Threat Watch Feed
🚩 – IOCs Added
The red flag indicates that Indicators of Compromise (IOCs) have been added to SRA’s Threat Feed used by CyberSOC clients. Articles may not be flagged if IOCs are not available at the time or are not applicable to the article.
Threat Actors Exploit Salesforce Experience Cloud Guest User Misconfigurations Using Modified Aura Inspector
Salesforce Security published an advisory regarding an active campaign targeting misconfigured, publicly accessible Experience Cloud sites. Subsequent threat intelligence indicates the notorious extortion gang ShinyHunters is behind the attacks, claiming to have compromised between 300 and 400 organizations since September 2025, including approximately 100 high-profile cybersecurity and technology firms. The attackers are leveraging a custom-modified version of the open-source tool Aura Inspector—originally released by Mandiant in January 2026 for defensive auditing—to perform mass scanning and data exfiltration. By probing the /s/sfsites/aura API endpoint, the modified tool actively extracts sensitive data by exploiting overly permissive guest user profiles. To bypass Salesforce’s standard 2,000-record retrieval limit, ShinyHunters manipulated the sortBy parameter and utilized a technique to bundle multiple server-side actions into a single GraphQL request. While Salesforce maintains there is no inherent platform vulnerability, ShinyHunters claims to have discovered a new method to bypass recent fixes and exploit even properly configured instances, utilizing a custom tool with the user agent “Anthropic/RapeForceV2.01.39 (AGENTIC)”.
Impact: This identity-based targeting campaign allows threat actors to harvest massive amounts of sensitive personal data and CRM records directly from Salesforce databases without requiring authentication. ShinyHunters is actively extorting affected organizations, threatening to publish the stolen data on their leak site if ransom demands are not met. The harvested data is highly valuable for crafting sophisticated follow-on social engineering and voice phishing (vishing) campaigns against the affected organizations and their customers. Furthermore, if a vulnerable site has self-registration enabled, attackers can use the harvested data to create portal accounts, thereby escalating their access from an unauthenticated guest tier to an authenticated session with significantly broader data visibility.
Recommendation: Salesforce administrators should review and secure their Experience Cloud guest user configurations by enforcing a strict least-privilege model. The highest-impact remediation is to disable “Allow guest users to access public APIs” in site settings and uncheck “API Enabled” in the guest user profile’s System Permissions, which effectively closes the targeted Aura endpoint. Administrators should also set Org-Wide Defaults to “Private” for all external object access and disable “Portal User Visibility” and “Site User Visibility” to prevent the enumeration of internal org members. Additionally, disable self-registration features if they are not strictly required and actively review Aura Event Monitoring logs for anomalous access patterns, such as queries targeting non-public objects or unexpected traffic spikes from unfamiliar IP addresses.
Global Coalition Disrupts Tycoon2FA, a Massive Phishing-as-a-Service Platform Utilizing AiTM MFA Bypass
Microsoft, Europol, and industry partners announced a coordinated action to disrupt the service responsible for tens of millions of fraudulent emails reaching over 500,000 organizations each month worldwide. In addition, Microsoft published new analysis on the Tycoon2FA phishing-as-a-service (PhaaS) platform, which emerged in August 2023 and quickly became one of the most widely used adversary-in-the-middle (AiTM) phishing kits. The service was operated by a threat actor tracked as Storm-1747 and supported phishing campaigns that delivered tens of millions of messages monthly to more than 500,000 organizations across multiple sectors including government, healthcare, finance, education, and non-profits. The platform allowed attackers to impersonate authentication portals for services such as Microsoft 365, Outlook, SharePoint, OneDrive, and Gmail while providing operators with a centralized dashboard for configuring campaigns, managing infrastructure, and tracking compromised accounts. Tycoon2FA worked by acting as a proxy between the victim and the legitimate authentication service. When a target entered credentials on the phishing page, the kit relayed those credentials to the legitimate service in real time, triggered the MFA challenge, and captured the resulting authenticated session cookie once MFA was completed. This allowed attackers to access accounts without needing the password again and sometimes even after password resets if active sessions were not revoked. To evade detection, the platform used techniques such as dynamic CAPTCHA challenges, heavy code obfuscation, browser fingerprinting, geolocation filtering, redirect chains through legitimate services, and rapid domain rotation with short-lived phishing subdomains often lasting only 24–72 hours.
Impact: Tycoon2FA lowered the barrier to large-scale MFA bypass attacks by providing ready-to-use infrastructure and tooling for phishing operators. By capturing session cookies rather than just credentials, attackers could maintain authenticated access to targeted accounts and perform follow-on actions such as mailbox rule manipulation, data theft, additional phishing campaigns, or financial fraud. Because these campaigns mimic legitimate authentication flows and rely on real MFA interactions, organizations that rely solely on traditional MFA methods such as SMS or one-time passcodes remain vulnerable to account compromise through AiTM phishing.
Recommendation: Organizations should prioritize phishing-resistant authentication methods such as FIDO2 security keys, passkeys, Windows Hello for Business, or other passwordless MFA technologies to reduce the risk of session-cookie interception attacks. Enforce strict governance of authentication and identity systems by revoking active sessions when credentials are reset, auditing MFA device registrations, removing unauthorized inbox rules, and monitoring for suspicious sign-ins or token reuse. Email security controls such as link rewriting, time-of-click URL analysis, and automated phishing remediation should be enabled to reduce user exposure to malicious links and attachments. In addition, organizations should monitor for abnormal authentication behavior, suspicious redirect chains, and connections to known AiTM infrastructure while training users to recognize phishing attempts that impersonate common business workflows such as document sharing or account notifications.
🚩 Palo Alto Unit 42 Discovers Years of Undetected Cyberespionage by Chinese Threat Group CL-UNK-1068
Unit 42 disclosed an ongoing activity cluster it tracks as CL-UNK-1068, which it has observed since at least 2020 targeting organizations across South, Southeast, and East Asia. The activity has affected high-value sectors including aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications. Unit 42 assesses with high confidence that the operators are a Chinese threat actor and with moderate-to-high confidence that the primary objective is cyberespionage, though it said cybercriminal motivation cannot be fully ruled out. The activity relies on a broad toolset spanning Windows and Linux environments. Unit 42 observed the attackers using web shells such as GodZilla and a variation of AntSword for initial access, then stealing configuration files and other sensitive data from compromised servers. The group used legitimate Python executables for DLL side-loading, custom and community-sourced tools such as ScanPortPlus, FRP, Xnote, Mimikatz, LsaRecorder, DumpIt, Volatility, and SQL Server Management Studio Password Export Tool, along with multiple batch scripts for reconnaissance, credential theft, privilege escalation, log clearing, and file archiving. Unit 42 also described use of techniques such as Base64-encoding archived data with certutil and printing it through the web shell for exfiltration, rather than directly uploading files. This is confirmed operational activity observed over multiple campaigns, not proof-of-concept behavior.
Impact: The reported activity presents a significant risk to organizations in targeted sectors because it combines stealthy persistence, credential theft, reconnaissance, tunneling, and cross-platform tooling that can support long-term access and sensitive data theft. Unit 42 specifically observed theft of website configuration files, SQL-related data, browser artifacts, sensitive spreadsheet files, and database backups. The combination of open-source tools, custom malware, DLL side-loading, and living-off-the-land techniques makes the activity harder to distinguish from legitimate administrative behavior and may allow the threat actor to maintain covert access for extended periods.
Recommendation: Organizations should prioritize detection of behavioral patterns highlighted by Unit 42 rather than relying only on static indicators. Investigate misuse of legitimate Python binaries for DLL side-loading, deployment of unauthorized tunneling tools such as FRP, execution of custom reconnaissance batch scripts such as hp.bat, hpp.bat, rar.bat, or rr.bat, and suspicious use of WinRAR, certutil, type, DumpIt, Volatility, Mimikatz, and SQL credential extraction utilities on servers. Review both Windows and Linux environments for evidence of credential theft, tunneling, archived data staged for exfiltration, unexpected web shell activity, and unauthorized access to web server or SQL configuration files.
Microsoft Disclosed a ClickFix Campaign that Uses Windows Terminal to Launch Lumma Stealer and Evade Detections Focused on Run Dialog Abuse.
Microsoft Threat Intelligence discloseda widespread ClickFix social engineering campaign observed in February 2026 that uses Windows Terminal as the primary execution mechanism to deploy Lumma Stealer. Instead of the more familiar Win + R workflow, the campaign instructs targets to use the Windows + X → I shortcut to launch Windows Terminal directly. Microsoft said the lures were delivered through fake CAPTCHA pages, troubleshooting prompts, and similar verification-style themes designed to convince users to paste attacker-supplied commands. The attack begins when a user pastes a hex-encoded, XOR-compressed command into Windows Terminal. In one path, the command spawns additional Terminal and PowerShell instances, decodes the script, downloads a ZIP payload and a legitimate but renamed 7-Zip binary, and then extracts additional components. Microsoft said the follow-on activity includes retrieving more payloads, creating scheduled-task persistence, configuring Microsoft Defender exclusions, collecting machine and network data, and injecting Lumma Stealer into chrome.exe and msedge.exe using QueueUserAPC(). In a second path, the command downloads a randomly named batch script into AppData\Local, writes a VBScript into %TEMP%, re-executes through cmd.exe and MSBuild.exe, and connects to crypto blockchain RPC endpoints, which Microsoft said indicates etherhiding. Exploitation is confirmed by Microsoft’s observed campaign activity.
Impact: This campaign increases risk because it shifts ClickFix execution into Windows Terminal, which can appear more legitimate to users and may bypass detections built around Run dialog abuse. The resulting Lumma Stealer activity targets browser credential stores such as Web Data and Login Data, enabling theft of stored credentials and other browser artifacts. The observed follow-on behaviors also show potential for broader host compromise through persistence, defense evasion, system reconnaissance, and LOLBin abuse.
Recommendation: Hunt for suspicious wt.exe, PowerShell, cmd.exe, VBScript, MSBuild.exe, and renamed 7-Zip execution chains, especially where they originate from user-driven copy-and-paste activity or lead to files dropped in AppData\Local or %TEMP%. Review systems for unexpected scheduled tasks, unauthorized Microsoft Defender exclusions, outbound connections associated with crypto blockchain RPC endpoints, and signs of QueueUserAPC()-based injection into chrome.exe or msedge.exe.
Cognizant TriZetto Healthcare Portal Breach Exposes Health Data of 3.4 Million Patients
A report from March 6, 2026 states TriZetto Provider Solutions, a healthcare IT company operating under Cognizant since 2014, suffered a data breach affecting over 3.4 million individuals. The company detected suspicious activity on a web portal on October 2, 2025, but the investigation revealed unauthorized access had begun nearly a year earlier, on November 19, 2024. The breach targeted insurance eligibility verification transaction records used by health insurers and providers. Exposed data varies by individual and may include full names, physical addresses, dates of birth, Social Security numbers, health insurance member numbers, Medicare beneficiary identifiers, provider names, health insurer names, and broader demographic and health information. Financial data such as payment card or bank account details were not compromised. Affected providers were notified December 9, 2025, with consumer notifications beginning in early February 2026. No ransomware group has claimed responsibility, and no data has surfaced on underground forums.
Impact: The exposure of Social Security numbers, Medicare identifiers, and health insurance details for 3.4 million individuals could lead to identity theft, insurance fraud, and medical identity fraud. Affected patients may face unauthorized use of their insurance benefits. The nearly 10-month delay between initial unauthorized access and detection raises concerns about the volume of data potentially harvested. The extended notification gap may also expose TriZetto to regulatory scrutiny under HIPAA.
Recommendation: Individuals who receive notification letters should enroll promptly in the free 12-month Kroll credit monitoring and identity protection services offered by TriZetto. Place a credit freeze with all three major credit bureaus (Equifax, Experian, TransUnion) to prevent new accounts from being opened fraudulently. Monitor Explanation of Benefits statements from your insurer for unfamiliar claims or treatments. Be alert to phishing attempts that may exploit the exposed personal and health data. Healthcare organizations using TriZetto services should review access controls and audit logs on connected portals. Implement continuous anomaly detection on web-facing portals to reduce dwell time for unauthorized access. Ensure vendor contracts include breach notification timelines aligned with HIPAA requirements.
VOID#GEIST Multi-Stage Malware Campaign Delivers Three RATs via Phishing Emails
Securonix Threat Research disclosed on March 6, 2026 a multi-stage malware campaign dubbed VOID#GEIST that delivers three remote access trojans — XWorm, AsyncRAT, and Xeno RAT — through phishing emails carrying obfuscated batch scripts hosted on TryCloudflare domains. The campaign targets Windows endpoints and operates using a fileless execution approach, injecting encrypted shellcode directly into memory via Early Bird Asynchronous Procedure Call (APC) injection into explorer.exe instances, minimizing disk-based detection opportunities. The attack chain begins when a victim executes a phishing-delivered batch script, which displays a decoy financial document or invoice in full-screen Chrome as a distraction. Behind the scenes, it establishes user-level persistence by dropping an auxiliary batch script into the Windows Startup directory — requiring no privilege escalation and generating minimal security alerts. A legitimate Python runtime is then downloaded directly from python.org, creating a self-contained execution environment to decrypt and deploy all three RAT payloads. The infection concludes with an HTTP beacon to attacker-controlled C2 infrastructure hosted on TryCloudflare. Targets and confirmed compromises are not yet known.
Impact: Successful infection grants attackers remote access and control over compromised Windows systems through three concurrent RATs, which could lead to data exfiltration, credential theft, lateral movement, and persistent surveillance. The fileless, modular delivery method makes detection with traditional endpoint tools difficult. The use of legitimate infrastructure (TryCloudflare, python.org, Microsoft binaries) may allow the campaign to bypass network-level controls and firewall policies.
Recommendation: Block or alert on outbound connections to TryCloudflare tunnel domains at the network perimeter unless explicitly required for business operations. Configure endpoint detection rules to flag repeated process injection into explorer.exe within short time windows, as Securonix identifies this as a key behavioral indicator. Restrict execution of batch scripts and PowerShell with hidden window parameters via application control policies (e.g., AppLocker, Windows Defender Application Control). Disable or monitor the Windows Startup directory for unauthorized script placements. Train users to recognize phishing emails containing financial document lures. Enable script-block logging for PowerShell and audit AppInstallerPythonRedirector.exe usage. Deploy email filtering rules to quarantine messages containing .bat or .zip attachments from external senders.
Sign up here!
To receive the TIGR Threat Watch email bulletin and critical vulnerability notifications, simply complete the form below.
Follow on Twitter
@SRA_ThreatWatch will keep you up to date with the most recent posts on your social media feed.
Subscribe to the RSS
Just copy and add this link to your RSS app and be notified immediately when new intel is posted.
How to use RSS
Following the RSS feed is easy. RSS can be added in your Outlook desktop app, and there are many free RSS readers available for your mobile device.
To follow using Outlook:
- In Outlook, right-click the RSS Feeds folder and choose Add a New RSS Feed.
- In the New RSS Feed dialog box, enter the URL of the RSS Feed: https://sra.io/category/tigr/feed
(click here for detailed instructions and additional options for Outlook)
Popular mobile RSS reader apps include:
- Feedly
- NewsBlur
- RSS Reader
- Inoreader
After installing your preferred RSS reader, you will be able to add this feed by entering the URL: https://sra.io/category/tigr/feed
Threat Bulletin Archive
About TIGR Threat Watch
Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats. These notifications include details and recommendations for mitigation/remediation.




