This report informs our partners and clients on the various happenings within the cybersecurity space, including relevant breaches, emerging vulnerabilities, research, threat actor movement, and what your organization needs to do to mitigate future threats.
SolarWinds has released security updates to address four critical vulnerabilities in Serv-U. The most serious flaw, CVE-2025-40538, allows high-privilege users to create a system admin account and execute arbitrary code as root. Additionally, two type confusion flaws and an Insecure Direct Object Reference (IDOR) vulnerability were patched. Serv-U is frequently targeted in cyberattacks due to its access to sensitive corporate data, as evidenced by recent exploits by hacking groups including Clop and China-based DEV-0322.
Current public honeypot data does not show evidence that this vulnerability is being actively exploited in the wild. A highly privileged user is a prerequisite for full exploitation, limiting impact to cases involving stolen credentials or prior access earlier in a threat actor's attack chain. A likely scenario would see this flaw exploited later in the chain for data exfiltration purposes. No public PoC is currently known.
Starkiller is a new phishing-as-a-service offering that uses cleverly disguised links to load real websites, acting as a relay between victims and legitimate sites while capturing user data including multi-factor authentication codes. The service dynamically loads the legitimate login page, captures all user input through proxy services, and provides features such as session monitoring, keylogging, geo tracking, and automated alerts for credential theft. By intercepting and relaying victim credentials in real time, it neutralizes MFA protections and provides low-skill cybercriminals with sophisticated attack capabilities.
A key indicator of this attack vector is the URL address bar displaying the legitimate service address followed by an @ symbol and an additional malicious domain:
https://login.microsoft[.]com@badsite[.]ruSources indicated that the threat actor operated their own forum. The site was no longer accessible at the time of this report.
Broadcom has released patches for vulnerabilities in VMware Aria Operations. CVE-2026-22719 is a command injection issue allowing unauthenticated remote code execution during product migration. CVE-2026-22720 is a stored cross-site scripting (XSS) vulnerability that permits administrative actions through script injection. CVE-2026-22721 is a medium-severity privilege escalation flaw capable of granting administrative access. Patches are included in version updates for VMware Cloud Foundation, vSphere Foundation, and Aria Operations.
To our knowledge these vulnerabilities have not been exploited in the wild and no public PoC currently exists. A likely exploitation scenario would involve RMM or similar IT support social engineering, similar to tactics employed by groups such as ShinyHunters.
A Russia-aligned threat actor known as UAC-0050 (also designated Akula or DaVinci Group) targeted a European financial institution with a spear-phishing attack that spoofed a Ukrainian judicial domain, delivering a multi-layered infection chain culminating in the deployment of Remote Manipulator System (RMS) — legitimate Russian remote desktop software — allowing for stealthy access and control. Available sources indicate the threat actor was probing for information on European partners, with localized lures suggesting imminent westward campaign expansion.
This activity will likely affect financial institutions primarily partnered with Ukrainian companies. While current attacks use Russian ASN addresses, this is expected to change to match targeted regions. The group has reused the domain rmansys[.]ru since at least 2015.
Russia-linked APT28 (Fancy Bear), operating out of the Russian GRU's military unit 26165, conducted Operation MacroMaze from September 2025 to January 2026, targeting Western and Central European entities with a webhook-based macro malware campaign. The attack utilized spear-phishing emails containing weaponized documents leveraging an "INCLUDEPICTURE" field to track document opening and exfiltrate data via website[.]hook domains. Four closely related macro variants served as droppers for multi-stage execution, establishing persistence while bypassing security measures.
APT28 has also made use of MS Office vulnerabilities CVE-2026-21509 and CVE-2026-21514. CVE-2026-21509 has a public PoC available. Current samples indicate targeting of entities in Spain, with a separate Romanian-targeting campaign also identified.
Cybersecurity agencies from the Five Eyes alliance issued urgent warnings about an advanced actor exploiting new flaws in Cisco SD-WAN systems. CISA and NCSC directed organizations to investigate potential compromises immediately. Cisco's advisory details how these vulnerabilities could enable attackers to access systems, elevate privileges, gain sensitive information, and overwrite files. The Australian Signals Directorate provided a technical guide detailing exploitation of the zero-day since 2023, with threat actors creating rogue network components for long-term persistence and employing log-tampering evasion techniques.
No public PoC for CVE-2026-20127 is currently available, though indications suggest an exploit is being sold through GitHub repositories. CVE-2022-20775 has had a PoC available since 2022. Public honeypot data shows a slight increase in activity against Cisco hosts, primarily targeting European regions, beginning February 26th, 2026.
The UAT-10027 campaign targets U.S. education and healthcare sectors by deploying a stealthy backdoor named Dohdoor through phishing attacks leading to PowerShell script execution and malicious DLL sideloading. The malware uses DNS-over-HTTPS and Cloudflare infrastructure to hide command-and-control traffic, deploying additional payloads such as Cobalt Strike into memory. Dohdoor employs a custom XOR-SUB decryption routine with overlap similarities to Lazarloader used by North Korean Lazarus Group, then performs process hollowing into legitimate Windows processes like OpenWith.exe or wksprt.exe. EDR evasion includes patching syscall stubs in ntdll.dll.
The following network and domain IOCs are currently known to be associated with this campaign.
CJiTDrpwnnA[.]MswINsoFTUPDLoad[.]deSigN
LBaNDUgZCFG[.]deepInspectiOnSYSTEM[.]oNLiNE
LsyPdQGXrEDfPx[.]MSwInSofTUpDloAd[.]dESign
YHDJTyLNsMWVuU[.]DEEPinSPeCTioNsyStEM[.]OnLiNe
SDXsIol[.]PNUIsckmHwAgzVdYJRlbeFT[.]SoftWarE
EzQrvkFgEJWCTDNc[.]pNuiSCKMhwAgZvdyjrlBEFT[.]softwarE
txjIQslrRIg[.]MSwINSOFTUPDLoaD[.]DesiGN
QHtcKZBXtKdVyr[.]mSWinSoFTUpdLOAD[.]DeSIgn
GITkzxd[.]pNUIScKMhWAgZvdyJRlBEFT[.]SoFtwaRE
GppiwoGwNdiakkDU[.]pnuiSckMHwaGzvDYjRLbeFt[.]SoFTWARe
hxxp[://]gITkzxd[.]pNUIScKMhWAgZvdyJRlBEFT[.]SoFtwaRE/X111111
hxxp[://]GppiwoGwNdiakkDU[.]pnuiSckMHwaGzvDYjRLbeFt[.]SoFTWARe/111111?sub=s
hxxp[://]lBaNDUgZCFG[.]deepInspectiOnSYSTEM[.]oNLiNE/X111111
hxxp[://]CJiTDrpwnnA[.]MswINsoFTUPDLoad[.]deSigN/x111111
hxxp[://]LsyPdQGXrEDfPx[.]MSwInSofTUpDloAd[.]dESign/111111?sub=s
hxxp[://]sDXsIol[.]PNUIsckmHwAgzVdYJRlbeFT[.]SoftWarE/X111111
hxxp[://]ezQrvkFgEJWCTDNc[.]pNuiSCKMhwAgZvdyjrlBEFT[.]softwarE/111111?sub=d
hxxp[://]lLalWpIJnjskClwY[.]PnUiscKMhWaGzVdyJRlBEfT[.]SofTWaRe/111111?sub=s
CISA has identified CVE-2025-40551, a critical untrusted data deserialization vulnerability in SolarWinds Web Help Desk, as being actively exploited and has mandated federal agencies to patch within three days. This flaw allows attackers to execute remote commands on affected devices. The same update also addressed CVE-2025-40537 (hardcoded credentials: client:client), and authentication-bypass flaws CVE-2025-40552 and CVE-2025-40554, all remotely exploitable.
A likely attack chain involves visiting the login page to generate a valid session, then executing a GET request to /helpdesk/WebObjects/Helpdesk.woa/wo/test.wo/<wosid>/1.0?badparam=/ajax/&wopage=LoginPref to bypass authentication and trigger the deserialization vulnerability. Log indicators include:
ERROR org.jabsorb.JSONRPCBridge - exception occured
and
INFO whd.helpdesk.com.macsdesign.util - Whitelisted payload with matched keyword: java.. Payload= {
"bypass":"java.parentpopupwonoselectionstringdummymdssubmitlinkmdsform__enterkeypressedmdsform__shiftkeypressedmdsform__altkeypressed_csrf",
"id":1,
"method":"wopage.variablevalueforname",
"params":["malicious"]
}Threat actors are actively abusing this vulnerability and installing Zoho ManageEngine RMM agent (a legitimate RMM tool) with associated email esmahyft@proton[.]me, and installing from the domain catbox[.]moe. Additionally, the threat actors are also installing outdated versions of Velociraptor, a known legitimate forensics tool. The following domains and files have been used within attacks:
https://files.catbox[.]moe/tmp9fc.msi
https://vdfccjpnedujhrzscjtq.supabase[.]co/storage/v1/object/public/image/v4.msi
https://auth.qgtxtebl.workers[.]dev/
The attackers also installed Cloudflared (Cloudflares Tunnel Client) from the official GitHub repository and portable versions of VSCode from a supabase[.]co URL.
The threat actor establishes persistence through scheduled tasks. The task paths observed include the following locations:
C:\Windows\System32\Tasks\TPMProfilerPublicly available research and PoC code is now available for these vulnerabilities. Wider exploitation may occur on unpatched SolarWinds WHD hosts.
The full Intelligence Desk brief includes exhaustive IOC lists, YARA detection rules, detailed remediation playbooks, and OSec's original threat research. Delivered weekly to our partners and clients. REQUEST ACCESS