Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»InfoSec News Nuggets 03/17/2026 – AboutDFIR
    News

    InfoSec News Nuggets 03/17/2026 – AboutDFIR

    adminBy adminMarch 22, 2026No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

    The persistent GlassWorm supply chain threat actor has expanded its campaign significantly — using GitHub tokens stolen via infected VS Code and Cursor extensions to force-push malicious commits into hundreds of Python repositories including Django apps, ML research projects, Streamlit dashboards, and PyPI packages, in a new wave codenamed ForceMemo by StepSecurity. The injected payloads — appended to setup.py, main.py, and app.py files while preserving the original commit message, author, and timestamp to evade detection — execute entirely in memory using an eval() sandbox, skip systems with Russian locale settings, and fetch C2 instructions from a Solana wallet address previously tied to GlassWorm, confirming continuity with the same threat actor that has been escalating across the VS Code, Open VSX, npm, and GitHub ecosystems since October 2025. Defenders should immediately audit GitHub repository commit histories for base64-encoded appended content, review VS Code extension permissions for any extension referencing Solana wallet addresses or Google Calendar for configuration, and rotate all GitHub tokens for accounts with access to code signing or publishing workflows.

     

    Poland’s Nuclear Research Centre Targeted by Cyberattack

    Poland’s National Centre for Nuclear Research (NCBJ) confirmed this week that hackers targeted its IT infrastructure in a cyberattack that was detected and blocked before any systems were compromised, with NCBJ Director Professor Jakub Kupecki confirming that the MARIA research reactor continued operating at full power without interruption throughout the incident. While NCBJ declined to attribute the attack, Polish investigators found indicators suggesting possible Iranian involvement — though they cautioned that the indicators may be deliberate false flags, a caveat carrying particular weight given Iran’s well-documented use of false-flag techniques. The incident is the latest in a string targeting Polish critical infrastructure, following the Sandworm-linked DynoWiper attempt against Poland’s power grid in December 2025 and a GRU-linked campaign against Polish government networks, placing Poland in the uncomfortable position of facing sustained cyber pressure from both Russian and Iranian state-linked actors simultaneously. (Note: BleepingComputer blocks automated fetches but is fully accessible in-browser.)

     

    Russia-Linked Espionage Campaign Targets Ukraine Using Starlink and Charity Lures

    Lab52 researchers documented a February 2026 campaign by Laundry Bear — a Russia-linked APT also tracked as UAC-0190 and Void Blizzard that targets government, defense, transportation, media, NGOs, and healthcare across Europe and North America — deploying a previously undocumented JavaScript-based backdoor called DrillApp that runs entirely through the Microsoft Edge browser, avoiding traditional executable files on disk while inheriting Edge’s trusted reputation to blend C2 traffic with normal browser activity. Attackers reached victims via Signal and WhatsApp impersonating Come Back Alive, a well-known Ukrainian charity supporting the armed forces, as well as fake Starlink support messages, prompting targets to download what appeared to be documents but were password-protected archives containing executable files — a consistent tradecraft pattern CERT-UA has now linked to Laundry Bear across multiple separate operations. DrillApp is capable of uploading and downloading files, recording microphone audio, and capturing webcam images by abusing browser APIs — expanding the group’s targeting beyond Ukraine’s defense sector into civilian government and civil society organizations that have historically received less security hardening against spear-phishing.

     

    Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

    Phantom Labs Research disclosed on March 16 that AWS Bedrock AgentCore’s Code Interpreter — Amazon’s managed AI code execution environment used to run AI agent-generated Python code — contains a DNS-based data exfiltration technique that allows malicious instructions embedded in files like CSV spreadsheets to create a covert command-and-control channel even when the sandbox is operating in “Sandbox Mode,” which is supposed to restrict outbound network connections. The attack works because DNS resolution remains active even when all other outbound traffic is blocked — meaning an attacker who can influence what an AI agent processes can encode sensitive cloud data into DNS queries that exfiltrate it to attacker-controlled infrastructure with no detectable HTTP or TCP traffic. Amazon reviewed the research and determined the behavior reflects intended functionality rather than a vulnerability, declining to issue a patch and instead updating its documentation to clarify that Sandbox Mode provides only limited network isolation — a response researchers described as concerning given how many organizations deploy AgentCore under the assumption of full sandbox isolation when processing untrusted user-supplied data.

     

    EU Sanctions Chinese and Iranian Companies for Cyberattacks Against Member States

    The European Council on March 16 imposed sanctions on two Chinese firms and one Iranian company: Integrity Technology Group, which enabled the compromise of over 65,000 devices across six EU member states as part of the Flax Typhoon botnet campaign between 2022 and 2023; Anxun Information Technology (i-Soon), which provided targeted hacking-for-hire services aimed at EU critical infrastructure — with the company’s two co-founders personally sanctioned for organizing and directing the attack operations; and Emennet Pasargad, sanctioned for unlawfully accessing a French subscriber database and selling the data on the dark web, compromising advertising billboards to spread disinformation during the 2024 Paris Olympics, and breaching a Swedish SMS service affecting a large number of EU citizens. The designations include asset freezes and travel bans for the named individuals, and prohibit EU citizens and companies from transacting with the listed entities — mirroring sanctions the U.S. and U.K. had previously imposed against the same actors for overlapping conduct, reflecting a coordinated transatlantic approach to naming and sanctioning Chinese and Iranian cyber-for-hire ecosystem participants rather than purely state-employed hackers. China’s foreign ministry rejected the sanctions as baseless and urged Brussels to stop what it called political manipulation.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleVU#504749: PyMuPDF path traversal and arbitrary file write vulnerabilities
    Next Article Spring security advisory (AV26-259) – Canadian Centre for Cyber Security
    admin
    • Website

    Related Posts

    News

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.