Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Incident: Yakult Australia targeted in cyber attack, employee files published on dark web | ABC News Australia

    April 8, 2026

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»InfoSec News Nuggets 03/25/2026 – AboutDFIR
    News

    InfoSec News Nuggets 03/25/2026 – AboutDFIR

    adminBy adminMarch 25, 2026No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

    The TeamPCP supply chain campaign has escalated dramatically — having cascaded from its initial March 19 compromise of Aqua Security’s Trivy vulnerability scanner through Checkmarx’s GitHub Actions and into litellm, the massively popular Python package that Wiz estimates is present in 36% of all cloud environments and serves as the LLM API gateway layer for thousands of AI applications. Endor Labs and JFrog confirmed that backdoored versions 1.82.7 and 1.82.8 were pushed to PyPI on March 24 using credentials stolen from litellm’s CI/CD pipeline — which itself used Trivy — and that the embedded payload executes a three-stage attack: a credential harvester sweeping SSH keys, cloud credentials, Kubernetes secrets, cryptocurrency wallets, and .env files; a Kubernetes lateral movement toolkit that deploys privileged pods to every node in a cluster and chroots into host file systems; and a persistent systemd backdoor polling checkmarx[.]zone for additional payloads with a YouTube-URL-based kill switch. Wiz noted that TeamPCP is now openly collaborating with LAPSUS$ and described the campaign as “a dangerous convergence between supply chain attackers and high-profile extortion groups,” while PyPA urged all organizations that installed or ran either affected version to immediately assume that all credentials accessible to the litellm environment have been exposed — and to rotate every secret, token, and cloud credential without delay.

     

    FCC Bans New Routers Made Outside the USA Over Security Risks

    The FCC has updated its Covered List — the register of equipment deemed to pose unacceptable national security risk — to include all consumer-grade routers manufactured in foreign countries, effectively banning the sale of new foreign-made router models in the U.S. following a March 20 National Security Determination by an Executive Branch interagency body that cited supply chain risks capable of disrupting the U.S. economy, critical infrastructure, and national defense. The FCC explicitly cited the role that foreign-manufactured routers played in enabling the Volt, Flax, and Salt Typhoon hacking campaigns, which compromised vital U.S. infrastructure, as justification for the sweeping action — which goes considerably further than previous Covered List additions that targeted specific Chinese vendors like Huawei, ZTE, and TP-Link rather than entire foreign manufacturing categories. Foreign manufacturers are not permanently barred from the U.S. market, but must obtain conditional approval by transparently disclosing corporate ownership and government ties, full supply chain and bill of materials details, firmware and software origins, and a credible plan to move critical component manufacturing to the United States — requirements that analysts say will significantly raise costs, extend time-to-market, and likely cause some vendors to exit the U.S. market entirely rather than pursue the alternative certification pathway.

    Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities

    Citrix has released patches for two vulnerabilities in NetScaler ADC and NetScaler Gateway — CVE-2026-3055 (CVSS 9.3), a critical out-of-bounds read caused by insufficient input validation that allows an unauthenticated remote attacker to leak potentially sensitive information from appliance memory, and CVE-2026-4368 (CVSS 7.7), a race condition that causes session mixup between users on affected configurations. CVE-2026-3055 only affects systems explicitly configured as a SAML Identity Provider, rather than default configurations, meaning organizations can check exposure by searching their NetScaler configuration for the string “add authentication samlIdPProfile”; Citrix is also providing Global Deny List signatures through NetScaler Console as an interim mitigation for those unable to immediately upgrade. While no public proof-of-concept or confirmed in-the-wild exploitation has been reported for either flaw as of time of writing, Citrix’s history as one of the most exploited enterprise vendors — appearing 21 times on CISA’s Known Exploited Vulnerabilities catalog since late 2021 — and the critical CVSS score make rapid patching essential for any organization with affected configurations.

     

    Dutch Finance Ministry Probing Cyber Breach Affecting Internal Systems

    The Netherlands Finance Ministry confirmed it is investigating a cybersecurity breach affecting internal systems after unauthorized access to ministry infrastructure was detected, making it the latest Dutch government institution compromised in a string of intrusions that have hit the country’s defense ministry, police agency, and mobile device management infrastructure over the past 18 months. Dutch authorities have not attributed the attack or disclosed how initial access was achieved, what data may have been accessed, or how long the attacker was present before detection — all key details that are still under active investigation with the assistance of external cybersecurity experts. The breach adds to a deeply concerning pattern for a country that has been particularly vocal about Chinese and Russian cyber threats and that recently had its intelligence agencies expose Laundry Bear (Void Blizzard) as a previously unknown Russian APT — suggesting that being outspoken about adversary activity does not translate into immunity from it, and that the Netherlands’ relatively small government cybersecurity apparatus continues to be tested by multiple sophisticated state-sponsored adversaries simultaneously.

     

    M-Trends 2026: Initial Access Handoff Shrinks from Hours to 22 Seconds

    Google’s Threat Intelligence Group published the M-Trends 2026 report on March 23 — based on more than 500,000 hours of Mandiant incident response investigations conducted in 2025 — with a headline finding that has significant implications for defenders: the median time between an initial access broker gaining entry to a victim’s network and handing that access off to a secondary threat group has collapsed from over 8 hours in 2022 to just 22 seconds in 2025, reflecting either automated handoff processes or extremely tight operational coordination between IABs and ransomware groups that eliminates the window defenders previously relied on to detect and evict an attacker before escalation. Counterintuitively, median dwell time increased slightly to 14 days in 2025 — up from 10 in 2023 and 11 in 2024 — driven primarily by North Korean IT worker infiltrations and nation-state espionage actors who prioritize long-term stealth over rapid monetization, a dynamic that skews the aggregate figure and masks the continued compression of dwell times for financially motivated actors. The report also documented 714 new malware families identified in 2025, identified voice phishing as the most common initial access vector in cloud-targeting incidents (23%), found high-tech as the most targeted sector, and noted that 40% of all incidents involved data theft — reinforcing that exfiltration-and-extortion as a business model remains at least as prevalent as traditional encryption-based ransomware.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSchneider Electric Plant iT/Brewmaxx | CISA
    Next Article Debian Firefox ESR Faces Multiple Security Vulnerabilities DSA-6178-1
    admin
    • Website

    Related Posts

    News

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026
    News

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Incident: Yakult Australia targeted in cyber attack, employee files published on dark web | ABC News Australia

    April 8, 2026

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.