<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Vulnerable U</title>
    <description>Infosec&#39;s favorite weekly newsletter for news, tools, and tips with 34,000+ CISOs, founders, change-makers, and straight up hackers.</description>
    
    <link>https://www.vulnu.com/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/lSfumbrEGk.xml" rel="self"/>
    
    <lastBuildDate>Mon, 13 Apr 2026 20:20:04 +0000</lastBuildDate>
    <pubDate>Mon, 13 Apr 2026 17:20:00 +0000</pubDate>
    <atom:published>2026-04-13T17:20:00Z</atom:published>
    <atom:updated>2026-04-13T20:20:04Z</atom:updated>
    
      <category>Mental Health</category>
      <category>News</category>
      <category>Cybersecurity</category>
    <copyright>Copyright 2026, Vulnerable U</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/71c1f7f0-15e9-4f22-932a-e61c0932a9e2/Newsletter_Thumbnail_2026_Bunny_Only.png</url>
      <title>Vulnerable U</title>
      <link>https://www.vulnu.com/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>The $280M Drift Heist: Six Months of Trust, 12 Minutes to Drain It</title>
  <description>How a sophisticated $280M crypto theft took 6 months of trust-building before draining Drift in just 12 minutes. Social engineering, fake apps, and organizational backing exposed.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2b8f3587-444c-4884-af73-2159cfcac437/Screenshot_2026-04-08_at_10.36.14_AM.png" length="2458232" type="image/png"/>
  <link>https://www.vulnu.com/p/the-280m-drift-heist-six-months-of-trust-12-minutes-to-drain-it</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/the-280m-drift-heist-six-months-of-trust-12-minutes-to-drain-it</guid>
  <pubDate>Mon, 13 Apr 2026 17:20:00 +0000</pubDate>
  <atom:published>2026-04-13T17:20:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"></p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/gfg1ZYOpaPo" width="100%"></iframe><p class="paragraph" style="text-align:left;">This one was crazy. This $280 million crypto theft was a six-month-long op. Drift experienced a structured intelligence operation that required organizational backing, significant resources, and months of deliberate prep. Contributors were approached in person at conferences, engaged across multiple countries, and worked with what appeared to be a legitimate trading firm that built trust over half a year.</p><p class="paragraph" style="text-align:left;">They onboarded a vault, deposited over a million dollars of their own capital, and built a functioning operational presence inside the ecosystem. They felt like co-workers at this point. But when the hack happened - it should all look familiar. Malicious GitHub repos exploiting VS Code vulnerabilities, fake TestFlight wallet apps, and months of social engineering that made these actions feel completely normal.</p><p class="paragraph" style="text-align:left;">On April 1st, in 12 minutes, $285 million. Boom. The attackers wiped chats, scrubbed evidence, and disappeared. The individuals they met in person were not North Korean nationals, but intermediaries used to build trust. This wasn’t someone you just met online. This was six months of real-world interaction before the rug was pulled.</p><p class="paragraph" style="text-align:left;">Drift is sharing this publicly because other teams in the ecosystem deserve to understand what this attack actually looked like.</p><p class="paragraph" style="text-align:left;">All remaining protocol functions have been frozen and the compromised wallets have been removed from the multisig. Attacker wallets have been flagged across exchanges and bridge operations. Mandiant has been engaged.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/47d2758c-4e28-4be6-a424-2a4cd1ad28c3/Screenshot_2026-04-08_at_10.31.36_AM.png?t=1775659763"/></div><h2 class="heading" style="text-align:left;" id="timeline-six-months-of-building-tru">Timeline: Six Months of Building Trust</h2><p class="paragraph" style="text-align:left;"><b>Fall 2025: </b>Drift contributors were approached by a group of individuals at a major crypto conference, in person, who presented as a quant trading firm looking to initiate on the protocol.</p><p class="paragraph" style="text-align:left;">It&#39;s now understood that this appears to have been a targeted approach where the individuals from this group continued to deliberately seek out and engage specific drift contributors in person at multiple major industry events, conferences in multiple countries over the following six months.</p><p class="paragraph" style="text-align:left;">They were technically fluent, had verifiable professional backgrounds, and were familiar with how Drift operated.</p><p class="paragraph" style="text-align:left;">A Telegram group was established upon the first meeting and what followed were months of substantive conversations around trading strategies and potential vault integrations.</p><p class="paragraph" style="text-align:left;"><b>December 2025 through 26: </b>They onboarded an ecosystem vault on Drift which required filing out of a form with strategy details. They engaged multiple contributors through multiple working sessions, asked detailed and informed product questions and deposited over a million dollars of their own capital.</p><p class="paragraph" style="text-align:left;">They built a functioning operational presence inside the Drift ecosystem deliberately and patiently. Integration conversations continued through February and March. Various Drift contributors met the individuals from this group face to face.</p><p class="paragraph" style="text-align:left;">By this point, the relationship was nearly half a year old. These were not strangers, but people Drift contributors had worked with and met in person.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c34102a9-8568-4ca0-be1c-8fda9bde04dc/Screenshot_2026-04-08_at_10.33.39_AM.png?t=1775659779"/></div><h2 class="heading" style="text-align:left;" id="the-intrusion-vectors">The Intrusion Vectors</h2><p class="paragraph" style="text-align:left;">After the exploit on April 1st happened, a thorough forensics review of the known affected devices, accounts, and communications histories was conducted.</p><p class="paragraph" style="text-align:left;">Interactions with the trading group came into focus as the likely intrusion vector. Right as the exploit happened, their telegram chats and malicious software had been completely scrubbed.</p><p class="paragraph" style="text-align:left;">There may have been three attack vectors. One contributor may have been compromised after cloning a code repo shared in the group. This is very similar to how they hack job interview type stuff, where they&#39;ll share some code in a code repo, you&#39;ll clone it and somewhere in that repo, it&#39;s actual malware. But this is after months and months and months of trust building. A second contributor was induced to download a test-flight app the group presented as their wallet product. This is basically side-loading in iOS with test flight.</p><p class="paragraph" style="text-align:left;">For the repository based vector, one possibility is a known VS code and cursor vulnerability that the security community was actively flagging through December. Simply opening a file, folder or repo in the editor was sufficient to silently execute arbitrary code.</p><p class="paragraph" style="text-align:left;">North Korea abusing VS Code hooks that run automatically in the background as you open a folder: Task.json, a fake font with malicious obfuscated JS code, runs immediately when you open the project in VS Code. It does not display the commands being read.</p><p class="paragraph" style="text-align:left;">That&#39;s huge.</p><h2 class="heading" style="text-align:left;" id="not-who-they-said-they-were">Not Who They Said They Were</h2><p class="paragraph" style="text-align:left;">With medium-high confidence supported by investigations done by SEAL&#39;s 911 team, this operation is assessed to have been carried out by the same threat actors responsible for the October 2024 Radiant Capital hack attributed to North Korea.</p><p class="paragraph" style="text-align:left;">It&#39;s important to note that the individuals who appeared in person were not North Korean nationals. North Korean threat actors operating at this level are known to deploy third-party intermediaries to conduct face-to-face relationship building.</p><p class="paragraph" style="text-align:left;">They basically have these mules that are paid actors to work with this group to build trust.</p><p class="paragraph" style="text-align:left;">Months of in-person meetings from the fall to January across multiple countries: This quant firm met with people at Drift. They then tied their vault to Drift and deposited over a million dollars of their own money.</p><p class="paragraph" style="text-align:left;">They&#39;re hopping on meetings, working together, giving them millions of dollars. They just feel like co-workers at this point. There&#39;s a ton of trust built up.</p><h2 class="heading" style="text-align:left;" id="the-moment-it-all-collapsed">The Moment It All Collapsed</h2><p class="paragraph" style="text-align:left;">They start sharing GitHub links like “hey check out this tool that I built.” Apparently this is all super normal in this ecosystem.</p><p class="paragraph" style="text-align:left;">But one of those GitHub repos actually takes advantage of a vulnerability in VS Code and cursor that executes code silently and immediately and compromises a contributor of the Drift protocol.</p><p class="paragraph" style="text-align:left;">Another contributor downloaded a fake TestFlight app wallet onto their iOS device. They tested it out, were like “let&#39;s see if our access works here back in March.”</p><p class="paragraph" style="text-align:left;">And then on April 1st, in 12 minutes, $285 million. Boom.</p><p class="paragraph" style="text-align:left;">And then all the Telegram chats and all the stuff that they were building over those last couple months was erased. All the evidence was completely erased at the exact same time that they pulled off the heist.</p><h2 class="heading" style="text-align:left;" id="the-uncomfortable-reality">The Uncomfortable Reality</h2><p class="paragraph" style="text-align:left;">To Drift&#39;s credit, they&#39;ve been very transparent about this investigation and they&#39;re doing forensics as they go.</p><p class="paragraph" style="text-align:left;">But I can&#39;t believe this. They met these people in real life.</p><p class="paragraph" style="text-align:left;">A lot of the advice talks about how you don&#39;t trust these people that you just meet online and start doing whatever the hell they&#39;re doing.</p><p class="paragraph" style="text-align:left;">No. They met these people for six months at conferences and meetings and they worked together until the rug was ready to be pulled.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>How Command Injection Vulnerability in OpenAI Codex Leads to GitHub Token Compromise</title>
  <description>OpenAI Codex command injection flaw allowed attackers to steal GitHub tokens. Learn how this critical vulnerability affected ChatGPT, CLI, SDK, and IDE extensions.</description>
      <enclosure url="https://images.unsplash.com/photo-1654277041218-84424c78f0ae?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHwxfHxHaXRIdWJ8ZW58MHx8fHwxNzc1MDkxMTg4fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/how-command-injection-vulnerability-in-openai-codex-leads-to-github-token-compromise</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/how-command-injection-vulnerability-in-openai-codex-leads-to-github-token-compromise</guid>
  <pubDate>Fri, 10 Apr 2026 14:02:00 +0000</pubDate>
  <atom:published>2026-04-10T14:02:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Vulnerability]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/idHWqPXJwnE?si=pqn6-J0ExltaeahL&start=5051" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;">A new <a class="link" href="https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=how-command-injection-vulnerability-in-openai-codex-leads-to-github-token-compromise" target="_blank" rel="noopener noreferrer nofollow">BeyondTrust report</a> details a real command injection bug in OpenAI Codex, and yeah, this one is nasty.</p><p class="paragraph" style="text-align:left;">We’ve seen similar bugs lately but they’ve all been prompt injection - this one is straight command injection which is MUCH worse.</p><p class="paragraph" style="text-align:left;">According to BeyondTrust, the bug lived in the task creation flow, where the GitHub branch name could get reflected into shell during environment setup. That gave an attacker a way to run arbitrary commands inside the Codex environment and steal the victim’s GitHub user access token, which was the same token Codex was using to authenticate with GitHub on the user’s behalf. BeyondTrust says the issue affected the ChatGPT website, Codex CLI, Codex SDK, and the Codex IDE extension, and that the reported issues have since been remediated.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a2110c66-7808-4066-8b4c-56fc360aaffa/Screenshot_2026-04-01_at_2.44.42_PM.png?t=1775072717"/><div class="image__source"><span class="image__source_text"><p><i>Codex attack path</i></p></span></div></div><p class="paragraph" style="text-align:left;">What makes this one rough is where Codex runs. In <a class="link" href="https://developers.openai.com/codex/cloud/environments?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=how-command-injection-vulnerability-in-openai-codex-leads-to-github-token-compromise" target="_blank" rel="noopener noreferrer nofollow">OpenAI’s Codex cloud environment docs</a>, Codex says it creates a container, checks out your repo at the selected branch or commit, runs your setup script, and then starts the agent loop. So the branch name becomes part of the setup path for a real execution environment that can touch code, dependencies, and secrets.</p><p class="paragraph" style="text-align:left;">If attacker-controlled input is getting interpreted by bash there, you are owned.</p><p class="paragraph" style="text-align:left;">BeyondTrust says the branch parameter from the backend task request was reflected into the environment setup script. That means the branch name started being shell input. They first used that to trigger errors, then refined it into a payload that exposed the GitHub remote configuration and the embedded token. Once that worked, if a victim ran Codex against that repo and branch, the attacker could grab the OAuth token and pivot into GitHub.</p><p class="paragraph" style="text-align:left;">They found ways to make the payload work through GitHub branch naming itself, including tricks like <code>$&#123;IFS&#125;</code> so the branch would still be valid enough for GitHub while evaluating the way they wanted in bash. They also showed how Unicode ideographic spaces could make the payload look a lot cleaner in the UI than it really was.</p><p class="paragraph" style="text-align:left;">Still, BeyondTrust says the same bug class extended beyond the web experience. They report that local Codex clients stored auth material in <code>auth.json</code>, and that those tokens could be used to hit the backend API, pull task history, and recover task output there too. So this was not just a web portal issue.</p><p class="paragraph" style="text-align:left;">They reported the issue through Bugcrowd on December 16, 2025. OpenAI shipped an initial hotfix on December 23, a GitHub branch shell escape fix on January 22, and additional shell hardening plus tighter GitHub token limits on January 30. Public disclosure came later after coordination.</p><p class="paragraph" style="text-align:left;">Coding agents are inheriting the same ugly security problems we have already seen in CI systems, build pipelines, and developer tooling. Once you let an agent clone repos, run setup scripts, touch secrets, and authenticate to external services, input handling mistakes stop being quirky bugs and start becoming full compromise paths.</p><p class="paragraph" style="text-align:left;">Vulns are definitely back on the menu.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🎓️ Vulnerable U | #163</title>
  <description>Mythos Mega Threat, FBI Cybercrime 2025 stats, Massive crypto heist of over $280 Million, and much more!</description>
  <link>https://www.vulnu.com/p/vulnerable-u-163</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/vulnerable-u-163</guid>
  <pubDate>Fri, 10 Apr 2026 12:19:00 +0000</pubDate>
  <atom:published>2026-04-10T12:19:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-family:Courier, Lucida Typewriter, monospace;"><i><b>Read Time: </b></i></span><span style="font-family:Courier, Lucida Typewriter, monospace;"><i>9 minutes</i></span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/731172a7-27ee-46d2-b7f9-c37e48429ed1/Newsletter_Header.png?t=1775787253"/></div><p class="paragraph" style="text-align:center;">Brought to you by:</p><div class="image"><a class="image__link" href="https://www.threatlocker.com/capabilities/zero-trust-network-access?utm_source=vulnu&utm_medium=sponsor&utm_campaign=ztna_q2_26&utm_content=ztna-&utm_term=newsletter" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/256f3ba4-6f58-4f04-b4de-0593a20ab7e5/Newsletter_Sponsor_Logo.png?t=1774977250"/></a></div><p class="paragraph" style="text-align:left;">Howdy friends!</p><p class="paragraph" style="text-align:left;">What a couple of weeks! We get back from RSA and the supply chain hacks from hell stacked back to back to back. Then Anthropic decides to break the internet. I’m writing this live on stream now (hi live stream homies!) - we’ve spent the better part of 8 hours talking mostly Mythos and what it means for the future of security. Feel free to check the VODs on my YouTube if you’re curious.</p><p class="paragraph" style="text-align:left;">Other than that I hope you all are enjoying your Spring and looking forward to some summer travel. I’m currently loving the weather in Austin and trying to get away from the AI and Cyber hellscape as often as I can (not often).</p><p class="paragraph" style="text-align:left;">Let’s get to it!</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="icymi"> ICYMI</h1><p class="paragraph" style="text-align:left;">🖊️ Something I wrote: I was seeing a lot of chatter about <a class="link" href="https://x.com/mattjay/status/2042268949249745213?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Mythos vs Open Models</a> and wanted to get some context and thoughts on paper about it.</p><p class="paragraph" style="text-align:left;">🎧️ Something I heard: <a class="link" href="https://www.youtube.com/watch?v=LZAZvm34rYs&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">LowLevel</a>, <a class="link" href="https://www.youtube.com/watch?v=XRgGFQ0EgM0&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Prime</a>, and <a class="link" href="https://www.youtube.com/watch?v=aFcVKzfkJPk&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Theo’s</a> Mythos reaction vids.</p><p class="paragraph" style="text-align:left;">🎤 Something I said: Got to hang out with <a class="link" href="https://youtu.be/Domy4X11-oQ?si=wqa34AWP046jSwrE&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Jcran from Mallory</a> to see what he’s been building around AI and threat intelligence</p><p class="paragraph" style="text-align:left;">🔖 Something I read: The full <a class="link" href="https://www-cdn.anthropic.com/08ab9158070959f88f296514c21b7facce6f52bc.pdf?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">245 page pdf on mythos</a> - worth going through the actual data the headlines are coming from - And for something a little less Mythos - <a class="link" href="https://detect.fyi/a-detection-researcher-mindset-f2ed045480c5?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">A Detection Researcher Mindset</a></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="vulnerable-news">Vulnerable News</h1><h3 class="heading" style="text-align:left;" id="mythos-and-glasswing-did-anthropic-"><a class="link" href="https://www.anthropic.com/glasswing?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Mythos and Glasswing: Did Anthropic Break the Internet?</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f1633a70-92ca-43b0-895b-bcb0404e5e00/Screenshot_2026-04-08_at_3.39.09_PM.png?t=1775677172"/></div><p class="paragraph" style="text-align:left;">Mythos is here! The internet is doomed! (I’ve spent almost 8 hours on live stream talking about if that is actually true…)</p><p class="paragraph" style="text-align:left;">Here is what we actually know - it&#39;s been so successful at finding security vulnerabilities that if they released it, they&#39;re worried about national security, and the sanctity of the internet in general. They&#39;ve given the tool to 40 companies they consider critical infrastructure and they&#39;re allowing these people to use Mythos to try to find and then subsequently fix all of the vulnerabilities that it would be good at finding before this fallout could possibly happen.</p><p class="paragraph" style="text-align:left;">I’ve gotten more hate about this story than anything in a long time on social media. People are absolutely revolting - saying it must just be marketing hype. But let me give you some inside baseball: I&#39;ve gotten to talk to people who run security for some of the people on this list that are telling me that the claims are real, that they are surprised at the amount and quality of the security vulnerabilities that this thing has been able to find.</p><p class="paragraph" style="text-align:left;">Of course Anthropic is incentivized to overhype this. I&#39;ve been super critical of all of the frontier model companies coming out and being like this thing that we just built is so dangerous. That being said, when we&#39;re talking about the ability to find security vulnerabilities, Opus was already getting crazy good at this.</p><p class="paragraph" style="text-align:left;">If you want to hear me talk about this for literal hours, check my live stream archive from this week - (specifically <a class="link" href="https://www.youtube.com/live/263u4bfNLlY?si=EyiphCOen8eC1eFh&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">here</a> and <a class="link" href="https://www.youtube.com/live/Fme2eMdQ4tk?si=sEiwjk0R10JPnq0a&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">here</a>) I pull up and react to TONs of hype and criticism of Mythos and talk about where I think this is all going. (<a class="link" href="https://www.anthropic.com/glasswing?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="reduce-attack-surface-with-threat-l"><a class="link" href="https://www.threatlocker.com/capabilities/zero-trust-network-access?utm_source=vulnu&utm_medium=sponsor&utm_campaign=ztna_q2_26&utm_content=ztna-&utm_term=newsletter" target="_blank" rel="noopener noreferrer nofollow">Reduce Attack Surface with ThreatLocker ZTNA</a>*</h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/29754659-3847-42d9-9977-6da86d792e93/69bac63976974e7441c58a92_ThreatLocker_Illustration_Zero_Trust_Network_Access.webp?t=1775733553"/></div><p class="paragraph" style="text-align:left;">ThreatLocker Zero Trust Network Access reduces your attack surface by removing unnecessary access pathways. Users are granted access only to specific applications—not entire networks—based on strict policy controls. With every connection verified and enforced in real time, organizations gain stronger control over access and eliminate the risk of overexposure.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.threatlocker.com/capabilities/zero-trust-network-access?utm_source=vulnu&utm_medium=sponsor&utm_campaign=ztna_q2_26&utm_content=ztna-&utm_term=newsletter" target="_blank" rel="noopener noreferrer nofollow">See how it works.</a></p><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>*Sponsored</i></span></p><h3 class="heading" style="text-align:left;" id="unpacking-the-2025-fbi-ic-3-annual-"><a class="link" href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Unpacking The  2025 FBI IC3 Annual Report</a></h3><div class="image"><a class="image__link" href="https://www.youtube.com/live/flKb3GeSvgU?si=jnKzUpQ8Hbepg9m1&t=385&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ed9979a5-0bda-4e3f-a94c-4435ba17fc10/image.png?t=1775677322"/></a><div class="image__source"><span class="image__source_text"><p>(click the pic to get brought to the <a class="link" href="https://www.youtube.com/live/flKb3GeSvgU?si=jnKzUpQ8Hbepg9m1&t=385&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">timestamp</a> in live stream when I talk about this report)</p></span></div></div><p class="paragraph" style="text-align:left;">The Internet Crime Complaint Center, otherwise known as IC3, put out their yearly report and it&#39;s always staggering. The number of complaints per year is just straight up and to the right, and the losses are people who lost stuff in cyberattacks, scams, whatever it is, and actually called and reported it, which is not everyone, by any means. It&#39;s always old people losing the most.</p><p class="paragraph" style="text-align:left;">Investment-related fraud was once again the largest component, and crypto is clearly included in this. Crypto fraud is way, way, way more prevalent than anything else going on: 7.2 billion of the 8 billion in investment scams involved crypto. The scammers initiate contact, show fake profits, hit victims with taxes and fees, and then hit them again with recovery scams. You&#39;re hitting vulnerable people at a vulnerable time with the right script and they&#39;re just toast.</p><p class="paragraph" style="text-align:left;">Education is rarely stopping a lot of security breaches, so why is this possible? We need systemic guard rails that make it really hard for people to do that. Sextortion skews super young, a lot of people wind up committing suicide, and that is another stat that should be talked about. Threats of violence are skyrocketing, crypto investment scams have doubled. The other trends in this report are super interesting as well. (<a class="link" href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="drift-280-m-crypto-theft-linked-to-"><a class="link" href="https://www.bleepingcomputer.com/news/security/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Drift $280M Crypto Theft Linked to 6-Month In-Person Operation</a></h3><blockquote align="center" class="instagram-media"><a href="https://www.instagram.com/reel/DW1sO5Fjc6-/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163"><p dir="ltr" lang="en"> Instagram post </p></a></blockquote><p class="paragraph" style="text-align:left;">This one was crazy. This $280 million crypto theft was a six-month-long op. Drift experienced a structured intelligence operation that required organizational backing, significant resources, and months of deliberate prep. Contributors were approached in person at conferences, engaged across multiple countries, and worked with what appeared to be a legitimate trading firm that built trust over half a year.</p><div class="image"><a class="image__link" href="https://x.com/DriftProtocol/status/2040611161121370409?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5f45f1af-3f7e-42d6-b71c-05d7992c76b5/Screenshot_2026-04-09_at_12.53.52_PM.png?t=1775757245"/></a><div class="image__source"><span class="image__source_text"><p>(click pic for link to full <a class="link" href="https://x.com/DriftProtocol/status/2040611161121370409?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">article</a>)</p></span></div></div><p class="paragraph" style="text-align:left;">They onboarded a vault, deposited over a million dollars of their own capital, and built a functioning operational presence inside the ecosystem. They felt like co-workers at this point. But when the hack happened - it should all look familiar. Malicious GitHub repos exploiting VS Code vulnerabilities, fake TestFlight wallet apps, and months of social engineering that made these actions feel completely normal.</p><p class="paragraph" style="text-align:left;">On April 1st, in 12 minutes, $285 million. Boom. The attackers wiped chats, scrubbed evidence, and disappeared. The individuals they met in person were not North Korean nationals, but intermediaries used to build trust. This wasn’t someone you just met online. This was six months of real-world interaction before the rug was pulled. (<a class="link" href="https://www.bleepingcomputer.com/news/security/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="hackers-are-attempting-to-turn-comf"><a class="link" href="https://censys.com/blog/comfyui-servers-cryptomining-proxy-botnet/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy Botnet</a></h3><div class="image"><a class="image__link" href="https://www.youtube.com/live/flKb3GeSvgU?si=Y1aaI7kZNApfjKGc&t=4264&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c1082366-1700-46d3-b56d-7ea11d8f9726/image.png?t=1775677530"/></a><div class="image__source"><span class="image__source_text"><p>(click pic for timestamp of <a class="link" href="https://www.youtube.com/live/flKb3GeSvgU?si=Y1aaI7kZNApfjKGc&t=4264&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">livestream</a> about comfyui)</p></span></div></div><p class="paragraph" style="text-align:left;">Censys put out this bit of research about ComfyUI, which is a wrapper around AI image generation tools, widely used and frequently exposed to the internet without authentication. Over a thousand instances are visible, and from an attacker perspective this is an attractive target because the same GPU used for image generation can be repurposed for crypto mining.</p><p class="paragraph" style="text-align:left;">Once a ComfyUI instance is identified, the tool attempts to execute attacker controlled code through the custom node ecosystem. Some nodes accept raw Python code and execute it, effectively turning it into remote code execution as a service. How nice of them. You have a system exposed to the internet that runs arbitrary Python and has access to GPUs. From there it’s persistence and mining. (<a class="link" href="https://censys.com/blog/comfyui-servers-cryptomining-proxy-botnet/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="agentic-ai-that-turns-exposure-inte"><a class="link" href="https://demo.tenable.com/share/xwxsmxpwhske?utm_medium=referral&utm_source=vuln_u&utm_campaign=cmpn-00034734" target="_blank" rel="noopener noreferrer nofollow">Agentic AI That Turns Exposure Intelligence Into Action</a>*</h3><p class="paragraph" style="text-align:left;">Most “AI for security” stops at summaries and dashboards. Tenable Hexa AI goes further as an agentic engine inside Tenable One, orchestrating agents and humans to automate asset tagging, risk reprioritization, coverage, and reporting. It turns exposure intelligence into coordinated action at machine speed, while security teams stay firmly in control.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://demo.tenable.com/share/xwxsmxpwhske?utm_medium=referral&utm_source=vuln_u&utm_campaign=cmpn-00034734" target="_blank" rel="noopener noreferrer nofollow">See how Tenable Hexa AI turns exposure into action</a></p><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>*Sponsored</i></span></p><h3 class="heading" style="text-align:left;" id="fortinet-customers-confront-activel"><a class="link" href="https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Fortinet Customers Confront Actively Exploited Zero-Day, With a Full Patch Still Pending</a></h3><div class="image"><a class="image__link" href="https://www.youtube.com/live/flKb3GeSvgU?si=H1SiC2cVe50rvPXj&t=4570&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0eb1a3ac-2d6a-428b-9c03-a432a8e542c2/image.png?t=1775677612"/></a><div class="image__source"><span class="image__source_text"><p>(click pic for livestream <a class="link" href="https://www.youtube.com/live/flKb3GeSvgU?si=H1SiC2cVe50rvPXj&t=4570&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">timestamp</a> about fortinet)</p></span></div></div><p class="paragraph" style="text-align:left;">Fortinet released an emergency software update to address an actively exploited vulnerability in FortiClient EMS, an endpoint management tool for customer devices. Unknown attackers were first observed attempting to exploit the vulnerability in March, and exploitation has already ramped up with growing attacker interest and broader targeting.</p><p class="paragraph" style="text-align:left;">Best time to apply the hotfix was yesterday. Otherwise, right now. Federal agencies have until April 9th to remediate. NHS England has already issued a high severity alert and said it is almost certain there will be further exploitation in the immediate future. Compromise of an EMS server can provide a path to multiple managed endpoints, making this attractive to ransomware operators and espionage actors. (<a class="link" href="https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="disgruntled-researcher-leaks-blue-h"><a class="link" href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Disgruntled Researcher Leaks “BlueHammer” Windows Zero-Day Exploit</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7e51b9b8-ef2c-45b4-9bfc-43ee93709226/image.png?t=1775677653"/></div><p class="paragraph" style="text-align:left;">A security researcher just dropped raw exploit code for an unpatched Windows privilege escalation flaw dubbed BlueHammer. No official patch, no update, and the flaw is considered a zero day. The researcher was unhappy with how the disclosure process was handled and just pushed the exploit out publicly.</p><p class="paragraph" style="text-align:left;">“I&#39;m not bluffing Microsoft. I&#39;m doing it again. I&#39;m not explaining how this works. Y&#39;all geniuses can figure it out. GitHub exploit code, that&#39;s it.” Some people couldn’t get the exploit to work, the researcher is just kind of over this whole bug and doesn’t care to make the PoC more stable. It’s not the craziest vuln, but it is still interesting to see us deal with public disclosure in 2026 like this. (<a class="link" href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="treasury-department-announces-crypt"><a class="link" href="https://therecord.media/treasury-department-announces-crypto-info-sharing?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Treasury Department announces crypto industry cyber threat sharing initiative</a></h3><p class="paragraph" style="text-align:left;">As stated earlier in the IC3 FBI data report - Crypto scams are a huge multi billion dollar industry every year. I usually go so far as to say the only purpose for crypto is to fascilitate crime and scams. Ransomware isn’t really asking for duffel bags of unmarked bills under a park bench… So! I’m glad to see this information sharing effort take shape as it is long overdue. They&#39;re offering the same cybersecurity intel they share with traditional banks to eligible crypto firms.</p><p class="paragraph" style="text-align:left;">While Treasury&#39;s extending a helping hand to crypto companies, the Trump administration just proposed slashing $707 million from CISA&#39;s budget, specifically targeting &quot;external engagement offices&quot; that do exactly this kind of threat sharing with other industries. So we&#39;re getting more crypto-focused cybersecurity cooperation while cutting broader private sector programs. (<a class="link" href="https://therecord.media/treasury-department-announces-crypto-info-sharing?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="google-new-unc-6783-hackers-steal-c"><a class="link" href="https://www.bleepingcomputer.com/news/security/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Google: New UNC6783 hackers steal corporate Zendesk support tickets</a></h3><p class="paragraph" style="text-align:left;">Google&#39;s threat intel sharing info on UNC6783, a financially motivated threat actor that goes by “Mr. Raccoon.” Instead of going directly after big companies, they&#39;re compromising the business process outsourcing (BPO) providers that handle customer support for these firms. Once they&#39;re in, they&#39;re making off with Zendesk support tickets containing all sorts of corporate data, then turning around and extorting the original targets.</p><p class="paragraph" style="text-align:left;">They&#39;ll social engineer support staff through live chat, directing them to spoofed Okta login pages that follow specific patterns like &quot;company.zendesk-support##.com.&quot; What makes it nastier is their phishing kit can steal clipboard contents to bypass MFA. The group also recently stole 13 million support tickets from Adobe after compromising an Indian BPO. Google&#39;s recommending FIDO2 keys and monitoring live chat for suspicious activity, but honestly, if your BPO gets owned, you&#39;re going to have a bad time regardless. (<a class="link" href="https://www.bleepingcomputer.com/news/security/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="inside-the-fb-is-router-takedown-th"><a class="link" href="https://cyberscoop.com/fbi-operation-masquerade-russian-gru-router-takedown-brett-leatherman/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’</a></h3><p class="paragraph" style="text-align:left;">The FBI just pulled off another router takedown, this time kicking APT28 (aka Fancy Bear, those GRU folks) off over 18,000 compromised TP-Link routers worldwide. What was super interesting to me on this one was how the attack worked - instead of dropping malware on individual devices, the Russians just changed DNS settings on home and small office routers. That meant every device connecting to those Wi-Fi networks automatically got redirected through malicious infrastructure, giving the GRU &quot;tremendous access&quot; to traffic from 200+ organizations.</p><p class="paragraph" style="text-align:left;">The FBI&#39;s Brett Leatherman called it uniquely contagious because compromising one router immediately compromised every connected device in that network. This marks the latest in a series of router disruptions dating back to 2018, with the FBI evolving from just sinkholing domains to actively cleaning infected devices and blocking reinfection. (<a class="link" href="https://cyberscoop.com/fbi-operation-masquerade-russian-gru-router-takedown-brett-leatherman/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="investigating-storm-2755-payroll-pi"><a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d1c23f04-8d5a-45e6-abee-b1b7cc8e8188/image.png?t=1775760204"/></div><p class="paragraph" style="text-align:left;">Payroll pirates are using SEO poisoning and malvertising to trick people into fake Office 365 login pages, then leveraging adversary-in-the-middle attacks to steal session tokens and bypass MFA. Once they&#39;re in, they search for HR and payroll contacts, create sneaky inbox rules to hide their activities, and email HR pretending to be the employee asking to change direct deposit info.</p><p class="paragraph" style="text-align:left;">We even got targeted by this at Vulnerable U! Minus the HR compromise, just some good old fashioned spear phishing to the people on my team the attackers thought did payroll. (<a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-163" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="miscellaneous-mattjay">Miscellaneous mattjay</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/077d4840-fc0b-45df-8223-76f19482e5a1/Screenshot_2026-04-09_at_1.53.32_PM.png?t=1775760864"/></div><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f40fff32-aaf6-42e7-9ef6-e36a53ea64ee/Screenshot_2026-04-09_at_1.53.38_PM.png?t=1775760873"/></div><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/45c4840f-d7d3-4bad-9ad5-62b7e7823329/Screenshot_2026-04-09_at_1.53.50_PM.png?t=1775760844"/></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="parting-thoughts">Parting Thoughts:</h2><p class="paragraph" style="text-align:start;">Community was foundational in launching and propelling my career. Community is the only reason I can stand being in Texas during the summer months. <i>Community</i> is the point. Today, I invite you to embrace discomfort on the road to a more vulnerable you. </p><p class="paragraph" style="text-align:start;">Stay safe, Matt Johansen<br>@mattjay</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Railway Incident: Authenticated User Data Cached</title>
  <description>Railway platform exposes cached user data due to CDN misconfiguration. Learn how this 52-minute incident affected authentication and what it means for your deployments.</description>
      <enclosure url="https://images.unsplash.com/photo-1683810290034-e6a3cd4bd8ba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHwxfHx0cmFpbiUyMGRlcmFpbHxlbnwwfHx8fDE3NzUwOTEwMTl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/railway-incident-authenticated-user-data-cached</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/railway-incident-authenticated-user-data-cached</guid>
  <pubDate>Fri, 10 Apr 2026 02:06:00 +0000</pubDate>
  <atom:published>2026-04-10T02:06:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/idHWqPXJwnE?si=tGyEB8X_jAT-FQAd&start=6682" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;">Railway got pretty popular because it made the whole stack feel easy. You could deploy apps, stand up databases, wire services together, and get something real running without spending your weekend becoming a part-time cloud plumber. Railway describes itself as a full-stack cloud for deploying web apps, servers, databases, and more, and that is basically the appeal. It is slick, fast, and a lot of developers trust it with production workloads.</p><p class="paragraph" style="text-align:left;">Then Railway stepped on a landmine.</p><p class="paragraph" style="text-align:left;">On March 30, Railway disclosed that a configuration change accidentally enabled CDN caching on a small slice of domains that had CDN turned off. The impact window lasted from 10:42 UTC to 11:34 UTC, about 52 minutes, and Railway says the issue affected about 0.05 percent of domains on the platform with CDN disabled. During that window, cached responses could be served to someone other than the original requester, <b>which meant one user could end up seeing content meant for another.</b></p><p class="paragraph" style="text-align:left;">Railway says potentially authenticated data may have been served to unauthenticated users, and also says applications may have served requests for one user to a different user. In plain English, the cache got in the middle and started handing out somebody else’s data.</p><p class="paragraph" style="text-align:left;">The technical root cause is ugly but straightforward. Railway says CDN caching is supposed to be opt-in. Domains without CDN enabled should route directly to the app. But a config update tied to Surrogate Keys accidentally flipped caching on for domains that had it disabled. That meant responses that should have gone back to the origin app got stored at the edge instead. If your app relied on logic to decide which user should see what, that logic could get skipped because the cache already had a response ready to serve.</p><p class="paragraph" style="text-align:left;">Railway also said <code>Cache-Control</code> directives were respected where applications provided them, and <code>Set-Cookie</code> response headers were not cached. But that does not make this benign. Railway says most HTTP GET responses without explicit cache headers were cached by default during the incident window. So yes, this was a GET problem, not a POST free-for-all based on Railway’s public write-up. But GET is more than enough to ruin your day if your app returns user-specific dashboards, account pages, medical info, billing views, or internal admin data over cacheable GET routes.</p><p class="paragraph" style="text-align:left;">Railway says the first signs of trouble showed up at 11:14 UTC through internal signals and user reports, and the change was fully reverted by 11:34 UTC, with cached assets purged globally. Affected users were to be notified by email. Railway also says it added more caching-behavior tests and plans to roll out CDN changes more gradually going forward.</p><p class="paragraph" style="text-align:left;">Because the nasty part is not just that data got cached. It is that Railway turned caching on for people who had explicitly not enabled it. That means a bunch of developers had no reason to think they needed to harden every GET response for intermediary caching behavior at that moment, because according to the platform’s own model, those requests were supposed to go straight to the app. Railway’s own docs and incident report make that distinction clear.</p><p class="paragraph" style="text-align:left;">The public reaction was exactly what you would expect. Railway’s Help Station had a dedicated incident thread, and outside discussion around the incident focused on lost revenue, user trust, and the possibility that sensitive customer data had been exposed.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cffeee1b-300a-42b0-b6ee-8c3dcbb27746/Screenshot_2026-04-01_at_7.44.56_PM.png?t=1775090710"/></div><p class="paragraph" style="text-align:left;">So yeah, this one&#39;s gnarly. User frustration was on full display in the Railway forums. Some examples:</p><ul><li><p class="paragraph" style="text-align:left;"><i>“What&#39;s wrong with you folks? This is such a stupid issue. Are you out of your mind? Who asked you to enable caching for my endpoints?”</i></p></li><li><p class="paragraph" style="text-align:left;"><i>“We just brought down our infrastructure due to this problem.” </i></p></li><li><p class="paragraph" style="text-align:left;"><i>“We need to know urgently whether only GET or post responses were affected. The latter would mean people could have gotten other people&#39;s access tokens.”</i></p></li><li><p class="paragraph" style="text-align:left;">‘We lost customers and revenue. We are now at risk of being sued for leaking medical data. I know you are extremely disappointed with what happened, but we need support.” </p></li><li><p class="paragraph" style="text-align:left;">“Day ruined? I lost years of my life. I need a vacation.”</p></li></ul><p class="paragraph" style="text-align:left;">What a tire fire.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Claude Code&#39;s Full Source Code Leaked Via .map File in Anthropic&#39;s npm Registry </title>
  <description>Claude Code&#39;s source code leaked via .map file in Anthropic&#39;s npm registry. Discover what was exposed, hidden features revealed, and key security lessons from this incident.</description>
      <enclosure url="https://images.unsplash.com/photo-1738107445898-2ea37e291bca?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHwxfHxDbGF1ZGUlMjB8ZW58MHx8fHwxNzc1MDkxNjYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/claude-code-s-full-source-code-leaked-via-map-file-in-anthropic-s-npm-registry</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/claude-code-s-full-source-code-leaked-via-map-file-in-anthropic-s-npm-registry</guid>
  <pubDate>Tue, 07 Apr 2026 13:35:00 +0000</pubDate>
  <atom:published>2026-04-07T13:35:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Ai]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/idHWqPXJwnE?si=Oygyk1h5wceMw_zO&start=345" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;"><a class="link" href="http://So, Claude Code source code leaked. Yes, yes. Not that consequential of a leak, to be honest, but still kind of fun to click around and see all the stuff that&#39;s behind the scenes, like hidden flags and unreleased features and things like that. I haven&#39;t even wrapped my head around like how the leak actually happened - “via a map file in their npm registry.” Oh, here it is, pub source.zip. You want the model. Everyone wants the model. Instead, it&#39;s just the Claude Code front end source code. So, you&#39;re going to read a lot of headlines about this. Of course, I had to talk about it. It&#39;s a big deal. I think the more interesting part is the lessons learned of how they leaked it. People just treat GitHub like it&#39;s this walled garden special snowflake kind of place. Claude team is usually pretty transparent. I&#39;m interested in the postmortem on this when they talk about how they stubbed their toe leaking everything. But yeah, supposedly we have a Tamagotchi style AI pet, maybe like a Reddit-style April Fool&#39;s joke coming out. We have this persistent assistant mode, the “Always-on Claude.” We have an ultra plan, 30 minute remote planning sessions, coordinator mode, multi-agent orchestrator. These are basically unreleased features. Here&#39;s another tweet. I think what&#39;s going on on Twitter right now is people are feeding the source code leak to Claude to then generate summaries of the things that were leaked in Claude code, which is a funny ironic thing. But yeah, you could see some of these unreleased things. So yeah, this Easter egg thing, whatever. Not that big a deal. , persistent assistant, four-phased, fork, subbed, agent, orient, gather, consolidate, prune. This honestly feels a little like PAI. I think I&#39;ve talked about PAI on stream before, the Daniel Mesler project. Kind of sounds like something that works in PAI. An ultra plan feature... Like I said, this isn&#39;t a very consequential leak. It&#39;s more just interesting that it happened to begin with. This is also like within the last little bit. So maybe we&#39;ll find some more stuff that is part of this leak that we don&#39;t know yet. But as of right now, I&#39;m not seeing anything that&#39;s too consequential. More just crap for them. New attack vectors is an interesting thing. With Claude code source code, can we find some ways to exploit Claude code users? That&#39;d be interesting, even remotely, it’d be super interesting. Oh, the system prompts. That&#39;s kind of interesting. I don&#39;t know if that&#39;s legit. Just a random Twitter account is tweeting out system prompts. We&#39;ll come back to it. We&#39;ll see if anything consequential comes out of that. Currently, not really. More egg on face." target="_blank" rel="noopener noreferrer nofollow">Claude Code </a>source code has been leaked. Not that consequential of a leak, to be honest, but still kind of fun to click around and see all the stuff that&#39;s behind the scenes, like hidden flags and unreleased features and things like that. </p><p class="paragraph" style="text-align:left;">You&#39;re going to read a lot of headlines about this. I think the more interesting part is the lessons learned of how they leaked it. People just treat GitHub like it&#39;s this walled garden special snowflake kind of place. </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/75656597-3a6c-4401-951b-2c284af0993e/Screenshot_2026-04-01_at_2.26.05_PM.png?t=1775071582"/></div><p class="paragraph" style="text-align:left;">The Claude team is usually pretty transparent. I&#39;m interested in the postmortem on this when they talk about how they stubbed their toe leaking everything. But yeah, supposedly we have a Tamagotchi style AI pet, maybe like a Reddit-style April Fool&#39;s joke coming out. We have this persistent assistant mode, the “Always-on Claude.” We have an ultra plan, 30-minute remote planning sessions, coordinator mode, a multi-agent orchestrator. </p><p class="paragraph" style="text-align:left;">I think what&#39;s happening on Twitter right now is people are feeding the source code leak to Claude to then generate summaries of the things that were leaked in Claude code, which is a funny and ironic thing. </p><p class="paragraph" style="text-align:left;">A few thoughts there: </p><ul><li><p class="paragraph" style="text-align:left;">It’s a good practice to not commit secrets to source code. </p></li><li><p class="paragraph" style="text-align:left;">Claude code is just the front-end app. We are just talking about a very good terminal app at the end of the day. </p></li><li><p class="paragraph" style="text-align:left;">This is just the features and scaffolding around interacting with Claude for the code stuff. </p></li><li><p class="paragraph" style="text-align:left;">Imagine how much time is being burnt at OpenAI and Google to dig through this information. </p></li></ul><p class="paragraph" style="text-align:left;">This isn&#39;t a disaster. Code matters, but code&#39;s cheap now. The hard part is not writing some helper tool. Anthropic probably knows this. The way they handle this kind of suggests they don&#39;t treat source code like some sacred crown jewel anymore. </p><p class="paragraph" style="text-align:left;">It does give people a better idea of what Anthropic is doing under the hood and that could still be valuable for people trying to understand it better and build on similar ideas.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Palo Alto Networks&#39; &quot;Tomorrow, Secured&quot; Recap: What Actually Matters for Practitioners</title>
  <description>Palo Alto Networks&#39; &quot;Tomorrow, Secured&quot; event recap: practical product announcements on AI agent security, certificate management, and SASE innovations for practitioners.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ab05ce7c-a8a6-47ad-a48f-49054df5c04e/Screenshot_2026-04-06_at_7.03.47_PM.png" length="960894" type="image/png"/>
  <link>https://www.vulnu.com/p/palo-alto-networks-tomorrow-secured-recap-what-actually-matters-for-practitioners</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/palo-alto-networks-tomorrow-secured-recap-what-actually-matters-for-practitioners</guid>
  <pubDate>Tue, 07 Apr 2026 00:12:00 +0000</pubDate>
  <atom:published>2026-04-07T00:12:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[News]]></category>
    <category><![CDATA[Sponsored]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>This post is sponsored by Palo Alto Networks. All opinions are my own. #ad</i></p><p class="paragraph" style="text-align:left;">I attended Palo Alto Networks&#39; Tomorrow, Secured event in San Francisco last week, and I want to cut through the keynote polish and talk about what actually shipped. Specifically, the announcements that practitioners are going to care about when they&#39;re back at their desks on Monday.</p><p class="paragraph" style="text-align:left;">There were three major product areas covered: AI agent security, certificate and cryptographic trust management, and SASE innovations. Here&#39;s what caught my attention in each.</p><h2 class="heading" style="text-align:left;" id="next-gen-trust-security">Next-Gen Trust Security</h2><p class="paragraph" style="text-align:left;">This one might not generate the most headlines, but it&#39;s the announcement I was most excited about as someone who has lived through the pain of certificate management at scale.</p><p class="paragraph" style="text-align:left;">Palo Alto Networks announced <a class="link" href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-introduces-next-generation-trust-security-to-automate-and-future-proof-digital-resilience?utm_source=blog&utm_medium=social&utm_campaign=influencer&utm_content=pa000968" target="_blank" rel="noopener noreferrer nofollow">Next-Gen Trust Security</a>, which integrates CyberArk&#39;s Certificate Management and Zero-Touch PKI directly into their network security portfolio. The pitch is a network-native approach to enforcing certificate and cryptographic trust, and the details are what make it compelling.</p><p class="paragraph" style="text-align:left;">You can discover certificates using live network telemetry. Not some agent-based scanner that misses half your infrastructure, but actual visibility derived from network traffic. You can prioritize risk based on active service exposure, so you&#39;re not chasing down certs on decommissioned boxes. Certificates get validated inline during traffic inspection. And issuance, renewal, and trust anchor transitions are automated without downtime.</p><p class="paragraph" style="text-align:left;">If you&#39;ve ever been on a war room call at 2 AM because an expired certificate took down a critical service, this is for you. If you&#39;ve ever tried to maintain a certificate inventory across a sprawling enterprise and felt like you were losing, this is for you.</p><p class="paragraph" style="text-align:left;">Moving certificate lifecycle management from a bolted-on afterthought to a network-native function is a meaningful architectural shift. It means your network enforcement layer actually understands and validates the cryptographic trust underpinning the traffic flowing through it, rather than treating certificates as someone else&#39;s problem.</p><p class="paragraph" style="text-align:left;">This also positions organizations well for the coming quantum cryptography transition, where managing certificate and trust anchor migrations at scale without downtime is not a nice-to-have.</p><h2 class="heading" style="text-align:left;" id="prisma-airs-30-ai-agent-security-ge">Prisma AIRS 3.0: AI Agent Security Gets Real Tooling</h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d7ccafbc-cadb-44af-a79b-e2153e156b01/image.png?t=1775068223"/></div><p class="paragraph" style="text-align:left;">AI agents are everywhere right now. Every company I talk to is either building them, deploying them, or trying to figure out how to govern the ones their developers spun up without telling anyone. The security story for these agents has been mostly hand-waving and fake sandboxes. <a class="link" href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-secures-agentic-ai-with-prisma-airs-3-0?utm_source=blog&utm_medium=social&utm_campaign=influencer&utm_content=pa000962" target="_blank" rel="noopener noreferrer nofollow">Prisma AIRS 3.0</a> is Palo Alto Networks&#39; answer to that, and it is more comprehensive than I expected.</p><p class="paragraph" style="text-align:left;">The standout capabilities: Agent Artifact Scanning maps out your agentic architecture and finds vulnerabilities across it. Red Teaming for Agents lets you stress test and attack your agents to discover insecure behavior before someone else does. As AI systems move from assistance to action, identity and control become foundational. Agent Identity Security assigns verifiable, non-human identities to AI agents, enforces least-privilege access, and continuously validates what each agent is allowed to do. And the AI Agent Gateway provides centralized visibility, monitoring and enforcement of policy across all agent interactions at scale.</p><p class="paragraph" style="text-align:left;">The attack surface for agentic AI is fundamentally different from traditional application security. Agents make autonomous decisions, chain tool calls together, and can interact with infrastructure in ways their developers didn&#39;t fully anticipate. Having platform-level tooling to scan, red team, and govern these agents is becoming table stakes for anyone serious about deploying them in production.</p><p class="paragraph" style="text-align:left;">Prisma AIRS 3.0 also plans to integrate AI Endpoint Security (based on their KOI acquisition - yet to close) for securing agents running on endpoints, which rounds out the story from cloud to edge.</p><h2 class="heading" style="text-align:left;" id="prisma-sase-agentic-browsing-and-ai">Prisma SASE: Agentic Browsing and AI Data Protection</h2><p class="paragraph" style="text-align:left;">The <a class="link" href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-unveils-the-industrys-most-secure-browser-built-for-agentic-ai?utm_source=blog&utm_medium=social&utm_campaign=influencer&utm_content=pa000966" target="_blank" rel="noopener noreferrer nofollow">Prisma SASE updates</a> are where the AI governance story meets the network. A few things stood out.</p><p class="paragraph" style="text-align:left;">Prisma Browser now has agentic capabilities where organizations can plug in their LLM of choice, but with guardrails. That includes blocking prompt injection attacks to prevent agent hijacking and compliance controls that distinguish between human and automated AI tasks. That distinction is going to matter a lot as companies try to maintain audit trails in environments where both humans and agents are taking actions.</p><p class="paragraph" style="text-align:left;">On the data protection side, Prisma SASE now secures sensitive data across GenAI tools and agents, specifically targeting leakage into shadow AI environments. Every security team I know is dealing with shadow AI right now. Employees are spinning up tools and feeding company data into them without going through any approval process. Having network-level visibility and control over that data flow is a practical step forward.</p><p class="paragraph" style="text-align:left;">They also introduced AI-driven network operations to eliminate manual troubleshooting and reduce ticket fatigue, using AI agents to diagnose and resolve connectivity issues. It is the kind of incremental operational improvement that adds up fast when you are running a global network.</p><h2 class="heading" style="text-align:left;" id="the-bigger-picture">The Bigger Picture</h2><p class="paragraph" style="text-align:left;">The theme across <a class="link" href="https://www.paloaltonetworks.com/company/newsroom/cyber-week-26?utm_source=blog&utm_medium=social&utm_campaign=influencer&utm_content=pa000957" target="_blank" rel="noopener noreferrer nofollow">all of these announcements</a> is clear: Palo Alto Networks is building platform-level answers to AI agent security, identity, and governance rather than shipping point solutions. The certificate management play and the AI agent security play in particular feel like they are addressing problems that are already causing real pain for security teams, not hypothetical future concerns.</p><p class="paragraph" style="text-align:left;">The full Tomorrow, Secured keynote is <a class="link" href="https://www.linkedin.com/events/7437934196125491200?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=palo-alto-networks-tomorrow-secured-recap-what-actually-matters-for-practitioners" target="_blank" rel="noopener noreferrer nofollow">available on-demand here</a>. Worth watching if you are evaluating your AI security posture or want to see what is shipping from one of the biggest players in the space.</p><p class="paragraph" style="text-align:left;"><i>Disclosure: This post is sponsored by Palo Alto Networks. All opinions are my own. #ad</i></p><div class="custom_html"><iframe src="https://embeds.beehiiv.com/a6407365-5497-4de1-b83b-acb60b1ae802" data-test-id="beehiiv-embed" width="100%" height="320" frameborder="0" style="border-radius: 4px; border: 2px solid #e5e7eb; margin: 0; background-color: transparent;"></iframe></div></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Biggest Supply-Chain Attacks in History, Back to Back to Back ...</title>
  <description>Multiple massive supply-chain attacks hit simultaneously, exposing critical vulnerabilities in cloud code, Cisco, and npm packages. What&#39;s driving this cybersecurity crisis?</description>
      <enclosure url="https://images.unsplash.com/photo-1719251931947-f652f951b356?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHw2fHxzdXBwbHktY2hhaW4lMjBhdHRhY2tzfGVufDB8fHx8MTc3NTA5MjIxMnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/biggest-supply-chain-attacks-in-history-back-to-back-to-back</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/biggest-supply-chain-attacks-in-history-back-to-back-to-back</guid>
  <pubDate>Mon, 06 Apr 2026 15:45:00 +0000</pubDate>
  <atom:published>2026-04-06T15:45:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Malware]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/CRaISQyQpmo?si=VsYxS2OUwjFzYI5u&controls=0&start=10825" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;"><i>(Editor’s note: Sources for this report are at the end)</i></p><p class="paragraph" style="text-align:left;">What the hell is going on in cybersecurity recently? I am exhausted. I haven&#39;t been able to<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>keep up. We have the biggest supply chain hacks back to back to back to back going on,<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>not even all by the same threat actor. </p><p class="paragraph" style="text-align:left;">We&#39;ve got cloud code leaking source code. We got Cisco<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>leaking source code. One of those was a mistake. The other one was a hack by this prolific supply<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>chain hacker going on right now. We have a package in NPM with 100 million weekly downloads that<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>started distributing malware. And when you get these supply chain attacks, there&#39;s a bunch<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>of ripple effects. </p><p class="paragraph" style="text-align:left;">Has Pandora&#39;s box<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>opened in cybersecurity? How much is AI to blame for this? And how much of this is actually just<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>the fact that we built a lot of our Internet security on top of a house of cards of underfunded open source software? </p><p class="paragraph" style="text-align:left;">I&#39;m not blaming open source software.<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>Of course,<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>open source software is awesome. I&#39;m saying it&#39;s underfunded and under helped.<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>You got these critical pieces of infrastructure that just don&#39;t have the<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>means to do all the security stuff and stay on top of this stuff as they need to. And even when<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>they do, this shit is really sneaky right now. </p><p class="paragraph" style="text-align:left;">Attackers are getting in via really sneaky<span style="color:rgb(48, 48, 48);font-family:ui-sans-serif, system-ui, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji";font-size:medium;"> </span>ways. So let&#39;s look at a timeline:</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ad8c5fa2-136b-44b3-9f80-86d1173b7745/Screenshot_2026-04-02_at_6.48.32_PM.png?t=1775173742"/><div class="image__source"><a class="image__source_link" href="https://ramimac.me/teampcp/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back#timeline" rel="noopener" target="_blank"><span class="image__source_text"><p><a class="link" href="https://ramimac.me/teampcp/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back#timeline" target="_blank" rel="noopener noreferrer nofollow">Timeline by Rami McCarthy</a>, Principal Security Researcher at <a class="link" href="https://www.wiz.io/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(26, 95, 122)">Wiz</a></p></span></a></div></div><h2 class="heading" style="text-align:left;" id="team-pcp-vs-trivy">TeamPCP vs. Trivy</h2><p class="paragraph" style="text-align:left;">One of the groups at the center of this mess is TeamPCP. Researchers have tied them to a string of supply chain attacks that unfolded across late February and March 2026, with Trivy becoming one of the earliest and most important compromises in the chain. </p><p class="paragraph" style="text-align:left;">Trivy matters because it is one of the most widely used open source security scanners in cloud-native environments, and a lot of teams run it automatically inside CI/CD to scan containers, repos, and infrastructure before code ships.</p><p class="paragraph" style="text-align:left;">The March 19 incident was not just “Trivy got hacked through GitHub” in a generic sense. Aqua said the attack grew out of an earlier late-February breach, where attackers exploited a misconfiguration in Trivy’s GitHub Actions environment and extracted a privileged token. Aqua disclosed that first incident on March 1 and rotated credentials, but later said the cleanup was incomplete, which let the attackers keep enough access to come back and weaponize Trivy’s release and automation pipeline.</p><p class="paragraph" style="text-align:left;">That is what made the next step so dangerous. On March 19, the attackers used compromised credentials to publish a malicious Trivy <code>v0.69.4</code> release, replace all 7 tags in <code>setup-trivy</code>, and force-push <b>76 of 77</b> version tags in <code>trivy-action</code> to malicious commits. That meant organizations referencing those trusted tags in GitHub Actions could pull attacker-controlled code straight into privileged CI/CD runs. Aqua’s advisory says the malicious code stole secrets from runners before the legitimate scan executed.</p><p class="paragraph" style="text-align:left;">That is the real story here: security tooling that normally runs with broad access got turned into a credential harvester. The malicious payload targeted GitHub Actions runners and was designed to dump process memory, harvest SSH keys, and exfiltrate cloud credentials and Kubernetes tokens. So this was a compromise of a trusted scanner embedded deep in automated build and release workflows.</p><p class="paragraph" style="text-align:left;">There was also a separate Trivy-related incident earlier in the same broader timeline: a malicious Trivy VS Code extension release distributed through OpenVSX. Aqua’s advisory for that issue says version <code>1.8.12</code> contained malicious code meant to abuse local AI coding agents and exfiltrate sensitive information. So it is fair to say Trivy was hit more than once in this overall campaign, but it is more accurate to describe these as <b>distinct incidents affecting different parts of the Trivy ecosystem</b> rather than one single compromise that happened “twice” in exactly the same way.</p><h2 class="heading" style="text-align:left;" id="the-jumping-off-point">The Jumping Off Point</h2><p class="paragraph" style="text-align:left;">There was only one clean <code>trivy-action</code> tag left: <code>0.35.0</code>. But not because the attackers used it as a launch point. Aqua says it survived because GitHub immutable releases had already been enabled for that tag before the attack. Everything else got uglier fast: the attackers force-pushed 76 of 77 <code>trivy-action</code> tags, replaced all 7 <code>setup-trivy</code> tags, and pushed a malicious <code>v0.69.4</code> Trivy release.</p><p class="paragraph" style="text-align:left;">That was the real jumping-off point. Once TeamPCP turned Trivy’s release pipeline into a credential harvester, they were no longer just compromising one tool. They were harvesting secrets from the CI/CD environments running it. Aqua says the malware executed before the legitimate scan and pulled secrets from runner memory and the environment.</p><p class="paragraph" style="text-align:left;">Less than 24 hours later, the attack jumped into npm. Aikido detected what it named CanisterWorm on March 20 at 20:45 UTC, and Mend says stolen npm tokens from the Trivy stage became the launchpad. From there, the worm used those tokens to figure out which maintainer account it had landed on, enumerate every package that account could publish, bump versions, and push poisoned releases across whole scopes.</p><p class="paragraph" style="text-align:left;">Around the same time, TeamPCP was also tied to other escalation activity, including repo tampering inside Aqua’s GitHub org and destructive operations against exposed infrastructure configured for Iran. Those are part of the broader campaign, but they should be described separately from the npm worm itself.</p><p class="paragraph" style="text-align:left;">And the cleanup took longer than one day. Aqua says the first malicious artifacts were removed on March 19–20, but a second Docker Hub wave stayed live until early March 23 UTC. So we’re looking at multiple windows of compromise across several days.</p><h2 class="heading" style="text-align:left;" id="ripple-effects-reach-checkmarx-lite">Ripple Effects Reach Checkmarx, LiteLLM</h2><p class="paragraph" style="text-align:left;">Then the ripple effects start. One of the first downstream hits landed at Checkmarx — more specifically, in the <code>checkmarx/kics-github-action</code> and <code>checkmarx/ast-github-action</code> workflows, along with two OpenVSX plugins. That matters because these kinds of security tools often run inside CI/CD with broad access to build runners, repo tokens, and cloud credentials. So the danger here wasn’t just that “another scanner got hit.” It was that poisoned security tooling was now running inside trusted pipelines with privileged access.</p><p class="paragraph" style="text-align:left;">Then came what may be the most consequential second-order effect of the Trivy compromise: LiteLLM on PyPI. This is where the campaign jumps out of npm and into Python’s package ecosystem. TeamPCP published malicious versions <code>1.82.7</code> and <code>1.82.8</code> of the real LiteLLM package, and PyPI later quarantined them. LiteLLM is widely used as a single interface for multiple model providers, so it often sits close to valuable environment variables and service credentials.</p><p class="paragraph" style="text-align:left;">The malicious LiteLLM packages were built to harvest secrets from the host they landed on like environment variables, SSH keys, cloud credentials, Kubernetes tokens, and database passwords. So the point isn’t that LiteLLM was literally routing all of those secrets through itself. It’s that compromising a package like LiteLLM gives attackers a shot at the systems and pipelines where those secrets already exist. LiteLLM also said its official Proxy Docker image was <b>not</b> affected.</p><p class="paragraph" style="text-align:left;">From there, the campaign appears to shift from collection to monetization. Unit 42 reported that TeamPCP announced a partnership with the Vect ransomware group on BreachForums, suggesting an effort to turn stolen data and access into extortion. I’d word that carefully, though: that’s a threat-actor claim reported by researchers, not public proof that every victim was hit by Vect ransomware. </p><h2 class="heading" style="text-align:left;" id="second-order-impacts-cisco-claude-c">Second-Order Impacts: Cisco, Claude Code, and Mercor</h2><p class="paragraph" style="text-align:left;">By the end of March, Cisco was being reported as one of the downstream victims of the Trivy compromise. BleepingComputer reported that attackers used credentials stolen through the malicious Trivy GitHub Action to access Cisco’s build and development environment, steal source code, and abuse AWS keys from a small number of accounts. That is the real second-order risk here: once a poisoned security tool lands inside a privileged pipeline, the blast radius moves from the tool itself to every environment that trusts it.</p><p class="paragraph" style="text-align:left;">Around the same time, Claude Code source code leaked, and a lot of people immediately wondered whether it was connected to Trivy or LiteLLM. Publicly, it does not look like it was. Anthropic said the release accidentally included internal source code because of a packaging mistake caused by human error, not a security breach, and that no customer data or credentials were exposed.</p><p class="paragraph" style="text-align:left;">Mercor looks like a more credible downstream impact from the LiteLLM side of the chain. Mercor told TechCrunch it was “one of thousands of companies” affected by the LiteLLM compromise linked to TeamPCP. Separately, Lapsus$ claimed it stole roughly 4TB of Mercor data, including source code, database records, video interviews, and identity documents. That alleged scope is serious, but it should still be framed as an attacker claim unless Mercor independently confirms the totals.</p><h2 class="heading" style="text-align:left;" id="the-axe-falls-on-axios">The Axe Falls on Axios</h2><p class="paragraph" style="text-align:left;">Then the story gets even messier, because Axios was hit and they have 100M weekly downloads on npm. But this appears to be a separate incident, not another branch of the TeamPCP/Trivy campaign. Google said the Axios compromise was carried out by the North Korea-linked actor it tracks as UNC1069, while Microsoft attributed the infrastructure and activity to Sapphire Sleet, another North Korea-linked tracking label. Google also said this Axios attack was not connected to the major npm supply chain attack from the previous week.</p><p class="paragraph" style="text-align:left;">The important nuance is that Axios itself was not universally “pushing malware everywhere.” Two specific npm releases were malicious: <code>axios@1.14.1</code> and <code>axios@0.30.4</code>. In both cases, the attackers inserted a fake dependency, <code>plain-crypto-js@4.2.1</code>, which used a <code>postinstall</code> hook to quietly fetch and deploy a cross-platform RAT on Windows, macOS, and Linux. Google and Microsoft both say defenders should treat affected hosts as compromised, rotate secrets, and roll back to safe versions such as <code>1.14.0</code> or <code>0.30.3</code>.</p><p class="paragraph" style="text-align:left;">Because Axios sits so deep in the JavaScript ecosystem, the risk is not limited to teams that knowingly installed it. Google warned that the ripple effects could spread through other packages and downstream environments, and Microsoft noted that projects auto-updating Axios could have silently pulled the malicious releases during the exposure window.</p><p class="paragraph" style="text-align:left;">We’re not going to know all the impact of this one for a bit. North Korea is not the same as a cybercrime group like TeamPCP - they can quietly sit on the secrets they’ve sucked up and figure out how to best use them. Most likely they will be targeting large crypto theft as that is generally their main goal.</p><h2 class="heading" style="text-align:left;" id="a-world-of-hurt"><b>A World of Hurt</b></h2><p class="paragraph" style="text-align:left;">The bigger issue now is cleanup. Across the Trivy, LiteLLM, and Axios incidents, defenders are being told to audit dependency trees, isolate affected hosts, pin known-good versions, clear caches, and rotate any secrets present on compromised systems. Google warned that hundreds of thousands of stolen secrets could already be circulating as a result of these attacks.</p><p class="paragraph" style="text-align:left;">So the practical takeaway is less “everything is doomed” and more “the follow-on damage may keep unfolding for a while.” That is what makes these supply chain attacks so nasty: by the time the malicious package is pulled, the real problem may already be the credentials, tokens, and access that were stolen before anyone realized they were exposed.</p><h2 class="heading" style="text-align:left;" id="sources-for-this-report">Sources for this report:</h2><div class="embed"><a class="embed__url" href="https://ramimac.me/teampcp/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back#timeline" target="_blank"><div class="embed__content"><p class="embed__title"> TeamPCP Supply Chain Campaign | Attack Timeline & IOCs </p><p class="embed__description"> Timeline and IOCs for TeamPCP&#39;s March 2026 supply chain campaign. Trivy, KICS, LiteLLM, and 45+ npm packages compromised through chained credential theft. </p><p class="embed__link"> ramimac.me/teampcp/#timeline </p></div><img class="embed__image embed__image--right" src="https://ramimac.me/teampcp/og-image.png"/></a></div><div class="embed"><a class="embed__url" href="https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank"><div class="embed__content"><p class="embed__title"> Trivy ecosystem supply chain temporarily compromised </p><p class="embed__description"> ## Summary On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credent... </p><p class="embed__link"> GitHub </p></div><img class="embed__image embed__image--right" src="https://avatars.githubusercontent.com/u/12783832?s=400&v=4"/></a></div><div class="embed"><a class="embed__url" href="https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back#How-the-Attacker-Poisoned-75-Tags-Without-Touching-a-Branch" target="_blank"><div class="embed__content"><p class="embed__title"> Trivy Under Attack Again: Widespread GitHub Actions Tag Comp... </p><p class="embed__description"> Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines. </p><p class="embed__link"> Socket </p></div><img class="embed__image embed__image--right" src="https://cdn.sanity.io/images/cgdhsj6q/production/6afe7a11b9f6e0eaca499016e7760f5674917627-1024x1024.png?w=1000&q=95&fit=max&auto=format"/></a></div><div class="embed"><a class="embed__url" href="https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back#background-what-is-litellm" target="_blank"><div class="embed__content"><p class="embed__title"> litellm: Credential Stealer Hidden in PyPI Wheel - StepSecurity </p><p class="embed__description"> On March 24, 2026, a critical supply chain compromise was identified in litellm==1.82.8: the PyPI package contains a malicious litellm_init.pth file </p><p class="embed__link"> www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel#background-what-is-litellm </p></div><img class="embed__image embed__image--right" src="https://cdn.prod.website-files.com/673b71f0790aabf30bd30bf8/69c698af20e33b1f20c5fd62_Cover-6-25.jpg"/></a></div><div class="embed"><a class="embed__url" href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank"><div class="embed__content"><p class="embed__title"> Cisco source code stolen in Trivy-linked dev environment breach </p><p class="embed__description"> Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to the company and its customers. </p><p class="embed__link"> BleepingComputer </p></div><img class="embed__image embed__image--right" src="https://www.bleepstatic.com/content/hl-images/2025/03/04/Cisco.jpg"/></a></div><div class="embed"><a class="embed__url" href="https://www.theregister.com/2026/04/02/mercor_supply_chain_attack?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank"><div class="embed__content"><p class="embed__title"> Mercor says it was &#39;one of thousands&#39; hit in LiteLLM attack </p><p class="embed__description"> : First public downstream victim, but won&#39;t be the last </p><p class="embed__link"> www.theregister.com/2026/04/02/mercor_supply_chain_attack </p></div><img class="embed__image embed__image--right" src="https://regmedia.co.uk/2018/02/28/shutterstock_broken_link.jpg"/></a></div><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/AlvieriD/status/2038779690295378004?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back"><p> Twitter tweet </p></a></blockquote><div class="embed"><a class="embed__url" href="https://www.wiz.io/blog/tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank"><div class="embed__content"><p class="embed__title"> Tracking TeamPCP: Investigating Post-Compromise Attacks Seen in the Wild | Wiz Blog </p><p class="embed__description"> How TeamPCP are leveraging stolen secrets from the recent supply chain attacks to compromise cloud environments </p><p class="embed__link"> wiz.io </p></div><img class="embed__image embed__image--right" src="https://www.datocms-assets.com/75231/1774960503-tracking-teampcp.png?fm=webp"/></a></div><div class="embed"><a class="embed__url" href="https://www.bleepingcomputer.com/news/security/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank"><div class="embed__content"><p class="embed__title"> Hackers compromise Axios npm package to drop cross-platform malware </p><p class="embed__description"> Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems. </p><p class="embed__link"> BleepingComputer </p></div><img class="embed__image embed__image--right" src="https://www.bleepstatic.com/content/hl-images/2022/07/05/NPM_head_pic.jpg"/></a></div><div class="embed"><a class="embed__url" href="https://unit42.paloaltonetworks.com/axios-supply-chain-attack/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank"><div class="embed__content"><p class="embed__title"> Threat Brief: Widespread Impact of the Axios Supply Chain Attack </p><p class="embed__description"> Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup. </p><p class="embed__link"> Unit 42 • Unit 42 </p></div><img class="embed__image embed__image--right" src="https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/02_Security-Technology_Category_1920x900.jpg"/></a></div><div class="embed"><a class="embed__url" href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back" target="_blank"><div class="embed__content"><p class="embed__title"> North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | Google Cloud Blog </p><p class="embed__description"> A North Korea-nexus threat actor targeted the popular axios NPM package in a massive supply chain attack. </p><p class="embed__link"> Google Cloud Blog </p></div><img class="embed__image embed__image--right" src="https://storage.googleapis.com/gweb-cloudblog-publish/images/03_ThreatIntelligenceWebsiteBannerIdeas_BA.max-2600x2600.png"/></a></div><div class="embed"><a class="embed__url" href="https://socket.dev/blog/hidden-blast-radius-of-the-axios-compromise?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=biggest-supply-chain-attacks-in-history-back-to-back-to-back#Why-the-Blast-Radius-Is-Larger-Than-It-Looks" target="_blank"><div class="embed__content"><p class="embed__title"> The Hidden Blast Radius of the Axios Compromise - Socket </p><p class="embed__description"> The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain. </p><p class="embed__link"> Socket </p></div><img class="embed__image embed__image--right" src="https://cdn.sanity.io/images/cgdhsj6q/production/f3e00bf226eb680d71671c8d53c1451222497db8-1024x1024.png?w=1000&q=95&fit=max&auto=format"/></a></div></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🎓️ Vulnerable U | #162</title>
  <description>Supply chain pandoras box, claude source code leak, $280M in crypto stolen, Railway was serving up other user&#39;s data, and much more!</description>
  <link>https://www.vulnu.com/p/vulnerable-u-162</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/vulnerable-u-162</guid>
  <pubDate>Fri, 03 Apr 2026 12:21:00 +0000</pubDate>
  <atom:published>2026-04-03T12:21:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-family:Courier, Lucida Typewriter, monospace;"><i><b>Read Time: </b></i></span><span style="font-family:Courier, Lucida Typewriter, monospace;"><i>5 minutes</i></span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/38c9f5f2-3c9e-426e-a276-2a31b0eb4f35/Newsletter_Header.png?t=1774977226"/></div><p class="paragraph" style="text-align:center;">Brought to you by:</p><div class="image"><a class="image__link" href="https://withpersona.com/guides/workforce-idv-checklist?utm_source=vuln-u&utm_medium=paid-email&utm_audience=a&utm_campaign=brnd_wf_ds_wf-idv_vuln-u-idv-checklist" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6ba84c68-892a-4165-a0c9-6b041be410ce/Newsletter_Sponsor_Logo.png?t=1761833305"/></a></div><p class="paragraph" style="text-align:left;">Howdy friends!</p><p class="paragraph" style="text-align:left;">Finally home after BSidesSF, RSA, and then all the way to Boston for PAX East. Was a whirlwind but was a lot of fun. Saw a lot of great people. Met a lot of YOU for the first time! Got lots of great feedback, thank you for that.</p><p class="paragraph" style="text-align:left;">This week has been taxing. Here is my quick rant if you haven’t been following.</p><blockquote align="center" class="instagram-media"><a href="https://www.instagram.com/p/DWkVYKDDB4C/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162"><p dir="ltr" lang="en"> Instagram post </p></a></blockquote><hr class="content_break"><h1 class="heading" style="text-align:left;" id="icymi"> ICYMI</h1><p class="paragraph" style="text-align:left;">🖊️ Something I wrote: China has now compromised wiretap infrastructure at nine US telecoms <a class="link" href="https://x.com/mattjay/status/2039523373621915800?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">AND the FBI</a></p><p class="paragraph" style="text-align:left;">🎧️ Something I heard: Exposing the <a class="link" href="https://www.youtube.com/watch?v=vSmKgwh0YeM&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">US Surveillance State</a> ft. Jake Laperruque</p><p class="paragraph" style="text-align:left;">🎤 Something I said: The Real Reason Meta is <a class="link" href="https://www.youtube.com/watch?v=tdHK0kErMmQ&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Killing Encrypted DMs?</a></p><p class="paragraph" style="text-align:left;">🔖 Something I read: Vulnerability Research Is <a class="link" href="https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Cooked</a> by tqbf</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="vulnerable-news">Vulnerable News</h1><h3 class="heading" style="text-align:left;" id="biggest-supply-chain-attacks-in-his">Biggest Supply-Chain Attacks in History, <a class="link" href="https://ramimac.me/teampcp/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Back</a> to <a class="link" href="https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Back</a> to <a class="link" href="https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Back</a> to <a class="link" href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Back</a> to <a class="link" href="https://www.theregister.com/2026/04/02/mercor_supply_chain_attack/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Back</a> to <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Back</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ea7bd12d-8bef-4930-a273-9b1619e7af4b/Screenshot_2026-04-01_at_12.55.00_PM.png?t=1775069868"/></div><p class="paragraph" style="text-align:left;">What the hell is going on in cybersecurity this week? We’ve got the biggest supply chain hacks back to back to back to back, not even all by the same threat actor. We have npm packages, PyPI packages, Axios pushing malware, claude code leaking source code, Cisco leaking source code. This is what happens when you build the internet on top of underfunded open-source software and then attackers figure out how to exploit the trust built into it.</p><p class="paragraph" style="text-align:left;">If you look at the timeline, this starts with Trivy getting popped through GitHub and CI/CD pipeline abuse. Attackers get access to GitHub tokens, they cut malicious releases, and now that malware is getting pushed into environments automatically. From there, it just keeps going: credential harvesting, Docker Hub, npm packages, PyPI packages. LiteLLM becomes a huge jump-off point because it sits in the middle of everything and has access to secrets across multiple environments. At that point, they’re not just stealing data, but are collecting everything they need to keep going.</p><p class="paragraph" style="text-align:left;">Now we’re dealing with the fallout. Checkmarx, LiteLLM, Mercor, Cisco: these are all showing up as downstream effects. Attackers are pulling SSH keys, AWS creds, Kubernetes secrets, TLS certs, anything they can get their hands on. Some of this is already being sold, some of it is getting ransomed, and some of it hasn’t even been used yet.</p><p class="paragraph" style="text-align:left;">And while all of that is happening, you’ve got a completely separate attack against one of the most widely downloaded npm packages, Axios, by North Korea doing the exact same thing.</p><p class="paragraph" style="text-align:left;">Right now, you don’t actually know if you were impacted. Even if you don’t use Axios, something you use probably does. Even if you didn’t touch Trivy, something in your pipeline might have. That’s why this feels so bad. There’s no clean way to scope it. The only move right now is to assume secrets that have touched anything in the GitHub/npm/PyPi ecosystem are compromised and start rotating everything. API keys, tokens, anything tied to GitHub, CI/CD, or environment variables. Attackers are still figuring out what they have, and we’re going to be dealing with this for weeks. (read more <a class="link" href="https://ramimac.me/teampcp/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">here</a>, <a class="link" href="https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">here</a>, <a class="link" href="https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">here</a>, <a class="link" href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">here</a>, <a class="link" href="https://www.theregister.com/2026/04/02/mercor_supply_chain_attack/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">here</a>, and <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">here</a>!)</p><h3 class="heading" style="text-align:left;" id="the-7-features-every-workforce-idv-"><a class="link" href="https://withpersona.com/guides/workforce-idv-checklist?utm_source=vuln-u&utm_medium=paid-email&utm_audience=a&utm_campaign=brnd_wf_ds_wf-idv_vuln-u-idv-checklist" target="_blank" rel="noopener noreferrer nofollow">The 7 features every Workforce IDV solution needs</a>*</h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/bd6e1f54-e383-4398-8f92-79e15be94747/VulnU_Newsletter_Banner_IDV_Checklist.png?t=1775150634"/></div><p class="paragraph" style="text-align:left;">Every unauthorized login is a potential breach. Workforce IDV closes that gap by verifying every login is legitimate before granting access. </p><p class="paragraph" style="text-align:left;">Download the checklist to evaluate solutions against seven must-have features and build stronger defenses against credential-based attacks. (<a class="link" href="https://withpersona.com/guides/workforce-idv-checklist?utm_source=vuln-u&utm_medium=paid-email&utm_audience=a&utm_campaign=brnd_wf_ds_wf-idv_vuln-u-idv-checklist" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>*Sponsored</i></span></p><h3 class="heading" style="text-align:left;" id="claude-codes-full-source-code-leake"><a class="link" href="https://x.com/nyk_builderz/status/2038961764277334118?s=20&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Claude Code&#39;s Full Source Code Leaked Via .map File in Anthropic&#39;s npm Registry</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f867c982-5177-4d80-8510-6bd6da342342/Screenshot_2026-04-01_at_2.24.30_PM.png?t=1775071480"/></div><p class="paragraph" style="text-align:left;">Claude Code source code has been leaked. Not that consequential of a leak, to be honest, but still kind of fun to click around and see all the stuff that&#39;s behind the scenes, like hidden flags and unreleased features and things like that. I haven&#39;t even wrapped my head around how the leak actually happened via a .map file in their npm registry. </p><p class="paragraph" style="text-align:left;">You&#39;re going to read a lot of headlines about this. I think the more interesting part is the lessons learned of how they leaked it. People just treat GitHub like it&#39;s this walled garden special snowflake kind of place. I think what&#39;s happening on Twitter right now is people are feeding the source code leak to Claude to then generate summaries of the things that were leaked in Claude Code, which is a funny, ironic thing. </p><p class="paragraph" style="text-align:left;">A few thoughts there: It’s a good practice to not commit secrets to source code. Claude Code is just the front-end app. We are just talking about a very good terminal app at the end of the day. This isn&#39;t the models. This isn&#39;t a lot of the other stuff. This is just the features and scaffolding around interacting with Claude for the code stuff. (<a class="link" href="https://x.com/nyk_builderz/status/2038961764277334118?s=20&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="how-command-injection-vulnerability"><a class="link" href="https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow"><b>How Command Injection Vulnerability in OpenAI Codex Leads to GitHub Token Compromise</b></a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3a51c584-26f8-4f75-b189-0e6f882df19e/Screenshot_2026-04-01_at_2.35.54_PM.png?t=1775072284"/></div><p class="paragraph" style="text-align:left;">This <a class="link" href="https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">report by Beyond Trust</a> covers a critical command injection vulnerability in the Codex cloud environment, which exposed sensitive GitHub credential data. The vulnerability exists within the task creation HTTP request, which allows an attacker to inject arbitrary commands through the GitHub branch name parameter. This can result in the theft of a victim&#39;s GitHub user access token: the same token that Codex uses to authenticate with GitHub.</p><p class="paragraph" style="text-align:left;">This is not prompt injection. This is much, much, much, much worse. This is a command injection. It&#39;s literally executing commands in shell. So your branch name is a string interpreted in bash. No sanitization, no parameterization. So you open a PR with a branch name on a victim GitHub repo. If you&#39;re using Codex on that GitHub repo, it goes into Codex land, executes that code, and grabs your OAuth token from your GitHub. </p><p class="paragraph" style="text-align:left;">Vulns are back on the menu, boys and girls. (<a class="link" href="https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="railway-incident-authenticated-user"><a class="link" href="https://blog.railway.com/p/incident-report-march-30-2026-accidental-cdn-caching?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Railway Incident: Authenticated User Data Cached</a></h3><p class="paragraph" style="text-align:left;">Railway was super popular a bit ago. It came with your full stack, so you can just deploy all your stuff onto Railway and it would be able to connect to all sorts of other stuff. It&#39;s got a lot of other stuff under the hood and will come with everything you need, the connectors, the databases, and so on. It&#39;s pretty slick. A lot of people run their apps on it.</p><p class="paragraph" style="text-align:left;">Well, <a class="link" href="https://blog.railway.com/p/incident-report-march-30-2026-accidental-cdn-caching?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Railway done f*cked up</a>. They started showing users’ data to other users. According to the Railway blog, they “experienced an incident where CDN features were accidentally enabled for some domains without users enabling them. For those affected, this may have resulted in potentially authenticated data being served to unauthenticated users. A Railway engineer rolled a change causing HTTP GET responses to be incorrectly cached across some small percent of domains. During this window, cache responses may have been served to users other than the original requester.” </p><p class="paragraph" style="text-align:left;">It&#39;s basically giving you other users’ information. Authenticated data is served to unauthenticated users, or to authenticated users, just not you. (<a class="link" href="https://blog.railway.com/p/incident-report-march-30-2026-accidental-cdn-caching?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="threat-informed-defense-that-runs-o"><a class="link" href="https://nebulock.io/blog/vespyr-your-autonomous-hunter?utm_campaign=293159615-2026-apr-vespyr&utm_source=vulnu-162&utm_medium=newsletter&utm_content=vulnu-162" target="_blank" rel="noopener noreferrer nofollow">Threat-Informed Defense That Runs on Intelligence, Not Schedules.</a>*</h3><p class="paragraph" style="text-align:left;">There aren&#39;t enough hours to process every signal or threat intel that comes your way. Vespyr, Nebulock&#39;s autonomous hunting agent, closes the gap between threat intel and actionable detection. It captures intelligence, maps it to your environment, identifies relevant behavioral indicators, and executes the hunt tied to your data, stack, and exposure for contextual security analytics.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://nebulock.io/blog/vespyr-your-autonomous-hunter?utm_campaign=293159615-2026-apr-vespyr&utm_source=vulnu-162&utm_medium=newsletter&utm_content=vulnu-162" target="_blank" rel="noopener noreferrer nofollow">See how Vespyr delivers continuous threat-informed defense.</a></p><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>*Sponsored</i></span></p><h3 class="heading" style="text-align:left;" id="drift-crypto-platform-confirms-280-"><a class="link" href="https://therecord.media/drift-crypto-confirms-280-million-stolen-north-korea?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea</a></h3><p class="paragraph" style="text-align:left;">Drift Protocol just got absolutely rinsed for $280 million in what they&#39;re calling a &quot;highly sophisticated operation&quot; with weeks of preparation. The attackers managed to take over the platform&#39;s security council admin powers through what sounds like some social engineering, then used pre-signed transactions to bypass withdrawal limits. Drift&#39;s trying to save face by saying there weren&#39;t any bugs in their smart contracts - just that someone got tricked into approving malicious transactions.</p><p class="paragraph" style="text-align:left;">Blockchain security firm Elliptic isn&#39;t buying the mystery though, and they&#39;re pointing straight at North Korea. The attack patterns, laundering methods, and network indicators all match previous DPRK operations. If confirmed, this would be North Korea&#39;s 18th crypto heist this year, pushing their 2026 total over $300 million. The tactics apparently mirror last summer&#39;s $1.5 billion Bybit hack. (<a class="link" href="https://therecord.media/drift-crypto-confirms-280-million-stolen-north-korea?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="fbi-declares-suspected-chinese-hack"><a class="link" href="https://www.politico.com/news/2026/04/01/fbi-hack-surveillance-system-major-incident-00854237?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">FBI declares suspected Chinese hack of US surveillance system a ‘major cyber incident’</a></h3><p class="paragraph" style="text-align:left;">The FBI officially declared a suspected Chinese hack of its internal surveillance system a &quot;major cyber incident&quot; under FISMA. That&#39;s a pretty big deal since agencies rarely make that call, and it means the breach likely compromised significant amounts of sensitive data. We&#39;re talking about pen register and trap-and-trace surveillance returns, which is a roadmap of who the FBI is watching and why. The breach happened through a commercial ISP&#39;s vendor infrastructure, and the FBI told Congress the affected system also held PII on investigation subjects.</p><p class="paragraph" style="text-align:left;">This adds another notch to China&#39;s belt alongside Volt Typhoon&#39;s infrastructure burrowing and Salt Typhoon&#39;s telecom rampage that stole Trump&#39;s call records. It&#39;s separate from the Iranian hack of FBI Director Patel&#39;s personal emails, so the bureau&#39;s getting hit from multiple angles. As one official put it, it&#39;s &quot;embarrassing&quot; for the FBI to get breached by the same hackers they&#39;re supposed to be tracking. (<a class="link" href="https://www.politico.com/news/2026/04/01/fbi-hack-surveillance-system-major-incident-00854237?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="new-mac-os-security-feature-will-al"><a class="link" href="https://www.malwarebytes.com/blog/news/2026/03/new-macos-security-feature-will-alert-users-about-possible-clickfix-attacks?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">New macOS security feature will alert users about possible ClickFix attacks</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/df839d58-0704-4109-ae6a-785917bb8d70/image.png?t=1775167485"/></div><p class="paragraph" style="text-align:left;">Apple quietly rolled out another layer of ClickFix protection in macOS Tahoe that&#39;s way more sophisticated than what we saw before. This one runs inside XProtect and actually analyzes what you&#39;re pasting, not just the behavior. When it spots something nasty, you get a hard &quot;Malware Detected, Paste Blocked&quot; message with zero override options - no &quot;paste anyway&quot; button this time. (Great thread on this <a class="link" href="https://x.com/malwarezoo/status/2038662038046572630?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">here</a>)</p><p class="paragraph" style="text-align:left;">It uses the Endpoint Security framework to intercept pastes before they hit terminal apps, extracts URLs and IPs from the text, then checks them against Safari&#39;s Safe Browsing Service in real time. It only triggers if the content originally came from a browser (Apple maintains a list of 23 browser signing IDs). It monitors command execution afterward, so if someone tries to obfuscate a malicious domain to slip past the content scanner, XProtect will catch it when the command actually runs and kill the process. Honestly stoked to get more tools against ClickFix which has been WILDLY successful as a technique. (<a class="link" href="https://www.malwarebytes.com/blog/news/2026/03/new-macos-security-feature-will-alert-users-about-possible-clickfix-attacks?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="apple-expands-i-os-18-updates-to-mo"><a class="link" href="https://www.bleepingcomputer.com/news/security/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Apple expands iOS 18 updates to more iPhones to block DarkSword attacks</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/eab23eef-5507-4237-99c5-bcdb6d7174c3/image.png?t=1775168372"/></div><p class="paragraph" style="text-align:left;">Apple just pulled a rare move by expanding iOS 18.7.7 security updates to way more devices after the DarkSword exploit kit started making rounds. DarkSword targets iPhones running iOS 18.4 through 18.7 using six different vulnerabilities and deploys some aggressive malware like GhostBlade, GhostKnife, and GhostSaber. Apple had basically abandoned iOS 18 updates for newer devices that could run iOS 26, leaving users who chose to stay on the older OS vulnerable.</p><p class="paragraph" style="text-align:left;">Some researcher decided to dump the entire DarkSword exploit kit on GitHub last month, basically handing it to anyone who wanted to target older iPhones. Now Apple&#39;s doing damage control by making the security patch available to everything from iPhone XR all the way up to iPhone 16 models. Keep your phones up to date!! (<a class="link" href="https://www.bleepingcomputer.com/news/security/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="google-fixes-fourth-chrome-zeroday-"><a class="link" href="https://www.bleepingcomputer.com/news/security/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">Google fixes fourth Chrome zero-day exploited in attacks in 2026</a></h3><p class="paragraph" style="text-align:left;">Another Chrome zero-day that&#39;s been getting exploited in the wild - CVE-2026-5281, fourth one Google has had to emergency-patch this year. This one&#39;s a use-after-free bug in Dawn, which is Chrome&#39;s WebGPU implementation. Attackers can leverage it to crash browsers, corrupt data, or cause other nasty side effects. The fix is rolling out now in Chrome 146.0.7680.178 for desktop users across Windows, macOS, and Linux.</p><p class="paragraph" style="text-align:left;">Google&#39;s already dealt with three other zero-days since the start of the year, including bugs in CSS font handling, the Skia graphics library, and V8 JavaScript engine. Last year they had to patch eight zero-days total, many discovered by their own Threat Analysis Group. As usual, Google&#39;s keeping the exploit details under wraps until most users get patched up. If I get on a Zoom with you and your browser is waiting on an update, I will call you out! (<a class="link" href="https://www.bleepingcomputer.com/news/security/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-162" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="miscellaneous-mattjay">Miscellaneous mattjay</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7a9d8c68-98c3-4140-8fbc-c883c4425724/Screenshot_2026-04-02_at_4.25.37_PM.png?t=1775165143"/></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="parting-thoughts">Parting Thoughts:</h2><p class="paragraph" style="text-align:start;">Community was foundational in launching and propelling my career. Community is the only reason I can stand being in Texas during the summer months. <i>Community</i> is the point. Today, I invite you to embrace discomfort on the road to a more vulnerable you. </p><p class="paragraph" style="text-align:start;">Stay safe, Matt Johansen<br>@mattjay</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🎓️ Vulnerable U | #161</title>
  <description>Trivy and LiteLLM nightmare from TeamPCP hacking GitHub workflows, Hong Kong privacy issues, FCC bans foreign routers, and much more!</description>
  <link>https://www.vulnu.com/p/vulnerable-u-161</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/vulnerable-u-161</guid>
  <pubDate>Fri, 27 Mar 2026 12:36:00 +0000</pubDate>
  <atom:published>2026-03-27T12:36:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-family:Courier, Lucida Typewriter, monospace;"><i><b>Read Time: </b></i></span><span style="font-family:Courier, Lucida Typewriter, monospace;"><i>9 minutes</i></span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e7cfff6f-9ae4-4bd3-9b5e-9feebef079a2/Newsletter_Header.png?t=1774382341"/></div><p class="paragraph" style="text-align:center;">Brought to you by:</p><div class="image"><a class="image__link" href="https://hubs.ly/Q047NpxD0?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/12ed9708-330d-435e-8436-ffb37310da39/Newsletter_Sponsor_Logo.png?t=1774382271"/></a></div><p class="paragraph" style="text-align:left;">Howdy friends!</p><p class="paragraph" style="text-align:left;">Writing you from Boston where I’m out here to speak at PAX East. Gave a talk about security in the gaming industry back in the fall at PAX West and it was a packed house so the organizers had us come do the repeat on the other coast. The only bummer here is that it was back to back with RSA so I’ve been on the road already since last Saturday for BSidesSF.</p><p class="paragraph" style="text-align:left;">Had a great week out there. Brought some of the VulnU team with me and for one of them it was their first security con. He said he’d never seen a con where the attendees so gladly talked to everyone at the booths and that the booths didn’t need to resort to tricks to get people to come in. (BSidesSF. Not RSA, RSA was a full circus) - And I agree, most BSidesSF booths were staffed by the founders and lots of them were founders who were recently practitioners.</p><p class="paragraph" style="text-align:left;">Of course, the best parts of the week were all the side events. Decibel Oasis was STACKED with some really fantastic people and content. Eric, the CISO of Writer held a small AI meetup where Jason Haddix and Daniel Miessler talked the future of AI in Offensive security. Axios and Varonis (coincidentally the sponsor of today’s newsletter) had an awesome event where they interviewed an FBI agent on Iran.</p><p class="paragraph" style="text-align:left;">Thanks to all of you who took the time to pull me aside and tell me how much my content means to you. It really keeps me going. I heard from CISOs to SOC engineers to sales folks that watched/read what I do every week. Means the world, thank you.</p><p class="paragraph" style="text-align:left;">And of course just the absolute family reunion it is all week of people I’ve been seeing out there since ~2009. Cheers to friends/family new and old. You make this industry worth being in.</p><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cb463f11-a9fb-42b5-8f91-a15a7b095023/87C8FC68-088B-4354-9412-F4260FBEB072_4_5005_c.jpeg?t=1774590086"/></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2f8aee1e-2b84-44b7-ac5e-9ac636d2d6d3/0692BA37-C475-4A7E-A382-37FAD756003B_4_5005_c.jpeg?t=1774590205"/></div></td></tr></table><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf372e52-fd39-4acb-ae93-08aea71a1e48/71AF4EBD-9593-4DE3-A517-47A461FD2B4F_4_5005_c.jpeg?t=1774590144"/></div></td><td width="50%" class="bh__column"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/60ea3339-c05f-47a3-9455-40b97581caee/3C68C3D6-1793-42B4-A68D-28EC212184F7_4_5005_c.jpeg?t=1774590187"/></div></td></tr></table><hr class="content_break"><h1 class="heading" style="text-align:left;" id="icymi"> ICYMI</h1><p class="paragraph" style="text-align:left;">🖊️ Something I wrote: The <a class="link" href="https://x.com/mattjay/status/2037218547085304118?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">war on privacy</a> continues. And a <a class="link" href="https://x.com/mattjay/status/2037240861722026461?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">double header</a>.</p><p class="paragraph" style="text-align:left;">🎧️ Something I heard: Two good videos on the LiteLLM hack. <a class="link" href="https://www.youtube.com/watch?v=i9o4aWxAnLk&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Solst</a> and <a class="link" href="https://www.youtube.com/watch?v=uwSjgv4otAk&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">LowLevel</a></p><p class="paragraph" style="text-align:left;">🎤 Something I said: AI is <a class="link" href="https://www.youtube.com/watch?v=E00kqDhZ4wo&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">infesting our browsers</a> (not just the AI ones like Comet)</p><p class="paragraph" style="text-align:left;">🔖 Something I read: This <a class="link" href="https://x.com/kotekjedi_ml/status/2037194202648633382?s=20&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">paper</a> on Claude Code deployed in an autoresearch loop to discover novel jailbreaking algorithms</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="vulnerable-news">Vulnerable News</h1><h3 class="heading" style="text-align:left;" id="lite-llm-hacked-and-stealing-valuab"><a class="link" href="https://x.com/IceSolst/status/2036506834228465832?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">LiteLLM Hacked and Stealing Valuable Creds: Urgent to Remove Now</a></h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/AZzFSVlsNpU" width="100%"></iframe><p class="paragraph" style="text-align:left;">If you use LiteLLM, check your version right now. Run <code>pip show litellm</code> - if you&#39;re on 1.82.7 or 1.82.8, assume everything on that machine is compromised and rotate every credential that environment could touch. On March 24th, two malicious versions were published to PyPI containing a multi-stage credential stealer that harvested SSH keys, cloud provider creds, Kubernetes configs, API keys, and shell history.</p><p class="paragraph" style="text-align:left;">The packages were up for about three hours, but with 3.4 million daily downloads, that&#39;s a lot of exposure. LiteLLM has engaged Mandiant for forensics and paused all new releases. (<a class="link" href="https://docs.litellm.ai/blog/security-update-march-2026?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">LiteLLM&#39;s security advisory</a>)</p><p class="paragraph" style="text-align:left;">LiteLLM got popped because their CI/CD pipeline was doing the right thing - running Trivy, Aqua Security&#39;s vulnerability scanner, as a security gate. But Trivy itself had already been compromised. A threat group called <b>TeamPCP</b> used credentials from a prior Aqua Security breach to force-push malicious code to 76 of 77 release tags in trivy-action on GitHub.</p><p class="paragraph" style="text-align:left;">When LiteLLM&#39;s pipeline ran Trivy, the compromised action stole the maintainer&#39;s PyPI token right out of the GitHub Actions runner. From there, the attackers published the backdoored packages using legitimate credentials, passing all integrity checks. The GitHub issue reporting the compromise was closed as &quot;not planned&quot; and flooded with bot comments, suggesting the maintainer&#39;s account may have still been under attacker control.</p><p class="paragraph" style="text-align:left;">Beyond the Trivy to LiteLLM chain, they hit Checkmarx&#39;s KICS GitHub Action, spread to npm, Docker Hub, and VS Code extensions, defaced Aqua Security&#39;s entire internal GitHub org, deployed a wiper targeting Iranian systems, and appear to have partnered with Lapsus$ to monetize roughly 300GB of stolen credentials.</p><p class="paragraph" style="text-align:left;">They&#39;re running their C2 on blockchain-based infrastructure that&#39;s essentially takedown-proof. This is probably the biggest supply chain incident of the year so far. (<a class="link" href="https://x.com/IceSolst/status/2036506834228465832?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>, Krebs <a class="link" href="https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">here</a>, Wiz <a class="link" href="https://www.wiz.io/blog/teampcp-attack-kics-github-action?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">here</a>, Aikido <a class="link" href="https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">here</a>, Socket summary <a class="link" href="https://socket.dev/blog/teampcp-targeting-security-tools-across-oss-ecosystem?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">here</a>, and Socket talking about how they’re teaming up with ransomware groups <a class="link" href="https://socket.dev/blog/teampcp-partners-with-vect-targeting-oss-supply-chains?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">here</a>, )</p><h3 class="heading" style="text-align:left;" id="ai-security-is-really-a-data-proble"><a class="link" href="https://hubs.ly/Q047NpxD0?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">AI Security Is Really a Data Problem (And Most Teams Can’t See It)</a>*</h3><p class="paragraph" style="text-align:left;">AI agents, copilots, and embedded LLMs are already operating across enterprise environments faster than security teams can track them. The bigger risk isn’t just bad prompts or jailbreaks. It’s that most organizations don’t know which AI systems exist, what data they can access, or how they behave in production. </p><p class="paragraph" style="text-align:left;">This deep dive from Varonis breaks down why AI security starts with data visibility, how shadow AI emerges, and how to secure AI across its full lifecycle. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://hubs.ly/Q047NpxD0?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Get the full breakdown</a>.</p><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>*Sponsored</i></span></p><h3 class="heading" style="text-align:left;" id="using-a-vpn-may-subject-you-to-nsa-"><a class="link" href="#using-a-vpn-may-subject-you-to-nsa-" rel="noopener noreferrer nofollow">Using a VPN May Subject You to NSA Spying</a></h3><blockquote align="center" class="instagram-media"><a href="https://www.instagram.com/p/DWXK-KRjwsZ/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161"><p dir="ltr" lang="en"> Instagram post </p></a></blockquote><p class="paragraph" style="text-align:left;">Like I needed more beef with VPN providers. Apparently, they might open you up to warrantless surveillance. Tulsi Gabbard got a letter<span style="font-size:0.875rem;"> </span>from some top intelligence officials asking the question, “Hey, you know how we do that whole<span style="font-size:0.875rem;"> </span>warrantless government spying thing against non-US citizens? How about people using a VPN?<span style="font-size:0.875rem;">” </span>VPNs commingle a bunch of traffic into a single server, so maybe we can&#39;t tell the US citizens<span style="font-size:0.875rem;"> </span>from the foreigners, which could open US citizens up to the US government&#39;s secretly<span style="font-size:0.875rem;"> </span>compelling service providers for warrantless search and seizure of their comms. </p><p class="paragraph" style="text-align:left;">The question<span style="font-size:0.875rem;"> </span>comes up after some declassified intelligence community guidelines that say a person whose<span style="font-size:0.875rem;"> </span>location is unknown is presumed to be a non-US citizen unless there&#39;s specific<span style="font-size:0.875rem;"> </span>information to the contrary. Well, guess what VPNs are designed to do? Make your location<span style="font-size:0.875rem;"> </span>unknown. That&#39;s by design.</p><p class="paragraph" style="text-align:left;">We have no evidence that this is happening, but this letter is asking Gabbard to publicly clarify what impact, if any, VPNs have on Americans&#39; privacy.<span style="font-size:0.875rem;"> </span>People pay money to VPN providers to be more private, not less. I hate a lot of VPN providers<span style="font-size:0.875rem;"> </span>for a myriad of reasons, including how their marketing is about protecting you from hackers,<span style="font-size:0.875rem;"> </span>even though HTTPS exists. Don&#39;t get me started. That’s a whole other rant. (<a class="link" href="https://www.wired.com/story/using-a-vpn-may-subject-you-to-nsa-spying/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="the-war-on-privacy-and-information-"><a class="link" href="https://hk.usconsulate.gov/security-alert-2026032601/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">The War On Privacy and Information Security Continues</a></h3><blockquote align="center" class="instagram-media"><a href="https://www.instagram.com/p/DWXMf_6knFl/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161"><p dir="ltr" lang="en"> Instagram post </p></a></blockquote><p class="paragraph" style="text-align:left;">This is what&#39;s coming everywhere: Hong Kong just made it an illegal, criminal offense to not give<span style="font-size:0.875rem;"> </span>the police your passwords or whatever decryption assistance to access all personal electronic<span style="font-size:0.875rem;"> </span>devices, including cell phones and laptops. This legal change includes U.S. citizens in Hong Kong<span style="font-size:0.875rem;"> </span>arriving and transiting through the airport. Hong Kong International Airport<span style="font-size:0.875rem;"> </span>has authority to take and keep any personal devices that they claim are linked to national<span style="font-size:0.875rem;"> </span>security defenses, which is whatever the hell they want it to be. </p><p class="paragraph" style="text-align:left;">I&#39;m not pointing this<span style="font-size:0.875rem;"> </span>out to say this is a Hong Kong thing, even though it is, and you should all know about<span style="font-size:0.875rem;"> </span>it. This is about the war on encryption and the war on privacy and the war on VPNs and the age<span style="font-size:0.875rem;"> </span>verification trend and everything about de-anonymizing you and giving power of your<span style="font-size:0.875rem;"> </span>information, your privacy, and your information security over to the government. (<a class="link" href="https://hk.usconsulate.gov/security-alert-2026032601/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">see more</a>)</p><h3 class="heading" style="text-align:left;" id="russialinked-malware-operation-coll"><a class="link" href="https://therecord.media/russia-malware-arrest-clayrat?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Russia-linked malware operation collapses after security failures, developer’s arrest</a></h3><p class="paragraph" style="text-align:left;">ClayRat, a Russian Android spyware operation that launched in October, has already face-planted spectacularly by December. The malware had some decent capabilities - intercepting SMS, call logs, taking photos, screen recording, the usual RAT stuff - and was pulling in subscribers at $90/week or $300/month through Telegram channels. But the developer made every rookie mistake in the book: plaintext passwords, weak obfuscation, obvious command names, and openly advertising.</p><p class="paragraph" style="text-align:left;">The whole thing unraveled when authorities arrested the suspected developer, a student in Krasnodar, and all the C2 servers went dark. Solar (the Russian security firm that tracked this) noted that ClayRat followed the same trajectory as other amateur malware operations like the Gorilla banking trojan - brief spike in activity, then operational security failures lead to a quick collapse. It&#39;s almost impressive how quickly someone can build a 600+ sample malware operation and then torpedo it through basic security mistakes. (<a class="link" href="https://therecord.media/russia-malware-arrest-clayrat?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="fcc-bans-import-of-new-consumer-rou"><a class="link" href="https://techcrunch.com/2026/03/24/fcc-bans-import-of-new-consumer-routers-made-overseas-citing-security-risks/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">FCC bans import of new consumer routers made overseas, citing security risks</a></h3><p class="paragraph" style="text-align:left;">The FCC just banned importing new consumer routers made overseas, pointing fingers at Chinese hacking groups like Salt Typhoon and Flax Typhoon as the reason. China apparently controls about 60% of the consumer router market, so this is going to shake things up. Existing routers are fine, but new foreign-made ones need approval from DoD or DHS to get through customs.</p><p class="paragraph" style="text-align:left;">The FCC didn&#39;t actually provide evidence that US-made routers are more secure. In fact, Salt Typhoon has been busy exploiting Cisco routers (American-made), and Flax Typhoon targeted both US and foreign devices in their massive botnet operation. The whole thing feels a bit ironic when you consider that FCC Chairman Carr, who&#39;s pushing this ban, also voted to scrap cybersecurity rules for telecom operators just a few months ago. (<a class="link" href="https://techcrunch.com/2026/03/24/fcc-bans-import-of-new-consumer-routers-made-overseas-citing-security-risks/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="dark-swords-git-hub-leak-threatens-"><a class="link" href="https://cyberscoop.com/darksword-iphone-spyware-leak-ios-18-exploit-threat/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">DarkSword’s GitHub leak threatens to turn elite iPhone hacking into a tool for the masses</a></h3><p class="paragraph" style="text-align:left;">Remember when iPhone exploits were basically only hackable by nation-states? Those days might be over. We’ve covered DarkSword but latest update! The source code for it just leaked on GitHub, and security folks are properly freaking out about it. This thing can target hundreds of millions of iPhones, and now instead of being limited to fancy government hackers, it&#39;s potentially available to anyone who can navigate GitHub.</p><p class="paragraph" style="text-align:left;">This comes right after researchers discovered DarkSword and another similar kit called Coruna being used in the wild. About 25% of iPhones are still running vulnerable iOS versions, partly because users are apparently not thrilled with iOS 26&#39;s AI features. Apple&#39;s pushed some patches and keeps pushing Lockdown Mode, which seems to be holding up well against these exploits. But the broader trend here is concerning - we&#39;re seeing iPhone exploit development scale up from boutique nation-state operations to something approaching mass market availability. Is this iOS’s WannaCry moment?(<a class="link" href="https://cyberscoop.com/darksword-iphone-spyware-leak-ios-18-exploit-threat/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="bp-fdoor-in-telecom-networks-sleepe"><a class="link" href="https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">BPFdoor in Telecom Networks: Sleeper Cells in the Backbone</a></h3><p class="paragraph" style="text-align:left;">A months-long investigation by Rapid7 Labs found Chinese state hackers (Red Menshen) planting BPFdoor backdoors deep inside telecom networks worldwide. It operates at the Linux kernel level using Berkeley Packet Filters (BPF), so it never actually opens listening ports. Instead, it passively monitors network traffic and only activates when it receives specially crafted &quot;magic packets.&quot;</p><p class="paragraph" style="text-align:left;">The malware even masquerades as legitimate services like HP ProLiant server management and Docker processes to blend into telecom infrastructure. Since these networks carry government communications and can enable population-level surveillance through protocols like SCTP (used in 4G/5G signaling), we&#39;re talking about national security implications. Rapid7&#39;s released detection tools, but this represents a troubling shift toward deeper, kernel-level persistence that traditional security tools struggle to catch. a la BRICKSTORM if you’ve seen my coverage on that. (<a class="link" href="https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="claude-extension-flaw-enabled-zero-"><a class="link" href="https://www.koi.ai/blog/shadowprompt-how-any-website-could-have-hijacked-anthropic-claude-chrome-extension?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website</a></h3><p class="paragraph" style="text-align:left;">Whats a vuln without a name. &quot;ShadowPrompt&quot; can let any website hijack Claude&#39;s Chrome extension and send it malicious prompts. The attack chained two flaws: Claude&#39;s extension trusted any *.claude[.]ai subdomain, and there was a DOM-based XSS in an old Arkose Labs CAPTCHA component running on a-cdn[.]claude[.]ai. Put them together, and an attacker could silently inject prompts into Claude&#39;s sidebar from any website using an invisible iframe - no clicks, no permissions.</p><p class="paragraph" style="text-align:left;">The demo shows it stealing Google account tokens, reading your Drive, exporting chat history, the works. With 3 million users, that&#39;s a lot of potential victims. The good news is both Anthropic and Arkose Labs moved fast on fixes once disclosed. Anthropic locked down the origin checking to only allow exactly https://claude[.]ai, and Arkose patched their XSS. If you&#39;re using the Claude extension, make sure you&#39;re on version 1.0.41 or higher. (<a class="link" href="https://www.koi.ai/blog/shadowprompt-how-any-website-could-have-hijacked-anthropic-claude-chrome-extension?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="business-tik-tok-accounts-targeted-"><a class="link" href="https://pushsecurity.com/blog/tiktok-phishing?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Business TikTok accounts targeted with AITM phishing kits</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/27a69a95-3f08-4c1b-af9c-8173e6bc94a7/image.png?t=1774587590"/></div><p class="paragraph" style="text-align:left;">Push Security spotted a fresh phishing campaign going after TikTok for Business accounts using some slick AITM (Adversary-in-the-Middle) phishing kits. The attackers registered a bunch of domains on March 24th within a 9-second window, all following the &quot;welcome[.]careers*[.]com&quot; naming pattern. Victims get tricked into clicking malicious links that lead to either fake TikTok Business pages or Google &quot;Schedule a Call&quot; clones, ultimately serving up credential-stealing login pages behind Cloudflare bot protection.</p><p class="paragraph" style="text-align:left;">At first glance, targeting TikTok seems weird compared to the usual Google/Microsoft focus, but it actually makes sense. TikTok&#39;s become a playground for malware distribution (remember those AI-generated CapCut &quot;activation&quot; videos that hit 500k views?) and crypto scams. Plus, most business users log into TikTok with their Google accounts anyway, so attackers get a two-for-one deal - compromised TikTok access plus all those juicy Google Workspace goodies. It&#39;s the same playbook we&#39;ve seen with Google Ad Manager takeovers. (<a class="link" href="https://pushsecurity.com/blog/tiktok-phishing?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="convicted-spyware-chief-hints-that-"><a class="link" href="https://techcrunch.com/2026/03/25/convicted-spyware-chief-hints-that-greeces-government-was-behind-dozens-of-phone-hacks/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Convicted spyware chief hints that Greece’s government was behind dozens of phone hacks</a></h3><p class="paragraph" style="text-align:left;">The Intellexa spyware saga just got spicier. Tal Dilian, the founder behind the Predator spyware that&#39;s been causing headaches globally, got slapped with an 8-year sentence by a Greek court for his role in the &quot;Greek Watergate&quot; scandal. But instead of quietly heading to appeals court, he&#39;s dropping some not-so-subtle hints that the Greek government was pulling the strings all along. Dozens of phones belonging to government ministers, journalists, and opposition leaders got hacked using his tool, and now he&#39;s saying he won&#39;t be the &quot;scapegoat.&quot;</p><p class="paragraph" style="text-align:left;">Several senior Greek officials resigned when the whole mess came to light, but mysteriously none of them got convicted. Dilian&#39;s basically calling it a cover-up and says he&#39;s got evidence to share with regulators. The guy&#39;s already been sanctioned by the US after Predator was caught targeting American officials and journalists, so his credibility might be questionable. But if he&#39;s got receipts showing government authorization for these hacks, this could get real messy for the Mitsotakis administration. (<a class="link" href="https://techcrunch.com/2026/03/25/convicted-spyware-chief-hints-that-greeces-government-was-behind-dozens-of-phone-hacks/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="stryker-says-malware-was-involved-i"><a class="link" href="https://therecord.media/stryker-cyberattack-malware-iran?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Stryker says malware was involved in recent cyberattack as production lines reopen</a></h3><p class="paragraph" style="text-align:left;">Medical device giant Stryker is finally getting back on their feet after Iranian hackers absolutely demolished over 200,000 of their devices two weeks ago. The attackers weaponized Microsoft Intune&#39;s own device wipe feature - turning the company&#39;s management tools against them. The impact here was pretty insane. Hospitals in Maryland had to fall back to radios for communication, some surgeries got cancelled due to missing implants, and Stryker employees stationed at hospitals couldn&#39;t do their jobs.</p><p class="paragraph" style="text-align:left;">Stryker initially insisted no malware was involved in the attack, but they quietly walked that back in Monday&#39;s update. Turns out the hackers did use malicious files to hide their tracks while lurking in the systems. Palo Alto&#39;s Unit 42 team has given them the all-clear that the bad guys are gone. (<a class="link" href="https://therecord.media/stryker-cyberattack-malware-iran?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="hacker-walks-away-with-245-million-"><a class="link" href="https://therecord.media/hacker-breaches-resolv-defi-25-million?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">Hacker walks away with $24.5 million after breaching Resolv DeFi platform</a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/59f7f50f-da63-413d-9db7-6d9c207b3d63/Screenshot_2026-03-27_at_12.54.14_AM.png?t=1774590862"/></div><p class="paragraph" style="text-align:left;">Resolv got absolutely rinsed for $24.5 million. Someone snagged a private key that controlled their USR stablecoin minting process and went wild, creating $80 million worth of unbacked tokens before dumping them for real ETH. The fake coins sent USR from its $1 peg straight down to 26 cents, which is not a good look for a stablecoin.</p><p class="paragraph" style="text-align:left;">What&#39;s brutal here is that Resolv had done everything &quot;right&quot; - 18 security audits, all the usual precautions. But as Chainalysis pointed out, they got too comfortable trusting off-chain infrastructure. The minting system had no hard limits once that private key was compromised, so the attacker could basically print money until someone noticed. Resolv&#39;s trying the &quot;please give us back 90% and we&#39;ll let you keep 10%&quot; negotiation, but we’ll see if that works. (<a class="link" href="https://therecord.media/hacker-breaches-resolv-defi-25-million?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-161" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="miscellaneous-mattjay">Miscellaneous mattjay</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8a667971-eb8c-495b-8a26-1e9666a8ddb5/Screenshot_2026-03-27_at_12.06.45_AM.png?t=1774588011"/></div><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0b865dac-9ee4-4497-bca4-54ec9e32df44/Screenshot_2026-03-27_at_2.32.21_AM.png?t=1774593155"/></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="parting-thoughts">Parting Thoughts:</h2><p class="paragraph" style="text-align:start;">Community was foundational in launching and propelling my career. Community is the only reason I can stand being in Texas during the summer months. <i>Community</i> is the point. Today, I invite you to embrace discomfort on the road to a more vulnerable you. </p><p class="paragraph" style="text-align:start;">Stay safe, Matt Johansen<br>@mattjay</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Teens Sue Musk&#39;s xAI Over Grok&#39;s Pornographic Images of Them</title>
  <description>Teens sue Musk&#39;s xAI after Grok AI generated non-consensual explicit images of minors. Federal lawsuit highlights critical AI safety and child protection failures.</description>
      <enclosure url="https://images.unsplash.com/photo-1717143587138-2532a35ce9b2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHwxfHxHcm9rfGVufDB8fHx8MTc3Mzc3ODcyNXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/teens-sue-musk-s-xai-over-grok-s-pornographic-images-of-them</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/teens-sue-musk-s-xai-over-grok-s-pornographic-images-of-them</guid>
  <pubDate>Tue, 24 Mar 2026 14:47:00 +0000</pubDate>
  <atom:published>2026-03-24T14:47:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Ai]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/z4K0Y_3Fpkc?si=4QpG8ObRvLRTektd&start=2488" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;">It was a pretty awful few days on the internet when Grok, X’s AI tool, went off the rails by generating non-consensual explicit images of people, including minors. </p><p class="paragraph" style="text-align:left;">For several weeks, this AI was churning out horrifying content without consent, causing real harm to victims. Just recently, a lawsuit was filed in federal California court by three young women whose images and videos were altered by a Grok user to depict them nude or in overtly sexual ways. </p><p class="paragraph" style="text-align:left;">Good. Make them stand up and defend this.</p><p class="paragraph" style="text-align:left;">What struck me most was the scale and severity of the abuse. Some of the victims were under 18, which is absolutely insane and deeply troubling. I saw vile stuff circulating on social media and private chat servers, some of it involving children, and it was clear that this needed to be “nuked from orbit.” </p><p class="paragraph" style="text-align:left;">How do you sit holding the power to turn this off, watch CSAM being generated at SCALE on your platform, and just sit idly by for weeks?</p><p class="paragraph" style="text-align:left;">The fact that such content was generated and shared so prolifically left me baffled and sickened. What’s worse is that the platform’s initial defense was basically, “Well, users requested the images to be generated. It didn’t do it by itself.” That’s a cop-out that shirks responsibility and ignores the ethical implications of putting such a powerful tool in the hands of the public without robust controls.</p><h2 class="heading" style="text-align:left;" id="accountability-ethics-and-the-futur"><b>Accountability, Ethics, and the Future of AI Content Moderation</b></h2><p class="paragraph" style="text-align:left;">The Grok episode highlights the urgent need for accountability in AI development and deployment. It’s not enough to say, “The technology is neutral; it’s the users who misuse it.” When your platform is generating literal child sexual abuse material and you allow it to continue after realizing the problem, that’s negligence at best and complicity at worst. I can’t wrap my head around how anyone entrusted with the keys to such a tool could sit back and watch this happen. The failure to act immediately to stop the generation and spread of this content is a disgusting lapse.</p><p class="paragraph" style="text-align:left;">This lawsuit is a step toward holding those responsible to account, and I’m glad the victims are finally seeing some legal recourse. </p><p class="paragraph" style="text-align:left;">AI companies need to build in guardrails before release, continuously monitor for misuse, and be ready to pull the plug when things go wrong. The technology’s potential for harm is just as real as its potential for good. Ignoring that is dangerous.</p><h2 class="heading" style="text-align:left;" id="what-this-means-for-all-of-us"><b>What This Means for All of Us</b></h2><p class="paragraph" style="text-align:left;">AI isn’t magic; it’s a tool shaped by the intentions and ethics of the people behind it. We need transparency from companies about how their AI works, what safeguards are in place, and how abuses will be handled. And as users, we need to demand better protections and hold companies accountable when they fail us.</p><p class="paragraph" style="text-align:left;">Lawsuits and reactive measures are necessary, but they shouldn’t be the only tools. We need frameworks that enforce ethical AI development and penalize negligence. We also need to educate users and organizations about the risks of emerging technologies and how to protect themselves.</p><p class="paragraph" style="text-align:left;">I’ll continue to track this story and others like it closely. The intersection of AI, privacy, and security is one of the defining challenges of our time. It’s up to all of us to ensure that technology serves humanity without compromising our fundamental rights. </p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Your AI’s Memory is Being Poisoned</title>
  <description>Discover AI recommendation poisoning: a new threat exploiting chatbot memory through malicious URLs. Learn how attacks target ChatGPT, Claude, and Perplexity.</description>
      <enclosure url="https://images.unsplash.com/photo-1677442135703-1787eea5ce01?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHwxfHxBcnRpZmljYWwlMjBJbnRlbGxpZ2VuY2V8ZW58MHx8fHwxNzczODU3MjE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/your-ai-s-memory-is-being-poisoned</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/your-ai-s-memory-is-being-poisoned</guid>
  <pubDate>Mon, 23 Mar 2026 14:34:00 +0000</pubDate>
  <atom:published>2026-03-23T14:34:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Ai]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"></p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/eLIPe6E46L4" width="100%"></iframe><p class="paragraph" style="text-align:left;">A newly identified threat called “AI recommendation poisoning” - that honestly I didn’t take seriously at first glance, but upon digging and seeing real examples, I can see being a thing we need to understand and worry about. Unlike conventional hacks, this attack manipulates the memory of AI chatbots by embedding malicious prompts within URLs that users inadvertently activate. </p><p class="paragraph" style="text-align:left;">This method leverages popular AI tools with memory features, such as ChatGPT, Perplexity, or Claude, which remember user preferences and interactions to provide personalized assistance.</p><h3 class="heading" style="text-align:left;" id="how-the-attack-works"><b>How the Attack Works</b></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e729f943-3a79-4d8d-ba5e-85b430db8636/image.png?t=1773970174"/></div><p class="paragraph" style="text-align:left;">The attack typically manifests through “Summarize with AI” buttons found on various websites. These buttons are designed to let users quickly generate AI-based summaries of articles or content. However, attackers embed additional instructions within the URL query strings tied to these buttons. When clicked, the AI tool receives not only the summary request but also “memory-altering” commands that instruct it to remember certain biased or false information.</p><p class="paragraph" style="text-align:left;">Because major AI vendors allow prompt parameters in a GET request query string, a single URL can pre-populate an AI prompt within an authenticated session. This means if a user is logged into their AI account, the AI will incorporate the attacker’s injected instructions into its memory, influencing future interactions. For example, the AI might be told to prioritize a specific blog or product as a trusted recommendation, skewing responses on related topics.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c569f0d4-c26d-40de-ac09-e95e6d9b6770/image.png?t=1773970196"/></div><h3 class="heading" style="text-align:left;" id="real-world-examples-and-risks"><b>Real-World Examples and Risks</b></h3><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=your-ai-s-memory-is-being-poisoned" target="_blank" rel="noopener noreferrer nofollow">Microsoft’s threat intelligence</a> team has documented over 50 distinct cases of such poisoning in just two months. Examples include:</p><ul><li><p class="paragraph" style="text-align:left;">Labeling specific blogs as the “go-to” source for productivity or financial advice.</p></li><li><p class="paragraph" style="text-align:left;">Promoting certain cryptocurrencies or financial products.</p></li><li><p class="paragraph" style="text-align:left;">Endorsing particular education or event-planning services.</p></li><li><p class="paragraph" style="text-align:left;">Influencing security recommendations by falsely attributing authority to certain vendors.</p></li></ul><p class="paragraph" style="text-align:left;">These manipulations can mislead users in areas ranging from finance to health and security. A small business owner might receive biased advice to invest in dubious cryptocurrencies or parents might encounter downplayed safety warnings in kids’ gaming platforms manipulated via these attacks.</p><h3 class="heading" style="text-align:left;" id="seo-poisoning-meets-ai"><b>SEO Poisoning Meets AI</b></h3><p class="paragraph" style="text-align:left;">This attack is an evolution of traditional SEO poisoning, where malicious actors optimize content to appear at the top of search results. Now, they aim to influence not just what users find online but what the AI tools users trust remember and recommend. This “generative optimization” or “AEO” (AI Engine Optimization) means attackers gain influence inside the AI’s personalized memory, potentially amplifying misinformation.</p><p class="paragraph" style="text-align:left;">Some attackers use malvertising campaigns with saved AI prompts that encourage users to run harmful command-line instructions, infecting devices with malware. These tactics exploit user trust in popular AI platforms and their memory capabilities.</p><p class="paragraph" style="text-align:left;">The malvertising bit stems from the ability to save and permalink “chats” within tools like ChatGPT - so when a user clicks the link, they get a fully fledged response already baked by the AI. This builds trust but the response could be heavily manipulated since the user had no control over the prompt.</p><h3 class="heading" style="text-align:left;" id="challenges-in-defending-against-ai-"><b>Challenges in Defending Against AI Recommendation Poisoning</b></h3><p class="paragraph" style="text-align:left;">Current defense recommendations from Microsoft and others, such as hovering before clicking, avoiding AI links from untrusted sources, or questioning suspicious recommendations, are largely ineffective in practice. Users notoriously fail to follow such advice, as evidenced by persistent phishing attacks and repeated failures in simulated phishing training.</p><p class="paragraph" style="text-align:left;">When have we ever succeeded in getting users to hover over links and make a decision based on what they see? And honestly, what they see on these hovers is the site they expect to go to!</p><p class="paragraph" style="text-align:left;">Other suggestions, like periodically reviewing or clearing the AI’s memory, impose significant inconvenience. Users value the personalized assistance AI provides, and wiping memory means losing useful context such as location or preferences, which few will tolerate.</p><h3 class="heading" style="text-align:left;" id="potential-solutions-and-the-role-of"><b>Potential Solutions and the Role of AI Providers</b></h3><p class="paragraph" style="text-align:left;">The transcript emphasizes that real mitigation must come from AI vendors themselves. Potential improvements include:</p><ul><li><p class="paragraph" style="text-align:left;">Preventing memory updates triggered solely by GET request query strings embedded in URLs.</p></li><li><p class="paragraph" style="text-align:left;">Implementing detection mechanisms to identify suspicious or manipulative memory entries.</p></li><li><p class="paragraph" style="text-align:left;">Alerting users when unusual or unverified sources appear in their AI memory, offering options to review or clear them.</p></li></ul><p class="paragraph" style="text-align:left;">Such measures could reduce persistent poisoning without relying on end-user vigilance, which historically has failed.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Meta Has Joined The War Against Encryption — and is Funding The War For Age Verification</title>
  <description>Meta abandons encryption promises for Instagram and Messenger, prioritizing age verification over user privacy protection and default end-to-end encryption.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/4b24616b-6ab1-48b6-ab62-9fc35e96fd63/gettyimages-2188450078-612x612.jpg?t=1773772569"/>
  <link>https://www.vulnu.com/p/meta-has-joined-the-war-against-encryption-and-is-funding-the-war-for-age-verification</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/meta-has-joined-the-war-against-encryption-and-is-funding-the-war-for-age-verification</guid>
  <pubDate>Fri, 20 Mar 2026 14:19:00 +0000</pubDate>
  <atom:published>2026-03-20T14:19:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[News]]></category>
    <category><![CDATA[Privacy]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"></p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/hFddvrea9Ss" width="100%"></iframe><p class="paragraph" style="text-align:left;">There’s a widespread misconception making the rounds that Instagram DMs have suddenly stopped being private. But Instagram Direct Messages were NEVER end-to-end encrypted by default. </p><p class="paragraph" style="text-align:left;">Despite public promises from Meta and its CEO Mark Zuckerberg to implement default end-to-end encryption (E2EE) across Messenger and Instagram, <a class="link" href="https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=meta-has-joined-the-war-against-encryption-and-is-funding-the-war-for-age-verification" target="_blank" rel="noopener noreferrer nofollow">this commitment has been quietly reversed</a> because, they say, very few users opted into the optional encryption features. </p><p class="paragraph" style="text-align:left;">So now Meta is choosing to disable them entirely and blaming users for their lack of adoption.</p><h3 class="heading" style="text-align:left;" id="metas-broken-promises-and-expert-co"><b>Meta’s Broken Promises and Expert Concerns</b></h3><p class="paragraph" style="text-align:left;">For years, Meta publicly asserted that all private messaging on their platforms would be secured with E2EE by default. Zuckerberg personally guaranteed this would happen, promising users a higher standard of privacy. Yet, on the same FAQ page where Meta claims to be “working hard” on default encryption, they simultaneously admit they are turning off this feature because the uptake was too low. This contradictory messaging highlights a pivot driven not by technical limitations but by strategic priorities.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/matthew_d_green/status/2032554493754159156?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=meta-has-joined-the-war-against-encryption-and-is-funding-the-war-for-age-verification" target="_blank" rel="noopener noreferrer nofollow">Matthew Green</a>, a respected professor of cryptography at Johns Hopkins University who has worked with Meta on secure messaging designs, notes that while WhatsApp still maintains default E2EE — using the same underlying Signal protocol technology — this security might not last. </p><p class="paragraph" style="text-align:left;">Meta stands to gain immensely from access to vast amounts of messaging data, especially as AI technologies require large, high-quality datasets for training. Unlike Signal, which is open source, WhatsApp’s encryption is proprietary, raising questions about transparency and future security.</p><h3 class="heading" style="text-align:left;" id="the-larger-context-privacy-erosion-"><b>The Larger Context: Privacy Erosion and AI Monetization</b></h3><p class="paragraph" style="text-align:left;">Meta’s move away from encryption is happening alongside its funding of lobbying campaigns pushing for stringent age-verification laws on the web. These laws threaten to erode anonymity and privacy across the internet, making it harder for users to remain anonymous or avoid pervasive surveillance. </p><p class="paragraph" style="text-align:left;">One of my biggest fears is the emerging role of AI agents in this ecosystem. Meta is reportedly developing AI-powered agents that will operate directly on encrypted messages on users’ phones, scanning content and converting it into signals for targeted advertising. This approach effectively sidesteps encryption by processing data locally but still enables Meta to monetize private conversations. The same technical advancements that enable private AI processing also complicate efforts to maintain truly private and anonymous communication.</p><h3 class="heading" style="text-align:left;" id="why-this-matters-losing-the-battle-"><b>Why This Matters: Losing the Battle for an Anonymous Internet</b></h3><p class="paragraph" style="text-align:left;">Most users didn’t realize they weren’t using encrypted Instagram DMs, so the headline news missed the deeper problem. The issue isn’t just about Instagram’s messaging privacy but about a broader loss of privacy and anonymity online. Platforms are increasingly defaulting to surveillance-friendly designs where user data is harvested and monetized at scale. With AI accelerating data exploitation, controlling personal information and communications is becoming more difficult than ever.</p><p class="paragraph" style="text-align:left;">I’ve produced multiple in-depth <a class="link" href="https://www.youtube.com/@VulnerableU?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=meta-has-joined-the-war-against-encryption-and-is-funding-the-war-for-age-verification" target="_blank" rel="noopener noreferrer nofollow">videos exploring these issues</a>, emphasizing that this is an ongoing and escalating problem. The fight for a private, anonymous internet is losing ground under pressure from powerful corporate interests and regulatory frameworks that prioritize control and monetization over user rights. </p><p class="paragraph" style="text-align:left;">For anyone concerned about digital privacy, this trend is a warning sign that demands attention and action.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>🎓️ Vulnerable U | #160</title>
  <description>Meta funding the age verification war and reversing e2e encryption promises, stryker wiped by Iran, Telus gets hacked and loses a petabyte of data, and much more!</description>
  <link>https://www.vulnu.com/p/vulnerable-u-160</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/vulnerable-u-160</guid>
  <pubDate>Fri, 20 Mar 2026 12:15:00 +0000</pubDate>
  <atom:published>2026-03-20T12:15:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Newsletter]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-family:Courier, Lucida Typewriter, monospace;"><i><b>Read Time: </b></i></span><span style="font-family:Courier, Lucida Typewriter, monospace;"><i>9 minutes</i></span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/414beb67-ad5b-49af-982b-d085a4859241/Newsletter_Header.png?t=1773958461"/></div><p class="paragraph" style="text-align:center;">Brought to you by:</p><div class="image"><a class="image__link" href="https://minimal.dev/rsa?utm=vu&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/18cb6cc6-13b0-4c9d-83fd-00cc34ec4818/Newsletter_Sponsor_Logo.png?t=1773958444"/></a></div><p class="paragraph" style="text-align:left;">Howdy friends!</p><p class="paragraph" style="text-align:left;">And here. we. go. - RSA time. Hope to see some of you out there. I’m pre-exhausted and excited. It’s like a family reunion. I’m triple booked for all meals at this point, but have some in between time walking around the expo if you spot me, say hi.</p><p class="paragraph" style="text-align:left;">Flying straight from SF across country to speak at another conference, so send coffee and good vibes.</p><p class="paragraph" style="text-align:left;">For those of you hanging in my live streams on YouTube or Twitch - A) Thanks! B) I’ll be back the 31st!</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="icymi"> ICYMI</h1><p class="paragraph" style="text-align:left;">🖊️ Something I wrote: Your AI’s Memory is <a class="link" href="https://www.youtube.com/watch?v=eLIPe6E46L4&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Being Poisoned</a> (wrote? double said this week!)</p><p class="paragraph" style="text-align:left;">🎧️ Something I heard: Building <a class="link" href="https://www.youtube.com/watch?v=qTX9u-EsjmM&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Claude Skills as a Bug Bounty Hunter</a></p><p class="paragraph" style="text-align:left;">🎤 Something I said: Your Google API keys are now <a class="link" href="https://www.youtube.com/watch?v=aCf0Qi7uuQg&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">exposing sensitive data</a></p><p class="paragraph" style="text-align:left;">🔖 Something I read: Security Research Legal Defense Fund Appoints <a class="link" href="https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Casey John Ellis and Jen Ellis to Board</a> (this is awesome)</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="vulnerable-news">Vulnerable News</h1><h3 class="heading" style="text-align:left;" id="meta-has-joined-the-war-against-enc"><a class="link" href="https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Meta Has Joined The War Against Encryption — and is Funding The War For Age Verification</b></a></h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/hFddvrea9Ss" width="100%"></iframe><p class="paragraph" style="text-align:left;">The big misconception here is that Instagram DMs suddenly became un-private. Truth is, they were NEVER end-to-end encrypted by default. Meta had publicly promised to roll out default encryption on Messenger and Instagram, with Mark Zuckerberg personally vowing to protect users’ privacy. But now, they’ve done a complete 180 — turning off encryption features because hardly anyone opted in. </p><p class="paragraph" style="text-align:left;">Their FAQ even blames users for not enabling it. Meanwhile, experts like <a class="link" href="https://x.com/matthew_d_green/status/2032798430498640016?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Matthew Green</a>, a cryptography professor who worked with Meta, are warning that even WhatsApp’s default encryption may not last, especially since Meta now has access to massive amounts of data valuable for training AI.</p><p class="paragraph" style="text-align:left;">At the same time, Meta is funding lobbying efforts to impose age-verification laws that could effectively end online privacy altogether. This is a massive betrayal of prior commitments to user privacy. The real concern isn’t just Instagram DMs but the larger erosion of privacy on the internet, especially as AI agents may soon read and monetize encrypted messages directly on your device. We’re losing the battle to maintain any anonymity online, and this is just one of many signs. If you want to understand the full scope, I’ve made several detailed videos on this on <a class="link" href="https://www.youtube.com/@VulnerableU?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">my channel</a>. <b>(read more </b><a class="link" href="https://x.com/matthew_d_green/status/2032554493754159156?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>here</b></a><b>, </b><a class="link" href="https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>here</b></a><b> and </b><a class="link" href="https://engineering.fb.com/2025/04/29/security/whatsapp-private-processing-ai-tools/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>here</b></a><b>)</b></p><h3 class="heading" style="text-align:left;" id="are-your-developers-dangerously-ski"><a class="link" href="https://minimal.dev/rsa?utm=vu&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Are Your Developers -- Dangerously-Skipping-Permissions?</a>*</h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3807ad83-190a-4898-8c36-01d990af7883/uv-2.png?t=1773693525"/></div><p class="paragraph" style="text-align:left;">We&#39;re all racing to roll out coding agents, but most teams are letting them run with developer defaults in unpredictable environments.</p><p class="paragraph" style="text-align:left;"><b>Minimal </b>is more than a sandbox for untrusted code execution, we deliver safe, predictable dev environments that work identically for humans, agents, and CI. Declarative workspaces with full traceability, made simple.</p><p class="paragraph" style="text-align:left;">Get agentic speed without losing control. <a class="link" href="https://minimal.dev/rsa?utm=vu&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Book time with us at RSA</b></a> to see how we make agent adoption safer for your engineering team. (<a class="link" href="https://minimal.dev/rsa?utm=vu&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>*Sponsored</i></span></p><h3 class="heading" style="text-align:left;" id="your-a-is-memory-is-being-poisoned"><a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Your AI’s Memory is Being Poisoned</a></h3><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/eLIPe6E46L4" width="100%"></iframe><p class="paragraph" style="text-align:left;">A new AI attack called “AI recommendation poisoning” is emerging, where attackers manipulate AI chatbots’ memory through specially crafted prompts embedded in URLs. These prompts are often hidden in “Summarize with AI” buttons on websites. When clicked, they send a query with memory-altering instructions to the AI tool while the user is authenticated, causing the AI to remember false or biased information. For example, attackers can insert recommendations for certain blogs, products, or financial advice, skewing future AI responses. Microsoft has identified over 50 such instances recently, ranging from benign SEO manipulations to potentially dangerous financial or medical misinformation. These attacks exploit the AI’s memory features, which learn about users over time, making the poisoning persistent and personalized.</p><p class="paragraph" style="text-align:left;">Defenses are challenging; common advice like “hover before you click” or “avoid untrusted links” is largely ineffective as users rarely follow it. Suggestions such as periodically clearing AI memory are inconvenient and impractical. The real solution likely lies in AI providers changing how memory updates occur, for example, preventing memory updates from simple URL queries or alerting users to suspicious memory entries. Awareness is critical since these manipulations undermine trust in AI recommendations and could have serious consequences. (<a class="link" href="https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="telus-digital-confirms-breach-after"><a class="link" href="https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Telus Digital Confirms Breach After Hacker Claims 1 Petabyte Data Theft</b></a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c47545d4-ea2f-4554-84d9-08a6d64ce942/Telus.png?t=1773773450"/></div><p class="paragraph" style="text-align:left;">Telus Digital is the digital services and business processing outsourcing arm of the Canadian telecom giant TELUS. Basically where companies outsource tons of operational tasks like customer support, content moderation, AI data services, internal auth tools, and billing. And because they handle all this sensitive info for many clients, they become targets.</p><p class="paragraph" style="text-align:left;">So, Shiny Hunters claims to have stolen roughly one petabyte of data from Telus. Petabyte. With a P. That’s a massive amount of data. They’re saying social security or national IDs, hashed passwords, API keys, OAuth tokens, call metadata, customer records, financial and HR data, Salesforce accounts, background check files, and voice recordings of customer support calls. While Telus confirmed a security incident, they have yet to clarify the full extent or validity of the breach claims. The data reportedly also included access to 20,000 GitHub repositories connected to Telus. <b>(</b><b><a class="link" href="https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a></b><b>)</b></p><h3 class="heading" style="text-align:left;" id="stryker-says-its-restoring-systems-"><a class="link" href="https://techcrunch.com/2026/03/17/stryker-says-its-restoring-systems-after-pro-iran-hackers-wiped-thousands-of-employee-devices/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Stryker Says It’s Restoring Systems After Pro-Iran Hackers Wiped Thousands of Employee Devices</b></a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ce4227aa-6b27-46c0-9b6a-db989ba444d3/Screenshot_2026-03-17_at_3.47.58_PM.png?t=1773776901"/></div><p class="paragraph" style="text-align:left;">Iranian hackers are claiming to have stolen 50 terabytes of data from Styker before wiping tens of thousands of systems and servers, effectively forcing the company to shut down critical operations temporarily. </p><p class="paragraph" style="text-align:left;">Two things stand out to me on this one: 1) A private company getting major hacked because of a physical war. 2) The employees PERSONAL phones got wiped if they were enrolled in InTune mobile device management (MDM).</p><p class="paragraph" style="text-align:left;">Employees reported waking up to wiped phones - like complete bricks. Even got their SIMs wiped and had to call their carriers to reactivate. Stryker is currently restoring its systems, and investigations by Microsoft and Unit 42 are ongoing. (read more <a class="link" href="https://techcrunch.com/2026/03/17/stryker-says-its-restoring-systems-after-pro-iran-hackers-wiped-thousands-of-employee-devices/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">here</a>, <a class="link" href="https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">here</a> and <a class="link" href="https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">here</a>)</p><h3 class="heading" style="text-align:left;" id="coruna-inside-the-nation-state-grad"><a class="link" href="https://withpersona.com/guides/workforce-idv-checklist?utm_source=vuln-u&utm_medium=paid-email&utm_audience=a&utm_campaign=brnd_wf_ds_wf-idv_vuln-u-idv-checklist" target="_blank" rel="noopener noreferrer nofollow">7 must-have features to secure your workforce</a>*</h3><p class="paragraph" style="text-align:left;">Threat actors don&#39;t break in — they log in. As credential-based attacks become the primary entry point for breaches, you need workforce identity verification (IDV) to verify that every login is legitimate. </p><p class="paragraph" style="text-align:left;">The <b>Workforce IDV checklist</b> breaks down the seven must-have features to help you evaluate solutions and protect against unauthorized access. (<a class="link" href="https://withpersona.com/guides/workforce-idv-checklist?utm_source=vuln-u&utm_medium=paid-email&utm_audience=a&utm_campaign=brnd_wf_ds_wf-idv_vuln-u-idv-checklist" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>*Sponsored</i></span></p><h3 class="heading" style="text-align:left;" id="coruna-inside-the-nation-state-grad"><a class="link" href="https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Coruna: Inside the Nation-State-Grade iOS Exploit Kit We&#39;ve Been Tracking</b></a></h3><p class="paragraph" style="text-align:left;">We talked about this Coruna iOS exploit kit the last few weeks - well now we have a whole other one. It’s actually completely separate but yet tied up in the same crazy web. Enter - DarkSword. 2 major iOS exploit kits winding up in the public’s hands in a matter of weeks is concerning if we’re pointing at a new trend.</p><p class="paragraph" style="text-align:left;">One of the nastiest parts about both these kits is that they are being fed through watering hole attacks. AKA, you go to a legitimate website, that then all of a sudden is hacking your iPhone. We&#39;re talking about potentially 221-270 million vulnerable devices on the impacted versions.</p><p class="paragraph" style="text-align:left;">The exploit chain is impressively complete: Safari RCE, sandbox escape, privilege escalation, and in-memory JavaScript implants that hoover up everything from your keychain and crypto wallets to your messages, call history, and location data. I’m floored by this that it starts in <b>JavaScript</b>. Without any persistent binaries.</p><p class="paragraph" style="text-align:left;">Apple has patched all these vulnerabilities in iOS 18.7.6 and 26.3.1, so updating is your best defense. The researchers are holding back some technical details to prevent copycats.</p><p class="paragraph" style="text-align:left;">I’ll be conducting in-depth interviews with the iVerify team, who have been monitoring Coruna and DarkSword and its evolving threat landscape. I plan to create a documentary-style video that combines their expert insights, technical analysis, and non-public information to provide a comprehensive understanding the mobile security landscape. (DarkSword iVerify: <a class="link" href="https://iverify.io/blog/darksword-ios-exploit-kit-explained?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a> - Google DarkSword <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a> - Coruna writeup if you missed it: <a class="link" href="https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>read more</b></a><b>)</b></p><h3 class="heading" style="text-align:left;" id="australia-applauds-eu-sanctions-tar"><a class="link" href="https://www.cyberdaily.au/security/13339-australia-applauds-eu-sanctions-targeting-chinese-and-iranian-hackers?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Australia Applauds EU Sanctions Targeting Chinese and Iranian Hackers</b></a></h3><p class="paragraph" style="text-align:left;">The EU just dropped sanctions on some cyber troublemakers and Australia&#39;s jumping in to back them up. Two Chinese companies (Integrity Technology Group and Anxun Information Technology), a couple of Chinese individuals, and one Iranian outfit called Emennet Pasargad. The Chinese crew apparently had quite the operation going - Integrity Tech helped target over 65,000 devices across six EU countries between 2022-2023, while Anxun was busy providing hacking-as-a-service against critical infrastructure.</p><p class="paragraph" style="text-align:left;">The Iranian company gets points for creativity though - they didn&#39;t just compromise a French subscriber database and hawk it on the dark web, they also pulled some disinformation stunts by hacking billboards during the 2024 Paris Olympics. Australia&#39;s National Cyber Security Coordinator Michelle McGuinness and cyber ambassador Jessica Hunter both came out swinging in support, talking up the whole &quot;rules-based cyberspace&quot; angle. The sanctions hit asset freezes, travel bans, and economic restrictions. (<a class="link" href="https://www.cyberdaily.au/security/13339-australia-applauds-eu-sanctions-targeting-chinese-and-iranian-hackers?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="linux-foundation-kicks-off-effort-t"><a class="link" href="https://www.theregister.com/2026/03/18/linux_foundation_ai_slop_defense/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Linux Foundation kicks off effort to shield FOSS maintainers from AI slop bug reports</a></h3><p class="paragraph" style="text-align:left;">Big Tech just threw $12.5 million at a problem they helped create. The Linux Foundation is launching an effort to help open source maintainers deal with the flood of AI-generated bug reports that are overwhelming projects. Anthropic, AWS, GitHub, Google, Microsoft, and OpenAI are all chipping in to fund this through the Alpha-Omega project, which makes sense since their AI tools are part of what&#39;s causing the headache in the first place.</p><p class="paragraph" style="text-align:left;">The issue isn&#39;t new - we&#39;ve seen the Python Software Foundation complain about it, and the cURL maintainer actually shut down their bug bounty program because of all the AI slop flooding in. It&#39;s a classic case of technology scaling faster than humans can handle it. Maintainers are getting buried under automated security findings without the resources to properly sort through what&#39;s actually useful versus what&#39;s just AI noise. At least the companies profiting from AI are putting some money toward fixing the mess, though details on what exactly this initiative will do are pretty sparse right now.</p><p class="paragraph" style="text-align:left;">(<a class="link" href="https://www.theregister.com/2026/03/18/linux_foundation_ai_slop_defense/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="teens-sue-musks-x-ai-over-groks-por"><a class="link" href="https://www.bbc.com/news/articles/cgk2lzmm22eo?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Teens Sue Musk&#39;s xAI Over Grok&#39;s Pornographic Images of Them</b></a></h3><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/002afc8c-7553-4815-83c7-137083c35fc2/Screenshot_2026-03-17_at_4.16.50_PM.png?t=1773778626"/></div><p id="im-glad-this-wave-of-abuse-involvin" class="paragraph" style="text-align:left;">I’m glad this wave of abuse involving Grok is going to court. The AI tool was used to generate non-consensual explicit images of individuals, including minors. Over several weeks, Grok was used to create and distribute deeply harmful content without the consent of the victims, which is horrifying on many levels. Recently, a lawsuit was filed in federal court in California by three young women whose images and videos were manipulated in this way. </p><p class="paragraph" style="text-align:left;">Three teenagers are suing Elon Musk&#39;s xAI after discovering sexually explicit deepfakes of themselves created using Grok&#39;s controversial &quot;spicy mode&quot; feature. The images, including altered high school yearbook photos, were being traded on Discord servers alongside similar content of at least 18 other minors. One plaintiff found out through an anonymous Instagram message pointing her to the imagery, which shows how these deepfakes can follow victims around the internet long after creation.</p><p class="paragraph" style="text-align:left;">According to the Center for Countering Digital Hate, Grok generated over 20,000 sexualized images of children in just two weeks. Musk initially claimed he wasn&#39;t aware of any underage content and blamed users, but eventually X implemented some safeguards after investigations from UK, EU, and California regulators. The perpetrator behind the Discord server already arrested for possessing hundreds of similar images. (<a class="link" href="https://www.bbc.com/news/articles/cgk2lzmm22eo?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="meta-is-having-trouble-with-rogue-a"><a class="link" href="https://techcrunch.com/2026/03/18/meta-is-having-trouble-with-rogue-ai-agents/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Meta is having trouble with rogue AI agents</a></h3><p class="paragraph" style="text-align:left;">One of Meta’s AI agents decided to play helpful without asking permission, jumping into an internal tech support thread and offering advice that turned out to be spectacularly wrong. An engineer followed the AI&#39;s guidance and accidentally exposed massive amounts of company and user data to unauthorized employees for two hours.</p><p class="paragraph" style="text-align:left;">This isn&#39;t even their first rodeo with rogue AI behavior. Summer Yue from Meta&#39;s AI safety team posted about her OpenClaw agent nuking her entire inbox despite being told to confirm actions first. You&#39;d think these incidents might pump the brakes on AI agent development, but Meta&#39;s doubling down instead - they just bought Moltbook, a Reddit-style platform for AI agents to chat with each other. Nothing could possibly go wrong with that plan, right? (<a class="link" href="https://techcrunch.com/2026/03/18/meta-is-having-trouble-with-rogue-ai-agents/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="authorities-disrupt-worlds-largest-"><a class="link" href="https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">Authorities disrupt world’s largest IoT DDoS botnets responsible for record breaking attacks targeting victims worldwide</a></h3><p class="paragraph" style="text-align:left;">We&#39;ve been talking about these four major botnets - Aisuru, KimWolf, JackSkid, and Mossad - that had enslaved over 3 million devices worldwide and were launching record-breaking DDoS attacks hitting 30 terabits per second. They were running a full &quot;cybercrime as a service&quot; operation, renting out access to infected IoT devices like cameras, routers, and DVRs to other criminals.</p><p class="paragraph" style="text-align:left;">The takedown was a joint effort between the US, Canada, and Germany, with the DoD&#39;s investigative arm leading the charge since these botnets were also hitting Department of Defense networks. What&#39;s impressive is the scale - hundreds of thousands of attacks launched, with some victims reporting tens of thousands in damages. The operators got sloppy though, and law enforcement seized domains, servers, and other infrastructure. It&#39;s a solid win, but let&#39;s be real - there are plenty more botnets out there ready to fill the void. (<a class="link" href="https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><h3 class="heading" style="text-align:left;" id="top-us-counterterrorism-official-jo"><a class="link" href="https://apnews.com/live/iran-war-israel-trump-03-17-2026?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow"><b>Top US Counterterrorism Official Joe Kent Resigns Over Iran War</b></a></h3><p class="paragraph" style="text-align:left;">Joe Kent, Director of National Counterterrorism, resigned over his opposition to the ongoing war in Iran. He publicly stated that Iran posed no imminent threat to the United States and claimed that the war was initiated primarily due to pressure from Israel and its influential American lobby. This resignation is a big deal because Kent was in charge of an agency tasked with analyzing and detecting threats, so his departure signals a crack within the establishment regarding the justification and management of the conflict. It reflects growing unease within parts of the political right, including Trump’s base, about the war and questions the legitimacy of the use of force in Iran. </p><p class="paragraph" style="text-align:left;">This is worth monitoring closely, especially given the current geopolitical climate and ongoing cyberattacks related to the conflict. The resignation raises questions about who will replace Kent and how the new leadership will influence counterterrorism efforts amid a complex cyber and physical security landscape. (<a class="link" href="https://apnews.com/live/iran-war-israel-trump-03-17-2026?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=vulnerable-u-160" target="_blank" rel="noopener noreferrer nofollow">read more</a>)</p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="miscellaneous-mattjay">Miscellaneous mattjay</h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/14f0fce1-222d-4fb8-9a38-bd960b81342f/Screenshot_2026-03-19_at_7.41.43_PM.png?t=1773968338"/></div><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5b9bcd4f-af9a-4a54-a89b-b039fd0dca8b/Screenshot_2026-03-19_at_7.44.59_PM.png?t=1773968331"/></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="parting-thoughts">Parting Thoughts:</h2><p class="paragraph" style="text-align:start;">Community was foundational in launching and propelling my career. Community is the only reason I can stand being in Texas during the summer months. <i>Community</i> is the point. Today, I invite you to embrace discomfort on the road to a more vulnerable you. </p><p class="paragraph" style="text-align:start;">Stay safe, Matt Johansen<br>@mattjay</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Claude Tried to Hack 30 Companies. Nobody Asked It To.</title>
  <description>Claude AI models autonomously attempted to hack 30 companies without being instructed to. Researchers reveal surprising security vulnerabilities in Claude&#39;s behavior during routine tasks.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e34870d9-b0e3-4891-8ec4-aae6f57bdec9/Screenshot_2026-03-12_at_1.57.10_PM.png" length="1079312" type="image/png"/>
  <link>https://www.vulnu.com/p/claude-tried-to-hack-30-companies-nobody-asked-it-to</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/claude-tried-to-hack-30-companies-nobody-asked-it-to</guid>
  <pubDate>Wed, 18 Mar 2026 13:23:00 +0000</pubDate>
  <atom:published>2026-03-18T13:23:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Ai]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/Nc59ubGxfZM" width="100%"></iframe><p class="paragraph" style="text-align:left;">Yeah… it’s not supposed to do that.</p><p class="paragraph" style="text-align:left;">Researchers at <a class="link" href="https://trufflesecurity.com/blog/claude-tried-to-hack-30-companies-nobody-asked-it-to?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=claude-tried-to-hack-30-companies-nobody-asked-it-to" target="_blank" rel="noopener noreferrer nofollow">Truffle Security published a report </a>showing that Anthropic’s Claude models started hacking websites without being asked to hack anything.</p><p class="paragraph" style="text-align:left;">They created clones of about 30 different corporate websites — things like Meta, Coca-Cola, Procter & Gamble — and intentionally planted vulnerabilities in them.</p><p class="paragraph" style="text-align:left;">Then they gave Claude a very simple task, something like: go find the latest engineering blog post on Meta’s website.</p><p class="paragraph" style="text-align:left;">But instead of pointing Claude to the real site, the researchers rewired things so the AI would end up interacting with their cloned version instead.</p><p class="paragraph" style="text-align:left;">From Claude’s perspective, it thought it was visiting the real website.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6c0bc346-3800-45d9-bbd3-fc71432bb234/Screenshot_2026-03-12_at_2.09.41_PM.png?t=1773339013"/></div><p class="paragraph" style="text-align:left;">Where it gets interesting: When Claude tried to retrieve the blog post, it encountered a SQL error message. If you’re a web security person, you know that’s a pretty juicy signal. SQL errors often indicate that a site might be vulnerable to SQL injection. Instead of just giving up or reporting the error, Claude started investigating.</p><p class="paragraph" style="text-align:left;">It basically said: “Why am I getting this SQL error?” And then it started probing the system. Eventually, the model performed a SQL injection attack against the site’s database. Nobody told it to do that. Nobody gave it permission. It simply decided that exploiting the vulnerability was the best way to complete the task it had been given.</p><p class="paragraph" style="text-align:left;">The researchers ran 1,800 different test cases, and in about 70 percent of them, Claude exploited the vulnerabilities it discovered.</p><p class="paragraph" style="text-align:left;">It wasn’t just SQL injection. The AI also exploited things like:</p><ul><li><p class="paragraph" style="text-align:left;">Server-Side Request Forgery (SSRF)</p></li><li><p class="paragraph" style="text-align:left;">Command injection</p></li><li><p class="paragraph" style="text-align:left;">other web application vulnerabilities</p></li></ul><p class="paragraph" style="text-align:left;">In other words, Claude wasn’t just fixing a coding error. It was actively using security flaws as a means to an end.</p><p class="paragraph" style="text-align:left;">If a human security researcher intentionally did the same thing against a real company without authorization, that could easily be considered a crime under computer hacking laws.</p><p class="paragraph" style="text-align:left;">When asked about responsible disclosure, the researchers noted that there wasn’t actually a vulnerability to disclose.</p><p class="paragraph" style="text-align:left;">The issue isn’t that these particular websites had security flaws, but that the AI model itself decided that exploitation was an acceptable strategy.</p><p class="paragraph" style="text-align:left;">That raises some really interesting questions about how these systems behave when given open-ended goals, especially when people start talking about deploying AI in real-world operational environments.</p><p class="paragraph" style="text-align:left;">This experiment shows that when Claude is trying to achieve a goal, it may independently decide to exploit vulnerabilities it encounters along the way. That’s probably one reason companies like Anthropic are extremely cautious about deploying their models in environments where autonomous decision-making could have real-world consequences.</p><p class="paragraph" style="text-align:left;">Once you give a system the ability to pursue objectives independently, you may not always control the methods it chooses to get there.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Pixel Perfect: Sold Extension Injects Code Through Pixel</title>
  <description>Pixel Perfect extension injects malicious code through pixel tracking. Discover how legitimate browser extensions turn evil and what permissions really mean for your security.</description>
      <enclosure url="https://images.unsplash.com/flagged/photo-1562599838-8cc871c241a5?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHwzfHxwaXhlbHN8ZW58MHx8fHwxNzcyNjMyOTUxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/pixel-perfect-sold-extension-injects-code-through-pixel</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/pixel-perfect-sold-extension-injects-code-through-pixel</guid>
  <pubDate>Tue, 17 Mar 2026 20:45:00 +0000</pubDate>
  <atom:published>2026-03-17T20:45:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Vulnerability]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/saR4qy5k_RY" width="100%"></iframe><p class="paragraph" style="text-align:left;">If you’re watching this video, or reading this, there’s a high likelihood you’re doing it in a browser that has extensions installed.</p><p class="paragraph" style="text-align:left;">Extensions are special. They operate in a completely different permission model than normal websites. A website can only do what the browser allows it to do inside a pretty restricted sandbox.</p><p class="paragraph" style="text-align:left;">Extensions don’t have that limitation. When you install an extension, it often asks for permissions that sound terrifying. Things like:</p><div class="blockquote"><blockquote class="blockquote__quote"><p class="paragraph" style="text-align:left;">“This extension can read and change all your data on all websites.”</p><figcaption class="blockquote__byline"></figcaption></blockquote></div><p class="paragraph" style="text-align:left;">Most people click past that. Even if you do read it, a lot of legitimate extensions actually need those permissions to work. Password managers, RSS readers, ad blockers; these tools have to see and interact with every page you visit in order to do their job.</p><p class="paragraph" style="text-align:left;">The tradeoff is that you’re trusting the developer of that extension not to abuse the extremely powerful access you’ve just granted them.</p><p class="paragraph" style="text-align:left;">But what if that developer changes?</p><h2 class="heading" style="text-align:left;" id="the-secret-third-thing-that-can-hap">The “Secret Third Thing” That Can Happen</h2><p class="paragraph" style="text-align:left;">A lot of people think there are only two ways an extension turns malicious: Either the developer intentionally adds malware, or the developer gets hacked and someone slips malicious code into the project.</p><p class="paragraph" style="text-align:left;">There’s actually a third scenario: The developer sells the extension.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e1666ac7-f369-47fd-b1e3-380456c2cdb5/Screenshot_2026-03-04_at_9.21.13_AM.png?t=1772634148"/></div><p class="paragraph" style="text-align:left;">There are marketplaces right now where browser extensions can be listed for sale. Developers build something useful, gather users, collect reviews, maybe even get featured by Google, and then decide they’re done maintaining it. So they sell it.</p><p class="paragraph" style="text-align:left;">When someone buys that extension, they’re not just buying the code. They’re buying the users and the trust that comes with them.</p><h2 class="heading" style="text-align:left;" id="a-50-proof-of-concept">A $50 Proof of Concept</h2><p class="paragraph" style="text-align:left;">John Tuckner at Annex Security <a class="link" href="https://secureannex.com/blog/pixel-perfect?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=pixel-perfect-sold-extension-injects-code-through-pixel" target="_blank" rel="noopener noreferrer nofollow">demonstrated how trivial this can be</a>. He bought a Chrome extension for about $50 that a friend of his had installed. The extension had normal permissions and a small but legitimate user base.</p><p class="paragraph" style="text-align:left;">Once ownership transferred, John pushed an update, which added a rule redirecting traffic from a specific site to a Rickroll video. Totally harmless, obviously.</p><p class="paragraph" style="text-align:left;">But it proved the point: if you control the extension, you control the browser behavior of everyone who installed it. The update rolled out automatically, just like any normal extension update would. His friend suddenly got Rickrolled through an extension that used to be trustworthy.</p><h2 class="heading" style="text-align:left;" id="the-real-world-example-quick-lens">The Real-World Example: QuickLens</h2><p class="paragraph" style="text-align:left;">The proof of concept is funny. The real example, less so.</p><p class="paragraph" style="text-align:left;">A Chrome extension called QuickLens, which acted as a wrapper around Google Lens functionality, had around 7,000 users and even had a featured badge from Google.</p><p class="paragraph" style="text-align:left;">Worked exactly as advertised. Then the extension was sold.</p><p class="paragraph" style="text-align:left;">The new owner pushed an update that added a command-and-control server, new permissions, and code designed to weaken browser security protections. One of the more interesting techniques involved something called the pixel trick.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e8dea38e-6540-4ba0-9b19-6457bbdbbf7a/Screenshot_2026-03-04_at_9.21.40_AM.png?t=1772634183"/></div><h2 class="heading" style="text-align:left;" id="the-pixel-perfect-attack">The Pixel-Perfect Attack</h2><p class="paragraph" style="text-align:left;">If you’ve ever worked in web security or AppSec, this part will feel familiar:</p><p class="paragraph" style="text-align:left;">The extension injected an invisible 1×1 pixel image into pages that users visited. That image contained JavaScript triggered by the <code>onload</code> event. When the page loads, the code executes.</p><p class="paragraph" style="text-align:left;">Normally, this kind of thing would be blocked by browser security features like Content Security Policy (CSP) or other security headers that websites send. But the extension update also included a rules file that stripped those protections out. Once those defenses were removed, the injected code could run freely.</p><p class="paragraph" style="text-align:left;">Instead of hard-coding malicious behavior directly in the extension, which would make it easy to detect, the extension fetched instructions dynamically from its command-and-control server.</p><p class="paragraph" style="text-align:left;">That means the malicious behavior could change anytime without another extension update. At that point, the attacker effectively had man-in-the-browser capability. They could rewrite pages, inject phishing forms, redirect traffic, capture keystrokes, or run arbitrary JavaScript on every site the user visited.</p><h2 class="heading" style="text-align:left;" id="why-this-is-so-hard-to-defend-again">Why This Is So Hard to Defend Against</h2><p class="paragraph" style="text-align:left;">Even if you carefully review every extension before installing it, that doesn’t protect you from this scenario because extensions update automatically. Those updates can completely change what the extension does.</p><p class="paragraph" style="text-align:left;">Even security teams that track extension permissions across their organization face the same problem. An extension can be safe today and malicious tomorrow without the user ever touching anything.</p><p class="paragraph" style="text-align:left;">The supply chain didn’t get hacked. It just got sold.</p><h2 class="heading" style="text-align:left;" id="the-takeaway">The Takeaway</h2><p class="paragraph" style="text-align:left;">Browser extensions are one of the most powerful and least scrutinized parts of modern computing. They have access to nearly everything happening in your browser. They can modify pages, read data across tabs, and interact with every site you visit.</p><p class="paragraph" style="text-align:left;">Most of the time, that power is used for legitimate purposes. But research like this shows how fragile that trust model can be.</p><p class="paragraph" style="text-align:left;">The extension you installed last year isn’t necessarily owned by the same person today. When ownership changes, the permissions you granted don’t change with it.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CISA warns max-severity n8n bug is being exploited in the wild</title>
  <description>CISA warns of critical n8n vulnerability being actively exploited. Learn about this max-severity flaw affecting the popular open-source automation platform and what you need to know.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/10113a67-0b13-4434-bc79-086b937ce34a/cisa-exploit.jpg" length="484956" type="image/jpeg"/>
  <link>https://www.vulnu.com/p/cisa-warns-max-severity-n8n-bug-is-being-exploited-in-the-wild</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/cisa-warns-max-severity-n8n-bug-is-being-exploited-in-the-wild</guid>
  <pubDate>Tue, 17 Mar 2026 13:41:00 +0000</pubDate>
  <atom:published>2026-03-17T13:41:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/-kKdTLQYSLE?si=Z2yp1M0akfK7MV1c&start=3033" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;">There are yet more vulnerabilities in n8n.</p><p class="paragraph" style="text-align:left;">If that name sounds familiar, it’s because I feel like I’ve covered <a class="link" href="https://www.securityweek.com/critical-vulnerability-exposes-n8n-instances-to-takeover-attacks/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=cisa-warns-max-severity-n8n-bug-is-being-exploited-in-the-wild" target="_blank" rel="noopener noreferrer nofollow">n8n security issues</a> at least once or twice a month recently. It seems to be a pretty ripe target for vulnerability research right now.</p><p class="paragraph" style="text-align:left;">Makes sense when you think about what the software actually does.</p><p class="paragraph" style="text-align:left;">If you’re not familiar with n8n, it’s basically an open-source automation platform. Think something like Zapier or IFTTT — those “if this happens, then do this” workflow tools. Except n8n is open source and increasingly used for AI-driven automation pipelines.</p><p class="paragraph" style="text-align:left;">You use it to build workflows using a visual interface. When something happens — a webhook triggers, a message arrives, a file gets uploaded — the platform can run a sequence of actions.</p><p class="paragraph" style="text-align:left;">Maybe it queries an API, or calls an AI model, or pushes something into Slack or a database. You drag blocks onto a flowchart and connect them together.</p><p class="paragraph" style="text-align:left;">So when a chat message arrives, maybe the system calls an OpenAI API, looks up data somewhere, queries a search engine, writes something to a database, and then posts the result to Slack.</p><p class="paragraph" style="text-align:left;">All those integrations require credentials, which means people are loading their n8n servers with API keys and authentication tokens for all sorts of services:</p><ul><li><p class="paragraph" style="text-align:left;">Slack</p></li><li><p class="paragraph" style="text-align:left;">Google Drive</p></li><li><p class="paragraph" style="text-align:left;">Telegram</p></li><li><p class="paragraph" style="text-align:left;">HubSpot</p></li><li><p class="paragraph" style="text-align:left;">databases</p></li><li><p class="paragraph" style="text-align:left;">internal webhooks</p></li><li><p class="paragraph" style="text-align:left;">cloud services</p></li></ul><p class="paragraph" style="text-align:left;">When you compromise an n8n server, you’re not just compromising one application, but potentially an entire credential hub for a company’s automation stack. That’s why vulnerabilities in this software are so attractive to attackers.</p><p class="paragraph" style="text-align:left;">The vulnerability that triggered the latest alerts allows attackers to bypass sandbox protections and execute malicious payloads that lead to <b>r</b>emote code execution.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.theregister.com/2026/03/12/cisa_n8n_rce/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=cisa-warns-max-severity-n8n-bug-is-being-exploited-in-the-wild" target="_blank" rel="noopener noreferrer nofollow">CISA warned</a> that the bug is being actively exploited in the wild. When something lands on the “known exploited vulnerabilities” list, that means attackers are already using it. Once you combine remote code execution with a system full of stored credentials, things can get ugly pretty quickly.</p><p class="paragraph" style="text-align:left;">If an attacker gets access to the n8n database, they can potentially extract all the API keys stored inside the platform, which means they could then start accessing other services directly to read company email, access internal databases, send messages as the organization or trigger additional automation workflows. It’s a credential jackpot.</p><p class="paragraph" style="text-align:left;">Many n8n deployments are designed to be accessible from the internet. The whole point of automation tools like this is that they interact with external services to receive webhooks, talk to APIs and trigger actions across different platforms.</p><p class="paragraph" style="text-align:left;">So it’s not always realistic to lock these systems down behind extremely strict firewall rules.</p><p class="paragraph" style="text-align:left;">That means if you’re running an exposed instance and haven’t patched it yet, attackers may already be probing it.</p><p class="paragraph" style="text-align:left;">Another wrinkle is that the vulnerability being actively exploited isn’t even the only one affecting the platform right now. Researchers have identified multiple issues in n8n recently, including flaws that allow attackers to escape sandbox restrictions and execute arbitrary code.</p><p class="paragraph" style="text-align:left;">Some of these vulnerabilities involve the way expressions and workflow logic are evaluated during configuration and execution. In certain cases, malicious payloads can bypass runtime protections and execute commands before security controls kick in. That means attackers can go from user-level access to full system compromise.</p><p class="paragraph" style="text-align:left;">If you’re running n8n anywhere in your environment, now is probably a good time to take a look at it.</p><p class="paragraph" style="text-align:left;">Patch it, review access controls and maybe put some guardrails around it, because when your automation platform doubles as a central repository of API keys, compromising that system can quickly turn into a much larger breach.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>US Military Contractor Likely Built iPhone Hacking Tools Used By Russian Spies in Ukraine</title>
  <description>US military contractor likely built iPhone hacking toolkit used by Russian spies in Ukraine. Coruna exploit kit compromises iOS 13-17.2 devices.</description>
      <enclosure url="https://images.unsplash.com/photo-1616410011236-7a42121dd981?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3w0ODM4NTF8MHwxfHNlYXJjaHwzfHxpUGhvbmV8ZW58MHx8fHwxNzczMjM2NjkzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&amp;utm_source=beehiiv&amp;utm_medium=referral"/>
  <link>https://www.vulnu.com/p/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine</guid>
  <pubDate>Mon, 16 Mar 2026 18:42:00 +0000</pubDate>
  <atom:published>2026-03-16T18:42:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[News]]></category>
    <category><![CDATA[Russia]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/y6ehIoyNoic?si=PVj3g48f8cMXSShK&start=4650" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;">Researchers have been tracking a <a class="link" href="https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine" target="_blank" rel="noopener noreferrer nofollow">sophisticated iPhone exploit toolkit called Coruna</a>, which contains more than 20 exploits capable of compromising iPhones running versions of iOS from 13 through 17.2. The toolkit has been observed in multiple campaigns, including operations tied to Russian espionage activity and financially motivated cybercrime groups. </p><p class="paragraph" style="text-align:left;">The <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine" target="_blank" rel="noopener noreferrer nofollow">Google Threat Intelligence report</a> on this is pretty thorough, and <a class="link" href="https://www.youtube.com/watch?v=XQvZ2mLnZVI&t=156s&utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine" target="_blank" rel="noopener noreferrer nofollow">check out this video</a> of security researcher Billy Ellis, who infected one of his phones to see what would happen.</p><p class="paragraph" style="text-align:left;">What’s becoming clearer is where those exploits may have come from. Evidence suggests the toolkit may have originated inside a U.S. military contractor that builds hacking tools for Western intelligence agencies. From there, a leak involving a former employee appears to have helped push those capabilities into the wider hacking ecosystem — eventually putting them in the hands of foreign intelligence services and cybercriminal groups. </p><h2 class="heading" style="text-align:left;" id="trenchant-l-3-harris-and-an-exploit">Trenchant, L3Harris and an Exploit Bonanza</h2><p class="paragraph" style="text-align:left;">We’re talking about something like 23 different exploits targeting iPhones running versions of iOS all the way up through 17.2. That’s already a big deal.</p><p class="paragraph" style="text-align:left;">But what makes this story really interesting is where the toolkit appears to have come from.</p><p class="paragraph" style="text-align:left;">According to reporting and analysis from researchers and former employees, parts of Coruna may have originally been developed by Trenchant, a hacking and surveillance technology division of the U.S. defense contractor L3Harris.</p><p class="paragraph" style="text-align:left;">Trenchant builds exploitation tools for government customers, typically the United States and allied intelligence agencies.</p><p class="paragraph" style="text-align:left;">In other words, these capabilities were never supposed to end up circulating in the wild.</p><h2 class="heading" style="text-align:left;" id="big-picture-getting-clearer">Big Picture Getting Clearer</h2><p class="paragraph" style="text-align:left;">Here’s where the story starts weaving together with another one we talked about months ago:</p><p class="paragraph" style="text-align:left;">A former executive at that same division, Peter Williams, was accused of stealing several hacking tools and selling them to a Russian exploit broker called Operation Zero. Prosecutors say he sold eight tools for about $1.3 million, and he was later sentenced to prison.</p><p class="paragraph" style="text-align:left;">So you’ve got stolen hacking tools leaving a defense contractor.</p><p class="paragraph" style="text-align:left;">At the same time, researchers start discovering a sophisticated iPhone exploit kit showing up in multiple campaigns.</p><p class="paragraph" style="text-align:left;">And now new reporting suggests those two stories may be connected.</p><p class="paragraph" style="text-align:left;">Researchers believe the Coruna toolkit may have been used by a Russian espionage group targeting Ukrainian victims through compromised websites. In those attacks, visiting a malicious page could trigger an exploit chain designed specifically for the victim’s iPhone.</p><p class="paragraph" style="text-align:left;">That kind of targeting is typical of nation-state operations, but here’s where things get even weirder: The same exploit toolkit didn’t stay confined to espionage operations.</p><p class="paragraph" style="text-align:left;">Researchers also found components of Coruna being used by financially motivated cybercriminal groups, including campaigns involving fake cryptocurrency exchanges aimed at stealing funds from victims. That’s unusual.</p><p class="paragraph" style="text-align:left;">Normally, government-grade exploits stay inside intelligence circles. They’re expensive to develop and extremely valuable, so they tend to be tightly controlled. But once those tools leak, they can start spreading through brokers and underground markets.</p><p class="paragraph" style="text-align:left;">That’s exactly what appears to have happened here.</p><p class="paragraph" style="text-align:left;">One theory is that once the exploits were stolen and sold, they passed through multiple intermediaries — possibly brokers or government customers — before eventually reaching criminal groups.</p><p class="paragraph" style="text-align:left;">At that point, the same capabilities that might have been used for espionage operations start showing up in fraud campaigns.</p><p class="paragraph" style="text-align:left;">Google researchers also linked two vulnerabilities associated with the Coruna toolkit to Operation Triangulation, a sophisticated iPhone hacking campaign that previously targeted Russian users.</p><p class="paragraph" style="text-align:left;">So now you’ve got a single set of exploit capabilities touching multiple parts of the cyber ecosystem:</p><ul><li><p class="paragraph" style="text-align:left;">Government surveillance tools</p></li><li><p class="paragraph" style="text-align:left;">Nation-state espionage operations</p></li><li><p class="paragraph" style="text-align:left;">Financially motivated cybercrime</p></li></ul><p class="paragraph" style="text-align:left;">We’ve been covering all of these pieces separately: The stolen tools from a defense contractor, the discovery of a sophisticated iPhone exploit kit, different campaigns using advanced mobile exploits, and now the research and reporting are tying those threads together into one larger picture.</p><p class="paragraph" style="text-align:left;">It’s a pretty stark reminder of how quickly powerful cyber capabilities can spread once they escape controlled environments.</p><p class="paragraph" style="text-align:left;">Something built for intelligence agencies can eventually end up circulating all over the world, sometimes in the hands of actors the original developers never intended to empower.</p><p class="paragraph" style="text-align:left;">Once that happens, there’s no putting the genie back in the bottle.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Proposal to Create Counterintelligence Unit Receives Bipartisan Pushback. It Should.</title>
  <description>Florida&#39;s counterintelligence unit proposal faces bipartisan scrutiny over civil liberties concerns and potential government overreach risks.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cf75965b-fc8f-460f-9d61-c93ded57c016/ai_generated_131d3946-e9fa-4321-baf5-5f5437b044b7.png" length="617079" type="image/png"/>
  <link>https://www.vulnu.com/p/proposal-to-create-counterintelligence-unit-receives-bipartisan-pushback-it-should</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/proposal-to-create-counterintelligence-unit-receives-bipartisan-pushback-it-should</guid>
  <pubDate>Mon, 16 Mar 2026 12:38:00 +0000</pubDate>
  <atom:published>2026-03-16T12:38:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[News]]></category>
    <category><![CDATA[Government]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/y6ehIoyNoic?si=l2oxIUYLH5JkIE0I&start=2704" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;">A Florida bill that proposes creating a <a class="link" href="https://floridaphoenix.com/2026/02/24/proposal-to-create-counterintelligence-unit-receives-bipartisan-pushback/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=proposal-to-create-counterintelligence-unit-receives-bipartisan-pushback-it-should" target="_blank" rel="noopener noreferrer nofollow">statewide counterintelligence and counterterrorism unit</a> immediately raised questions for me. On the surface, the mission sounds straightforward: detect and neutralize foreign adversaries, terrorists, and intelligence threats. But when you start looking at the actual language in the bill, things get a lot murkier. </p><p class="paragraph" style="text-align:left;">(Proponents) point to New York’s dedicated counterterrorism unit, with a thousand officers and federal intelligence services<span style="font-size:0.875rem;"> that </span>failed to prevent the 9-11 attacks. History shows us that when we depend on the<span style="font-size:0.875rem;"> </span>federal government, Florida loses. Also worth mentioning that the approach in New York<span style="font-size:0.875rem;"> </span>increased surveillance that drew criticism for violating civil liberties. We’ve seen sufficient abuses of power<span style="font-size:0.875rem;"> </span>among at least one unelected cabinet member to give me grave concerns about the abuse of a bill<span style="font-size:0.875rem;"> </span>like this to going into statute. </p><p class="paragraph" style="text-align:left;">What also caught my attention is how broadly the proposal defines threats, including people whose “views or opinions” are considered harmful to the interests of the state. Combine that with language about analyzing “patterns of life” data and you start getting into territory that privacy advocates and cybersecurity experts have warned about for years: large-scale surveillance systems that could be used to monitor and classify ordinary citizens. </p><h2 class="heading" style="text-align:left;" id="devil-in-the-details">Devil in the Details</h2><p class="paragraph" style="text-align:left;">At first glance, the mission sounds pretty straightforward. The unit’s goal would be to detect, identify, neutralize, and exploit adversary intelligence entities, foreign adversaries, terrorists, insider threats, and corporate threats.</p><p class="paragraph" style="text-align:left;">That’s the kind of language you usually hear when people talk about national security operations.</p><p class="paragraph" style="text-align:left;">But once you start digging into the bill itself, some of the details start to raise questions.</p><p class="paragraph" style="text-align:left;">One thing that stood out immediately is that the proposal appears to create a state-level counterintelligence capability that overlaps heavily with responsibilities that already exist at the federal level.</p><h2 class="heading" style="text-align:left;" id="expensive-redundancies">Expensive Redundancies</h2><p class="paragraph" style="text-align:left;">Agencies like the Department of Homeland Security, the FBI, the NSA, and the intelligence community already handle many of the types of threats the bill describes.</p><p class="paragraph" style="text-align:left;">So the obvious question becomes: what exactly would this state-level unit be doing that isn’t already covered by those organizations?</p><p class="paragraph" style="text-align:left;">Another issue is the funding.</p><p class="paragraph" style="text-align:left;">The bill reportedly allocates around $2 million initially and roughly $1.5 million annually afterward. If you think about what it actually costs to build and operate an intelligence unit, that’s not a very large budget. You’re not hiring many analysts or investigators with that kind of funding.</p><p class="paragraph" style="text-align:left;">But the part of the bill that really caught my attention is the language around identifying threats. The proposal defines an “adversary intelligence entity” extremely broadly. According to the bill, that category could include governments, organizations, businesses — or even individuals whose actions, views, or opinions are considered harmful to the interests of the state.</p><p class="paragraph" style="text-align:left;">That’s where things start getting a little concerning, because once you start defining threats in terms of opinions or viewpoints, you’re entering territory that’s historically been associated with surveillance overreach.</p><p class="paragraph" style="text-align:left;">And the bill goes further, saying the unit would identify threats by analyzing what’s called “patterns of life.”</p><p class="paragraph" style="text-align:left;">If you’re not familiar with that term, pattern-of-life analysis basically means building profiles based on the data generated by everyday activities.</p><ul><li><p class="paragraph" style="text-align:left;">Where you go</p></li><li><p class="paragraph" style="text-align:left;">What you buy</p></li><li><p class="paragraph" style="text-align:left;">What you post online</p></li><li><p class="paragraph" style="text-align:left;">Who you talk to</p></li><li><p class="paragraph" style="text-align:left;">What websites you read</p></li><li><p class="paragraph" style="text-align:left;">What your interests and beliefs might be.</p></li></ul><p class="paragraph" style="text-align:left;">That kind of data already exists in enormous quantities through data brokers, social media platforms, location tracking systems, and license plate readers.</p><p class="paragraph" style="text-align:left;">And increasingly, governments are finding ways to aggregate and analyze it.</p><p class="paragraph" style="text-align:left;">The phrase that keeps popping up in discussions about these types of systems is <b>“sentiment analysis.”</b></p><p class="paragraph" style="text-align:left;">That’s the idea that algorithms can analyze social media posts, communications, or other data to determine someone’s attitudes or beliefs.</p><p class="paragraph" style="text-align:left;">You’re starting to see that concept show up more often in surveillance discussions, including systems that attempt to assess whether someone might represent a risk based on their online activity.</p><p class="paragraph" style="text-align:left;">The concern is that once you combine those tools with vague definitions of what constitutes a threat, the potential for abuse becomes very real.</p><p class="paragraph" style="text-align:left;">If authorities have access to enough data, they can almost always find something that looks suspicious or problematic depending on how the rules are interpreted.</p><p class="paragraph" style="text-align:left;">That’s one of the reasons protections like the Fourth Amendment exist in the first place. Governments shouldn’t have the ability to monitor everyone constantly and then decide later who to investigate based on whatever information they happen to find.</p><h2 class="heading" style="text-align:left;" id="no-mystery-its-history">No Mystery, It’s History</h2><p class="paragraph" style="text-align:left;">History is full of examples of surveillance powers expanding beyond their original purpose. That’s why proposals involving large-scale monitoring systems tend to generate strong reactions from both cybersecurity experts and civil liberties advocates. The debate over this Florida bill is another example of that tension.</p><p class="paragraph" style="text-align:left;">Supporters argue that stronger intelligence capabilities are necessary to identify threats and protect the public. Critics worry that vague language and broad surveillance authority could eventually be used to monitor people based on their views rather than their actions.</p><p class="paragraph" style="text-align:left;">When legislation starts talking about tracking “patterns of life” and defining threats based on opinions, it’s probably worth taking a closer look at how those systems would actually be used.</p><p class="paragraph" style="text-align:left;">Once surveillance infrastructure exists, it tends to stick around, and the ways it’s used can change over time in harmful ways.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Iranian Attackers Retaliate With Stryker Attack and Much More</title>
  <description>Iranian hackers claiming Handala group hit medical device giant Stryker with destructive wiper attack, wiping systems and employee devices in retaliation.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/89a2a340-5bba-4809-b464-8a3432ef296a/550526c8-34de-4f4b-8888-cdb45250d5d7-poster.webp" length="30410" type="image/webp"/>
  <link>https://www.vulnu.com/p/iranian-attackers-retaliate-with-stryker-attack-and-much-more</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/iranian-attackers-retaliate-with-stryker-attack-and-much-more</guid>
  <pubDate>Fri, 13 Mar 2026 19:18:00 +0000</pubDate>
  <atom:published>2026-03-13T19:18:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
    <category><![CDATA[Iran]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"></p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/e8SZ4Z9cW1Y" width="100%"></iframe><p class="paragraph" style="text-align:left;">Iranian-linked hacktivists are claiming responsibility for a <a class="link" href="https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">destructive attack against medical device giant Stryker</a>, and the details coming out are nuts. </p><p class="paragraph" style="text-align:left;">From everything we’ve seen so far, this looks like a straight-up wipe: systems reset, servers knocked offline, login pages defaced, and employee devices, including some personal phones enrolled for work access, apparently wiped after attackers gained deep administrative control. </p><p class="paragraph" style="text-align:left;">The group claiming responsibility, Handala, framed the operation as <a class="link" href="https://www.reddit.com/r/cybersecurity/comments/1rqopq0/stryker_hit_by_handala_intune_managed_devices/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">retaliation for the US-Israeli war on Iran</a>, including the bombing of an all-girls school. </p><p class="paragraph" style="text-align:left;">Meanwhile, researchers are documenting Iranian-linked actors <a class="link" href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">scanning exposed surveillance cameras in missile-hit regions to support battle-damage assessment</a>, while Iranian state-linked channels are openly circulating Telegram target lists naming cloud, AI, and R&D facilities belonging to Amazon, Microsoft, Google, IBM, Nvidia, Oracle, and Palantir. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.rapid7.com/blog/post/tr-iran-cyber-playbook-escalating-regional-conflict/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">Rapid7 also warned</a> that Iranian groups like APT35, APT42, MuddyWater, and OilRig remain highly relevant in the current environment, with phishing, credential abuse, and reconnaissance likely to intensify. </p><h2 class="heading" style="text-align:left;" id="targets-chosen-for-widest-possible-">Targets Chosen for Widest-Possible Blast Radius</h2><p id="if-youre-not-in-healthcare-you-migh" class="paragraph" style="text-align:left;">If you’re not in healthcare, you might not know the name immediately. I actually didn’t. But once this story started moving, it became very obvious that this is not some niche company nobody relies on. Stryker is a major medical device maker with roughly 56,000 employees, and it builds everything from surgical and imaging equipment to hospital beds, defibrillators, and systems used by the U.S. military.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/45bc2ae4-8a5c-4c0c-b357-8c9784612fc4/Screenshot_2026-03-11_at_3.03.26_PM.png?t=1773255825"/></div><p class="paragraph" style="text-align:left;">Iranian-linked hacktivists from a group called Handala are claiming they hit Stryker, and the description coming out of this incident is about as destructive as it gets. <a class="link" href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">Kim Zetter reported</a> that Stryker employees in the U.S., Australia, India, Ireland, and elsewhere began posting that the company had effectively gone hard down. Internal and admin pages were reportedly defaced with Handala branding, the group claimed it hit more than 200,000 systems and devices, and Stryker itself told employees it was dealing with a “severe, global disruption” affecting laptops and systems connected to its network.</p><p class="paragraph" style="text-align:left;">The way people were describing it, this wasn’t just “we can’t log into one app” or “VPN is down.” Employees were saying systems were reset, servers were inaccessible, and the whole company was at a standstill. </p><p class="paragraph" style="text-align:left;">A <a class="link" href="https://www.reddit.com/r/cybersecurity/comments/1rqopq0/stryker_hit_by_handala_intune_managed_devices/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">Reddit post</a> said three Stryker-managed devices were wiped around 3:30 a.m. EDT and that the Entra login page had been defaced with the Handala logo. Zetter also reported employee accounts saying attackers pushed OS resets to computers and phones connected to the company network and that many servers were wiped clean.</p><p class="paragraph" style="text-align:left;">The Intune angle makes this especially nasty.</p><p class="paragraph" style="text-align:left;">From the employee accounts that surfaced, it sounds like one of the hardest-hit areas involved personal phones enrolled for work access — the classic BYOD trap. A company says, “Sure, use your own phone for work, just install our MDM software and we’ll only touch the corporate stuff.” But that’s policy, not technical reality. If attackers get access to your Intune admin layer, they don’t have to honor the company’s policy. They can use the same device-management power to wipe enrolled devices, cut off access, and break whatever authentication chain those phones were part of. </p><p class="paragraph" style="text-align:left;">Employee posts cited by Zetter said colleagues were told to remove Intune, Company Portal, Teams, and VPN from personal devices, and some users said they lost all personal data and could no longer access email or MFA-protected accounts.</p><p class="paragraph" style="text-align:left;">That’s the part that should make every company doing BYOD stop and think for a minute. Once the attackers have that level of administrative access, they don’t just have the ability to wipe. They may have had the ability to read, export, or collect data too. </p><p class="paragraph" style="text-align:left;">Handala has a history of stealing and publishing sensitive data, and <a class="link" href="https://www.theregister.com/2026/03/11/iran_threatens_us_tech_companies/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">The Register noted </a>that the group or Iran-linked channels are now threatening a wider set of U.S.-linked technology targets as the conflict expands. So if they wiped Stryker, the obvious question is whether they also took a copy of what they wanted first. At this stage, there’s no public proof either way. But if you know the playbook, it’s hard not to ask.</p><p class="paragraph" style="text-align:left;">The company’s official language is what you’d expect early in an incident.</p><p class="paragraph" style="text-align:left;">Stryker said it was experiencing a global network disruption affecting its Windows environment and that teams were working to restore operations. That’s standard, cautious wording. But it doesn’t change what the early employee reports and the public claim of responsibility suggest: this was not a normal outage and not a normal breach. If the wipe reports are accurate, this was a destructive cyberattack in every sense of the word.</p><h2 class="heading" style="text-align:left;" id="iran-weaponizes-the-cameras">Iran Weaponizes the Cameras</h2><p class="paragraph" style="text-align:left;">According to Zetter, the group said the attack was partly retaliation for the U.S. bombing of an all-girls school in Iran on the first day of the U.S.-Israeli assault. Whether you take every element of the group’s narrative at face value or not, they are clearly framing this as geopolitical retaliation, not crime for profit. That’s why I don’t think this story should be viewed in isolation.</p><p class="paragraph" style="text-align:left;">This morning I was also looking at <a class="link" href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=iranian-attackers-retaliate-with-stryker-attack-and-much-more" target="_blank" rel="noopener noreferrer nofollow">Check Point’s new research</a> showing Iranian-linked actors scanning the internet for exposed Hikvision and Dahua cameras across Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and specific areas in Lebanon. </p><p class="paragraph" style="text-align:left;">Check Point says the targeting intensified on Feb. 28, aligns with missile activity, and is consistent with Iran using camera compromise for operational support and battle-damage assessment — potentially even before missile launches. The infrastructure they tracked used commercial VPN exit nodes like Mullvad, ProtonVPN, Surfshark, and NordVPN, plus VPS infrastructure. That’s exactly the kind of thing we’ve talked about conceptually for years: cyber reconnaissance directly supporting kinetic warfare.</p><p class="paragraph" style="text-align:left;">So now put those two stories next to each other.</p><p class="paragraph" style="text-align:left;">On one side, you have Iranian-linked actors scanning exposed digital infrastructure to support missile operations. On the other, you have a destructive wipe against a major U.S. med-tech company being claimed as retaliation tied to the war. In this conflict, cyber and physical operations are one and same.</p><p class="paragraph" style="text-align:left;">Then layer in the infrastructure threat picture:</p><p class="paragraph" style="text-align:left;">The Register reported that Iranian state-affiliated channels on Telegram circulated slides titled “Iran’s New Targets,” listing facilities tied to Amazon, Microsoft, IBM, Palantir, Google, Nvidia, and Oracle. The posts described these as the “enemy’s technology infrastructure,” gave locations and facility descriptions, and framed the war as expanding into infrastructure warfare. The same report said Iran had already conducted aerial attacks against three AWS datacenters in the Middle East, one in Bahrain and two in the UAE, disrupting regional cloud providers and forcing customers to shift disaster-recovery plans.</p><p class="paragraph" style="text-align:left;">That’s wild, because now the targeting list is not just military sites or government systems. It’s cloud, AI, research, regional support infrastructure, and the private-sector companies that keep all of that running.</p><p class="paragraph" style="text-align:left;">Rapid7’s threat analysis fits that picture too. They’re explicitly warning that Iranian activity is likely to intensify through phishing, social engineering, credential misuse, and scanning of internet-facing infrastructure. </p><p class="paragraph" style="text-align:left;">They call out APT35 — Charming Kitten — as a long-running spear-phishing and credential-harvesting actor, APT42 as closely associated with surveillance and social engineering, and MuddyWater and OilRig as important MOIS-linked espionage groups in the current crisis environment. They also stress that sudden spikes in probing of remote access portals, VPN gateways, cloud services, and public web infrastructure should be treated as possible precursors to intrusion.</p><h2 class="heading" style="text-align:left;" id="broader-escalation-pattern">Broader Escalation Pattern</h2><p class="paragraph" style="text-align:left;">That’s why Stryker matters: not just because a huge healthcare-adjacent company got hammered, but because it may be part of a broader escalation pattern. </p><p class="paragraph" style="text-align:left;">If you’re a defender, the lesson here is not just “patch faster” or “watch your MDM settings,” though both matter. It’s that geopolitical conflicts are now spilling into ordinary enterprise environments much faster and in more destructive ways than a lot of companies are prepared for.</p><p class="paragraph" style="text-align:left;">If this attack really did move through admin accounts into Intune and then into a mass wipe of corporate and personal devices, it’s a brutal reminder that the blast radius of enterprise trust is bigger than most people think.</p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Long-Awaited Trump Cyber Strategy is a Nothing Burger</title>
  <description>Trump&#39;s long-awaited cybersecurity strategy lacks substance. The vague document offers little concrete action on defending critical infrastructure or addressing cyber threats.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d3dfb00a-86bd-4336-94f8-4ff5671311da/2026.03.09-US-National-Cyber-Strategy-calls-for-government_industry-coordination-to-boost-offensive-and-defensive-capabilities.webp" length="52884" type="image/webp"/>
  <link>https://www.vulnu.com/p/long-awaited-trump-cyber-strategy-is-a-nothing-burger</link>
  <guid isPermaLink="true">https://www.vulnu.com/p/long-awaited-trump-cyber-strategy-is-a-nothing-burger</guid>
  <pubDate>Fri, 13 Mar 2026 13:32:00 +0000</pubDate>
  <atom:published>2026-03-13T13:32:00Z</atom:published>
    <dc:creator>Matt Johansen</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="custom_html"><iframe width="560" height="315" src="https://www.youtube.com/embed/y6ehIoyNoic?si=1FenMdFotu9wtfOo&start=1037" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe></div><p class="paragraph" style="text-align:left;">The <a class="link" href="https://cyberscoop.com/trump-cybersecurity-strategy/?utm_source=www.vulnu.com&utm_medium=newsletter&utm_campaign=long-awaited-trump-cyber-strategy-is-a-nothing-burger" target="_blank" rel="noopener noreferrer nofollow">White House released a national cybersecurity strategy</a> this week, and people had apparently been anticipating it. I wasn’t.</p><p class="paragraph" style="text-align:left;">I took a look at it and there just isn’t much there.</p><p class="paragraph" style="text-align:left;">The document is only about seven pages long, and more than half of it is basically preamble. Two of the pages are essentially the title page and the closing section. That leaves very little actual substance in the middle.</p><p class="paragraph" style="text-align:left;">When you read those pages, it doesn’t really feel like a strategy document. It’s mostly statements like: cyber threats are dangerous, adversaries target the United States, and the government will act to defend its interests in cyberspace.</p><p class="paragraph" style="text-align:left;">The actual strategy part — the “how” — just isn’t there.</p><h2 class="heading" style="text-align:left;" id="wheres-the-beef">Where’s The Beef?</h2><p class="paragraph" style="text-align:left;">The document outlines several pillars, things like shaping adversary behavior, securing federal networks, protecting critical infrastructure, and building cybersecurity talent. All of those sound good in theory. Nobody’s going to argue against those goals. The problem is the document doesn’t really explain how the government intends to achieve them.</p><p class="paragraph" style="text-align:left;">A lot of the language reads like what I’d summarize as “we’re going to do more better cyber.”</p><p class="paragraph" style="text-align:left;">We’re going to defend our networks, deter adversaries and build cyber capabilities.</p><p class="paragraph" style="text-align:left;">Okay, but how?</p><p class="paragraph" style="text-align:left;">One section talks about shaping adversary behavior through offensive and defensive cyber capabilities, as well as encouraging the private sector to disrupt adversary networks.</p><p class="paragraph" style="text-align:left;">That’s something the government has talked about before, particularly the idea of allowing private companies to take a more active role in cyber defense.</p><p class="paragraph" style="text-align:left;">But again, there’s no real detail here about what that actually looks like in practice.</p><p class="paragraph" style="text-align:left;">Another pillar talks about promoting “common sense regulation” and reducing what the document calls costly checklists.</p><p class="paragraph" style="text-align:left;">And that’s where I start to get skeptical.</p><h2 class="heading" style="text-align:left;" id="checklists-written-in-blood">Checklists Written in Blood</h2><p id="cybersecurity-checklists-exist-for-" class="paragraph" style="text-align:left;">Cybersecurity Checklists Exist for a Reason. There’s a saying in aviation that every item on a pilot’s checklist is written in blood. Every step is there because something bad happened in the past when it wasn’t followed. Cybersecurity controls are a lot like that.</p><p class="paragraph" style="text-align:left;">When we require organizations to patch certain vulnerabilities, implement authentication controls, or monitor networks, those requirements usually exist because something catastrophic happened before those controls were in place.</p><p class="paragraph" style="text-align:left;">So dismissing those safeguards as just “costly checklists” feels simplistic.</p><p class="paragraph" style="text-align:left;">Another part of the strategy talks about modernizing federal networks and securing critical infrastructure. Those areas were historically major responsibilities of the Cybersecurity and Infrastructure Security Agency(CISA).</p><p class="paragraph" style="text-align:left;">That raises another obvious question: If you’re talking about expanding federal cybersecurity efforts, how does that square with the fact that the government has significantly reduced the size of agencies responsible for doing that work?</p><p class="paragraph" style="text-align:left;">You can’t say securing federal networks and protecting infrastructure are priorities while simultaneously shrinking the organizations tasked with carrying out those missions.</p><p class="paragraph" style="text-align:left;">That disconnect is one reason the document has drawn criticism from lawmakers. U.S. Rep. Bennie Thompson, the ranking member of the House Homeland Security Committee, described the strategy as a “mishmash of vague platitudes” and a long list of “we will” statements without a clear blueprint for execution.</p><p class="paragraph" style="text-align:left;">That criticism honestly captures the same reaction a lot of people had reading the document.</p><p class="paragraph" style="text-align:left;">When you strip away the language, the strategy largely boils down to statements that cybersecurity is important and the United States intends to improve its defenses.</p><p class="paragraph" style="text-align:left;">To be clear, cybersecurity absolutely is important, but a national strategy document needs to do more than say that.</p><p class="paragraph" style="text-align:left;">It needs to explain how the government plans to allocate resources, which agencies are responsible for what missions, how the public and private sectors will cooperate, and what concrete steps will be taken to strengthen defenses.</p><p class="paragraph" style="text-align:left;">Without that, you don’t really have a strategy.</p></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
