TIGR Threat Watch

Threat Watch Feed

🚩 – IOCs Added

The red flag indicates that Indicators of Compromise (IOCs) have been added to SRA’s Threat Feed used by CyberSOC clients. Articles may not be flagged if IOCs are not available at the time or are not applicable to the article.

🚩 Pawn Storm Deploys PRISMEX Malware Suite Exploiting Zero-Day Vulnerabilities Against Defense Supply Chains

Trend Micro reported in March 2026 that the Russia-aligned APT group Pawn Storm (APT28/Fancy Bear) is actively targeting Ukrainian defense supply chains and allied infrastructure using a new malware framework named PRISMEX. The campaign has been active since at least September 2025 and escalated significantly in early 2026, targeting government, military, logistics, and humanitarian organizations across Eastern and Central Europe. The attack chain begins with spear-phishing emails delivering malicious RTF documents that exploit CVE-2026-21509, a Microsoft Office OLE security bypass vulnerability, requiring only that the document be opened. This triggers the retrieval of a malicious .lnk file, which may further exploit CVE-2026-21513, a zero-day vulnerability in the MSHTML framework, enabling code execution without user warnings. The PRISMEX framework then executes a multi-stage, largely fileless infection chain using steganography to hide payloads in images, COM hijacking for persistence, and in-memory execution via .NET assembly loading. Command-and-control communication leverages legitimate cloud storage services to blend malicious traffic with normal activity.

Impact: This campaign enables both espionage and potentially destructive operations. Attackers can gain persistent access to critical infrastructure, exfiltrate sensitive data, and potentially deploy disruptive capabilities such as wiper functionality. Targeting logistics hubs, weather services, and supply chain entities increases the risk of operational disruption supporting military and humanitarian efforts.

Recommendation: Organizations should patch CVE-2026-21509 and CVE-2026-21513 across all systems. Restrict or disable unnecessary COM objects, such as Shell.Explorer.1 and where feasible. Enforce strict controls on Office macros and block execution of RTF files from untrusted sources. Monitor for abnormal CLR loading behavior in non-.NET processes such as explorer.exe, and investigate COM registry modifications under user-controlled paths. Inspect outbound traffic to cloud storage services for anomalous patterns and implement allow-listing where possible. Adopt a behavioral detection strategy focused on in-memory execution and trusted service abuse rather than relying solely on signature-based detection.

🚩 Silver Fox Campaign Uses Tax-Themed Phishing to Deploy RATs, RMM Tools, and Python Stealers

Sekoia reported in March 2026 ongoing campaigns by the China-linked Silver Fox intrusion set, which blends cybercrime and espionage techniques. The group uses tax-themed phishing emails and fake government communications to lure victims—primarily across South Asia—into executing malicious payloads. These campaigns have evolved significantly from 2025 to 2026, shifting from delivering ValleyRAT via malicious PDFs to abusing legitimate remote monitoring and management (RMM) tools and, most recently, deploying a custom Python-based stealer disguised as a WhatsApp application. The attack chain typically begins with phishing emails impersonating national tax authorities, prompting users to open attachments or download files. Earlier campaigns delivered ValleyRAT through DLL sideloading, while later waves leveraged signed RMM tools with embedded command-and-control (C2) information in filenames to evade detection. The most recent variant deploys a Python stealer that collects credentials and sensitive data, exfiltrating it to attacker-controlled infrastructure. Across all variants, Silver Fox demonstrates consistent use of culturally relevant lures, adaptable tooling, and infrastructure reuse to maintain access and avoid detection.

Impact: Successful compromise can result in credential theft, persistent remote access, and potential follow-on attacks such as business email compromise or broader supply chain compromise. The campaign’s ability to leverage legitimate tools and evolve delivery mechanisms increases the likelihood of successful intrusion and prolonged attacker presence within affected environments.

Recommendation: Organizations should reinforce phishing defenses, particularly around financial or tax-related themes. Monitor for execution of unexpected archives or installers originating from email or external websites. Detect misuse of legitimate RMM tools, especially when invoked with unusual naming conventions or external IP references. Inspect endpoints for unauthorized data collection activity and outbound connections to unknown infrastructure. Enforce least privilege on user systems and restrict execution of untrusted binaries. Conduct regular threat hunting for persistence mechanisms such as registry Run keys and abnormal scheduled tasks.

🚩 TeamPCP Weaponizes Security Tools in Multi-Stage Supply Chain Attack Targeting CI/CD and Cloud Infrastructure

Summary: Unit 42 reported in March 2026 that threat group TeamPCP conducted a large-scale supply chain attack compromising widely trusted security and developer tools, including Trivy, KICS, LiteLLM, and the Telnyx Python SDK. The campaign injected malicious code into GitHub Actions workflows and PyPI packages, allowing payloads to execute automatically during routine CI/CD operations. The attack leveraged stolen credentials and publishing tokens to poison package versions and repositories. Malware executed silently within pipelines, harvesting sensitive data such as cloud access tokens, SSH keys, Kubernetes secrets, and API credentials. The campaign evolved into a multi-stage operation deploying infostealers, persistent backdoors, and a worm component (CanisterWorm) capable of lateral movement across environments. Advanced techniques included reading process memory to extract secrets, abusing Python .pth files for automatic execution, and using steganography in audio files to deliver payloads. Command-and-control infrastructure relied on typosquatted domains and decentralized mechanisms to evade detection.

Impact: This campaign provides attackers with deep access into development pipelines and production environments, enabling large-scale credential theft and potential downstream compromise. Reported impact includes hundreds of thousands of affected systems and significant volumes of exfiltrated data. The use of trusted security tools increases the likelihood of widespread exposure, while worm-like propagation and wiper capabilities introduce risk of both operational disruption and destructive attacks.

Recommendation: Organizations should audit CI/CD pipelines, dependency chains, and software bill of materials (SBOM) for affected packages. Enforce strict version pinning and disable automatic execution of unverified package scripts. Rotate all exposed credentials, including cloud tokens, SSH keys, and Kubernetes secrets. Monitor for unusual access to instance metadata services, Kubernetes APIs, and environment variables. Implement least privilege across pipeline environments and restrict outbound connections to untrusted domains. Strengthen supply chain security controls by validating package integrity and limiting reliance on unverified third-party components.

🚩 GlassWorm Supply Chain Malware Targets Developers to Steal Credentials and Deploy RAT

Malwarebytes reported on March 26, 2026 a supply chain malware campaign named GlassWorm that targets developers through compromised or malicious packages distributed via repositories such as npm, PyPI, GitHub, and Visual Studio Code extensions. The campaign begins when a developer installs or updates a seemingly legitimate package that has been tampered with or published from a compromised maintainer account. After installation, a hidden preinstall script fingerprints the system and delays execution before retrieving stage-two payload details from the Solana blockchain, avoiding static infrastructure indicators. The malware then deploys an infostealer targeting browser data, cryptocurrency wallets, npm tokens, git credentials, and cloud secrets. In later stages, it installs a Node.js-based remote access trojan and a malicious browser extension masquerading as “Google Docs Offline,” which captures cookies, keystrokes, clipboard data, browsing history, and session activity. Persistence is established through scheduled tasks and registry Run keys, while command-and-control infrastructure is dynamically resolved using distributed hash tables and blockchain lookups.

Impact: GlassWorm enables credential theft, persistent remote access, and browser-level surveillance on developer systems. Compromised credentials and tokens may allow attackers to access source code repositories, cloud environments, and CI/CD pipelines, increasing the risk of downstream supply chain attacks and broader organizational compromise.

Recommendation: Organizations should enforce dependency version pinning and review any unexpected package updates or maintainer changes before deployment. Audit systems for the presence of unauthorized browser extensions, especially those mimicking legitimate tools such as “Google Docs Offline.” Monitor for persistence mechanisms including scheduled tasks and registry Run keys tied to unknown scripts. Inspect outbound connections for blockchain-based or dynamic infrastructure resolution patterns. Restrict access to sensitive credentials stored on developer systems and rotate any exposed tokens. Deploy endpoint monitoring to detect unauthorized script execution and browser data access.

🚩 WhatsApp Malware Campaign Delivers VBS Payloads and MSI Backdoors via Cloud Services

Microsoft Defender Security Research reported in March 2026 an active malware campaign observed since late February 2026 that uses WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The campaign targets Windows systems and relies on user execution of scripts delivered through a trusted messaging platform. Once executed, the malware initiates a multi-stage infection chain designed to establish persistence and enable remote access. The infection chain uses renamed legitimate Windows utilities, including curl.exe and bitsadmin.exe, to download additional payloads from cloud services such as AWS S3, Tencent Cloud, and Backblaze B2. The malware creates hidden directories under C:\ProgramData, retrieves secondary VBS scripts, and attempts repeated User Account Control (UAC) bypass by modifying registry keys such as HKLM\Software\Microsoft\Win. In the final stage, it deploys unsigned MSI installers (e.g., Setup.msi, AnyDesk.msi) to establish persistent remote access while blending in with normal software installation activity.

Impact: The campaign provides attackers with persistent remote access to compromised systems. This enables data exfiltration, deployment of additional malware, and use of infected devices for further activity. The use of trusted platforms like WhatsApp and cloud storage increases the likelihood of user interaction and reduces detection through traditional network controls.

Recommendation: Organizations should block or restrict execution of script hosts such as wscript.exe, cscript.exe, and mshta.exe from user-writable or untrusted paths. Monitor for renamed system utilities where file names do not match OriginalFileName metadata. Inspect outbound traffic to cloud storage services for anomalous download behavior. Detect registry modifications related to UAC settings under HKLM\Software\Microsoft\Win. Block unsigned or unexpected MSI installations, especially those executed from ProgramData or temporary directories. Educate users to treat unexpected WhatsApp attachments as untrusted and prevent execution of unsolicited scripts.

Cisco Talos Reports 2025 Threat Activity Was Defined by Rapid Vulnerability Weaponization, Identity-Focused Attacks, and Persistent Exploitation of Legacy Systems

Cisco Talos’ 2025 Year in Review highlights a threat landscape shaped by two parallel trends: newly disclosed vulnerabilities were weaponized almost immediately, while older flaws such as Log4j, PHPUnit, and Adobe ColdFusion continued to be exploited at scale. The report states that React2Shell was the most targeted vulnerability of 2025, despite only being disclosed in December, and that nearly 40% of the top-targeted vulnerabilities impacted end-of-life devices. Talos also found that network infrastructure, identity systems, and management platforms were major priorities for attackers, alongside continued ransomware, phishing, and state-sponsored activity. Across the report, Talos describes attackers prioritizing systems that validate trust and broker access, including VPNs, ADCs, firewalls, and network management platforms. The report also notes that MFA-targeting activity intensified, with fraudulent device registration events increasing 178% year over year, while phishing remained central to both initial access and post-compromise activity. In ransomware, manufacturing remained the top-targeted sector and Qilin emerged as the most active group by volume. Talos further reports increased China-nexus investigations, persistent Russian activity tied to the war in Ukraine, major North Korean social engineering and cryptocurrency theft operations, and Iranian activity focused on stealthy access and hacktivist disruption. The AI section concludes that AI is increasingly being used to automate portions of the attack chain and lower barriers for social engineering and malware development.

Impact: The report points to a threat environment where defenders face both shrinking response windows for newly disclosed flaws and persistent exposure from long-standing, deeply embedded vulnerabilities. Attackers are increasingly targeting identity infrastructure, network control points, and management planes because compromise at those layers can yield broad, high-trust access across enterprise environments. The combined effect is a higher likelihood of credential theft, MFA bypass, ransomware disruption, phishing-based compromise, and long-tail risk from legacy or supply-chain-dependent systems.

Recommendation: Patch and exposure management programs should account for both newly disclosed internet-facing flaws and older vulnerabilities embedded in frameworks, legacy applications, and end-of-life devices. Security teams should prioritize hardening identity-adjacent infrastructure such as VPNs, ADCs, firewalls, and management platforms, since Talos identifies these as key control points attackers target for broad access. MFA protections should be reviewed with attention to spray attacks, device registration abuse, and administrator-assisted enrollment workflows. Phishing defenses should also reflect the continued use of workflow-based lures, especially those tied to finance, IT, travel, and internal business processes. Finally, organizations should validate ransomware readiness during lower-activity periods, improve visibility into network and management planes, and prepare for growing use of AI to support phishing, malware development, and attacker automation.

Sign up here!

To receive the TIGR Threat Watch email bulletin and critical vulnerability notifications, simply complete the form below.

 

Follow on Twitter

@SRA_ThreatWatch will keep you up to date with the most recent posts on your social media feed.

Subscribe to the RSS

Just copy and add this link to your RSS app and be notified immediately when new intel is posted.

How to use RSS

Following the RSS feed is easy. RSS can be added in your Outlook desktop app, and there are many free RSS readers available for your mobile device.

To follow using Outlook:

  • In Outlook, right-click the RSS Feeds folder and choose Add a New RSS Feed.
  • In the New RSS Feed dialog box, enter the URL of the RSS Feed: https://sra.io/category/tigr/feed

(click here for detailed instructions and additional options for Outlook)

Popular mobile RSS reader apps include:

  • Feedly
  • NewsBlur
  • RSS Reader
  • Inoreader

After installing your preferred RSS reader, you will be able to add this feed by entering the URL: https://sra.io/category/tigr/feed

Threat Bulletin Archive

About TIGR Threat Watch

Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats. These notifications include details and recommendations for mitigation/remediation.