EXECUTIVE SUMMARY
This article is to inform our partners and clients on the various happenings within the cybersecurity space. That includes items such as relevant breaches, emerging vulnerabilities, research, threat actor movement, and what you need to do as an organization to mitigate a future threat.
KEY TAKEAWAYS
SUMMARY
Hackers are exploiting a critical vulnerability (CVE-2026-3055) in Citrix NetScaler ADC and Gateway appliances to obtain sensitive data, with confirmed attack activity beginning on March 27th.
Category
Known Exploited Vulnerabilities
Industry
Multiple
Sources
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
ANALYST COMMENTS
Hackers are exploiting a critical severity vulnerability (CVE-2026-3055) in Citrix NetScaler ADC and Gateway appliances to access sensitive data, specifically affecting versions configured as SAML IDPs. Exploitation has been observed in the wild since March 27, and analysis indicates the issue stems from multiple memory overread flaws impacting both SAML and WS-Federation authentication endpoints.
Exploiting this vulnerability is trivial and will make requests to the following endpoints:
/saml/login
/wsfed/passive?wctxBy executing a SAML request to the endpoints with a minimal content and a crafted ID parameter, a threat actor is able to execute multiple requests in order to leak the memory of the vulnerable server in the NSC_TASS cookie in response. Excessively long base64 strings of this cookie may indicate evidence of exploitation. If this exploit is in use when an administrator logs into the device, this will result in the administrator session cookie being leaked.
# Request to trigger exploitation
POST /saml/login HTTP/1.1
Host: 192.168.80.125
Content-Length: 510
SAMLRequest=PHNhbWxwOkF1dGhuUm...snip
# Contents of base64 encoded SAML
<samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
ID="_1"
Version="2.0" ProviderName="my provider"
Destination="http://watchtowr/saml.php"
ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
>
<saml:Issuer>http://watchtowr/saml.php</saml:Issuer>
</samlp:AuthnRequest>ACTIONABLE GUIDANCE
Patching should be applied in order to remediate this issue. The following versions are fixed and not vulnerable to the issue:
If a patch cannot be applied, a recommended workaround is to disable SAML IDP and restrict the SAML endpoints noted above. Additionally, blocking the identified IOC noted above is also recommended, however organizations should expect continued exploitation attempts and should monitor the /saml/login and /wsfed/passive?wctx endpoints for signs of activity.
SUMMARY
F5 Networks reclassified a critical vulnerability in BIG-IP APM from a denial-of-service flaw to a remote code execution flaw, with active exploitation observed. Attackers are using it to deploy webshells on unpatched devices, creating significant risk.
Category
Known Exploited Vulnerabilities
Industry
Technology, Public Sector and Government Administration
Sources
https://my.f5.com/manage/s/article/K000160486
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-53521
https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide
ANALYST COMMENTS
Cybersecurity firm F5 Networks has reclassified a vulnerability in BIG-IP APM from a denial-of-service flaw to a critical remote code execution (RCE) issue, with attackers exploiting it to deploy webshells on unpatched devices. This RCE flaw, tracked as CVE-2025-53521, can be exploited by unauthorized users when targeting BIG-IP APM systems configured on virtual servers. F5 has issued an advisory update warning of the vulnerability's exploitation and provided indicators of compromise for defenders to check their systems' disks, logs, and terminal history for malicious activity signs. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) listed the flaw as actively exploited, ordering federal agencies to secure their BIG-IP APM systems by a specified deadline due to significant risks posed to the federal enterprise.
At this time, no publicly available proof of concept has been identified, and there is no confirmed attribution to any specific threat actor exploiting this vulnerability.
The vendor provided IOCs to identify malicious activity can be seen below:
# Files written to disk
/run/bigtlog.pipe
/run/bigstart.ltm
# Files with mismatches filesize or hashes when compared with known good versions
/usr/bin/umount
/usr/sbin/httpd
# Generated log entries
/var/log/restjavad-audit.<NUMBER>.log
[ForwarderPassThroughWorker{"user":"local/f5hubblelcdadmin","method":"POST","uri":"http://localhost:8100/mgmt/tm/util/bash","status":200,"from":"Unknown"}
This entry shows a local user accessing the iControl REST API from localhost.
/var/log/auditd/audit.log.<NUMBER>
msg='avc: received setenforce notice (enforcing=0) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?'
This entry shows a local user accessing the iControl REST API from localhost to disable SELinux.
/var/log/audit
user=f5hubblelcdadmin folder=/Common module=(tmos)# status=[Command OK] cmd_data=run util bash <VARIABLE_COMMAND>
These log messages show an echo of Base64-encoded data written into a file and the execution of /run/bigstart.ltm. This entry shows an example of a command being run in the audit log, correlated to the iControl REST request above.
# Identifying malicous file
lsof -n and looking for entries with bigtlog.pipe
# Network traffic
Unknown network locations sending HTTP requests with 201 code.
ACTIONABLE GUIDANCE
Applying the patches for this vulnerability should be prioritized. The following versions are fixed:
In addition to applying the patch, these devices should be monitored for anomalous behavior including activity matching the IOCs noted above, unexpected reboots or other system instability, and network traffic from unknown sources. This vulnerability primarily affects APM when configured on a virtual server.
SUMMARY
North Korean hackers attributed to UNC1069 compromised the widely used JavaScript library Axios through a supply chain attack. The actors published malicious versions of the package that included a remote access trojan capable of executing arbitrary commands and exfiltrating data across various operating systems before self-deleting to evade detection.
Category
Supply Chain Risk
Industry
Technology, Financial and Fintech
Sources
https://therecord.media/google-links-axios-supply-chain-attack-north-korea
https://hunt.io/blog/axios-supply-chain-attack-ta444-bluenoroff
https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
https://safedep.io/axios-npm-supply-chain-compromise/
https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan
Internal OSec Collection
ANALYST COMMENTS
Hackers associated with North Korea have compromised the widely-used HTTP client library Axios through a supply chain attack, impacting front-end and back-end systems globally. Researchers attributed this to UNC1069, a financially motivated group known for using sophisticated malware like WAVESHAPER in previous attacks. The malicious versions of Axios injected new dependencies that installed malware capable of executing arbitrary commands, exfiltrating data, and persisting on infected machines across Windows, macOS, and Linux systems.
The Axios supply chain attack is likely to have caused multiple downstream effects to projects. The only indication that the package was malicious was due to an added package within the package.json and package-lock.json files noted as being “plain-crypto-js”. Once installed, the package detects the host operating system and deploys backdoors tailored to that environment. The initial supply chain compromise occurred through credential theft of the package maintainer’s Github and npm accounts. The currently known network IOCs associated with this campaign include the following:
sfrclak[.]com - AS54290, Hostwinds LLC
142.11.206.73:8000 - AS54290, Hostwinds LLC - Beacons out every 60 secondsThe attack window of the supply chain compromise lasted 3 hours and 19 minutes, between 2026-03-31T00:21:58Z - 2026-03-31T03:40:46Z.
The Axios version affected included 1.14.1 and 0.30.4. The second stage payloads of the malware will create persistence objects in the following locations:
# Windows
%PROGRAMDATA%\system.bat - Persistence/ pointing to in the MicrosoftUpdate registry key
%PROGRAMDATA%\wt.exe - Persistence
%TEMP%\6202033.vbs
%TEMP%\6202033.ps1
Registry: HKCU:\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftUpdate - Persistence
#Linux
/tmp/ld.py
/tmp/.XXXXXX (random 6-char name)
#macOS
/Library/Caches/com.apple.act.mond
/private/tmp/.XXXXXX
/tmp/.XXXXXX.scptACTIONABLE GUIDANCE
Organizations that suspect they have been compromised should check for network communications that run every 60 seconds to domains and addresses over port 8000, to a URL ending in a numerical value (i.e. /6612345) and contain base64 encoded content in a POST request. Projects should be audited against the known exploitation window, including reviewing logs for npm package installations, particularly any installation or update of the Axios package during that period. Proactive security measures should focus on enforcing package inventory controls through defined processes and policies. Any addition or upgrade of packages should go through a vetting process, ideally integrated into development pipelines with auditable change management logs.
SUMMARY
Cisco suffered a cyberattack due to stolen credentials from the previous Trivy compromise.
Category
Supply Chain Risk
Industry
Technology, Financial and Fintech, Public Sector and Government Administration, Multiple
Sources
https://hackread.com/shinyhunters-hackers-cisco-records-data-leak/
Internal OSec Collection
ANALYST COMMENTS
Cisco experienced a cyberattack where stolen credentials from the Trivy supply chain attack were used to access its internal development environment, resulting in the theft of source code for both Cisco and its customers. The attackers exploited a malicious "GitHub Action plugin" that allowed them to steal data and credentials from the company's build environment, affecting numerous devices including developer workstations. Additionally, over 300 GitHub repositories were cloned during the incident, including those related to AI-powered products like AI Assistants and AI Defense, as well as repositories belonging to corporate customers including banks, BPOs, and US government agencies. Cisco has contained the breach by isolating affected systems, initiating reimaging processes, and rotating compromised credentials.
Regarding Trivy, multiple packages have been compromised, and the full scope of the attack is not yet fully understood. Below is a compiled list of indicators of compromise associated with this activity:
scan.aquasecurtiy.org Primary C2 domain — typosquat of aquasecurity
aquasecurtiy C2 domain fragment — catches partial references
tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io - ICP blockchain C2
tdtqy-oyaaa-aaaae-af2dq-cai - ICP canister ID
45.148.10.212 - C2 IP
45.148.10.122 - C2 IP
models.litellm.cloud - LiteLLM exfiltration
checkmarx.zone - Secondary C2/payload server
souls-entire-defined-routes.trycloudflare.com - Cloudflare tunnel C2
investigation-launches-hearings-copying.trycloudflare.com - Cloudflare tunnel C2
championships-peoples-point-cassette.trycloudflare.com - Cloudflare tunnel C2
create-sensitivity-grad-sequence.trycloudflare.com - Cloudflare tunnel C2
plug-tab-protective-relay.trycloudflare.com - Cloudflare tunnel C2
recv.hackmoltrepeat.com - Theft exfiltration
83.142.209.11 KICS chain C2 IP — resolves checkmarx.zone
/tmp/runner_collected_ - code snippet
tpcp.tar.gz - exfiltration file sent via C2 servers
# Vulnerable Trivy versions during attack: March 19th to the 23rd
Trivy 0.69.4
Trivy 0.69.5
Trivy 0.69.6 ACTIONABLE GUIDANCE
Organizations should prioritize blocking and hunting for IOCs related to the Trivy and associated campaigns to determine if a compromise has occurred. Longer term, CI/CD pipelines should incorporate stronger controls such as package inventory management, approved package lists, and private repositories to reduce supply chain risk. Given the recent Cisco incident, organizations should assess where Cisco products are deployed and prioritize monitoring for suspicious activity, including unusual login events, unexpected reboots, and unauthorized access to management interfaces. Access to sensitive administrative functions should be restricted to internal networks with minimal exposure to the public internet.
SUMMARY
Two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in Progress ShareFile's Storage Zones Controller enable unauthenticated attackers to gain access and execute remote code, potentially allowing file exfiltration from affected enterprise environments.
Category
Supply Chain Risk
Industry
Multiple
Sources
Internal OSec Collection
ANALYST COMMENTS
Two vulnerabilities (CVE-2026-2699 and CVE-2026-2701) discovered in Progress ShareFile's Storage Zones Controller component can allow attackers to bypass authentication and execute remote code. These flaws were identified by researchers, who responsibly disclosed them to Progress. The attack chain involves exploiting an authentication bypass flaw to access admin interfaces and then leveraging remote code execution to deploy malicious webshells.
The attack is relatively simple but would require an attacker to make multiple requests to the vulnerable host to fully exploit. It would also require an attacker to create a zone that points to a malicious file storage location for webshell staging, which may provide detection opportunities if zone configurations are regularly audited. While the vulnerable version of the Controller prompts for a current password within the UI, the old password is not validated when requests are sent directly to the API, allowing unauthorized changes. Exploitation requires that the server is authenticated with the ShareFile SaaS. An attacker would need to interact with two primary endpoints to fully exploit this chain:
GET request to /ConfigService/Admin.aspx
GET request to /ConfigService/api/StorageZoneConfig?h=<hmac based on new passphrase>The following steps are needed in order to successfully chain the vulnerabilities and achieve RCE:
File sharing applications have historically been targeted by threat actors. While this attack is relatively complex, it remains likely to see future exploitation. Current estimates indicate around 30,000 ShareFile hosts are exposed to the internet, primarily in the US and Europe. At this time, public honeypot data shows only minimal targeting of this product
ACTIONABLE GUIDANCE
Patching this vulnerability should be a priority. There is always a high likelihood of exploitation taking place soon after a disclosure and file share products such as this one have been targeted by threat actors in the past. The currently known fixed versions include:
Exploitation attempts can also be disrupted by restricting access to the identified endpoints and monitoring configuration changes, particularly the creation of new zones. Compromise is likely indicated by requests to the /ConfigService related endpoints followed by the upload of a .zip file via upload.aspx.
SUMMARY
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical use-after-free flaw in Google Chrome's Dawn component, tracked as CVE-2026-5281, to its Known Exploited Vulnerabilities catalog.
Category
Critical Vulnerability
Industry
Multiple
Sources
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
https://securityaffairs.com/190282/security/u-s-cisa-adds-a-flaw-in-google-dawn-to-its-known-exploited-vulnerabilities-catalog.html
Internal OSec Collection
ANALYST COMMENTS
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-5281, a use-after-free flaw in Google Chrome's Dawn component prior to version 146.0.7680.178, to its Known Exploited Vulnerabilities catalog due to its potential for remote code execution through crafted HTML pages. Google has released updates to fix this and other vulnerabilities, urging immediate browser updates to mitigate attack risks. CISA mandates federal agencies to address the identified CVE by April 15, 2026, while experts recommend private organizations also review and remediate these vulnerabilities in their systems.
ACTIONABLE GUIDANCE
Administrators should apply the update to all browsers to ensure that the latest versions of Chrome are running to prevent abuse of this issue. This primarily affects Chrome installations that do not have auto-update enabled and use the WebGPU API. Fixed versions of this vulnerability include Chrome Version 146.0.7680.178 or later. As this vulnerability is triggered through malicious web pages, users should carefully validate links and sites before visiting them. This includes avoiding suspicious email links and verifying that search results and domains are legitimate and not impersonating trusted brands or software.
The full Intelligence Desk brief includes exhaustive IOC lists, YARA detection rules, detailed remediation playbooks, and OSec's original threat research. Delivered weekly to our partners and clients. REQUEST ACCESS