Apple Expands Updates to iOS 18 Devices Affected by DarkSword Exploit

Apple has expanded the availability of updates for iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect against the DarkSword exploit. This exploit is a six-vulnerability chain (CVE-2025-31277, CVE-2025-43529, CVE-2026-20700, CVE-2025-14174, CVE-2025-43510, CVE-2025-43520) targeting iPhones running iOS 18.4 through 18.7, which allows extensive access to device data, including messages, stored passwords, and location history, after a user visits a compromised website with minimal interaction. Attacks have been observed in Saudi Arabia, Turkey, Malaysia, and Ukraine, with a recent campaign attributed to Star Blizzard (TA446/COLDRIVER) targeting government, think tank, higher education, financial, and legal entities. The exploit kit's public availability on GitHub lowers the barrier for other actors. While 74% of recent iPhones run iOS 26, which is not vulnerable, approximately 20% of iOS devices remain exposed, partly due to user reluctance to upgrade from iOS 18. Security teams are advised to push iOS 18.7.7 to all managed devices still on iOS 18, upgrade to iOS 26, or enable Lockdown Mode for high-risk users, as DarkSword does not execute on devices with this feature enabled.

Severity: Critical

Threat Details and IOCs

Malware: Aisuru, Coruna, CryptoWaters, Darksword, DarkSword, Deblind, Ghostblade, GhostBlade, GHOSTBLADE, Ghostknife, GhostKnife, GHOSTKNIFE, Ghostsaber, GhostSaber, GHOSTSABER, Infamous Chisel, KimWolf, Wana Decrypt0r 2.0, WannaCry, WannaCrypt, WannaCryptor, WCry
CVEs: CVE-2021-30952, CVE-2022-48503, CVE-2023-32409, CVE-2023-32434, CVE-2023-38606, CVE-2023-41974, CVE-2023-43000, CVE-2023-43010, CVE-2024-23222, CVE-2024-23225, CVE-2025-14174, CVE-2025-31277, CVE-2025-32432, CVE-2025-43300, CVE-2025-43376, CVE-2025-43510, CVE-2025-43520, CVE-2025-43529, CVE-2025-43534, CVE-2025-54068, CVE-2025-55177, CVE-2026-20637, CVE-2026-20643, CVE-2026-20687, CVE-2026-20690, CVE-2026-20700, CVE-2026-28864, CVE-2026-28865, CVE-2026-28866, CVE-2026-28878, CVE-2026-28880
Technologies: Apple iOS, Apple iPhone, Apple iPod touch, Apple macOS, Apple Safari, Apple tvOS, Apple visionOS, Apple watchOS, Craft CMS, Google Android, Google Chrome, Laravel, Mozilla Firefox
Threat Actors: APT29, APT38, Callisto, Coldriver, DarkMatterGroup, Ghostblade, Ghostknife, Ghostsaber, LazarusGroup, MatrixLLC, PARSDefense, Sandworm, Seaborgium, ShadowBrokers, StarBlizzard, TA446, UNC6353, UNC6691, UNC6748
Attacker Countries: China, Malaysia, North Korea, Russia, Saudi Arabia, Turkey, Ukraine, United States
Attacker IPs: 141[.]105[.]130[.]237, 62[.]72[.]21[.]10, 72[.]60[.]98[.]48
Attacker Domains: 7aac[.]gov[.]ua, api[.]cloud-content-delivery[.]net, backup[.]cloud-content-delivery[.]net, bridetvstreaming[.]org, cdn[.]cdncounter[.]net, cdn[.]cloud-content-delivery[.]net, cdncounter[.]net, cdn[.]uacounter[.]com, count[.]cdncounter[.]net, e5[.]malaymoil[.]com, motorbeylimited[.]com, novosti[.]dn[.]ua, sahibndn[.]io, shapelie[.]com, snapshare[.]chat, sqwas[.]shapelie[.]com, static[.]cdncounter[.]net, uacounter[.]com
Attacker URLs: hxxp[://]sqwas[.]shapelie[.]com[:]8882/stats, hxxps[://]sqwas[.]shapelie[.]com[:]8881/stats, hxxps[://]static[.]cdncounter[.]net/assets/index.html, hxxps[://]static[.]cdncounter[.]net/assets/pe_main.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_loader.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_module_18.6.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_module.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_worker_18.4.js, hxxps[://]static[.]cdncounter[.]net/assets/rce_worker_18.6.js, hxxps[://]static[.]cdncounter[.]net/assets/sbx0_main_18.4.js, hxxps[://]static[.]cdncounter[.]net/assets/sbx1_main.js, hxxps[://]static[.]cdncounter[.]net/pe_main.js, hxxps[://]static[.]cdncounter[.]net/rce_module_18.6.js, hxxps[://]static[.]cdncounter[.]net/rce_module.js, hxxps[://]static[.]cdncounter[.]net/rce_worker_18.4.js, hxxps[://]static[.]cdncounter[.]net/rce_worker_18.6.js, hxxps[://]static[.]cdncounter[.]net/sbx0_main_18.4.js, hxxps[://]static[.]cdncounter[.]net/sbx1_main.js, hxxps[://]static[.]cdncounter[.]net/widget.js, hxxps[://]static[.]cdncounter[.]net/widgets.js?uhfiu27fajf2948fjfefaa42, hxxps[:]//api.cloud-content-delivery.net/v1/, hxxps[:]//backup.cloud-content-delivery.net/v1/, hxxps[:]//cdn.cloud-content-delivery.net/client.js, hxxps[:]//snapshare.chat/frame.html, x-safari-https[:]//snapshare.chat/, x-safari-https[:]//snapshare.chat/
Attacker Hashes: 2e5a56beb63f21d9347310412ae6efb29fd3db2d3a3fc0798865a29a3c578d35, 5fa967dbef026679212f1a6ffa68d575, 762045d2fb8cf416129ffce6d02decc3, 7c85d1644804f5a3695e5db537cb2afca7665d9c
Victim Industries: Aerospace, Business Services, Cryptocurrency, Defense, E-commerce, Education, Financial Services, Food & Beverage, Food Processing, Government, Healthcare, Industrials, Industrial Sector, Information Technology, Legal Services, Manufacturing, Media and Entertainment, Multimedia, Nonprofit, Professional, Scientific, and Technical Services, Public Administration, Public Sector, Retail, Security & Surveillance, Social Media, Technology Hardware, Telecommunications, Think Tanks
Victim Countries: Brunei, Cambodia, China, Indonesia, Laos, Malaysia, Myanmar, Philippines, Russia, Saudi Arabia, Singapore, Thailand, Timor-Leste, Turkey, Ukraine, United Kingdom, United States, Vietnam

Mitigation Advice

  • Use your Mobile Device Management (MDM) solution to enforce an immediate update on all corporate iPhones and iPads to iOS 18.7.7 / iPadOS 18.7.7 or newer.
  • Enable Lockdown Mode on iOS devices for high-risk users, such as executives, finance, and IT administrators, to provide an additional layer of protection.
  • Use your vulnerability management or MDM tool to scan for and identify all devices running vulnerable iOS or iPadOS versions between 18.4 and 18.7.

Compliance Best Practices

  • Develop and enforce a strict mobile device update policy that mandates the installation of critical security patches within a defined, short timeframe. Use your MDM platform to automate compliance and restrict network access for non-compliant devices.
  • Establish a formal user risk-profiling program to classify employees based on their roles and data access. Use these risk profiles to apply tiered security controls to their devices automatically.
  • Deploy or enhance a DNS filtering or Secure Web Gateway (SWG) solution to block access to known malicious domains and categories of websites that are frequently compromised.
Sources

https://arstechnica.com/security/2026/03/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/

https://au.lifehacker.com/apple/117983/news/update-your-iphone-to-protect-yourself-against-darksword-malware

https://au.lifehacker.com/apple/118092/news/you-dont-have-to-update-to-ios-26-to-protect-your-iphone-from-darksword-malware

https://buaq.net/go-403386.html

https://buaq.net/go-403503.html

https://buaq.net/go-403568.html

https://buaq.net/go-403762.html

https://buaq.net/go-404348.html

https://buaq.net/go-407273.html

https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/

https://cyberguy.com/security/darksword-leak-millions-iphone-users-risk/

https://cyberinsider.com/apple-expands-darksword-protections-to-more-iphones-with-ios-18-7-7-update/

https://cyberinsider.com/apple-publishes-security-guidance-in-response-to-darksword-attacks/

https://cyberpress.org/apple-flaws-darksword-ios-attack-chain/

https://cyberpress.org/apple-rolls-out-ios-18-7-7/

https://cyberpress.org/new-ios-exploit-uses-advanced-iphone-hacking/

https://cyberscoop.com/second-ios-exploit-kit-emerges-from-suspected-russian-hackers-using-possible-u-s-government-developed-tools/

https://dataconomy.com/2026/03/23/apple-urges-iphone-updates-to-block-darksword-hacking-tool/

https://exploit-intel.com/vuln/CVE-2025-31277

https://exploit-intel.com/vuln/CVE-2025-43510

https://exploit-intel.com/vuln/CVE-2025-43520

https://gbhackers.com/apple-ios-18-7-7-update-defend-against-darksword-exploit/

https://gbhackers.com/cisa-issues-warning-on-apple-vulnerabilities/

https://gbhackers.com/darksword-exploit-chain-leaked-online/

https://gbhackers.com/new-ios-exploit-uses-advanced-iphone-hacking-tools/

https://hackread.com/apple-pushes-rare-ios-18-patch-darksword-exploit/

https://hackread.com/darksword-iphone-exploit-leaked-online/

https://infosecwriteups.com/the-end-of-just-buy-an-iphone-as-security-advice-eac8f819542f?source=rss----7b722bfd1b8d---4

https://moonlock.com/darkstorm-infostealer-targeting-iphones

https://securityonline.info/active-exploits-cisa-adds-craft-cms-apple-darksword-flaws-kev/

https://securityonline.info/apple-ios-18-7-7-update-darksword-exploit-kit-fix/

https://securityonline.info/unmasking-darksword-gtig-exposes-full-chain-ios-exploit-zero-day/

https://techcrunch.com/2026/03/23/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/

https://techcrunch.com/2026/03/26/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know/

https://thecyberexpress.com/ios-exploit-kit-dubbed-darksword/

https://thehackernews.com/2026/03/darksword-ios-exploit-kit-uses-6-flaws.html

https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html

https://www.androidheadlines.com/2026/03/darksword-iphone-malware-leak-millions-at-risk.html

https://www.androidheadlines.com/2026/03/google-found-a-new-iphone-malware-that-can-drain-your-crypto-wallet-without-leaving-a-trace.html

https://www.bleepingcomputer.com/news/security/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks/

https://www.bleepingcomputer.com/news/security/new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones/

https://www.helpnetsecurity.com/2026/03/19/darksword-ios-exploit-iphone/

https://www.helpnetsecurity.com/2026/04/02/apple-ios-18-darksword-security-updates/

https://www.hendryadrian.com/attackers-wielding-darksword-threaten-ios-users/

https://www.hendryadrian.com/cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks/

https://www.hendryadrian.com/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/

https://www.hendryadrian.com/the-proliferation-of-darksword-ios-exploit-chain-adopted-by-multiple-threat-actors-google-cloud-blog/

https://www.infosecurity-magazine.com/news/apple-ios-18-updates-darksword/

https://www.malwarebytes.com/blog/mobile/2026/03/a-darksword-hangs-over-unpatched-iphones

https://www.newsbytesapp.com/news/science/apple-releases-critical-security-update-for-older-iphones-ipads/story

https://www.scworld.com/news/apple-expands-updates-to-ios-18-devices-affected-by-darksword-exploit

https://www.securitylab.ru/news/570569.php

https://www.securitylab.ru/news/570747.php

https://www.securitylab.ru/news/571076.php

https://www.techradar.com/phones/this-ios-18-patch-could-protect-your-device-from-a-vicious-malware-strain-heres-why-you-need-it-now

https://www.techradar.com/pro/security/this-new-darksword-ios-exploit-can-steal-almost-everything-from-your-iphone-heres-what-we-know

https://www.theregister.com/2026/03/18/darksword_exploit_kit_steals_iphone/

https://www.zdnet.com/article/ios-18-darksword-security-patch/

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet has issued out-of-band patches for CVE-2026-35616, a critical pre-authentication API access bypass vulnerability (CVSS 9.1) impacting FortiClient EMS versions 7.4.5 and 7.4.6. This improper access control flaw (CWE-284) enables an unauthenticated attacker to execute unauthorized code or commands via crafted requests, thereby bypassing API authentication and authorization. Active exploitation of this vulnerability has been confirmed in the wild, with initial exploitation attempts detected on March 31, 2026. Hotfixes are currently available for the affected versions, and a comprehensive patch is expected in the upcoming version 7.4.7. Simo Kohonen of Defused Cyber and Nguyen Duc Anh are credited with discovering and reporting the flaw. This incident occurs shortly after another critical FortiClient EMS vulnerability, CVE-2026-21643 (CVSS 9.1), also came under active exploitation. Organizations are strongly urged to apply the provided hotfixes or update their FortiClient EMS installations without delay to address these significant security risks.

Severity: Critical

Threat Details and IOCs

Malware: SparkRAT, VShell
CVEs: CVE-2026-21643, CVE-2026-35616
Technologies: Fortinet FortiClient EMS, Fortinet FortiClientEMS, Fortinet FortiClient Endpoint Management Server
Victim Industries: Aerospace, Education, Financial Services, Government, Healthcare, Hospitality, Information Technology, IT Services, Managed Service Providers, Manufacturing, Public Sector, Retail, Technology Hardware, Telecommunications, Transportation, Utilities, Utilities & Energy
Victim Countries: Australia, Germany, Italy, New Zealand, Spain, Taiwan, United Kingdom, United States

Mitigation Advice

  • Use asset management systems and network scanners to identify all instances of FortiClient EMS in the environment and determine their software versions.
  • Immediately apply the emergency hotfix provided by Fortinet to all identified FortiClient EMS instances running versions 7.4.5 and 7.4.6.
  • If patching cannot be performed immediately, restrict network access to the FortiClient EMS management interface to only trusted IP addresses and administrative subnets using firewall rules.
  • Review network logs for unusual or crafted API requests targeting FortiClient EMS servers, especially from untrusted or external IP addresses, to identify potential exploitation attempts.
  • Scan FortiClient EMS server logs for indicators of compromise related to unauthorized code execution or command execution, consistent with the impact of CVE-2026-35616.

Compliance Best Practices

  • Develop and enforce a patch management policy that defines specific, accelerated timelines for applying security updates to critical, internet-facing infrastructure, especially for vulnerabilities with evidence of active exploitation.
  • Review and re-architect network configurations to ensure that critical management platforms like FortiClient EMS are not exposed to the public internet and are placed in a secure, segmented management zone.
  • Implement a routine, authenticated vulnerability scanning program that covers all critical infrastructure, including management servers, to proactively identify and prioritize patching before vulnerabilities are actively exploited.
  • Deploy a Web Application Firewall (WAF) in front of critical web-based management interfaces to monitor, filter, and block malicious or anomalous API requests.

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

A large-scale credential harvesting operation, attributed by Cisco Talos to the threat cluster UAT-10608, has exploited CVE-2025-55182, a critical remote code execution vulnerability (CVSS 10.0) in React Server Components and Next.js App Router. This campaign has compromised at least 766 Next.js hosts across various geographic regions and cloud providers. Initial access is gained by exploiting the vulnerability, followed by the deployment of the NEXUS Listener collection framework. This framework utilizes a multi-phase harvesting script to exfiltrate a wide array of sensitive data, including database credentials, SSH private keys, AWS secrets, shell command history, Stripe API keys, GitHub tokens, environment variables, Kubernetes service account tokens, Docker configurations, API keys for services like OpenAI, Anthropic, NVIDIA NIM, SendGrid, Brevo, Telegram bot tokens, webhook secrets, GitLab tokens, and IAM role-associated temporary credentials from AWS, Google Cloud, and Microsoft Azure. The stolen information is managed via a password-protected web-based graphical user interface, NEXUS Listener V3, which provides operators with statistics on compromised hosts and credential types. The extensive data collected offers significant intelligence for crafting targeted follow-on attacks, social engineering campaigns, or selling access. Organizations are advised to audit environments for least privilege, enable secret scanning, avoid SSH key reuse, implement IMDSv2 enforcement on AWS EC2 instances, and rotate credentials if compromise is suspected.

Severity: Critical

Threat Details and IOCs

Malware: Beacon, Cobalt Strike, Danabot, NEXUS Listener, Shai-Hulud, Sliver, The Second Coming
CVEs: CVE-2017-5941, CVE-2020-36732, CVE-2021-4229, CVE-2023-46233, CVE-2025-55182
Technologies: Amazon Web Services, Apache Maven, crypto-js, Docker, event-stream, Express.js, GitHub, GitLab, Google Cloud Platform, Kubernetes, Linux, Microsoft Entra ID, Node.js, node-serialize, npm, pip, Python, React, ua-parser-js, Vercel Next.js
Threat Actors: HackTask, UAT10608
Attacker Countries: North Korea
Attacker IPs: 144[.]172[.]102[.]88, 144[.]172[.]112[.]136, 144[.]172[.]117[.]112, 172[.]86[.]127[.]128, 2401[:]c080[:]1c01[:]c6[:]5400[:]5ff[:]fec1[:]ccc9, 64[.]176[.]226[.]36
Attacker Domains: git[.]uslab[.]dev, itemnania[.]com, npm[.]hacktask[.]net
Victim Industries: Artificial Intelligence, Business Services, Financial Services, Government, Insurance, Legal Services, Management Consulting, Media and Entertainment, Retail, Semiconductors, Technology Hardware, Telecommunications, Universities
Victim Countries: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, United States

Mitigation Advice

  • Identify all public-facing Next.js applications and immediately patch them to a version that remediates CVE-2025-55182.
  • Hunt for indicators of compromise (IOCs) associated with the 'NEXUS Listener' framework and CVE-2025-55182 exploitation in web server access logs, application logs, and network traffic.
  • Enforce the use of Instance Metadata Service Version 2 (IMDSv2) on all AWS EC2 instances to mitigate credential theft from the metadata service.
  • For any systems found to be vulnerable to CVE-2025-55182, immediately initiate a rotation of all associated secrets, including API keys, database credentials, service account passwords, and SSH keys.

Compliance Best Practices

  • Initiate a recurring audit of all IAM roles and service account permissions in cloud and on-premise environments to enforce the principle of least privilege, ensuring applications only have the minimum access required.
  • Integrate automated secret scanning tools into your CI/CD pipelines and source code repositories to proactively detect and block hardcoded credentials from being committed.
  • Implement a centralized SSH key management solution or policy that enforces regular key rotation, prohibits key reuse across different environments, and logs all access.
  • Develop and maintain a comprehensive, continuously updated inventory of all external-facing software assets and their versions to enable rapid identification of systems vulnerable to newly disclosed exploits.
  • Deploy a Cloud Security Posture Management (CSPM) tool to continuously monitor all cloud environments for misconfigurations, such as overly permissive IAM roles, public S3 buckets, or unenforced IMDSv2.

You’re Not Supposed to ShareFile with Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 CVE-2026-2701)

We discovered a chain of vulnerabilities in Progress ShareFile Storage Zone Controller branch 5.X, specifically version 5.12.3 and earlier, leading to pre-authenticated Remote Code Execution (RCE), resolved in version 5.12.4 on March 10, 2026. The first vulnerability, CVE-2026-2699, is an authentication bypass (CWE-698: Execution After Redirect) in `/ConfigService/Admin.aspx`, where the `httpContext.Response.Redirect(redirectPath, false)` function redirects without terminating page execution, allowing access to the admin panel by removing the HTTP `Location` header. This bypass enables modification of the Storage Zone Controller's configuration, including setting a new passphrase by exploiting a lack of validation for the "Old Passphrase" when changing the "Primary Zone Controller" field. Subsequently, CVE-2026-2701, a post-authentication RCE, becomes achievable: we can set the `Network Share Location` to a webroot directory (e.g., `C:\inetpub\wwwroot\ShareFile\StorageCenter\documentum`) and then upload a ZIP file containing an ASPX webshell to `/upload.aspx` with the `unzip=true` parameter. This upload requires calculating an HMAC-SHA256 signature for the request, which is derived by leaking and decrypting the `TempData2` parameter from `/ConfigService/api/StroageZoneConfig` using the newly set passphrase and a hard-coded salt (`p3510060xfZ2s9`). The webshell is then extracted to the controlled webroot, granting RCE on the approximately 30,000 internet-facing instances of the Storage Zone Controller.

Severity: Critical

Threat Details and IOCs

Malware: Cl0p, Clop, CryptoMix Clop
CVEs: CVE-2026-2699, CVE-2026-2701, CVE-2026-33615
Technologies: Citrix ShareFile, Microsoft ASP.NET, Microsoft Internet Information Services, Microsoft Windows, Microsoft Windows Server, Progress ShareFile Storage Zone Controller, Progress ShareFile Storage Zones Controller
Threat Actors: ATK103, Chimborazo, Clop, DEV-0950, EvilCorp, FIN11, GoldEvergreen, GoldTahoe, GracefulSpider, Hive0065, LaceTempest, SpandexTempest, Ta505
Attacker Domains: sharefile[.]lab[.]local
Attacker URLs: /ConfigService/Admin.aspx, /ConfigService/api/StroageZoneConfig, /ConfigService/api/StroageZoneConfig?&h=, /ConfigService/Login.aspx?callerpage=Admin, /StorageCenter/Upload.aspx, /upload.aspx, /upload.aspx?id=803436333&uploadid=jtrazo53&bp=test&accountid=1&exp=1970804033&h=ARcXg5ZqhVKOrlvNmzXjDeOaJIPHkjXX3OrmVJnB090=
Victim Industries: Accounting, Aerospace, Architecture, Construction, Education, Energy, Financial Services, Government, Healthcare, Human Resources, Insurance, Legal Services, Manufacturing, Professional Services, Public Sector, Real Estate, Retail, Utilities
Victim Countries: Australia, Brazil, Canada, Costa Rica, France, Germany, India, Ireland, Japan, Singapore, United Arab Emirates, United Kingdom, United States

Mitigation Advice

  • Immediately patch all Progress ShareFile Storage Zone Controller 5.x instances to version 5.12.4 or later to mitigate CVE-2026-2699 and CVE-2026-2701.
  • Use a vulnerability scanner or a custom script to send a GET request to `/ConfigService/Admin.aspx` on all ShareFile instances. Flag any system that returns an HTTP 302 status code with a response body larger than 10,000 bytes as vulnerable to CVE-2026-2699.
  • Implement a rule on your Web Application Firewall (WAF) or reverse proxy to block all external access to the `/ConfigService/Admin.aspx` URI on ShareFile Storage Zone Controllers.
  • In your SIEM or log management platform, search IIS logs from ShareFile servers for POST requests to `/upload.aspx` that contain the parameter `unzip=true` originating from external IP addresses.
  • Using an EDR or manual file system search, hunt for recently created or modified `.aspx` files within the IIS webroot directories of your ShareFile Storage Zone Controllers, paying close attention to unexpected subdirectories.

Compliance Best Practices

  • Review network access control lists (ACLs) and firewall rules to restrict all public internet access to administrative interfaces of all applications, including the ShareFile `/ConfigService/` path. These interfaces should only be accessible from a trusted internal management network.
  • Audit and enforce file system permissions for the IIS application pool identity running the ShareFile service. Ensure the account has write access only to designated, non-web-accessible storage directories and read-only access elsewhere.
  • Deploy and configure a File Integrity Monitoring (FIM) solution on web servers to generate high-priority alerts for any file creation or modification events involving script files (e.g., .aspx, .php, .jsp) within any IIS webroot directory.
  • Update the asset inventory to classify all internet-facing file transfer solutions as critical assets. Ensure they are included in the scope of the vulnerability management program for frequent scanning and prioritized patching.

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

Qilin and Warlock ransomware operations are employing bring your own vulnerable driver (BYOVD) techniques to neutralize endpoint detection and response (EDR) tools on compromised systems. Qilin attacks deploy a malicious "msimg32.dll" via DLL side-loading, initiating a multi-stage infection that disables over 300 EDR drivers by utilizing "rwdrv.sys" (a renamed "ThrottleStop.sys") for physical memory access and "hlpdrv.sys" to terminate EDR processes, while also evading detection through user-mode hook neutralization and ETW log suppression. This group, frequently gaining initial access via stolen credentials, typically executes ransomware approximately six days post-compromise. Concurrently, the Warlock group, also known as Water Manaul, exploits unpatched Microsoft SharePoint servers and uses a vulnerable "NSecKrnl.sys" driver in BYOVD attacks to terminate security products at the kernel level, replacing previously used drivers, and has expanded its post-exploitation toolkit to include PsExec, RDP Patcher, Velociraptor, Visual Studio Code, Cloudflare Tunnel, Yuze, and Rclone for persistence, lateral movement, and data exfiltration. To counter these threats, organizations should permit only signed drivers from trusted publishers, monitor driver installation events, maintain rigorous patch management, and implement a multi-layered defense focusing on kernel integrity, strict driver governance, and real-time kernel-level activity monitoring.

Severity: Critical

Threat Details and IOCs

Malware: Agenda, AgendaCrypt, Akira, Gold Feather, INC, INC Ransom, Makop, Phobos, Qilin, QilinCrypt, Qilin Locker, Shanya, VX Crypt, Warlock, Water Galura, Water Manaul
CVEs: CVE-2019-19781, CVE-2020-1472, CVE-2021-40444, CVE-2022-30190, CVE-2023-27532, CVE-2023-27997, CVE-2023-3519, CVE-2023-48788, CVE-2023-4966, CVE-2024-21762, CVE-2024-27198, CVE-2024-55591, CVE-2025-31324, CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771, CVE-2025-68947, CVE-2025-7771
Technologies: Citrix ADC, Citrix Gateway, Fortinet, Fortinet FortiGate, Fortinet FortiOS, Fortinet FortiProxy, JetBrains TeamCity, Linux, Microsoft 365, Microsoft Defender Antivirus, Microsoft Remote Desktop Services, Microsoft SharePoint, Microsoft Windows, Microsoft Windows Active Directory, NetScaler ADC, ThrottleStop, Veeam Backup & Replication, VMware ESXi, VMware vCenter Server, Zoho Mail
Threat Actors: Agenda, Akira, Qilin, Shanya, Storm1567, Warlock, WaterManaul
Attacker Countries: China, North Korea, Russia, South Korea
Attacker IPs: 185[.]196[.]10[.]19, 185[.]208[.]156[.]157, 80[.]64[.]16[.]87
Attacker Domains: cloudflariz[.]com, ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion
Attacker URLs: hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=05d0168e-d612-372f-a138-a539c20e6af6, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=06958e37-9494-3cfc-9691-dbff2c1b7b15, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=09fe0944-ef5f-3d12-ba5b-e92f45f8ac7f, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=0f0c766b-df6a-3ed3-9625-37491ef4fbb1, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=13772aa6-e17d-3ee8-b66f-841127db4a6d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=160ec3c5-325f-3383-9efb-54ce9d41cca7, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=172a0c0b-0e11-3dca-9679-be3c35f7b51d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=24434a9c-41ad-3c65-8b43-75b90b9e2724, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=260adced-0f52-3b82-a41f-7c33f3f84547, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=29384992-7b2b-358c-93a4-09c370558db3, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=2f25268a-eb51-3665-8e2f-2f2281c18069, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=2fec27e5-785a-3ed9-9df1-9e2c21deffb8, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=30582aba-6b50-39a0-aae2-54d423e3b33a, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=3105a8f7-027c-354f-a788-85b0fa50640d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=394b2ad0-70c2-3671-be11-c905d0b35773, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=3faeb8ae-d1d1-359a-aa93-4838364ffe7d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=4143509c-5888-304e-b429-f619e32068af, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=44ef1dbe-d696-3034-94b7-37d05dd2a4b7, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=46636a14-8107-3960-8979-aaa6e867336d, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=4eaab58e-96ae-32a4-840f-a235732f1fbf, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=5f7b8fa7-30fd-3afc-9a62-4ac7c2466955, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=60bdc9de-7958-3194-8bf0-4ea43bda4ffa, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=7131070f-c2a1-3e52-bd54-9d60ecda3263, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=78ed959a-66b1-3328-9d16-53e58f3b84f6, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=7cd3db5c-d36a-37c6-bdaf-abd8daac311c, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=901e0684-3db7-3a3a-a11d-ac287eff9dd4, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=99440aae-cecb-3eb0-872a-68cfd4cd1e6f, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=9949d38c-52b0-3ba9-8ba0-74d00d426f6b, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=9c324476-eb4b-39b9-884b-98baa22c9d21, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=b2ee3f6f-a899-33d3-96c4-6baa623321cc, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=b9493a73-8548-330f-9f9e-66ba732b4f70, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=bd40fb13-ecde-323d-ac86-d89deb3612e2, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=bd427b2f-c8cd-30f3-a2b1-2718e23ab855, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=c5441ba3-cc79-3152-9747-07c872a96faa, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=ce720cbe-9973-3142-8d32-0ee69d248dc6, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=cecefc09-2f41-3838-8223-000d3ad145f2, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=d22abc53-c565-31c2-b4d9-fab70161918a, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=d7cfdb29-1a34-31f7-bdbf-16a7a99e9b53, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=dffe3961-d699-3290-ba7c-8b3b9a912b04, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=e54ec58d-0030-3e9e-ae8a-431a29825373, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=ebc25d38-20f6-34c6-b807-fe269015e502, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=ee502f3e-d3ab-37d7-89ff-011997f664b0, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=fd5f6cee-982c-386c-a7b3-2ebcfe161a41, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=fdf4dfe9-838d-31ff-86ad-f251e462789e, hxxp[://]ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd[.]onion/site/view?uuid=feb9c071-d0e2-3c2c-9e8e-7ba0512d3638
Attacker Hashes: 01d00d3dd8bc8fd92dae9e04d0f076cb3158dc9c, 12fcde06ddadf1b48a61b12596e6286316fd33e850687fe4153dfd9383f0a4a0, 1305e8b0f9c459d5ed85e7e474fbebb1, 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0, 31c3574456573c89d444478772597db40f075e25c67b8de39926d2faa63ca1d8, 3bb14eb610885692bd1e4e9d268d8c8d, 6bc8e3505d9f51368ddf323acb6abc49, 7787da25451f5538766240f4a8a2846d0a589c59391e15f188aa077e8b888497, 82ed942a52cdcf120a8919730e00ba37619661a3, 84e2d2084fe08262c2c378a377963a1482b35ac5, 89ee7235906f7d12737679860264feaf, 92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514, 99325e2ee68a1c22d39bd508e6d216e06177817be325b131848a23ca786a2c54, bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56, c748ad6828f8f401ebfa859a3fec40ce47a1e30d, c9707a3bc0f177e1d1a5587c61699975b1153406962d187c9a732f97d8f867c5, cf7cad39407d8cd93135be42b6bd258fce1b9909cef820e5281618a7a0099a27, d3af11d6bb6382717bf7b6a3aceada24f42f49a9489811a66505e03dd76fd1af, f6f89e070ed9be62b9ca284f2f7af9e5
Victim Industries: Administrative and Support Services, Aerospace, Agriculture, Architecture, Arts & Culture, Automation, Automotive, Broadcasting, Business Services, Cloud Infrastructure, Construction, Consumer Packaged Goods, Consumer Services, Defense, Defense Contractor, Education, Energy, Financial Services, Food & Beverage, Food Distribution, Food Processing, Government, Healthcare, Health Care Technology, Hospitality, Industrials, Information Security, IT and DevOps, Logistics, Manufacturing, Maritime, Media & Publishing, Medical Technology, Nonprofit, Oil & Gas, Professional, Scientific, and Technical Services, Professional Services, Real Estate, Retail, Security Services, Technology Hardware, Telecommunications, Trade, Transportation, Travel & Tourism, Utilities, Wholesale & Distribution
Victim Countries: Aruba, Australia, Austria, Bangladesh, Belgium, Brazil, Canada, China, Colombia, Egypt, France, Germany, Indonesia, Ireland, Israel, Italy, Japan, Malaysia, Netherlands, New Zealand, Panama, Peru, Saudi Arabia, Serbia, Singapore, Slovakia, South Korea, Spain, Sweden, Switzerland, Taiwan, Thailand, United Arab Emirates, United Kingdom, United States

Mitigation Advice

  • Immediately apply all available security patches to on-premises Microsoft SharePoint servers to mitigate the initial access vector used by the Warlock ransomware group.
  • Use your EDR or SIEM to scan endpoints and logs for the presence of the malicious file 'msimg32.dll', particularly in relation to DLL side-loading events.
  • Use your EDR or SIEM to hunt for the presence or loading of the driver file 'rwdrv.sys' or 'ThrottleStop.sys' on endpoints.
  • Use your EDR or SIEM to hunt for the presence or loading of the driver file 'hlpdrv.sys' on endpoints.
  • Use your EDR or SIEM to hunt for the presence or loading of the vulnerable driver file 'NSecKrnl.sys' on endpoints.
  • Review endpoint and network logs for suspicious or unauthorized execution of PsExec, especially if originating from non-administrative workstations.
  • Monitor network traffic and endpoint processes for unauthorized use of Rclone or large, unexpected data transfers to external cloud storage providers.

Compliance Best Practices

  • Develop and implement a strict driver governance policy using application control or endpoint security features to allow only signed drivers from an explicit list of trusted publishers.
  • Configure and tune your EDR solution to generate high-priority alerts for suspicious kernel-level activities, such as a process attempting to unload or disable security agent drivers.
  • Enforce multi-factor authentication (MFA) for all remote access, privileged accounts, and critical system logins to mitigate credential theft.
  • Establish and enforce a rigorous patch management policy to ensure all operating systems, applications, and security tools are updated within a defined timeframe.
  • Implement network segmentation to isolate critical servers from general user workstations, restricting east-west traffic to prevent attackers from moving laterally across the network.
  • Configure firewall egress filtering rules to block or alert on traffic to known anonymizing services and unexpected destinations or ports to disrupt command-and-control communications.
Sources

https://blog.talosintelligence.com/qilin-edr-killer/

https://gbhackers.com/qilin-ransomware-deploys-malicious-dll/

https://malwaretips.com/threads/qilin-ransomware-deploys-sophisticated-multi-stage-edr-killer-targeting-300-security-products.140687/

https://thehackernews.com/2026/04/qilin-and-warlock-ransomware-use.html

https://www.hendryadrian.com/genoa-fines-payment-system-hit-by-ransomware-city-extends-deadlines-and-offers-30-discount/

https://www.hendryadrian.com/ransom-agencavi-srl-mar-2026/

https://www.hendryadrian.com/ransom-alarmco-mar-2026/

https://www.hendryadrian.com/ransom-arca-service-mar-2026/

https://www.hendryadrian.com/ransom-aroostook-mental-health-services-mar-2026/

https://www.hendryadrian.com/ransom-artemedica-mar-2026/

https://www.hendryadrian.com/ransom-biogel-mar-2026/

https://www.hendryadrian.com/ransom-blantyre-capital-mar-2026/

https://www.hendryadrian.com/ransom-brothers-produce-mmm-yyyy-example-jan-2026-from-this-date-2026-03-07-181614-385756/

https://www.hendryadrian.com/ransom-btx-global-logistics-mar-2026/

https://www.hendryadrian.com/ransom-chek-news-apr-2026/

https://www.hendryadrian.com/ransom-chickasaw-holding-mar-2026/

https://www.hendryadrian.com/ransom-dielco-mar-2026/

https://www.hendryadrian.com/ransom-doctor-com-mar-2026/

https://www.hendryadrian.com/ransom-dow-mar-2026/

https://www.hendryadrian.com/ransom-duffys-sports-grill-mar-2026/

https://www.hendryadrian.com/ransom-fondation-boghossian-mar-2026/

https://www.hendryadrian.com/ransom-fortress-systems-mar-2026/

https://www.hendryadrian.com/ransom-geotec-surveys-mar-2026/

https://www.hendryadrian.com/ransom-grupo-coril-mar-2026/

https://www.hendryadrian.com/ransom-hollu-systemhygiene-mar-2026/

https://www.hendryadrian.com/ransom-jursaconsulting-apr-2026/

https://www.hendryadrian.com/ransom-kerjaya-prospek-group-mar-2026/

https://www.hendryadrian.com/ransom-kuzco-lighting-mar-2026/

https://www.hendryadrian.com/ransom-living-in-green-s-r-o-mar-2026/

https://www.hendryadrian.com/ransom-mac-interiors-mar-2026/

https://www.hendryadrian.com/ransom-mcc-economics-mar-2026/

https://www.hendryadrian.com/ransom-millerfoto-mar-2026/

https://www.hendryadrian.com/ransom-muffett-mar-2026/

https://www.hendryadrian.com/ransom-nanxun-enterprise-co-ltd-mar-2026/

https://www.hendryadrian.com/ransom-neurologic-associates-of-central-brevard-apr-2026/

https://www.hendryadrian.com/ransom-pinnacle-tax-inc-mar-2026/

https://www.hendryadrian.com/ransom-q-lab-mar-2026/

https://www.hendryadrian.com/ransom-retail-centenario-mar-2026/

https://www.hendryadrian.com/ransom-salag-mar-2026/

https://www.hendryadrian.com/ransom-seeing-machines-jan-2026/

https://www.hendryadrian.com/ransom-seram-spa-mar-2026/

https://www.hendryadrian.com/ransom-service-star-freightways-mar-2026/

https://www.hendryadrian.com/ransom-shwapno-mar-2026/

https://www.hendryadrian.com/ransom-silvon-software-mar-2026/

https://www.hendryadrian.com/ransom-southern-commercial-real-estate-mar-2026/

https://www.hendryadrian.com/ransom-syed-professional-services-mar-2026/

https://www.hendryadrian.com/ransom-tds-construction-mar-2026/

https://www.hendryadrian.com/ransom-virtualexpo-group-mar-2026/

https://www.hendryadrian.com/ransom-von-weise-associates-mar-2026/

https://www.hendryadrian.com/ransom-wal-consultant-mar-2026/

https://www.hipaajournal.com/data-breaches-corewell-health-rocky-mountain-care/

Authors & Contributors

Brian Sayer (Author)

Threat Intelligence Analyst, F5