It's been a busy 24 hours in the cyber world with significant updates on nation-state activity, several actively exploited vulnerabilities, major data breaches, and a stark reminder about insider threats and the evolving regulatory landscape. Let's dive in:
Recent Cyber Attacks and Breaches β οΈ
- Wynn Resorts confirmed an employee data breach after the ShinyHunters extortion gang listed them, claiming over 800k records with PII (including SSNs) were stolen. Wynn stated the attackers claimed to have deleted the data, a claim security experts view with scepticism, often implying a ransom payment.
- Medical device manufacturer UFP Technologies reported a cyberattack where some IT systems were isolated and data was stolen or destroyed, though backups facilitated restoration. The company is investigating the extent of sensitive data exfiltration and expects cyber insurance to cover most costs.
- Marquis Software Solutions is suing SonicWall, alleging gross negligence led to a ransomware attack affecting 74 US banks. The breach was traced to a security flaw in SonicWall's MySonicWall cloud backup service, exposing configuration data and MFA scratch codes, rather than an unpatched firewall vulnerability.
- Health insurance tech provider TriZetto Provider Solutions updated a 2024 data breach figure, now impacting over 3.4 million people. A hacker accessed historical eligibility reports via a web portal, exposing sensitive healthcare data including SSNs and health insurance numbers.
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/
ποΈ The Record | https://therecord.media/ufp-technologies-medical-devices-sec-filing-cyberattack
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/
ποΈ The Record | https://therecord.media/trizetto-healthcare-tech-company-data-breach-update
π΅πΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/25/wynn_resorts_shinyhunters/
New Threat Research: Actors, Malware, and Tradecraft π‘οΈ
- North Korea's Lazarus Group has been observed deploying Medusa ransomware in recent attacks, including against a Middle Eastern organisation and an unsuccessful attempt on a US healthcare entity. This highlights Lazarus's continued financial motivation and willingness to target critical infrastructure.
- Google's Threat Intelligence Group (GTIG) and Mandiant disrupted a global espionage campaign by suspected Chinese threat actor UNC2814, impacting 53 organisations in 42 countries. The group used a new C-based backdoor, 'GRIDTIDE,' which abuses the Google Sheets API for evasive command-and-control (C2) operations, blending malicious traffic with normal activity.
- A financially motivated group, "Diesel Vortex," is targeting freight and logistics operators in the US and Europe with sophisticated phishing campaigns using 52 domains. They stole over 1,600 unique credentials, employing Cyrillic homoglyph tricks, voice phishing, and a multi-stage cloaking process to evade detection and facilitate cargo diversion.
- A new cybercrime service, '1Campaign,' enables threat actors to run persistent malicious Google Ads by cloaking techniques. It filters out security researchers, showing benign content to them while directing real victims to phishing or crypto-drainer sites, effectively evading scrutiny.
- Telephone-Oriented Attack Delivery (TOAD) phishing emails, which contain only a phone number in a fake billing notification, are increasingly bypassing secure email gateways. This is due to their indistinguishability from legitimate business contacts, often combined with other evasion tactics like QR codes and multi-hop redirects.
- Hackers are luring Next.js developers with malicious GitHub repositories disguised as legitimate job interview projects. These repos execute secret-stealing malware in memory, often triggered by Visual Studio Code's workspace automation or running the project's development server, exfiltrating sensitive data like source code and secrets.
- OpenAI has banned a user with links to Chinese law enforcement who attempted to use ChatGPT to plan and track smear campaigns against critics of the Chinese Communist Party, including the Japanese Prime Minister. This highlights the use of AI in sophisticated influence operations and transnational repression tactics like creating fake obituaries and mass-reporting social media accounts.
πΆοΈ Dark Reading | https://www.darkreading.com/cyberattacks-data-breaches/lazarus-group-new-position-medusa-ransomware
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breached-dozens-of-telecom-firms-govt-agencies/
π΅πΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/25/google_and_friends_disrupt_unc2814/
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/1campaign-platform-helps-malicious-google-ads-evade-detection/
πΆοΈ Dark Reading | https://www.darkreading.com/threat-intelligence/why-call-this-number-toad-emails-beat-gateways
π΅πΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/25/fake_interview_repos_lure_nextjs_devs_into_running_secret_stealing_malware/
π΅πΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/25/chinese_law_enforcement_chatgpt_abuse/
π€« CyberScoop | https://cyberscoop.com/chinese-chatgpt-online-harassment-campaign-against-critics-dissidents/
Vulnerabilities: RCE, Active Exploitation, and Zero-Days π
- Five Eyes agencies issued urgent warnings about a critical authentication bypass vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN, actively exploited as a zero-day since 2023. Attackers can gain high-privileged access, add rogue peers, and potentially escalate to root by exploiting CVE-2022-20775. Immediate patching, restricted WAN exposure, and hunting for IoCs are crucial.
- Zyxel has released security updates for a critical Remote Code Execution (RCE) vulnerability (CVE-2025-13942) affecting over a dozen router models. The flaw in the UPnP function allows unauthenticated attackers to execute OS commands via crafted SOAP requests, though WAN access must also be enabled for remote exploitation.
ποΈ The Record | https://therecord.media/five-eyes-warn-hackers-exploit-cisco-sd-wan
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023/
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers/
Threat Landscape Commentary π
- A VulnCheck report highlights that despite over 40,000 new vulnerabilities published in 2025, only 422 (1%) were actively exploited in the wild. This underscores the need for defenders to prioritise based on known exploited vulnerabilities, as network edge devices remain prime targets.
- While AI models like Anthropic's Claude Code Security are effective at identifying software vulnerabilities (500+ in open-source codebases), security researchers note a significant gap in their ability to propose actionable fixes. The sheer volume of AI-generated reports is overwhelming maintainers, highlighting that discovery is cheap, but remediation is hard.
- Researchers from Georgia Tech found that the global threat intelligence (TI) ecosystem is vulnerable to adversarial actions and geopolitical fragmentation. Their study revealed many security vendors conduct shallow malware analysis and rarely share binaries, leading to slow information propagation.
- A new "Operational Technology Incident (OTI) Impact Score" model, inspired by the Richter Scale, has been developed to provide a standardised way to measure the impact of OT cybersecurity incidents. It scores events based on severity, reach, and duration, aiming to offer clearer communication for executives, governments, and insurers.
π€« CyberScoop | https://cyberscoop.com/vulncheck-exploited-vulnerabilities-report-2025/
π΅πΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/24/ai_finding_bugs/
π΅πΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/25/threat_intelligence_supply_chain_research/
πΆοΈ Dark Reading | https://www.darkreading.com/ics-ot-security/richter-scale-model-measures-cyber-incidents
Regulatory Issues and Changes βοΈ
- Peter Williams, former general manager of L3Harris's cybersecurity unit, was sentenced to 87 months in prison for stealing and selling eight zero-day exploits to Russian broker Operation Zero. The US Treasury also sanctioned Operation Zero (Matrix LLC), its owner Sergey Zelenyuk, and associated entities, marking the first use of the Protecting American Intellectual Property Act (PAIPA).
- Interpol, with law enforcement from 16 African countries and private companies, conducted "Operation Red Card 2.0," leading to 651 arrests and recovering over $4.3 million. The operation targeted investment fraud, mobile loan fraud, and cybercrime syndicates, highlighting growing efforts against cybercrime in Africa.
- China's top prosecutorial agency is intensifying criminal enforcement against commercial espionage and technology leaks to protect domestic innovation. Over 1,200 business secret infringement cases were handled from 2021-2024, focusing on AI, biomanufacturing, and energy sectors.
π€« CyberScoop | https://cyberscoop.com/l3harris-executive-peter-williams-sentenced-zero-day-exploits-russian-broker/
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/ex-l3harris-exec-jailed-for-selling-zero-days-to-russian-exploit-broker/
π¨ The Hacker News | https://thehackernews.com/2026/02/defense-contractor-employee-jailed-for.html
π΅πΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/25/former_l3harris_exec_jailed/
π€ Bleeping Computer | https://www.bleepingcomputer.com/news/security/us-sanctions-russian-exploit-broker-for-buying-stolen-zero-days/
πΆοΈ Dark Reading | https://www.darkreading.com/cybersecurity-operations/operation-red-card-2-0-leads-to-651-arrests-in-africa
ποΈ The Record | https://therecord.media/china-domestic-ip-theft-crackdown
Government Staffing or Program Changes ποΈ
- The Cybersecurity and Infrastructure Security Agency (CISA) is reportedly "decimated" and "in trouble" a year into the second Trump administration. The agency has lost roughly a third of its personnel, shuttered divisions (like election security), and seen a decline in morale due to political backlash, leading to diminished capabilities.
π€« CyberScoop | https://cyberscoop.com/cisa-personnel-cuts-trump-second-term-analysis/
Everything Else π
- A Moscow resident, Ruslan Satuchin, is accused of attempting to extort money from the notorious Conti ransomware group by posing as an FSB officer. He allegedly contacted Conti members in September 2022, demanding payment to avoid criminal prosecution.
ποΈ The Record | https://therecord.media/moscow-man-accused-of-extorting-conti-gang
#CyberSecurity #ThreatIntelligence #Ransomware #NationState #APT #ZeroDay #Vulnerability #Phishing #AI #DataBreach #IncidentResponse #Cybercrime #InfoSec #CISA #OTSecurity