24h | 7d | 30d

Overview

  • Drupal
  • Drupal core

20 May 2026
Published
22 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.02%

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Drupal Drupal core allows SQL Injection. This issue affects Drupal core: from 8.9.0 before 10.4.10, from 10.5.0 before 10.5.10, from 10.6.0 before 10.6.9, from 11.0.0 before 11.1.10, from 11.2.0 before 11.2.12, from 11.3.0 before 11.3.10.

Statistics

  • 12 Posts
  • 4 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Faille Drupal critique : injection SQL via PostgreSQL (CVE-2026-9082)

👉 cert.ssi.gouv.fr/avis/CERTFR-2

  • 3
  • 0
  • 1
  • 5h ago
Profile picture fallback
[RSS] CVE-2026-9082 | Drupal SQL Injection Vulnerability

https://horizon3.ai/attack-research/vulnerabilities/cve-2026-9082/
  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture fallback
The latest update for #HAProxy includes "HAProxy Enterprise WAF protects against Drupal core SA-CORE-2026-004 SQL Injection (CVE-2026-9082)" and "How HAProxy built its modern application delivery architecture". #DevOps #Kubernetes #Security https://opsmtrs.com/3aGSzYy
  • 0
  • 1
  • 0
  • 15h ago
Profile picture fallback
Drupal coreで危険度の高い脆弱性(CVE-2026-9082)、SQLインジェクションの恐れ rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
~Akamai~ A critical SQL injection flaw in Drupal core using PostgreSQL allows unauthenticated attackers to exfiltrate data via PHP array keys. - IOCs: CVE-2026-9082 - #Drupal #SQLi #ThreatIntel
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
[RSS] CVE-2026-9082 | Drupal SQL Injection Vulnerability horizon3.ai -> Original->
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
Keys to the Kingdom: Anonymous SQL Injection in Drupal Core (CVE-2026-9082)
  • 0
  • 0
  • 1
  • 4h ago
Profile picture fallback
Drupal detects active exploitation attempts for CVE-2026-9082, a PostgreSQL-backed SQL injection flaw, and warns that attackers may quickly escalate from probing to impact.
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
How it feels heading into the long weekend with CVE-2026-9082 just getting posted two days ago - www.drupal.org/sa-core-2026...
  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback
~Cybergcca~ 6 advisories released, highlighting a highly critical Drupal SQL injection (CVE-2026-9082) exploited in the wild and critical F5 NGINX flaws. - IOCs: CVE-2026-9082, CVE-2026-9256 - #CVE20269082 #Drupal #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Trend Micro, Inc.
  • TrendAI Apex One

21 May 2026
Published
22 May 2026
Updated

CVSS v3.1
MEDIUM (6.7)
EPSS
0.25%

Description

A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations. This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability.

Statistics

  • 6 Posts
  • 20 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

EITW ../ in Trend Micro Apex One. :brdAlert:

success.trendmicro.com/en-US/s

CVE-2026-34926

TrendAI has released updates to Apex One (on-premise), Apex One as a Service and Vision One - Standard Endpoint Protection (SEP) to resolve multiple vulnerabilities.

  • 9
  • 9
  • 0
  • 23h ago

Bluesky

Profile picture fallback
CVE-2026-34926 is a patched Apex One directory traversal flaw exploited in the wild, requiring admin access and affecting on-premises deployments.
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
TrendAI patched CVE-2026-34926, a zero-day exploited in the wild in on-premises Apex One. The flaw could let admins modify a key table and inject malicious code. Added to CISA's KEV. #ApexOne #CISA #KEV
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Trend Micro patched CVE-2026-34926, an Apex One zero-day exploited in the wild. The flaw in on-premises Windows deployments can enable code injection with admin access. CISA added it to the KEV list. #TrendMicro #ApexOne #CISA
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
CISAが既知の悪用された脆弱性2件をカタログに追加 CISA Adds Two Known Exploited Vulnerabilities to Catalog #CISA (May 21) CVE-2025-34291 Langflow Origin検証エラーの脆弱性 CVE-2026-34926 Trend Micro Apex One (オンプレミス) ディレクトリトラバーサル脆弱性 www.cisa.gov/news-events/...
  • 1
  • 0
  • 0
  • 20h ago
Profile picture fallback
~Cisa~ CISA added actively exploited flaws in Langflow and Trend Micro Apex One to its KEV catalog. - IOCs: CVE-2025-34291, CVE-2026-34926 - #CISA #KEV #ThreatIntel
  • 1
  • 0
  • 0
  • 14h ago

Overview

  • Microsoft
  • Microsoft Malware Protection Engine

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
6.55%

Description

Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.

Statistics

  • 8 Posts

Last activity: 9 hours ago

Fediverse

Profile picture fallback

📰 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges

⚠️ ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/mi

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

wacoca.com/news/2843035/ マイクロソフト、Defenderの悪用されたゼロデイを修正(CVE-2026-41091、CVE-2026-45498) | Codebook|Security News #Science&Technology #ScienceNews #TechnologyNews #テクノロジー #科学 #科学&テクノロジー

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture fallback
Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system.
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Microsoft Defenderの脆弱性が実際に悪用される事例が発生(CVE-2026-41091、CVE-2026-45498) Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498) #HelpNetSecurity (May 21) www.helpnetsecurity.com/2026/05/21/m...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Microsoft says CVE-2026-41091 and CVE-2026-45498 in Defender are actively exploited. One can raise local privileges to SYSTEM, the other causes DoS. Fixed in Defender platform updates. #Microsoft #Defender #CISA
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
マイクロソフト、Defenderの悪用されたゼロデイを修正(CVE-2026-41091、CVE-2026-45498) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45741/
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
マイクロソフト、Defenderの悪用されたゼロデイを修正(CVE-2026-41091、CVE-2026-45498) | Codebook|Security News https://www.wacoca.com/news/2843035/ マイクロソフト、Defenderの悪用されたゼロデイRedSunとUnDefendを修正(CVE-2026-41091、CVE-2026-45498) SecurityWeek – May 21, 2026 マイクロソフ [...]
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
There are 2 Zero-day vulnerabities in Microsoft Defender! CVE-2026-41091 and CVE-2026-45498 impacting to impact Microsoft Defender’s Malware Protection Engine and Antimalware Platform. www.linkedin.com/pulse/warnin...
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Cisco
  • Cisco Secure Workload

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.06%

KEV

Description

A vulnerability in the access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote attacker to access site resources with the privileges of the Site Admin role. This vulnerability is due to insufficient validation and authentication when accessing REST API endpoints. An attacker could exploit this vulnerability if they are able to send a crafted API request to an affected endpoint. A successful exploit could allow the attacker to read sensitive information and make configuration changes across tenant boundaries with the privileges of the Site Admin user. 

Statistics

  • 6 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Cisco Secure Workload-Schwachstelle CVE-2026-20223 - ist mit CVSS 3.1 Score 10.0 "a bisserl kritisch" - also patchen

borncity.com/blog/2026/05/22/k

  • 0
  • 0
  • 1
  • 8h ago

Bluesky

Profile picture fallback
Cisco patched CVE-2026-20223, a CVSS 10.0 Secure Workload REST API flaw that could let unauthenticated attackers access sensitive data and change tenant configurations. #Cisco #SecureWorkload #CVE202620223
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Cisco fixed maximum severity flaw CVE-2026-20223 in Secure Workload https://securityaffairs.com/192473/security/cisco-fixed-maximum-severity-flaw-cve-2026-20223-in-secure-workload.html
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
⚠️ #ALERTA CRÍTICA: #Vulnerabilidad de Escalada de Privilegios en #Cisco Secure Workload (CVE-2026-20223) (+CONTENCIÓN) www.newstecnicas.com/2026/05/aler...
  • 0
  • 0
  • 1
  • 3h ago

Overview

  • SonicWall
  • SonicOS

09 Jan 2025
Published
22 May 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.

Statistics

  • 6 Posts

Last activity: 7 hours ago

Fediverse

Profile picture fallback

“Patchato” non significa protetto: attaccanti bypassano l’MFA sui VPN SonicWall Gen6 e raggiungono i file server in 30 minuti

CVE-2024-12802 sulle appliance SonicWall Gen6 SSL-VPN viene sfruttata attivamente nonostante la patch disponibile. Il motivo: il fix firmware non basta — richiede sei passaggi manuali aggiuntivi che la maggior parte degli amministratori non esegue. Il risultato: attori del ransomware ecosystem bypassano l'MFA, entrano nelle reti e raggiungono i file server in meno di trenta minuti.

insicurezzadigitale.com/patcha

  • 0
  • 0
  • 1
  • 8h ago
Profile picture fallback

SonicWall warned in a security advisory for CVE-2024-12802 that installing the firmware update alone on Gen6 devices does not fully mitigate the vulnerability, and a manual reconfiguration of the LDAP server is required. bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • 7h ago

Bluesky

Profile picture fallback
📢 CVE-2024-12802 : exploitation active de SonicWall SSL VPN malgré le patch firmware 📝 ## 🔍 Contexte Publié le 19 mai 2026 par ReliaQuest Threat Research (a… https://cyberveille.ch/posts/2026-05-21-cve-2024-12802-exploitation-active-de-sonicwall-ssl-vpn-malgre-le-patch-firmware/ #Akira #Cyberveille
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
SonicWall Gen6 SSL-VPNでMFA回避 攻撃、CVE-2024-12802はファームウェア更新だけでは対策不十分 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Microsoft
  • Microsoft Defender Antimalware Platform

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
MEDIUM (4.0)
EPSS
2.77%

Description

Microsoft Defender Denial of Service Vulnerability

Statistics

  • 7 Posts

Last activity: 10 hours ago

Fediverse

Profile picture fallback

📰 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges

⚠️ ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/mi

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

wacoca.com/news/2843035/ マイクロソフト、Defenderの悪用されたゼロデイを修正(CVE-2026-41091、CVE-2026-45498) | Codebook|Security News #Science&Technology #ScienceNews #TechnologyNews #テクノロジー #科学 #科学&テクノロジー

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture fallback
Microsoft Defenderの脆弱性が実際に悪用される事例が発生(CVE-2026-41091、CVE-2026-45498) Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498) #HelpNetSecurity (May 21) www.helpnetsecurity.com/2026/05/21/m...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Microsoft says CVE-2026-41091 and CVE-2026-45498 in Defender are actively exploited. One can raise local privileges to SYSTEM, the other causes DoS. Fixed in Defender platform updates. #Microsoft #Defender #CISA
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
マイクロソフト、Defenderの悪用されたゼロデイを修正(CVE-2026-41091、CVE-2026-45498) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45741/
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
マイクロソフト、Defenderの悪用されたゼロデイを修正(CVE-2026-41091、CVE-2026-45498) | Codebook|Security News https://www.wacoca.com/news/2843035/ マイクロソフト、Defenderの悪用されたゼロデイRedSunとUnDefendを修正(CVE-2026-41091、CVE-2026-45498) SecurityWeek – May 21, 2026 マイクロソフ [...]
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
There are 2 Zero-day vulnerabities in Microsoft Defender! CVE-2026-41091 and CVE-2026-45498 impacting to impact Microsoft Defender’s Malware Protection Engine and Antimalware Platform. www.linkedin.com/pulse/warnin...
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Microsoft Corporation
  • Equation Editor

10 Jan 2018
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
93.89%

Description

Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload

In 2025, we observed pervasive SSH tunnel activity, which has remained active into 2026, affecting many government organizations and commercial companies in Russia and Belarus. Behind some of this activity is Cloud Atlas, a group we have known since 2014. During our investigation, we identified new tools used by this group, as well as indicators of compromise.

The group is back to sending out archives containing malicious shortcuts that launch PowerShell scripts. This technique is employed in addition to the previously described use of malicious documents, which exploit an old vulnerability in the Microsoft Office Equation Editor process (CVE-2018-0802) to download and execute malicious code. We have observed the use of third-party public utilities (Tor/SSH/RevSocks) to gain a foothold in infected systems and create additional backup control channels.

Technical details

Initial infection


As for the primary compromise, Cloud Atlas remains consistent in using phishing. In the observed campaigns, the attackers emailed a ZIP archive containing an LNK file as an attachment.


Malware execution flow

Attackers use LNK shortcuts to covertly execute PowerShell scripts hosted on external resources. The command line of the shortcut:

Example of the PowerShell script downloaded and executed by the shortcut:


Example of the PowerShell script downloaded by the shortcut

Actions performed by the downloaded PowerShell:

StepActionDescription1 Drops “$temp\fixed.ps1”Pre-staging: places the main payload locally in advance to ensure an execution capability independent of subsequent network connectivity or C2 availability.2Creates “Run” registry key “YandexBrowser_setup” for “$temp\fixed.ps1” startup
Early persistence: guarantees execution upon the next logon or reboot. If the script is interrupted during later stages, the payload will still activate automatically.3Downloads and drops “$temp\rar.zip”
Extracts “*.pdf” from the downloaded “$temp\rar.zip”Payload delivery: retrieves the decoy archive from the remote server to prepare user-facing content for the distraction phase.4Extracts “*.pdf” from the downloaded “$temp\rar.zip”Decoy preparation: unpacks the legitimate-looking document so it can be executed silently without requiring user interaction.6Opens extracted decoy document “*.pdf” with user’s default softwareUser distraction: opens a convincing document to maintain user engagement and creates a legitimate workflow appearance to buy additional 30–120 seconds for background operations.6Executes “taskkill.exe /F /Im winrar.exe”Process concealment: terminates the archive extractor to prevent the user from seeing the archive contents or noticing unexpected file extraction activity.7Searches and deletes “rar.zip”, “*.pdf.zip” and “*.pdf.lnk”Anti-forensic cleanup: removes the initial infection artifacts before activating the main payload, reducing the number of disk traces available for incident response or EDR correlation.8Executes “$temp\fixed.ps1”Controlled execution: launches the main payload only after persistence is secured, the user is distracted, and access traces are cleaned up.

Fixed.ps1 (loader)


The primary purpose of the Fixed.ps1 script is to deliver and install subsequent malware onto the compromised system, specifically VBCloud and PowerShower. Fixed.ps1 establishes persistence (by adding itself to registry Run keys), creates a decoy for the user (by opening a PDF document), and executes the next stages of the attack.

Fixed.ps1::Payload (VBCloud dropper)



Example of the fixed.ps1::Payload (VBCloud dropper)

This module functions as a dropper for the VBCloud backdoor. It drops two files onto the infected machine:

  • video.vbs: the loader of the backdoor,VBCloud::Launcher. This is a VBScript that decrypts the contents of video.mds (typically using RC4 with a hardcoded key) and executes it in memory.
  • video.mds: the encrypted body of the backdoor, VBCloud::Backdoor. This is the main module that connects to a C2 server to receive additional scripts or execute built-in commands. This backdoor is designed to function as a stealer, specifically targeting files with extensions of interest (such as DOC, PDF, XLS) and exfiltrating them.


Fixed.ps1::Payload (PowerShower)


This module installs a second backdoor called PowerShower on the system. We don’t have the specific script that performs this installation, but we assume it’s performed by a script similar to fixed.ps1::Payload (VBCloud dropper).

Unlike VBCloud, which focuses on file theft, PowerShower is primarily used for network reconnaissance and lateral movement within the victim’s infrastructure. PowerShower can perform the following tasks:

  • Collect information about running processes, administrator groups, and domain controllers.
  • Download and execute PowerShell scripts from the C2 server.
  • Conduct “Kerberoasting” attacks (stealing password hashes of Active Directory accounts).

PowerShower is dropped onto the system via the path ‘C:\Users\[username]\Pictures\googleearth.ps1’.


Contents of the googleearth.ps1(PowerShower)

PowerShower::Payload (credential grabber)


PowerShower downloads an additional script for stealing credentials. It performs the following actions:

  • Creates a Volume Shadow Copy of the C:\ drive.
  • Copies the SAM (stores local user password hashes) and SECURITY system files from this shadow copy to C:\Users\Public\Documents\, disguising them as PDF files.
  • The script is launched in several stages. To execute with high privileges, the script uses a UAC bypass technique via fodhelper.exe (a built-in Windows utility). This allows PowerShell to run as an administrator without directly prompting the user, which could otherwise raise suspicion.

The full launch chain looks like this:

The full Base64-decoded script is given below.


Multi-user RDP by patching termsrv.dll


Moving laterally across the victim’s network, the attackers executed a suspicious PowerShell script named rdp_new.ps1 (MD5 1A11B26DD0261EF27A112CE8B361C247):

The script is designed to allow multiple RDP sessions in Windows 10 by patching the termsrv.dll file. Termsrv.dll is the core Windows library that enforces Remote Desktop Services rules.

By default, Windows limits the number of simultaneous RDP sessions. Removing this restriction allows attackers to operate on the machine in the background without disconnecting the legitimate user, thereby reducing the likelihood of detection.

At first, the script enables RDP on the firewall and downgrades the RDP security settings:

Before modifying termsrv.dll, the script takes ownership and assigns itself full permissions. Then the script finds the sequence of bytes 39 81 3C 06 00 00 ?? ?? ?? ?? ?? ?? and replaces it with B8 00 01 00 00 89 81 38 06 00 00 90. After these manipulations, the script restarts the RDP service.


Example of script

The patched version allows multiple concurrent logins so attackers can stay connected without disrupting the legitimate user, thereby reducing suspicion.

Reverse SSH tunneling


As mentioned above, during this wave of attacks, the adversaries widely deployed reverse SSH tunnels to many hosts of interest. The compromised machine initiates an SSH connection to an attacker-controlled server, which allows attackers to bypass standard firewall rules via establishing outbound connections.

That way, even if the primary backdoor is discovered, the attackers can maintain control through the SSH tunnel.

To install a reverse SSH tunnel on a victim’s host, the attackers run VBS scripts via PAExec or PsExec.

We’ve seen three types of scripts:

  • Gen.vbs (WriteToSchedulerGenerateKey.vbs) generates key for SSH tunnel.
  • Run.vbs (WriteToSchedulerRunSSH.vbs) runs reverse SSH tunnel.
  • Kill.vbs (WriteToSchedulerKillSSH.vbs) stops reverse SSH tunnel via taskkill.exe.

To achieve persistence, the attackers added a new scheduled task in Windows:

In some cases, before establishing a reverse SSH tunnel, attackers set new access permissions to the folder containing the private key to prevent the legitimate user or system administrators from easily accessing or modifying it:


Patched OpenSSH


Some OpenSSH binaries used by the attackers had their imports modified. Instead of libcrypto.dll, the SSH executable imports syruntime.dll, which was placed in the same folder as the binary. This was likely done to evade detection and ensure stealth.

In addition, we found a portable version of OpenSSH, presumably compiled by the adversaries:


RevSocks


In addition to Reverse SSH tunnels, the attackers installed RevSocks using the same infrastructure. RevSocks is an alternative tool to SSH for establishing tunnels and proxy connections, written in Golang. This tool allows direct connection to workstations on the local network. It also allows attackers to gain access to other segments of the victim’s network by using the machine as a gateway. In some cases, C2 addresses were hardcoded into the binary; in other cases, the C2 was passed in command line arguments.

There were also reverse SOCKS samples with hardcoded C2 addresses:


Tor tunneling


To maintain control over the compromised host, the Tor network was used in some cases. A minimal set of a Tor executable and configuration files, necessary for launching HiddenService, was copied to the system directories of infected devices. The name of the Tor Browser executable file was modified. As a result, the infected machine was accessible via RDP from the Tor network when accessing the generated .onion domain.
Below is an example of a configuration file for routing connections from Tor to RDP ports on the local network, as well as example command lines for logging into Tor.


Example of TOR configuration file

PowerCloud


We analyzed a new Cloud Atlas tool, PowerCloud. It collects user data with administrator privileges and writes this information to Google Sheets in Base64 format.

The tool represents an obfuscated PowerShell script. In most cases, it is packaged into an executable file using the PS2EXE utility, but we have also encountered variants in the form of a separate PowerShell script.

To find administrators on the victim host, the tool executes the following command:

This information is appended with the computer name and current date, the data is encoded in base64, and then the collected data is added to an existing Google Sheet.


PowerCloud script

Browser checker


Additionally, the attackers used another PowerShell script (MD5 5329F7BFF9D0D5DB28821B86C26D628F), compiled into an executable file via PS2EXE, which checks whether browser processes (Chrome, Edge, Firefox, and other) are running. This helps detect when the user is working on the computer. This can be used to choose the optimal time for conducting attacks (for example, when the user is away but their browser is still open) or simply to gather information about the victim’s habits.

The information about running browsers is written to a log file on the local host.


Fragment of the deobfuscated script

Victims


According to our telemetry, in late 2025 and early 2026, the identified targets of the described malicious activities are located in Russia and Belarus. The targeted industries mostly include government agencies and diplomatic entities.

We attribute the activity described in this report to the Cloud Atlas APT group with a high degree of confidence. The group used techniques and tools described previously, such as the initial access vector, the Python script for information gathering, and the Tor application for forwarding ports to the Tor network. The victim profile and geography also matches the Cloud Atlas targets.

We couldn’t help but notice some parallels with recent Head Mare activity. The PhantomHeart backdoor (available in Russian only), attributed to Head Mare and used to create an SSH tunnel, was placed in directories actively used by Cloud Atlas:

  • C:\Windows\ime
  • C:\Windows\System32\ime
  • C:\Windows\pla
  • C:\Windows\inf
  • C:\Windows\migration
  • C:\Windows\System32\timecontrolsvc
  • C:\Windows\SKB

However, TTPs are still differentiated.

Conclusion


For more than ten years, the Cloud Atlas group has continued its activities and expanded its arsenal. Over the course of last year, many targeted campaigns in general were found to employ ReverseSocks, SSH and Tor, and the use of these utilities was no exception for Cloud Atlas. Creating such backup control channels using publicly available utilities significantly complicates the complete disruption of attackers’ actions on compromised systems. We will continue to closely monitor the group’s activity and describe their new tools and techniques.

Indicators of compromise


PowerCloud

7A95360B7E0EB5B107A3D231ABBC541A C:\Windows\wininet.exe
C0D1EAA15A2CEFBAB9735787575C8D8E C:\Windows\LiveKernelReports\update.exe
D5B38B252CF212A4A32763DE36732D40 C:\Windows\ime\imejp\dicts\i39884.exe
3C75CEDB1196DF5EAB91F31411ED4B33 C:\pla\reports.exe
42AC350BFBC5B4EB0FEDBA16C81919C7 C:\ProgramData\update_[redacted].exe
493B901D1B33EB577DB64AADD948F9CE C:\Windows\migration\wtr\MicrosoftBrowser.exe
2CABB721681455DAE1B6A26709DEF453 C:\Windows\pla\reports\winlog.exe
1B39E86EB772A0E40060B672B7F574F1 C:\Windows\System32\timecontrolsvc\vmnetdrv64.exe
1D401D6E6FC0B00AAA2C65A0AC0CFD6B C:\Windows\setup\scripts\install\software\activation\aact\dfsvc.exe
40A562B8600F843B717BC5951B2E3C29 C:\Windows\branding\scat.exe
F721A76DEB28FD0B80D27FCE6B8F5016 C:\Windows\ime\imekr\dicts\dfsvc.exe
D3C8AFD22BAA306FF659DB1FAC28574A C:\ProgramData\update_[redacted].exe
6D7B2D1172BBDB7340972D844F6F0717 C:\Users\[redacted]\AppData\Local\1c\1cv8\1cv8ud.exe
C:\Users\[redacted]\AppData\Local\1c\1cv8\svc.exe
9769F43B9DE8D19E803263267FA6D62E C:\Users\[redacted]\AppData\Local\1c\1cv8\1cv8ud.exe
63B6BE9AE8D8024A40B200CCCB438F1D C:\Windows\notepad.exe
6AA586BCC45CA2E92A4F0EF47E086FA1 C:\Windows\splwow32.exe
EBA3BCDB19A7E256BF8E2CC5B9C1CCA9 C:\Users\[redacted]\Desktop\soc\stant.exe
B4E183627B7399006C1BC47B3711E419 C:\WINDOWS\ime\service.exe
F56B31A4B47AD3365B18A7E922FBA1A8 dfsvc.exe
F6F62456FB0FCC396FB654CBED339BC3
25C8ED0511375DCA57EF136AC3FA0CCA C:\branding\dwmw.exe

Browser checker

5329F7BFF9D0D5DB28821B86C26D628F C:\ProgramData\checker_[redacted].exe

ReverseSocks

2B4BA4FACF8C299749771A3A4369782E C:\Windows\PLA\System\bounce.exe
C:\Windows\pla\print_status.exe
BA9CE06641067742F2AFC9691FAFF1DC C:\ProgramData\hp\client.exe
FB0F8027ACF1B1E47E07A63D8812ED50 C:\Windows\System32\timecontrolsvc\vmnetdrv64.exe
BBF1FA694122E07635DEEAC11AD712F8 C:\Windows\System32\HostManagement.exe
F301AA3D62B5095EEC4D8E34201A4769 C:\Windows\ime\imejp\msfu.exe
F9C3BBE108566D1A6B070F9C5FB03160 C:\Windows\ime\imetc\help\IMTCEN14.exe

Malicious MS Office documents

369B75BDCDED16469EDE7AB8BEDCFAE1
9EAAE9491F6A50D6DF0BE393734A44CB
3E6E9DF00A764B348EC611EE8504ACA0
9BD788F285E32A05E6591D1EB36EBFFC
F42085522EC2EBB16EDCF814E7C330AD
2042EB5D52F0B535A1CE6B6F954C8C2B
2AA1E9765EF6B00B94A9B6BE0041436A
36120F5E9411BCBAC7104EF3FA964ED2
5000A353399500BC78381DC95B6ED2DC
579A9952D31CAD801A3988DBE7914CE7
867B634588C0FD6B26684D502C15AB03
38FA4306FA4406BA31CF171AF4D36E34
83EDDE9F7EEEFAC0363413972F35572B
CC751619BFEC0DC4607C17112B9E3B2C
A632858F14B36F03D0F213F5F5D6BFF2
097CA205AD9E3B72018750280904718C
69121C36EB8BF77962DCA825FCFFD873
C5702EB250F855C8C872FFFB9BB656ED
ED34F5A136FBA4FDEA976570FAA33ED7
0577DB70844E88B32B954906E2F20798
28ECF8FB6719E14231B94B4D37629B0E
0857C84B62289A1A9F29E19244E9A499
0C514E137860F489E3801213460EF938
50568B1F9335A7E3BA4E5DF035A8FB86
7F776AD200287D6DE14A29158C457179
51F7F794ED43FB90D0F8EBBB5EFFE628
B8C753DD254509FBA5077FFD5067EAB0
BC3739DEC8CD8F54F3F60A85F3ED600E
EC076CD21C483A40156F4E40D08DADED
216CB7F31D383C0DD892B284DF05A495
116F59E70A9DF97F4ADAEA71EECB1E9A
7242AC065B50BCDE9308756B49DBADCB
8158552950D2E13B075001CE0C52AA97
A75DBED984963B9AB21309C5B2F8FD9B
0320DD389FDBAB25D46792BD2817675E
5339D1A666F3E40FE756505CF1D87D4B
67D7E3AEEB673BF60C59361C12A4ED81
89572F0ED20791A5AC9FC4267D67CCB0
B6AAE073E7BFEBF4D643C2BBEB5C02E1
344CA9EA07CD4AC90EF27F8890D4EC05

Domains and IPs


Reverse SSH/Socks domains

tenkoff[.]org
cloudguide[.]in
goverru[.]com
kufar[.]org
ultimatecore[.]net
spbnews[.]net
onedrivesupport[.]net

Malicious and compromised domains used in MS Office documents

amerikastaj[.]com
bigbang[.]me
paleturquoise-dragonfly-364512.hostingersite[.]com
wizzifi[.]com
totallegacy[.]org
mamurjor[.]com
landscapeuganda[.]com
lafortunaitalian.co[.]uk
kommando[.]live
internationalcommoditiesllc[.]com
humanitas[.]si
fishingflytackle[.]com
firsai.tipshub[.]net
alnakhlah.com[.]sa
allgoodsdirect.com[.]au
agenciakharis.com[.]br

Powershell payload staging

istochnik[.]org
znews[.]neti
investika-club[.]com
194.102.104[.]207
46.17.45[.]56
46.17.45[.]49
46.17.44[.]125
46.17.44[.]212
185.22.154[.]73
194.87.196[.]163
195.58.49[.]9
93.125.114[.]193
93.125.114[.]57
45.87.219[.]116
37.228.129[.]224
185.53.179[.]136
185.126.239[.]77
5.181.21[.]75
146.70.53[.]171
45.15.65[.]134
185.250.181[.]207
81.30.105[.]71

File paths


VBS scripts

WriteToSchedulerKillSSH.vbs
Create_task_day.vbs
WriteToSchedulerGenerateKey.vbs
C:\Windows\INF\Run.vbs
c:\Windows\INF\install.vbs
Update.vbs
c:\Windows\PLA\System\Gen.vbs
C:\Windows\INF\GenK.vbs
c:\Windows\PLA\System\Kill.vbs
c:\Windows\PLA\System\Run.vbs

ssh.exe

c:\Windows\ime\imejp\Asset.exe
c:\Windows\PLA\System\conhosts.exe
c:\Windows\INF\BITS\esentprf.exe
c:\Windows\INF\MSDTC\RuntimeBrokers.exe
c:\Windows\inf\diagnostic.exe

ReverseSocks

C:\Windows\PLA\System\bounce.exe
C:\ProgramData\hp\client.exe
C:\Windows\System32\timecontrolsvc\vmnetdrv64.exe

Tor client

C:\Windows\Resources\Update\Intel.exe
C:\Windows\INF\package.exe

securelist.com/cloud-atlas-202…

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

Cloud Atlas APT campaigns targeting Russia & Belarus are leveraging phishing, CVE-2018-0802, SSH tunnels, and a new “PowerCloud” tool that exfiltrates data into Google Sheets.

technadu.com/cloud-atlas-apt-t

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Cloud Atlas APT is reportedly targeting government & diplomatic entities in Russia and Belarus using phishing emails, CVE-2018-0802 exploits, and a new “PowerCloud” exfiltration tool that writes stolen data into Google Sheets. #CyberSecurity #APT #ThreatIntel #InfoSec
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Linux
  • Linux

15 May 2026
Published
22 May 2026
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.

Statistics

  • 5 Posts

Last activity: Last hour

Fediverse

Profile picture fallback

A newly disclosed Linux kernel vulnerability, tracked as CVE-2026-46333, went unnoticed for nearly nine years.

Researchers from Qualys Threat Research Unit say the vulnerability could allow attackers to steal sensitive information, including SSH private keys, and run arbitrary commands with root-level privileges on affected systems.

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

CVE-2026-46333 patches are live for AlmaLinux 8, 9 & 10.

Community testing pushed them from testing → production faster than we could've managed alone. Get the patched kernels now if you haven't already! almalinux.org/blog/2026-05-15-

  • 0
  • 0
  • 1
  • Last hour
Profile picture fallback

To update the linux kernel for some recent local privilege escalation bugs CVE-2026-43284, CVE-2026-46333, CVE-2026-46300 (we do have some mitigations installed) we will have to reboot it yet again. We'll do that around 16:15 UTC today (in about 3.5 hours from now). If everything goes according to plan then this should not take more than a couple of minutes. This will briefly interrupt some services for sourceware.org, valgrind.org, cygwin.com, gcc.gnu.org, elfutils.org and dwarfstd.org.

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • TryGhost
  • Ghost

20 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
63.49%

KEV

Description

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Thanks again! Yeah the read access from the SQL injection allowed exfiltration of admin API keys at which point game over. I don't see any malicious themes or changes to the theme file ... instead it seems like it was the vulnerability descried in blog.xlab.qianxin.com/ghost-cm (which I don't think had been published yet when I was doing the cleanup, or at least I didn't find it in my searching). Basically the hack edited every posts to put in a script in the "codeinjection_footer" field that brings the payload in from a malware site.

There aren't any obvious signs of LPE exploitation but who knows ... another good argument for spinning up a new instance.

@mildsunrise @JadedBlueEyes @thenexusofprivacy@gotosocial.thenexus.today

  • 0
  • 0
  • 0
  • 23h ago

Bluesky

Profile picture fallback
XLab researchers show how threat actors exploited CVE-2026-26980 to compromise Ghost CMS, causing numerous websites to become accomplices in ClickFix attacks. blog.xlab.qianxin.com/ghost-cms-pa...
  • 1
  • 0
  • 0
  • 9h ago

Overview

  • Python Software Foundation
  • CPython
  • http.client

10 Apr 2026
Published
12 May 2026
Updated

CVSS v4.0
MEDIUM (5.7)
EPSS
0.02%

KEV

Description

CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture fallback

Really feels like @dvl and I are the only people who actually read our #FreeBSD package security alerts, given the apparent complete lack of urgency on the part of anyone else to fix the two-months-outstanding lang/python* CVEs like CVE-2026-1502.

  • 0
  • 4
  • 0
  • 19h ago
Profile picture fallback

RE: mastodon.social/@wollman/11661

@distrowatch @kaidenshi @brnrd

<vuxml.freebsd.org/freebsd/30bd> for CVE-2026-1502, one of the five vulnerable ports is deprecated but not yet expired.

295200 – lang/python314: Update to 3.14.5 — <bugs.freebsd.org/bugzilla/show>

285957 – lang/python312 as default python — <bugs.freebsd.org/bugzilla/show>

Cc @dvl

  • 0
  • 0
  • 0
  • 18h ago
Showing 1 to 10 of 56 CVEs