CTI Weekly Brief: 4 May to 10 May 2026 - PAN-OS Zero-Day Exploited In-the-Wild, Linux Kernel Page-Cache Bugs Chain to Root, npm Supply Chain Worm Hits Intercom SDK
Weekly intelligence covering 559 reports across the pipeline: state-sponsored exploitation of PAN-OS CVE-2026-0300, two unpatched Linux LPE chains (Copy Fail and Dirty Frag), Ivanti EPMM zero-day under CISA emergency directive, Mini Shai-Hulud npm worm, and sustained ransomware pressure from Qilin, The Gentlemen, Akira and DragonForce.
| Reporting Period | Classification | Generated |
|---|---|---|
| 4 May to 10 May 2026 (7d) | TLP:CLEAR | 2026-05-11 |
1. Executive Summary
This week the pipeline processed 559 reports across more than fifteen sources, dominated by 44 critical-severity items and 339 high-severity items. Three storylines defined the week. First, a confirmed-in-the-wild PAN-OS firewall zero-day (CVE-2026-0300) was exploited by suspected state-sponsored actors tracked by Unit 42 as CL-STA-1132 from 9 April onward; CISA added it to the KEV catalogue with a 9 May remediation deadline. Second, two separate Linux kernel local privilege escalation chains landed in the same week β Copy Fail (CVE-2026-31431), now under active exploitation and CISA-mandated for federal remediation by 15 May, and Dirty Frag (CVE-2026-43284 / CVE-2026-43500), disclosed after an embargo break on 7 May with a public PoC and no patches available across Ubuntu, RHEL, Fedora, openSUSE, AlmaLinux and CentOS Stream. Third, Ivanti disclosed a sixth EPMM zero-day in eighteen months (CVE-2026-6973) with limited exploitation observed; CISA gave federal agencies four days to patch.
Additional headline items include the Mini Shai-Hulud npm worm compromising the official intercom-client SDK (version 7.0.4) with Bun-runtime EDR evasion and four self-propagation vectors; Progress Softwareβs MOVEit Automation pre-auth bypass (CVE-2026-4670) with ~1,400 instances exposed; sustained ransomware throughput from Qilin (98 pipeline-wide reports), The Gentlemen (56), Akira (50), DragonForce (30) and ShinyHunters (27); and the public disclosure of Googleβs DarkSword iOS exploit chain attributed to commercial surveillance vendors operating against targets in Saudi Arabia, Turkey, Malaysia and Ukraine since November 2025.
2. Severity Distribution
| Severity | Count | Key Drivers |
|---|---|---|
| π΄ CRITICAL | 44 | PAN-OS CVE-2026-0300 zero-day; Dirty Frag (CVE-2026-43284/43500) and Copy Fail (CVE-2026-31431) Linux LPEs; Ivanti EPMM CVE-2026-6973; MOVEit Automation CVE-2026-4670; Mini Shai-Hulud npm worm; Apache HTTP Server triple-fix; Redis-family RCEs; DarkSword iOS spyware |
| π HIGH | 339 | Qilin, The Gentlemen, Akira, DragonForce, ShinyHunters, Genesis, Inc Ransom and Lamashtu ransomware victim postings; PCPJack cloud worm; ScarCruft and DAEMON Tools supply-chain backdoors; Mac malware abusing Google Ads and Claude.ai shared chats |
| π‘ MEDIUM | 97 | Microsoft MSRC bulletins; Kubernetes / xmldom / pip secondary CVEs; phishing toolkit advisories |
| π’ LOW | 16 | Lower-confidence ransomware victim claims; minor configuration issues |
| π΅ INFO | 63 | Microsoft Defender / RansomLook telemetry; vendor blog posts; historical context items |
3. Priority Intelligence Items
3.1 PAN-OS CVE-2026-0300 β Unauthenticated RCE on Captive Portal Exploited Since 9 April
Source: BleepingComputer, Wiz, CERT-EU
Palo Alto Networks confirmed limited but active exploitation of a buffer-overflow vulnerability in the PAN-OS User-ID Authentication Portal (Captive Portal) by suspected state-sponsored attackers tracked by Unit 42 as cluster CL-STA-1132. The flaw allows unauthenticated remote code execution as root on Internet-exposed PA-Series and VM-Series firewalls with no user interaction. Successful intrusions began 16 April after a week of failed probes starting 9 April. Post-exploitation, the actors deployed open-source Earthworm and ReverseSocks5 tunneling tools β Earthworm has prior associations with the Chinese-speaking clusters Volt Typhoon, UAT-8337 and APT41 β and cleaned nginx crash artefacts to evade detection. Shadowserver tracks more than 5,400 PAN-OS VM-Series firewalls exposed online (2,466 in Asia, 1,998 in North America). CISA added CVE-2026-0300 to the KEV catalogue with a 9 May FCEB deadline; Cloud NGFW and Panorama are unaffected. Patches were targeted for 13 May; until then, restrict the Authentication Portal to trusted zones or disable it.
Affected products: PAN-OS on PA-Series and VM-Series firewalls (Captive Portal feature enabled).
MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1572 (Protocol Tunneling), T1070 (Indicator Removal on Host).
SOC Action: Audit
Device > User Identification > Authentication Portal Settingson every Internet-facing PAN-OS device; disable or scope to internal zones until patches are applied. Hunt nginx access/error logs for crash-clearing activity and unexpected outbound SOCKS5 connections. Detect Earthworm/ReverseSocks5 process trees and outbound TCP sessions to non-corporate IPs on high ports.
3.2 Dirty Frag β Unpatched Universal Linux LPE (CVE-2026-43284 + CVE-2026-43500)
Source: BleepingComputer, Sysdig, Upwind
Researcher Hyunwoo Kim published a PoC for Dirty Frag on 8 May after a third party broke the coordinated disclosure embargo. The exploit chains two page-cache-write bugs β xfrm-ESP (CVE-2026-43284, introduced January 2017) and RxRPC (CVE-2026-43500, introduced June 2023) β to deterministically overwrite /usr/bin/su or /etc/passwd in the page cache without altering on-disk integrity. Because the logic is deterministic, there is no race window, the kernel does not panic on failure, and success rates approach 100% across Ubuntu, Red Hat Enterprise Linux, CentOS Stream, AlmaLinux, openSUSE Tumbleweed and Fedora. No CVE-coordinated patches existed at the time of disclosure. Interim mitigation is to block the affected kernel modules: printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc β note this breaks IPsec VPNs and AFS file systems.
Affected products: Mainline Linux kernels carrying the xfrm-ESP optimisation (post-Jan 2017) and the RxRPC pcbc(fcrypt) handler (post-Jun 2023).
MITRE ATT&CK: T1068 (Exploitation for Privilege Escalation), T1070 (Indicator Removal on Host).
SOC Action: Inventory Linux hosts loading
esp4,esp6orrxrpckernel modules (lsmod | egrep 'esp[46]|rxrpc'). Where IPsec/AFS is not required, deploy the modprobe blocklist immediately. On hosts where the modules must remain loaded, increase auditd coverage on/usr/bin/su,/usr/bin/sudoand/etc/passwdfor unexpected memory-based modifications. Hunt for unprivileged users invoking AF_ALG/AF_RXRPC sockets with pcbc(fcrypt).
3.3 Copy Fail (CVE-2026-31431) β Actively Exploited Linux Kernel LPE
Source: Unit 42, Elastic Security Labs
Disclosed 29 April and now under active exploitation per CISAβs KEV addition, Copy Fail is a deterministic LPE in the Linux kernel cryptographic subsystem (algif_aead in the AF_ALG user-space crypto API). A combination of three innocuous-looking commits β authencesn (2011), AEAD support in AF_ALG (2015), and a 2017 in-place optimisation β causes req->src and req->dst to share a scatterlist, writing four attacker-controlled bytes past the legitimate region into the file page cache of executables like su. The flaw affects kernels 4.14 through 6.19.12 and impacts essentially every mainstream distribution since 2017 (Ubuntu, Amazon Linux, RHEL, Debian, SUSE, AlmaLinux). A 732-byte Python script exploits it portably. The implications are severe: container escape from Kubernetes pods, multi-tenant host compromise, and CI/CD pipeline takeover via shared kernel page cache. CISA has ordered FCEB agencies to remediate by 15 May.
Affected products: Linux kernels 4.14β6.19.12 on virtually all major distributions; containerised and CI/CD environments at elevated risk.
MITRE ATT&CK: T1068 (Exploitation for Privilege Escalation), T1611 (Escape to Host).
SOC Action: Apply vendor kernel updates immediately. Where patching is delayed, follow the Linux Foundation interim mitigation to disable the vulnerable
algif_aeadmodule. In container environments, audit Kubernetes node kernels and enforce seccomp profiles that deny AF_ALG socket creation for workload containers. Hunt for unexpected splice() activity against the AF_ALG socket family in container runtime telemetry.
3.4 Ivanti EPMM CVE-2026-6973 β Authenticated RCE Zero-Day Under Limited Exploitation
Source: BleepingComputer, BleepingComputer
Ivanti disclosed an improper-input-validation flaw in Endpoint Manager Mobile (EPMM) 12.8.0.0 and earlier that allows admin-authenticated remote code execution. Limited exploitation has been observed in the wild. Ivanti released patches 12.6.1.1, 12.7.0.1 and 12.8.0.1 alongside four other high-severity bulletins (CVE-2026-5786 / 5787 / 5788 / 7821) which show no current exploitation. CISA issued an emergency directive giving federal agencies four days to patch. Shadowserver tracks more than 850 Internet-exposed EPMM instances, predominantly in Europe (508) and North America (182). EPMM has now had 33 distinct CVEs flagged in KEV, 12 of which have been abused by ransomware operators. Customers who rotated admin credentials following the January CVE-2026-1281/1340 disclosures inherit partial protection.
Affected products: Ivanti Endpoint Manager Mobile (on-prem) β€ 12.8.0.0. Ivanti Neurons for MDM, EPM, Sentry and other Ivanti products are unaffected.
MITRE ATT&CK: T1078 (Valid Accounts), T1190 (Exploit Public-Facing Application), T1059 (Command and Scripting Interpreter).
SOC Action: Patch EPMM to 12.6.1.1 / 12.7.0.1 / 12.8.0.1 immediately. Rotate admin credentials and audit admin login history for the past 60 days. Restrict EPMM admin console access to a management VPN/jump-host network β Internet exposure of an EPMM admin panel is no longer defensible given the threat group cadence.
3.5 MOVEit Automation CVE-2026-4670 β Unauthenticated Auth Bypass
Source: BleepingComputer
Progress Software disclosed a critical authentication bypass in MOVEit Automation (versions before 2025.1.5, 2025.0.9 and 2024.1.8) that requires no privileges or user interaction. A companion privilege-escalation bug (CVE-2026-5174) was patched in the same release. No in-the-wild exploitation has been confirmed at disclosure, but the MFT-software threat history is unfavourable: Clopβs 2023 MOVEit Transfer campaign affected 2,100 organisations and 62 million individuals, and Clop has repeatedly chosen MFT platforms as initial-access vectors. Shodan shows ~1,400 MOVEit Automation instances exposed online, with at least a dozen tied to US local/state government. Progressβs only remediation is a full upgrade using the full installer, which entails downtime.
Affected products: MOVEit Automation before 2025.1.5, 2025.0.9, 2024.1.8.
MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1078 (Valid Accounts).
SOC Action: Identify all MOVEit Automation hosts (file-transfer orchestrators are often missing from CMDB) and prioritise upgrade. While patching, place MOVEit web tier behind a WAF or network ACL restricted to operator IPs. Hunt MOVEit IIS logs for unauthenticated endpoint access and out-of-band scheduled-task creation.
3.6 Mini Shai-Hulud β npm Supply Chain Worm in intercom-client 7.0.4
Source: Upwind
The official Node.js SDK for Intercom (intercom-client@7.0.4, published 30 April) was found to be malicious. Three files differed from 7.0.3: a preinstall hook in package.json, a setup.mjs dropper (222 lines), and router_runtime.js (11.7 MB, obfuscated). The dropper downloads the official Bun JavaScript runtime from GitHub and executes the payload under Bun to evade EDR rules that hook node/node.exe, NODE_OPTIONS shims and npm lifecycle instrumentation. The payload scrapes GitHub Actions runner memory for secrets, harvests credentials from AWS, GCP, Azure, Vault and other secret stores, exfiltrates via RSA-4096 encryption (preventing IR teams from determining what was stolen), injects a βDependabotβ-disguised GitHub Actions workflow that dumps secrets, and self-propagates via four mechanisms including poisoning every branch of compromised repositories with files disguised as Claude AI configuration and trojanizing other npm packages via stolen tokens. The package has been yanked but downstream effects persist independently. A correlated trend in the same week also flagged five malicious NuGet packages impersonating Chinese UI libraries to distribute crypto wallet and credential stealers.
Affected products: intercom-client@7.0.4 (npm); any repo or workstation that ran npm/pnpm/yarn install against a manifest pinning that version; any cloned repository whose .github/workflows/ was modified by the worm.
MITRE ATT&CK: T1195.002 (Compromise Software Supply Chain), T1059.007 (JavaScript), T1078.004 (Cloud Accounts), T1552.001 (Credentials in Files), T1071.001 (Web Protocols).
Indicators of Compromise
Malicious package: intercom-client@7.0.4 (npm) β yanked
Dropped runtime: bun-v1.3.13 (downloaded from github.com/oven-sh/bun/releases)
Dropper artifact: setup.mjs (preinstall hook)
Payload artifact: router_runtime.js (~11.7 MB, obfuscated)
Persistence: .github/workflows/*.yml disguised as Dependabot
Exfil channel: RSA-4096 encrypted outbound payloads
SOC Action: Query SBOMs, lockfiles and npm audit logs for any reference to
intercom-client@7.0.4. On any host that rannpm installagainst that version, rotate every credential available to that runner (cloud, registry tokens, GitHub PATs, npm publish tokens, signing keys). Block unsigned downloads ofbunfromgithub.com/oven-sh/bun/releasesfrom CI runners that should not need it. Audit recently modified.github/workflows/files in all owned repositories for unexplained Dependabot-style additions.
3.7 Weaver E-cology CVE-2026-22679 β Pre-Auth RCE Exploited Since Mid-March
Source: BleepingComputer
Vega researchers reported that attackers have been exploiting a debug-API endpoint flaw in Weaver E-cology 10.0 (a Chinese-market office automation platform) since mid-March, five days after Weaver shipped a fix and two weeks before public disclosure. The endpoint passed unvalidated parameters to backend RPC, enabling unauthenticated remote command execution under the Tomcat-bundled Java process. Observed attacker behaviour included Goby-style ping callbacks, PowerShell payload downloads, an MSI installer (fanwei0324.msi) and reconnaissance commands (whoami, ipconfig, tasklist). Endpoint defences blocked most stages and no persistent foothold was established in the documented intrusions. The vendor fix (build 20260312) removes the debug endpoint entirely; no workaround is offered.
Affected products: Weaver E-cology 10.0 builds prior to 20260312.
MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1059.001 (PowerShell), T1071.001 (Web Protocols), T1204 (User Execution).
SOC Action: Inventory Weaver E-cology exposure (predominantly East Asia / China-market organisations). Update to build 20260312 or later. Hunt parent-child telemetry for
java.exe(Tomcat) spawningpowershell.exe,cmd.exe,msiexec.exe, or any reconnaissance binary (whoami,ipconfig,tasklist) in the past 90 days.
3.8 DarkSword β iOS Full-Chain Zero-Day Spyware
Source: Schneier on Security (Google Threat Intelligence Group attribution)
Google Threat Intelligence Group disclosed DarkSword, an iOS full-chain exploit observed since November 2025 leveraging multiple zero-day vulnerabilities to fully compromise targeted devices. GTIG attributes use of the chain to commercial surveillance vendors and suspected state-sponsored operators. Observed targeting includes Saudi Arabia, Turkey, Malaysia and Ukraine. Toolmarks in recovered payloads gave the chain its name.
Affected products: iOS (specific version range not published).
MITRE ATT&CK: T1078 (Valid Accounts), T1204 (User Execution), T1190 (Exploit Public-Facing Application).
SOC Action: Ensure mobile fleet is on the latest iOS release and that Lockdown Mode is available to high-risk users (legal, executive, government-facing roles). Where MDM is in place, enforce minimum-iOS policies and review device-attestation events. Cross-reference any executive travel to Saudi Arabia, Turkey, Malaysia or Ukraine against device anomaly telemetry.
3.9 Apache HTTP Server Triple-Fix β mod_rewrite Privilege Escalation, HTTP/2 Double-Free RCE, Response-Splitting
Source: Microsoft MSRC β CVE-2026-24072, Microsoft MSRC β CVE-2026-23918, Microsoft MSRC β CVE-2026-33523
Three critical Apache HTTP Server bulletins shipped on 7 May. CVE-2026-24072 is a mod_rewrite privilege elevation via ap_expr (improper user-input validation leading to root code execution). CVE-2026-23918 is a double-free in the http2 module on early connection reset that allows remote code execution. CVE-2026-33523 is multi-module HTTP response splitting allowing forwarded malicious status lines, enabling cache poisoning and downstream XSS. The pipeline correlation engine identified these as a single βexploitation of web-server vulnerabilities leading to remote code executionβ trend.
Affected products: Apache HTTP Server (specific affected branches per MSRC bulletins).
MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1068 (Exploitation for Privilege Escalation).
SOC Action: Patch Apache HTTPD to the fixed minor versions across all
httpd-fronted services including reverse-proxy tiers and shared hosting. Auditmod_rewriterule files for use ofap_exprwith untrusted input. Ifmod_http2is loaded but not required, unload it pending patch.
3.10 Redis Family CVE Cluster β Five Critical RCE Bulletins
Source: Microsoft MSRC (plus CVE-2026-23631, CVE-2026-25243, CVE-2026-25588, CVE-2026-25589)
Five critical CVEs were published on 7β8 May covering use-after-free and invalid-memory-access conditions across redis-server (CVE-2026-23479 β unblock-client flow; CVE-2026-23631 β Lua), RedisTimeSeries (CVE-2026-25588) and RedisBloom (CVE-2026-25589), as well as RESTORE-path memory corruption (CVE-2026-25243). All permit remote code execution by attackers able to reach a Redis instance. The pattern across the cluster is unsafe handling of serialized RDB data during RESTORE and untrusted Lua script execution. Redis instances are frequently deployed without authentication on internal networks, often within reachable blast radius of compromised application tiers.
Affected products: redis-server (specific affected versions per MSRC), RedisTimeSeries, RedisBloom.
MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1210 (Exploitation of Remote Services).
SOC Action: Inventory all Redis instances (including those bundled with application stacks). Patch to fixed versions. Enforce
requirepass/ ACL authentication and bind Redis to non-public interfaces. Audit application-tier access patterns for unexpectedEVAL,RESTOREor module-load commands.
3.11 Hackers Abuse Google Ads and Claude.ai Shared Chats to Push Mac Malware
Source: BleepingComputer
A social-engineering campaign targeting macOS users abuses Google Ads placements and Claude.ai shared-chat links to trick users into executing a polymorphic shell-script downloader. The script profiles victims by geolocation and harvests browser credentials and macOS Keychain contents. The Claude.ai-shared-chat angle is novel β attackers seed a Claude conversation with copy-paste-able install instructions and share its public URL, exploiting the implicit trust users place in chats that originate from a legitimate AI vendor.
MITRE ATT&CK: T1566.002 (Phishing: Spearphishing Link), T1204.001 (Malicious Link), T1059.004 (Unix Shell), T1555 (Credentials from Password Stores).
SOC Action: Block Google Ads click-through tracking redirects in DNS where feasible. Educate macOS users on the new pattern: copy-paste-from-shared-chat installer commands are an attacker channel. Hunt EDR telemetry on macOS hosts for
curl/wgetto Pastebin / shared-link domains piping directly intosh, and for unexpected Keychain access events.
4. AI-Identified Correlation Trends
| Risk | Trend | Supporting Evidence |
|---|---|---|
| π΄ CRITICAL | Linux kernel page-cache LPEs exploited in the wild | Copy Fail (CVE-2026-31431) Elastic / Unit 42 / CISA KEV; Dirty Frag (CVE-2026-43284 + CVE-2026-43500) BleepingComputer / Sysdig / Upwind |
| π΄ CRITICAL | Zero-day exploitation of edge network security products | PAN-OS CVE-2026-0300 (Wiz, BleepingComputer, CERT-EU); FortiClient EMS CVE-2026-35616 pre-auth bypass; Ivanti EPMM CVE-2026-6973 |
| π΄ CRITICAL | Web-server RCE chains | Apache HTTP Server CVE-2026-23918 / 24072 / 33523 (correlation batch 111) |
| π΄ CRITICAL | Supply-chain attacks on package ecosystems | Mini Shai-Hulud npm worm (intercom-client); Intercomβs npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack; five malicious NuGet packages impersonating Chinese UI libraries |
| π΄ CRITICAL | Critical vulnerabilities in industrial control systems | ABB B&R PVI; Johnson Controls CEM AC2000; Hitachi Energy PCM600 (correlation batch 108) |
| π HIGH | Sustained ransomware throughput across Qilin / The Gentlemen / Akira / DragonForce / Genesis | Multi-batch correlations across batches 105β114; Qilin alone correlated across ten victim postings in batch 112 |
| π HIGH | Phishing and credential-theft campaigns as cross-actor primary access | TeamPCP / PCPJack cloud worm; Google Ads / GoDaddy ManageWP phishing; Mac malware via Google Ads & Claude.ai shared chats |
| π HIGH | Supply-chain backdoors via trojanized software releases | ScarCruft compromises a gaming platform; DAEMON Tools trojanized to deploy backdoor (batch 108) |
| π HIGH | Geopolitical/hacktivist convergence | Pro-Ukraine BO Team and Head Mare teaming up against Russian targets; MuddyWater using Chaos ransomware as a decoy (batch 109) |
5. Trending Entities (Pipeline-Wide)
Threat Actors
- Qilin (98 reports) β Most active ransomware operator in the pipeline; ten correlated victim postings in batch 112 alone; sectors include real estate, architecture, construction, financial services and logistics.
- The Gentlemen (56 reports) β Active across manufacturing, chemical manufacturing and telecommunications; uses Tox1 / The Gentlemen ransomware variants.
- Akira (50 reports) β Healthcare-heavy targeting (Greenwoods Dental Centre, RΓ©seau Radiologique Romand, Zojirushi).
- DragonForce (30 reports) β Multi-sector ransomware activity including construction and accountancy.
- ShinyHunters (27 reports) β Tied to the Canvas / Houghton Mifflin Harcourt education-sector incidents.
- Coinbase Cartel (26 reports) β Crypto-finance-themed leak postings.
- Inc Ransom (22 reports) β Legal-services, technology, healthcare targeting.
- Lamashtu (22 reports) β Mid-tier multi-sector activity.
- Everest (22 reports) β Linked to the Citizens Bank breach (April 2026 incident date) reported via Telegram.
- TeamPCP (18 reports) β Now being displaced by the PCPJack cloud worm.
- FulcrumSec (17 reports) β Active across healthcare, manufacturing and the Arup Group incident.
- Lockbit5 (14 reports) β Steady cadence following last monthβs resurgence.
- Safepay (13 reports) β Targeted IT services and construction firms in Japan, Portugal, Italy, Germany, Australia, the UK, Cambodia, Argentina and Canada (batch 106).
Malware Families
- RansomLook / RansomLock (90 + 36 reports) β Pipeline-wide RaaS-tracking telemetry; not an individual family but the unifying source of victim-disclosure scraping.
- Tox1 (35 reports) β Associated with The Gentlemen.
- Akira ransomware (26 reports) β Primary payload of the Akira affiliate program.
- RaaS (18 reports) β Generic ransomware-as-a-service tagging.
- Qilin ransomware (13 reports) β Aligned with the Qilin threat-actor cadence above.
- DragonForce ransomware (8 reports).
- Safepay (8 reports) β Both the actor and the named payload.
- The Gentlemen ransomware (7 reports).
- Everest ransomware (7 reports) β Used in the Citizens Bank incident.
- DarkSword (1 report this week, newly tracked) β Government-grade iOS exploit chain.
- Mini Shai-Hulud (1 report this week, newly tracked) β Worming npm payload.
- EarthWorm / ReverseSocks5 β Tunneling tools used in CL-STA-1132βs PAN-OS post-exploitation.
6. Source Distribution
| Source | Reports | URL | Notes |
|---|---|---|---|
| RansomLook | 220 | link | RaaS leak-site telemetry; Lynx, Qilin, The Gentlemen, Akira, DragonForce victim postings |
| Microsoft | 149 | link | MSRC bulletins including Apache HTTP Server, Redis-family, libssh2, GnuTLS, Vim CVEs |
| BleepingComputer | 47 | link | Primary coverage of PAN-OS, Dirty Frag, Ivanti EPMM, MOVEit and Weaver E-cology |
| Unknown | 25 | β | Telegram-origin posts (channels redacted) and TLP:AMBER+STRICT submissions |
| AlienVault | 24 | link | OSINT pulses |
| RecordedFutures | 14 | link | Threat-intel platform exports |
| SANS | 13 | link | Internet Storm Center diaries including MS Edge cleartext-password issue |
| Wiz | 11 | link | PAN-OS in-the-wild analysis |
| CISA | 8 | link | Emergency directives for Ivanti EPMM, Copy Fail, PAN-OS |
| Schneier | 6 | link | DarkSword iOS exploit chain commentary |
| Wired Security | 6 | link | Long-form context including the Canvas ransomware story |
| Sysdig | 4 | link | Dirty Frag detection logic |
| HaveIBeenPwned | 4 | link | Zara (197k accounts) and Marcus & Millichap breach feeds |
| Cisco Talos | 4 | link | Threat-research blog posts |
| Elastic Security Labs | 4 | link | Detection logic for Copy Fail and Dirty Frag |
| Unit42 | β | link | Copy Fail deep-dive |
| Upwind | β | link | Mini Shai-Hulud and Dirty Frag analyses |
| CERT-EU | β | link | Advisory 2026-006 (PAN-OS) |
7. Consolidated Recommendations
- π΄ IMMEDIATE: Patch or mitigate PAN-OS CVE-2026-0300 on every Internet-exposed PA-Series and VM-Series firewall. If patches are not yet deployed, disable the User-ID Authentication Portal or restrict it to trusted zones; hunt the last 30 days for nginx crash-cleanup activity and outbound Earthworm/ReverseSocks5 tunneling.
- π΄ IMMEDIATE: Patch Ivanti EPMM to 12.6.1.1 / 12.7.0.1 / 12.8.0.1 within four days per the CISA emergency directive; rotate admin credentials and review the past 60 days of admin authentication logs.
- π΄ IMMEDIATE: Apply the Linux kernel updates that fix Copy Fail (CVE-2026-31431) before the 15 May CISA deadline; in environments where patching lags, follow Linux Foundation interim guidance to disable the vulnerable
algif_aeadmodule. - π΄ IMMEDIATE: Deploy the Dirty Frag modprobe blocklist (
esp4,esp6,rxrpc) on every Linux host that does not require IPsec or AFS; subscribe to distro advisories for upstream patches. - π SHORT-TERM: Patch MOVEit Automation to 2025.1.5 / 2025.0.9 / 2024.1.8; treat MFT platforms as the most attractive targets for data-theft extortion based on the 2023 Clop precedent.
- π SHORT-TERM: Sweep SBOMs, lockfiles and CI build caches for
intercom-client@7.0.4; on every affected runner rotate cloud credentials, registry tokens and signing keys; audit.github/workflows/across all repositories for unexplained Dependabot-disguised changes. - π SHORT-TERM: Patch the Apache HTTP Server triple (CVE-2026-23918 / 24072 / 33523) and the Redis-family bulletins (CVE-2026-23479 / 23631 / 25243 / 25588 / 25589); enforce
requirepass/ACL authentication and non-public binding on every Redis instance. - π‘ AWARENESS: Brief macOS user populations on the new Google Ads + Claude.ai-shared-chat malware delivery vector; train staff that copy-pasting installer commands from any shared chat link is high-risk.
- π‘ AWARENESS: Sustain ransomware-monitoring posture against Qilin, The Gentlemen, Akira, DragonForce, ShinyHunters, Genesis, Inc Ransom and Lamashtu β pipeline correlation places all in steady multi-sector campaigns.
- π’ STRATEGIC: Reduce edge-device exposure following the cumulative PAN-OS / Ivanti / FortiClient EMS / MOVEit pattern; align with CISA Binding Operational Directive 26-02 and remove EoL network appliances from public-facing footprint.
- π’ STRATEGIC: Treat Bun, Deno and other Node.js-alternate runtimes downloaded mid-build as suspicious by default in CI environments; constrain CI runners to a vetted toolchain allow-list.
This brief was generated entirely by AI from automated threat intelligence collection and correlation pipelines, made up of 559 reports processed across 13 correlation batches. A human analyst reviewed and approved this report before publication, but AI-generated analysis may contain errors in attribution, severity assessment, or indicator extraction. Always verify IOCs, CVE details, and threat actor attribution against primary sources before taking operational action.