daily critical

CTI Daily Brief: 2026-03-22 — Trivy Supply-Chain Attack Escalates, CISA Adds DarkSword iOS Exploits to KEV, FBI Warns of Handala Telegram C2

Supply-chain compromises dominated the reporting period as TeamPCP re-compromised Aqua Security's Trivy scanner and deployed the CanisterWorm wiper against Iranian targets. CISA added three DarkSword iOS exploit-chain CVEs to the KEV catalogue, and the FBI issued a flash alert on Iranian MOIS-linked Handala group leveraging Telegram for C2. Akira, Nightspire, and ShinyHunters drove a high volume of ransomware and extortion activity across multiple sectors.

Reporting Period Classification Generated
2026-03-22 (24h) TLP:CLEAR 2026-03-23

1. Executive Summary

The pipeline processed 88 reports from 15+ sources over the past 24 hours, with 16 rated critical and 28 rated high. Supply-chain compromise was the dominant theme: TeamPCP re-established access to Aqua Security’s GitHub organisation and Docker Hub, pushing malicious Trivy images and renaming 44 repositories, while simultaneously deploying the CanisterWorm wiper against Iranian targets. CISA added three CVEs from the DarkSword iOS exploit chain to its Known Exploited Vulnerabilities catalogue, ordering federal agencies to patch by 3 April. The FBI published a flash alert warning that Iranian MOIS-linked Handala hackers are using Telegram as command-and-control infrastructure in campaigns targeting journalists and dissidents. Ransomware volume remained elevated, with Akira claiming four victims, Nightspire listing three, and ShinyHunters threatening to leak 200 GB of Ameriprise Financial data. Citrix released patches for two NetScaler vulnerabilities including a CVSS 9.3 out-of-bounds read affecting SAML IdP configurations.

2. Severity Distribution

Severity Count Key Drivers
🔴 CRITICAL 16 Trivy supply-chain attack; CanisterWorm wiper; DarkSword iOS KEV additions; Chromium WebRTC/Blink/V8 CVEs; ShinyHunters extortion; Handala Telegram C2
🟠 HIGH 28 Citrix NetScaler CVEs; GhostClaw macOS infostealer; Chromium ANGLE/WebRTC CVEs; Akira/Nightspire/Qilin ransomware victims; AI coding agent security risks
🟡 MEDIUM 31 Cisco Talos annual review; additional Chromium CVEs; data breach claims
🟢 LOW 4 Regional data breach claims
🔵 INFO 9 Security tooling advisories; editorial coverage

3. Priority Intelligence Items

3.1 Trivy Supply-Chain Attack Escalates — TeamPCP Re-Compromises Aqua Security

Source: BleepingComputer, AppOmni

TeamPCP re-established unauthorised access to Aqua Security’s GitHub organisations and Docker Hub after an incomplete credential rotation from an earlier March incident. The attackers pushed malicious Docker images tagged 0.69.5 and 0.69.6 to Docker Hub (the last legitimate release is 0.69.3), injected the TeamPCP Cloud stealer credential-harvesting malware into CI/CD pipelines, and renamed all 44 repositories in the aquasec-com GitHub organisation. The compromise exploited a service account (Argon-DevOps-Mgt) authenticated via a long-lived Personal Access Token without MFA. Organisations running Trivy in CI/CD should treat any pipeline execution since 22 March as potentially compromised.

MITRE ATT&CK: T1195.002 (Supply Chain Compromise: Compromise Software Supply Chain), T1528 (Steal Application Access Token)

SOC Action: Audit all Trivy Docker images and GitHub Actions references. Pin to verified commit SHAs, not mutable tags. Revoke and rotate any credentials exposed in CI/CD runners that executed Trivy between 20–23 March. Search build logs for connections to TeamPCP infrastructure.

3.2 CanisterWorm Wiper Targets Iranian Systems via Cloud Infrastructure

Source: Krebs on Security

TeamPCP deployed a new destructive payload — CanisterWorm — that selectively wipes data on systems matching Iran’s timezone or with Farsi as the default language. The worm propagates through exposed Docker APIs, Kubernetes clusters, Redis servers, and the React2Shell vulnerability. If the target has Kubernetes cluster access, CanisterWorm destroys data on every node; otherwise it wipes the local machine. The C2 infrastructure uses Internet Computer Protocol (ICP) canisters — blockchain-based smart contracts resistant to takedown. This campaign shares technical infrastructure with the Trivy supply-chain attack (3.1).

MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1485 (Data Destruction), T1610 (Deploy Container)

SOC Action: Audit exposed Docker APIs and Kubernetes control planes for unauthorised access. Ensure Redis instances are not publicly reachable. Scan for CanisterWorm indicators tied to ICP canister domains. Organisations with Iran-locale systems should verify data integrity and check for anomalous container deployments.

3.3 CISA Adds DarkSword iOS Exploit-Chain CVEs to KEV Catalogue

Source: BleepingComputer

CISA added three vulnerabilities from the DarkSword iOS exploit kit to the KEV catalogue: CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520. The full chain comprises six CVEs enabling sandbox escape, privilege escalation, and remote code execution on iPhones running iOS 18.4 through 18.7. Google Threat Intelligence Group linked DarkSword to UNC6748 (customer of Turkish surveillance vendor PARS Defense) and UNC6353 (suspected Russian espionage). UNC6353 deployed DarkSword in watering-hole attacks against Ukrainian e-commerce and industrial websites, dropping the GhostBlade infostealer, GhostKnife backdoor, and GhostSaber code-execution implant. Federal agencies must patch by 3 April 2026 per BOD 22-01.

MITRE ATT&CK: T1203 (Exploitation for Client Execution), T1189 (Drive-by Compromise)

SOC Action: Verify all managed iOS devices are updated to iOS 18.8 or later. Query MDM for devices still on iOS 18.4–18.7 and prioritise remediation. Block known DarkSword watering-hole domains at the proxy layer.

3.4 FBI Flash Alert: Handala Uses Telegram for C2 in Espionage Campaigns

Source: BleepingComputer

The FBI issued a flash alert warning that Iranian MOIS-linked Handala (also tracked as Handala Hack Team, Hatef, Hamsa) and the IRGC-tied Homeland Justice group are using Telegram as C2 infrastructure. Targets include journalists critical of the Iranian government, dissidents, and opposition groups worldwide. The FBI seized four domains used by these groups: handala-redwanted[.]to, handala-hack[.]to, justicehomeland[.]org, and karmabelow80[.]org. This follows Handala’s attack on U.S. medical device firm Stryker, in which they factory-reset approximately 80,000 devices via the Microsoft Intune wipe command after compromising a domain administrator account.

MITRE ATT&CK: T1071.001 (Application Layer Protocol: Web Protocols), T1566 (Phishing)

SOC Action: Block the four seized domains at DNS and proxy. Monitor outbound Telegram API traffic from corporate endpoints for anomalous patterns. Review Intune Global Administrator accounts for unauthorized additions. Organisations in media or advocacy sectors should heighten vigilance for social-engineering lures.

3.5 Citrix NetScaler Critical Vulnerabilities (CVE-2026-3055, CVE-2026-4368)

Source: CERT-EU

Citrix published security advisory CTX696300 addressing two vulnerabilities in NetScaler ADC and Gateway. CVE-2026-3055 (CVSS 9.3) is an out-of-bounds read that can leak sensitive memory contents from systems configured as SAML Identity Providers. CVE-2026-4368 (CVSS 7.7) is a race condition enabling user session mix-up on Gateway and AAA virtual server configurations. Affected versions include NetScaler ADC and Gateway prior to 14.1-66.59, 13.1-62.23, and 13.1-37.262 (FIPS). No active exploitation confirmed at time of publication, but prior Citrix zero-day exploitation (CVE-2025-6543) by state actors increases urgency.

SOC Action: Identify all internet-facing NetScaler appliances configured as SAML IdP or Gateway. Apply patches immediately, prioritising internet-facing assets. After patching, terminate all active sessions: kill aaa session -all; kill icaconnection -all; kill rdp connection -all; clear lb persistentSessions. Snapshot appliances before patching for forensic review.

3.6 Chromium Security Update — Multiple Critical and High CVEs

Source: Microsoft MSRC

Microsoft ingested a batch of Chromium security fixes affecting Edge and Chrome. Critical-severity CVEs include CVE-2026-4463 (heap buffer overflow in WebRTC), CVE-2026-4449 (use-after-free in Blink), and CVE-2026-4444 (stack buffer overflow in WebRTC). High-severity CVEs include CVE-2026-4456 (UAF in Digital Credentials API), CVE-2026-4452 (integer overflow in ANGLE), CVE-2026-4450 (OOB write in V8), CVE-2026-4448 (heap buffer overflow in ANGLE), CVE-2026-4446 and CVE-2026-4445 (UAFs in WebRTC).

SOC Action: Push Chrome/Edge updates to all managed endpoints. Verify browser auto-update is functioning. Prioritise WebRTC-heavy environments (video conferencing, telehealth) for immediate patching.

3.7 GhostClaw Expands to GitHub Repos and AI Workflows

Source: AlienVault OTX

The GhostClaw credential-theft campaign has expanded beyond npm packages to target macOS users through malicious GitHub repositories and AI-assisted development workflows. Attackers impersonate legitimate tools, present fake authentication prompts, and establish persistence via scheduled tasks. All identified repositories communicate with C2 domain trackpipe[.]dev.

Indicators of Compromise

C2: trackpipe[.]dev
SHA256: 189b8419863830f2732324a0e02e71721ec550ffa606f9dc719f935db5d25821
SHA256: 3ab0bcc8ff821bd6ba0e5fdbb992836922a67524f8284d69324f61e651981040
SHA256: 946206d42497ea54a4df3f3fed262a99632672e99b02abcc7a9aff0f677efba8
SHA256: 72bc4f82786e23f067d8731dac2b51c033f49ceceab0a64065a160cdff54f488

MITRE ATT&CK: T1059.004 (Command and Scripting Interpreter: Unix Shell), T1204.002 (User Execution: Malicious File), T1528 (Steal Application Access Token)

SOC Action: Block trackpipe[.]dev at DNS and proxy. Search endpoint telemetry for the listed SHA256 hashes. Audit developer workstations for recently cloned GitHub repositories with suspicious README install instructions. Review AI coding assistant configurations for unrestricted script execution.

Risk Trend Supporting Evidence
🔴 CRITICAL Supply-chain compromises affecting critical software tools Trivy supply-chain attack (Docker, GitHub); GhostClaw expansion to GitHub repos and AI workflows
🔴 CRITICAL Exploitation of zero-day vulnerabilities in Citrix products CVE-2025-6543 used as zero-day since May 2025; Citrix NetScaler backdoors targeting governments
🟠 HIGH Increased ransomware activity with double extortion tactics Akira (CONCEPTNET, Schmiede, Dixon Electrical); Nightspire (3 victims); CipherForce (Tuna.uy)
🟠 HIGH Phishing as primary vector for data breaches and ransomware Lakemonster.com breach (43,773 accounts); Amazon claimed breach; Indonesian government data dumps
🟠 HIGH Phishing campaigns targeting cloud service credentials AWS console credential phishing campaign; Tycoon2FA PaaS platform persistence after takedown
🟠 HIGH Increased Qilin ransomware activity across multiple sectors J E Culp Transport, Southern Commercial Real Estate, Southwire, nPower Technologies, Elite Limousine Plus

Threat Actors

  • Handala (15 reports) — Iranian MOIS-linked hacktivist group; FBI flash alert and domain seizures this period
  • Nightspire (7 reports) — Ransomware group with multiple new victims across European manufacturing and finance
  • TeamPCP (5 reports) — Cloud-focused cybercrime group behind Trivy supply-chain attack and CanisterWorm wiper
  • UNC6353 (5 reports) — Suspected Russian espionage group deploying DarkSword and Coruna iOS exploit kits
  • Void Manticore (5 reports) — Iran-nexus destructive threat actor
  • Qilin (4 reports) — Ransomware operator with sustained multi-sector campaign
  • Akira (4 reports) — Ransomware group claiming four new victims in education, manufacturing, and electrical contracting
  • APT28 (4 reports) — Russian GRU-linked espionage group

Malware Families

  • TeamPCP Cloud stealer (3 reports) — Credential-harvesting malware injected into Trivy supply chain
  • Akira ransomware (3 reports) — Double-extortion ransomware with active victim claims
  • CanisterWorm (1 report) — Wiper malware targeting Iranian systems via cloud infrastructure
  • GhostClaw / GhostLoader (1 report) — macOS infostealer distributed via GitHub and AI workflows
  • DarkSword (3 reports) — iOS exploit kit used in espionage and crypto-theft campaigns
  • NodeSnake (3 reports) — Backdoor malware observed in prior reporting periods
  • Slopoly (4 reports) — Persistent malware family tracked across the pipeline

6. Source Distribution

Source Reports URL Notes
Microsoft 25 link Chromium CVE advisories (bulk of volume)
RansomLock 16 link Ransomware victim monitoring — Akira, Nightspire, ShinyHunters, Qilin
Unknown 12 Telegram-sourced intelligence and unattributed data breach claims
BleepingComputer 7 link Trivy supply-chain, Handala FBI alert, DarkSword CISA KEV
RecordedFutures 5 link Sentencing, North Korean IT worker schemes
Elastic Security Labs 4 link Threat research and detection content
Wiz 3 link Cloud security analysis
Wired Security 3 link Conflict zone reporting
Crowdstrike 2 link Threat intelligence
Cisco Talos 2 link 2025 Year in Review
Sysdig 2 link AI coding agent runtime security
CertEU 1 link Citrix NetScaler advisory SA-2026-003
Krebs on Security 1 link CanisterWorm wiper deep-dive
AppOmni 1 link Trivy compromise SaaS impact analysis
AlienVault 1 link GhostClaw IOC pulse
SANS 1 link Security diary
Schneier 1 link Security commentary

7. Consolidated Recommendations

  • 🔴 IMMEDIATE: Audit all Trivy Docker images, GitHub Actions references, and CI/CD pipelines for compromise. Pin dependencies to verified commit SHAs. Rotate any credentials that transited Trivy-integrated runners between 20–23 March. (Ref: §3.1, §3.2)

  • 🔴 IMMEDIATE: Update all managed iOS devices to iOS 18.8 or later to mitigate the DarkSword exploit chain (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520). Federal agencies: BOD 22-01 deadline is 3 April 2026. (Ref: §3.3)

  • 🟠 SHORT-TERM: Patch internet-facing Citrix NetScaler ADC and Gateway appliances to address CVE-2026-3055 (CVSS 9.3) and CVE-2026-4368. Terminate all active sessions post-patch and snapshot appliances for forensic analysis. (Ref: §3.5)

  • 🟠 SHORT-TERM: Block Handala-associated domains (handala-redwanted[.]to, handala-hack[.]to, justicehomeland[.]org, karmabelow80[.]org) and trackpipe[.]dev at DNS/proxy. Monitor outbound Telegram API traffic for anomalous C2 patterns. (Ref: §3.4, §3.7)

  • 🟡 AWARENESS: Push Chrome/Edge updates to address 9+ Chromium CVEs including critical heap buffer overflows in WebRTC. Prioritise environments with heavy WebRTC usage. (Ref: §3.6)

  • 🟢 STRATEGIC: Review CI/CD pipeline security posture — ensure GitHub Actions pin to commit SHAs rather than mutable tags, enforce MFA on all service accounts, and audit PAT usage across automation accounts. The Trivy incident demonstrates that incomplete credential rotation after a breach enables persistent re-compromise. (Ref: §3.1)


This brief was generated entirely by AI from automated threat intelligence collection and correlation pipelines, made up of 88 reports processed across 3 correlation batches. A human analyst reviewed and approved this report before publication, but AI-generated analysis may contain errors in attribution, severity assessment, or indicator extraction. Always verify IOCs, CVE details, and threat actor attribution against primary sources before taking operational action.