Threat Research | Weekly Recap [03 May 2026]

Threat Research | Weekly Recap [03 May 2026]
Cybersecurity Threat Research β€˜Weekly’ Recap. The briefing covers AI, SaaS, and collaboration threats with prompt injection and OAuth abuse, phishing and BEC intrusions, supply chain abuse, ransomware campaigns, cloud and Kubernetes security, vulnerability research, and new threat intel tooling, naming campaigns such as PromptMink, Cordial Spider, Snarky Spider, VECT RaaS, Silver Fox, and ABCDoor #PromptMink #CordialSpider.

AI, SaaS, and Collaboration Threats

Phishing, BEC, and IdP/SaaS Intrusions

  • QR-code and CAPTCHA-gated phishing, plus persistent BEC, dominated email threats while Tycoon2FA was briefly disrupted; Q1 2026 Email Threat Landscape
  • Vishing-led AiTM pages and adversary-registered MFA devices enabled rapid SaaS takeovers and data theft; CORDIAL SPIDER and SNARKY SPIDER
  • A fake Meta login flow used Google Forms and a vercel.app page to harvest credentials and 2FA codes in real time; Meta 2FA trap
  • Kuse.ai sharing was abused to host a phishing document that redirected victims to a fake Microsoft login; Kuse web app phishing abuse

Supply Chain and Developer Ecosystem Abuse

Ransomware, Backdoors, and Malware Campaigns

  • Vect RaaS expanded across Windows, Linux, and ESXi with ChaCha20 encryption and broad lateral movement; Inside Vect RaaS
  • VECT 2.0’s flawed encryption can permanently destroy larger files, effectively behaving like a wiper; VECT ransomware by design, wiper by accident
  • Silver Fox used tax-themed phishing to deploy ValleyRAT and the new ABCDoor backdoor with persistence tricks; Silver Fox and ABCDoor
  • A trojanized CHM sample delivered a Python-based Telegram RAT with Winlogon hijack and scheduled-task persistence; Rebex-based Telegram RAT
  • ClickFix/BackgroundFix staged CastleLoader to drop NetSupport RAT and CastleStealer for credential and wallet theft; ClickFix leaves the malware

Cloud, Kubernetes, and SaaS Security

  • Kubernetes attack detection coverage was expanded with Wazuh guidance and telemetry for cluster-focused threats; Detecting Kubernetes attacks with Wazuh
  • Chinese threat actors increasingly route activity through compromised SOHO/IoT edge nodes and shared malware ecosystems; Chinese threat actors overview
  • UAT-8099 leveraged vulnerable IIS servers, web shells, PowerShell, and BadIIS variants against regional targets; DNS facts on UAT-8099
  • LiteLLM was rapidly targeted with pre-auth SQL injection to enumerate API keys, provider credentials, and environment variables; CVE-2026-42208 LiteLLM SQLi

Vulnerability Research and DFIR

Threat Intel, Infrastructure, and Investigation Tooling

  • Behaviorally fingerprinted infrastructure graphs and pre-correlated signals help SOCs cluster adversary infrastructure faster; Cluster adversary infrastructure faster
  • Validin launched a new Advanced Search experience with VQL, pivots, and same-observation matching for investigations; Validin Advanced Search

Threat Research | Weekly Recap – hendryadrian.com