๐บ๐ฌ Des SMS pro-Museveni envoyรฉs aux clients de MTN en plein blackout numรฉrique
La nouvelle รฉdition de Courts-circuits (2-8 fรฉvrier 2026), c'est par-ici : https://coupecircuit.substack.com/p/des-sms-pro-museveni-envoyes-aux
๐บ๐ฌ Des SMS pro-Museveni envoyรฉs aux clients de MTN en plein blackout numรฉrique
La nouvelle รฉdition de Courts-circuits (2-8 fรฉvrier 2026), c'est par-ici : https://coupecircuit.substack.com/p/des-sms-pro-museveni-envoyes-aux
๐๐๐๐ค๐ข๐ง๐ ๐๐๐ฆ๐ฉ๐๐ข๐ ๐ง ๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ฌ ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐ข๐ง๐๐จ๐ฐ๐ฌ ๐๐ข๐ง๐๐๐ ๐๐ฎ๐ฅ๐ง๐๐ซ๐๐๐ข๐ฅ๐ข๐ญ๐ฒ
A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point Software have said.
๐ The attackers leveraged CVE-2025-8088, a path traversal vulnerability in the widely used file archive and compression software WinRAR, which was first disclosed by ESET in August 2025.
โฑ๏ธ Check Pointโs analysis of the campaign suggested that attackers were actively exploiting the vulnerability within days of its disclosure.
๐ CVE-2025-8088 enables the creation of arbitrary code by crafting malicious archive files. This lets attackers execute code and maintain persistence on targeted machines, allowing them to secretly monitor users and collect sensitive data.
๐ Check Point researchers noted that the attacks had a focus on government institutions and law enforcement agencies in Southeast Asia, pointing to a cyber-espionage campaign with the goal of collecting intelligence for geopolitical goals.
๐จ๐ณ Researchers concluded that the campaign was being conducted by a group dubbed Amarath-Dragon. The tools, techniques and procedures by Amarath-Dragon closely resemble APT 41, the prolific Chinese state-linked cyber-espionage and hacking group.
๐จ๏ธ โThe campaigns by Amaranth-Dragon exploiting the CVE-2025-8088 vulnerability highlight the recent trend of sophisticated threat actors rapidly weaponizing newly disclosed vulnerabilities,โ Check Point Research said in a blog post.
๐ฐ https://www.infosecurity-magazine.com/news/hacking-exploits-windows-winrar/
Comment lโIran a coupรฉ internet pour prรจs de 90 millions de personnes
๐ฎ๐ท On explore ce qu'il s'est passรฉ, exactement, pour l'internet iranien en janvier. Chiffres, graphiques et chronologie ร l'appui ๐
Iran : analyse dโune coupure internet sans prรฉcรฉdent 1/3
๐ฐ https://coupecircuit.substack.com/p/comment-liran-a-coupe-linternet-pour
๐๐ฉ๐๐ง๐๐ฅ๐๐ฐ ๐๐ง๐ ๐๐จ๐ฅ๐ญ๐๐จ๐จ๐ค ๐๐๐ง๐ญ ๐๐ข๐ซ๐๐ฅ โ ๐๐จ ๐๐ข๐ ๐๐ก๐๐ข๐ซ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ก๐จ๐ซ๐ญ๐๐จ๐ฆ๐ข๐ง๐ ๐ฌ
New findings by Paul McCarty reveal 386 fake crypto trading 'skills' in the project behind the viral OpenClaw AI assistant tool (aka Moltbot/Clawdbot) can lead users to install information-stealing malware.
These malicious skills masquerade as cryptocurrency trading automation tools and target ByBit, Polymarket, Axiom, Reddit and LinkedIn.
The researcher said he contacted the OpenClaw team multiple times and that Peter Steinberger, the creator of OpenClaw, said he had too much to do to address this issue.
McCarthy also noted that the vast majority of the malicious skills are still available on the official ClawHub/MoltHub GitHub repository and the command-and-control infrastructure appears to still be operational.
๐ฐ https://www.infosecurity-magazine.com/news/malicious-crypto-trading-skills/
---
Meanwhile, Moltbook, the Reddit-like social networking platform built for AI agents contained a misconfigured database which allowed full read and write access to all data, security researchers have revealed.
In a new report, Wiz's Gal Nagli showed that a simple non-intrusive security review revealed a Supabase API key exposed in client-side JavaScript. This single point of failure granted unauthenticated access to the entire production database, claimed Nagli.
๐ฐ https://www.infosecurity-magazine.com/news/moltbook-exposes-user-data-api/
๐๐๐ฏ๐ฒ๐ฟ๐ฐ๐ฟ๐ถ๐บ๐ฒ ๐จ๐ป๐ถ๐ ๐ผ๐ณ ๐ฃ๐ฎ๐ฟ๐ถ๐ ๐ฃ๐ฟ๐ผ๐๐ฒ๐ฐ๐๐๐ผ๐ฟ๐ ๐ฅ๐ฎ๐ถ๐ฑ ๐๐น๐ผ๐ป ๐ ๐๐๐ธโ๐ ๐ซ ๐ข๐ณ๐ณ๐ถ๐ฐ๐ฒ๐ ๐ถ๐ป ๐๐ฟ๐ฎ๐ป๐ฐ๐ฒ
๐ซ๐ท The cybercrime unit of the Paris Prosecutorโs Office raided X offices in Paris.
Musk and Linda Yaccarino were summoned for voluntary interviews in Paris on April 20.
๐ฐ https://www.infosecurity-magazine.com/news/paris-prosecutors-raid-elon-musk-x/
๐ ๐ฉ๐๐น๐ป๐ช๐ฎ๐๐ฐ๐ต ๐๐ฟ๐ถ๐ฑ๐ฎ๐: ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ญ๐ฎ๐ด๐ญ
Ivanti announced emergency patches for two critical vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, in EPMM that have been exploited in the wild as zero-days.
๐จIvanti advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
๐ watchTowr analysis: https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/
๐ CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
๐พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2026-1281
๐ก๐ฒ๐ ๐๐-๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐ฒ๐ฑ ๐ ๐ฎ๐น๐๐ฎ๐ฟ๐ฒ ๐๐ฎ๐บ๐ฝ๐ฎ๐ถ๐ด๐ป ๐ง๐ฎ๐ฟ๐ด๐ฒ๐๐ ๐๐ฟ๐ฎ๐ป๐ถ๐ฎ๐ป ๐ฃ๐ฟ๐ผ๐๐ฒ๐๐๐
๐ฎ๐ท HarfangLab has reported that a new malicious campaign is spreading malware against people in Iran, likely including NGOs and individuals involved in documenting recent human rights abuses.
๐ฐ https://www.infosecurity-magazine.com/news/ai-malware-redkitten-iranian/
๐ก๐๐ช - ๐๐ฟ๐ฎ๐ป๐ฐ๐ฒ ๐๐ถ๐ป๐ฒ๐ ๐ก๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐๐บ๐ฝ๐น๐ผ๐๐บ๐ฒ๐ป๐ ๐๐ด๐ฒ๐ป๐ฐ๐ ๐ฎ โฌ๐ฑ๐บ ๐ข๐๐ฒ๐ฟ ๐ฎ๐ฌ๐ฎ๐ฐ ๐๐ฎ๐๐ฎ ๐๐ฟ๐ฒ๐ฎ๐ฐ๐ต
France Travail has received a โฌ5m fine from France's data protection regulator for security failures that led to the compromise of an estimated 43 million jobseekers.
๐ฐ https://www.infosecurity-magazine.com/news/france-finesemployment-agency-5m/
๐ก๐๐ช - ๐๐๐ ๐ง๐ฎ๐ธ๐ฒ๐ ๐๐ผ๐๐ป ๐ฅ๐๐ ๐ฃ ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ ๐๐ผ๐ฟ๐๐บ
RAMP's clear and dark web sites are down and replaced by a law enforcement banner showing the message: โThis site has been seized.โ
While thew FBI has made no official statements, the domains linked to RAMP now redirect to seizure notices with FBI and DoJ seals and the nameservers have been updated to ns1.fbi.seized.gov and ns2.fbi.seized.gov, confirming the seizure by US law enforcement.
In a message shared on XSS, 'Stallman,' the RAMP administrator, confirmed the takedown and said he has no plans to build a replacement. He wrote: โI regret to inform you that law enforcement has seized control of the Ramp forumโฆ This event has destroyed years of my work building the freest forum in the worldโฆ Itโs a risk we all take.โ
๐ฐ https://www.infosecurity-magazine.com/news/fbi-takes-down-ramp-ransomware/
Des signes montrent un fragile retour d'une certaine forme de connectivtรฉ depuis l'Iran ๐ฎ๐ท
Mais la rรฉalitรฉ pourrait รชtre plus complexe...
๐ฐ https://coupecircuit.substack.com/p/retour-de-linternet-en-iran-pas-si
๐ ๐๐ฎ๐ฅ๐ง๐๐๐ญ๐๐ก ๐๐จ๐ง๐๐๐ฒ: ๐๐๐-2024-37079
CISA added a critical vulnerability affecting VMware vCenter Server to its known exploited vulnerabilities (KEV) list despite the flaw being patched in June 2024.
๐จ Broadcom/VMware advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
๐ข CISA KEV entry: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
๐ View JSON: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
๐ ๐ฉ๐๐น๐ป๐ช๐ฎ๐๐ฐ๐ต ๐๐ฟ๐ถ๐ฑ๐ฎ๐: ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฑ-๐ฏ๐ฐ๐ฌ๐ฎ๐ฒ
An authentication bypass in the Versa Networks Concerto SD-WAN orchestration platform that could allow an attacker to access administrative endpoints has been added to CISA's KEV catalog, confirming of active exploitation in the wild.
๐จProjectDiscovery alert: https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce
๐ Versa advisory: https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e
๐ข CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
๐พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2025-34026
๐ VulnWatch Monday: CVE-2026-0629
TP-Link has released fixes for a major security vulnerability affecting 32 of its VIGI C and VIGI InSight professional surveillance cameras, which could allow attackers to seize full control of vulnerable devices.
๐จ TP-Link advisory: https://www.tp-link.com/us/support/faq/4899/
๐พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2026-0629
๐ VulnWatch Friday: CVE-2025-53690 ๐
China-linked hacking group UAT-8837 is exploiting CVE-2025-53690 (Sitecore vulnerability) to breach North American critical infrastructure, deploying the WeepSteel backdoor, according to @TalosSecurity.
๐จ Sitecore advisory: https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003865
๐ Mandiant report: https://cloud.google.com/blog/topics/threat-intelligence/viewstate-deserialization-zero-day-vulnerability/?hl=en
๐ Talos report: https://blog.talosintelligence.com/uat-8837/
๐พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2025-53690
Ouganda : l'internet coupรฉ deux jours avant le scrutin
Le gouvernement avait pourtant promis de maintenir lโaccรจs ร internet avant l'รฉlection prรฉsidentielle...
https://coupe-circuit.ghost.io/ouganda-coupure-internet-election-presidentielle-2026/
Cette information a (malheureusement) รฉtรฉ confirmรฉe par @netblocks@mastodon.social et
@cloudflareradar
@netblocks@bird.makeup @cloudflare@noc.social @cloudflare@cloudflare.social
RE: https://infosec.exchange/@coupecircuit/115888302026012023
๐จ URGENT ๐บ๐ฌ Possible suspension de l'internet en Ouganda ร venir
Une source vient de me partager un document en provenance de la Uganda Communications Commission, prรฉvoyant une suspension de lโaccรจs ร internet dans le pays ร 18 heures ce 13 janvier. A croiser avec d'autres sources.
๐ฎ๐ท L'Iran vit la plus grande coupure internet de son histoire
Pour comprendre ce qu'il se passe dans le pays, c'est par ici : https://coupecircuit.substack.com/p/liran-vit-la-plus-grande-coupure?utm_source=post-email-title&publication_id=3791850&post_id=184434820&utm_campaign=email-post-title&isFreemail=false&r=zesd&triedRedirect=true&utm_medium=email
๐ VulnWatch Monday: CVE-2026-21858 ๐
aka "Ni8mare"
A security researcher reported a critical vulnerability in popular AI workflow automation platform n8n that could enable adversaries to compromise enterprise secrets.
๐ฐ https://www.infosecurity-magazine.com/news/maximum-severity-ni8mare-bug/
Pourquoi Taรฏwan bloque RedNote (mais pas TikTok)
Cette semaine, dans Coupe-circuit: https://open.substack.com/pub/coupecircuit/p/pourquoi-taiwan-bloque-rednote-mais?utm_campaign=post-expanded-share&utm_medium=web