Security Alert: Android March 2026 Update Targets Actively Exploited Zero-Day

Google has released its March 2026 Android Security Bulletin, a substantial update addressing 129 vulnerabilities, including at least one actively exploited zero-day. The most critical flaw, CVE-2026-21385, is a high-severity memory corruption vulnerability within a Qualcomm display component, confirmed to be under limited, targeted exploitation and impacting 234 different chipsets due to improper memory allocation. The update is divided into two patch levels: the 2026-03-01 level fixes 63 core Android component vulnerabilities, notably critical Remote Code Execution (CVE-2026-0006) in the System component and Elevation of Privilege (CVE-2026-0047) in the Framework, both exploitable without user interaction. The 2026-03-05 level addresses 66 vulnerabilities in hardware-specific drivers and the Linux kernel, including critical patches for Protected Kernel-Based Virtual Machine (e.g., CVE-2026-0038) and Hypervisor (e.g., CVE-2026-0027). Android users are strongly urged to apply these security updates immediately through their device settings.

Severity: Critical

Threat Details and IOCs

Malware: AstarionRAT, Cl0p, Clop, CryptoMix, Dohdoor, MIMICRAT, PromptSpy, VNCSpy
CVEs: CVE-2024-43859, CVE-2025-2879, CVE-2025-32313, CVE-2025-47394, CVE-2025-48544, CVE-2025-48631, CVE-2026-0006, CVE-2026-0027, CVE-2026-0028, CVE-2026-0030, CVE-2026-0031, CVE-2026-0037, CVE-2026-0038, CVE-2026-0047, CVE-2026-21385, CVE-2026-22719
Technologies: Arm, Arm Mali, Google Android, Imagination PowerVR, Imagination Technologies, Linux, MediaTek, Qualcomm, Qualcomm Adreno, Qualcomm Adreno GPUs, Qualcomm Snapdragon, UNISOC, VMware Aria Operations
Threat Actors: APT28
Attacker Countries: Russia
Attacker Emails: gauravsi@qti.qualcomm.com, sbauer@qti.qualcomm.com
Attacker Domains: wellnesscaremed.com
Attacker Hashes: aefd15e3c395edd16ede7685c6e97ca0350a702ee7c8585274b457166e86b1fa
Victim Industries: Automotive, Defense, Financial Services, Government, Healthcare, Internet of Things (IoT), Manufacturing, Public Sector, Radio and Television Broadcasting and Wireless Communications Equipment Manufacturing, Retail, Semiconductors, Technology Hardware, Telecommunications
Victim Countries: Argentina, Armenia, Azerbaijan, Belarus, Czech Republic, France, Georgia, Germany, Kazakhstan, Lithuania, Poland, Slovakia, Sweden, Ukraine, United States

Mitigation Advice

  • Use your Mobile Device Management (MDM) or Unified Endpoint Management (UEM) solution to generate an inventory of all managed Android devices, detailing their current OS patch level and hardware model.
  • Configure your MDM/UEM policy to enforce the immediate installation of the March 2026 Android security update (patch level 2026-03-05 or later) on all managed corporate devices.
  • Send a company-wide security alert to all employees instructing them to manually update their Android devices to the March 2026 security patch level, highlighting the risk from the actively exploited zero-day.
  • Enhance monitoring of network logs for unusual outbound traffic patterns or connections to unknown domains originating from Android devices, which could indicate a successful compromise.

Compliance Best Practices

  • If not already in place, evaluate and deploy a Mobile Device Management (MDM) or Unified Endpoint Management (UEM) solution to enforce security policies on all mobile devices accessing corporate data.
  • Establish a formal mobile device security policy that mandates minimum OS versions and patch levels as a condition for accessing corporate network resources and applications.
  • Implement a Mobile Threat Defense (MTD) solution that integrates with your MDM/UEM to protect against malware, network-based attacks, and vulnerability exploits on Android devices.
  • Design and implement network segmentation to place all mobile devices, including BYOD, on an isolated network with strictly controlled access to sensitive internal resources.
  • Develop and roll out a recurring security awareness training program that includes modules on mobile security hygiene, phishing awareness on mobile platforms, and the importance of timely software updates.
Sources

https://buaq.net/go-398955.html

https://cyberinsider.com/google-patches-actively-exploited-qualcomm-gpu-zero-day-on-android/

https://cyberpress.org/android-security-update-fixes-129-vulnerabilities/

https://cyberveille.esante.gouv.fr/alertes/android-cve-2026-21385-2026-03-03

https://gbhackers.com/cisa-warns-qualcomm-chipsets-memory-corruption-vulnerability/

https://securityboulevard.com/2026/03/high-severity-qualcomm-bug-hits-android-devices-in-targeted-attacks/

https://securityonline.info/cisa-adds-qualcomm-and-vmware-flaws-to-known-exploited-catalog/

https://securityonline.info/security-alert-android-march-2026-update-targets-actively-exploited-zero-day/

https://socprime.com/blog/cve-2026-21386-vulnerability/

https://sploitus.com/exploit?id=A715F13B-C164-537C-864D-1CDDD7A946BC

https://thehackernews.com/2026/03/google-confirms-cve-2026-21385-in.html

https://www.darkreading.com/threat-intelligence/qualcomm-zero-day-exploited-targeted-android-attacks

https://www.helpnetsecurity.com/2026/03/03/android-march-2026-security-patch-cve-2026-21385/

https://www.hendryadrian.com/google-addresses-actively-exploited-qualcomm-zero-day-in-fresh-batch-of-129-android-vulnerabilities/

https://www.malwarebytes.com/blog/news/2026/03/high-severity-qualcomm-bug-hits-android-devices-in-targeted-attacks

https://www.scworld.com/brief/google-patches-129-android-vulnerabilities-including-exploited-zero-day

https://www.techradar.com/pro/security/google-patches-129-android-security-flaws-including-potentially-dangerous-qualcomm-zero-day

https://www.techrepublic.com/article/news-google-android-security-update-129-vulnerabilities/

Cisco Patches Secure Firewall Management Center Software Vulnerabilities (CVE-2026-20079 CVE-2026-20131)

Cisco has released security updates to address two critical-severity vulnerabilities in Secure Firewall Management Center Software. CVE-2026-20131, a Remote Code Execution vulnerability, exists in the web-based management interface due to insecure deserialization of a user-supplied Java byte stream, allowing an unauthenticated, remote attacker to execute arbitrary Java code as root by sending a crafted serialized Java object. CVE-2026-20079, an Authentication Bypass vulnerability, is present in the web interface due to an improperly configured system process, enabling an unauthenticated, remote attacker to bypass authentication and execute script files, thereby obtaining root access to the underlying operating system, by sending crafted HTTP requests. Affected versions include 6.4.0.13 before 7.0.9, 7.0.0 before 7.0.9, 7.1.0 before 7.2.11, 7.3.0 before 7.4.6, 7.6.0 before 7.6.5, 7.7.0 before 7.7.12, and 10.0.0 before 10.0.1. Software updates have been released to mitigate these issues, and further details are available in Cisco Security Advisories cisco-sa-onprem-fmc-authbypass-5JPp45V2 and cisco-sa-fmc-rce-NKhnULJh.

Severity: Critical

Threat Details and IOCs

Malware: Line Dancer, Line Runner
CVEs: CVE-2026-20079, CVE-2026-20131
Technologies: Cisco Secure Firewall Management Center, Cisco Secure Firewall Management Center Software, Cisco Security Cloud Control, Oracle Java
Threat Actors: STORM-1849, Uat4356
Attacker Countries: China
Victim Industries: Cloud Infrastructure, Energy, Financial Services, Government, Healthcare, Industrials, Information Technology, Multimedia, Telecommunications
Victim Countries: United States

Mitigation Advice

  • Prioritize and apply the security updates from Cisco to all identified Cisco Secure Firewall Management Center (FMC) instances.
  • Initiate a vulnerability scan using Qualys with QIDs 317769 and 317770 to create a definitive list of all vulnerable Cisco FMC devices on the network.
  • Manually audit the software version of all Cisco Secure Firewall Management Center (FMC) instances and compare them against the list of affected versions provided in the article.
  • Configure network firewalls to immediately block all access to the Cisco FMC web-based management interface from the internet and all internal networks, except for a small, designated set of administrator workstations.

Compliance Best Practices

  • Initiate a network architecture review project to create a dedicated, out-of-band management network for all critical infrastructure, ensuring that management interfaces are physically or logically isolated from production and user network traffic.
  • Develop and implement a comprehensive vulnerability management policy that includes automated asset inventory, regular scanning schedules, risk-based prioritization criteria, and defined Service Level Agreements (SLAs) for patching critical infrastructure.
  • Evaluate and deploy a Web Application Firewall (WAF) in front of critical management interfaces that must remain accessible over the network to provide a virtual patching and defense-in-depth layer against web-based attacks.

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

The Coruna iOS exploit kit, identified by Google Threat Intelligence Group, targets Apple iPhone models running iOS versions 13.0 through 17.2.1, comprising five full exploit chains and 23 individual exploits that leverage non-public techniques and mitigation bypasses. Its proliferation was observed from initial use by a commercial surveillance vendor's customer in February 2025, to watering hole attacks against Ukrainian users by UNC6353 (a suspected Russian espionage group) in summer 2025, and finally in broad-scale campaigns by UNC6691 (a financially motivated Chinese threat actor) via fake financial websites by the end of 2025, indicating an active market for zero-day exploits. The kit's sophisticated JavaScript framework fingerprints devices, bypasses Lockdown Mode and private browsing, and delivers encrypted, compressed binary payloads. The final payload, PlasmaLoader (PLASMAGRID), injects into the `powerd` daemon to steal financial information, including QR codes, BIP39 word sequences, and bank account details from Apple Memos, and can remotely load modules to exfiltrate data from various cryptocurrency wallet applications, with its internal logging containing Chinese text. Users are strongly advised to update their iOS devices to the latest version and enable Lockdown Mode for protection.

Severity: Critical

Threat Details and IOCs

Malware: Coruna, CryptoWaters, EternalBlue, IronLoader, Pegasus, Photon, PlasmaGrid, PLASMAGRID, PlasmaLoader, TriangleDB, WanaCrypt0r, WannaCry, WannaCrypt, WannaCryptor, WCry
CVEs: CVE-2020-27932, CVE-2020-27950, CVE-2021-30952, CVE-2022-48503, CVE-2023-32409, CVE-2023-32434, CVE-2023-32435, CVE-2023-38606, CVE-2023-41974, CVE-2023-41990, CVE-2023-43000, CVE-2024-23222, CVE-2024-23225, CVE-2024-23296
Technologies: Apple iOS, Apple macOS, Apple Memos, Apple Safari, Apple WebKit, Bitget Wallet, BitKeep, Exodus Wallet, MetaMask, Phantom, TokenPocket, Trust Wallet, Uniswap
Threat Actors: GALLIUM, Lazarus, LazarusGroup, NSO, PLASMAGRID, TheShadowBrokers, UNC6353, UNC6691
Attacker Countries: China, North Korea, Russia, United States
Attacker Domains: 26a.online, 2s3b3rknfqtwwpo.xyz, 3v5w1km5gv.xyz, 4kgame.us, 4u.game, 65sse.668ddf.cc, 6zvjeulzaw5c0mv.xyz, 7ff.online, 7fun.icu, 7p.game, 7uspin.us, 8df7.cc, 8fn4957c5g986jp.xyz, 98a.online, ai-scorepredict.com, ajskbnrs.xn--jor0b302fdhgwnccw8g.com, anygg.liquorfight.com, b27.icu, b38w09ecdejfqsf.xyz, bestcryptocurrency.top, binancealliancesintro.com, btrank.top, cdn.uacounter.com, cryptocurrencyworld.top, cy8.top, dbgopaxl.com, dd9l7e6ghme8pbk.xyz, ddus17.com, eg2bjo5x5r8yjb5.xyz, fxrhcnfwxes90q.xyz, gdvynopz3pa0tik.xyz, goanalytics.xyz, goodcryptocurrency.top, gqjs3ra34lyuvzb.xyz, h4k.icu, hfteigt3kt0sf3z.xyz, hui4tbh9uv9x4yi.xyz, i.binaner.com, ios.teegrom.top, iphonex.mjdqw.cn, k96.icu, kanav.blog, land.777bingos.xyz, land.77bingos.com, land.bingo777.now, lddx3z2d72aa8i6.xyz, lk4x6x2ejxaw2br.xyz, lsnngjyu9x6vcg0.xyz, mkkku.com, m.pc6.com, mxbc-v2.tjbjdod.cn, n49.top, o08h5rhu2lu1x0q.xyz, ol67el6pxg03ad7.xyz, ose.668ddf.cc, osec2.668ddf.cc, pen0axt0u476duw.xyz, pepeairdrop01.com, res54allb.xn--xkrsa0078bd6d.com, rlau616jc7a7f7i.xyz, roy2tlop2u.xyz, sadjd.mijieqi.cn, seven7.to, seven7.vip, sf2bisx5nhdkygn3l.xyz, share.4u.game, share.7p.game, sj9ioz3a7y89cy7.xyz, so5083.tubeluck.com, spin7.icu, t7c.icu, uawwydy3qas6ykv.xyz, v2gmupm7o4zihc3.xyz, vvri8ocl4t3k8n6.xyz, w2a315.tubeluck.com, www.appstoreconn.com, xfal48cf0ies7ew.xyz, xittgveqaufogve.xyz, xjslbdt9jdijn15.xyz, xmmfrkq9oat1daq.xyz, y4w.icu, yvgy29glwf72qnl.xyz, zcjdlb5ubkhy41u.xyz, ztvnhmhm4zj95w3.xyz
Attacker URLs: http://bestcryptocurrency.top/details/group.html, http://cdn.uacounter.com/stat.html, http://cryptocurrencyworld.top/details/group.html, http://ddus17.com/tuiliu/group.html, http://goodcryptocurrency.top/details/group.html, http://land.777bingos.xyz/88k4ez/group.html, http://land.77bingos.com/88k4ez/group.html, http://land.bingo777.now/88k4ez/group.html, http://pepeairdrop01.com/static/analytics.html, https://26a.online/group.html, https://3v5w1km5gv.xyz/group.html, https://4kgame.us/group.html, https://4u.game/group.html, https://65sse.668ddf.cc/tuiliu/group.html, https://7ff.online/group.html, https://7fun.icu/group.html, https://7p.game/group.html, https://7uspin.us/group.html, https://8df7.cc/api/ip-sync/sync, https://98a.online/group.html, https://ai-scorepredict.com/static/analytics.html, https://ajskbnrs.xn--jor0b302fdhgwnccw8g.com/gogo/list.html, https://anygg.liquorfight.com/88k4ez/group.html, https://b27.icu/group.html, https://binancealliancesintro.com/group.html, https://btrank.top/tuiliu/group.html, https://cy8.top/group.html, https://dbgopaxl.com/static/goindex/tuiliu/group.html, https://dd9l7e6ghme8pbk.xyz/group.html, https://fxrhcnfwxes90q.xyz/group.html, https://goanalytics.xyz/88k4ez/group.html, https://goodcryptocurrency.top/details/group.html, https://h4k.icu/group.html, https://i.binaner.com/group.html, https://ios.teegrom.top/tuiliu/group.html, https://iphonex.mjdqw.cn/tuiliu/group.html, https://k96.icu/group.html, https://kanav.blog/group.html, https://land.bingo777.now/88k4ez/group.html, https://lddx3z2d72aa8i6.xyz/group.html, https://mkkku.com/static/analytics.html, https://m.pc6.com/test/tuiliu/group.html, https://n49.top/group.html, https://ose.668ddf.cc/tuiliu/group.html, https://osec2.668ddf.cc/tuiliu/group.html, https://pepeairdrop01.com/static/analytics.html, https://res54allb.xn--xkrsa0078bd6d.com/group.html, https://sadjd.mijieqi.cn/group.html, https://seven7.to/group.html, https://seven7.vip/group.html, https://share.4u.game/group.html, https://share.7p.game/group.html, https://sj9ioz3a7y89cy7.xyz/list.html, https://so5083.tubeluck.com/static/goindex/group.html, https://spin7.icu/group.html, https://t7c.icu/group.html, https://w2a315.tubeluck.com/static/goindex/tuiliu/group.html, https://www.appstoreconn.com/xmweb/group.html, https://y4w.icu/group.html
Attacker Hashes: 023e5fb71923cfa2088b9a48ad8566ff7ac92a99630add0629a5edf4679888de, 05b5e4070b3b8a130b12ea96c5526b4615fcae121bb802b1a10c3a7a70f39901, 0dff17e3aa12c4928273c70a2e0a6fff25d3e43c0d1b71056abad34a22b03495, 10bd8f2f8bb9595664bb9160fbc4136f1d796cb5705c551f7ab8b9b1e658085c, 18394fcc096344e0730e49a0098970b1c53c137f679cff5c7ff8902e651cd8a3, 1fb9dedf1de81d387eff4bd5e747f730dd03c440157a66f20fdb5e95f64318c0, 25a9b004cf61fb251c8d4024a8c7383a86cb30f60aa7d59ca53ce9460fcfb7de, 2a9d21ca07244932939c6c58699448f2147992c1f49cd3bc7d067bd92cb54f3a, 3c297829353778857edfeaed3ceeeca1bf8b60534f1979f7d442a0b03c56e541, 42cc02cecd65f22a3658354c5a5efa6a6ec3d716c7fbbcd12df1d1b077d2591b, 499f6b1e012d9bc947eea8e23635dfe6464cd7c9d99eb11d5874bd7b613297b1, 4dc255504a6c3ea8714ccdc95cc04138dc6c92130887274c8582b4a96ebab4a8, 4dfcf5a71e5a8f27f748ac7fd7760dec0099ce338722215b4a5862b60c5b2bfd, 6eafd742f58db21fbaf5fd7636e6653446df04b4a5c9bca9104e5dfad34f547c, 721b46b43b7084b98e51ab00606f08a6ccd30b23bef5e542088f0b5706a8f780, 91d44c1f62fd863556aac0190cbef3b46abc4cbe880f80c580a1d258f0484c30, be28b40df919d3fa87ed49e51135a719bd0616c9ac346ea5f20095cb78031ed9, ce0a80a99b00d7ab74a90fa265a62755c25f78a3cd5ee7d9779d829bcd8c1895, d371e3bed18ee355438b166bbf3bdaf2e7c6a3af8931181b9649020553b07e7a, d517c3868c5e7808202f53fa78d827a308d94500ae9051db0a62e11f7852e802, f218068ea943a511b230f2a99991f6d1fbc2ac0aec7c796b261e2a26744929ac
Victim Industries: Business Services, Cryptocurrency, Defense, E-commerce, Financial Services, Government, Industrials, Information Security, Manufacturing, Multimedia, Online Gambling, Public Sector, Retail, Sports and Entertainment, Technology Hardware
Victim Countries: China, Israel, Russia, Syria, Ukraine, United States

Mitigation Advice

  • Ensure all company-managed and BYOD iPhones are updated to the latest available version of iOS immediately.
  • Enable Lockdown Mode on iPhones for high-risk users or any device that cannot be immediately updated to a patched iOS version.
  • Add all URLs and domains from the article's 'Network Indicators' section to the blocklists on your firewall, web proxy, and DNS filtering services.
  • Use endpoint detection tools to scan for the file hashes provided in the 'File Indicators' section on all managed iOS devices.
  • Deploy the YARA rules provided in the article to scan network traffic and endpoint data for signs of the Coruna exploit kit and PLASMAGRID payload.

Compliance Best Practices

  • Implement or enhance a Mobile Device Management (MDM) solution to gain visibility into iOS versions and enforce security policies, such as mandatory updates.
  • Develop and implement a continuous security awareness training program that educates users on identifying and avoiding mobile-based phishing and malicious websites.
  • Create or review corporate policies to restrict or secure the use of mobile devices for accessing sensitive financial data and cryptocurrency applications.
  • Implement enhanced network egress filtering and DNS monitoring to detect and block anomalous outbound connections, such as those generated by a Domain Generation Algorithm (DGA).
  • Develop and formalize an incident response plan specifically for handling security incidents involving compromised mobile devices.
Sources

https://apple.slashdot.org/story/26/03/03/2049253/a-possible-us-government-iphone-hacking-toolkit-is-now-in-the-hands-of-foreign-spies-criminals

https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit/

https://coinedition.com/iphone-security-alert-coruna-hack-targets-crypto-wallet-recovery-phrases/

https://cyberinsider.com/google-uncovers-new-coruna-ios-exploit-kit-used-in-iphone-espionage/

https://cyberpress.org/coruna-exploit-kit-leveraging-23-vulnerabilities/

https://gbhackers.com/thousands-of-iphones-compromised-in-massive-hack-via-coruna-exploit-kit/

https://meterpreter.org/from-spyware-to-scams-the-coruna-ios-arsenal-exploiting-23-vulnerabilities-to-plunder-iphones/

https://securityonline.info/coruna-the-high-powered-ios-exploit-kit-proliferating-across-the-global-threat-landscape/

https://sploitus.com/exploit?id=43D73A3D-B17C-5650-ADD1-0A440F38D03B

https://sploitus.com/exploit?id=81F563EA-F160-582D-AAA5-D5964E5EF53E

https://techcrunch.com/2026/03/03/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals/

https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html

https://www.androidheadlines.com/2026/03/us-government-hacking-tools-are-now-in-criminal-hands-is-your-iphone-safe.html

https://www.bleepingcomputer.com/news/security/spyware-grade-coruna-ios-exploit-kit-now-used-in-crypto-theft-attacks/

https://www.cyberkendra.com/2026/03/google-uncovers-coruna-ios-exploit-kit.html

https://www.esecurityplanet.com/threats/coruna-ios-exploit-kit-compromises-thousands-of-iphones/

https://www.helpnetsecurity.com/2026/03/03/coruna-ios-exploit-kit/

https://www.infosecurity-magazine.com/news/coruna-exploit-older-iphones/

https://www.scworld.com/brief/coruna-exploit-kit-government-hacking-tools-surface-in-cybercriminal-hands

https://www.securitylab.ru/news/570046.php

https://www.securityweek.com/nation-state-ios-exploit-kit-coruna-found-powering-global-attacks/

https://www.techradar.com/pro/security/iphones-targeted-by-new-and-powerful-malware-and-coruna-may-have-been-developed-by-the-us-government

https://www.theregister.com/2026/03/04/kaspersky_dismisses_claims_that_coruna/

HackerBot-Claw: An AI-Assisted Campaign Targeting GitHub Actions Pipelines

An automated campaign, dubbed "HackerBot-Claw," systematically scans public GitHub repositories for misconfigured GitHub Actions workflows, particularly those utilizing `pull_request_target` with elevated permissions, to gain privileged access. Active around February 27-28, 2026, this campaign exploits insecure CI/CD configurations to achieve remote code execution and privileged token theft across CI/CD pipelines. The attack chain involves inspecting `.github/workflows/*.yml` for patterns such as `pull_request_target` triggers, excessive token permissions, untrusted checkouts, or reuse of privileged secrets. Upon identifying a vulnerable workflow, the attacker generates a crafted pull request to trigger the CI pipeline, leading to arbitrary code execution or exposure of privileged tokens. Compromised tokens enable destructive or unauthorized API actions, including token exfiltration, direct commit pushes, release deletions, advisory creation, and repository manipulation, with some instances leading to full repository takeover. High-profile open-source projects, including microsoft/ai-discovery-agent, DataDog/datadog-iac-scanner, avelino/awesome-go, project-akri/akri, ambient-code/platform, aquasecurity/trivy, and RustPython/RustPython, were impacted. Mitigation strategies include secure workflow design, safe handling of ``pull_request_target`,` strict token scoping, input sanitization, preventing untrusted code from executing with elevated permissions, applying recommended updates, and rotating credentials. This campaign highlights a broader trend of CI/CD exploitation, as evidenced by past supply chain attacks like the one against `tj-actions/changed-files`.

Severity: Critical

Threat Details and IOCs

Malware: Spark, SparkRAT, VShell, Zerobot, ZeroStresser
CVEs: CVE-2023-3411, CVE-2023-51664, CVE-2024-21626, CVE-2025-30066, CVE-2025-30154, CVE-2025-47928
Technologies: Akri, Amazon Kiro CLI, Anthropic Claude, Aqua Security Trivy, Datadog IaC Scanner, Eclipse Foundation Open VSX Registry, GitHub Actions, GitHub Copilot, Go, Google Gemini, Kubernetes, Linux, Microsoft Visual Studio, OpenAI, Open VSX Registry, Python, tj-actions changed-files
Attacker Domains: hackmoltrepeat.com, recv.hackmoltrepeat.com
Attacker URLs: hackmoltrepeat.com/molt, https://hackmoltrepeat.com/molt, https://hackmoltrepeat.com/moult, https://recv.hackmoltrepeat.com/, pkg:vscode/aquasecurityofficial/trivy-vulnerability-scanner@1.8.12?repository_url=https://open-vsx.org, pkg:vscode/aquasecurityofficial/trivy-vulnerability-scanner@1.8.13?repository_url=https://open-vsx.org
Victim Industries: Artificial Intelligence, Cloud Infrastructure, Information Security, Software, Technology Hardware
Victim Countries: Israel, United States

Mitigation Advice

  • Immediately audit all GitHub Actions workflows across all company repositories to identify any that use the `pull_request_target` trigger.
  • For any workflow identified using `pull_request_target`, immediately review its `permissions` block and remove write permissions (e.g., `contents: write`) unless they are validated as absolutely necessary.
  • In workflows using `pull_request_target`, search for and remove any steps that check out code from the pull request head reference (`${{ github.event.pull_request.head.sha }}`).
  • Review all software and dependency lists to determine if the organization uses any of the 'Known Impacted Repositories' mentioned in the article and immediately apply recommended updates or credential rotation guidance from the maintainers.

Compliance Best Practices

  • Configure organization-level GitHub settings to enforce read-only permissions for the `GITHUB_TOKEN` by default for all new repositories and workflows.
  • Implement a mandatory code review process for all changes to GitHub Actions workflow files (`.github/workflows/*.yml`) by using GitHub's branch protection rules and CODEOWNERS files.
  • Establish and enforce a policy requiring all third-party GitHub Actions in workflows to be pinned to a specific, immutable commit SHA instead of a mutable tag like `@v4`.
  • Integrate an automated security scanner into the CI/CD pipeline to continuously audit GitHub Actions workflows for misconfigurations, such as the use of `pull_request_target` with write permissions, before code is merged.
  • For workflows that must process pull requests from forks, re-architect them to use the `workflow_run` trigger, which safely separates the privileged workflow from the untrusted code execution by passing data via artifacts.
  • Enforce input sanitization within GitHub Actions workflows for all data derived from pull requests, including branch names, titles, and filenames, to prevent injection attacks.

Inside Tycoon2FA: How a Leading AiTM Phishing Kit Operated at Scale

Tycoon2FA emerged in August 2023 as a prominent phishing-as-a-service (PhaaS) platform, enabling campaigns that generated tens of millions of phishing messages monthly, impacting over 500,000 organizations across various sectors. Operated by the threat actor Storm-1747, this kit provided adversary-in-the-middle (AiTM) capabilities, allowing even less skilled attackers to bypass multifactor authentication (MFA) by intercepting session cookies and credentials. The service, advertised on platforms like Telegram and Signal for as little as $120 for 10 days, featured a web-based administration panel for configuring campaigns, selecting lure templates (impersonating services like Microsoft 365, Outlook, Gmail), managing redirect logic, and tracking victims. Its infrastructure evolved from static domains to a dynamic ecosystem of short-lived FQDNs and diverse TLDs, often hosted on Cloudflare, using readable subdomains to evade detection. Tycoon2FA employed sophisticated evasion techniques, including anti-bot screening, browser fingerprinting, heavy code obfuscation, custom CAPTCHAs, dynamic decoy pages, and complex redirect chains involving legitimate services like Azure Blob Storage and Firebase. Phishing emails typically contained malicious attachments (PDF, DOCX, SVG, HTML) or redirect links, often leveraging compromised accounts. Captured credentials and session tokens were exfiltrated via encrypted channels, frequently Telegram bots, enabling attackers to gain persistent access. To counter such threats, implementing phishing-resistant MFA (e.g., FIDO2, Windows Hello for Business, authenticator passkeys) is crucial, especially for privileged roles. Immediate remediation for compromised accounts includes resetting credentials, revoking active sessions, re-registering MFA devices, reverting unauthorized financial changes, and removing malicious inbox rules. Proactive defenses involve configuring email security solutions for link rechecking and zero-hour auto purge, enabling network protection, using secure browsers with threat intelligence, and deploying cloud-delivered antivirus protection. Additionally, organizations should simulate attacks to train users and configure automatic attack disruption and conditional access policies requiring strong authentication.

Severity: Critical

Threat Details and IOCs

Malware: BlackForce, Caffeine, GhostFrame, InboxPrimeAI, RaccoonO365, Tycoon, Tycoon 2FA, Tycoon2FA
Technologies: Google Gmail, Google Workspace, Microsoft 365, Microsoft Entra ID
Threat Actors: BlackForce, Mr_Xaad, MrXaaD, SaaadFridi, SaadTycoonGroup, Storm-1747, Storm1747, Storm-2246, Tycoon Group, TycoonGroup
Attacker Countries: Pakistan, Russia, Spain
Attacker Domains: 0q5e0.nemen9.com, 25rw2.canweal.com, 35fu2.ouchar.ru, 4343w.jgu0.com, 43rw98nop8.m1p8z.com, 4m2swl.7e2r.com, 5me78.methw.ru, 6j312.rchan0.com, 7374.ginvet9.com, 77p3e.rimesh3.com, 8000n.uqin.ru, 8uecv.gnornamb.com, 98q5e.ructin.com, 9c43r.theq0.com, 9oc0y2isa27.demur3.com, astro.thorousha.ru, backend.vmfuiojitnlb.es, beacon.diremsto.com, bloggcenter.com, branch.cricomai.sa.com, buneji.fiernmar.com, codecrafterspro.com, codecrafters.su, com.de, date.woosea.biz.id, devcraftingsolutions.com, e85t8.nechsha.com, ex1uo.rhknt.ru, explore.atlester.ru, fiq75d.rexj.ru, fisaca.trodeckh.com, galume.aricente.com, gz238.uatimin.com, horizon.sologerg.com, i9152.cisele0.com, ifelse.rlcozx.es, immutable.nathacha.digital, in.net, jgcrrouu.es, jp1y36.it2ua.com, k348d.venti71.com, kjlvo.ningeona.com, kjsdflwe.nitertym.ru, kzagniw.es, l846d.ferver8.com, libudi.oreversa.com, mapbox.stashiowio.us, mock.zuyistoo.today, mysql.vecedoo.online, n29k4.ilert.ru, n9zph.lw8opi.com, o6t94g.3tdx2r.com, onkttyhqjycn.es, oo99v.coqqwx.ru, p1v12.17nor.com, piwf.ariitdc.es, pmd8ot6xhw.3qjpc.com, q908q.refec7.com, q9y3.efwzxgd.es, qonnfp.wnrathttb.ru, r298y.sem01.com, rlpq.tk9u.com, roriku.orankfix.com, s3.ap-northeast-3.amazonaws.com, sa.com, tlger-surveillance.com, tnyr.moporins.com, tycoongroup.ws, vraudo.es, wasogo.shantowd.com, x12y.restrice.ru, xrs.chenebystie.com, xva.tjlpkcia.com, zaqaxu.dthiterp.ru, zekal6.tnjxb.com, zemj4f.ymarir.ru
Attacker URLs: https://3eJBE8eo5f13oigGmQkDKhEkKNK9c2TlnVZPVRc16Hnhi0G4kxTsXEf2gH.jgcrrouu.es/sZzqqvSHaFLRSRFbpIgHEzUhFBimCQAHTCPYNKQFZGMAFYFZUSEVATEOXHQKEXAQDWFXJOAYHETC, https://click.mailchimp.com/track/click/30010842/s3.ap-northeast-3.=amazonaws.com?p=3DeyJzIjoiUUhxQS1jMmJmNW9QeS1lNUFZT2RMeVE4WlJjIiwidiI6Miwic=CI6IntcInVcIjozMDAxMDg0MixcInZcIjoyLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3MzLmFw=LW5vcnRoZWFzdC0zLmFtYXpvbmF3cy5jb21cXFwvYmFzc2V0dGhvdXNlaW5uLmNvbVxcXC9pbmR=leC5odG1sXCIsXCJpZFwiOlwiZTFjOTg0N2U5YzM1NDc0NjhhZGIyYTAxMGNhZWQxNGZcIixcIn=VybF9pZHNcIjpbXCJhMTlmMmI4NzE3MjNjNGU4YTFmYjU2Mjc2OTY2NDE3ZTQzYTkzNWYyXCJdL=FwibXNnX3RzXCI6MTc1NDkxMTMzM30ifQ, https://egk1w.onkttyhqjycn.es/sunel$bqtaxtc, https://get.geojs.io/v1/ip/geo.json, https://qaok5hty3.vraudo.es/ITITRt408hJWgm!5Cj/$ZmhhZ2tZWllckBwdGMuY29t, hxxps://7374.ginvet9.com/, hxxps://astro.thorousha.ru/vojd4e50fw4o!g/$ENCODEDEMAIL_ADDRESS, hxxps://backend.vmfuiojitnlb.es/CGyP9!CbhSU22YT2/, hxxps://branch.cricomai.sa.com/b@GrBOPttIrJA/*EMAIL_ADDRESS, hxxps://i9152.cisele0.com/34S7EHRE0DB8QrFfvijoRMsX632e0GRF8rZ89110, hxxps://i9152.cisele0.com/lbuakdidnqmytlcBiVbomCGYTSPFFZAABOLJGWUCZHXZKPGZOQRAVFAAF?317727838333203306556902opEXJOOmXGJPZNFTJIXPAAFUILTKKRQQEFFSNIABRZNUPXEUOAKDATDS, hxxps://i9152.cisele0.com/NOZcbtTxxEiGj/, hxxps://i9152.cisele0.com/web6socket/socket.io/?type=User&appnum=1&EIO=4&transport=websocket, hxxps://immutable.nathacha.digital/T@uWhi6jqZQH7/#?EMAIL_ADDRESS, hxxps://kzagniw.es/LI6vGlx7@1wPztdy, hxxps://mock.zuyistoo.today/pry1r75TisN5S@8yDDQI/$EMAIL_ADDRESS, hxxps://mysql.vecedoo.online/JB5ow79@fKst02/#EMAIL_ADDRESS, hxxps://piwf.ariitdc.es/kv2gVMHLZ@dNeXt/$EMAIL_ADDRESS, hxxps://q9y3.efwzxgd.es/MEaap8nZG5A@c8T/*EMAIL_ADDRESS, hxxps://qonnfp.wnrathttb.ru/Fe2yiyoKvg3YTfV!/$EMAIL_ADDRESS, hxxps://t.me/tycoon_2fa_Link
Attacker Hashes: 5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
Victim Industries: Aerospace, Construction, Defense, Education, Energy, Financial, Financial Services, Government, Healthcare, Hospitality, Insurance, Legal and Professional Services, Legal Services, Manufacturing, Non-Governmental Organizations (NGOs), Real Estate, Technology Hardware, Utilities
Victim Countries: Australia, Canada, France, Germany, India, Latvia, Lithuania, Pakistan, Poland, Portugal, Spain, United Kingdom, United States

Mitigation Advice

  • In Microsoft Defender, run the provided KQL query against 'AADSignInEventsBeta' logs to hunt for suspicious sign-in attempts that lack device trust information and have a medium or high risk level.
  • In Microsoft Defender, run the provided KQL query against 'UrlClickEvents' logs to identify users who clicked potentially malicious URLs shortly before a risky sign-in event occurred.
  • Review user mailboxes, particularly those flagged in other alerts, for recently created or suspicious inbox rules, especially rules that forward email to external domains or delete messages.
  • For any user account identified as compromised, immediately revoke all active Microsoft Entra ID sessions and refresh tokens.
  • In Microsoft Defender for Office 365, enable and configure the 'Safe Links' policy to scan and rewrite inbound URLs, ensuring time-of-click verification is active for all users.
  • In Microsoft Defender for Office 365, enable and configure the 'Safe Attachments' policy to detonate and scan all incoming email attachments in a sandbox environment before delivery.
  • Verify that Zero-hour auto purge (ZAP) is enabled in Microsoft Defender for Office 365 to automatically remove phishing emails from user inboxes after delivery if they are later identified as malicious.
  • Enable 'Network Protection' in block mode via Microsoft Defender for Endpoint policies to prevent endpoints from connecting to known malicious domains and IP addresses.
  • Ensure that Microsoft Defender SmartScreen or an equivalent web filtering service is enabled and enforced on all company web browsers to block access to known phishing and malware sites.

Compliance Best Practices

  • Develop and execute a project to deploy phishing-resistant Multi-Factor Authentication (MFA), such as FIDO2 security keys, for all administrative and privileged-access user accounts.
  • Create a phased, long-term plan to roll out phishing-resistant Multi-Factor Authentication (MFA), such as FIDO2 security keys or Microsoft Authenticator passkeys, to the general user population.
  • Implement Microsoft Entra ID Conditional Access policies that enforce the use of 'phishing-resistant' authentication strength for user access to critical business applications and sensitive data.
  • Establish a continuous security awareness training program that includes regular phishing simulations focused on credential harvesting, QR code lures, and MFA bypass techniques.
  • Configure and tune 'automatic attack disruption' in Microsoft Defender XDR to automatically contain compromised identities and endpoints involved in AiTM phishing attacks.
  • Develop, document, and test an incident response playbook specifically for handling Adversary-in-the-Middle (AiTM) attacks, with clear steps for session revocation, credential reset, and mailbox rule inspection.

Authors & Contributors

Brian Sayer (Author)

Threat Intelligence Analyst, F5