This weekly roundup highlights an array of evolving threats β from a resilient Phorpiex/Twizt hybrid botnet and new stealer families to chained ActiveMQ flaws, platform abuse, and AI-adjacent exploit techniques. The report urges rapid patching, auditing of trusted platforms and AI integrations, stronger MFA/device controls, and vigilance against supply-chain and insider risks #Phorpiex #Anthropic
Keypoints
- Phorpiex (Twizt) now uses a hybrid HTTP + P2P C2 model to resist takedowns and deliver clippers, spam, and ransomware.
- Chained ActiveMQ vulnerabilities (including CVE-2026-34197) enable stealthy RCE and can be unauthenticated on some versions.
- AI-driven tactics are lowering the bar for DDoS and enabling prompt-injection and silent data exfiltration like GrafanaGhost.
- Supply-chain and platform abuse is widespreadβtrojanized tools, PyPI packages, Magecart SVG skimmers, and SaaS notification phishing are common vectors.
- Exposed infrastructure and insider threats (internet-facing Rockwell PLCs, insider photo leaks) increase operational and privacy risks.
Read More: https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html