Cybersecurity Threat Research âWeeklyâ Recap: this overview surveys vulnerabilities, supply-chain and developer-tooling abuse, phishing and malware campaigns across Langflow (CVE-2026-33017), CanisterWorm, CursorJack, SnappyClient, Vidar Stealer, AsyncRAT, GhostMail, Boggy Serpens, DieNet and Konni, with notable operational exposures such as Myclaw360 TLS key and Larva26002. Cybersecurity Threat Research âWeeklyâ Recap: it also highlights evolving trends in AI-assisted threats, container security with Defend for Containers (D4C) guidance and TeamPCP container attack scenarios, plus CI/CD risk from Trivy action hijacking and related supply-chain abuses. #Langflow #CVE-2026-33017 #CanisterWorm #CursorJack #SnappyClient #VidarStealer #AsyncRAT #GhostMail #BoggySerpens #DieNet #Konni #Myclaw360 #Larva26002 #DefendForContainers #TeamPCP #TrivyAction #Kubernetes
Vulnerabilities & Exploits
- Unauthenticated RCE in Langflowâs flow build endpoint was weaponized within ~20 hours to run arbitrary Python and exfiltrate creds; rapid scanning and staged dropper infrastructure observed. CVE-2026-33017: Langflow RCE
- Weekly vuln telemetry: 1,641 flaws tracked (175 PoCs, 200 CVSSâcritical) with highâimpact auth bypass/RCEs in Juniper, Cisco SDâWAN, Qwik and EV charging stacks â Energy & Transportation hit hardest. Week in Vulnerabilities: Juniper, Cisco & ICS
- Ingressânginx configurationâinjection CVEs require detection across clusters â guidance for rule/telemetry mappings and mitigation checks. Detecting CVE-2026-3288 / CVE-2026-24512
- Proofâofâconcept deeplink exploit for Cursor IDE can fetch and run staged MCP servers or arbitrary commands via user click + install prompt. CursorJack: Cursor IDE deeplink POC
Supply Chain & Developer-Tooling Abuse
- An npm publisher compromise deployed a worm (postinstall hooks + republish) across 29+ packages, pulling rotatable secondâstage payloads from an ICP canister. CanisterWorm: npm publisher compromise
- GitHub Actions supplyâchain sabotage: aquasecurity/trivy-action had 75 tags forceâupdated to malicious commits that steal CI secrets and exfiltrate to typosquatted domains (attributed to TeamPCP). Trivy Action tag compromise (TeamPCP)
- GlassWorm evolved to abuse Open VSX transitive dependencies (extensionPack/extensionDependencies) to convert benign extensions into staged loaders and persistent delivery channels. GlassWorm via Open VSX transitive deps
- SnappyClient C++ implant (HijackLoader linkage) provides remote access, keylogging, screenshot theft and custom ChaCha20âPoly1305 C2, using advanced evasion (direct syscalls, transacted hollowing). SnappyClient analysis (HijackLoader)
Phishing, Social Engineering & SaaS Abuse
- Malicious Google Forms link business-themed ZIPs in a multiâstage chain that installs the PureHVNC .NET RAT via DLL hijack, scheduled tasks and process injection. Jobâbrief Google Forms â PureHVNC
- Invoice/paymentâthemed phishing with malicious PDFs and QR codes targets finance/procurement to harvest credentials via reusable templates and rotating backends. Invoiceâthemed phishing targeting finance
- Fake CAPTCHA / ClickFix social engineering compromises sites to coerce victims into running clipboard PowerShell, delivering inâmemory stealers and a crypto clipboard hijacker across rotating C2s. Fake CAPTCHA / ClickFix stealer campaigns
- LiveChat SaaS abused to impersonate brands (PayPal, Amazon) in realâtime chats to capture credentials, cards, MFA codes and PII. LiveChat brandâimpersonation abuse
- AIâaugmented phishing campaigns exploit browser permissions to capture data and scale targeted credential theft. AIâassisted phishing exploiting browser permissions
- Vishing + Microsoft Teams impersonation used to socially engineer victims into running staged PowerShell and establish a WebSocket backdoor. Teams vishing â PhantomBackdoor
Malware, RATs & Backdoors
- Multiâstage, fileless campaigns delivering the PureLog stealer use Python/dual .NET loaders, AMSI bypass and remote key retrieval to exfiltrate Windows artifacts in memory. PureLog stealer multiâstage attack
- Infostealer.Speagle hijacks legitimate Cobra DocGuard client/server flows to exfiltrate targeted files (including niche ballistic missile docs) while masquerading as normal traffic. Infostealer.Speagle abusing Cobra DocGuard
- ZPHP (SmartApeSG) campaigns use fake CAPTCHAs/ClickFix to deliver Remcos RAT with DLL sideloading, steganography and persistent âIntel PLLQ Components.â ZPHP campaign delivering Remcos
- Vidar Stealer 2.0 (C rewrite, polymorphic builds, Telegram/Steam C2) distributed via fake âgame cheatsâ and compromised sites to harvest credentials and wallets. Vidar Stealer 2.0 distribution
- macOS campaign uses SEO poisoning + ClickFix social engineering to run Terminal commands that install a staged loader and AppleScript stealer (harvests wallets, SSH keys, modifies Ledger Live). MacSync stealer via SEO poisoning
- Malicious KakaoTalk installer via SEO poisoning infected 5,000+ PCs with Winos4.0, adding Defender exclusions and establishing persistence. Winos4.0 via fake KakaoTalk installer
- Statically linked 64âbit Linux backdoor netd (RC4 C2, PTY shell, file transfer) with MachâO variant observed on VT; uses dynamic DNS challengeâresponse over TCP/443. netd lowâdetection Linux/macOS backdoor
- Technical analysis: SnappyClient implant, Warlock postâexploit enhancements (TightVNC, tunneling, NSecKrnl BYOVD) and GOâbased scanners highlight expanding postâexploit toolsets and evasion. Warlock / SnappyClient postâexploit toolset
- Fake Telegram typosquat delivered a multiâstage loader (DLL loader reconstructing PE from XML) with Defender exclusion manipulation and registry persistence markers. Fake Telegram typosquat multiâstage loader
APT, Espionage & Targeted Campaigns
- Longârunning spearâphishing delivered VBS/PowerShell droppers and AsyncRAT to Libyan targets (oil refinery, telecom, state) with scheduled task persistence named âdevilâ â likely focused/possibly stateâsponsored. AsyncRAT campaign targeting Libyan orgs
- Operation GhostMail: stored XSS in Zimbra used to steal session tokens, credentials and mailbox data; exfiltration over DNS/HTTPS attributed with medium confidence to APT28. Operation GhostMail: Zimbra XSS (APT28)
- Boggy Serpens (Iranâaligned) evolved to use Rust tooling and AI assistance across diplomatic/criticalâinfra targets; toolkit includes BlackBeard, LampoRAT and GhostBackDoor. Boggy Serpens threat assessment
- DieNet hacktivist franchise conducted mass DDoS claims and disruption campaigns targeting governments and Western firms, operating as a rentedâinfrastructure franchise. DieNet hacktivist network
- Detection case: suspected North Koreaâlinked remote IT worker uncovered via integrated OTX + XDR behavioral analytics and rapid account termination. North Koreaâlinked remote IT worker detected
- Konni group used spearâphishing LNK droppers and abused KakaoTalk sessions to distribute AutoIt RATs for longâterm access and data theft. Konni spearâphishing & KakaoTalk campaign
Cloud, Containers & CI/CD Security
- Elastic Security Labs mapped a TeamPCP container attack scenario showing how Defend for Containers (D4C) telemetry and Kubernetes audit events can surface executionâpersistenceâminer deployment stages. TeamPCP container attack scenario & D4C
- Getting started guidance for Defend for Containers (Elastic Stack) emphasizes runtime detection rules, selectors/responses and cluster deployment models for workloadâaware security. Defend for Containers: getting started
- CI/CD exposures: Trivy action compromise and other workflow tool abuses demonstrate the high blast radius of malicious action entrypoints and tag hijacking. CI/CD action tag hijacking (Trivy)
AI, LLMs & Agent Security
- Unit42 found early experimental use of LLMs in malware (GPTâ3.5/GPTâ4) for logging, obfuscation suggestions and execution gating â mostly âAI theaterâ but with a plausible path to AIâgated payloads. AI use in malware (Unit42)
- SentinelOne describes a multiâagent âadversarial consensusâ pipeline for automated malware analysis that crossâvalidates multiple reverseâengineering tools to reduce false positives and decompiler artifacts. Adversarial consensus engine: multiâagent LLMs
- TrendMicro + NVIDIA outline layered controls (preâexecution policy, runtime enforcement, AIâspecific inspection) to safely deploy autonomous agentic AI at enterprise scale. Securing agentic AI with TrendAI & NVIDIA OpenShell
Scams, Fraud & Eâcommerce Abuse
- Researchers mapped 20,000+ fraudulent online shops (many on Sellvia WP templates) running on concentrated IPs as an industrialized paymentâcredential and PII harvesting ecosystem. Network of 20k+ fake shops
- Keitaro Tracker widely abused for domain cloaking, conditional routing and largeâscale AIâdriven investment/techâsupport scams; thousands of malicious instances and RDGA patterns observed. Keitaro abuse for AIâdriven scams
- LABScon talk unpacks crypto crime ecosystem (developerâmachine compromises, JS tampering, laundering via crossâchain swaps/Tornado Cash) and ~US$9B in stolen funds. Crypto crime realities: LABScon25 replay
Ransomware & Extortion Trends
- Ransomware actors continued to evolve (dataâtheft extortion, VPN/firewall exploits, REDBIKE prevalence); ecosystem profitability shifting toward smaller targets and new tooling (RMM/tunnelers/AI). Ransomware TTPs in 2025 (Google Cloud)
Notable Operational/Infrastructure Exposures
- RSA private TLS key for *.myclaw[.]360[.]cn was exposed in distributed installer material for Qihoo 360âs âSecurity Clawâ AI platform, enabling namespaceâwide impersonation if used in production (rotated after discovery). Myclaw 360 TLS privateâkey exposure
- MSâSQL servers with weak credentials exploited via brute force/BCP abuse by Larvaâ26002 to write downloaders and deploy a Go scanner (ICE Cloud Client); actor has ties to previous ransomware families. Larvaâ26002: MSâSQL compromise & ICE Cloud scanner