Trending Topics

Trending Topics
TRENDING TOPICS MAR 06, 2026

China-Linked APT UAT-9244 Breaches South American Telecoms with a Malware Campaign

A China-linked threat group known as UAT-9244 is aggressively targeting telecommunications providers across South America with a sophisticated malware toolkit designed for persistence, espionage, and stealth. Active since 2024, the group is believed to share operational patterns with espionage outfits like FamousSparrow and Tropic Trooper, according to new research from Cisco Talos. UAT-9244 employs a three-pronged attack strategy featuring both Windows and Linux implants to compromise endpoints and network edge devices. Its first tool, TernDoor, uses DLL side-loading via a seemingly harmless executable, “wsprint[.]exe,” to decrypt and launch its payload, allowing remote command execution, file management, and system reconnaissance while disabling security defenses. A built-in uninstall switch (“-u”) allows attackers to erase evidence with a single command. The second component, PeerTime, or “angrypeer,” is a Linux backdoor that leverages the BitTorrent protocol to communicate with C2 infrastructure, share payloads among infected peers, and propagate via BusyBox utilities. BruteEntry, the third element, is a Go-based brute-force scanner deployed on compromised network devices, turning them into relay nodes that perform large-scale SSH, Postgres, and Tomcat scans for further intrusion. On Windows systems, persistence is achieved through hidden scheduled tasks and modified registry keys. Combined, these tools form a resilient attack chain that enables UAT-9244 to infiltrate, expand, and maintain access to critical telecom networks; a clear signal of escalating state-sponsored cyber operations targeting global communication infrastructure.

ClickFix Scam Evolves: Attackers Hijack Windows Terminal to Deploy Lumma Stealer

A new evolution of the long-running ClickFix scam is manipulating Windows users into launching Windows Terminal and pasting malicious commands themselves, handing control to the Lumma Stealer malware. According to Microsoft Threat Intelligence, this latest campaign, active since February, modifies the traditional ClickFix technique, which previously used the Win + R “Run” dialog, by now abusing the Windows + X → I shortcut to open Windows Terminal instead, sidestepping common security detections. The scam lures victims through fake verification pages or CAPTCHA prompts that instruct them to copy and paste a seemingly harmless command for troubleshooting or connection checks. In reality, the encoded command launches a multi-step PowerShell script that downloads a disguised 7-Zip utility, extracts malicious components, disables Microsoft Defender protections, and installs Lumma Stealer to harvest login credentials from Chrome and Edge. A secondary version of the campaign drops a VBScript payload that is executed via native Windows tools like MSBuild, even reaching out to blockchain infrastructure in a tactic known as EtherHiding, before executing the same credential theft process. The enduring success of ClickFix lies in simple human deception, tricking users into running the infection chain themselves. Microsoft’s report highlights how the attackers are adapting the old formula to exploit trust in legitimate tools, betting that most people won’t question commands executed inside Windows Terminal.

Weaponizing Trust: The Rise of RMM Abuse in Modern Cyber Attacks

Cybercriminals are increasingly exploiting trusted RMM tools to evade detection, maintain persistence, and execute attacks under the guise of legitimate IT activity. By embedding themselves within trusted administrative software, attackers gain hands-on keyboard access that often slips past EDR controls. The Huntress 2026 Cyber Threat Report reveals a 277% surge in RMM abuse in 2025, underscoring how adversaries now favor convenience over creating custom malware. Most compromises begin with social engineering; phishing emails impersonating e-signature requests, invoices, or voicemail alerts that trick users into installing malicious RMM agents. Once inside, attackers can automate tasks, move laterally, and launch ransomware in under an hour, especially when targeting Managed Service Providers to reach multiple downstream clients in a single supply chain attack. Defending against this trend demands behavioral monitoring rather than blind trust in approved software; security teams must baseline normal activity, flag unusual script execution, and enforce strict allowlists for authorized remote tools. Fingerprinting known RMM executables, verifying connection endpoints, and treating unrecognized remote sessions as potential intrusions are essential. Beyond technology, cultivating a vigilant workforce through ongoing security awareness training remains critical; employees who report suspicious activity can halt an attack before it evolves from infiltration to impact.

Top CVEs of the Week

Top CVEs of the Week – As part of our ongoing vulnerability monitoring, the following CVEs highlight recent security issues that could affect a range of systems, applications, and devices. These findings reflect the constantly evolving threat landscape and reinforce the importance of timely patching, secure configurations, and proactive security practices. Below is a summary of notable vulnerabilities, including their impact and any available remediation guidance.

Actively Exploited CVEs - March 2026
CVE-2026-21385
High Severity
Vulnerability Description
A memory corruption flaw in multiple Qualcomm chipsets caused by an integer overflow (CWE-190) during memory allocation, allowing attackers to execute code, escalate privileges, or crash devices. CISA confirmed active exploitation and requires Federal agencies to patch or mitigate it by March 24, 2026, under BOD 22-01. All organizations should apply Qualcomm updates immediately or discontinue affected products if no patch is available.
Active Exploitation Confirmed
CVE-2026-22719
High Severity
Vulnerability Description
A command injection vulnerability (CVSS 8.1) in Broadcom's VMware Aria Operations, allowing unauthenticated remote attackers to execute arbitrary commands and achieve remote code execution during support-assisted product migrations. Added to CISA's KEV catalog on March 3, 2026, it mandates Federal Civilian Executive Branch agencies to apply patches or discontinue use by March 24, 2026, under BOD 22-01. Organizations should install Broadcom updates immediately, monitor for exploitation, and follow CISA alerts if no fixes are available.
Active Exploitation Confirmed
CVE-2026-20128
High Severity
Vulnerability Description
A local privilege escalation flaw in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager, where a readable credential file lets low-privileged users with valid vmanage access recover the DCA password and gain DCA user privileges on other systems. Cisco reports active exploitation and urges customers to upgrade to fixed releases (20.18 or later), closely monitor filesystem and authentication logs for misuse of DCA credentials, and harden access controls on SD-WAN Manager systems.
Active Exploitation Confirmed
CVE-2025-64328
High Severity
Vulnerability Description
A high severity post authentication command-injection flaw in Sangoma FreePBX Endpoint Manager that allows authenticated admin users to execute arbitrary shell commands as the asterisk user, enabling full PBX compromise and remote access. Actively exploited in the wild to deploy EncystPHP web shells and hijack over 900 internet exposed FreePBX systems. This vulnerability is fixed in FreePBX version 17.0.3. Administrators should urgently upgrade, lock down admin access, and hunt for web shells or suspicious outbound calls on existing deployments.
Active Exploitation Confirmed
CVE-2026-20122
Medium Severity
Vulnerability Description
An arbitrary-file-overwrite vulnerability in the Cisco Catalyst SD-WAN Manager (vManage) API caused by improper file-handling, allowing authenticated remote attackers with read-only API credentials to upload malicious files and gain vManage-level privileges. The flaw, categorized under CWE-648 (Incorrect Use of Privileged APIs), is being actively exploited, so organizations should urgently apply Cisco patches, restrict and monitor API access, and tighten controls around read-only accounts in SD-WAN environments.
Active Exploitation Confirmed
💡
Hunter Strategy encourages our readers to look for updates in our daily Trending Topics and on Twitter.

Read more