NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 2,058
    • กระทู้ 2,059
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    NCSA_THAICERT

    @NCSA_THAICERT

    1
    ชื่อเสียง
    55
    ดูข้อมูลส่วนตัว
    2.1k
    กระทู้
    2
    คนติดตาม
    0
    ติดตาม
    เข้าร่วม ออนไลน์ล่าสุด
    เว็บไซต์ www.ncsa.or.th/?fbclid=IwAR0BqJEC-CJzBs98rlBxUbZkNBgp1g814xdDNNaKnHTrxfqZhPD--ksY68I

    NCSA_THAICERT เลิกติดตาม ติดตาม
    Global Moderator administrators

    Latest posts made by NCSA_THAICERT

    • Cyber Threat Intelligence 10 April 2026

      Industrial Sector

      • Iranian-Affiliated APT Targeting Of Rockwell/Allen-Bradley PLCs
        "On April 7, 2026, the FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command jointly disclosed ongoing exploitation of internet-facing Rockwell Automation/Allen-Bradley programmable logic controllers (PLCs) by Iranian-affiliated APT actors. Censys data identifies 5,219 internet-exposed hosts globally responding to EtherNet/IP (EIP) and self-identifying as Rockwell Automation/Allen-Bradley devices — the attack surface directly relevant to AA26-097A. The United States accounts for 74.6% of global exposure (3,891 hosts), with a disproportionate share on cellular carrier ASNs indicative of field-deployed devices on cellular modems. Censys pivoting of the published IOC list reveals that CISA’s seven 185.82.73.x indicators represent a single multi-homed Windows engineering workstation running the full Rockwell toolchain, with four additional operator IPs on the same host absent from the advisory."
        https://censys.com/blog/iranian-affiliated-apt-targeting-rockwell-allen-bradley-plcs/
        https://cyberscoop.com/iran-attackers-industrial-ot-government-energy-water-censys/

      New Tooling

      • Asqav: Open-Source SDK For AI Agent Governance
        "AI agents are executing consequential tasks autonomously, often across multiple systems and with little record of what they did or why. Asqav, a Python SDK released under the MIT license, addresses that gap by attaching a cryptographic signature to each agent action and linking entries into a hash chain. The signing algorithm is ML-DSA-65, standardized under FIPS 204 and designed to remain secure against quantum computing attacks. Each signature also carries an RFC 3161 timestamp. “Every agent action gets signed with a quantum-safe signature and hash-chained to the previous one,” João André Gomes Marques, author of the project, told Help Net Security. “If someone tampers with an entry or tries to omit one, the chain breaks and verification fails.”"
        https://www.helpnetsecurity.com/2026/04/09/asqav-ai-agent-audit-trail/
        https://github.com/jagmarques/asqav-sdk

      Vulnerabilities

      • Vibe Hacking: Claude Code Can Be Turned Into A Nation-State-Level Attack Tool With No Coding At All
        "LayerX researchers have found how Claude Code can be turned from a ‘vibe’ coding tool into a nation-state-level offensive hacking tool that can be used to hack websites, launch cyberattacks, and research new vulnerabilities. Our research demonstrates how trivially easy it is to convince Claude Code to abandon its safety guardrails and remove its restrictions on what it is allowed to do. As part of our testing, we successfully convinced Claude Code to perform a full-scope penetration attack and credential theft against our test site. This should never have been allowed per Anthropic’s policy, but we got around it by modifying a single project file, with just a few lines of text and absolutely no coding."
        https://layerxsecurity.com/blog/vibe-hacking-claude-code-can-be-turned-into-a-nation-state-level-attack-tool-with-no-coding-at-all/
        https://hackread.com/claude-code-claude-md-sql-injection-attacks/
      • Apple Intelligence AI Guardrails Bypassed In New Attack
        "Researchers from RSAC have found a way to bypass the safety protocols of Apple’s Intelligence AI with a high success rate. Apple Intelligence is a deeply integrated personal intelligence system for iOS, iPadOS, and macOS that combines generative AI with personal context. It primarily processes tasks directly on Apple silicon via a compact on-device LLM. The AI draws on the user’s unique context (messages, photos, and schedules) to power practical features such as system-wide writing tools and Siri. For more complex reasoning, it offloads requests to larger foundation models via Private Cloud Compute (PCC) on Apple’s dedicated cloud infrastructure."
        https://www.securityweek.com/apple-intelligence-ai-guardrails-bypassed-in-new-attack/
        https://www.theregister.com/2026/04/09/security_researchers_tricked_apple_intelligence/
      • Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities
        "Palo Alto Networks and SonicWall have separately announced patches for multiple vulnerabilities across their products, including two high-severity bugs. Palo Alto Networks patched three flaws and rolled out third-party fixes for Cortex platforms, ADEM for Windows, PAN-OS, and products using a Chromium-based browser. The most severe of these security defects is CVE-2026-0234, an improper verification of a cryptographic signature issue in the Cortex XSOAR and Cortex XSIAM platforms’ integration of Microsoft Teams. Successful exploitation of the weakness allows attackers to access and tamper with protected resources, the company says."
        https://www.securityweek.com/palo-alto-networks-sonicwall-patch-high-severity-vulnerabilities/
      • Intent Redirection Vulnerability In Third-Party SDK Exposed Millions Of Android Wallets To Potential Risk
        "During routine security research, we identified a severe intent redirection vulnerability in a widely used third-party Android SDK called EngageSDK. This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data. With over 30 million installations of third-party crypto wallet applications alone, the exposure of PII, user credentials and financial data were exposed to risk. All of the detected apps using vulnerable versions have been removed from Google Play. Following our Coordinated Vulnerability Disclosure practices (via Microsoft Security Vulnerability Research), we notified EngageLab and the Android Security Team. We collaborated with all parties to investigate and validate the issue, which was resolved as of November 3, 2025 in version 5.2.1 of the EngageSDK. This case shows how weaknesses in third‑party SDKs can have large‑scale security implications, especially in high‑value sectors like digital asset management."
        https://www.microsoft.com/en-us/security/blog/2026/04/09/intent-redirection-vulnerability-third-party-sdk-android/
        https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html

      Malware

      • Critical Supply Chain Compromise In Smart Slider 3 Pro: Full Malware Analysis
        "This blog post is a technical analysis of the supply chain compromise affecting Smart Slider 3 Pro version 3.5.1.35 for WordPress. An unauthorized party gained access to Nextend’s update infrastructure and distributed a fully attacker-authored build through the official update channel. Any site that updated to 3.5.1.35 between its release on april 7, 2026 and its detection approximately 6 hours later received a fully weaponized remote access toolkit. If you are running Smart Slider 3 Pro, ensure you are on at least version 3.5.1.36."
        https://patchstack.com/articles/critical-supply-chain-compromise-in-smart-slider-3-pro-full-malware-analysis/
        https://www.bleepingcomputer.com/news/security/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions/
      • Hackers Exploiting Acrobat Reader Zero-Day Flaw Since December
        "Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December. The attacks have been discovered by security researcher Haifei Li (the founder of the sandbox-based exploit-detection platform EXPMON), who warned on Tuesday that the attackers are using what he described as a "highly sophisticated, fingerprinting-style PDF exploit" to target an undisclosed Adobe Reader security flaw. Li also said that these attacks have been targeting Adobe users for at least 4 months, stealing data from compromised systems using privileged util.readFileIntoStream and RSS.addFeed Acrobat APIs, and deploying additional exploits."
        https://www.bleepingcomputer.com/news/security/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/
        https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html
        https://hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
        https://www.securityweek.com/adobe-reader-zero-day-exploited-for-months-researcher/
        https://securityaffairs.com/190558/hacking/malicious-pdf-reveals-active-adobe-reader-zero-day-in-the-wild.html
        https://www.helpnetsecurity.com/2026/04/09/acrobat-reader-zero-day-exploited/
        https://www.theregister.com/2026/04/09/monthsold_adobe_reader_zeroday_uses/
      • From Tax Refund To Total Compromise: IRS-Themed Phishing Email Drives Full-Stack Financial Fraud
        "Cofense PDC (Phishing Defense Center) and Cofense Intelligence have found an Internal Revenue Service (IRS)-spoofing email that purports to give a $5000 tax refund provided by Elon Musk. However, the link to access the purported tax refund redirects to a credential phishing page with IRS and Elon Musk branding images. Upon filling out the credential phishing form, the victim is asked to access a fake cryptocurrency market where they will be given $5000 to withdraw after verifying a photo ID and bank account information. The extensive amount of personally identifiable information (PII) stolen in this campaign allows the threat actors to pivot to social engineering attacks on the victim’s personal financial, government, and online service accounts. This Flash Alert will briefly analyze the overall impact from the campaign’s email, credential phishing sites, and threat actor’s motivations."
        https://cofense.com/blog/from-tax-refund-to-total-compromise-irs-themed-phishing-email-drives-full-stack-financial-fraud
      • Notorious Hacker Returns With a New Mac Stealer Targeting $10K+ Crypto Wallets
        "In 2023, a malware developer named 0xFFF rage-quit one of the most prominent underground hacking forums, leaving behind accusations and bad blood. In August 2024, 0xFFF came back under a new alias, alh1mik, with an apology and an offer: Let me back in, and I’ll build you a new macOS stealer. By early 2026, alh1mik’s offer had materialized into notnullOSX—the Go-written, hand-targeted stealer delivered via ClickFix and malicious DMG files. This malware was built exclusively to drain crypto holdings of above $10,000 from macOS users. Moonlock Lab telemetry recorded the first detections of notnullOSX on March 30, 2026, across 3 regions: Vietnam, Taiwan, and Spain. Here’s our breakdown of the stealer’s origin, malware functionality, distribution, and more."
        https://moonlock.com/notorious-hacker-returns-notnullosx-stealer
        https://hackread.com/macos-malware-notnullosx-crypto-wallets/
      • STX RAT: A New RAT In 2026 With Infostealer Capabilities
        "In late February 2026, eSentire's Threat Response Unit (TRU) observed an attempted delivery of a previously undocumented malware family within a customer environment in the Finance industry. TRU is tracking this threat as STX RAT, named for its consistent use of the Start of Text (STX) magic byte "\x02" prefixed to C2 messages. TRU observed attempted delivery of the malware via a browser-downloaded VBScript file; by early March 2026, Malwarebytes reported a separate initial access vector in their blog, "A fake FileZilla site hosts a malicious download", where the malware was distributed through trojanized FileZilla installers."
        https://www.esentire.com/blog/stx-rat-a-new-rat-in-2026-with-infostealer-capabilities
        https://www.infosecurity-magazine.com/news/stx-rat-targets-finance-sector/
      • Scammers Pose As Amazon Support To Steal Your Account
        "Cybercriminals using the so-called “spray and pray” tactic love to impersonate well-known brands. Especially ones with huge customer bases. Amazon reportedly has around 310 million active customers, so they certainly qualify as a brand worth impersonating. And it shows in the sheer volume of scams that use its name. Amazon account take-over (ATO) scams were numerous during the holiday season, and they haven’t gone away. The scammers have ported the “product recall due to safety concerns” text message scam over to email. The fake product recall message is one of scammers’ most popular lures, and we’ve reported on in the past."
        https://www.malwarebytes.com/blog/news/2026/04/scammers-pose-as-amazon-support-to-steal-your-account
      • The Long Road To Your Crypto: ClipBanker And Its Marathon Infection Chain
        "At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kicks off with a web search for “Proxifier”. Proxifiers are speciaized software designed to tunnel traffic for programs that do not natively support proxy servers. They are a go-to for making sure these apps are functional within secured development environments. By coincidence, Proxifier is also a name for a proprietary proxifier developed by VentoByte, which is distributed under a paid license. If you search for Proxifier (or a proxifier), one of the top results in popular search engines is a link to a GitHub repository. That’s exactly where the source of the primary infection lives."
        https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/
      • In-Memory Loader Drops ScreenConnect
        "In February 2026, Zscaler ThreatLabz discovered an attack chain where attackers used a fake Adobe Acrobat Reader download to lure victims into installing ConnectWise’s ScreenConnect. While ScreenConnect is a legitimate remote access tool, it can be leveraged for malicious purposes. In this blog post, ThreatLabz examines the various stages of this attack, from the download lure to the in-memory loader used to reduce on-disk artifacts that could be used for detection and analysis. Additionally, we dive into the attack chain's obfuscation methods, such as using dynamic code that resolves method and type names at runtime rather than referencing them directly in the source."
        https://www.zscaler.com/blogs/security-research/memory-loader-drops-screenconnect
      • Cybercriminals Target Accountants To Drain Russian Firms’ Bank Accounts
        "Cybercriminals have stolen millions from Russian companies by hacking accountants’ computers and disguising transfers as salary payments, according to areport released this week. Researchers at Russian cybersecurity firm F6 said the financially motivated groupHive0117 carried out a wave of attacks from February to March 2026 targeting corporate finance departments. The attackers used phishing emails to infect accountants’ computers with malware, allowing them to access remote banking systems used to manage company payments."
        https://therecord.media/cybercriminals-hack-russian-accountants-to-steal-millions

      Breaches/Hacks/Leaks

      • Hackers Steal $3.6 Million From Crypto ATM Giant Bitcoin Depot
        "Bitcoin Depot, which operates one of the largest Bitcoin ATM networks, says attackers stole $3.665 million worth of Bitcoin from its crypto wallets after breaching its systems last month. The company manages more than 25,000 Bitcoin ATMs and BDCheckout locations worldwide and reported revenue of $615 million in 2025. As revealed in a filing with the U.S. Securities and Exchange Commission, the company discovered the attack on March 23 after detecting suspicious activity on some of its IT systems."
        https://www.bleepingcomputer.com/news/security/crypto-atm-giant-bitcoin-depot-says-hackers-stole-36-million-from-its-wallets/
        https://therecord.media/crypto-atm-bitcoin-depot-reports-cyberattack
        https://www.infosecurity-magazine.com/news/bitcoin-depot-dollar36m-crypto/
        https://www.securityweek.com/3-6-million-stolen-in-bitcoin-depot-hack/
      • My Lovely AI Data Breach
        "In April 2026, the NSFW AI girlfriend platform My Lovely AI suffered a data breach that exposed over 100k users. The data included user-created prompts and links to the resulting AI-generated images, along with a small number of Discord and X usernames. As this breach has been flagged as sensitive, it is not publicly searchable. To see the exposure of email addresses in this breach, sign in to your dashboard and review results for your email address in the "Breaches" section under "Personal", or search any domains you control in the "Domains" section under "Business"."
        https://haveibeenpwned.com/Breach/MyLovelyAI
        https://www.malwarebytes.com/blog/news/2026/04/nsfw-app-leak-exposes-70000-prompts-linked-to-individual-users
        https://www.helpnetsecurity.com/2026/04/09/mylovely-ai-data-breach-user-conversations/
      • Chevin Pulls The Handbrake On FleetWave Software After Security Scare
        "A cybersecurity incident has knocked FleetWave into a "major outage" across the UK and US after Chevin Fleet Solutions pulled parts of its SaaS platform offline and left customers scrambling for answers. The disruption, flagged on Chevin's public status page, aligns with an email sent to customers and seen by The Register in which the company confirms it took FleetWave environments hosted in Azure in both regions offline as a precaution. Chevin, which first confirmed disruption on April 3, says that it's working "around the clock with external cybersecurity specialists," carrying out artifact analysis and threat hunting across its systems while implementing additional security controls."
        https://www.theregister.com/2026/04/09/chevin_fleetwave_security_incident/
      • A Hacker Has Allegedly Breached One Of China’s Supercomputers And Is Attempting To Sell a Trove Of Stolen Data
        "A hacker has allegedly stolen a massive trove of sensitive data – including highly classified defense documents and missile schematics – from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China. The dataset, which allegedly contains more than 10 petabytes of sensitive information, is believed by experts to have been obtained from the National Supercomputing Center (NSCC) in Tianjin – a centralized hub that provides infrastructure services for more than 6,000 clients across China, including advanced science and defense agencies. Cyber experts who have spoken to the alleged hacker and reviewed samples of the stolen data they posted online say they appeared to gain entry to the massive computer with comparative ease and were able to siphon out huge amounts of data over the course of multiple months without being detected."
        https://edition.cnn.com/2026/04/08/china/china-supercomputer-hackers-hnk-intl
        https://securityaffairs.com/190536/hacking/the-alleged-breach-of-chinas-national-supercomputing-center-can-have-serious-geopolitical-consequences.html

      General News

      • Microsoft Suspends Dev Accounts For High-Profile Open Source Projects
        "Microsoft has suspended developer accounts used to maintain multiple high-profile open-source projects without proper notification and no way to quickly reinstate them, effectively blocking them from publishing new software builds and security patches for Windows users. The list of affected projects includes, but is not limited to, Virtual Private Network (VPN) software WireGuard, on-the-fly encryption (OTFE) utility VeraCrypt, the MemTest86 Random Access Memory (RAM) testing and diagnosis tool, and the Windscribe VPN software."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-suspends-dev-accounts-for-high-profile-open-source-projects/
        https://www.theregister.com/2026/04/09/microsoft_dev_account_deactivations/
      • March 2026 Cyber Threat Landscape Shows No Relief As Ransomware Rebounds And GenAI Risks Intensify
        "In March 2026, global cyber attack activity showed early signs of moderation while remaining at historically elevated levels. The average number of weekly cyber-attacks per organization reached 1,995, representing a 4% decrease month over month and a 5% decline compared to March 2025. Despite this easing, the overall threat environment remains intense. Nearly 2,000 weekly attacks per organization continue to reflect sustained adversary pressure, driven by automation, broad attack surface expansion, and persistent exposure risks tied to cloud adoption and GenAI usage. Check Point Research data indicates that while short term fluctuations are emerging, cyber threats have not returned to pre-surge baselines and remain a constant operational reality for organizations worldwide."
        https://blog.checkpoint.com/research/march-2026-cyber-threat-landscape-shows-no-relief-as-ransomware-rebounds-and-genai-risks-intensify/
      • Do Ceasefires Slow Cyberattacks? History Suggests Not
        "With the US and Iran having reached a fragile ceasefire this week, security researchers and executives are left wondering whether there will be a commensurate pause in the cyberwarfare that has ramped up around the war. The day after the temporary truce was announced, Iran's most high-profile false-flag hacktivist operation, Handala, offered that it would participate in a temporary pause in hostilities. But even if one takes that group at its word, history suggests that ceasefires rarely stop or slow cyberactivity surrounding kinetic wars. In fact, in the absence of more effective ways of fighting, cyberattacks tend to flare significantly."
        https://www.darkreading.com/cybersecurity-analytics/ceasefires-slow-cyberattacks-history
      • Seven Signals Cyber Experts Agreed On At FIRST Paris 2026
        "The cybersecurity industry has been facing multiple parallel challenges in recent years. The pace at which cybercrime evolves is hard to match, but gatherings like FIRST provide a unique opportunity for the community to convene, reflect, and move forward together. These events are not only about new technologies, but also about perspectives coming together to strengthen our security stance. Collaboration remains one of the most powerful responses defenders have against increasingly coordinated adversaries. In many ways, attackers already operate as networks. The challenge now is for defenders to realize their collective potential."
        https://www.group-ib.com/blog/seven-cyber-signals-first-paris-2026/
      • AI Agent Intent Is a Starting Point, Not a Security Strategy
        "In this Help Net Security interview, Itamar Apelblat, CEO of Token Security, walks through findings from the company’s research, which shows that 65% of agentic chatbots have never been used yet still hold live access credentials. He explains why organizations treat AI agents more like quick experiments than governed identities, and why that creates risks similar to orphaned service accounts, only harder to see. The conversation covers why 51% of external agent actions still rely on hard-coded credentials, how a single injected prompt can move through a multi-agent pipeline without triggering any conventional SOC alert, and why 81% of cloud-deployed agents run on self-managed frameworks. Apelblat also breaks down what it means to operationalize agent intent as policy, and why enforcement needs to survive the moment a user reprompts the agent with something its original configuration never anticipated."
        https://www.helpnetsecurity.com/2026/04/09/itamar-apelblat-token-security-ai-agents-security-risks/
      • Prompt Injection Tags Along As GenAI Enters Daily Government Use
        "Routine use of GenAI has moved into daily operations in state and territorial government environments, placing new security risks within common workflows. A Center for Internet Security (CIS) report, Prompt Injections: The Inherent Threat to Generative AI, identifies prompt injection as a persistent concern tied to that adoption."
        https://www.helpnetsecurity.com/2026/04/09/genai-prompt-injection-enterprise-data-risk/
        https://learn.cisecurity.org/msisac-prompt-injections
      • Governance Gaps Emerge As AI Agents Drive 76% Increase In NHIs
        "The SANS Institute has warned that the race to incorporate AI into enterprise workflows threatens to outpace security efforts, after revealing widespread credential hygiene failings. The security training and research organization presented the findings as part of its 2026 SANS State of Identity Threats & Defenses Survey, which is based on interviews with over 500 security professionals globally. It revealed that three-quarters (76%) of organizations report growth in non-human identities (NHIs) such as service accounts, API keys, automation bots and workload identities."
        https://www.infosecurity-magazine.com/news/governance-gaps-agents-76-increase/
      • Critical Infrastructure At Risk: 179 ICS Devices Exposed Online
        "Malware affecting industrial control systems (ICS) has the potential to disrupt the key industries that underpin modern society. Variants such as Industroyer, Stuxnet, Havex, Triton, and BlackEnergy have demonstrated the ability to interfere with industrial processes, disrupt power supplies, and, in some cases, cause physical damage to critical infrastructure. According to Cyble Research & Intelligence Labs’ most recent report, ICS vulnerability disclosures almost doubled between 2024 and 2025. This increase, says Digital Watch Observatory, is linked in part to “greater exploitation by threat actors” seeking to compromise energy, manufacturing, and utilities infrastructure."
        https://www.comparitech.com/news/critical-infrastructure-at-risk-179-ics-devices-exposed-online/
        https://securityaffairs.com/190525/ics-scada/internet-exposed-ics-devices-raise-alarm-for-critical-sectors.html
      • Can We Trust AI? No – But Eventually We Must
        "The increasing use of artificial intelligence within and by business is problematic on two fronts: firstly, we rely on it as if it were the voice of God, and secondly, attackers are able to turn our reliance against us. First, we must understand how AI works and where it is weak lest we misinterpret how adversaries attack it, and secondly we should look at the growing industry of companies trying to defend it. The primary problem with current LLM-based AI is that it starts from a position that is not grounded in truth (primarily by scraping and ingesting the internet with all its falsehoods), while the nature of its operation makes it drift ever further away. It is impossible to verify what it tells us (because of our own and its inherent biases), it can get things wrong (sometimes absurdly so with what we call ‘hallucinations’); it has a tendency to drift into sycophancy (it wants to tell us what it assumes we want to hear); and its whole edifice is in danger (from what is termed ‘model collapse’)."
        https://www.securityweek.com/can-we-trust-ai-no-but-eventually-we-must/
      • The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
        "Unfortunately, we have a problematic and unstable neighbor. Without getting into details, he often yells obscenities, threatens physical harm, threatens property damage, and other such undesirable things. Sadly, involving the police from time to time and getting two restraining orders did not discourage this neighbor from his outbursts and threats. The police and courts explained to us that a healthy person is afraid of the law. This is logical – most of us don’t commit crimes, and this is partly because we are afraid of the consequences. But when a person is unstable and believes that they can talk their way out of anything as long as it is your word against theirs, there is little recourse. In other words, if a person is careful to behave badly only when there is no record of that behavior, it is very difficult for the police and courts to do much about it."
        https://www.securityweek.com/the-hidden-roi-of-visibility-better-decisions-better-behavior-better-security/
      • Q1 2026 Attack Technique Trends Report
        "The cyber attack landscape in Q1 2026 was characterized by a step change from traditional mass-automated threats, with accelerated penetration rates driven by the use of AI, identity-centric attacks, exploitation of supply chain and SaaS linkages, and a combination of social engineering and vulnerability exploitation. threat actors are no longer relying on a single technique, but are evolving toward cascading multiple tactics and techniques to bypass detection and increase dwell time. As threat actors leverage generative AI and automation tools to quickly generate phishing messages, conduct reconnaissance, code mutation, and evade detection, the barrier to entry for attacks has been lowered and the speed of execution has increased. this means that the speed of response and detection on the defense side is even more critical than in the past."
        https://asec.ahnlab.com/en/93278/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) cc44f2c4-edec-44c3-86bd-20dc910fe361-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • แจ้งเตือนช่องโหว่ "GrafanaGhost" แฮ็กเกอร์หลอก AI ในระบบ Grafana ลอบขโมยข้อมูล

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ช่องโหว่ด้านความมั่นคงปลอดภัยและภัยคุกคามทางไซเบอร์พบช่องโหว่ชื่อ "GrafanaGhost" ในแพลตฟอร์ม Grafana [1] ช่องโหว่นี้ทำให้แฮกเกอร์สามารถหลอก AI ของระบบ ให้แอบส่งข้อมูลสำคัญออกไปยังเซิร์ฟเวอร์ภายนอกได้โดยที่ไม่ต้องขออนุญาต [2]

      1. รายละเอียดลักษณะการทำงานของมัลแวร์
        1.1 แฮกเกอร์จะทำการฝังคำสั่งที่เป็นอันตราย (เช่น คำหลัก error หรือ INTENT) ไว้ในชุดข้อมูลที่ระบบ AI จะต้องทำการประมวลผล เพื่อแทรกแซงและส่งผลให้ AI ละเว้นการปฏิบัติตามกฎระเบียบด้านความปลอดภัยของระบบ
        1.2 แฝงลิงก์ให้เสมือนเป็นเครือข่ายภายใน อาศัยช่องโหว่ในกลไกการแสดงผลรูปภาพ โดยการใช้รูปแบบลิงก์ชนิดพิเศษเพื่อหลอกลวงซอฟต์แวร์ว่า เป็นการดึงข้อมูลรูปภาพจากเครือข่ายภายในองค์กรที่มีความปลอดภัย ซึ่งความจริงคือระบบได้ทำการเชื่อมต่อออกไปยังเซิร์ฟเวอร์ของแฮกเกอร์
        1.3 เมื่อ AI พยายามโหลดรูปภาพ ตามที่ถูกหลอก ข้อมูลสำคัญขององค์กรจะถูกแนบไปกับลิงก์และส่งให้แฮกเกอร์ทันที โดยระบบยังคงทำงานปกติและไม่มีหน้าจอแจ้งข้อผิดพลาดให้รู้ตัว

      2. กลุ่มอุปกรณ์และระบบที่เข้าข่ายได้รับผลกระทบ
        2.1เซิร์ฟเวอร์ Grafana ที่เปิดใช้งานฟีเจอร์ AI: โดยเฉพาะเวอร์ชันที่มีการใช้เครื่องมือช่วยวิเคราะห์ข้อมูลด้วย AI หรือเชื่อมต่อกับโมเดลภาษา (LLMs)
        2.2 ระบบ Monitoring & Logging: เซิร์ฟเวอร์ที่ทำหน้าที่รวบรวม Log (เช่น Prometheus, Loki, หรือ Elasticsearch) ซึ่งเป็นแหล่งข้อมูลหลักที่ AI ของ Grafana เข้าไปดึงมาประมวลผล
        2.3 แดชบอร์ดที่ประมวลผลข้อมูลอ่อนไหว: ระบบที่แสดงผลข้อมูลทางธุรกิจ ข้อมูลเซิร์ฟเวอร์ หรือข้อมูลส่วนบุคคลที่มีการตั้งค่าให้ AI ช่วยสรุปเนื้อหา (Summarization)
        2.4 อุปกรณ์ในเครือข่ายภายใน (Intranet): เนื่องจากช่องโหว่นี้ใช้วิธีปลอมแปลงเป็น Internal Link อุปกรณ์อื่น ๆ ที่อยู่ในวงเครือข่ายเดียวกับ Grafana จึงมีความเสี่ยงที่จะถูกเข้าถึงข้อมูลหากไม่มีการกั้นโซน (Segmentation) ที่ดีพอ

      3. รูปแบบการแพร่กระจายและการโจมตี
        3.1 ซ่อนคำสั่งอันตรายในระบบ แฮกเกอร์ไม่ใช้ลิงก์หลอกลวงแบบเดิม แต่จะฝังคำสั่งอันตรายไว้ในบันทึกระบบ (Logs) เพื่อรอให้ AI เข้ามาประมวลผล
        3.2 อาศัยผู้ใช้เป็นตัวกลาง การโจมตีไม่สามารถทำงานได้อัตโนมัติ แต่ต้องหลอกให้ผู้ใช้งานสั่งการ AI ซ้ำ ๆ เพื่อให้อ่านและทำตามคำสั่งใน Logs ดังกล่าว
        3.3 เพิกเฉยระบบเตือนภัย การโจมตีจะสำเร็จก็ต่อเมื่อผู้ใช้งานยืนยันคำสั่งเดิม แม้ว่าระบบ AI จะขึ้นแจ้งเตือนความเสี่ยงให้ทราบแล้ว

      4. แนวทางการป้องกัน
        4.1 อัปเดตระบบทันที ควรอัปเดตระบบ Grafana ให้เป็นเวอร์ชันล่าสุดโดยด่วน เนื่องจากผู้พัฒนาได้ออกแพตช์แก้ไขช่องโหว่แล้ว
        4.2 เฝ้าระวังพฤติกรรมการส่งข้อมูล ตรวจสอบระบบ AI อย่างใกล้ชิด ว่ามีความพยายามส่งข้อมูลออกไปยังเซิร์ฟเวอร์ภายนอกที่ผิดปกติหรือไม่
        4.3 จำกัดการเชื่อมต่ออินเทอร์เน็ต ตั้งค่าเครือข่ายของเซิร์ฟเวอร์ Grafana ให้เชื่อมต่อออกไปภายนอกได้เฉพาะช่องทางและเว็บไซต์ที่จำเป็นจริงๆ เท่านั้น
        4.4 ตรวจสอบการการแจ้งเตือน หากใช้งาน AI แล้วระบบขึ้นแจ้งเตือนว่าพบคำสั่งผิดปกติหรือมีความเสี่ยง ผู้ใช้ไม่ควรฝืนสั่งให้ AI ทำงานนั้นต่อโดยเด็ดขาด

      #CyberSecurity #ThaiCERT #GrafanaGhost #เตือนภัยไซเบอร์ #AIInjection #ITAdmin #DataExfiltration

      🔗 แหล่งอ้างอิง
      [1] https://dg.th/pkuwojtnvl
      [2] https://dg.th/59zyk68it1

      GrafanaGhost AI Injection.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨 เตือนภัยไซเบอร์ พบกลุ่ม Ransomware ใช้ไดรเวอร์ที่มีช่องโหว่ ปิด EDR เพื่อหลบการตรวจจับ

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามรายงานระบุกลุ่มแรนซัมแวร์ Qilin และ Warlock ใช้เทคนิค Bring Your Own Vulnerable Driver (BYOVD) โดยนำไดรเวอร์ที่มีช่องโหว่มาใช้งานบนระบบที่ถูกเจาะแล้ว เพื่อปิดการทำงานของระบบป้องกัน EDR และหลบเลี่ยงการตรวจจับก่อนดำเนินการโจมตีในขั้นถัดไป[1]

      1. รายละเอียดภัยคุกคาม[2]
        การโจมตีของกลุ่ม Qilin ใช้ไฟล์ DLL ที่เป็นจุดเริ่มต้นของกระบวนการโจมตีหลายขั้นตอนเพื่อปิดการทำงานของระบบป้องกันบนเครื่องเป้าหมาย โดยไฟล์ดังกล่าวถูกใช้ผ่านเทคนิค DLL side-loading และสามารถปิดการทำงานของ EDR ได้มากกว่า 300 รายการ จากผู้ผลิตหลายราย และใช้วิธีหลบการตรวจจับหลายรูปแบบ เช่น ลดการบันทึกเหตุการณ์ของระบบ และรันเพย์โหลดอยู่ในหน่วยความจำ เพื่อให้ตรวจจับได้ยากขึ้น

      2. ลักษณะการโจมตีที่พบ
        2.1 กลุ่ม Qilin ใช้ไดรเวอร์ที่มีช่องโหว่เพื่อช่วยให้มัลแวร์เข้าถึงระบบในระดับสูง และใช้ปิดการทำงานของ EDR ก่อนรันเพย์โหลดหลัก
        2.2 กลุ่ม Warlock ใช้ไดรเวอร์ที่มีช่องโหว่ เพื่อยุติการทำงานของผลิตภัณฑ์ความปลอดภัยในระดับเคอร์เนล และยังใช้เครื่องมืออื่นร่วมด้วยเพื่อเคลื่อนย้ายภายในเครือข่าย ควบคุมระบบ และดึงข้อมูลออก

      3. พฤติกรรมสำคัญที่ควรเฝ้าระวัง
        ผู้โจมตีมักไม่รีบเข้ารหัสข้อมูลทันทีหลังเจาะระบบ แต่จะใช้เวลาอยู่ในระบบเพื่อขยายการควบคุมก่อน โดยพบการรันแรนซัมแวร์อาจเกิดขึ้นหลังการเจาะระบบครั้งแรกหลายวัน ในช่วงดังกล่าวควรเฝ้าระวังความผิดปกติ เช่น การทำงานของระบบป้องกันถูกปิดหรือหยุดทำงานโดยไม่ทราบสาเหตุ การพบไฟล์หรือไดรเวอร์ที่ไม่คุ้นเคยในระบบ รวมถึงการใช้งานเครื่องมือที่เกี่ยวข้องกับการเข้าควบคุมหรือเคลื่อนย้ายภายในเครือข่ายอย่างผิดปกติ

      4. แนวทางการป้องกันและลดความเสี่ยง

      4.1 อนุญาตเฉพาะไดรเวอร์ที่เชื่อถือได้ และควบคุมการติดตั้งไดรเวอร์อย่างเข้มงวด
      4.2 เฝ้าระวังและตรวจสอบเหตุการณ์ที่เกี่ยวข้องกับการติดตั้งไดรเวอร์
      4.3 อัปเดตแพตช์ระบบและซอฟต์แวร์ด้านความปลอดภัยอย่างสม่ำเสมอ
      4.4 ใช้การป้องกันหลายชั้น และติดตามพฤติกรรมผิดปกติในระบบอย่างต่อเนื่อง

      1. แหล่งอ้างอิง
      • https://dg.th/ibta548uvq
      • https://dg.th/6jvu8n9ioaEDR Killer 3.png
      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • แจ้งเตือนภัยคุกคามจากกลุ่มแฮกเกอร์ APT28 ใช้เทคนิคการดักจับข้อมูล

      แจ้งเตือนภัยคุกคามจากกลุ่มแฮกเกอร์ APT28 ใช้เทคนิคการดักจับข้อมูลเพื่อยึดครองบัญชีผู้ใช้ Microsoft 365 ขอให้ผู้ดูแลระบบยกระดับมาตรการป้องกันโดยด่วน

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ด้านความมั่นคงปลอดภัยไซเบอร์เกี่ยวกับแคมเปญการโจมตีของกลุ่มแฮกเกอร์ APT28 ซึ่งมุ่งเป้าไปยังหน่วยงานที่ใช้บริการอีเมลและระบบคลาวด์ เช่น Microsoft 365 โดยใช้เทคนิคการโจมตีแบบเปลี่ยนเส้นทางระบบชื่อโดเมน (DNS Hijacking) ร่วมกับการโจมตีแบบ Adversary-in-the-Middle (AiTM) เพื่อดักจับข้อมูลการยืนยันตัวตนและยึดครองบัญชีผู้ใช้ ทั้งนี้ ผู้ดูแลระบบควรเร่งยกระดับมาตรการป้องกัน โดยเฉพาะการตรวจสอบและตั้งค่าความปลอดภัยของอุปกรณ์เครือข่าย เพื่อป้องกันความเสียหายที่อาจเกิดขึ้น

      1. สรุปสถานการณ์
        นักวิจัยด้านความมั่นคงปลอดภัยจาก Black Lotus Labs ภายใต้บริษัท Lumen Technologies [1] พบแคมเปญการโจมตีที่เรียกว่า “FrostArmada” ซึ่งมีความเชื่อมโยงกับกลุ่ม APT28 ซึ่งเป็นที่รู้จักในชื่อ Fancy Bear, Sofacy, Forest Blizzard, Strontium, Storm-2754 และ Sednit โดยผู้โจมตีได้มุ่งเป้าไปยังอุปกรณ์เครือข่ายหรืออุปกรณ์ที่ใช้งานในสำนักงานขนาดเล็กหรือที่บ้าน (SOHO) โดยเฉพาะอุปกรณ์เราเตอร์ เพื่อทำการปรับเปลี่ยนค่า Domain Name System (DNS) ให้ชี้ไปยังเซิร์ฟเวอร์ของผู้โจมตี ส่งผลให้สามารถดักจับและเปลี่ยนเส้นทางการรับส่งข้อมูลของผู้ใช้งานได้ ทั้งนี้ ผู้โจมตีมีการดำเนินการในลักษณะเป็นเครือข่าย (botnet) และแบ่งบทบาทการทำงานเป็นส่วนของการขยายการติดเชื้อ (Expansion) และส่วนของการดักจับข้อมูล (Credential Harvesting) เพื่อเพิ่มประสิทธิภาพในการโจมตีและการเก็บรวบรวมข้อมูลเป้าหมาย

      รายงานจาก Microsoft [2] ระบุว่ากลุ่มผู้โจมตีได้ใช้เทคนิคการโจมตีแบบ Adversary-in-the-Middle (AiTM) ร่วมกับการโจมตี DNS Hijacking เพื่อดักจับข้อมูลการยืนยันตัวตนของผู้ใช้งาน โดยเฉพาะบัญชีผู้ใช้บริการ Microsoft 365 ซึ่งรวมถึงการเข้าถึงบริการอีเมลและระบบที่เกี่ยวข้อง นอกจากนี้ยังพบว่าการโจมตีดังกล่าวสามารถส่งผลกระทบได้ทั้งการใช้งานผ่านเว็บเบราว์เซอร์และแอปพลิเคชันบนเครื่องผู้ใช้ โดยในบางกรณีผู้โจมตีสามารถปลอมแปลงการตอบสนองของ DNS เพื่อบังคับให้ผู้ใช้งานเชื่อมต่อไปยังระบบของผู้โจมตี และดำเนินการดักจับข้อมูลสำคัญ เช่น รหัสผ่าน และโทเคนการยืนยันตัวตน (Authentication Token) ได้โดยที่ผู้ใช้งานอาจไม่ทราบถึงความผิดปกติดังกล่าว

      1. รูปแบบการโจมตี
        แคมเปญการโจมตีดังกล่าวมีลักษณะเป็นการโจมตีแบบหลายขั้นตอน (multi-stage attack) โดยเริ่มจากการเข้าควบคุมอุปกรณ์เครือข่าย จากนั้นจึงปรับเปลี่ยนเส้นทางการรับส่งข้อมูล และดำเนินการดักจับข้อมูลการยืนยันตัวตนของผู้ใช้งานผ่านเทคนิค Adversary-in-the-Middle (AiTM) ซึ่งอาจส่งผลให้ผู้โจมตีสามารถเข้าถึงบัญชีผู้ใช้และระบบสำคัญ โดยมีลักษณะพฤติกรรมที่สำคัญ ดังนี้

      2.1 เข้าถึงและยึดครองอุปกรณ์เครือข่ายประเภท SOHO Router ที่เปิดให้เข้าถึงจากอินเทอร์เน็ต
      2.2 ปรับเปลี่ยนค่า Domain Name System (DNS) ให้ชี้ไปยังเซิร์ฟเวอร์ของผู้โจมตี
      2.3 กระจายค่า DNS ที่ถูกแก้ไขไปยังอุปกรณ์ภายในเครือข่ายผ่าน DHCP
      2.4 เปลี่ยนเส้นทางการเชื่อมต่อไปยังระบบของผู้โจมตี (AiTM Proxy)
      2.5 ดักจับข้อมูลสำคัญ เช่น รหัสผ่าน และโทเคนการยืนยันตัวตน (Authentication Token)
      2.6 ใช้ข้อมูลที่ได้เพื่อเข้าถึงระบบ คงอยู่ในระบบ และขยายการเข้าถึงไปยังระบบอื่นภายในเครือข่าย

      1. Indicators of Compromise (IoCs) ที่เกี่ยวข้อง
        จากข้อมูลของ National Cyber Security Centre (NCSC) ได้ให้รายละเอียดเกี่ยวกับกลยุทธ์ เทคนิค และขั้นตอน (TTPs) จากกลุ่มแฮกเกอร์ APT28 [3] ผู้ดูแลระบบควรนำไปใช้เป็นแนวทางในการตรวจสอบและยกระดับมาตรการป้องกัน ดังนี้

      3.1 ค่า DNS บนอุปกรณ์เครือข่ายถูกเปลี่ยนแปลงโดยไม่ได้รับอนุญาต
      3.2 การเชื่อมต่อไปยัง DNS Server หรือ IP Address ที่ไม่รู้จักหรือไม่น่าเชื่อถือ
      3.3 การถูกเปลี่ยนเส้นทาง (redirect) ไปยังหน้าเข้าสู่ระบบที่ไม่ใช่โดเมนจริงของ Microsoft 365
      3.4 การปรากฏการแจ้งเตือน TLS/Certificate ผิดปกติระหว่างการใช้งานระบบ
      3.5 การเข้าสู่ระบบจาก IP Address หรือประเทศที่ไม่เคยมีการใช้งานมาก่อน
      3.6 การใช้งานบัญชีผู้ใช้หรือ Token ในลักษณะที่ผิดปกติ
      3.7 การตรวจพบพฤติกรรมการเชื่อมต่อผ่าน Proxy หรือ Adversary-in-the-Middle (AiTM) โดยไม่ทราบสาเหตุ

      1. อุปกรณ์และระบบที่ได้รับผลกระทบ
        4.1 อุปกรณ์เราเตอร์ TP-Link (สามารถตรวจสอบรุ่นที่ได้รับผลกระทบได้จาก IoCs)
        4.2 ระบบอีเมลและบริการคลาวด์ที่เกี่ยวข้องกับบัญชีผู้ใช้ Microsoft 365
        4.3 ระบบอีเมลภายในองค์กร (On-premises mail servers)
        4.4 ระบบที่เปิดให้เข้าถึงจากอินเทอร์เน็ต (Internet-facing services)

      2. แนวทางการแก้ไขชั่วคราว (Workaround)
        5.1 เปิดใช้งาน Multi-Factor Authentication (MFA)
        5.2 ตั้งค่า Account Lockout / Timeout เมื่อ login ผิดหลายครั้ง
        5.3 จำกัด IP หรือ Geo-location ที่สามารถเข้าถึงระบบ
        5.4 ปิดหรือจำกัดการเข้าถึงจาก VPN / Tor (หากไม่จำเป็น)
        5.5 อัปเดตระบบให้เป็นเวอร์ชันล่าสุดโดยทันที
        5.6 ตรวจสอบว่าระบบไม่มีซอฟต์แวร์ที่หมดอายุ (End-of-life)

      3. คำแนะนำด้านความปลอดภัยเพิ่มเติม
        6.1 ใช้แนวคิด Zero Trust Architecture
        6.2 ตรวจสอบ Log การเข้าใช้งานอย่างสม่ำเสมอ
        6.3 ทำ Threat Hunting เพื่อค้นหาพฤติกรรมต้องสงสัย
        6.4 ใช้ระบบตรวจจับความผิดปกติ (Anomaly Detection)
        6.6 แยกเครือข่าย (Network Segmentation) เพื่อลดความเสียหาย
        6.7 จัดทำนโยบายรหัสผ่านที่รัดกุม
        6.8 อบรมผู้ใช้งานเกี่ยวกับภัยด้านไซเบอร์

      4. แหล่งอ้างอิง
        [1] https://dg.th/yrsjbwotpv
        [2] https://dg.th/vgerjcqmb8
        [3] https://dg.th/urzge1hob6
        APT28.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 08 April 2026

      Industrial Sector

        • Mitsubishi Electric GENESIS64 And ICONICS Suite Products
          "Successful exploitation of these vulnerabilities could allow a local attacker to disclose SQL Server credentials used by the affected products and use them to disclose, tamper with, or destroy data, or to cause a denial-of-service (DoS) condition on the system."
          https://www.cisa.gov/news-events/ics-advisories/icsa-26-097-01

      Vulnerabilities

      • Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
        "Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution. "The CustomMCP node allows users to input configuration settings for connecting to an external MCP (Model Context Protocol) server," Flowise said in an advisory released in September 2025. "This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation.""
        https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html
        https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-3gcm-f6qx-ff7p
        https://www.bleepingcomputer.com/news/security/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/
        https://www.securityweek.com/critical-flowise-vulnerability-in-attacker-crosshairs/
        https://securityaffairs.com/190471/security/attackers-exploit-critical-flowise-flaw-cve-2025-59528-for-remote-code-execution.html
      • 50,000 WordPress Sites Affected By Arbitrary File Upload Vulnerability In Ninja Forms – File Upload WordPress Plugin
        "On January 8th, 2026, we received a submission for an Arbitrary File Upload vulnerability in Ninja Forms – File Upload, a WordPress plugin with an estimated 50,000 active installations. This vulnerability makes it possible for an
        https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/
        https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/
      • One Megabyte To Root: How a Size Check Broke Docker’s Last Line Of Defense
        "Your Docker security policy can be silently bypassed with a single HTTP request. An attacker pads a container creation request to over 1MB, and Docker's authorization middleware drops the body before your security plugin ever sees it. The plugin allows the request because it sees nothing to block. The Docker daemon processes the full request and creates a privileged container with root access to the host: your AWS credentials, SSH keys, Kubernetes configs, and everything else on the machine. This works against every AuthZ plugin in the ecosystem (OPA, Prisma Cloud, Casbin, custom). We confirmed it against Docker Engine 27.5.1. Patched in 29.3.1."
        https://www.cyera.com/research/one-megabyte-to-root-how-a-size-check-broke-dockers-last-line-of-defense
        https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html
      • GrafanaGhost: The Phantom Stealing Your Data
        "At Noma, our mission is simple: identify and reduce emerging AI risk before it impacts your business. Following our discoveries of ForcedLeak, GeminiJack, and DockerDash, the Noma Labs Team has identified a new critical vulnerability: GrafanaGhost. This exploit enables silent exfiltration of sensitive business data in Grafana. By bypassing the client-side protections and security guardrails that restrict external data requests, GrafanaGhost allows an attacker to bridge the gap between your private data environment and an external server. Because the exploit ignores model restrictions and operates autonomously, sensitive enterprise data can be leaked silently in the background."
        https://noma.security/blog/grafana-ghost/
        https://www.darkreading.com/application-security/grafana-patches-ai-bug-leaked-user-data
        https://cyberscoop.com/grafanaghost-grafana-prompt-injection-vulnerability-data-exfiltration/
        https://hackread.com/grafanaghost-vulnerability-data-theft-via-ai-injection/
        https://www.infosecurity-magazine.com/news/grafanaghost-silent-data/
        https://www.securityweek.com/grafanaghost-attackers-can-abuse-grafana-to-leak-enterprise-data/
      • Severe StrongBox Vulnerability Patched In Android
        "The latest Android security updates address only two vulnerabilities: a critical denial-of-service (DoS) issue, and a StrongBox flaw whose impact does not appear to have been disclosed. The DoS vulnerability is tracked as CVE-2026-0049 and it affects Android’s Framework component. The weakness can be exploited by a local attacker with no additional execution privileges and without user interaction to cause a DoS condition. The second vulnerability affects StrongBox, Android’s hardware-backed secure keystore that adds a higher level of protection for cryptographic keys."
        https://www.securityweek.com/severe-strongbox-vulnerability-patched-in-android/
      • Cracks In The Bedrock: Escaping The AWS AgentCore Sandbox
        "When researching the boundaries of cloud services, two of the main aspects that come to mind are network and identity. In this two-part series, we present our research into the boundaries and resilience of Amazon Bedrock AgentCore. In this first part, we explore how AgentCore’s Code Interpreter sandbox network isolation mode could be bypassed in a way that allows sending and receiving of data from external endpoints via DNS tunneling. In the second part, we explore the identity side, and how an attacker can leverage weaknesses in default identities and permissions to compromise other AgentCore agents within an AWS account and exfiltrate sensitive data from other services."
        https://unit42.paloaltonetworks.com/bypass-of-aws-sandbox-network-isolation-mode/

      Malware

        • US Warns Of Iranian Hackers Targeting Critical Infrastructure
          "Iranian-linked hackers are targeting Internet-exposed Rockwell/Allen-Bradley programmable logic controllers (PLCs) on the networks of U.S. critical infrastructure organizations. The warning came earlier today in the form of a joint advisory authored by the FBI, CISA, NSA, the Environmental Protection Agency (EPA), Department of Energy (DOE), and the United States Cyber Command – Cyber National Mission Force (CNMF). The authoring agencies said that these ongoing attacks have targeted organizations across multiple U.S. critical infrastructure sectors (including Government Services and Facilities, Water and Wastewater Systems, and Energy), and have resulted in financial losses and operational disruptions since March 2026."
          https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/
          https://www.ic3.gov/CSA/2026/260407.pdf
          https://therecord.media/fbi-pentagon-warn-iran-hacking-groups-target-ot
          https://cyberscoop.com/iranian-hackers-cyberattacks-us-energy-water-infrastructure-plc-scada-warning/
          https://www.theregister.com/2026/04/07/iran_hackers_disrupting_us_water_energy/
      • **https://www.bankinfosecurity.com/us-critical-infrastructure-facing-iranian-linked-ot-threats-a-31360
      • Authorities Disrupt Router DNS Hijacks Used To Steal Microsoft 365 Logins**
        "An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link routers to steal Microsoft account credentials. The Russian threat group APT28, also tracked as Fancy Bear, Sofacy, Forest Blizzard, Strontium, Storm-2754, and Sednit, has been linked to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165. In the FrostArmada attacks, the hackers compromised mainly small office/home office (SOHO) routers and altered the domain name system (DNS) settings to point to virtual private servers (VPS) under their control, which acted as DNS resolvers."
        https://www.bleepingcomputer.com/news/security/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins/
        https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled
        https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/
      • APT28 Exploit Routers To Enable DNS Hijacking Operations
        "Russian cyber actors APT28 have been exploiting routers to overwrite Dynamic Host Configuration Protocol (DHCP)/Domain Name System (DNS) settings to redirect traffic through attacker-controlled DNS servers. Resulting malicious DNS resolutions enable adversary-in-the-middle (AitM) attacks that harvest passwords, OAuth tokens and other credentials for web and email related services. This puts organisations at risk of credential theft, data manipulation and broader compromise. The DNS hijacking operations are believed to be opportunistic in nature, with the actor targeting a wide pool of victims and then likely filtering down for users of potential intelligence value at each stage of the exploitation chain."
        https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations
        https://thehackernews.com/2026/04/russian-state-linked-apt28-exploits.html
        https://therecord.media/uk-exposes-russian-cyber-unit-hacking-home-routers
        https://www.bankinfosecurity.com/russian-hackers-hit-soho-routers-in-cyberespionage-campaign-a-31354
        https://cyberscoop.com/forest-blizzard-apt28-routers-espionage-campaign-operation-masquerade/
        https://www.helpnetsecurity.com/2026/04/07/russian-hackers-router-hijacking-dns-credential-theft/
        https://www.infosecurity-magazine.com/news/russia-apt28-hijack-routers-uk-ncsc/
        https://www.theregister.com/2026/04/07/russia_fancy_bear_ncsc_router_attack/
      • The Trojan Horse Of Cybercrime: Weaponizing SaaS Notification Pipelines
        "Recent telemetry indicates an increase in threat actors leveraging the automated notification infrastructure of legitimate Software-as-a-Service (SaaS) platforms to facilitate social engineering campaigns. By embedding malicious lures within system-generated commit notifications, attackers bypass traditional reputation-based email security filters. This Platform-as-a-Proxy (PaaP) technique exploits the implicit trust organizations place in traffic originating from verified SaaS providers, effectively weaponizing legitimate infrastructure to bypass standard email authentication protocols. Talos' analysis explores how attackers abuse the notification pipelines of platforms like GitHub and Atlassian to facilitate credential harvesting and social engineering."
        https://blog.talosintelligence.com/weaponizing-saas-notification-pipelines/
      • AI-Enabled Device Code Phishing Campaign Exploits OAuth Flow For Account Takeover
        "A phishing campaign that bypasses the standard 15-minute expiration window through automation and dynamic code generation, leveraging the OAuth Device Code Authentication flow to compromise organizational accounts at scale, has been observed by the Microsoft Defender Security Research team. The campaign uses AI-assisted infrastructure and end-to-end automation."
        https://www.helpnetsecurity.com/2026/04/07/microsoft-device-code-phishing-campaign/
        https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/
        https://www.theregister.com/2026/04/07/microsoft_device_code_phishing/
      • Hackers Are Attempting To Turn ComfyUI Servers Into a Cryptomining Proxy Botnet
        "On March 12, 2026, we became aware of an open directory (77[.]110[.]96[.]200 (Censys)) on a known bulletproof hosting provider (AEZA) that had been flagged as suspicious by an internal system. Over the following days, the directory rapidly grew from just a handful of files to over a hundred, indicating active development of an unknown toolset. Our analysis showed that the individual was conducting Internet-wide scans for exposed ComfyUI instances and exploiting a misconfiguration that allowed arbitrary code execution through custom nodes. Compromised hosts were used to deploy cryptocurrency miners and what looks to be a Hysteria v2 VPN node, effectively enrolling them into a controlled proxy network; all of which appeared to be centrally managed through a web-based command-and-control dashboard."
        https://censys.com/blog/comfyui-servers-cryptomining-proxy-botnet/
        https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html
      • Cyberattack On Telecom Giant Rostelecom Disrupts Internet Services Across Russia
        "A “large-scale” distributed denial-of-service (DDoS) attack targeted the network of Russian state-run telecom giant Rostelecom on Monday evening, temporarily disrupting online banking, government platforms and other digital services across dozens of cities. Rostelecom told state-owned media the attack was quickly contained, adding the disruption to internet services was a consequence of emergency filtering introduced to mitigate the attack. DDoS attacks overwhelm websites and online services with large volumes of junk traffic, making them temporarily unavailable to legitimate users."
        https://therecord.media/rostelecom-cyberattack-disrupts-russian-internet-access
        • Claude Code Packaging Error Remains a Lure In An Active Campaign: What Defenders Should Do
          "TrendAI™ Research is continuously monitoring an active campaign that continues to leverage the packaging error in  Anthropic's Claude Code npm release to distribute Vidar, GhostSocks, and PureLog Stealer payloads. The distribution hub for the leaked Claude Code brand lure campaign was identified as https://github[.]com/leaked-claude-code/leaked-claude-code. It is operated by a GitHub account identified as idbzoomh1, who used the legitimate Claude Code source map leak incident as a lure to deliver payloads via a release asset.  A previous account, idbzoomh, has been blocked by GitHub. As of publishing there are no other identified repositories connected to the campaign; TrendAI™ Research will update this blog in the event of new findings."
          https://www.trendmicro.com/en_us/research/26/d/claude-code-remains-a-lure-what-defenders-should-do.html

      Breaches/Hacks/Leaks

      • Wynn Resorts Says 21,000 Employees Affected By ShinyHunters Hack
        "High-end casino and hotel operator Wynn Resorts says more than 21,000 individuals are affected by the recently disclosed data breach. Wynn Resorts confirmed in late February that hackers had obtained employee data. The admission came after the notorious ShinyHunters cybercrime group claimed to have stolen more than 800,000 records containing personally identifiable information, including SSNs."
        https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/
      • Snowflake Customers Hit In Data Theft Attacks After SaaS Integrator Breach
        "Over a dozen companies have suffered data theft attacks after a SaaS integration provider was breached and authentication tokens stolen. While numerous cloud storage and SaaS vendors were targeted using the stolen tokens, BleepingComputer has learned that the majority of the data theft attacks targeted the cloud data platform Snowflake. Snowflake confirmed "unusual activity" to BleepingComputer, stating that a small number of its customers were impacted."
        https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/
      • Massachusetts Hospital Turning Ambulances Away After Cyberattack
        "A cyberattack on a prominent hospital system in Massachusetts has been forced to turn away ambulances and deploy down-time procedures. Signature Healthcare and Signature Healthcare Brockton Hospital said on Monday that the cyber incident is impacting many of their information systems. Officials at the hospital said they are working with outside experts to investigate the incident and restore downed systems. Inpatient, walk-in emergency services and scheduled surgeries are still being conducted, but chemotherapy infusion services for cancer patients were cancelled on Tuesday."
        https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack
        https://www.bankinfosecurity.com/mass-hospital-diverting-ambulances-as-deals-attack-a-31356
      • Cyberattack Hits Northern Ireland’s Centralized School Network, Disrupting Access For Thousands
        "A cyberattack on a centralized school IT network in Northern Ireland has disrupted access to educational systems for hundreds of thousands of students, with authorities still working to fully restore services and determine whether any personal data was compromised. The Education Authority (EA), which oversees school support services in Northern Ireland, said in an official statement it became aware of the incident affecting the “C2K” system last week and took immediate steps to contain the breach, including shutting down access to the system."
        https://therecord.media/cyberattack-hits-northern-ireland-schools

      General News

      • The Case For Fixing CWE Weakness Patterns Instead Of Patching One Bug At a Time
        "In this Help Net Security interview, Alec Summers, MITRE CVE/CWE Project Lead, discusses how CWE is moving from a background reference into active use in vulnerability disclosure. More CVE records now include CWE mappings from CNAs, which tends to produce more precise root-cause data. Automation tools help analysts map weaknesses faster, but can reinforce bad patterns if trained on poor examples. Summers argues that fixing weakness patterns reduces recurring work for security teams, even those operating on tight budgets. The core problem is framing: the industry defaults to vulnerability language, while CWE asks teams to focus on what made the bad outcome possible in the first place."
        https://www.helpnetsecurity.com/2026/04/07/alec-summers-mitre-cwe-vulnerability-mapping/
      • Google Study Finds LLMs Are Embedded At Every Stage Of Abuse Detection
        "Online platforms are running large language models at every stage of LLM content moderation, from generating training data to auditing their own systems for bias. Researchers at Google mapped how this is happening across what the authors call the Abuse Detection Lifecycle, a four-stage framework covering labeling, detection, review and appeals, and auditing. Earlier moderation systems, built on models like BERT and RoBERTa fine-tuned on static hate-speech datasets, could identify explicit slurs with reasonable accuracy. They struggled with sarcasm, coded language, and culturally specific abuse. LLMs address some of those gaps through contextual reasoning, but they introduce new operational and governance problems at each stage they enter."
        https://www.helpnetsecurity.com/2026/04/07/google-llm-content-moderation/
        https://arxiv.org/pdf/2604.00323
      • Lies, Damned Lies, And Cybersecurity Metrics
        "Despite years of increased spending, investments in more tooling, and more talent flooding into the industry, cybersecurity outcomes seem to be getting worse. During a panel discussion in Las Vegas last month, a group of cybersecurity leaders said the problem runs deeper than attackers or technology. The panel, titled "Hard Truths in Cybersecurity: Fear, Liability, and the Industry's Biggest Lies," focused on what's broken in cybersecurity. "Every year, we do more, and every year, the results get worse," said Andrew Rubin, CEO of Illumio. "The number of breaches, the size of the breaches, and the economic losses have gone up.""
        https://www.darkreading.com/cyber-risk/lies-damned-lies-cybersecurity-metrics
      • AI Agents And Non-Human Identities Creating Critical Security Gaps, Report
        "Businesses are rushing to adopt automation, but they are leaving a significant security gap in their infrastructure as new data suggests this technological race is moving much faster than the security needed to protect it. On 7 April 2026, password security firm Keeper Security released a report at the RSA Conference in San Francisco, according to which many companies are failing to manage non-human identities (NHIs). These are basically software-based assets, such as service accounts, API keys, and AI-powered tools, that allow system-to-system interactions without any human involvement."
        https://hackread.com/ai-agents-non-human-identities-security-gaps/
      • Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks
        "Anthropic may have just announced the future of AI – and it is both very exciting and very, very scary. Mythos is the Ancient Greek word that eventually gave us ‘mythology’. It is also the name for Anthropic’s latest foundational AI Model: it evokes the connective tissue that links together knowledge and ideas. Industry excitement over Anthropic’s Claude Mythos began at the end of March 2026 when Fortune magazine published information on an upcoming Anthropic development. The information came from a leak of almost 3,000 files from a misconfigured CMS. Anthropic confirmed the details."
        https://www.securityweek.com/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/
        https://www.theregister.com/2026/04/07/anthropic_all_your_zerodays_are_belong_to_us/
        https://www.bankinfosecurity.com/anthropic-calls-its-new-model-too-dangerous-to-release-a-31361
      • The New Rules Of Engagement: Matching Agentic Attack Speed
        "The cybersecurity industry has been drowning in waves of speculation about the impact of AI-enabled attacks since ChatGPT was launched. Today, that speculation has come crashing down. AI-enabled cyberwarfare isn’t coming, it’s here. In September 2025, Anthropic reported the first documented case of a large-scale cyberattack executed without substantial human intervention. Additionally, Armis’ 2026 State of Cyberwarfare Report (PDF) found that 92% of IT decision-makers in the U.S. are concerned about the impact of cyberwarfare on their organizations, with 64% reporting that they have already been impacted by an AI-generated or AI-led attack over the last 12 months."
        https://www.securityweek.com/the-new-rules-of-engagement-matching-agentic-attack-speed/
        https://media.armis.com/rp-state-of-cyberwarfare-2026-en.pdf

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 0d24f0fc-d4f0-4ce7-b436-6b5a25d554db-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • เทคนิค GPUBreach ใช้ GPU Bit-flips ยกระดับสิทธิ์ยึดระบบได้ถึงระดับ Root แม้เปิด IOMMU

      4b7b799f-fd02-441b-a16b-7e810bebf992-image.png เทคนิค GPUBreach ใช้ GPU Bit-flips ยกระดับสิทธิ์ยึดระบบได.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 4d76ca77-9d26-456a-ba2e-5d650cc9203f-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบระบบ F5 BIG-IP APM กว่า 14,000 ระบบยังเปิดเผยออนไลน์ เสี่ยงถูกโจมตี RCE

      8d9d449e-3fa3-4417-be5f-af1344f1ae7b-image.png พบระบบ F5 BIG-IP APM กว่า 14,000 ระบบยังเปิดเผยออนไลน์ .png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand d473b40b-18d7-40bc-abdd-a7bb89e79721-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • เยอรมนีเผยโฉมหน้าหัวหน้ากลุ่มแรนซัมแวร์ GandCrab และ REvil พบกวาดเงินค่าไถ่รวมกว่า 2 พันล้านดอลลาร์

      8cab07d5-10b7-4f56-8fee-c5e557ef7a40-image.png

      เยอรมนีเผยโฉมหน้าหัวหน้ากลุ่มแรนซัมแวร์ G.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 84f8ab19-7957-4137-9b25-b430ca45cf79-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เพิ่มช่องโหว่ที่ถูกใช้โจมตี 1 รายการลงในแคตตาล็อก

      เมื่อวันที่ 6 เมษายน 2026 Cybersecurity and Infrastructure Security Agency (CISA) ได้เพิ่มช่องโหว่ใหม่ 1 รายการลงในแคตตาล็อก Known Exploited Vulnerabilities (KEV) จากหลักฐานที่พบว่ามีการโจมตีใช้งานจริงแล้ว มีรายละเอียดดังนี้

      • CVE-2026-35616 - Fortinet FortiClient EMS Improper Access Control Vulnerability

      ทาง CISA จะปรับปรุงและเพิ่มช่องโหว่ใหม่เข้าสู่แคตตาล็อก KEV อย่างต่อเนื่อง เพื่อให้ครอบคลุมความเสี่ยงที่ตรวจพบจริงในปัจจุบันและอนาคต

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog
      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 9f918f9f-a2b4-4d25-96e6-3b282fa8f639-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 07 April 2026

      Healthcare Sector

      • Shadow AI In Healthcare Is Here To Stay
        "The healthcare industry must get ahead of pervasive shadow AI risks that only exacerbate recovery challenges when ransomware and other disruptive cyberattacks inevitably hit. Physicians, doctors, and clinicians use unsanctioned artificial intelligence (AI) tools and chatbots to boost efficiency in a job where shaving a second off could mean saving someone's life. But security teams can't monitor for potentially damaging threats if they don't know the tools are running in the environment; hence the term "shadow AI.""
        https://www.darkreading.com/cyber-risk/shadow-ai-in-healthcare-is-here-to-stay

      Vulnerabilities

      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2026-35616 - Fortinet FortiClient EMS Improper Access Control Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog
        https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-fortinet-flaw-exploited-in-attacks-by-friday/
        https://therecord.media/singapore-us-warn-of-fortinet-bug-exploited
        https://www.theregister.com/2026/04/06/forticlient_ems_bug_exploited/
      • New GPUBreach Attack Enables System Takeover Via GPU Rowhammer
        "A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise. GPUBreach was developed by a team of researchers at the University of Toronto, and full details will be presented at the upcoming IEEE Symposium on Security & Privacy on April 13 in Oakland. The researchers demonstrated that Rowhammer-induced bit flips in GDDR6 can corrupt GPU page tables (PTEs) and grant arbitrary GPU memory read/write access to an unprivileged CUDA kernel."
        https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/
        https://gpubreach.ca/
      • Disgruntled Researcher Leaks “BlueHammer” Windows Zero-Day Exploit
        "Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing attackers to gain SYSTEM or elevated administrator permissions. Dubbed BlueHammer, the vulnerability was published by a security researcher discontent with how Microsoft’s Security Response Center (MSRC) handled the disclosure process. Since, the security issue has no official patch and there is no update to address it, the flaw is considered a zero-day by Microsoft's definition."
        https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/
        https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html
      • AI Agents Found Vulns In This Popular Linux And Unix Print Server
        "In the latest chapter on leaky CUPS, a security researcher and his band of bug-hunting agents have found two flaws that can be chained to allow an unauthenticated attacker to remotely execute code and achieve root file overwrite on the network. CUPS - or the Common Unix Printing System, as it is less commonly known - is the standard way to submit files for printing over Linux and other Unix-like systems. It's also a favorite target for security researchers because a) making printers do bad things is fun, and b) as the default printing system for Apple device operating systems and most Linux distributions, any CUPS security flaw has a wide blast radius."
        https://www.theregister.com/2026/04/06/ai_agents_cups_server_rce/
        https://heyitsas.im/posts/cups/

      Malware

      • Storm-1175 Focuses Gaze On Vulnerable Web-Facing Assets In High-Tempo Medusa Ransomware Operations
        "The financially motivated cybercriminal actor tracked by Microsoft Threat Intelligence as Storm-1175 operates high-velocity ransomware campaigns that weaponize N-days, targeting vulnerable, web-facing systems during the window between vulnerability disclosure and widespread patch adoption. Following successful exploitation, Storm-1175 rapidly moves from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours. The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States."
        https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/
        https://www.bleepingcomputer.com/news/security/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/
        https://therecord.media/medusa-ransomware-group-zero-days-microsoft
      • Drift $280M Crypto Theft Linked To 6-Month In-Person Operation
        "The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "a functioning operational presence inside the Drift ecosystem." On April 1st, the Solana-based trading platform detected unusual activity that was followed by confirmation that funds had been lost in a sophisticated attack that allowed hijacking of the Security Council administrative powers. Blockchain intelligence firms Elliptic and TRM Labs attributed the heist to North Korean hackers, who took about 12 minutes to drain user assets."
        https://www.bleepingcomputer.com/news/security/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/
        https://www.elliptic.co/blog/drift-protocol-exploited-for-286-million-in-suspected-dprk-linked-attack
        https://www.trmlabs.com/resources/blog/north-korean-hackers-attack-drift-protocol-in-285-million-heist
        https://hackread.com/north-korean-hackers-trading-firm-drift-protocol/
        https://www.securityweek.com/north-korean-hackers-target-high-profile-node-js-maintainers/
      • Weaponizing Fear: Iran Conflict-Themed Phishing Uses Fake Emergency Alerts
        "War in the modern era extends far beyond the physical battlefield. The ongoing conflict in the Middle East involving the United States, Israel, and Iran continues to generate widespread fear and uncertainty, particularly among civilians in affected and neighboring regions. This climate of heightened anxiety creates ideal conditions for cyber threats, as malicious actors exploit fear-driven narratives to target individuals through digital attacks such as phishing and disinformation campaigns. The Cofense Phishing Defense Center (PDC) has recently identified a phishing campaign that impersonates a government emergency alert, referencing entities such as the Ministry of Interior and Civil Defense."
        https://cofense.com/blog/weaponizing-fear-iran-conflict-themed-phishing-uses-fake-emergency-alerts
        https://hackread.com/missile-alert-phishing-iran-us-israel-microsoft-logins/
      • Six Accounts, One Actor: Inside The Prt-Scan Supply Chain Campaign
        "On April 2, 2026, security researcher Charlie Eriksen publicly identified an automated campaign exploiting GitHub's pull_request_target workflow trigger. The attacker, operating under the account ezmtebo, opened over 475 malicious PRs in 26 hours targeting repositories belonging to both prominent organizations and hobbyists. This attacker is reminiscent of hackerbot-claw, the AI powered CI/CD attacker that used five different exploitation methods across seven successful high profile attacks."
        https://www.wiz.io/blog/six-accounts-one-actor-inside-the-prt-scan-supply-chain-campaign
        https://www.darkreading.com/application-security/ai-assisted-supply-chain-attack-targets-github
      • How LiteLLM Turned Developer Machines Into Credential Vaults For Attackers
        "The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are created, tested, cached, copied, and reused across services, bots, build tools, and now local AI agents. In March 2026, the TeamPCP threat actor proved just how valuable developer machines are. Their supply chain attack on LiteLLM, a popular AI development library downloaded millions of times daily, turned developer endpoints into systematic credential harvesting operations. The malware only needed access to the plaintext secrets already sitting on disk."
        https://thehackernews.com/2026/04/how-litellm-turned-developer-machines.html

      General News

      • German Authorities Identify REvil And GangCrab Ransomware Bosses
        "The Federal Police in Germany (BKA) has identified two Russian nationals as the leaders of GandCrab and REvil ransomware operations between 2019 and 2021. According to BKA's disclosure, 31-year-old Daniil Maksimovich Shchukin and 43-year-old Anatoly Sergeevitsch Kravchuk acted as the heads of the two ransomware groups "from at least the beginning of 2019 until at least July 2021." Shchukin hid behind the monikers UNKN/UNKNOWN for years, posting on cybercrime forums and speaking as a representative of the ransomware operation."
        https://www.bleepingcomputer.com/news/security/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/
        https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html
        https://therecord.media/german-police-unmask-suspects-linked-revil-gandcrab
        https://securityaffairs.com/190401/cyber-crime/bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks.html
      • UK Businesses Are Being Targeted Through Their Middle East Supply Chains — What To Do Now
        "The conversation around cyber risk in the UK has shifted. It is no longer confined to domestic networks, internal systems, or even direct attacks on British infrastructure. The weak link sits thousands of miles away, embedded within third-party vendors, logistics partners, and digital dependencies across the Middle East. This growing exposure has created a new layer of Middle East supply chain risk, one that is proving difficult to monitor and even harder to control."
        https://cyble.com/blog/middle-east-supply-chain-risk-uk-cyber-threats/
      • OWASP GenAI Data Security Risks & Mitigations 2026
        "The OWASP GenAI Data Security Risks and Mitigations 2026 guide provides a critical, forward-looking analysis of the unique data security challenges posed by the rapid, widespread adoption of Generative AI (GenAI) across enterprise environments, anticipating the landscape by 2026. This comprehensive guide moves beyond traditional software security paradigms to address the novel attack surfaces that emerge when systems process and generate information at an unprecedented scale. The paper establishes a foundational, open-source framework for securing GenAI systems, focusing intensely on the data layer—from initial training and fine-tuning datasets to user prompts and final model outputs. Security professionals must proactively integrate AI-specific security testing, constant monitoring, and robust validation from the earliest stages of model development through to deployment. Adopting and adapting a comprehensive security framework will be essential for organizations to safely harness the revolutionary capabilities of GenAI while effectively managing its profound data security risks by 2026."
        https://genai.owasp.org/resource/owasp-genai-data-security-risks-mitigations-2026/
        https://genai.owasp.org/download/53429/?tmstv=1773811493
        https://www.darkreading.com/application-security/owasp-genai-security-project-update-matrix
      • CISOs Grapple With AI Demands Within Flat Budgets
        "Security spending continues to edge upward across large organizations, though the changes remain gradual and tightly managed. The 2026 RH-ISAC CISO Benchmark reflects a steady environment where budgets expand in small steps, even as AI becomes a routine part of security operations. Spending levels increased during 2025 across both IT and security. Average IT spend as a share of revenue rose to 3.9% from 3.2% the year before. Security spend followed a similar path, reaching 0.75% of revenue, up from 0.57%. Security’s share of the IT budget moved slightly to 5.8%."
        https://www.helpnetsecurity.com/2026/04/06/rh-isac-enterprise-security-spending-report/
        • Google DeepMind Researchers Map Web Attacks Against AI Agents
          "Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show. The researchers have identified six types of attacks against AI agents that can be mounted via web content to inject malicious context and trigger unexpected behavior. Web content, they explain in a research paper, allows attackers to set up ‘AI Agent Traps’ that weaponize the agents’ capabilities against themselves, allowing attackers to promote products, exfiltrate data, or disseminate information at scale."
          https://www.securityweek.com/google-deepmind-researchers-map-web-attacks-against-ai-agents/
          https://papers.ssrn.com/sol3/papers.cfm?abstract_id=6372438
      • FBI: Cyber Fraud Surges To $17.6 Billion In Losses As Scams, Crypto Theft Soar
        "Cyber-enabled fraud accounted for the overwhelming majority of all losses reported to the FBI’s Internet Crime Complaint Center (IC3) in 2025, with a staggering $17.6 billion stolen. The center’s annual report, released on Monday, offers a snapshot of the law enforcement agency’s myriad efforts to combat digital threats, especially ransomware, which increasingly harm individuals, businesses and U.S. critical infrastructure. Cyber-enabled fraud was behind 85% of all losses reported to the hub in 2025 and constituted 45% of the 1,008,597 complaints it received overall."
        https://therecord.media/cyber-fraud-surges-to-17-billion-fbi-ic3
        https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf
      • First Stalkerware Maker Prosecuted Since 2014 Receives No Jail Time
        "The first stalkerware manufacturer convicted in the U.S. since 2014 received no jail time at his Friday sentencing. Bryan Fleming, founder of pcTattletale, was ordered to pay a $5,000 fine by a San Diego federal judge and will spend no time in prison beyond the one day he already served. In January, he pleaded guilty to one count of manufacturing, distributing, possessing and advertising wire, oral or electronic communication intercepting devices."
        https://therecord.media/stalkerware-maker-receives-no-jail-time
        https://cyberscoop.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/
      • Understanding Current Threats To Kubernetes Environments
        "The rapid adoption of container orchestration has positioned Kubernetes as a high-value target for adversaries seeking to compromise enterprise-scale environments. Our telemetry reveals that Kubernetes-related threat actor operations, including stealing Kubernetes tokens, increased 282% over the last year. The IT sector was the most heavily targeted, representing over 78% of observed activity. We look beyond traditional container escape scenarios, and demonstrate how high-profile threat actors abuse Kubernetes identities and exposed attack surfaces to escalate privileges, pivoting from initial access to sensitive backend cloud infrastructure."
        https://unit42.paloaltonetworks.com/modern-kubernetes-threats/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) b8d616e5-f43d-42c6-95cc-8e0203318978-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT