging, screenshots/webcam/audio) plus credential theft.

Targeted secrets: Browser credentials (Chrome/Firefox), Windows Credential Manager, SSH keys, and cloud credentials (AWS/GCP/Azure).

Persistence and evasion: Multiple persistence methods (Startup/Run keys/scheduled tasks, optional WMI) and anti-analysis/defense evasion designed to complicate remediation.

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
DEEP#DOOR embeds a Python RAT in a dropper script, using bore[.]pub C2 to steal credentials and evade Windows defenses, complicating detection.

New BlackFile Data-Theft Extortion Targets Retail & Hospitality

A new financially motivated extortion group tracked as BlackFile (aka CL-CRI-1116 / UNC6671 / Cordial Spider) has been tied to a wave of vishing-led credential theft targeting retail and hospitality organizations since Feb 2026.

Key takeaways

Initial access: Phone-based social engineering (vishing) + spoofed caller ID posing as IT support.

MFA isn’t enough: They aim to capture one-time pass-codes and then register their own devices to maintain access.

Privilege escalation: They pivot from regular employees to executive-level accounts using internal directories.

Data focus: They pull large volumes of sensitive info via Salesforce APIs and SharePoint download functions (e.g., files labeled “confidential,” “SSN”).

Pressure tactics: Data is published to a dark web leak site and victims are contacted for seven-figure ransoms; swatting is also mentioned as an intimidation tactic.

Defensive actions: Tighten helpdesk/call-handling verification, require stronger caller identity checks, and run regular social-engineering simulations/training for front-line staff.

New BlackFile extortion group linked to surge of vishing attacks
A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026.

AI-Generated ZionSiphon OT Malware Falls Apart Under Dragos Analysis

Darktrace reported a new malware sample, ZionSiphon, that appeared aimed at Israeli water treatment/desalination environments and framed it as an OT/ICS threat. Dragos reviewed the code and assessed it as largely non-functional “hype”: the malware contains AI-generated/hallucinated details (fake Windows paths/process checks and bogus “chlorine manipulation” configs), plus logic/config errors that would keep it from operating as claimed.

Key Takeaways

Claim: ZionSiphon was described as OT/ICS malware targeting Israeli water facilities (e.g., chlorine manipulation).

Dragos assessment: The code is broken and shows little understanding of ICS/OT in water plants.

AI angle: Portions of the code look LLM-generated, with “fictional” directory/process checks and other hallucinations.

Even if fixed, still not scary: Dragos says it’s riddled with invalid assumptions and wouldn’t meaningfully impact water treatment operations.

Big lesson for defenders: Prioritize resources on known, capable adversaries and validated ICS threats.

Dragos: Despite AI use, new malware targeting water plants is ‘hype’
ZionSiphon was designed to find and sabotage Israelis’ water supply. An OT expert said it appears to be ineffective and the work of amateurs using AI.

Microsoft Gives Organizations a Switch to Remove Copilot from Corporate PCs

Microsoft introduced a new enterprise policy that allows IT administrators to uninstall the Microsoft Copilot app from managed Windows endpoints.

Key Takeaways

What changed: Admins can now remove Copilot using the RemoveMicrosoftCopilotApp policy.

Where it works: Available through Group Policy and Policy CSP for enterprise management (e.g., Intune/SCCM).

Eligibility is limited: Applies only on certain Windows 11 enterprise/pro/education scenarios.

User impact: Copilot is uninstalled, but reinstall remains possible (depending on organization controls).

Why it matters: Gives organizations better control over AI assistant rollout, reducing unwanted exposure/footprint on corporate endpoints.

Microsoft now lets admins uninstall Copilot on enterprise devices
Microsoft says IT administrators can now uninstall the AI-powered Copilot digital assistant from enterprise devices using a new policy setting, which has become broadly available after the April 2026 Patch Tuesday.

New PhantomRPC Technique Escalates to SYSTEM via Windows RPC Design Flaw

Security researchers disclosed PhantomRPC, an unpatched Windows local privilege escalation technique rooted in how Windows Remote Procedure Call (RPC) handles connections when a legitimate RPC service/endpoint is not running. An attacker with local foothold can stand up a malicious RPC server that binds to the same endpoint as a real service; when a higher-privileged process connects, the attacker can impersonate that client and escalate to SYSTEM/Administrator.

Key Takeaways

Impact: Local privilege escalation (turn a limited account into SYSTEM/admin), not a remote unauthenticated bug.

Root cause: RPC design behavior lets a process register a legitimate-looking endpoint if the real service isn’t running.

Prerequisites matter: The technique generally requires an already-compromised host and SeImpersonatePrivilege in the attacking context.

Multiple exploit paths: Research describes five different ways to reach elevation from the same architectural weakness.

Mitigations : Reduce where SeImpersonatePrivilege exists, monitor RPC anomalies (e.g., clients connecting to unavailable servers), and ensure expected services/endpoints are running where appropriate.

No Patch for New PhantomRPC Privilege Escalation Technique in Windows
The PhantomRPC Windows vulnerability allows attackers to elevate their privileges to System by using a fake RPC server.

Checkmarx Says Stolen GitHub Repository Data Is Now Circulating on Dark Web

Summary

Checkmarx said its investigation into a March 23, 2026 supply-chain incident found evidence that data posted on the dark web likely originated from a Checkmarx GitHub repository accessed during that initial compromise.

Key Takeaways

What happened: Data allegedly from Checkmarx’s GitHub repo was posted on a dark web leak site after a supply-chain compromise.

Scope clarification: Checkmarx says the repo is segregated from customer production, and customer data isn’t stored there.

Potential contents : The posting claimed items like source code and credentials/keys (treat as unverified until confirmed).

Response actions: Checkmarx restricted/locked down repo access and continues forensic investigation.

Why it matters: Highlights how supply-chain access to CI/CD or repos can lead to secondary data exposure, even if production systems aren’t directly breached.

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
Checkmarx data surfaced after March 23, 2026 supply chain attack, prompting repository lockdown and investigation, raising exposure concerns.

Attacker Used PR Comment to Hijack GitHub Actions, Then Shipped Infostealer to PyPI

Attackers compromised the popular elementary-data PyPI package by abusing a GitHub Actions workflow script-injection flaw rather than stealing a maintainer account. A malicious pull request comment triggered the workflow to run attacker-controlled shell code, exposing the workflow GITHUB_TOKEN.

Key Takeaways

Compromised artifact: elementary-data==0.23.3 and related Docker image tags delivered an infostealer.

Initial vector: GitHub Actions script injection ,not necessarily a maintainer credential takeover.

Why it spread fast: The attacker used the project’s legit CI/CD release process, making the release look authentic.

What it stole: Developer secrets like SSH keys, Git creds, cloud creds (AWS/GCP/Azure), CI/K8s/Docker secrets, .env tokens, plus crypto wallet files.

Who’s most at risk: Environments that didn’t pin versions and auto-updated to the malicious release / latest container tag.

Immediate response: Upgrade to 0.23.4, rotate potentially exposed secrets, and restore from a known-good point if 0.23.3 ran.

PyPI package with 1.1M monthly downloads hacked to push infostealer
An attacker pushed a malicious version of the popular elementary-data package Python Package Index (PyPI) to steal sensitive developer data and cryptocurrency wallets.

China-Linked Hacking Suspect Xu Zewei Extradited to U.S., Held in Houston

Italy extradited Xu Zewei from Milan to the United States, where he is being held in Houston, according to his lawyer. U.S. prosecutors allege Xu was involved in China-linked hacking activity, including intrusions targeting COVID-19 vaccine research and activity associated with HAFNIUM (aka Silk Typhoon) and the 2021 Microsoft Exchange attacks. Xu has denied the allegations and says he was mistakenly identified.

Key Takeaways

What happened: Italy extradited an alleged China-linked hacker to the U.S.

Who: Xu Zewei, arrested in July 2025 while in Milan.

What he’s accused of: Computer intrusions tied to COVID-19 research theft and the broader HAFNIUM/Silk Typhoon campaign (per U.S. indictment).

Status: Now detained in Houston; a co-defendant (Zhang Yu) remains at large.

Why it matters: Signals continued cross-border law enforcement pressure on state-linked cyber operations and actors tied to major campaigns.

Italy extradites alleged Chinese state hacker to US
A Chinese national accused of being a member of a state-backed hacking group that allegedly broke into systems to steal COVID-19 vaccine information has been extradited to the U.S. from Milan.

GlassWorm Shifts Tactics: Benign Extensions Turn Malicious After Update (OpenVSX)

A new wave of the GlassWorm supply-chain campaign is abusing the OpenVSX extension ecosystem with 73 “sleeper” extensions that appear benign at upload but can become malicious after later updates. Researchers report that six of the extensions have already been “activated” to deliver malware, while the remaining extensions are suspected/dormant.

Key Takeaways

What’s new: GlassWorm is using “sleeper” extensions that turn malicious only after an update.

Scale: 73 OpenVSX extensions flagged; 6 observed delivering malware so far.

Deception tactic: Many are clones of legit extensions (similar name/icon/description) — publisher + extension ID are key indicators.

Execution style: Extensions act as loaders (pulling/installing payloads at runtime rather than shipping obvious malware upfront).

Risk: Targets developers and build environments; prior GlassWorm waves focused on credentials/tokens/SSH keys and crypto wallet data.

Response: If installed, remove, rotate secrets, and clean/rebuild affected developer environments; pin/allowlist trusted extensions.

GlassWorm malware attacks return via 73 OpenVSX “sleeper” extensions
A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 “sleeper” extensions that turn malicious after an update.

Crypto Theft Enabler Sentenced After Converting Stolen Funds and Buying Luxury Homes

A California man, Evan Tangeman (22), was sentenced to 70 months in prison for helping a cyber-criminal group that stole roughly $260M in cryptocurrency.

Key Takeaways

Sentence: 70 months prison + 3 years supervised release.

Role: Money laundering + logistics (turning stolen crypto into cash, acquiring homes used by the group).

Victim targeting: Group used stolen/purchased data to identify high-value crypto holders, then used social engineering (impersonating Apple/Google/customer support) to steal access.

Scale: The broader crew is tied to thefts totaling ~$260M+; Tangeman is the ninth to plead guilty.

Why it matters: Shows how crypto-theft crews rely on “support roles” (launderers, infrastructure/logistics) to cash out and keep operations running.

Money launderer for crypto thieves given 5-year sentence
A California man was sentenced to more than five years in prison for his role in supporting a cybercriminal organization that stole about $260 million worth of cryptocurrency from victims.

Keeping AI Agents From Going Rogue With Your Credit Cards

WIRED reports that the FIDO Alliance, with initial contributions from Google and Mastercard, is forming working groups to create industry standards for validating and protecting agent-initiated payments and transactions, emphasizing phishing-resistant authentication and cryptographic proof of user intent.

Key Takeaways

New risk: AI agents acting on a user’s behalf introduce new fraud paths (agent hijacking/rogue instructions).

Standards in progress: FIDO Alliance is launching working groups to define cross-industry guardrails for agent transactions.

Goal: Provide cryptographic proof of user intent and stronger, phishing-resistant authorization for agent actions.

Notable building blocks: Google’s Agent Payments Protocol (AP2) and Mastercard’s Verifiable Intent framework (designed to work with AP2).

Why it matters: Better transparency, accountability, and dispute/recourse options as agent-driven commerce expands.

The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards
AI agents may soon be buying your stuff for you. The FIDO Alliance has teamed up with Google and Mastercard to try to ensure that shopping in the near future isn’t a complete disaster.

Fake Signal Security Bot Used to Hijack Accounts of High-Ranking Germans

German officials are investigating a wave of Signal account phishing that targeted high-ranking politicians (including ministers), military personnel, and journalists. Reports describe messages from a fake Signal “security” chatbot prompting targets to “secure” their accounts; victims who entered a PIN or scanned a QR code inadvertently linked their Signal account to an attacker-controlled device, enabling the attacker to read chats and access associated data. German sources suspect Russia may be behind the activity, though official attribution was not confirmed in the reporting.

Key Takeaways

Target set: Senior politicians, military personnel, and journalists (Germany).

Tactic: Phishing via a fake Signal security bot urging urgent action.

Mechanism: Tricked users into entering a PIN/scanning a QR code, which linked accounts to attacker devices (a “linked devices” style takeover).

What attackers gain: Access to past and ongoing chats, plus contact/address book data stored by the user.

Attribution status: Germany suspects Russia, but attribution was described as not yet officially confirmed.

Defensive takeaway: Treat unexpected “security” messages as suspicious; use strict verification, and review/lock down linked devices and account settings.

Germany Suspects Russia Is Behind Signal Phishing That Targeted Top Officials
Federal prosecutors have been conducting a preliminary investigation since mid-February 2026 into alleged cyberattacks on Signal accounts.

From Awareness to Enforcement: States Ramp Privacy Penalties in 2025

Gartner reports that U.S. states issued $3.45B in privacy-related fines in 2025—more than the previous five years combined—signaling a shift from privacy “awareness” to full-scale enforcement. The increase is driven by maturing state privacy laws (notably California), expanded enforcement capacity, multi-state coordination to pursue violations across state lines, and growing regulatory focus on privacy risks tied to AI/automated decision-making.

Key Takeaways

Big number: $3.45B in state privacy fines in 2025 (record-setting vs. prior years).

Enforcement ramp: Regulators are moving from guidance to aggressive investigations and penalties.

California effect: CPPA enforcement broadened beyond big tech to mid-sized and smaller firms across industries.

Multi-state pressure: States are coordinating via efforts like the Consortium of Privacy Regulators to enforce common rights (access/delete/opt-out of sale).

AI privacy is a driver: Increased scrutiny of how data is used for AI training and inferences.

Outlook: Gartner expects fines and enforcement intensity to keep rising into 2026.

Social media scams cost Americans more than $2.1 billion last year, according to the FTC
Love, investments, and shopping scams were the most common

0APT vs. KryBit: Leak-Site Hackback Exposes Panels, Affiliates, and Victim Chats

Researchers say ransomware groups 0APT and KryBit leaked and attacked each other’s infrastructure in a “turf war” that exposed operational details on both sides.

Key Takeaways

What happened: Two ransomware crews doxed/hacked each other and leaked operational data.

KryBit exposure: Admin panel data (operators/affiliates + negotiation info), with activity spanning late March–mid April 2026.

0APT exposure: Access logs/source/system files leaked; logs suggested 0APT’s claimed 190+ victims were fake with no exfiltration evidence.

Operational takeaway: Ransomware groups rely on “credibility”; rivals will weaponize leaks to undermine trust and disrupt operations.

Defender takeaway: Don’t assume “victim counts” on leak sites are reliable; treat leak-site claims as intel leads to validate, not ground truth.

Near-term expectation: Both actors may rebuild/rebrand infrastructure, making tracking noisier in the short term.

Ransomware Turf War as 0APT and KryBit Groups Trade Blows
Ransomware groups 0APT and KryBit have doxxed each other online

North Korean BlueNoroff Targets 100+ Crypto Orgs Using ClickFix and Zoom Lures

Arctic Wolf reports a large-scale BlueNoroff (Lazarus-linked) cyber theft campaign that targeted 100+ cryptocurrency organizations across 20+ countries using layered social engineering. Lures included impersonating fintech figures, typosquatted Zoom/Microsoft Teams meeting links, fake Calendly invites, and ClickFix-style clipboard injection.

Key Takeaways

Actor: BlueNoroff (Lazarus subgroup; often associated with financially motivated DPRK activity).

Scale: 100+ targeted organizations across 20+ countries; heavy concentration reported in the US, followed by Singapore and the UK.

Primary vector: Spearphishing/social engineering using meeting-invite workflows (Calendly + fake Zoom/Teams).

Technique highlight: ClickFix-style clipboard injection to trick users into executing attacker instructions.

Notable capability: Fake meeting pages used to capture/exfiltrate webcam footage and potentially support deepfake-enabled follow-on scams.

Defensive takeaway: Treat unexpected meeting links/invites as suspicious; verify domains, restrict execution of copied commands, and harden user workflows around “quick fix” prompts.

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures
Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group

ShinyHunters Claims 9M Medtronic Records Stolen; Medtronic Confirms Unauthorized Access

Medtronic confirmed unauthorized access to its corporate IT systems after the ShinyHunters cybercrime group claimed it stole 9 million records containing personal information (plus additional corporate data) and threatened to leak the data if a ransom was not paid. Medtronic stated it has not identified impacts to products, patient safety, manufacturing/distribution operations, customer connections, or financial reporting systems, and emphasized these environments are segmented. The company said it is still working to determine whether personal information was accessed.

Key Takeaways

Confirmed: Medtronic acknowledges a corporate IT intrusion / unauthorized system access.

Claimed by ShinyHunters: 9M records and terabytes of corporate information.

Operational impact : No known impact to products/patient safety or manufacturing/distribution; networks are separated.

Status: Investigation ongoing to identify whether personal data was accessed/exfiltrated.

Extortion signal: Medtronic’s leak-site listing reportedly disappeared after a ransom deadline, which can indicate a payment (not confirmed).

What to watch: Potential breach notification scope (PII types, affected populations) and any downstream fraud risk if records are validated.

Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak
Medtronic has confirmed that its systems have been hacked after the notorious ShinyHunters group claimed to have stolen millions of records.

Claude Coding Agent Causes Catastrophic DB Deletion; Architecture Blamed for Lack of Safeguards

A SaaS company (PocketOS) reported that an AI coding agent (Cursor running Anthropic’s Claude) was assigned a routine task in a staging environment but “fixed” an issue by making a destructive API call to its infrastructure provider (Railway). The result was a production database volume deletion, and—critically—volume-level backups were wiped as well, leaving the company without an easy recovery path. The incident is framed as a combination of overly-permissive automation and missing guardrails in infrastructure design.

Key Takeaways

What happened: AI coding agent deleted a production DB and backups in seconds via an infrastructure API call.

Why it escalated: Permissions and environment boundaries appear to have been insufficient (staging task → production impact).

Infrastructure lessons called out: Destructive actions without strong confirmation, backups tied to the same volume, and broad tokens across environments increase blast radius.

Control takeaway: Enforce least privilege, hard separation between dev/staging/prod, and “break-glass” approval for destructive ops.

Operational takeaway: Assume agentic tooling can fail fast—require immutable/off-platform backups and tested restores.

Claude-powered AI coding agent deletes entire company database in 9 seconds — backups zapped, after Cursor tool powered by Anthropic’s Claude goes rogue
PocketOS founder blames ‘Cursor running Anthropic’s flagship Claude Opus 4.6’ plus Railway’s infrastructure for data disaster.

Incomplete Fix Leaves Windows Exposed: Zero-Click Net-NTLMv2 Hash Leak Exploited

Microsoft and CISA warned that CVE-2026-32202 is being actively exploited. The bug is described as a zero-click authentication coercion issue in Windows that can leak authentication material (e.g., Net-NTLMv2 hashes) via network spoofing.

Key Takeaways

Vulnerability: CVE-2026-32202 (Windows) marked “exploitation detected.”

Impact: Potential credential leakage/authentication coercion (Net-NTLMv2 hash exposure) and follow-on access.

Why it matters: Resulted from an incomplete patch for CVE-2026-21510 which was previously exploited.

Response signal: CISA added it to KEV and set a May 12 patch deadline for US federal agencies.

Defender takeaway: Treat as a priority patch item; reduce NTLM exposure where possible and monitor for anomalous outbound authentication attempts tied to LNK activity.

Microsoft patch fell short. New Windows flaw exploited
: Second try’s a charm?

Scam Center Strike Force: U.S.–China Coordination Helps Dismantle Dubai Fraud Hubs

U.S. prosecutors say a joint operation involving Dubai Police, the U.S. Justice Department/FBI, and cooperation with Chinese law enforcement led to raids on at least nine scam centers in Dubai and 276 arrests. The scam hubs allegedly ran “pig-butchering” crypto investment fraud and related money laundering. Investigators traced the infrastructure to Dubai using victim complaints, financial/cryptocurrency records, and information from Meta, and filed US fraud and money-laundering charges against alleged operators.

Key Takeaways

Action taken: 9+ Dubai scam centers raided; 276 arrests reported.

Fraud type: “Pig-butchering” crypto investment scams (plus money laundering).

Investigation inputs: Victim complaints + crypto/financial tracing + Meta-linked information.

Charges: US federal fraud and money laundering charges against multiple alleged operators.

Broader context: Highlights increasing cross-border law enforcement focus on large-scale scam-center operations often tied to trafficking and organized crime.

US, China partner on scam center takedown in Dubai
The Justice Department said the operation began last year following “numerous” victim complaints to the FBI by U.S. victims who lost millions through cryptocurrency investment fraud schemes.

AI Finds 38 New OpenEMR Vulnerabilities, Enabling PHI Theft and Potential RCE

An AI-powered code analysis of OpenEMR (an open-source electronic health record platform used by 100,000+ providers) uncovered 38 previously undisclosed vulnerabilities across the codebase. The issues now patched, included authorization failures, SQL injection, XSS, path traversal, and session weaknesses.

Key Takeaways

Scope: 38 new CVEs found in ~3 months via AI-assisted scanning; OpenEMR issued fixes (including updates around v8.0.0 and follow-on patches).

Impact: Potential database takeover, patient data (PHI) theft, credential exposure, and in some cases RCE.

Example critical flaw: A CVSS 10.0 SQL injection issue in a Patient REST API could allow data extraction and broader compromise under certain conditions.

Why it matters: Demonstrates how AI tooling is accelerating vulnerability discovery, raising the patch/triage burden and shortening timelines for defenders.

Process improvement: OpenEMR reportedly integrated AI scanning into code review to catch issues earlier.

38 Vulnerabilities Found in OpenEMR Medical Software
Dozens of vulnerabilities were discovered recently in the open source electronic medical records platform OpenEMR.

Patch Now: cPanel/WHM Legacy Session Handling Flaw Actively Targeted Since February

BleepingComputer reports that CVE-2026-41940, a critical authentication bypass affecting cPanel, WHM, and WP Squared, has been actively exploited in the wild (with execution attempts reported as early as Feb 23, 2026) and now has enough public technical detail to enable exploit development.

Key Takeaways

Vulnerability: CVE-2026-41940 — critical auth bypass in cPanel/WHM (also affects WP Squared).

Status: Exploitation in the wild reported; PoC-level details are available.

Impact: Successful exploitation can give attackers control of the hosting server, configs/databases, and hosted websites.

Fix: Patch to the fixed versions listed in cPanel advisories and restart cpsrvd after updating.

If you can’t patch immediately: Restrict external access to 2083/2087/2095/2096 (or stop key services) and use available scripts to check for compromise; rotate credentials and audit logs if indicators are found.

Critical cPanel and WHM bug exploited as a zero-day, PoC now available
The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts since late February.

Congress Weighs Making Data Centers a Standalone Critical Infrastructure Sector

Lawmakers and industry witnesses discussed whether the US needs a clearer federal framework to protect data centers from cyber and physical attacks, including whether data centers should be designated as a standalone critical infrastructure sector. The debate is happening amid rapid data center growth driven by AI, increasing geopolitical risk, and the concentration of the market among major cloud providers. Witnesses suggested clearer ownership for risk coordination/response and more formal public-private coordination mechanisms.

Key Takeaways

Policy question: Should data centers get their own critical infrastructure sector designation (similar to the UK)?

Why now: AI-driven buildout + heightened threat environment are raising the stakes for both cyber and physical security.

Governance gap: Lawmakers flagged ambiguity on which federal agency “owns” risk coordination and incident response for data centers.

Market concentration: A small number of providers dominate, increasing systemic impact if major facilities are disrupted.

Potential direction: More formal cross-industry coordination (e.g., a dedicated council/sector model) and tighter integration with cloud-provider security efforts.

Congress, industry ponder government posture for protecting data centers
The growth of data centers — and adversaries’ targeting of them — left lawmakers at a hearing Wednesday contemplating whether the federal government has the right setup for defending them.

PromptMink: DPRK Campaign Seeds AI-Generated npm Malware to Steal Crypto and Developer Secrets

Researchers say an evolving supply-chain campaign dubbed PromptMink is tied to DPRK-aligned activity (linked in reporting to Famous Chollima/Shifty Corsair). The campaign pushes malicious code into open-source projects through layered npm dependencies (with related activity in PyPI), aiming at developers—especially in Web3 and crypto—to steal secrets and set up follow-on access.

Key Takeaways

Actor/campaign: DPRK-linked activity; campaign name PromptMink.

Initial vector: Supply-chain dependency insertion (benign “wrapper” packages pulling malicious second-layer packages).

AI angle: A malicious dependency was introduced via a commit reportedly co-authored by an LLM, increasing risk in AI-assisted coding/review.

What it targets: Secrets and credentials (including crypto-related access), with later iterations expanding into broader remote access/exfiltration behavior.

Defender takeaway: Pin and verify dependencies, monitor transitive dependency changes, restrict untrusted publishers, and treat sudden dependency additions, especially “AI-generated/vibe-coded” packages as high-signal review triggers.

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
Claude Opus commit added malicious npm dependency in Feb 2026, enabling crypto theft and persistent RAT access.

Read more