Cybersecurity Threat Research âWeeklyâ Recap: A broad survey of supply-chain compromises, credential theft, phishing, and malware campaigns spanning PyPI, npm, Docker images, and cloud developer tooling. It highlights operations by LiteLLM/TeamPCP, GlassWorm, EvilTokens, Remcos/XWorm, VoidLink, DarkSword, and PawnStorm among others, with defender guidance on monitoring pipelines, web threats, persistence, and detection across platforms. #LiteLLM #TeamPCP #GlassWorm #EvilTokens #Remcos #XWorm #VoidLink #DarkSword #PawnStorm #PRISMEX #Magecart #WebLogic #CVE2026-21962 #Cloudflare #Telnyx #FriendlyDealer #Keitaro #InfinitiStealer #IceCloudScanner #Trivy #GhostCampaign #OpenClaw #TroyDen
Supply chain & developer ecosystem
- Trojanized PyPI/OpenVSX releases of LiteLLM executed staged payloads to harvest secrets, target Kubernetes, and maintain persistence â LiteLLM supplyâchain trojan
- TeamPCP used compromised CI/CD credentials to inject credentialâstealers into Trivy and related actions, poisoning developer pipelines â Trivy supplyâchain guidance
- Datadog links the LiteLLM compromise to a fiveâday TeamPCP campaign that spread through npm, Checkmarx, and other ecosystems â LiteLLM: TeamPCP campaign
- Additional compromised Trivy Docker images contained TeamPCP stealer artifacts; avoid affected images and treat recent runs as exposed â Trivy Docker images compromised
- Telnyx Python SDK releases were trojanized on PyPI to deliver credentialâharvesters; PyPI quarantined releases and rollbacks are advised â Telnyx SDK compromise
- GlassWorm distributed malicious npm/PyPI/VSCode packages with hidden installers and Solanaâbased payload retrieval, ending in infostealers and fake Chrome extensions â GlassWorm package supplyâchain abuse
- Attackers published trojanized GitHub repos (300+ lures) delivering a LuaJIT loader and encrypted scripts â AIâassisted lure factory ties to TroyDen â OpenClaw / TroyDen lure factory
- Malicious npm packages presented fake install logs to phish for sudo passwords and drop a RAT that steals wallets and data â npm fakeâinstall logs / Ghost campaign
Credential theft, phishing & platform abuse
- Threat actors abuse Cloudflare Workers, Tunnels and Pages to host convincing AiTM phishing pages and covert malware delivery on trusted domains â Cloudflare services abused
- Railway.com PaaS and multiâhop redirect chains were used to host Microsoft 365 tokenâharvesting backends for the EvilTokens service â Railway / EvilTokens token phishing
- Convincing Xiaomi HR/IT phishing pages captured credentials via a counterfeit Mi Account login hosted at amolikhousing[.]co â Xiaomi credential phishing
- Fake Avast site staged a âvirus scanâ to push Venom Stealer (disguised as Avast_system_cleaner.exe) that exfiltrated browser credentials and wallets â Bogus Avast / Venom Stealer
- FriendlyDealer faked appâstore pages across 1,500+ domains to push PWAs redirecting victims to gambling offers (affiliate monetization) â FriendlyDealer PWA scam
- Keitaro adtech/trackers are widely abused as cloakers/TDS to scale phishing, malvertising, and malware delivery (DonutLoader, walletâdrainer campaigns) â Keitaro abuse in distribution
- Dead Infrastructure Hijacking (expired domains, SaaS CNAME takeovers, bucket squatting) lets attackers inherit trust and receive sensitive traffic â Dead Infrastructure Hijacking
- Recruitmentâstyle spearâphishing impersonating Palo Alto Networks talent acquisition targeted senior professionals to monetize via fake ATS/resume services â PANW recruiter impersonation
Malware campaigns, RATs & loaders
- EtherRAT (Node.js) retrieves C2 from Ethereum smart contracts (EtherHiding), performs broad fingerprinting and uses CDNâlike HTTPS beacons to blend traffic â EtherRAT / EtherHiding analysis
- Elastic uncovered BRUSHWORM (modular backdoor) and BRUSHLOGGER (DLL sideâloading keylogger) deployed against a South Asian bank with USBâspread and AES/XOR log handling â BRUSHWORM & BRUSHLOGGER
- New macOS Infiniti Stealer uses ClickFix lures and Nuitkaâcompiled Python payloads to harvest Keychain, browser data, wallets and developer secrets â Infiniti Stealer (macOS)
- Multiâstage campaign used VBS launchers, fileless PowerShell, PNGâembedded .NET (PhantomVAI) to deliver Remcos RAT and XWorm variants from Cloudflareâbacked hosts â Multiâvector malware delivery (Remcos / XWorm)
- Kamasers botnet offers multiâvector DDoS with resilient Dead Drop Resolver C2 and loader functionality for followâon payloads â Kamasers DDoS botnet
- Chinaâlinked set Silver Fox blends APTâstyle backdoors (ValleyRAT, HoldingHands) with opportunistic campaigns and a compiled Python stealer exfiltrating to xqwmwru[.]top â Silver Fox operations
- Actor targeting exposed MSâSQL servers deployed the Goâbased ICE Cloud Client scanner to harvest MSSQL credentials and report successes to C2 â ICE Cloud Scanner (Larvaâ26002)
- Securelist refined CoolClient IoCs: a HoneyMyte campaign used updated CoolClient backdoor to deploy browser stealers and reconnaissance scripts â CoolClient / HoneyMyte campaign
Web threats & exploitation
- Largeâscale Magecart operation hijacked eStores (100+ domains) with multiâstage JS loaders and WebSocket exfil to steal card data and shift fraud impact to banks â Magecart targeting Spain
- Highâinteraction honeypot observed rapid exploitation of unauthenticated Oracle WebLogic RCE (CVEâ2026â21962) and continued scans for legacy RCEs â WebLogic honeypot â CVEâ2026â21962
- Comprehensive web shell guidance: types, deployment vectors (RFI/LFI, SQLi, file upload flaws), persistence methods and removal recommendations â Web shells: mitigation & removal
Advanced persistence, rootkits & exploit chains
- Leaked source exposes VoidLink, a hybrid LKMâeBPF Linux rootkit with ICMP C2, antiâdebug, delayed init and eBPF Netlink hiding across multiple kernel versions â VoidLink rootkit analysis
- Google GTIG detailed DarkSword, a JavaScript iOS fullâchain exploit (six vulnerabilities) used to deliver GHOSTBLADE/GHOSTKNIFE/GHOSTSABER by commercial vendors and suspected state actors â DarkSword iOS exploit chain
- Datadog revisits CVEâ2020â8561: an âunpatchableâ Kubernetes attack path combining ValidatingWebhookConfiguration SSRF with API server profiling to leak full responses when cluster creds exist â Kubernetes CVEâ2020â8561 analysis
Strategic targeting, espionage & campaign clusters
- CloudSEK warns MLOps and exposed AI infrastructure (100+ credential sets, 80+ unauthenticated MLOps deployments) are strategic targets amid regional kinetic escalation â AI infrastructure as strategic target
- Pawn Storm (APT28) deployed PRISMEX against Ukrainian defense supply chain using steganography, cloud abuse and newly disclosed CVEs for resilient fileless execution â Pawn Storm / PRISMEX
- Unit 42 mapped coordinated espionage against a Southeast Asian government using USBâspread loaders (USBFect/HIUPAN), PUBLOAD backdoor and multiple RATs suggesting Chinaâaligned sets â SE Asia espionage clusters
- MâTrends 2026 highlights bifurcated adversary behavior (fast, destructive criminals vs. persistent espionage), rising token theft/voice phishing and recommends identity controls and extended logging â MâTrends 2026 takeaways
Tools, detection & defender guidance
- Elastic Workflows automates alert triage in Kibana with YAML playbooks, enrichment, threat intel lookups and AI steps to scale investigations â Elastic Workflows automation
- Elastic Security XDR centralizes endpoint telemetry, forensics (osquery), Device Control and automated workflows for crossâenvironment investigations â Elastic Security XDR
- CrowdStrikeâs Falcon NextâGen SIEM adds thirdâparty EDR support (starting with Microsoft Defender), federated search and a Query Translation Agent for migrations â Falcon NextâGen SIEM update
- EclecticIQ offers free, timeâlimited TIP Bundles to test vendor integrations (sandboxing, reversing, VMRay, vulnerability intel) in real SOC workflows â EclecticIQ TIP Bundles
- Sysdig highlights risks from local AI coding agents running on developer machines â review agent behavior and credential exposure in dev environments â AI coding agents on hosts