Apple Expands Updates to iOS 18 Devices Affected by DarkSword Exploit
Apple has expanded the availability of updates for iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect against the DarkSword exploit. This exploit is a six-vulnerability chain (CVE-2025-31277, CVE-2025-43529, CVE-2026-20700, CVE-2025-14174, CVE-2025-43510, CVE-2025-43520) targeting iPhones running iOS 18.4 through 18.7, which allows extensive access to device data, including messages, stored passwords, and location history, after a user visits a compromised website with minimal interaction. Attacks have been observed in Saudi Arabia, Turkey, Malaysia, and Ukraine, with a recent campaign attributed to Star Blizzard (TA446/COLDRIVER) targeting government, think tank, higher education, financial, and legal entities. The exploit kit's public availability on GitHub lowers the barrier for other actors. While 74% of recent iPhones run iOS 26, which is not vulnerable, approximately 20% of iOS devices remain exposed, partly due to user reluctance to upgrade from iOS 18. Security teams are advised to push iOS 18.7.7 to all managed devices still on iOS 18, upgrade to iOS 26, or enable Lockdown Mode for high-risk users, as DarkSword does not execute on devices with this feature enabled.
Severity: Critical
Threat Details and IOCs
| Malware: | Aisuru, Coruna, CryptoWaters, Darksword, DarkSword, Deblind, Ghostblade, GhostBlade, GHOSTBLADE, Ghostknife, GhostKnife, GHOSTKNIFE, Ghostsaber, GhostSaber, GHOSTSABER, Infamous Chisel, KimWolf, Wana Decrypt0r 2.0, WannaCry, WannaCrypt, WannaCryptor, WCry |
|---|---|
| CVEs: | CVE-2021-30952, CVE-2022-48503, CVE-2023-32409, CVE-2023-32434, CVE-2023-38606, CVE-2023-41974, CVE-2023-43000, CVE-2023-43010, CVE-2024-23222, CVE-2024-23225, CVE-2025-14174, CVE-2025-31277, CVE-2025-32432, CVE-2025-43300, CVE-2025-43376, CVE-2025-43510, CVE-2025-43520, CVE-2025-43529, CVE-2025-43534, CVE-2025-54068, CVE-2025-55177, CVE-2026-20637, CVE-2026-20643, CVE-2026-20687, CVE-2026-20690, CVE-2026-20700, CVE-2026-28864, CVE-2026-28865, CVE-2026-28866, CVE-2026-28878, CVE-2026-28880 |
| Technologies: | Apple iOS, Apple iPhone, Apple iPod touch, Apple macOS, Apple Safari, Apple tvOS, Apple visionOS, Apple watchOS, Craft CMS, Google Android, Google Chrome, Laravel, Mozilla Firefox |
| Threat Actors: | APT29, APT38, Callisto, Coldriver, DarkMatterGroup, Ghostblade, Ghostknife, Ghostsaber, LazarusGroup, MatrixLLC, PARSDefense, Sandworm, Seaborgium, ShadowBrokers, StarBlizzard, TA446, UNC6353, UNC6691, UNC6748 |
| Attacker Countries: | China, Malaysia, North Korea, Russia, Saudi Arabia, Turkey, Ukraine, United States |
| Attacker IPs: | 141[.]105[.]130[.]237, 62[.]72[.]21[.]10, 72[.]60[.]98[.]48 |
| Attacker Domains: | 7aac[.]gov[.]ua, api[.]cloud-content-delivery[.]net, backup[.]cloud-content-delivery[.]net, bridetvstreaming[.]org, cdn[.]cdncounter[.]net, cdn[.]cloud-content-delivery[.]net, cdncounter[.]net, cdn[.]uacounter[.]com, count[.]cdncounter[.]net, e5[.]malaymoil[.]com, motorbeylimited[.]com, novosti[.]dn[.]ua, sahibndn[.]io, shapelie[.]com, snapshare[.]chat, sqwas[.]shapelie[.]com, static[.]cdncounter[.]net, uacounter[.]com |
| Attacker URLs: | hxxp[://]sqwas[.]shapelie[.]com[:]8882/stats, hxxps[://]sqwas[.]shapelie[.]com[:]8881/stats, hxxps[://]static[.]cdncounter[.]net/assets/index.html, hxxps[://]static[.]cdncounter[.]net/assets/pe_main.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_loader.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_module_18.6.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_module.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_worker_18.4.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_worker_18.6.js, hxxps[://]static[.]cdncounter[.]net/assets/sbx0_main_18.4.js, hxxps[://]static[.]cdncounter[.]net/assets/sbx1_main.js, hxxps[://]static[.]cdncounter[.]net/pe_main.js, hxxps[://]static[.]cdncounter[.]net/rce_module_18.6.js, hxxps[://]static[.]cdncounter[.]net/rce_module.js, hxxps[://]static[.]cdncounter[.]net/rce_worker_18.4.js, hxxps[://]static[.]cdncounter[.]net/rce_worker_18.6.js, hxxps[://]static[.]cdncounter[.]net/sbx0_main_18.4.js, hxxps[://]static[.]cdncounter[.]net/sbx1_main.js, hxxps[://]static[.]cdncounter[.]net/widget.js, hxxps[://]static[.]cdncounter[.]net/widgets.js?uhfiu27fajf2948fjfefaa42, hxxps[:]//api.cloud-content-delivery.net/v1/, hxxps[:]//backup.cloud-content-delivery.net/v1/, hxxps[:]//cdn.cloud-content-delivery.net/client.js, hxxps[:]//snapshare.chat/frame.html, x-safari-https[:]//snapshare.chat/, x-safari-https[:]//snapshare.chat/ |
| Attacker Hashes: | 2e5a56beb63f21d9347310412ae6efb29fd3db2d3a3fc0798865a29a3c578d35, 5fa967dbef026679212f1a6ffa68d575, 762045d2fb8cf416129ffce6d02decc3, 7c85d1644804f5a3695e5db537cb2afca7665d9c |
| Victim Industries: | Aerospace, Business Services, Cryptocurrency, Defense, E-commerce, Education, Financial Services, Food & Beverage, Food Processing, Government, Healthcare, Industrials, Industrial Sector, Information Technology, Legal Services, Manufacturing, Media and Entertainment, Multimedia, Nonprofit, Professional, Scientific, and Technical Services, Public Administration, Public Sector, Retail, Security & Surveillance, Social Media, Technology Hardware, Telecommunications, Think Tanks |
| Victim Countries: | Brunei, Cambodia, China, Indonesia, Laos, Malaysia, Myanmar, Philippines, Russia, Saudi Arabia, Singapore, Thailand, Timor-Leste, Turkey, Ukraine, United Kingdom, United States, Vietnam |
Mitigation Advice
- Use your Mobile Device Management (MDM) solution to enforce an immediate update on all corporate iPhones and iPads to iOS 18.7.7 / iPadOS 18.7.7 or newer.
- Enable Lockdown Mode on iOS devices for high-risk users, such as executives, finance, and IT administrators, to provide an additional layer of protection.
- Use your vulnerability management or MDM tool to scan for and identify all devices running vulnerable iOS or iPadOS versions between 18.4 and 18.7.
Compliance Best Practices
- Develop and enforce a strict mobile device update policy that mandates the installation of critical security patches within a defined, short timeframe. Use your MDM platform to automate compliance and restrict network access for non-compliant devices.
- Establish a formal user risk-profiling program to classify employees based on their roles and data access. Use these risk profiles to apply tiered security controls to their devices automatically.
- Deploy or enhance a DNS filtering or Secure Web Gateway (SWG) solution to block access to known malicious domains and categories of websites that are frequently compromised.
https://buaq.net/go-403386.html
https://buaq.net/go-403503.html
https://buaq.net/go-403568.html
https://buaq.net/go-403762.html
https://buaq.net/go-404348.html
https://buaq.net/go-407273.html
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/
https://cyberguy.com/security/darksword-leak-millions-iphone-users-risk/
https://cyberinsider.com/apple-expands-darksword-protections-to-more-iphones-with-ios-18-7-7-update/
https://cyberinsider.com/apple-publishes-security-guidance-in-response-to-darksword-attacks/
https://cyberpress.org/apple-flaws-darksword-ios-attack-chain/
https://cyberpress.org/apple-rolls-out-ios-18-7-7/
https://cyberpress.org/new-ios-exploit-uses-advanced-iphone-hacking/
https://dataconomy.com/2026/03/23/apple-urges-iphone-updates-to-block-darksword-hacking-tool/
https://exploit-intel.com/vuln/CVE-2025-31277
https://exploit-intel.com/vuln/CVE-2025-43510
https://exploit-intel.com/vuln/CVE-2025-43520
https://gbhackers.com/apple-ios-18-7-7-update-defend-against-darksword-exploit/
https://gbhackers.com/cisa-issues-warning-on-apple-vulnerabilities/
https://gbhackers.com/darksword-exploit-chain-leaked-online/
https://gbhackers.com/new-ios-exploit-uses-advanced-iphone-hacking-tools/
https://hackread.com/apple-pushes-rare-ios-18-patch-darksword-exploit/
https://hackread.com/darksword-iphone-exploit-leaked-online/
https://moonlock.com/darkstorm-infostealer-targeting-iphones
https://securityonline.info/active-exploits-cisa-adds-craft-cms-apple-darksword-flaws-kev/
https://securityonline.info/apple-ios-18-7-7-update-darksword-exploit-kit-fix/
https://securityonline.info/unmasking-darksword-gtig-exposes-full-chain-ios-exploit-zero-day/
https://thecyberexpress.com/ios-exploit-kit-dubbed-darksword/
https://thehackernews.com/2026/03/darksword-ios-exploit-kit-uses-6-flaws.html
https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html
https://www.androidheadlines.com/2026/03/darksword-iphone-malware-leak-millions-at-risk.html
https://www.helpnetsecurity.com/2026/03/19/darksword-ios-exploit-iphone/
https://www.helpnetsecurity.com/2026/04/02/apple-ios-18-darksword-security-updates/
https://www.hendryadrian.com/attackers-wielding-darksword-threaten-ios-users/
https://www.hendryadrian.com/cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks/
https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/
https://www.malwarebytes.com/blog/mobile/2026/03/a-darksword-hangs-over-unpatched-iphones
https://www.scworld.com/news/apple-expands-updates-to-ios-18-devices-affected-by-darksword-exploit
https://www.securitylab.ru/news/570569.php
https://www.securitylab.ru/news/570747.php
https://www.securitylab.ru/news/571076.php
https://www.theregister.com/2026/03/18/darksword_exploit_kit_steals_iphone/
https://www.zdnet.com/article/ios-18-darksword-security-patch/
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Fortinet has issued out-of-band patches for CVE-2026-35616, a critical pre-authentication API access bypass vulnerability (CVSS 9.1) impacting FortiClient EMS versions 7.4.5 and 7.4.6. This improper access control flaw (CWE-284) enables an unauthenticated attacker to execute unauthorized code or commands via crafted requests, thereby bypassing API authentication and authorization. Active exploitation of this vulnerability has been confirmed in the wild, with initial exploitation attempts detected on March 31, 2026. Hotfixes are currently available for the affected versions, and a comprehensive patch is expected in the upcoming version 7.4.7. Simo Kohonen of Defused Cyber and Nguyen Duc Anh are credited with discovering and reporting the flaw. This incident occurs shortly after another critical FortiClient EMS vulnerability, CVE-2026-21643 (CVSS 9.1), also came under active exploitation. Organizations are strongly urged to apply the provided hotfixes or update their FortiClient EMS installations without delay to address these significant security risks.
Severity: Critical
Threat Details and IOCs
| Malware: | SparkRAT, VShell |
|---|---|
| CVEs: | CVE-2026-21643, CVE-2026-35616 |
| Technologies: | Fortinet FortiClient EMS, Fortinet FortiClientEMS, Fortinet FortiClient Endpoint Management Server |
| Victim Industries: | Aerospace, Education, Financial Services, Government, Healthcare, Hospitality, Information Technology, IT Services, Managed Service Providers, Manufacturing, Public Sector, Retail, Technology Hardware, Telecommunications, Transportation, Utilities, Utilities & Energy |
| Victim Countries: | Australia, Germany, Italy, New Zealand, Spain, Taiwan, United Kingdom, United States |
Mitigation Advice
- Use asset management systems and network scanners to identify all instances of FortiClient EMS in the environment and determine their software versions.
- Immediately apply the emergency hotfix provided by Fortinet to all identified FortiClient EMS instances running versions 7.4.5 and 7.4.6.
- If patching cannot be performed immediately, restrict network access to the FortiClient EMS management interface to only trusted IP addresses and administrative subnets using firewall rules.
- Review network logs for unusual or crafted API requests targeting FortiClient EMS servers, especially from untrusted or external IP addresses, to identify potential exploitation attempts.
- Scan FortiClient EMS server logs for indicators of compromise related to unauthorized code execution or command execution, consistent with the impact of CVE-2026-35616.
Compliance Best Practices
- Develop and enforce a patch management policy that defines specific, accelerated timelines for applying security updates to critical, internet-facing infrastructure, especially for vulnerabilities with evidence of active exploitation.
- Review and re-architect network configurations to ensure that critical management platforms like FortiClient EMS are not exposed to the public internet and are placed in a secure, segmented management zone.
- Implement a routine, authenticated vulnerability scanning program that covers all critical infrastructure, including management servers, to proactively identify and prioritize patching before vulnerabilities are actively exploited.
- Deploy a Web Application Firewall (WAF) in front of critical web-based management interfaces to monitor, filter, and block malicious or anomalous API requests.
https://buaq.net/go-407929.html
https://gbhackers.com/2000-forticlient-ems-instances-exposed-online/
https://securityonline.info/forticlient-ems-vulnerability-exploited-in-the-wild-cve-2026-35616/
https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html
https://www.cyberkendra.com/2026/04/fortinet-rushes-emergency-patch-after.html
https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/
https://www.hendryadrian.com/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released/
https://www.securityweek.com/fortinet-rushes-emergency-fixes-for-exploited-zero-day/
https://www.thehackerwire.com/forticlientems-7-4-5-7-4-6-critical-rce-via-improper-access-control/
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
A large-scale credential harvesting operation, attributed by Cisco Talos to the threat cluster UAT-10608, has exploited CVE-2025-55182, a critical remote code execution vulnerability (CVSS 10.0) in React Server Components and Next.js App Router. This campaign has compromised at least 766 Next.js hosts across various geographic regions and cloud providers. Initial access is gained by exploiting the vulnerability, followed by the deployment of the NEXUS Listener collection framework. This framework utilizes a multi-phase harvesting script to exfiltrate a wide array of sensitive data, including database credentials, SSH private keys, AWS secrets, shell command history, Stripe API keys, GitHub tokens, environment variables, Kubernetes service account tokens, Docker configurations, API keys for services like OpenAI, Anthropic, NVIDIA NIM, SendGrid, Brevo, Telegram bot tokens, webhook secrets, GitLab tokens, and IAM role-associated temporary credentials from AWS, Google Cloud, and Microsoft Azure. The stolen information is managed via a password-protected web-based graphical user interface, NEXUS Listener V3, which provides operators with statistics on compromised hosts and credential types. The extensive data collected offers significant intelligence for crafting targeted follow-on attacks, social engineering campaigns, or selling access. Organizations are advised to audit environments for least privilege, enable secret scanning, avoid SSH key reuse, implement IMDSv2 enforcement on AWS EC2 instances, and rotate credentials if compromise is suspected.
Severity: Critical
Threat Details and IOCs
| Malware: | Beacon, Cobalt Strike, Danabot, NEXUS Listener, Shai-Hulud, Sliver, The Second Coming |
|---|---|
| CVEs: | CVE-2017-5941, CVE-2020-36732, CVE-2021-4229, CVE-2023-46233, CVE-2025-55182 |
| Technologies: | Amazon Web Services, Apache Maven, crypto-js, Docker, event-stream, Express.js, GitHub, GitLab, Google Cloud Platform, Kubernetes, Linux, Microsoft Entra ID, Node.js, node-serialize, npm, pip, Python, React, ua-parser-js, Vercel Next.js |
| Threat Actors: | HackTask, UAT10608 |
| Attacker Countries: | North Korea |
| Attacker IPs: | 144[.]172[.]102[.]88, 144[.]172[.]112[.]136, 144[.]172[.]117[.]112, 172[.]86[.]127[.]128, 2401[:]c080[:]1c01[:]c6[:]5400[:]5ff[:]fec1[:]ccc9, 64[.]176[.]226[.]36 |
| Attacker Domains: | git[.]uslab[.]dev, itemnania[.]com, npm[.]hacktask[.]net |
| Victim Industries: | Artificial Intelligence, Business Services, Financial Services, Government, Insurance, Legal Services, Management Consulting, Media and Entertainment, Retail, Semiconductors, Technology Hardware, Telecommunications, Universities |
| Victim Countries: | Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, United States |
Mitigation Advice
- Identify all public-facing Next.js applications and immediately patch them to a version that remediates CVE-2025-55182.
- Hunt for indicators of compromise (IOCs) associated with the 'NEXUS Listener' framework and CVE-2025-55182 exploitation in web server access logs, application logs, and network traffic.
- Enforce the use of Instance Metadata Service Version 2 (IMDSv2) on all AWS EC2 instances to mitigate credential theft from the metadata service.
- For any systems found to be vulnerable to CVE-2025-55182, immediately initiate a rotation of all associated secrets, including API keys, database credentials, service account passwords, and SSH keys.
Compliance Best Practices
- Initiate a recurring audit of all IAM roles and service account permissions in cloud and on-premise environments to enforce the principle of least privilege, ensuring applications only have the minimum access required.
- Integrate automated secret scanning tools into your CI/CD pipelines and source code repositories to proactively detect and block hardcoded credentials from being committed.
- Implement a centralized SSH key management solution or policy that enforces regular key rotation, prohibits key reuse across different environments, and logs all access.
- Develop and maintain a comprehensive, continuously updated inventory of all external-facing software assets and their versions to enable rapid identification of systems vulnerable to newly disclosed exploits.
- Deploy a Cloud Security Posture Management (CSPM) tool to continuously monitor all cloud environments for misconfigurations, such as overly permissive IAM roles, public S3 buckets, or unenforced IMDSv2.
You’re Not Supposed to ShareFile with Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 CVE-2026-2701)
We discovered a chain of vulnerabilities in Progress ShareFile Storage Zone Controller branch 5.X, specifically version 5.12.3 and earlier, leading to pre-authenticated Remote Code Execution (RCE), resolved in version 5.12.4 on March 10, 2026. The first vulnerability, CVE-2026-2699, is an authentication bypass (CWE-698: Execution After Redirect) in `/ConfigService/Admin.aspx`, where the `httpContext.Response.Redirect(redirectPath, false)` function redirects without terminating page execution, allowing access to the admin panel by removing the HTTP `Location` header. This bypass enables modification of the Storage Zone Controller's configuration, including setting a new passphrase by exploiting a lack of validation for the "Old Passphrase" when changing the "Primary Zone Controller" field. Subsequently, CVE-2026-2701, a post-authentication RCE, becomes achievable: we can set the `Network Share Location` to a webroot directory (e.g., `C:\inetpub\wwwroot\ShareFile\StorageCenter\documentum`) and then upload a ZIP file containing an ASPX webshell to `/upload.aspx` with the `unzip=true` parameter. This upload requires calculating an HMAC-SHA256 signature for the request, which is derived by leaking and decrypting the `TempData2` parameter from `/ConfigService/api/StroageZoneConfig` using the newly set passphrase and a hard-coded salt (`p3510060xfZ2s9`). The webshell is then extracted to the controlled webroot, granting RCE on the approximately 30,000 internet-facing instances of the Storage Zone Controller.
Severity: Critical
Threat Details and IOCs
| Malware: | Cl0p, Clop, CryptoMix Clop |
|---|---|
| CVEs: | CVE-2026-2699, CVE-2026-2701, CVE-2026-33615 |
| Technologies: | Citrix ShareFile, Microsoft ASP.NET, Microsoft Internet Information Services, Microsoft Windows, Microsoft Windows Server, Progress ShareFile Storage Zone Controller, Progress ShareFile Storage Zones Controller |
| Threat Actors: | ATK103, Chimborazo, Clop, DEV-0950, EvilCorp, FIN11, GoldEvergreen, GoldTahoe, GracefulSpider, Hive0065, LaceTempest, SpandexTempest, Ta505 |
| Attacker Domains: | sharefile[.]lab[.]local |
| Attacker URLs: | /ConfigService/Admin.aspx, /ConfigService/api/StroageZoneConfig, /ConfigService/api/StroageZoneConfig?&h=, /ConfigService/Login.aspx?callerpage=Admin, /StorageCenter/Upload.aspx, /upload.aspx, /upload.aspx?id=803436333&uploadid=jtrazo53&bp=test&accountid=1&exp=1970804033&h=ARcXg5ZqhVKOrlvNmzXjDeOaJIPHkjXX3OrmVJnB090= |
| Victim Industries: | Accounting, Aerospace, Architecture, Construction, Education, Energy, Financial Services, Government, Healthcare, Human Resources, Insurance, Legal Services, Manufacturing, Professional Services, Public Sector, Real Estate, Retail, Utilities |
| Victim Countries: | Australia, Brazil, Canada, Costa Rica, France, Germany, India, Ireland, Japan, Singapore, United Arab Emirates, United Kingdom, United States |
Mitigation Advice
- Immediately patch all Progress ShareFile Storage Zone Controller 5.x instances to version 5.12.4 or later to mitigate CVE-2026-2699 and CVE-2026-2701.
- Use a vulnerability scanner or a custom script to send a GET request to `/ConfigService/Admin.aspx` on all ShareFile instances. Flag any system that returns an HTTP 302 status code with a response body larger than 10,000 bytes as vulnerable to CVE-2026-2699.
- Implement a rule on your Web Application Firewall (WAF) or reverse proxy to block all external access to the `/ConfigService/Admin.aspx` URI on ShareFile Storage Zone Controllers.
- In your SIEM or log management platform, search IIS logs from ShareFile servers for POST requests to `/upload.aspx` that contain the parameter `unzip=true` originating from external IP addresses.
- Using an EDR or manual file system search, hunt for recently created or modified `.aspx` files within the IIS webroot directories of your ShareFile Storage Zone Controllers, paying close attention to unexpected subdirectories.
Compliance Best Practices
- Review network access control lists (ACLs) and firewall rules to restrict all public internet access to administrative interfaces of all applications, including the ShareFile `/ConfigService/` path. These interfaces should only be accessible from a trusted internal management network.
- Audit and enforce file system permissions for the IIS application pool identity running the ShareFile service. Ensure the account has write access only to designated, non-web-accessible storage directories and read-only access elsewhere.
- Deploy and configure a File Integrity Monitoring (FIM) solution on web servers to generate high-priority alerts for any file creation or modification events involving script files (e.g., .aspx, .php, .jsp) within any IIS webroot directory.
- Update the asset inventory to classify all internet-facing file transfer solutions as critical assets. Ensure they are included in the scope of the vulnerability management program for frequent scanning and prioritized patching.
https://buaq.net/go-407240.html
https://cyberveille.esante.gouv.fr/alertes/progress-sharefile-cve-2026-2699-2026-04-03
https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/
https://socradar.io/blog/progress-sharefile-cve-2026-2699-2701-rce/
https://www.cyberkendra.com/2026/04/progress-sharefile-storage-zone.html
https://www.hendryadrian.com/critical-sharefile-flaws-lead-to-unauthenticated-rce/
https://www.thehackerwire.com/critical-rce-in-sharefile-storage-zones-controller-cve-2026-2699/
https://www.thehackerwire.com/cve-2026-2701-authenticated-rce-via-malicious-file-upload/
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Qilin and Warlock ransomware operations are employing bring your own vulnerable driver (BYOVD) techniques to neutralize endpoint detection and response (EDR) tools on compromised systems. Qilin attacks deploy a malicious "msimg32.dll" via DLL side-loading, initiating a multi-stage infection that disables over 300 EDR drivers by utilizing "rwdrv.sys" (a renamed "ThrottleStop.sys") for physical memory access and "hlpdrv.sys" to terminate EDR processes, while also evading detection through user-mode hook neutralization and ETW log suppression. This group, frequently gaining initial access via stolen credentials, typically executes ransomware approximately six days post-compromise. Concurrently, the Warlock group, also known as Water Manaul, exploits unpatched Microsoft SharePoint servers and uses a vulnerable "NSecKrnl.sys" driver in BYOVD attacks to terminate security products at the kernel level, replacing previously used drivers, and has expanded its post-exploitation toolkit to include PsExec, RDP Patcher, Velociraptor, Visual Studio Code, Cloudflare Tunnel, Yuze, and Rclone for persistence, lateral movement, and data exfiltration. To counter these threats, organizations should permit only signed drivers from trusted publishers, monitor driver installation events, maintain rigorous patch management, and implement a multi-layered defense focusing on kernel integrity, strict driver governance, and real-time kernel-level activity monitoring.
Severity: Critical
Threat Details and IOCs
| Malware: | Agenda, AgendaCrypt, Akira, Gold Feather, INC, INC Ransom, Makop, Phobos, Qilin, QilinCrypt, Qilin Locker, Shanya, VX Crypt, Warlock, Water Galura, Water Manaul |
|---|---|
| CVEs: | CVE-2019-19781, CVE-2020-1472, CVE-2021-40444, CVE-2022-30190, CVE-2023-27532, CVE-2023-27997, CVE-2023-3519, CVE-2023-48788, CVE-2023-4966, CVE-2024-21762, CVE-2024-27198, CVE-2024-55591, CVE-2025-31324, CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771, CVE-2025-68947, CVE-2025-7771 |
| Technologies: | Citrix ADC, Citrix Gateway, Fortinet, Fortinet FortiGate, Fortinet FortiOS, Fortinet FortiProxy, JetBrains TeamCity, Linux, Microsoft 365, Microsoft Defender Antivirus, Microsoft Remote Desktop Services, Microsoft SharePoint, Microsoft Windows, Microsoft Windows Active Directory, NetScaler ADC, ThrottleStop, Veeam Backup & Replication, VMware ESXi, VMware vCenter Server, Zoho Mail |
| Threat Actors: | Agenda, Akira, Qilin, Shanya, Storm1567, Warlock, WaterManaul |
| Attacker Countries: | China, North Korea, Russia, South Korea |
| Attacker IPs: | 185[.]196[.]10[.]19, 185[.]208[.]156[.]157, 80[.]64[.]16[.]87 |
| Attacker Domains: | cloudflariz[.]com, ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion |
| Attacker URLs: | hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=05d0168e-d612-372f-a138-a539c20e6af6, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=06958e37-9494-3cfc-9691-dbff2c1b7b15, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=09fe0944-ef5f-3d12-ba5b-e92f45f8ac7f, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=0f0c766b-df6a-3ed3-9625-37491ef4fbb1, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=13772aa6-e17d-3ee8-b66f-841127db4a6d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=160ec3c5-325f-3383-9efb-54ce9d41cca7, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=172a0c0b-0e11-3dca-9679-be3c35f7b51d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=24434a9c-41ad-3c65-8b43-75b90b9e2724, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=260adced-0f52-3b82-a41f-7c33f3f84547, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=29384992-7b2b-358c-93a4-09c370558db3, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=2f25268a-eb51-3665-8e2f-2f2281c18069, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=2fec27e5-785a-3ed9-9df1-9e2c21deffb8, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=30582aba-6b50-39a0-aae2-54d423e3b33a, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=3105a8f7-027c-354f-a788-85b0fa50640d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=394b2ad0-70c2-3671-be11-c905d0b35773, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=3faeb8ae-d1d1-359a-aa93-4838364ffe7d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=4143509c-5888-304e-b429-f619e32068af, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=44ef1dbe-d696-3034-94b7-37d05dd2a4b7, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=46636a14-8107-3960-8979-aaa6e867336d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=4eaab58e-96ae-32a4-840f-a235732f1fbf, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=5f7b8fa7-30fd-3afc-9a62-4ac7c2466955, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=60bdc9de-7958-3194-8bf0-4ea43bda4ffa, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=7131070f-c2a1-3e52-bd54-9d60ecda3263, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=78ed959a-66b1-3328-9d16-53e58f3b84f6, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=7cd3db5c-d36a-37c6-bdaf-abd8daac311c, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=901e0684-3db7-3a3a-a11d-ac287eff9dd4, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=99440aae-cecb-3eb0-872a-68cfd4cd1e6f, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=9949d38c-52b0-3ba9-8ba0-74d00d426f6b, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=9c324476-eb4b-39b9-884b-98baa22c9d21, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=b2ee3f6f-a899-33d3-96c4-6baa623321cc, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=b9493a73-8548-330f-9f9e-66ba732b4f70, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=bd40fb13-ecde-323d-ac86-d89deb3612e2, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=bd427b2f-c8cd-30f3-a2b1-2718e23ab855, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=c5441ba3-cc79-3152-9747-07c872a96faa, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=ce720cbe-9973-3142-8d32-0ee69d248dc6, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=cecefc09-2f41-3838-8223-000d3ad145f2, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=d22abc53-c565-31c2-b4d9-fab70161918a, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=d7cfdb29-1a34-31f7-bdbf-16a7a99e9b53, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=dffe3961-d699-3290-ba7c-8b3b9a912b04, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=e54ec58d-0030-3e9e-ae8a-431a29825373, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=ebc25d38-20f6-34c6-b807-fe269015e502, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=ee502f3e-d3ab-37d7-89ff-011997f664b0, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=fd5f6cee-982c-386c-a7b3-2ebcfe161a41, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=fdf4dfe9-838d-31ff-86ad-f251e462789e, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=feb9c071-d0e2-3c2c-9e8e-7ba0512d3638 |
| Attacker Hashes: | 01d00d3dd8bc8fd92dae9e04d0f076cb3158dc9c, 12fcde06ddadf1b48a61b12596e6286316fd33e850687fe4153dfd9383f0a4a0, 1305e8b0f9c459d5ed85e7e474fbebb1, 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0, 31c3574456573c89d444478772597db40f075e25c67b8de39926d2faa63ca1d8, 3bb14eb610885692bd1e4e9d268d8c8d, 6bc8e3505d9f51368ddf323acb6abc49, 7787da25451f5538766240f4a8a2846d0a589c59391e15f188aa077e8b888497, 82ed942a52cdcf120a8919730e00ba37619661a3, 84e2d2084fe08262c2c378a377963a1482b35ac5, 89ee7235906f7d12737679860264feaf, 92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514, 99325e2ee68a1c22d39bd508e6d216e06177817be325b131848a23ca786a2c54, bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56, c748ad6828f8f401ebfa859a3fec40ce47a1e30d, c9707a3bc0f177e1d1a5587c61699975b1153406962d187c9a732f97d8f867c5, cf7cad39407d8cd93135be42b6bd258fce1b9909cef820e5281618a7a0099a27, d3af11d6bb6382717bf7b6a3aceada24f42f49a9489811a66505e03dd76fd1af, f6f89e070ed9be62b9ca284f2f7af9e5 |
| Victim Industries: | Administrative and Support Services, Aerospace, Agriculture, Architecture, Arts & Culture, Automation, Automotive, Broadcasting, Business Services, Cloud Infrastructure, Construction, Consumer Packaged Goods, Consumer Services, Defense, Defense Contractor, Education, Energy, Financial Services, Food & Beverage, Food Distribution, Food Processing, Government, Healthcare, Health Care Technology, Hospitality, Industrials, Information Security, IT and DevOps, Logistics, Manufacturing, Maritime, Media & Publishing, Medical Technology, Nonprofit, Oil & Gas, Professional, Scientific, and Technical Services, Professional Services, Real Estate, Retail, Security Services, Technology Hardware, Telecommunications, Trade, Transportation, Travel & Tourism, Utilities, Wholesale & Distribution |
| Victim Countries: | Aruba, Australia, Austria, Bangladesh, Belgium, Brazil, Canada, China, Colombia, Egypt, France, Germany, Indonesia, Ireland, Israel, Italy, Japan, Malaysia, Netherlands, New Zealand, Panama, Peru, Saudi Arabia, Serbia, Singapore, Slovakia, South Korea, Spain, Sweden, Switzerland, Taiwan, Thailand, United Arab Emirates, United Kingdom, United States |
Mitigation Advice
- Immediately apply all available security patches to on-premises Microsoft SharePoint servers to mitigate the initial access vector used by the Warlock ransomware group.
- Use your EDR or SIEM to scan endpoints and logs for the presence of the malicious file 'msimg32.dll', particularly in relation to DLL side-loading events.
- Use your EDR or SIEM to hunt for the presence or loading of the driver file 'rwdrv.sys' or 'ThrottleStop.sys' on endpoints.
- Use your EDR or SIEM to hunt for the presence or loading of the driver file 'hlpdrv.sys' on endpoints.
- Use your EDR or SIEM to hunt for the presence or loading of the vulnerable driver file 'NSecKrnl.sys' on endpoints.
- Review endpoint and network logs for suspicious or unauthorized execution of PsExec, especially if originating from non-administrative workstations.
- Monitor network traffic and endpoint processes for unauthorized use of Rclone or large, unexpected data transfers to external cloud storage providers.
Compliance Best Practices
- Develop and implement a strict driver governance policy using application control or endpoint security features to allow only signed drivers from an explicit list of trusted publishers.
- Configure and tune your EDR solution to generate high-priority alerts for suspicious kernel-level activities, such as a process attempting to unload or disable security agent drivers.
- Enforce multi-factor authentication (MFA) for all remote access, privileged accounts, and critical system logins to mitigate credential theft.
- Establish and enforce a rigorous patch management policy to ensure all operating systems, applications, and security tools are updated within a defined timeframe.
- Implement network segmentation to isolate critical servers from general user workstations, restricting east-west traffic to prevent attackers from moving laterally across the network.
- Configure firewall egress filtering rules to block or alert on traffic to known anonymizing services and unexpected destinations or ports to disrupt command-and-control communications.
https://blog.talosintelligence.com/qilin-edr-killer/
https://gbhackers.com/qilin-ransomware-deploys-malicious-dll/
https://thehackernews.com/2026/04/qilin-and-warlock-ransomware-use.html
https://www.hendryadrian.com/ransom-agencavi-srl-mar-2026/
https://www.hendryadrian.com/ransom-alarmco-mar-2026/
https://www.hendryadrian.com/ransom-arca-service-mar-2026/
https://www.hendryadrian.com/ransom-aroostook-mental-health-services-mar-2026/
https://www.hendryadrian.com/ransom-artemedica-mar-2026/
https://www.hendryadrian.com/ransom-biogel-mar-2026/
https://www.hendryadrian.com/ransom-blantyre-capital-mar-2026/
https://www.hendryadrian.com/ransom-btx-global-logistics-mar-2026/
https://www.hendryadrian.com/ransom-chek-news-apr-2026/
https://www.hendryadrian.com/ransom-chickasaw-holding-mar-2026/
https://www.hendryadrian.com/ransom-dielco-mar-2026/
https://www.hendryadrian.com/ransom-doctor-com-mar-2026/
https://www.hendryadrian.com/ransom-dow-mar-2026/
https://www.hendryadrian.com/ransom-duffys-sports-grill-mar-2026/
https://www.hendryadrian.com/ransom-fondation-boghossian-mar-2026/
https://www.hendryadrian.com/ransom-fortress-systems-mar-2026/
https://www.hendryadrian.com/ransom-geotec-surveys-mar-2026/
https://www.hendryadrian.com/ransom-grupo-coril-mar-2026/
https://www.hendryadrian.com/ransom-hollu-systemhygiene-mar-2026/
https://www.hendryadrian.com/ransom-jursaconsulting-apr-2026/
https://www.hendryadrian.com/ransom-kerjaya-prospek-group-mar-2026/
https://www.hendryadrian.com/ransom-kuzco-lighting-mar-2026/
https://www.hendryadrian.com/ransom-living-in-green-s-r-o-mar-2026/
https://www.hendryadrian.com/ransom-mac-interiors-mar-2026/
https://www.hendryadrian.com/ransom-mcc-economics-mar-2026/
https://www.hendryadrian.com/ransom-millerfoto-mar-2026/
https://www.hendryadrian.com/ransom-muffett-mar-2026/
https://www.hendryadrian.com/ransom-nanxun-enterprise-co-ltd-mar-2026/
https://www.hendryadrian.com/ransom-neurologic-associates-of-central-brevard-apr-2026/
https://www.hendryadrian.com/ransom-pinnacle-tax-inc-mar-2026/
https://www.hendryadrian.com/ransom-q-lab-mar-2026/
https://www.hendryadrian.com/ransom-retail-centenario-mar-2026/
https://www.hendryadrian.com/ransom-salag-mar-2026/
https://www.hendryadrian.com/ransom-seeing-machines-jan-2026/
https://www.hendryadrian.com/ransom-seram-spa-mar-2026/
https://www.hendryadrian.com/ransom-service-star-freightways-mar-2026/
https://www.hendryadrian.com/ransom-shwapno-mar-2026/
https://www.hendryadrian.com/ransom-silvon-software-mar-2026/
https://www.hendryadrian.com/ransom-southern-commercial-real-estate-mar-2026/
https://www.hendryadrian.com/ransom-syed-professional-services-mar-2026/
https://www.hendryadrian.com/ransom-tds-construction-mar-2026/
https://www.hendryadrian.com/ransom-virtualexpo-group-mar-2026/
https://www.hendryadrian.com/ransom-von-weise-associates-mar-2026/
https://www.hendryadrian.com/ransom-wal-consultant-mar-2026/
https://www.hipaajournal.com/data-breaches-corewell-health-rocky-mountain-care/


