NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    3. กระทู้
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 2,031
    • กระทู้ 2,032
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    โพสต์ถูกสร้างโดย NCSA_THAICERT

    • Cyber Threat Intelligence 31 March 2026

      Vulnerabilities

      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2026-3055 Citrix NetScaler Out-of-Bounds Read Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog
        When AI Trust Breaks: The ChatGPT Data Leakage Flaw That Redefined AI Vendor Security Trust
        "AI assistants like ChatGPT have quickly become trusted environments for handling some of the most sensitive data people own. Users discuss medical symptoms, upload financial records, analyze contracts, and paste internal documents—often assuming that what they share remains safely contained within the platform. That assumption was challenged when new research uncovered a previously unknown vulnerability that enabled silent data leakage from ChatGPT conversations without user knowledge or consent. While the issue has since been fully resolved by OpenAI, the discovery delivers a much broader lesson for enterprises and security leaders: AI tools should not be assumed secure by default."
        https://blog.checkpoint.com/research/when-ai-trust-breaks-the-chatgpt-data-leakage-flaw-that-redefined-ai-vendor-security-trust/
        https://research.checkpoint.com/2026/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/
        https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html
        https://www.theregister.com/2026/03/30/openai_chatgpt_dns_data_snuggling_flaw/
      • Storm Brews Over Critical, No-Click Telegram Flaw
        "A storm is brewing over a purported critical Telegram Messenger flaw that allows for full system hijack, with full details of the unpatched vulnerability not set to be disclosed until July. The vulnerability, which could impact some 1 billion users of the popular chat app, was discovered by researcher Michael DePlante of the Trend Micro Zero Day Initiative (ZDI). ZDI first revealed the existence of the flaw, which it tracks as ZDI-CAN-30207, on Thursday and set a deadline for full disclose on July 26."
        https://www.darkreading.com/application-security/storm-brews-critical-no-click-telegram-flaw
        https://securityaffairs.com/190167/security/its-a-mystery-alleged-unpatched-telegram-zero-day-allows-device-takeover-but-telegram-denies.html
      • How Command Injection Vulnerability In OpenAI Codex Leads To GitHub Token Compromise
        "BeyondTrust Phantom Labs™ has discovered a critical command injection vulnerability in OpenAI's Codex cloud environment that exposed sensitive GitHub credential data. The vulnerability exists within the task creation HTTP request, which allows an attacker to inject arbitrary commands through the GitHub branch name parameter. This can result in the theft of a victim's GitHub User Access Token—the same token Codex uses to authenticate with GitHub. Through automated techniques, this exploit can scale to compromise multiple users interacting with a shared environment or GitHub repository. The vulnerability affects the ChatGPT website, Codex CLI, Codex SDK, and the Codex IDE Extension. All reported issues have since been remediated in coordination with OpenAI’s security team."
        https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token
        https://hackread.com/openai-codex-vulnerability-steal-github-tokens/
      • StrongSwan CVE-2026-25075: Integer Underflow In VPN Authentication
        "Bishop Fox researchers successfully exploited an integer underflow vulnerability affecting the EAP-TTLS plugin in strongSwan versions 4.5.0 through 6.0.4. The vulnerability allows remote, unauthenticated attackers to crash the VPN server's IKE daemon through a carefully crafted EAP-TTLS message, resulting in denial of service. What makes this vulnerability particularly interesting is that exploitation often requires a two-phase attack. In some scenarios, a single malicious packet corrupts the heap but doesn't crash the daemon; only a second connection triggers the segmentation fault. Our researchers also developed a safe detection method that identifies vulnerable servers without causing any disruption, which you can download here."
        https://bishopfox.com/blog/strongswan-cve-2026-25075-integer-underflow-in-vpn-authentication
        https://hackread.com/strongswan-flaw-attackers-crash-vpn-integer-underflow/

      Malware

      • Critical Fortinet Forticlient EMS Flaw Now Exploited In Attacks
        "Attackers are now actively exploiting a critical vulnerability in Fortinet's FortiClient EMS platform, according to threat intelligence company Defused. Tracked as CVE-2026-21643, this SQL injection vulnerability allows unauthenticated threat actors to execute arbitrary code or commands on unpatched systems through low-complexity attacks targeting the FortiClientEMS GUI (web interface) via maliciously crafted HTTP requests. "Fortinet Forticlient EMS CVE-2026-21643 - currently marked as not exploited on CISA and other Known Exploited Vulnerabilities (KEV) lists - has seen first exploitation already 4 days ago according to our data," Defused warned over the weekend."
        https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/
        https://securityaffairs.com/190158/security/critical-fortinet-forticlient-ems-flaw-exploited-for-remote-code-execution.html
        https://www.helpnetsecurity.com/2026/03/30/forticlient-ems-cve-2026-21643-reported-exploitation/
      • Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained In Warfare
        "As they fled an Iranian missile strike, some Israelis with Android phones received a text offering a link to real-time information about bomb shelters. But instead of a helpful app, the link downloaded spyware giving hackers access to the device’s camera, location and all its data. The operation, attributed to Iran, showed sophisticated coordination and is just the latest tactic in a cyber conflict that pits the U.S. and Israel against Iran and its digital proxies. As Iran and its supporters seek to use their cyber capabilities to compensate for their military disadvantages, they are demonstrating how disinformation, artificial intelligence and hacking are now ingrained in modern warfare."
        https://www.securityweek.com/hacked-hospitals-hidden-spyware-iran-conflict-shows-how-digital-fight-is-ingrained-in-warfare/
      • Under CTRL: Dissecting a Previously Undocumented Russian .Net Access Framework
        "“CTRL” is a custom-built .NET remote access toolkit developed by a Russian-speaking operator and distributed via weaponized LNK files disguised as private key folders. The toolkit was discovered through Censys open directory scanning, which identified an exposed payload hosting directory at hui228.ru:82/hosted/ containing three .NET executables. Together, the executables provide encrypted payload loading, credential harvesting via a polished Windows Hello phishing UI, keylogging, RDP session hijacking, and reverse proxy tunneling through FRP."
        https://censys.com/blog/under-ctrl-dissecting-a-previously-undocumented-russian-net-access-framework/
        https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html
      • RoadK1ll: A WebSocket Based Pivoting Implant
        "During analysis of a recent intrusion, the Blackpoint Response Operations Center (BROC) identified a Node.js based implant deployed within the compromised environment which the BROC is tracking as RoadK1ll. At a glance, it might not look like your typical piece of malware, as there are no large command sets or obvious operator tooling built in. Instead, RoadK1ll is built to solve a very specific problem for the attacker: maintaining reliable, flexible access into an internal network after initial compromise. RoadK1ll is a Node.js-based reverse tunneling implant that establishes an outbound WebSocket connection to attacker-controlled infrastructure and uses that connection to broker TCP traffic on demand. Unlike a traditional remote access trojan, it carries no large command set and requires no inbound listener on the victim host."
        https://blackpointcyber.com/blog/roadk1ll-a-websocket-based-pivoting-implant/
        https://www.bleepingcomputer.com/news/security/new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks/
      • One Click Away: Inside a LinkedIn Phishing Attack
        "You’re checking your inbox like any other day when a LinkedIn notification pops up, hinting at a promising opportunity. It feels exciting and completely normal to click. Yet with that single action, your login credentials may already be slipping into the hands of a cybercriminal. This is the danger hiding in plain sight: phishing emails that look so ordinary they disarm even the most cautious users. A moment of curiosity or urgency is all it takes for an attack to succeed. This is consistent with a recent trend observed by the Cofense Phishing Defense Center (PDC). The analysts in the PDC have identified a phishing campaign that uses LinkedIn message notifications to lure users into logging in to view a supposed opportunity, ultimately disguising itself to steal users’ credentials."
        https://cofense.com/blog/one-click-away-inside-a-linkedin-phishing-attack
      • DeepLoad Malware Pairs ClickFix Delivery With AI-Generated Evasion
        "ReliaQuest has observed the new “DeepLoad” malware being exploited in enterprise environments. What sets this campaign apart isn’t any single stand-out technique, but how the entire attack chain was engineered to defeat the controls most organizations rely on, turning one user action into persistent, credential-stealing access. In this report, we provide a full attack chain for DeepLoad, showing that newly surfaced threats can arrive operationally mature. Based on what we’ve observed, organizations must prioritize behavioral, runtime detection—not file-based scanning—to catch this campaign (and similar ones) early."
        https://reliaquest.com/blog/threat-spotlight-deepload-malware-pairs-clickfix-delivery-with-ai-generated-evasion/
        https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
        https://www.darkreading.com/cyberattacks-data-breaches/ai-powered-deepload-steals-credentials-evades-detection
        https://cyberscoop.com/deepload-ai-malware-obfuscation-at-every-stage-reliaquest/
        https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/
      • Professional Networks Under Attack: Vietnam-Linked Actors Deploy PXA Stealer In Global Infostealer Campaign
        "CRIL has been actively tracking a surge in PXA Stealer activity deployed in a sophisticated, financially motivated threat campaign attributed with high confidence to a Vietnam-based cybercriminal group. The primary targets in this campaign are job seekers across India, Bangladesh, the Netherlands, Sweden, and the United States. Threat actors leverage LinkedIn as their primary initial access vector, distributing fraudulent recruitment messages via compromised accounts that impersonate legitimate job opportunities."
        https://cyble.com/blog/professional-networks-under-attack-by-infostealer/

      Breaches/Hacks/Leaks

      • Healthcare Tech Firm CareCloud Says Hackers Stole Patient Data
        "Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours. The New Jersey-based company said in a filing with the U.S. Securities and Exchange Commission (SEC) that the intrusion occurred on March 16 when hackers accessed its IT infrastructure. “On March 16, 2026, CareCloud, Inc. experienced a temporary network disruption in its CareCloud Health division that partially impacted the functionality and data access to 1 of its 6 electronic health record environments for approximately 8 hours until the Company fully restored all functionality and data access during that evening,” the company says in the SEC filing."
        https://www.bleepingcomputer.com/news/security/healthcare-tech-firm-carecloud-says-hackers-stole-patient-data/
        https://therecord.media/carecloud-hack-data-breach-sec
        https://www.securityweek.com/healthcare-it-platform-carecloud-probing-potential-data-breach/
      • Dark Web Market Lists Alleged 375TB Lockheed Martin Data For $600M
        "Hackers are claiming to have stolen a trove of data belonging to Lockheed Martin, the world’s largest defense contractor and an American aerospace company. They are now selling it on the dark web. The situation began on March 26, 2026, when a Telegram account linked to a dark web marketplace known as Threat Market, which posts in both Russian and English, claimed it had been approached by a group described as “APT IRAN.” According to the post, the group requested infrastructure support to sell what was described as 375 terabytes of data allegedly taken from Lockheed Martin."
        https://hackread.com/dark-web-market-375tb-lockheed-martin-data/

      General News

      • Why Risk Alone Doesn’t Get You To Yes
        "I have been in security rooms for years, from military operations centers to corporate boardrooms. In all those years I can tell you that the hardest mission that most security leaders will face is not identifying a threat, but getting someone to act on it. We’re trained to see exposure before they are identified by others. We continually assess likely threats, evaluate impact, and design controls to prevent disruption long before it reaches operations or shareholders. That’s the job. But here’s what I’ve watched happen, over and over again: a security leader walks into a meeting with a technically sound brief, well-supported recommendations, and a clear picture of the risk. The room nods. The CFO asks for more context. The conversation gets tabled for next quarter."
        https://www.helpnetsecurity.com/2026/03/30/cyber-security-executive-buy-in/
      • Breaking Out: Can AI Agents Escape Their Sandboxes?
        "Container sandboxes are part of routine AI agent testing and deployment. Agents use them to run code, edit files, and interact with system resources without direct access to the host. The SandboxEscapeBench benchmark, developed by researchers at the University of Oxford and the AI Security Institute, evaluates whether an agent with shell access can escape a container and reach the host system."
        https://www.helpnetsecurity.com/2026/03/30/ai-agents-container-breakout-capabilities-research/
        https://arxiv.org/pdf/2603.02277
      • Don’t Count On Government Guidance After a Smart Home Breach
        "People are filling their homes with internet-connected cameras, speakers, locks, and routers. When one of those devices is compromised, the next steps are often unclear. Researchers reviewing government cybersecurity advice in 11 countries found that most guidance focuses on prevention, leaving households with limited support after a breach. The analysis covers Australia, Austria, Canada, Finland, France, Germany, Japan, New Zealand, Singapore, the United Kingdom, and the United States."
        https://www.helpnetsecurity.com/2026/03/30/smart-home-cybersecurity-recovery-guidance-gap/
      • Iranian Cyberthreats Test US Infrastructure Defenses
        "Warnings from Iranian-linked hacking groups threatening "irreparable damages" to U.S. water systems are raising concerns across the federal cybersecurity community - as officials weigh both the credibility of the threat and the government's ability to respond amid ongoing cyber resource strains. The reported threat involves a coalition of pro-Iranian hacking groups signaling potential retaliation against U.S. critical infrastructure - including water and wastewater systems - if geopolitical tensions continue to escalate."
      • **https://www.bankinfosecurity.com/iranian-cyberthreats-test-us-infrastructure-defenses-a-31299
      • Hybrid Warfare 2026: When Cyber Operations And Kinetic Attacks Converge**
        "In 2026, hybrid warfare is no longer a theoretical construct discussed in policy circles; it is shaping geopolitical conflict in real time. The convergence of cyber warfare and kinetic attacks has transformed how nations project power, blending missiles, malware, and misinformation into unified campaigns. What distinguishes modern hybrid warfare from earlier conflicts is not just the presence of digital operations, but their synchronization with physical strikes to produce layered, systemic disruption. Nowhere is this more evident than in the Middle East, where escalating tensions have turned the region into a proving ground for cyber-physical warfare."
        https://cyble.com/blog/hybrid-warfare-2026-cyber-kinetic-threats/
      • Manufacturing And Healthcare Share Struggles With Passwords
        "Two disparate industries, manufacturing and healthcare, share several weaknesses that lead to significant security gaps, especially in password hygiene. To address in the short term will require shifting security culture mindsets. The industries are two of the biggest ransomware targets. Black Kite's "2025 Manufacturing Research Report" found that manufacturing was the No. 1 target for ransomware groups four years in a row."
        https://www.darkreading.com/cyber-risk/manufacturing-and-healthcare-share-struggles-with-passwords
      • TeamPCP’s Attack Spree Slows, But Threat Escalates With Ransomware Pivot
        "TeamPCP’s destructive run of supply chain breaches has stopped, for now: it has been three days since the group published malicious versions of Telnyx’s SDK on PyPI, and there haven’t been reports of new open-source project compromises."
        https://www.helpnetsecurity.com/2026/03/30/teampcp-supply-chain-attacks-ransomware/
      • Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control
        "Business efficiency demands maximum use of AI assistance, but where policy as code is concerned, AI can introduce serious policy flaws. The shift to policy as code for organizational security, compliance, and operational rules, is being followed by increased use of LLM artificial intelligence to help produce the raw code. This makes sense. A primary purpose of AI within business is to improve human efficiency, and writing policy in languages like Rego or Cedar is not easy. AI is increasingly used to streamline the process."
        https://www.securityweek.com/silent-drift-how-llms-are-quietly-breaking-organizational-access-control/
      • Audit Finds Application Security Issues Are Worse Than Ever
        "An audit of 947 commercial codebases spanning 17 industries finds the number of vulnerabilities inside applications has surged a startling 107% over the past year. Conducted by Black Duck Software, the audit also finds there are now, on average, 581 vulnerabilities per codebase. Alas, many of these vulnerabilities can be traced back to open-source software components that create dependencies in code bases that are challenging to fix because the code is managed by an independent maintainer that might not yet have created a patch to address the issue."
        https://blog.barracuda.com/2026/03/30/audit-application-security-issues-open-source

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) c27cb7f8-dbd9-44a1-9905-f057f90bf706-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เพิ่มช่องโหว่ที่ถูกใช้โจมตี 1 รายการลงในแคตตาล็อก

      เมื่อวันที่ 27 มีนาคม 2026 Cybersecurity and Infrastructure Security Agency (CISA) ได้เพิ่มช่องโหว่ใหม่ 1 รายการลงในแคตตาล็อก Known Exploited Vulnerabilities (KEV) จากหลักฐานที่พบว่ามีการโจมตีใช้งานจริงแล้ว ดังนี้

      • CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability

      ทาง CISA จะปรับปรุงและเพิ่มช่องโหว่ใหม่เข้าสู่แคตตาล็อก KEV อย่างต่อเนื่อง เพื่อให้ครอบคลุมความเสี่ยงที่ตรวจพบจริงในปัจจุบันและอนาคต

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog
      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand e4fdc541-b304-47b3-861b-86c66308224a-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 30 March 2026

      Vulnerabilities

      • LangDrained: 3 Paths To Your Data Through LangChain, The World’s Most Popular AI Framework
        "When we think about AI security, our minds often jump to futuristic threats: rogue autonomous agents, complex model jailbreaks, or clever prompt injections. We imagine attackers outsmarting the AI itself. But over the past few months, our research team has discovered that the biggest threat to your enterprise AI data might not be as complex as you think. In fact, it hides in the invisible, foundational plumbing that connects your AI to your business. This layer is vulnerable to some of the oldest tricks in the hacker playbook."
        https://www.cyera.com/research/langdrained-3-paths-to-your-data-through-the-worlds-most-popular-ai-framework
        https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html
      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog
        https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html
        https://securityaffairs.com/190076/uncategorized/u-s-cisa-adds-a-flaw-in-f5-big-ip-amp-to-its-known-exploited-vulnerabilities-catalog.html
        https://www.helpnetsecurity.com/2026/03/28/big-ip-apm-vulnerability-cve-2025-53521-exploited/
      • Open Sesame: How a Fail-Open Bug In Open VSX's New Scanner Let Malware Walk Right In
        "‍Open VSX, the extension marketplace behind Cursor, Windsurf, and the broader VS Code fork ecosystem, recently rolled out a pre-publish scanning pipeline. That's a big deal, and the right move. Malware detection, secret scanning, binary analysis, name-squatting prevention. Exactly the kind of infrastructure the ecosystem desperately needed. Here's the thing. The pipeline had a single boolean return value that meant both "no scanners are configured" and "all scanners failed to run." The caller couldn't tell the difference. So when scanners failed under load, Open VSX treated it as "nothing to scan for" and waved the extension right through."
        https://www.koi.ai/blog/open-sesame-how-a-fail-open-bug-in-open-vsxs-new-scanner-let-malware-walk-right-in
        https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html
      • 800,000 WordPress Sites Affected By Arbitrary File Read Vulnerability In Smart Slider 3 WordPress Plugin
        "On February 23, 2026, we received a submission for an Arbitrary File Read vulnerability in Smart Slider 3, a WordPress plugin with an estimated more than 800,000 active installations. This vulnerability makes it possible for an authenticated attacker, with subscriber-level permissions or higher, to read arbitrary files on the server, which may contain sensitive information. Props to Dmitrii Ignatyev who discovered and responsibly reported this vulnerability through the Wordfence Bug Bounty Program. This researcher earned a bounty of $2,208.00 for this discovery."
        https://www.wordfence.com/blog/2026/03/800000-wordpress-sites-affected-by-arbitrary-file-read-vulnerability-in-smart-slider-3-wordpress-plugin/
        https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/

      Malware

      • Popular Telnyx Package Compromised On PyPI By TeamPCP
        "This morning's telnyx compromise is the latest move in what is now a weeks-long TeamPCP supply chain campaign crossing multiple ecosystems. Trivy. Checkmarx. LiteLLM. And now Telnyx on PyPI, uploaded hours ago at 03:51 UTC on March 27. The pattern is consistent: steal credentials from a trusted security tool, use those credentials to push malicious versions of whatever that tool had access to, collect whatever's running in the next environment, repeat."
        https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm
        https://socket.dev/blog/telnyx-python-sdk-compromised
        https://www.endorlabs.com/learn/teampcp-strikes-again-telnyx-compromised-three-days-after-litellm
        https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html
        https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/
        https://www.infosecurity-magazine.com/news/teampcp-targets-telnyx-pypi-package/
        https://www.helpnetsecurity.com/2026/03/27/teampcp-telnyx-supply-chain-compromise/
      • Dutch Police Discloses Security Breach After Phishing Attack
        "The Dutch National Police (Politie) says a security breach resulting from a successful phishing attack has had a limited impact and hasn't affected citizens' data. It also stated that the incident is still under investigation by the agency's security experts and that the attackers' access to compromised systems has been blocked. "The police have been the target of a phishing attack. The police's Security Operations Center detected the incident very quickly and immediately blocked access," the police said in a Wednesday press release."
        https://www.bleepingcomputer.com/news/security/dutch-police-discloses-security-breach-after-phishing-attack/
      • Widespread GitHub Campaign Uses Fake VS Code Security Alerts To Deliver Malware
        "A large-scale phishing campaign is targeting developers directly inside GitHub, using fake Visual Studio Code security alerts posted through Discussions to trick users into installing malicious software. Here's one example, saved to the Internet Archive, as we assume these will quickly be taken down:"
        https://socket.dev/blog/widespread-github-campaign-uses-fake-vs-code-security-alerts-to-deliver-malware
        https://www.bleepingcomputer.com/news/security/fake-vs-code-alerts-on-github-spread-malware-to-developers/
      • China’s APT41 And The Expanding Enterprise Attack Surface: What Security Teams Must Prepare For
        "The modern enterprise attack surface is no longer confined to corporate networks and endpoints; it now stretches across cloud workloads, supply chains, remote devices, and even operational technology environments. Within this fragmented landscape, the activities of the APT41 threat group stand out as a signal of how hackers and adversaries are adapting. Known for blending state-sponsored espionage with financially motivated operations, APT41 represents a dual-purpose threat model that security teams can no longer afford to treat as an edge case."
        https://cyble.com/blog/apt41-enterprise-attack-surface-cyber-risk/
      • New BianLian Ransomware Activity Detected: SVG Phishing Campaign Targeting Venezuelan Companies
        "WatchGuard telemetry identified some malicious files being downloaded by victims, and almost all of them originated in Venezuela, indicating a possible malicious campaign targeting companies in this country. The malicious files are distributed via phishing emails that have a SVG file with a filename in Spanish, generally indicating invoices, receipts, or budgets. SVG stands for Scalable Vector Graphics, a file format for two-dimensional vector images. It allows images to be scaled without loss of quality, making it ideal for web graphics like logos and illustrations."
        https://www.watchguard.com/wgrd-security-hub/secplicity-blog/new-bianlian-ransomware-activity-detected-svg-phishing-campaign
        https://hackread.com/bianlian-ransomware-fake-invoice-svg-images-attacks/
      • Bogus Avast Website Fakes Virus Scan, Installs Venom Stealer Instead
        "A fake website impersonating Avast antivirus is tricking people into infecting their own computers. The site looks legitimate, runs what appears to be a virus scan, and claims your system is full of threats. But the results are fake: when you’re prompted to “fix” the problem, the download you’re given is actually Venom Stealer—a type of malware designed to steal passwords, session cookies, and cryptocurrency wallet data. This is a classic scare-and-fix scam: create panic, then offer a solution. In this case, the “solution” abuses the trusted Avast brand to deliver the attack."
        https://www.malwarebytes.com/blog/threat-intel/2026/03/bogus-avast-website-fakes-virus-scan-installs-venom-stealer-instead
      • NICKEL ALLEY Strategy: Fake It ‘til You Make It
        "Counter Threat Unit™ (CTU) researchers continue to investigate trends in Contagious Interview campaign activity conducted by NICKEL ALLEY, a threat group operating on behalf of the North Korean government. The group notoriously targets professionals in the technology sector by advertising fake job opportunities, deceiving prospective candidates through a fake job interview process, and ultimately delivering malware. In targeted attacks, NICKEL ALLEY often creates a fake LinkedIn company page to build credibility and maintains a coordinating GitHub account for malware delivery. In some instances, the threat actors have used the popular ‘ClickFix’ tactic to deliver malware via fake job skills assessment tasks. Additionally, the group has conducted opportunistic attacks by compromising npm package repositories and establishing typosquatted npm packages. Figure 1 highlights NICKEL ALLEY’s three areas of focus."
        https://www.sophos.com/en-us/blog/nickel-alley-strategy-fake-it-til-you-make-it
      • Citrix NetScaler Under Active Recon For CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
        "A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The vulnerability, CVE-2026-3055 (CVSS score: 9.3), refers to a case of insufficient input validation leading to memory overread, which an attacker could exploit to leak potentially sensitive information. Per Citrix, successful exploitation of the flaw hinges on the appliance being configured as a SAML Identity Provider (SAML IDP)."
        https://thehackernews.com/2026/03/citrix-netscaler-under-active-recon-for.html
        https://securityaffairs.com/190131/hacking/urgent-alert-netscaler-bug-cve-2026-3055-probed-by-attackers-could-leak-sensitive-data.html
      • TA446 Deploys DarkSword iOS Exploit Kit In Targeted Spear-Phishing Campaign
        "Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attributed with high confidence to the Russian state-sponsored threat group known as TA446, which is also tracked by the broader cybersecurity community under the monikers Callisto, COLDRIVER, and Star Blizzard (formerly SEABORGIUM). It's assessed to be affiliated with Russia's Federal Security Service (FSB). The hacking group is known for spear-phishing campaigns aimed at harvesting credentials from targets of interest. However, attacks mounted by the threat actor over the past year have targeted victims' WhatsApp accounts, as well as leveraged various custom malware families to steal sensitive data."
        https://thehackernews.com/2026/03/ta446-deploys-leaked-darksword-ios.html
      • A Cunning Predator: How Silver Fox Preys On Japanese Firms This Tax Season
        "Japan has entered its annual tax filing and organizational change season, a period when companies generate a high volume of legitimate financial and HR‑related communications. A threat actor known as Silver Fox is actively exploiting this busy period by conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses. The ongoing campaign uses convincing phishing lures related to tax compliance violations, salary adjustments, job position changes, and employee stock ownership plans. All emails share the same goal – trick the recipients into opening malicious links or attachments. As employees actually expect to receive emails about these subjects this time of year, they’re more likely to trust and act on such messages without a second thought. Needless to say, this significantly increases the risk of compromise."
        https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/

      Breaches/Hacks/Leaks

      • European Commission Investigating Breach After Amazon Cloud Account Hack
        "The European Commission, the European Union's main executive body, is investigating a security breach after a threat actor gained access to the Commission's Amazon cloud environment. Although the EU's executive cabinet has yet to disclose the incident publicly, BleepingComputer has learned that the breach affected at least one of the Commission's AWS (Amazon Web Services) accounts. "AWS did not experience a security event, and our services operated as designed," an AWS spokesperson told BleepingComputer after publishing time."
        https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-account-hack/
        https://securityaffairs.com/190067/data-breach/the-european-commission-confirmed-a-cyberattack-affecting-part-of-its-cloud-systems.html
        https://hackread.com/shinyhunters-350gb-data-breach-european-commission/
        https://securityaffairs.com/190095/data-breach/shinyhunters-claims-the-hack-of-the-european-commission.html
      • ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database
        "The infamous ShinyHunters hacker group has stepped away from BreachForums, calling it a “waste of time” after the FBI seizure in October 2025. At the same time, the group has released an updated database affecting more than 300,000 BreachForums users. Early checks indicate that even recently created accounts are included in the leak. Analysis of the leaked data by Hackread.com confirms that it contains full account profiles, not just basic user credentials."
        https://hackread.com/shinyhunters-breachforums-leak-300000-user-database/
      • Pro-Iranian Hacking Group Claims Credit For Hack Of FBI Director Kash Patel’s Personal Account
        "A pro-Iranian hacking group claimed Friday to have hacked an account of FBI Director Kash Patel and has posted online what appear to be years-old photographs of him, along with a work resume and other personal documents. Many of those records appeared to be more than a decade old. “Kash Patel, the current head of the FBI, who once saw his name displayed with pride on the agency’s headquarters, will now find his name among the list of successfully hacked victims,” said a message posted Friday from the group Handala."
        https://www.securityweek.com/pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patels-personal-account/
        https://therecord.media/fbi-confirms-theft-of-directors-personal-emails-iran-group
        https://thehackernews.com/2026/03/iran-linked-hackers-breach-fbi.html
        https://www.bleepingcomputer.com/news/security/fbi-confirms-hack-of-director-patels-personal-email-inbox/
        https://cyberscoop.com/handala-hackers-target-fbi-director-kash-patel-email/
        https://www.bankinfosecurity.com/handala-hacks-fbi-director-kash-patels-personal-email-a-31244
        https://hackread.com/iran-handala-hackers-fbi-chief-kash-patel-gmail-breach/
        https://securityaffairs.com/190088/intelligence/iran-linked-group-handala-hacked-fbi-director-kash-patels-personal-email-account.html

      General News

      • Security Boffins Scoured The Web And Found Hundreds Of Valid API Keys
        "Computer security boffins have conducted an analysis of 10 million websites and found almost 2,000 API credentials strewn across 10,000 webpages. The researchers detail their findings in a preprint paper titled "Keys on Doormats: Exposed API Credentials on the Web," and say they conducted the study because much of the attention on exposed credentials has focused on scouring code repositories and source code. They argue that dynamic analysis of production websites is essential to understand the scope of the problem."
        https://www.theregister.com/2026/03/27/security_boffins_harvest_bumper_crop/
        https://arxiv.org/abs/2603.12498
      • Security Leaders Say The Next Two Years Are Going To Be ‘insane’
        "Every RSA Conference has its buzzwords. Cloud. Ransomware. Zero trust. Plastered across the 87-acre Moscone Center complex on every booth, banner and bar. This year was AI, with vendors pitching AI-powered solutions to every security problem imaginable. But 2026 stood out for a different reason: Industry leaders spent the conference warning about disruption from the very technology everyone was selling."
        https://cyberscoop.com/ai-cyberattacks-two-years-insane-vulnerabilities-kevin-mandia-alex-stamos-morgan-adamski-rsac-2026/
      • Wartime Usage Of Compromised IP Cameras Highlight Their Danger
        "Compromised Internet-connected cameras — once the fodder of botnet operators and online voyeurs — have become an important military asset in recent conflicts, with Russian and Ukrainian forces hacking cameras to gather intelligence on the other side, Iran using compromised devices for targeted strikes, and a joint US-Israeli mission reportedly relying on connected cameras for the successful strike on Iran's leader. In the latest incident, Israel and the US reportedly hijacked Iran's network of traffic cameras, which the government used to surveil protesters and to track the movements of Iranian leader Ayatollah Ali Khamenei prior to targeting him with an air strike, killing him on Feb. 28, according to reports this month by the Financial Times and the Associated Press. Following that attack, Iran responded by increasing its attempts to gain eyes in Israel, Qatar, Bahrain, Kuwait, the United Arab Emirates, and Cyprus, according to a report from Israeli cybersecurity firm Check Point Software."
        https://www.darkreading.com/cyber-risk/wartime-usage-of-compromised-ip-cameras-highlight-their-danger
      • Disrupting Cybercrime Networks At Scale Requires Sustained Global Collaboration
        "Cybercrime today operates less like isolated criminal activity and more like a globalized digital economy in which specialized actors provide services, infrastructure, and expertise that allow attacks to scale efficiently across borders. Ransomware groups rely on initial access brokers to obtain footholds into enterprise networks, malware developers package tools for sale in underground marketplaces, and money-laundering networks specialize in converting illicit gains into financial assets that can move through global financial systems. Taken together, these roles form an industrialized criminal supply chain that mirrors many characteristics of legitimate digital economies. More, the rise of shadow agents is poised to accelerate growth of the cybercriminal ecosystem."
        https://www.fortinet.com/blog/industry-trends/disrupting-cybercrime-networks-at-scale-requires-sustained-global-collaboration
      • Quantum Frontiers May Be Closer Than They Appear
        "Google’s introducing a 2029 timeline to secure the quantum era with post-quantum cryptography (PQC) migration. Last month, we called to secure the quantum era before a future quantum computer can break current encryption. This new timeline reflects migration needs for the PQC era in light of progress on quantum computing hardware development, quantum error correction, and quantum factoring resource estimates. As a pioneer in both quantum and PQC, it’s our responsibility to lead by example and share an ambitious timeline. By doing this, we hope to provide the clarity and urgency needed to accelerate digital transitions not only for Google, but also across the industry."
        https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/
        https://www.darkreading.com/application-security/google-2029-deadline-quantum-safe-cryptography
        https://cyberscoop.com/google-moves-post-quantum-encryption-timeline-to-2029/
        https://www.infosecurity-magazine.com/news/quantum-encryption-q-day-closer/
        https://www.bankinfosecurity.com/googles-2029-quantum-deadline-wake-up-call-a-31247
        https://hackread.com/google-2029-deadline-quantum-computers-encryption/
        https://www.helpnetsecurity.com/2026/03/26/google-pqc-migration-timeline-2029/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 11b9d7d7-c613-4a97-a567-e8ef3a7ff90f-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 27 March 2026

      Energy Sector

      • The Energy Sector’s Ransomware Nightmare: Why Critical Infrastructure Can’t Catch a Break
        "Let’s talk about the sector that keeps our lights on, water running, and industries humming—and why it’s become ransomware’s favorite target. In 2025, the global energy and utilities sector faced 187 confirmed ransomware attacks. Not attempts. Confirmed, successful intrusions where attackers locked systems, stole data, and demanded payment. And that’s just what we know about. If you think that number sounds alarming, you’re paying attention."
        https://cyble.com/blog/energy-sector-ransomware-attack-report/

      Industrial Sector

      • WAGO GmbH & Co. KG Industrial Managed Switches
        "An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-085-01
      • PTC Windchill Product Lifecycle Management
        "Successful exploitation of this vulnerability could allow an attacker to achieve remote code execution."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-085-03
      • OpenCode Systems OC Messaging And USSD Gateway
        "Successful exploitation of this vulnerability could allow an authenticated low-privileged user to gain access to SMS messages outside of their authorized tenant scope via a crafted company or tenant identifier parameter."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-085-02

      Vulnerabilities

      • BIND Updates Patch High-Severity Vulnerabilities
        "Internet Systems Consortium (ISC) on Wednesday rolled out a fresh round of BIND 9 updates to resolve four vulnerabilities, including two high-severity bugs. Tracked as CVE-2026-3104, the first high-severity flaw is described as a memory leak issue impacting code preparing DNSSEC proofs of non-existence. The security defect can be exploited via crafted domains to cause a memory leak in BIND resolvers. Authoritative servers may not be impacted, ISC notes in its advisory."
        https://www.securityweek.com/bind-updates-patch-high-severity-vulnerabilities-2/
      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2026-33634 Aqua Security Trivy Embedded Malicious Code Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/03/26/cisa-adds-one-known-exploited-vulnerability-catalog
      • TP-Link, Canva, HikVision Vulnerabilities
        "Cisco Talos’ Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy. For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website."
        https://blog.talosintelligence.com/tp-link-canva-hikvision-vulnerabilities/
      • Cisco Patches Multiple Vulnerabilities In IOS Software
        "Cisco on Wednesday announced patches for a dozen high- and medium-severity vulnerabilities in IOS and IOS XE, most of which could be exploited to cause denial-of-service (DoS) conditions. The patches were rolled out as part of Cisco’s semiannual IOS and IOS XE security advisory bundle. While none of the bugs appear to have been exploited in the wild, technical information on four of them has been published. The publicly disclosed issues, tracked as CVE-2026-20110, CVE-2026-20112, CVE-2026-20113, and CVE-2026-20114, are medium-severity defects affecting Cisco Catalyst 9300 Series switches."
        https://www.securityweek.com/cisco-patches-multiple-vulnerabilities-in-ios-software/

      Malware

      • BPFdoor In Telecom Networks: Sleeper Cells In The Backbone
        "A months-long investigation by Rapid7 Labs has uncovered evidence of an advanced China-nexus threat actor, Red Menshen, placing some of the stealthiest digital sleeper cells the team has ever seen in telecommunications networks. The goal of these campaigns is to carry out high-level espionage, including against government networks. Telecommunications networks are the central nervous system of the digital world. They carry government communications, coordinate critical industries, and underpin the digital identities of billions of people. When these networks are compromised, the consequences extend far beyond a single provider or region. That level of access is, and should be, a national concern as it compromises not just one company or organization, but the communications of entire populations. Over the past decade, telecom intrusions have been reported across multiple countries. In several cases, state-backed actors accessed call detail records, monitored sensitive communications, and exploited trusted interconnections between operators. While these incidents often appear isolated, a broader pattern is emerging."
        https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/
        https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html
        https://www.securityweek.com/chinese-hackers-caught-deep-within-telecom-backbone-infrastructure/
        https://www.helpnetsecurity.com/2026/03/26/telecom-bpfdoor-detection-script/
      • Attackers Are Now Targeting Business TikTok Accounts Using Session-Stealing Phishing Kits
        "We recently detected and blocked a new style of phishing page targeting TikTok for Business accounts — used by company marketing teams to manage ad campaigns. On closer analysis, we identified a cluster of linked pages featuring both TikTok themes, and Google themed “Schedule a Call” imitation pages, similar to a campaign reported late last year, suggesting a continuity of this previous campaign."
        https://pushsecurity.com/blog/tiktok-phishing
        https://www.bleepingcomputer.com/news/security/tiktok-for-business-accounts-targeted-in-new-phishing-campaign/
      • Coruna: The Framework Used In Operation Triangulation
        "On March 4, 2026, Google and iVerify published reports about a highly sophisticated exploit kit targeting Apple iPhone devices. According to Google, the exploit kit was first discovered in targeted attacks conducted by a customer of an unnamed surveillance vendor. It was later used by other attackers in watering-hole attacks in Ukraine and in financially motivated attacks in China. Additionally, researchers discovered an instance with the debug version of the exploit kit, which revealed the internal names of the exploits and the framework name used by its developers — Coruna. Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first discovered as zero-days used in Operation Triangulation."
        https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
        https://thehackernews.com/2026/03/coruna-ios-kit-reuses-2023.html
        https://www.bleepingcomputer.com/news/security/coruna-ios-exploit-framework-linked-to-triangulation-attacks/
        https://securityaffairs.com/190010/security/coruna-exploit-reveals-evolution-of-triangulation-ios-exploitation-framework.html
      • Xiaomi Phishing Attempt - Red Flags You Can't Afford To Ignore
        "Xiaomi, founded in 2010, has grown into a global technology brand known for delivering powerful smartphones and smart devices at competitive prices. With a strong presence in China, India, Southeast Asia, and parts of Europe, the company has built a loyal user base by combining innovation, sleek design, and value-driven technology. Because of its massive global footprint, Xiaomi accounts and services can become attractive targets for cybercriminals. Threat actors often exploit the company’s popularity by crafting phishing emails that appear to come from trusted Xiaomi sources such as HR, IT support, or account services. These emails are designed to look legitimate and often create a sense of urgency, encouraging recipients to click on malicious links before they have time to verify the message."
        https://cofense.com/blog/xiaomi-phishing-attempt-red-flags-you-can-t-afford-to-ignore
      • Quish Splash - When The QR Code Is The Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter.
        "Over a 20-day period, a threat actor identified by 7AI conducted a multi-wave QR code phishing campaign against a large enterprise, while targeting many others in parallel. Tracking data suggests the campaign scaled significantly, with over 1.6 million emails sent between waves to other organizations. In this environment, 33 emails were sent to 32 unique recipients across three waves. Of those emails, 28 were delivered directly to inboxes. Zero were blocked, and no automated remediation occurred."
        https://blog.7ai.com/quish-splash-when-the-qr-code-is-the-weapon-a-multi-wave-phishing-campaign-that-slipped-past-every-filter
        https://hackread.com/quish-splash-qr-code-phishing-hits-users/
      • From Phishing To Exfiltration: A Deep Dive Into PXA Stealer
        "CyberProof MDR analysts and Threat Researchers have identified a significant surge in PXA Stealer activity targeting global financial institutions during Q1 2026. These campaigns primarily leverage phishing emails containing malicious URLs that trigger the download of compromised ZIP attachments. Threat actors have demonstrated high levels of adaptability, utilizing diverse lures ranging from curriculum vitae and Adobe Photoshop installers to tax forms and legal documentation. This opportunistic approach highlights the attackers’ ability to target a broad spectrum of victims. Following the 2025 takedowns of major infostealers such as Lumma, Rhadamanthys, and RedLine, CyberProof observes that PXA Stealer activity has filled the resulting vacuum, seeing an estimated growth of 8-10%."
        https://www.cyberproof.com/blog/a-deep-dive-into-pxa-stealer/
        https://hackread.com/financial-firms-rise-pxa-stealer-attacks/
      • Sonatype Discovers Two Malicious Npm Packages
        "Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two malicious npm packages — sbx-mask and touch-adv — designed to exfiltrate secrets from victims' computers. The evidence strongly suggests account takeover of a legitimate publisher, rather than intentional malicious activity. Sonatype did not observe any indication that these were test packages, though touch-adv has now been removed. Hijacked publisher accounts are particularly concerning as, over time, maintainers build trust with the users of their components. Attackers aim to take advantage of that trust in order to steal valuable, or profitable, information."
        https://www.sonatype.com/blog/sonatype-discovers-two-malicious-npm-packages
        https://hackread.com/suspected-hijacked-developer-accounts-npm-malware/
      • Infiniti Stealer: a New MacOS Infostealer Using ClickFix And Python/Nuitka
        "A previously undocumented macOS infostealer has surfaced during our routine threat hunting. We initially tracked it as NukeChain, but shortly before publication, the malware’s operator panel became publicly visible, revealing its real name: Infiniti Stealer. This malware is designed to steal sensitive data from Macs. It spreads through a fake CAPTCHA page that tricks users into running a command themselves: a technique known as ClickFix. Instead of exploiting a bug, it relies on social engineering."
        https://www.malwarebytes.com/blog/threat-intel/2026/03/infiniti-stealer-a-new-macos-infostealer-using-clickfix-and-python-nuitka
      • ShadowPrompt: How Any Website Could Have Hijacked Claude's Chrome Extension
        "Anthropic's Claude Chrome Extension has over 3 million users. It's an AI assistant in your browser sidebar that can navigate pages, read content, execute JavaScript, and interact with websites on your behalf. We found a vulnerability that allowed any website to silently inject prompts into that assistant as if the user wrote them. No clicks, no permission prompts. Just visit a page, and an attacker completely controls your browser."
        https://www.koi.ai/blog/shadowprompt-how-any-website-could-have-hijacked-anthropic-claude-chrome-extension
        https://thehackernews.com/2026/03/claude-extension-flaw-enabled-zero.html
      • Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies With Custom Ransomware
        "A pro-Ukrainian hacker group known as Bearlyfy has carried out more than 70 cyberattacks against Russian companies over the past year and is now escalating its campaign with newly developed ransomware tools, researchers have found. Bearlyfy first appeared in January 2025 and initially targeted smaller Russian businesses. In its early operations, the attackers showed limited skills and demanded modest ransoms of only a few thousand dollars, according to a report by the Russian cybersecurity firm F6. “Within a year this group has become a real nightmare for large Russian businesses,” researchers said, adding that the group’s ransom demands in recent attacks have grown to hundreds of thousands of dollars."
        https://therecord.media/ransomware-ukraine-russia-bearlyfy
      • Indian Government Probes CCTV Espionage Operation Linked To Pakistan
        "Indian authorities have reportedly ordered an audit of the nation’s CCTV cameras, after police uncovered what they claim was a Pakistan-backed surveillance operation. This story begins on March 14th, when police in Ghaziabad – a city adjacent to India’s capital Delhi – announced they had arrested suspects after finding CCTV cameras aimed at railway stations and other infrastructure. The solar-powered cameras streamed video over cellular networks – perhaps using accounts tied to stolen SIM cards – to viewers in Pakistan. Indian authorities investigated further and found multiple cameras in other locations, all located near important infrastructure. It’s alleged that Pakistan-backed operatives recruited Indian citizens to install the cameras."
        https://www.theregister.com/2026/03/26/india_pakistan_cctv/
      • Pawn Storm Campaign Deploys PRISMEX, Targets Government And Critical Infrastructure Entities
        "Prolific Russian-aligned cyber espionage group Pawn Storm has deployed a new malware suite that TrendAI™ Research identifies as PRISMEX. The APT group also known as APT28, Fancy Bear, UAC-0001 and Forest Blizzard in its latest observed campaigns target the operational backbone of Ukrainian defense and Western humanitarian and military aid infrastructure. The campaigns, which have been active since at least September 2025, significantly escalated in January 2026, and continue the long-lasting brazen attacks that Pawn Storm deploys against Ukraine since 2014."
        https://www.trendmicro.com/en_us/research/26/c/pawn-storm-targets-govt-infra.html
      • Converging Interests: Analysis Of Threat Clusters Targeting a Southeast Asian Government
        "Unit 42 researchers uncovered a series of cyberespionage campaigns targeting a government organization in Southeast Asia. Our initial investigation began with tracking Stately Taurus activity between June 1–Aug. 15, 2025. This activity involves USB-propagated malware called USBFect (aka HIUPAN), which deploys a PUBLOAD backdoor. Our investigation led to the discovery of two additional, distinct activity clusters we’re tracking as CL-STA-1048 and CL-STA-1049."
        https://unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org/
        Honey For Hackers: A Study Of Attacks Targeting The Recent CVE-2026-21962 And Other Critical WebLogic * Vulnerabilities On a High Interactive Oracle Honeypot
        "This report analyzes attack data collected from a high-interaction honeypot simulating a vulnerable Oracle WebLogic Server (v14.1.1.0.0) over a 12-day period (Jan 22 - Feb 3, 2026). The primary focus is the immediate and widespread exploitation of the newly disclosed, critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2026-21962 (CVSS: 10.0). Attack attempts targeting this zero-day-like flaw were observed immediately following the public release of its exploit code, demonstrating the rapid weaponization of critical Oracle WebLogic vulnerabilities. In addition to CVE-2026-21962, the honeypot captured attacks targeting other persistent, critical WebLogic RCE flaws, including CVE-2020-14882/14883 (Console RCE), CVE-2020-2551 (IIOP RCE), and CVE-2017-10271 (WLS-WSAT RCE). This confirms that threat actors continue to rely on a small set of highly-effective, simple-to-exploit vulnerabilities to compromise WebLogic environments."
        https://www.cloudsek.com/blog/honey-for-hackers-a-study-of-attacks-targeting-the-recent-cve-2026-21962-and-other-critical-weblogic-vulnerabilities-on-a-high-interactive-oracle-honeypot
        https://www.infosecurity-magazine.com/news/critical-oracle-weblogic-rce/
      • EtherRAT & SYS_INFO Module: C2 On Ethereum (EtherHiding), Target Selection, CDN-Like Beacons
        "In March 2026, eSentire's Threat Response Unit (TRU) detected EtherRAT in a customer's environment in the Retail industry. EtherRAT is a Node.js-based backdoor reportedly linked by Sysdig to a North Korean advanced persistent threat (APT) group due to significant overlaps with "Contagious Interview" tactics, techniques, and procedures (TTPs). EtherRAT allows threat actors to run arbitrary commands on compromised hosts, gather extensive system information, and steal assets such as cryptocurrency wallets and cloud credentials. Command-and-Control (C2) addresses are retrieved using "EtherHiding", a technique to make C2 addresses more resilient by storing and updating them in Ethereum smart contracts, allowing threat actors to rotate infrastructure at a small cost and avoid takedowns by law enforcement. After retrieving the C2 address through public Ethereum RPC providers, the malware blends in with normal network traffic through CDN-like beaconing."
        https://www.esentire.com/blog/etherrat-sys-info-module-c2-on-ethereum-etherhiding-target-selection-cdn-like-beacons
        https://www.infosecurity-magazine.com/news/etherrat-bypass-security-ethereum/
      • From Invitation To Infection: How SILENTCONNECT Delivers ScreenConnect
        "Elastic Security Labs is observing malicious campaigns delivering a multi-stage infection involving a previously undocumented loader. The infection begins when users are diverted to a Cloudflare Turnstile CAPTCHA page under the guise of a digital invitation. After the link is clicked, a VBScript file is downloaded to the machine. Upon execution, the script retrieves C# source code, which is then compiled and executed in memory using PowerShell. The final payload observed in these campaigns is ScreenConnect, a remote monitoring and management (RMM) tool used to control victim machines. This campaign highlights a common theme: attackers abusing living-off-the-land binaries (LOLBins) to facilitate execution, as well as using trusted hosting providers such as Google Drive and Cloudflare. While the loader is small and straightforward, it appears to be quite effective and has remained under the radar since March 2025."
        https://www.elastic.co/security-labs/silentconnect-delivers-screenconnect

      Breaches/Hacks/Leaks

      • Ajax Football Club Hack Exposed Fan Data, Enabled Ticket Hijack
        "Dutch professional football club Ajax Amsterdam (AFC Ajax) disclosed that a hacker exploited vulnerabilities in its IT systems and accessed data belonging to a few hundred people. The security issues also allowed transferring purchased tickets to others and enabled modifications to stadium bans imposed to certain individuals. The club learned about the security issues and their effect from journalists who were tipped off by the hacker. AFC Ajax is one of the most successful football clubs, winning the UEFA Champions League four times and with 36 Eredivisie titles, the premier professional football league in the Netherlands."
        https://www.bleepingcomputer.com/news/security/ajax-football-club-hack-exposed-fan-data-enabled-ticket-hijack/
      • Hightower Holding Data Breach Impacts 130,000
        "Hightower Holding, the parent company of financial management services provider Hightower Advisors, is notifying over 130,000 individuals of a data breach. Operating as a holding company, Hightower Holding provides financial management, retirement planning, wealth and investment advisory, and other services through subsidiaries such as Hightower Advisors, Hightower Securities, and Hightower Trust Company. In a written notification letter sent to the impacted individuals this week, the company revealed that it fell victim to a cyberattack in early January 2026, and that the hackers exfiltrated certain files from its environment between January 8 and 9."
        https://www.securityweek.com/hightower-holding-data-breach-impacts-130000/

      General News

      • UK Crackdown On Vile Scam Centres Steps Up With Sanctions On Illicit Crypto Network
        "A cryptocurrency network through which stolen personal data can be sold to fraudsters is sanctioned today as part of efforts to dismantle a network of ‘scam centres’, protect British nationals from online fraud, and prevent the exploitation of trafficked victims. Across Southeast Asia, scam centres are using sophisticated schemes, including scams in which people are lured into fake romantic relationships, to defraud victims on an industrial scale, including in the UK. Those conducting the scams are often trafficked foreign nationals, who have been lured into purpose-built scam compounds under the pretence of legitimate jobs, only to be trapped and forced to carry out online fraud under the threat of torture."
        https://www.gov.uk/government/news/uk-crackdown-on-vile-scam-centres-steps-up-with-sanctions-on-illicit-crypto-network
        https://www.bleepingcomputer.com/news/security/uk-sanctions-xinbi-marketplace-linked-to-asian-scam-centers/
        https://therecord.media/xinbi-crypto-marketplace-sanctioned
      • Suspected RedLine Infostealer Malware Admin Extradited To US
        "An Armenian suspect was extradited to the United States to face criminal charges for allegedly helping manage RedLine, one of the most prolific infostealer malware operations in recent years. Hambardzum Minasyan was arrested on Monday, March 23, and appeared in federal court in Austin on Tuesday, when U.S. prosecutors accused him of registering virtual private servers that were part of RedLine's infrastructure and two web domains used during RedLine attacks. He also allegedly registered a cryptocurrency account in November 2021 that the RedLine cybercrime gang used to receive affiliate payments and created online file-sharing repositories used to distribute the malware to affiliates."
        https://www.bleepingcomputer.com/news/security/suspected-redline-infostealer-administrator-extradited-to-us/
        https://therecord.media/redline-malware-developer-extradited-to-us-faces-30-years
        https://www.securityweek.com/alleged-redline-malware-administrator-extradited-to-us/
        https://www.helpnetsecurity.com/2026/03/26/redline-infostealer-developer-extradited-us-charged/
      • Automotive Cybersecurity Threats Grow In Era Of Connected, Autonomous Vehicles
        "Automotive security has made great strides over the past 10 years, ever since a pair of researchers first demonstrated they could remotely take control of a Jeep Cherokee. However, threats to vehicles have also heightened, thanks to the increasingly connected nature of vehicles, Kamel Ghali, vice president of the nonprofit Car Hacking Village, and Julio Padilha, chief information security officer for Volkswagen & Audi South America, said at RSAC Conference this week. "A totally connected system means threats," Padilha said. "It's a dangerous situation. You have to be aware. You have to fix this to have a properly secured vehicle.""
        https://www.darkreading.com/vulnerabilities-threats/automotive-cybersecurity-threats-grow-connected-autonomous-vehicles
      • How Organizations Can Use Blunders To Level Up Their Security Programs
        "Regardless of sector or size, organizations keep making the same cybersecurity mistakes. Ports exposed to the Internet, passwords that are weak or reused, poor patching practices, and insufficient logging and monitoring are among the most common weaknesses that result in data breaches. In some cases, attackers abuse those security gaps to breach an organization's defenses and cause wider damage. But mistakes also offer organizations plenty of learning opportunities, Megan Benoit, lead security engineer at Nebraska Medicine, said in a presentation at this week's RSAC Conference. Benoit shared eight common mistakes she's observed on the job over the last 20 years; if she had more time, she could highlight even more, she said."
        https://www.darkreading.com/cybersecurity-operations/blunders-level-up-security-programs
      • Making AI Software Development Safe At Machine Scale
        "AI models are becoming highly effective at generating code, but they remain structurally weak at dependency decisions. In Part 1 of this study, published in the 2026 State of the Software Supply Chain Report, Sonatype analyzed 36,870 dependency upgrade recommendations across Maven Central, npm, PyPI, and NuGet against GPT-5 and found that it often recommended versions, upgrade paths, or fixes that did not hold up in real software ecosystems. In practice, those failures drive wasted AI spend, wasted developer time, unresolved vulnerability exposure, and technical debt before code reaches production."
        https://www.sonatype.com/resources/research/making-ai-work-safely
        https://www.darkreading.com/application-security/ai-powered-dependency-decisions-security-bugs
      • Intermediaries Driving Global Spyware Market Expansion
        "Efforts to shine a light on the activities of spyware vendors has grown more difficult because of the proliferation of intermediaries — the spyware resellers, exploit brokers, contractors, and partners that allow government and private entities to circumvent transparency laws and spyware restrictions, experts say. These intermediaries, which often can be governments in permissive states, have fueled the spread of spyware across the globe, according to a report from policy think tank Atlantic Council published on March 18. Atlantic Council researchers cited several examples, including a South African intermediary acting as a representative for Memento Labs to sell its Dante spyware to the local market, and a third-party firm reportedly helping Israeli firm Passitora sell its spyware product to Bangladesh, despite the two countries having no diplomatic relations and Bangladesh having banned imports from Israel."
        https://www.darkreading.com/cyber-risk/intermediaries-driving-global-spyware-market-expansion
      • A Nearly Undetectable LLM Attack Needs Only a Handful Of Poisoned Samples
        "Prompt engineering has become a standard part of how large language models are deployed in production, and it introduces an attack surface most organizations have not yet addressed. Researchers have developed and tested a prompt-based backdoor attack method, called ProAttack, that achieves attack success rates approaching 100% on multiple text classification benchmarks without altering sample labels or injecting external trigger words."
        https://www.helpnetsecurity.com/2026/03/26/llm-backdoor-attack-research/
        https://www.sciencedirect.com/science/article/abs/pii/S0957417424027234
      • Your Facilities Run On Fragile Supply Chains And Nobody Wants To Admit It
        "In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building systems. She explains how sourcing, localized redundancy, and flexible infrastructure design are being integrated into resilience planning. Dodoo also shares practical approaches such as regional vendor networks, alternative contracts, and strategic inventory to maintain continuity during disruptions."
        https://www.helpnetsecurity.com/2026/03/26/christa-dodoo-ifma-facility-resilience-risk/
      • Who Owns AI Agent Access? At Most Companies, Nobody Knows
        "AI agents are operating across production enterprise environments at scale, and the identity infrastructure managing their access has not kept up with their deployment. A January 2026 survey of 228 IT and security professionals, conducted by the Cloud Security Alliance, finds that the majority of organizations have AI agents active in core systems, with fragmented ownership of how those agents authenticate and what they can access."
        https://www.helpnetsecurity.com/2026/03/26/ciso-ai-agent-identity-security-report/
      • Security Researchers Sound The Alarm On Vulnerabilities In AI-Generated Code
        "Vibe coding tools like Anthropic's Claude Code are flooding software with new vulnerabilities, Georgia Tech researchers have warned. At least 35 new common vulnerabilities and exposures (CVE) entries were disclosed in March 2026 that were the direct result of AI-generated code. This is up from from six in January and 15 in February. The vulnerabilities are being tracked as part of the ‘Vibe Security Radar’ project which was started in May 2025 by the Systems Software & Security Lab (SSLab), part of Georgia Tech’s School of Cybersecurity and Privacy."
        https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/
      • Virtual Machines, Virtually Everywhere – And With Real Security Gaps
        "Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public beta testing before rolling out officially in 2008. These events sparked the era of modern on-demand cloud storage and computing that changed how organizations of all sizes think about their IT infrastructure. Fast-forward to the present and you would be hard-pressed to find many organizations that haven’t ‘lifted and shifted’ at least part of their workloads to the cloud, or aren’t planning to do so soon. Indeed, some now run entirely in the cloud, while many others have paired cloud workloads, often in multi-cloud setups, with on-prem resources that won’t be retired anytime soon."
        https://www.welivesecurity.com/en/business-security/virtual-machines-virtually-everywhere-real-security-gaps/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) de1b0a75-dc09-491c-88a2-a6ed19a5257b-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบแคมเปญ ClickFix ปลอมหน้า Cloudflare แพร่มัลแวร์ Infiniti Stealer บน macOS

      c66dbbc9-bfa2-4438-9fb5-413a0e5f0267-image.png พบแคมเปญ ClickFix ปลอมหน้า Cloudflare แพร่มัลแวร์ Infiniti Steale.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand c150089a-9965-40b5-9d40-c8f081399456-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • กลุ่ม ShinyHunters อ้างเจาะระบบคณะกรรมาธิการยุโรป คาดข้อมูลรั่วไหลกว่า 350GB

      878e618d-b43b-4e5e-a0e9-d20ec3b55241-image.png กลุ่ม ShinyHunters อ้างเจาะระบบคณะกรรมาธิการยุโรป.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand b3e7c809-4aac-406d-8186-5a71bf48d70f-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • แจ้งเตือน พบแฮกเกอร์เริ่มสแกนหาช่องโหว่ร้ายแรง Citrix NetScaler (CVSS 9.3)

      ccebb906-e8de-4e2e-9b2f-65cd27e84f97-image.png แจ้งเตือน พบแฮกเกอร์เริ่มสแกนหาช่องโหว่ร.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand unnamed__5_-removebg-preview (1).png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 26 March 2026

      Healthcare Sector

      • Grassroots DICOM (GDCM)
        "Successful exploitation of this vulnerability could allow an attacker to send a specially crafted file, and when parsed, could result in a denial-of-service condition."
        https://www.cisa.gov/news-events/ics-medical-advisories/icsma-26-083-01

      Industrial Sector

      • Pharos Controls Mosaic Show Controller
        "Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary commands with root privileges."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-01
      • Schneider Electric Plant iT/Brewmaxx
        "Successful exploitation of these vulnerabilities could risk privilege escalation, which could result in remote code execution."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-03
      • Schneider Electric EcoStruxure Foxboro DCS
        "Schneider Electric is aware of a vulnerability in its EcoStruxure Foxboro DCS Control Software on Foxboro DCS workstations and servers. Control Core Services and all runtime software, like FCPs, FDCs, and FBMs, are not affected. The EcoStruxure Foxboro DCS product is an innovative family of fault-tolerant, highly available control components, which consolidates critical information and elevates staff capabilities to ensure flawless, continuous plant operation. Failure to apply the remediation provided below may risk deserialization of untrusted data, which could result in loss of confidentiality, integrity and potential remote code execution on the compromised workstation."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-083-02

      Vulnerabilities

      • TP-Link Warns Users To Patch Critical Router Auth Bypass Flaw
        "TP-Link has patched several vulnerabilities in its Archer NX router series, including a critical-severity flaw that may allow attackers to bypass authentication and upload new firmware. Tracked as CVE-2025-15517, this security flaw affects Archer NX200, NX210, NX500, and NX600 wireless routers and stems from a missing authentication weakness that attackers can exploit without privileges. "A missing authentication check in the HTTP server to certain cgi endpoints allows unauthenticated access intended for authenticated users," TP-Link explained earlier this week when it released security updates that address the vulnerability. "An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.""
        https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/
        https://nvd.nist.gov/vuln/detail/CVE-2025-15517
        https://securityaffairs.com/189980/iot/patch-now-tp-link-archer-nx-routers-vulnerable-to-firmware-takeover.html
      • iOS, MacOS 26.4 Roll Out With Fresh Security Patches
        "Apple on Tuesday rolled out a fresh wave of security updates to resolve more than 80 vulnerabilities across its mobile and desktop operating systems. iOS 26.4 and iPadOS 26.4 were released for the latest generation iPhone and iPad devices with patches for nearly 40 security defects. WebKit received fixes for eight bugs that could be exploited by malicious websites to bypass policy enforcement, mount XSS attacks, fingerprint users, escape the sandbox, or crash the process. Issues addressed in the kernel could be exploited to disclose kernel memory, leak sensitive kernel state, corrupt kernel memory, or write kernel memory."
        https://www.securityweek.com/ios-macos-26-4-roll-out-with-fresh-security-updates/
      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2026-33017 Langflow Code Injection Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog
      • AI Supply Chain Attacks Don’t Even Require Malware…just Post Poisoned Documentation
        "A new service that helps coding agents stay up to date on their API calls could be dialing in a massive supply chain vulnerability. Two weeks ago, Andrew Ng, an AI entrepreneur and adjunct professor at Stanford, launched Context Hub, a service for supplying coding agents with API documentation. "Coding agents often use outdated APIs and hallucinate parameters," Ng wrote in a LinkedIn post. "For example, when I ask Claude Code to call OpenAI's GPT-5.2, it uses the older chat completions API instead of the newer responses API, even though the newer one has been out for a year. Context Hub solves this.""
        https://www.theregister.com/2026/03/25/ai_agents_supply_chain_attack_context_hub/

      Malware

      • Cloud Phones: The Invisible Threat
        "What began as a simple scheme to inflate social media metrics has evolved into a sophisticated threat that is quietly reshaping the economics of digital fraud. Over the past decade, fraud prevention teams have invested heavily in device fingerprinting and emulator detection and that investment paid off; classic emulators and bot activities became predictable, easy to detect and block. However, attackers adapted. They moved to cloud phones – remote-access Android devices running in data centers. For all intents and purposes, these are real phones, running genuine firmware, exhibiting natural sensor behavior, and presenting valid hardware attestation. Plus, they’re accessible to anyone with just $10 to spare and an internet connection. What makes this threat unlike any other is its invisibility. To fraud detection systems, cloud phone activity such as mobile banking appears indistinguishable from a legitimate device. This report traces the evolution of cloud phones from harmless social media engagement automation to industrial-scale financial fraud, examines why traditional device fingerprinting fails against cloud phones, and reveals updated detection methodologies that are beginning to close this dangerous gap."
        https://www.group-ib.com/blog/cloud-phones-invisible-threat/
        https://www.infosecurity-magazine.com/news/cloud-phones-financial-fraud/
        https://www.theregister.com/2026/03/25/virtual_smartphones_fraud/

      • On The Radar: ChatGPT Stealer
        "For many folks, using an AI assistant in browser means opening a new tab, navigating to a website, and asking questions. This works for many use cases, but often means bringing content to the agent, either by summarizing or copy/pasting from other locations. The assistant in this case has no awareness of the conversations, context, or history in the other browser tabs. In short, the agent is effectively siloed. This isolation can be seen as good from a security and privacy perspective, but presents challenges from a usability standpoint. This usability gap has led to the creation of tools that bring further awareness to the AI tools. While this shift has taken several forms, one area of rapid growth is AI-powered browser extensions. These extensions afford users the ability to work across browser tabs, simplifying the ingestion of content into the AI agent and streamlining the experience significantly."
        https://expel.com/blog/on-the-radar-chatgpt-stealer/
        https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/

      • The Unintentional Enabler: How Cloudflare Services Are Abused For Credential Theft And Malware Distribution
        "Cloudflare's suite of services like Workers, Tunnels, Turnstile, Pages and Cloudflare R2 (*[.]r2[.]dev) continue to be abused by threat actors to orchestrate stealthy phishing attacks and deliver malware in ways that are difficult for traditional security measures to detect or prevent. This abuse underscores a perilous shift wherein Cloudflare’s legitimate services are now being repurposed by malicious actors to bypass security defenses and evade detection. Here we will explore specifically how Cloudflare services, especially Workers and Tunnels, became powerful enablers of cyber threats, drawing from actual campaigns that Cofense Intelligence has seen that have bypassed defenses to end up in employee inboxes."
        https://cofense.com/blog/how-cloudflare-services-are-abused-for-credential-theft-and-malware-distribution

      • Novel WebRTC Skimmer Bypasses Security Controls At $100+ Billion Car Maker
        "What sets this attack apart is the skimmer itself. Instead of the usual HTTP requests or image beacons, this malware uses WebRTC DataChannels to load its payload and exfiltrate stolen payment data. This is the first time Sansec has observed WebRTC used as a skimming channel. The car manufacturer is the latest victim in a streak of major ecommerce breaches. Sansec has now found payment skimmers on five multi-billion dollar companeis in the past two months, including a top-3 US bank and a top-10 global supermarket chain."
        https://sansec.io/research/webrtc-skimmer
        https://www.bleepingcomputer.com/news/security/polyshell-attacks-target-56-percent-of-all-vulnerable-magento-stores/

      • Bubble: a New Tool For Phishing Scams
        "A variety of AI-powered app builders promise to bring your ideas to life quickly and effortlessly. Unfortunately, we know exactly who’s always on the lookout for new ideas to bring to life — mostly because we’re rather good at spotting and blocking their old ones. We’re talking about phishers, of course. Recently, we discovered they’ve added a new trick to their arsenal: generating websites using the Bubble AI-powered web-app builder. It’s highly likely that this tactic is now available through one or more phishing-as-a-service platforms, which virtually guarantees these decoys will start appearing in a wide range of attacks. But let’s break this down step-by-step."
        https://www.kaspersky.com/blog/bubble-no-code-phishing/55488/
        https://www.bleepingcomputer.com/news/security/bubble-ai-app-builder-abused-to-steal-microsoft-account-credentials/

      • Torg Grabber: Anatomy Of a New Credential Stealer
        "It started with a lie. A sample walked into the lab wearing a Vidar label like a cheap suit two sizes too small. We pulled the threads, and the whole thing came apart. What fell out was a previously unknown information stealer we named Torg Grabber – 334 samples compiled over three months, a rapid evolution from Telegram dead drops through an encrypted TCP protocol nobody asked for, all the way to a production-grade REST API that worked like a Swiss watch dipped in poison. Over 40 operator tags pulled from the binaries – a mix of nicknames, date-encoded batch IDs, and confirmed Telegram user IDs – fingerprinted individual MaaS customers and confirmed what we already suspected: this was a builder-and-panel operation, crime as a service, infrastructure included. OSINT resolution of the numeric tags peeled back the curtain on eight operators as Telegram accounts buried up to their necks in the Russian cybercrime ecosystem. The bot tokens gave us the developer accounts behind the whole show. Nobody said crime doesn’t pay, but nobody said it doesn’t leave fingerprints either."
        https://www.gendigital.com/blog/insights/research/torg-grabber-credential-stealer-analysis
        https://www.bleepingcomputer.com/news/security/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets/

      • The Operations Of The Swarm: Inside The Complex World Of Mirai-Based Botnets
        "Botnets are always an interesting threat to discuss, simply because of their prevalence and the difficulty of restricting and mitigating them. Spamhaus noted that July to December 2025 saw a 24% increase in the number of botnet command & control servers identified when compared to the previous 6-month period. This blog started off as a focused discussion of Aisuru-Kimwolf, what it is, and what has been observed recently; however, since there are so many botnet families that are related to each other, we decided to expand the scope and treat this as more of a technical primer to botnets. This blog will describe observations on several botnets and discuss their key similarities and differences."
        https://blog.pulsedive.com/the-operations-of-the-swarm-inside-the-complex-world-of-mirai-based-botnets/
        https://hackread.com/mirai-malware-variants-botnet-growth/

      • GlassWorm Hides a RAT Inside a Malicious Chrome Extension
        "A couple of days ago, we covered GlassWorm compromising hundreds of GitHub repositories and a popular React phone number package on npm. We kept digging into the full payload and found a multi-stage framework that installs a persistent RAT and, deep in Stage 3, force-installs a Chrome extension posing as Google Docs Offline. It logs keystrokes, dumps cookies and session tokens, captures screenshots, and takes commands from a C2 server hidden in a Solana blockchain memo."
        https://www.aikido.dev/blog/glassworm-chrome-extension-rat
        https://thehackernews.com/2026/03/glassworm-malware-uses-solana-dead.html

      • Breaches/Hacks/Leaks
        Hackers Claim To Have Accessed Data Tied To Millions Of Crime Tipsters
        "Millions of crime tips may have been exposed after a hacker group claims to have compromised systems used by Crime Stoppers programs and other organizations worldwide. The incident centers on P3 Global Intel, a Texas-based provider of cloud-based tip and intelligence management software owned by Navigate360. The hacktivists, known as “Internet Yiff Machine,” submitted the stolen data to Straight Arrow News (SAN). According to SAN, the group supplied a cache of more than 8.3 million records said to be taken from P3. The data reportedly spans from as far back as 1987, up to 2025, and is said to include crime tips submitted through Crime Stoppers programs, law enforcement agencies, schools, and parts of the US federal government."
        https://www.malwarebytes.com/blog/news/2026/03/hackers-claim-to-have-accessed-data-tied-to-millions-of-crime-tipsters

      • Ransomware Attack Disrupts Operation At Major Spanish Fishing Port
        "A ransomware attack has disrupted digital systems at Spain’s Port of Vigo, forcing authorities to disconnect parts of its network and temporarily manage cargo operations manually, port officials said Wednesday. The attack was detected early Tuesday and affected computer servers used to manage cargo traffic and other digital services at the port, located in the Galicia region on Spain’s northwest coast. Officials told local media the incident locked some equipment and involved a ransom demand. In response, the port authority’s technology team isolated the affected systems from external networks to limit the impact."
        https://therecord.media/port-of-vigo-ransomware

      • Puerto Rico Government Agency Cancels Driver’s License Appointments After Cyberattack
        "Puerto Rico’s Department of Transportation was forced to cancel all upcoming appointments at the agency that handles driver’s licenses, permits and vehicle registrations due to a cyberattack. Government officials announced the incident on Tuesday and provided an update on Wednesday, writing that the Puerto Rico Innovation and Technology Service (PRITS) is working with the Department of Transportation to restore systems at the agency. Poincaré Díaz, executive director of PRITS, said they were forced to disconnect all of the Transportation Department’s systems after a cyberattack was discovered on Monday."
        https://therecord.media/puerto-rico-gov-agency-cancels-driver-license-appointments-cyber-incident

      General News

      • Russian Cybercriminal Sentenced To Prison For Using a “botnet” To Steal Millions From American Businesses
        "A Russian national was sentenced yesterday to twenty-four months in prison after having pleaded guilty to managing the operation of a botnet (a network of computers infected by malware and controlled remotely by cybercriminals) that was used to launch ransomware attacks on the networks of dozens of U.S. corporations, announced United States Attorney Jerome F. Gorgon Jr. and Special Agent in Charge Jennifer Runyan of the FBI Detroit Field Division. Ilya Angelov, 40, of Tolyatti, Russia was sentenced by U.S. District Court Judge Nancy Edmunds, who also fined Angelov $100,000 and entered a money judgment against him in the amount of $1.6 million dollars."
        https://www.justice.gov/usao-edmi/pr/russian-cybercriminal-sentenced-prison-using-botnet-steal-millions-american-businesses
        https://thehackernews.com/2026/03/russian-hacker-sentenced-to-2-years-for.html
        https://www.bleepingcomputer.com/news/security/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks/
        https://therecord.media/russian-botnet-operator-sentenced-ransomware
        https://www.securityweek.com/russian-cybercriminal-gets-2-year-prison-sentence-in-us/
        https://securityaffairs.com/189987/cyber-crime/russian-national-convicted-for-running-botnet-used-in-attacks-on-u-s-firms.html
        https://www.helpnetsecurity.com/2026/03/25/russian-botnet-operator-sentenced-mario-kart-ransomware/
      • Cybersecurity, AI, And Sovereignty: What’s Next For Global Digital Infrastructure
        "Today’s digital systems are advancing faster than the governance models, infrastructure, and security frameworks designed to support them. Artificial intelligence (AI) is driving productivity and innovation, but its rapid deployment is colliding with a more fragmented geopolitical environment. Governments and enterprises are being forced to reconsider how data, platforms, and infrastructure are controlled, shared, and protected. These pressures are already shaping system design and long-term investment decisions. They were central to discussions at the World Economic Forum’s Industry Strategy Meeting (ISM) in Munich, where leaders examined how to translate Davos priorities into operational strategy. The meeting built on priorities established at the World Economic Forum Annual Meeting in Davos earlier this year and focused on translating those insights into practical industry strategies."
        https://www.fortinet.com/blog/industry-trends/cybersecurity-ai-and-sovereignty-whats-next-for-global-digital-infrastructure
      • AI-Native Security Is a Must To Counter AI-Based Attacks
        "Slow human-controlled defenses won't be enough for autonomous agents spun off by technologies like OpenClaw, say experts. Artificial intelligence-native security will be needed to fend off threats. "You're going to see an AI-led attack, full agentic attacks that we're starting to see already today. The only way to deal with those is a full agentic defense," Francis deSouza, Google Cloud's chief operating officer and president of security products, said during a panel discussion at Nvidia’s GTC conference earlier this month. During the discussion, panelists noted that AI-native security models prevent rogue agent break-ins. Such models include agents that spot security weaknesses and scan sub-agents before deployment, control dynamic system access for agents, and generate audit trails to track agent identity and activity."
        https://www.darkreading.com/cybersecurity-operations/ai-native-security-counter-attacks
      • Training An AI Agent To Attack LLM Applications Like a Real Adversary
        "Most enterprise software development teams now ship AI-powered applications faster than traditional penetration testing can keep up with. A security team with 500 applications may test each one once a year, or less. In the time between tests, the underlying models, integrations, and behaviors can change, with no corresponding security review. Novee launched a product it calls AI Red Teaming for LLM Applications, an AI pentesting agent built specifically to probe LLM-powered software. The company introduced the product at RSAC 2026 Conference in San Francisco and is demonstrating it at booth S-0262."
        https://www.helpnetsecurity.com/2026/03/25/novee-ai-pentesting-agent/
      • Your Security Stack Looks Fine From The Dashboard And That’s The Problem
        "One in five enterprise endpoints is operating outside a protected and enforceable state on any given day, according to device telemetry collected across tens of millions of corporate PCs. That figure, drawn from Absolute Security’s 2026 Resilience Risk Index, has barely moved in a year, even as organizations continue to add security tools and increase spending. The report, which draws on multi-year endpoint telemetry alongside external research, finds that the gap between security deployment and security enforcement is widening. Controls are installed. Dashboards report coverage. The underlying devices are frequently in a different condition."
        https://www.helpnetsecurity.com/2026/03/25/ciso-enterprise-endpoint-security-gaps/
      • Operation Henhouse Nets Over 500 Arrests In UK Fraud Crackdown
        "UK police arrested over 500 suspects and moved to seize and freeze millions connected to suspected fraud in the latest iteration of Operation Henhouse, the National Crime Agency (NCA) has revealed. Now in its fifth year, the law enforcement operation is led by the NCA and City of London Police. They claimed this year was the strongest yet in the fight against offline and digital fraud. It led to 557 arrests, 172 voluntary interviews and 249 cease-and-desist notices, as well as account freezing orders against £9m ($12m), and seizures of cash and assets worth £18.1m ($24.3m)."
        https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/
      • Anatomy Of a Cyber World Global Report 2026
        "Kaspersky Security Services provide a comprehensive cybersecurity ecosystem, taking enterprise threat protection to another level. Services like Kaspersky Managed Detection and Response and Compromise Assessment allow for timely detection of threats and cyberattacks. SOC Consulting provides a practical approach ensuring the corporate infrastructure stays secured, while Incident Response is suited for timely remediation with a maximized recovery rate. This new report brings together statistics across regions and industries from our Managed Detection and Response and Incident Response services, and for the first time, it also includes insights from our Compromise Assessment and SOC Consulting services — all to provide you with more comprehensive view of different aspects of corporate information security worldwide."
        https://securelist.com/global-report-security-services-2026/119233/
      • North America’s Cyber Security Threat Reality In 2026
        "The North America cyber security statistics are out. Cyber risk in North America accelerated, concentrated, and repeated itself at scale in 2025. Data from the 2025 North America Threat Landscape Report shows a threat environment defined less by surprise and more by pressure. The same attack types, the same actors, and the same windows of opportunity appeared again and again, particularly in the United States, which accounted for roughly 93 percent of all recorded incidents in the Americas (note: this is all publicly recorded incidents, not attempted attacks). Three dynamics stand out, each shaping how organizations experienced risk over the past year and what they should expect next."
        https://blog.checkpoint.com/research/north-americas-cyber-security-threat-reality-in-2026/
        https://checkpoint.cyberint.com/north-america-threat-landscape-2025
      • Enterprise PCs Are Unreliable, Unpatched, And Unloved Compared To Macs
        "End-user compute vendor Omnissa, the company formed by the spin-out of VMware’s virtual desktops, applications, and device management biz, has dug into the telemetry it collects from customers and painted a picture of the world’s enterprise hardware fleet – and the news is better for Google and Apple than it is for Microsoft. Omnissa’s State of Digital Workspace report suffers from the same problem as all research published by vendors in that its authors conclude its findings demonstrate many fine reasons reason why you should consider the company’s products."
        https://www.theregister.com/2026/03/25/omnissa_digital_workspace_report/
      • Cloud Workload Security: Mind The Gaps
        "Complexity is said to be the enemy of many things, but when it comes to organizations and their IT systems and processes, complexity is arguably the worst enemy of cybersecurity. For many IT and security practitioners, this plays out daily as they scramble to manage what IBM once called a "Frankencloud," a patchwork of private and public cloud environments, often further entangled with various on-premise and possibly legacy resources. The ease with which some cloud assets, notably virtual machines, can be spun up contrasts sharply with the reality of keeping them hardened and monitored once they begin to multiply. The machine and software sprawl often produces environments that are heterogenous and beset by inconsistent rules, which ultimately makes them difficult to defend."
        https://www.welivesecurity.com/en/business-security/cloud-workload-security-mind-gaps/
      • Ex-NSA Directors Discuss 'Red Line' For Offensive Cyberattacks
        "When it comes to cyberattacks, what crosses the "red line" and justifies a kinetic response? That was one of the major questions posed to four former National Security Agency (NSA) directors and US Cyber Command leaders, who weighed in on the US government's offensive cybersecurity strategy as part of a keynote panel at RSAC 2026 Conference on Tuesday. The keynote, titled "Inside Offensive Cyber: Lessons from Four NSA Directors" featured Tim Haugh, Paul Nakasone, Mike Rogers, and Keith Alexander. Alexander was appointed by former President Barack Obama to establish and lead the US Cyber Command, and was succeeded in the post by Rogers, Nakasone, and Haugh, respectively."
        https://www.darkreading.com/cyber-risk/ex-nsa-directors-red-line-offensive-cyberattacks
      • The Agentic AI Attack Surface: Prompt Injection, Memory Poisoning, And How To Defend Against Them
        "The rise of agentic systems is changing how organizations think about defense and risk. As enterprises embrace autonomous decision-making, the agentic AI attack surface expands in ways that traditional security models were never designed to handle. These systems don’t just process inputs; they interpret goals, make decisions, and act independently. That shift introduces a new category of AI security vulnerabilities, where manipulation doesn’t target code directly but the reasoning layer itself. Two new threats, prompt injection attacks and memory poisoning in AI, are quickly becoming central concerns in agentic AI security. Understanding how they work and how to defend against them is more than critical for any organization deploying autonomous systems at scale."
        https://cyble.com/blog/prompt-injection-attacks-agentic-ai-security/
      • The 'Expert' AI Prompt That Kills Accuracy
        "A coder tells its chatbot: You're an expert. A full stack developer. It's machine massaging technique that's a cornerstone of persona-based artificial intelligence prompting - and it backfires spectacularly, find academics in a studying showing the practice produces worst results, when the goal is accuracy. Researchers at the University of Southern California in a preprint. The study found that the effect of stoking a large language model with the "you're an expert" prompt consistently damaged performance. Their advice is to avoid persona-based prompts for tasks that require models to tap into their pre-trained knowledge - the heaps of coding examples fed into models before they're ready to interact with customers."
        https://www.bankinfosecurity.com/expert-ai-prompt-that-kills-accuracy-a-31170
        https://arxiv.org/abs/2603.18507
      • Blame Game: Why Public Cyber Attribution Carries Risks
        "Questions about threat actor attribution, including how to do it and why you might want to hold off, are not as straightforward as they may first seem. Attribution is a wide-ranging topic that mostly boils down to "Whodunnit?" for cyberattacks. Depending on the attack and various circumstances, you may read somewhere that a bespoke threat group, such as a ransomware gang, compromised an organization's network. Sometimes it's a "cluster," designed to connect a pattern of activity without strictly connecting a threat actor or nation to that activity with complete certainty. Often, a cybersecurity vendor will use their own custom naming taxnomy to track threat groups, like Salt Typhoon or Sandworm, even though the threat actors themselves would never use those names."
        https://www.darkreading.com/cyber-risk/blame-game-public-cyber-attribution-risks
      • SANS: Top 5 Most Dangerous New Attack Techniques To Watch
        "Each year SANS researchers head to the RSAC Conference to reveal the five top attack techniques. But 2026 marks a distinct shift: all are powered by artificial intelligence. "We would be lying to you if we pointed out a trend in attacks that did not involve AI," SANS president and presentation moderator Ed Skoudis explained to the audience during a keynote session covering the Top 5. "That is just where we are in the industry.""
        https://www.darkreading.com/threat-intelligence/sans-most-dangerous-attack-techniques
      • Why a 'Near Miss' Database Is Key To Improving Information Sharing
        "When people talk about transparency in cybersecurity, they are usually referring to organizations disclosing breaches and incidents. At RSAC Conference this week, two security experts made the case for why success stories deserve equal attention, and why focusing on near-misses can strengthen security defenses. Wendy Nather, senior research initiatives director at 1Password and Bob Lord, head of consumer working group at hacklore.org, emphasized how the industry needs to prioritize transparency, and outlined ways to do so – starting with sharing near-misses. Information sharing, which encompasses threat intelligence, indicators of compromise, and reports of vulnerability exploitation, is an essential component to combat and stay ahead of cyber threats. The victim blame game, shame, finger-pointing, and regulatory punishments contribute to a lack of transparency, particularly when it comes to ransomware. But that needs to change if organizations want to be proactive, even when it feels daunting."
        https://www.darkreading.com/cyber-risk/experts-near-miss-database-improve-information-sharing

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 2303ee7d-d47b-40fe-8681-7b7863ffbc12-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨 แจ้งเตือน! Citrix ออกแพตช์แก้ไขช่องโหว่ระดับวิกฤตในผลิตภัณฑ์ NetScaler ขอให้ผู้ใช้งานเร่งดำเนินการอัปเดตโดยด่วน

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ช่องโหว่ด้านความมั่นคงปลอดภัยที่ตรวจพบในผลิตภัณฑ์ของบริษัท Citrix โดยเฉพาะ Citrix NetScaler ADC และ NetScaler Gateway ซึ่งเป็นอุปกรณ์สำคัญที่ใช้สำหรับให้บริการระบบเครือข่ายและการเข้าถึงจากภายนอกองค์กร โดยมีรายงานจากผู้เชี่ยวชาญด้านความมั่นคงปลอดภัยว่าช่องโหว่ดังกล่าวมีความเสี่ยงสูงที่จะถูกนำไปใช้ในการโจมตีในระยะเวลาอันใกล้

      1. รายละเอียดช่องโหว่ [1]
        บริษัท Citrix ได้เผยแพร่ประกาศแจ้งเตือนช่องโหว่ด้านความมั่นคงปลอดภัยในผลิตภัณฑ์ NetScaler ซึ่งเป็นอุปกรณ์หรือซอฟต์แวร์ประเภท Application Delivery Controller (ADC) ที่ทำหน้าที่เป็นตัวกลางในการให้บริการแอปพลิเคชันขององค์กร เช่น การกระจายโหลด การให้บริการเชื่อมต่อจากภายนอก (Gateway/VPN) และการจัดการ session ของผู้ใช้งาน โดยช่องโหว่ดังกล่าวอาจส่งผลให้ผู้โจมตีสามารถเข้าถึงข้อมูลในหน่วยความจำของระบบ เช่น session token หรือข้อมูลที่มีความละเอียดอ่อน โดยไม่ได้รับอนุญาต และอาจถูกใช้เป็นช่องทางในการเข้าถึงหรือขยายขอบเขตการโจมตีภายในระบบ ทั้งนี้ เนื่องจาก NetScaler มักถูกติดตั้งเป็นจุดเชื่อมต่อหลักระหว่างเครือข่ายภายในและภายนอกองค์กร หากถูกโจมตีอาจส่งผลกระทบในวงกว้างต่อระบบภายในองค์กร โดยมีช่องโหว่ที่สำคัญ ได้แก่

      1.1 CVE-2026-3055 (CVSS v4.0: 9.3) เป็นช่องโหว่ประเภท Insufficient Input Validation ที่นำไปสู่ การอ่านข้อมูลนอกขอบเขตหน่วยความจำ (Out-of-Bounds Read) ซึ่งอาจเปิดโอกาสให้ผู้โจมตีที่ไม่ได้รับการยืนยันตัวตนสามารถส่งคำร้องที่ถูกสร้างขึ้นเป็นพิเศษไปยังอุปกรณ์ NetScaler เพื่ออ่านข้อมูลสำคัญจากหน่วยความจำของระบบได้ เช่น session token หรือข้อมูลที่มีความละเอียดอ่อน

      ทั้งนี้ ช่องโหว่ดังกล่าวจะส่งผลกระทบเฉพาะกรณีที่ NetScaler ถูกตั้งค่าให้ทำหน้าที่เป็น SAML Identity Provider (SAML IdP) ซึ่งเป็นกลไกสำหรับการยืนยันตัวตนแบบ Single Sign-On (SSO) โดยระบบจะทำหน้าที่ตรวจสอบตัวตนของผู้ใช้งานและออกข้อมูลยืนยันตัวตนเพื่อใช้เข้าถึงระบบอื่น ๆ โดยค่าเริ่มต้นของระบบ (Default Configuration) จะไม่ได้รับผลกระทบจากช่องโหว่ดังกล่าว

      1.2 CVE-2026-4368 (CVSS v4.0: 7.7) เป็นช่องโหว่ประเภท Race Condition ซึ่งอาจนำไปสู่ปัญหา User Session Mix-up ส่งผลให้เกิดการสลับ session ของผู้ใช้งาน โดยช่องโหว่ดังกล่าวจะส่งผลกระทบในกรณีที่อุปกรณ์ถูกตั้งค่าเป็น Gateway (เช่น SSL VPN, ICA Proxy, CVPN, RDP Proxy) หรือ Authentication, Authorization and Accounting (AAA) virtual server ซึ่งเป็นองค์ประกอบที่ใช้สำหรับควบคุมการเข้าถึงและยืนยันตัวตนของผู้ใช้งาน

      1. ผลกระทบที่อาจเกิดขึ้น
        หากผู้โจมตีสามารถใช้ประโยชน์จากช่องโหว่ดังกล่าวได้สำเร็จ อาจส่งผลกระทบต่อระบบขององค์กร ดังนี้
        2.1 ผู้โจมตีสามารถอ่านข้อมูลสำคัญจากหน่วยความจำของระบบได้โดยไม่ต้องผ่านการยืนยันตัวตน เช่น session token หรือข้อมูลที่มีความละเอียดอ่อน
        2.2 ผู้โจมตีอาจสามารถยึด session หรือเข้าถึงบัญชีของผู้ใช้งานรายอื่นได้
        2.3 ผู้โจมตีอาจใช้ระบบดังกล่าวเป็นจุดเริ่มต้นในการเข้าถึงเครือข่ายภายในองค์กร (Initial Access)
        2.4 อาจเกิดปัญหาการสลับ session ของผู้ใช้งาน (User Session Mix-up) ส่งผลกระทบต่อความถูกต้องของกระบวนการยืนยันตัวตน

      2. ผลิตภัณฑ์ที่ได้รับผลกระทบ [2]
        ช่องโหว่ดังกล่าวส่งผลกระทบต่อผลิตภัณฑ์ของ Citrix ดังต่อไปนี้
        CVE-2026-3055 ได้แก่
        • Citrix NetScaler ADC เวอร์ชันก่อน 14.1-66.59
        • Citrix NetScaler ADC เวอร์ชันก่อน 13.1-62.23
        • Citrix NetScaler ADC 13.1-FIPS และ 13.1-NDcPP เวอร์ชันก่อน 13.1-37.262
        CVE-2026-4368 ได้แก่
        • Citrix NetScaler ADC เวอร์ชันก่อน 14.1-66.54

      3. แนวทางการแก้ไขสำหรับผู้ดูแลระบบ
        ผู้ดูแลระบบควรดำเนินการดังต่อไปนี้
        4.1 อัปเดตผลิตภัณฑ์ Citrix NetScaler ที่ใช้งานให้เป็นเวอร์ชันล่าสุดที่ผู้ผลิตได้ออกแพตช์แก้ไขช่องโหว่แล้วโดยเร็วที่สุด โดยสามารถตรวจสอบข้อมูลอัพเดทเพิ่มเติมได้ที่ https://dg.th/ds0mpj3ybk
        4.2 ตรวจสอบการตั้งค่าของระบบว่าเข้าข่ายมีเงื่อนไขที่ช่องโหว่สามารถถูกใช้ประโยชน์ได้หรือไม่ โดยสามารถตรวจสอบจากไฟล์ configuration ของระบบ ดังนี้
        4.2.1 สำหรับ CVE-2026-3055
        หากตรวจพบการตั้งค่าดังกล่าวในระบบ ให้พิจารณาว่าระบบเข้าข่ายมีเงื่อนไขที่ช่องโหว่สามารถถูกใช้ประโยชน์ได้ โดยพิจารณาจากการมีคำสั่งในไฟล์ configuration ดังต่อไปนี้
        • add authentication samlIdPProfile
        4.2.2 สำหรับ CVE-2026-4368
        หากตรวจพบการตั้งค่าดังกล่าวในระบบ ให้พิจารณาว่าระบบเข้าข่ายมีเงื่อนไขที่ช่องโหว่สามารถถูกใช้ประโยชน์ได้ โดยพิจารณาจากการมีคำสั่งในไฟล์ configuration ดังต่อไปนี้
        • add authentication vserver
        • add vpn vserver
        4.3 ตรวจสอบและเฝ้าระวังบันทึกเหตุการณ์ (Log) ของระบบ เพื่อค้นหาพฤติกรรมผิดปกติที่อาจเกี่ยวข้องกับการพยายามใช้ช่องโหว่
        4.4 จำกัดการเข้าถึงอุปกรณ์จากเครือข่ายภายนอก และอนุญาตเฉพาะแหล่งที่จำเป็นเท่านั้น

      4. ข้อแนะนำเพิ่มเติม
        แม้ปัจจุบันยังไม่พบรายงานการใช้ประโยชน์จากช่องโหว่ดังกล่าว ณ ปัจจุบัน แต่ช่องโหว่ในระบบ NetScaler เคยถูกนำไปใช้เป็นช่องทางเริ่มต้นในการโจมตีองค์กรมาแล้วหลายครั้งในอดีต ดังนั้น ผู้ไม่หวังดีอาจพัฒนาเครื่องมือเพื่อใช้โจมตีระบบที่ยังไม่ได้อัปเดตในระยะเวลาอันใกล้ ผู้ดูแลระบบจึงควรดำเนินการอัปเดตแพตช์โดยเร็วที่สุด และเฝ้าระวังระบบอย่างต่อเนื่อง

      📢 ThaiCERT ขอแจ้งเตือนองค์กรที่ใช้งานผลิตภัณฑ์ของ Citrix ให้เร่งดำเนินการตรวจสอบและอัปเดตแพตช์ทันที เพื่อป้องกันความเสี่ยงจากการรั่วไหลของข้อมูลและการเข้าถึงระบบโดยไม่ได้รับอนุญาต
      แหล่งอ้างอิง
      [1] https://dg.th/pa1437dq5g
      [2] https://dg.th/ds0mpj3ybk

      NetScaler V2.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ปฏิบัติการตำรวจสากล "Operation Alice" ทลายเครือข่าย Dark Web กว่า 373,000 แห่งที่แสวงหาประโยชน์จากเด็ก

      3140fda9-de05-4215-b5a8-fe9b2d554a76-image.png ปฏิบัติการตำรวจสากล Operation Alice ทลายเครือข่าย Dark .png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • กลุ่ม Nasir Security มุ่งเป้าโจมตีบริษัทพลังงานในตะวันออกกลาง

      e99b2414-b390-4914-aea4-b492d0a15f37-image.png กลุ่ม Nasir Security มุ่งเป้าโจมตีบริษัทพลังงานในต.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • มัลแวร์ใหม่ "CanisterWorm" บุกโจมตีระบบ Kubernetes ผ่าน npm พร้อมปล่อย Kamikaze ลบข้อมูลทำลายระบบ

      fda5d1cc-b6f4-4420-b838-393214fb3fde-image.png มัลแวร์ใหม่ CanisterWorm บุกโจมตีระบบ Kubernetes ผ่าน npm พร.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ด่วน! Ubiquiti แจ้งเตือนช่องโหว่ใน UniFi Network Application ขอให้ผู้ดูแลระบบเร่งดำเนินการตรวจสอบและแก้ไขทันที

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ข้อมูลข่าวสารเกี่ยวกับภัยคุกคามทางไซเบอร์ใน Ubiquiti UniFi Network Application ซึ่งอาจถูกใช้เป็นช่องทางในการโจมตีระบบหรือยกระดับสิทธิ์ของผู้โจมตีได้ จึงขอแจ้งเตือนผู้ดูแลระบบที่เกี่ยวข้องให้เร่งดำเนินการตรวจสอบและแก้ไขโดยเร็วที่สุด

      1. รายละเอียดช่องโหว่
        Ubiquiti ได้เผยแพร่ประกาศด้านความปลอดภัย (Security Advisory Bulletin 062) [1] เกี่ยวกับช่องโหว่ใน Ubiquiti UniFi Network Application โดยมีรายละเอียดดังนี้
        1.1 ช่องโหว่ประเภท Path Traversal ที่หมายเลข CVE-2026-22557 (คะแนน CVSSv3.1: 10.0) [2] ผู้โจมตีสามารถใช้ช่องโหว่นี้เพื่อเข้าถึงไฟล์ภายในระบบได้โดยไม่ได้รับอนุญาต ซึ่งอาจนำไปสู่การเปิดเผยข้อมูลสำคัญ หรือถูกนำไปใช้เพื่อยึดครองบัญชีผู้ใช้งานและระบบได้
        1.2 ช่องโหว่ประเภท Authenticated NoSQL Injection ที่หมายเลข CVE-2026-22558 (คะแนน CVSSv3.1: 7.7) [3] ผู้โจมตีที่มีสิทธิ์เข้าถึงระบบอยู่แล้ว สามารถใช้ช่องโหว่นี้ในการส่งคำสั่งที่เป็นอันตรายผ่านฐานข้อมูล เพื่อยกระดับสิทธิ์ (Privilege Escalation) และเข้าถึงทรัพยากรที่ไม่ได้รับอนุญาต

      2. ผลิตภัณฑ์ที่ได้รับผลกระทบ
        2.1 Official Release: UniFi Network Application เวอร์ชัน 10.1.85 และเวอร์ชันก่อนหน้า
        2.2 Release Candidate: UniFi Network Application เวอร์ชัน 10.2.93 และเวอร์ชันก่อนหน้า
        2.3 UniFi Express (UX): UniFi Network Application เวอร์ชัน 9.0.114 และเวอร์ชันก่อนหน้า

      3. แนวทางการแก้ไข
        ปัจจุบันยังไม่มีวิธีแก้ไขชั่วคราว (Workaround) ที่มีประสิทธิภาพ ผู้ดูแลระบบจึงควรอัปเดต UniFi Network Application เป็นเวอร์ชันที่แก้ไขช่องโหว่แล้วทันที โดยมีรายละเอียดดังนี้
        3.1 Official Release: อัปเดต UniFi Network Application เป็นเวอร์ชัน 10.1.89 หรือใหม่กว่า
        3.2 Release Candidate: อัปเดต UniFi Network Application เป็นเวอร์ชัน 10.2.97 หรือใหม่กว่า
        3.3 UniFi Express (UX): อัปเดตเฟิร์มแวร์ UniFi Express เป็นเวอร์ชัน 4.0.13 หรือใหม่กว่า ซึ่งจะทำให้ UniFi Network Application ถูกอัปเดตเป็นเวอร์ชัน 9.0.118 หรือใหม่กว่า

      4. คำแนะนำด้านความปลอดภัยเพิ่มเติม
        4.1 ตรวจสอบ Log การใช้งานย้อนหลัง เพื่อค้นหาพฤติกรรมผิดปกติหรือความพยายามโจมตี
        4.2 เฝ้าระวังการเข้าถึงระบบจากแหล่งที่ไม่น่าเชื่อถือ
        4.3 จำกัดสิทธิ์ผู้ใช้งานตามหลัก Least Privilege
        4.4 ใช้งานระบบยืนยันตัวตนหลายปัจจัย (Multi-Factor Authentication: MFA) หากรองรับ
        4.5 อัปเดตแพตช์ด้านความปลอดภัยของระบบและซอฟต์แวร์ที่เกี่ยวข้องอย่างสม่ำเสมอ
        4.6 สำรองข้อมูลสำคัญอย่างสม่ำเสมอ เพื่อรองรับกรณีเกิดเหตุการณ์ไม่พึงประสงค์

      5. แหล่งอ้างอิง
        [1] https://dg.th/adm6slfevx
        [2] https://dg.th/e0lg7k23r1
        [3] https://dg.th/fy23zu0q6p

      UniFi.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 25 March 2026

      Energy Sector

      • DoE Publishes 5-Year Energy Security Plan
        "Energy, especially electricity, could be described as the most critical industry – all other critical industries are fundamentally dependent on access to energy. It is essential for peoples’ daily lives (citizens), business operation (economy), and national security (the nation). As such, it is a primary target for criminals, hacktivists, and adversarial nation state actors. The office of Cybersecurity, Energy Security, and Emergency Response (CESER, part of the U.S. Department of Energy) has published a three-pronged 5-year security plan for the fiscal years 2026 to 2030. The three prongs (or goals of the plan) are to develop ‘world-class’ security technologies, to harden the US energy infrastructure, and establish emergency preparedness for response and recovery from incidents."
        https://www.securityweek.com/doe-publishes-5-year-energy-security-plan/
        https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/asset_files/external/ceser-strategic-plan2026-2030.pdf

      Vulnerabilities

      • PTC Warns Of Imminent Threat From Critical Windchill, FlexPLM RCE Bug
        "PTC Inc. is warning of a critical vulnerability in Windchill and FlexPLM, widely used product lifecycle management (PLM) solutions, that could allow remote code execution. The security issue, identified as CVE-2026-4681, could be leveraged through the deserialization of trusted data. Its severity has prompted emergency action from German authorities, with the federal police (BKA) reportedly sending agents to affected companies to alert them to the cybersecurity risk."
        https://www.bleepingcomputer.com/news/security/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/
        https://www.ptc.com/en/about/trust-center/advisory-center/active-advisories/windchill-flexplm-critical-vulnerability
        https://www.heise.de/en/news/WTF-Police-responded-on-Saturday-night-due-to-a-zero-day-11221590.html
      • CVE-2026-3055: Citrix NetScaler ADC And NetScaler Gateway Out-Of-Bounds Read
        "On March 23, 2026, Citrix published a security advisory for a critical vulnerability affecting their NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) products. This vulnerability, CVE-2026-3055, which is classified as an out-of-bounds read and holds a CVSS score of 9.3, allows unauthenticated remote attackers to leak potentially sensitive information from the appliance's memory. The Citrix advisory states that systems configured as a SAML Identity Provider (SAML IDP) are vulnerable, whereas default configurations are unaffected. This SAML IDP configuration is likely a very common configuration for organizations utilizing single sign-on. Per the advisory, organizations can determine if they have an appliance configured as a SAML IDP Profile by inspecting their NetScaler Configuration for the specified string: add authentication samlIdPProfile .*"
        https://www.rapid7.com/blog/post/etr-cve-2026-3055-citrix-netscaler-adc-and-netscaler-gateway-out-of-bounds-read/
        https://thehackernews.com/2026/03/citrix-urges-patching-critical.html
        https://www.infosecurity-magazine.com/news/citrix-patch-netscaler/
        https://www.securityweek.com/critical-citrix-netscaler-vulnerability-poised-for-exploitation-security-firms-warn/
        https://securityaffairs.com/189908/security/citrix-netscaler-critical-flaw-could-leak-data-update-now.html
        https://www.helpnetsecurity.com/2026/03/24/netscaler-adc-gateway-cve-2026-3055/
      • Chrome 146 Update Patches High-Severity Vulnerabilities
        "Google on Monday announced a fresh Chrome 146 update that resolves eight high-severity memory safety vulnerabilities. First on the list is CVE-2026-4673, a heap buffer overflow issue in WebAudio that earned the reporting researcher a $7,000 bug bounty reward. The same researcher discovered and reported CVE-2026-4677, an out-of-bounds read bug in WebAudio, but Google says it has yet to determine the bounty amount to be awarded for it. In fact, the internet giant has disclosed only the amount paid for the first WebAudio flaw, but not the amounts to be handed out for the remaining vulnerabilities."
        https://www.securityweek.com/chrome-146-update-patches-high-severity-vulnerabilities/

      Malware

      • Checkmarx KICS Code Scanner Targeted In Widening Supply Chain Hit
        "Hard on the heels of a broad supply chain attack that impacted the Aqua Security-maintained Trivy open source security-scanner project, Checkmarx on Tuesday disclosed that attackers had compromised a version of Keeping Infrastructure as Code Secure (KICS), the open source static code analysis project that it develops and maintains. Specifically, the cybercriminals infiltrated KICS GitHub Action, which organizations use to run KICS scans within their CI/CD pipelines, and poisoned multiple versions of the software. Any organization that had its automated CI/CD pipelines configured to run the KICS GitHub Action during a four-hour window on the morning of March 23 could potentially be impacted, Checkmarx said."
        https://www.darkreading.com/application-security/checkmarx-kics-code-scanner-widening-supply-chain
        https://checkmarx.com/blog/checkmarx-security-update/
        https://thehackernews.com/2026/03/teampcp-hacks-checkmarx-github-actions.html
      • TeamPCP Isn't Done: Threat Actor Behind Trivy And KICS Compromises Now Hits LiteLLM's 95 Million Monthly Downloads On PyPI
        "On March 24, 2026, Endor Labs identified that litellm versions 1.82.7 and 1.82.8 on PyPI contain malicious code not present in the upstream GitHub repository. litellm is a widely used open source library with over 95 million month downloads. It lets developers route requests across LLM providers through a single API. Both compromised versions include a backdoored file that decodes and executes a hidden payload the moment the file is imported. Version 1.82.8 goes further: it installs a .pth file that runs the payload on any Python invocation, even if litellm is never imported. Version 1.82.6 is the last known-clean release."
        https://www.endorlabs.com/learn/teampcp-isnt-done
        https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/
        https://thehackernews.com/2026/03/teampcp-backdoors-litellm-versions.html
        https://www.theregister.com/2026/03/24/trivy_compromise_litellm/
      • Someone Has Publicly Leaked An Exploit Kit That Can Hack Millions Of iPhones
        "Last week, cybersecurity researchers uncovered a hacking campaign targeting iPhone users that used an advanced hacking tool called DarkSword. Now someone has leaked a newer version of DarkSword and published it on the code-sharing site GitHub. Researchers are warning that this will allow any hacker to easily use the tools to target iPhone users running older versions of Apple’s operating systems who have not yet updated to its latest iOS 26 software. This likely affects hundreds of millions of actively used iPhones and iPads, according to Apple’s own data on out-of-date devices."
        https://techcrunch.com/2026/03/23/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/
        https://cyberscoop.com/darksword-iphone-spyware-leak-ios-18-exploit-threat/
        https://hackread.com/darksword-iphone-exploit-leaked-online/
      • OpenClaw Trap: AI-Assisted Lure Factory Targets Developers & Gamers
        "Netskope Threat Labs identified a link to a malware campaign operating across at multiple GitHub repositories, spanning over 300 delivery packages, including an OpenClaw deployment, an AI developer tool lure, a Telegram-promoted phone tracker, a Fishing Planet game cheat, Roblox scripts, crypto bots, and VPN crackers—all distributing LuaJIT payloads. The lure names suggest AI-assisted generation: obscure biological taxonomy, archaic Latin, and medical terminology applied systematically at scale. Each victim is geolocated, and their desktop screenshot is sent to a server in Frankfurt. We are tracking this cluster as the TroyDen’s Lure Factory."
        https://www.netskope.com/blog/openclaw-trap-ai-assisted-lure-factory-targets-developers-gamers
        https://www.darkreading.com/application-security/github-openclaw-deployer-repo-delivers-trojan
        https://www.helpnetsecurity.com/2026/03/24/github-malware-split-payload/
      • Silver Fox: The Only Tax Audit Where The Fine Print Installs Malware
        "Since early 2025, TDR has focused on tracking Silver Fox, a China-based intrusion set. Originally known for financially motivated attacks, the group has been shifting toward more sophisticated, APT-style operations since at least 2024. This dual focus reflects a broader trend observed throughout 2025, which is the increasingly blurred lines between financially motivated cybercrime operators and state-sponsored espionage. Silver Fox relies on ValleyRAT (aka Winos), which can be considered as its primary modular backdoor. Despite the leak of ValleyRAT builder in March 2025, the intrusion set continued to use it, exploiting zero-day driver plugin and using kernel-mode rootkit likely for intelligence collection. In addition, Silver Fox relies on other malicious payloads like HoldingHands, which is a variant of Gh0st RAT. Rather than replacing ValleyRAT, it appears to be deployed alongside it to achieve specific operational goals."
        https://blog.sekoia.io/silver-fox-the-only-tax-audit-where-the-fine-print-installs-malware/
        https://www.infosecurity-magazine.com/news/silver-fox-cyber-dual-espionage/
      • Fake Install Logs In Npm Packages Load RAT
        "When it comes to supply chain attacks, last year was a lot for software security teams to get their heads around. There were several large scale attacks that struck npm repositories, the most impactful being Shai-hulud — the first open source package repository worm. Then there were several smaller campaigns that didn’t have as big of an impact, but were very important nonetheless. In February 2026, for example, the ReversingLabs research team documented a North Korea connected campaign we dubbed “Graphalgo.” That campaign started in May 2025, and is part of a larger fake job recruiter scheme conducted by North Korea-backed hackers and targeting crypto developers. It is ongoing, phishing developers with fake job interviews and using “coding tests” as a pretext for pushing downloaders to developers’ systems that retrieve a custom remote access trojan (RAT) as the final stage."
        https://www.reversinglabs.com/blog/npm-fake-install-logs-rat
        https://thehackernews.com/2026/03/ghost-campaign-uses-7-npm-packages-to.html
        https://www.infosecurity-magazine.com/news/npm-ghost-campaign-fake-install/
      • From W-2 To BYOVD: How a Tax Search Leads To Kernel-Mode AV/EDR Kill
        "As the saying goes, only two things are guaranteed in life: death and taxes. But, with the April 15 tax filing deadline quickly approaching, there's a third guarantee that threat actors have learned to count on: millions of users searching for the same tax forms, under time pressure, trusting the first Google result they see. During retrospective threat hunting, the Huntress Tactical Response team recently uncovered a large-scale malvertising campaign that has been active since at least January 2026, targeting U.S.-based individuals searching for tax-related documents. The lures are specifically U.S. tax forms (W-2, W-9), and the fake landing pages reference IRS compliance, casting a wide net across employees, freelancers, contractors, and small businesses during filing season. The campaign abuses Google Ads to serve rogue ScreenConnect (ConnectWise Control) installers, ultimately delivering a BYOVD EDR killer that drops a kernel driver to blind security tools before further compromise. Across our customer base, we reported over 60 instances of rogue ScreenConnect sessions tied to this campaign being used as the initial access vector."
        https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill
        https://thehackernews.com/2026/03/tax-search-ads-deliver-screenconnect.html
        Analyzing FAUX#ELEVATE: Threat Actors Target France With CV Lures To Deploy Crypto Miners And Infostealers * Targeting Enterprise Environments
        "Securonix threat researchers have been tracking an ongoing campaign targeting French-speaking corporate environments through fake resumes. The campaign uses highly obfuscated VBScript file disguised as resume/CV documents, delivered through phishing emails. Once executed, the malware deploys a mutli-purpose toolkit that combines credential theft, data exfiltration, and Monero cryptocurrency mining for maximum monetization. What makes this campaign notable is the dropper’s extreme approach to evasion. Of its 224,471 lines, only 266 lines (0.12%) are actual executable code, the remainder consists entirely of junk VBS comments sourced from real English sentences. The malware also uses a domain-join gate using WMI, ensuring that payloads are only delivered on enterprise machines, and standalone home systems are excluded entirely. The campaign uses Dropbox for payload hosting, compromised Moroccan WordPress sites for C2 configuration, and mail.ru SMTP infrastructure for exfiltrating stolen browser credentials and desktop files."
        https://www.securonix.com/blog/faux-elevate-threat-actors-crypto-miners-and-infostealers/
        https://thehackernews.com/2026/03/hackers-use-fake-resumes-to-steal.html
      • Stryker Says Malware Was Involved In Recent Cyberattack As Production Lines Reopen
        "The medical device firm Stryker said it is ramping production lines back up two weeks after alleged Iranian cyber actors wiped more than 200,000 company devices. The company sought to reassure customers in a notice on Monday, sharing a letter from cybersecurity firm Palo Alto Networks confirming that the hackers behind the incident have been removed from Stryker systems. Stryker officials said they are in the process of rebuilding the wiped systems or restoring them from backups predating the known window of compromise to further prevent threat actors from reentering. The impacted systems that have not been restored yet are isolated from the network."
        https://therecord.media/stryker-cyberattack-malware-iran
        https://www.securityweek.com/stryker-says-malicious-file-found-during-probe-into-iran-linked-attack/
      • Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team
        "Since August 2025, Unit 42 has tracked a series of sophisticated phishing campaigns where attackers impersonate Palo Alto Networks talent acquisition staff. These attacks specifically target senior-level professionals by leveraging scraped LinkedIn data to craft highly personalized lures. The specific attack vector uses social engineering to manufacture a bureaucratic barrier regarding the candidate’s curriculum vitae (CV) and push the candidate toward taking actions such as reformatting their resumes for a fee."
        https://unit42.paloaltonetworks.com/phishing-attackers-pose-as-panw-recruiters/
      • Android Devices Ship With Firmware-Level Malware
        "In late February 2026, SophosLabs analysts identified multiple detections on Android devices for malicious activity associated with the Keenadu backdoor. According to Kaspersky, Keenadu is a firmware infection embedded in the libandroid_runtime.so (shared object library) that injects itself into the Zygote process. As Zygote is the parent process for all Android apps, an attacker effectively gains total control over an infected device. Keenadu acts as a downloader for second-stage malware modules that can be used to target the data in multiple applications. All Android apps rely on libandroid_runtime.so to run, so a copy of Keenadu is copied into the address space of every app installed on an infected device."
        https://www.sophos.com/en-us/blog/android-devices-ship-with-firmware-level-malware
      • OpenClaw Developers Targeted In Crypto-Wallet Phishing Attack
        "OX Security has detected an active phishing campaign abusing the OpenClaw name and spreading through GitHub. The threat actor creates fake GitHub accounts, opens issue threads in attacker-controlled repositories, and tags dozens of GitHub developers. The posts claim that recipients have won $5,000 worth of CLAW tokens and can collect them by visiting a linked site and connecting their crypto wallet. The linked site is an almost identical clone of openclaw.ai, with one key difference: it adds a “Connect your wallet” button designed to initiate wallet theft."
        https://www.ox.security/blog/openclaw-github-phishing-crypto-wallet-attack/

      Breaches/Hacks/Leaks

      • Dutch Ministry Of Finance Discloses Breach Affecting Employees
        "The Dutch Ministry of Finance confirmed on Monday that some of its systems were breached in a cyberattack detected last week. Officials said the ministry was notified by a third party of the breach on March 19, and it's still investigating the cyberattack. An ongoing investigation found that the incident affects some employees. "The Ministry of Finance's ICT security detected unauthorized access to systems for a number of primary processes within the policy department on Thursday, March 19," an official statement revealed. "Following the alert, an immediate investigation was launched, and access to these systems has been blocked as of today. This affects the work of a portion of the employees.""
        https://www.bleepingcomputer.com/news/security/dutch-ministry-of-finance-discloses-breach-affecting-employees/
        https://therecord.media/netherlands-finance-ministry-cyberattack-breach
        https://securityaffairs.com/189929/data-breach/data-breach-at-dutch-ministry-of-finance-impacts-staff-following-cyberattack.html
      • HackerOne Discloses Employee Data Breach After Navia Hack
        "Bug bounty platform HackerOne is notifying hundreds of employees that their data was stolen after attackers hacked Navia, one of its U.S. benefits administrators. HackerOne manages over 1,950 bug bounty programs and provides vulnerability disclosure, penetration testing, and code security services to high-profile companies like General Motors, Goldman Sachs, Anthropic, GitHub, and Uber, as well as to U.S. government agencies such as the Department of Defense. Navia is a leading consumer-focused benefits administrator serving over 10,000 employers across the United States."
        https://www.bleepingcomputer.com/news/security/hackerone-discloses-employee-data-breach-after-navia-hack/
        https://hackread.com/hackerone-mazda-infinite-campus-dutch-ministry-data-breaches/
        https://www.theregister.com/2026/03/24/hackerone_supplier_breach/
      • Infinite Campus Warns Of Breach After ShinyHunters Claims Data Theft
        "Infinite Campus, a widely used K-12 student information system, is warning customers of a data breach following an extortion attempt by a threat actor. In the breach notification sent to customers, Infinite Campus states that hackers accessed an employee's Salesforce account, exposing information that was mostly publicly available. The company has not published an official statement, but customers reported the incident on various public platforms."
        https://www.bleepingcomputer.com/news/security/infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft/
      • OVHcloud Founder Denies Massive 590TB Data Breach Claims
        "A major French tech firm, OVHcloud, has been forced to address claims of a massive data breach after a user on a dark web forum boasted about stealing nearly 600 terabytes of its private data. On 23 March 2026, a poster using the name Normal claimed on BreachForums that they had infiltrated the company’s server infrastructure, potentially affecting millions of websites and customers. The scale of the alleged theft is stunning. The hacker claimed to have snatched information belonging to 1.6 million OVH Fresh customers and nearly 6 million active websites. According to the post, this included everything from the internal source code and private databases of these sites to server settings for users in the EU and the US."
        https://hackread.com/ovhcloud-founder-denies-590tb-data-breach-claims/
      • 3.1 Million Impacted By QualDerm Data Breach
        "Healthcare management services provider QualDerm Partners is notifying more than 3.1 million people that their personal, medical, and health insurance information was stolen in a December 2025 data breach. The incident, the company says, was discovered on December 24 and involved unauthorized access to its network for two days. During this window, the attackers exfiltrated certain information from the “limited number of systems” that they compromised, the company notes in an incident notification (PDF)."
        https://www.securityweek.com/3-1-million-impacted-by-qualderm-data-breach/
        https://securityaffairs.com/189917/data-breach/qualderm-partners-december-2025-data-breach-impacts-over-3-million-people.html
      • Iran-Linked Ransomware Gang Targeted US Healthcare Org Amid Military Conflict
        "A U.S. healthcare organization was targeted in late February by an Iranian ransomware gang with ties to the country’s government, according to a new report. Incident responders at Beazley Security helped the unnamed healthcare organization deal with an attack involving the Pay2Key ransomware — a strain used by Iranian actors for a variety of purposes since 2020. Halcyon Ransomware Research Center assisted in the investigation and found several improvements in the ransomware that made it tougher to detect and more damaging."
        https://therecord.media/iran-linked-ransomware-gang-targeted-us-healthcare-org

      General News

      • India’s Evolving Cyber Threat Landscape: State-Sponsored Attacks, Hacktivism, And What’s Next In 2026
        "The India cyber threat landscape 2026 is no longer defined by isolated incidents or opportunistic attacks. It has become a dynamic, constantly shifting battleground shaped by geopolitical tensions, rapid digitization, and highly advanced hackers. What once looked like sporadic cybercrime has matured into a layered ecosystem of state-sponsored cyber attacks, organized ransomware groups, and a growing wave of Hacktivism in India. Recent threat intelligence observations reveal a new pattern: attackers are not only becoming more capable, but also more strategic. They are targeting supply chains, exploiting systemic weaknesses, and adapting their methods faster than most organizations can respond."
        https://cyble.com/blog/india-cyber-threat-landscape-2026-attacks-trends/
      • Measuring Security Performance In Real-Time, Not Once a Quarter
        "Most organizations have invested heavily in security products over the past decade. The assumption embedded in that spending is that more tools equal better protection. Tim Nan, CEO of digiDations, says that assumption is the most persistent misconception he encounters when working with security leaders across industries. “Adversaries don’t operate on averages,” Nan says. “They only need one path that works. The issue isn’t whether your defenses work most of the time. It’s whether they ever fail in a way that can be chained into a real attack.”"
        https://www.helpnetsecurity.com/2026/03/24/tim-nan-digidations-continuous-security-validation/
      • Russian Citizen Sentenced To Prison For Hacking Into U.S. Companies And Enabling Major Cybercrime Groups To Extort Tens Of Millions Of Dollars
        "A court in the Southern District of Indiana today sentenced a Russian citizen, Aleksei Volkov, to 81 months in prison for assisting major cybercrime groups, including the Yanluowang ransomware group, in carrying out numerous attacks against U.S. companies and other organizations. Volkov facilitated dozens of ransomware attacks throughout the United States, causing over $9 million in actual losses and over $24 million in intended losses. Volkov was indicted for this activity in both the Southern District of Indiana and Eastern District of Pennsylvania. Police in Rome, Italy, then arrested Volkov, and he was extradited to the United States. He pleaded guilty to charges from both indictments."
        https://www.justice.gov/opa/pr/russian-citizen-sentenced-prison-hacking-us-companies-and-enabling-major-cybercrime-groups
        https://thehackernews.com/2026/03/us-sentences-russian-hacker-to-675.html
        https://www.bleepingcomputer.com/news/security/yanluowang-ransomware-access-broker-gets-81-months-in-prison/
        https://therecord.media/hacker-russian-ransomware-sentenced-doj
        https://cyberscoop.com/aleksei-volkov-russian-initial-access-broker-sentenced-ransomware/
        https://www.infosecurity-magazine.com/news/russian-initial-access-broker/
        https://securityaffairs.com/189900/cyber-crime/81-month-sentence-for-russian-hacker-behind-major-ransomware-campaigns.html
        https://www.theregister.com/2026/03/24/russian_iab_sentenced/
        https://www.helpnetsecurity.com/2026/03/24/russian-initial-access-broker-sentenced-ransomware-attacks/
      • Ransomware's New Era: Moving At AI Speed
        "Ransomware is not only growing; threat actors are accelerating the pace of their attacks by using offensive tools to exploit valid credentials and hit targets with speed and precision. The practice has undergone big changes over the past five years. Initially, attacks focused on encrypting data; now, threat actors threaten to extract it to pressure victims into paying. Double-extortion tactics quickly shifted to triple-extortion threats to expose stolen data. Threat actors also transitioned from extorting companies to contacting victims directly — whatever it takes to rake in the cash."
        https://www.darkreading.com/endpoint-security/ransomware-new-era-moving-ai-speed
        https://www.halcyon.ai/lp/2026-security-leadership-survey-report
      • Gcore Radar Report Reveals 150% Surge In DDoS Attacks Year-On-Year
        "Gcore, the global infrastructure and software provider for AI, cloud, network, and security solutions, today announced the findings of its Q3-Q4 2025 Gcore Radar report DDoS attack trends. The report reveals growing attack volumes, increasingly sophisticated tactics, and changes in attack locations driven by evolving botnet infrastructure. The DDoS attack landscape is at a clear inflection point: threats are not just growing; they are accelerating and diversifying. To prevent disruption, businesses must act quickly and adopt integrated solutions capable of detecting intent, analysing behaviour, and responding to threats across multiple attack surfaces."
        https://hackread.com/gcore-radar-report-reveals-150-surge-in-ddos-attacks-year-on-year/
      • Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw
        "OpenClaw is an open-source platform for autonomous AI agents that you can self-host and run locally on your machine for task automation. Taking this platform to task, AI agents are now interacting with one another via an experimental social network for AI agents called Moltbook. Even an experienced AI security researcher at Meta learned that OpenClaw is not without its wild-west frontier status. An AI agent accidentally deleted her emails. This news has again put the spotlight on the nature of authority and agency granted to agentic AI systems, as well as the need for better security and governance."
        https://www.securityweek.com/why-agentic-ai-systems-need-better-governance-lessons-from-openclaw/
      • Poland Faced a Surge In Cyberattacks In 2025, Including a Major Assault On The Energy Sector
        "Poland experienced 2½ times more cyberattacks in 2025 compared to the previous year, and the numbers are constantly rising, a government official said Tuesday. The attacks included a destructive infiltration of the country’s energy system in December that was believed to be unprecedented among NATO and European Union members, and was suspected of originating in Russia. Over the last year, Poland was the target of 270,000 cyberattacks, Deputy Minister of Digital Affairs Paweł Olszewski said Tuesday. “We’ve been waging a war in cyberspace for many years now,” the official said. “The number of incidents and attacks has been increasing significantly and radically year after year.”"
        https://www.securityweek.com/poland-faced-a-surge-in-cyberattacks-in-2025-including-a-major-assault-on-the-energy-sector/
      • Iran Built a Vast Camera Network To Control Dissent. Israel Turned It Into a Targeting Tool
        "The role of Israel’s hijacking of Iran’s street cameras in the killing of the country’s supreme leader underscores how surveillance systems are increasingly being targeted by adversaries in wartime. Hundreds of millions of cameras have been installed above shops, in homes and on street corners across the world, many connected to the internet and poorly secured. Recent advances in artificial intelligence have enabled militaries and intelligence agencies to sift through vast amounts of surveillance footage and identify targets. On Feb. 28, Israel vividly demonstrated the potential of such systems to be hacked and used against adversaries when Israel tracked down Iranian leader Ayatollah Ali Khamenei with the help of Tehran’s own street cameras – despite repeated warnings that Iran’s surveillance systems had been compromised, according to interviews and an Associated Press review of leaked data, public statements and news reports."
        https://www.securityweek.com/iran-built-a-vast-camera-network-to-control-dissent-israel-turned-it-into-a-targeting-tool/
      • Enterprise Cybersecurity Software Fails 20% Of The Time, Warns Absolute Security
        "Endpoint cybersecurity software fails to protect one in five enterprise devices, leaving organizations vulnerable to cyber threats, research by Absolute Security has warned. This protection gap means that organizations face the equivalent of 76 days a year in which they’re providing cybercriminals which increased access to their network, potentially leading to data breaches and downtime. The findings come from Absolute Security’s 2026 Resilience Risk Index. The report, published on March 23, is based on analysis of device-level telemetry across tens of millions of enterprise endpoints, which have been validated as using endpoint management and cybersecurity software."
        https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 3cd05966-3688-4c80-9919-7200c8be122b-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เผยแพร่คำแนะนำด้านระบบควบคุมอุตสาหกรรม (ICS) จำนวน 4 รายการ

      Cybersecurity and Infrastructure Security Agency (CISA) ได้เผยแพร่คำแนะนำเกี่ยวกับระบบควบคุมอุตสาหกรรม (ICS) จำนวน 4 รายการ เมื่อวันที่ 24 มีนาคม 2569 เพื่อให้ข้อมูลที่ทันเวลาเกี่ยวกับประเด็นด้านความมั่นคงปลอดภัย ช่องโหว่ และการโจมตีที่เกี่ยวข้องกับระบบ ICS โดยมีรายละเอียดดังนี้

      • ICSMA-26-083-01 Grassroots DICOM (GDCM)
      • ICSA-26-083-01 Pharos Controls Mosaic Show Controller
      • ICSA-26-083-03 Schneider Electric Plant iT/Brewmaxx
      • ICSMA-25-364-01 WHILL Model C2 Electric Wheelchairs and Model F Power Chairs (Update A)

      CISA แนะนำให้ผู้ใช้งานและผู้ดูแลระบบ ตรวจสอบคำแนะนำ ICS ที่เผยแพร่ล่าสุด เพื่อศึกษารายละเอียดทางเทคนิคและแนวทางการลดความเสี่ยง (mitigations)

      อ้างอิง
      https://www.cisa.gov/news-events/ics-advisories 06328786-ed3f-4896-91fb-6ef7ba34734c-image.png

      โพสต์ใน OT Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 24 March 2026

      New Tooling

      • Plumber: Open-Source Scanner Of GitLab CI/CD Pipelines For Compliance Gaps
        "GitLab CI/CD pipelines often accumulate configuration decisions that drift from security baselines over time. Container images get pinned to mutable tags, branches lose protection settings, and required templates go missing. An open-source tool called Plumber automates the detection of those conditions by scanning pipeline configuration and repository settings directly."
        https://www.helpnetsecurity.com/2026/03/23/plumber-open-source-gitlab-ci-cd-compliance-scanner/
        https://github.com/getplumber/plumber

      Vulnerabilities

      • QNAP Patches Four Vulnerabilities Exploited At Pwn2Own
        "QNAP on Friday announced patches for multiple vulnerabilities across its products, including four issues that were demonstrated at the Pwn2Own Ireland hacking contest in October 2025. The four security defects, tracked as CVE-2025-62843 to CVE-2025-62846, impact the company’s SD-WAN routers and were addressed in QuRouter version 2.6.3.009. According to QNAP’s advisory, the first bug requires physical access to a vulnerable device to gain specific privileges, while the second flaw could be exploited over the local network to obtain sensitive information."
        https://www.securityweek.com/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/
        https://securityaffairs.com/189871/security/qnap-fixed-four-vulnerabilities-demonstrated-at-pwn2own-ireland-2025.html
      • We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do With Them
        "AWS Bedrock is Amazon's platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That connectivity is what makes it powerful – but it’s also what makes Bedrock a target. When an AI agent can query your Salesforce instance, trigger a Lambda function, or pull from a SharePoint knowledge base, it becomes a node in your infrastructure - with permissions, with reachability, and with paths that lead to critical assets. The XM Cyber threat research team mapped exactly how attackers could exploit that connectivity inside Bedrock environments. The result: eight validated attack vectors spanning log manipulation, knowledge base compromise, agent hijacking, flow injection, guardrail degradation, and prompt poisoning."
        https://thehackernews.com/2026/03/we-found-eight-attack-vectors-inside.html

      Malware

      • CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran
        "We found a new payload in the TeamPCP arsenal, and this one doesn't just steal credentials or install backdoors. It wipes entire Kubernetes clusters. The script uses the exact same ICP canister (tdtqy-oyaaa-aaaae-af2dq-cai[.]raw[.]icp0[.]io) we documented in the CanisterWorm campaign. Same C2, same backdoor code, same /tmp/pglog drop path. The Kubernetes-native lateral movement via DaemonSets is consistent with TeamPCP's known playbook, but this variant adds something we haven't seen from them before: a geopolitically targeted destructive payload aimed specifically at Iranian systems."
        https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran
        https://www.bleepingcomputer.com/news/security/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks/
      • Trivy Supply Chain Attack Expands To Compromised Docker Images
        "Socket's threat research team has identified additional compromised Trivy artifacts published to Docker Hub, following the recently disclosed GitHub Actions compromise affecting the aquasecurity/trivy-action repository. New image tags 0.69.5 and 0.69.6 were pushed on March 22 without corresponding GitHub releases or tags. Both images contain indicators of compromise associated with the same TeamPCP infostealer observed in earlier stages of this campaign. The latest tag currently points to 0.69.6, which is also compromised. Analysis of the binaries confirms the presence of known IOCs, including the typosquatted C2 domain scan.aquasecurtiy.org, exfiltration artifacts (payload.enc, tpcp.tar.gz), and references to the fallback tpcp-docs GitHub repository."
        https://socket.dev/blog/trivy-docker-images-compromised
        https://opensourcemalware.com/blog/teampcp-aquasec-com-github-org-compromise
        https://thehackernews.com/2026/03/trivy-hack-spreads-infostealer-via.html
        https://www.bleepingcomputer.com/news/security/trivy-supply-chain-attack-spreads-to-docker-github-repos/
        https://www.infosecurity-magazine.com/news/trivy-supply-chain-attack-expands/
        https://securityaffairs.com/189856/uncategorized/44-aqua-security-repositories-defaced-after-trivy-supply-chain-breach.html
      • Green Blood v2.0 Ransomware Analysis With Decryption
        "The Green Blood ransomware group, which has been active since January 2026, has been targeting countries in South Asia, Africa, and parts of South America, and is characterized by its Golang-based ransomware payload. in this post, we will analyze the main characteristics of the Green Blood ransomware, its encryption method, and the technical reasons why it is decryptable, in order to provide insights to help you effectively respond to similar threats in the future. The Green Blood ransomware group, like other ransomware groups, uses file encryption on infected systems to steal sensitive data from victimized organizations, and pressures victims for ransom payments through threatening messages that promise to permanently destroy the encryption key if the ransom is not paid."
        https://asec.ahnlab.com/en/92997/
      • Tycoon2FA Phishing-As-a-Service Platform Persists Following Takedown
        "On March 4, 2026, Europol announced the technical disruption of Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that enabled cybercriminals to bypass multifactor authentication (MFA) and compromise email accounts. Law enforcement authorities from six countries worked with industry partners to seize 330 domains that formed the platform’s core infrastructure. Infrastructure takedowns are a challenging and important aspect of adversary disruption and a centerpiece of law enforcement and private sector cooperation in cybersecurity. In situations where direct physical enforcement actions such as arrests are infeasible, disrupting bad actors' operational means can often be the most efficacious and direct way to impose costs on criminals who otherwise act with relative impunity."
        https://www.crowdstrike.com/en-us/blog/tycoon2fa-phishing-as-a-service-platform-persists-following-takedown/
        https://www.bleepingcomputer.com/news/security/tycoon2fa-phishing-platform-returns-after-recent-police-disruption/
        https://www.infosecurity-magazine.com/news/tycoon2fa-phishing-service-resumes/
        https://www.securityweek.com/tycoon-2fa-fully-operational-despite-law-enforcement-takedown/
      • FBI Warns Of Handala Hackers Using Telegram In Malware Attacks
        "The U.S. Federal Bureau of Investigation (FBI) warned network defenders that Iranian hackers linked to the country's Ministry of Intelligence and Security (MOIS) are using Telegram in malware attacks. In a flash alert issued on Friday, the FBI says Telegram is being used as command-and-control (C2) infrastructure by malware targeting journalists criticizing the Iranian government, Iranian dissidents, and various other oppositional groups worldwide. "Due to the elevated geopolitical climate of the Middle East and current conflict, the FBI is highlighting this MOIS cyber activity," the bureau said."
        https://www.bleepingcomputer.com/news/security/fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks/
        https://www.ic3.gov/CSA/2026/260320.pdf
        https://therecord.media/russia-iran-cyber-fbi-hacks
        https://cyberscoop.com/fbi-iranian-hackers-targeting-opponents-with-telegram-malware/
        https://securityaffairs.com/189820/malware/iran-linked-actors-use-telegram-as-c2-in-malware-attacks-on-dissidents.html
      • Riding The Rails: Threat Actors Abuse Railway.com PaaS As Microsoft 365 Token Attack Infrastructure
        "In partnership with our friends at Flare.io and other contacts across the community, Huntress has attributed the Railway attack to the EvilTokens Phishing as a Service (PhaaS) platform. First advertised on the NOIRLEGACY GROUP telegram channel, EvilTokens spun up its own Telegram channels and made a first public post on February 16th, 2026. This activity corresponds with the first handful of compromises Huntress saw from Railway infrastructure on February 19th and 24th, 2026."
        https://www.huntress.com/blog/railway-paas-m365-token-replay-campaign
        https://cyberscoop.com/huntress-railway-ai-phishing-campaign-compromised-hundreds-of-organizations/
      • How LevelBlue OTX And Cybereason XDR Detected a North Korea-Linked Remote IT Worker
        "Talk about dodging the insider threat from hell. From August 15 to 25, 2025, the SpiderLabs threat intel team, through the integration of LevelBlue OTX threat intelligence with Cybereason XDR behavioral analytics, detected a North Korea attempt to infiltrate an organization by replying to a help wanted ad. Let’s take a look at how this organization, with LevelBlue’s help, was able to detect and block this sneaky infiltration attempt. It took just 10 days for a nation-state threat actor to go from new hire to terminated employee. What appeared to be routine onboarding quickly unraveled when behavioral analytics flagged suspicious login patterns, and threat intelligence confirmed the worst: the organization had unknowingly hired a suspected North Korea-linked operative."
        https://www.levelblue.com/blogs/spiderlabs-blog/how-levelblue-otx-and-cybereason-xdr-detected-a-north-korea-linked-remote-it-worker
        https://hackread.com/north-korean-hacker-remote-it-job-vpn-slip/
      • FriendlyDealer Mimics Official App Stores To Push Unvetted Gambling Apps
        "We’ve identified a huge social-engineering campaign designed to steer people into online gambling sites under the impression they’re installing a legitimate app. We’re calling it FriendlyDealer. It’s been observed across at least 1,500 domains, each hosting a website that impersonates the Google Play or Apple App Store. Users think they’re downloading a gambling app from a trusted source, with all the checks, reviews, and safeguards that implies. But they’re actually still on a website, installing a web app that then redirects them to casino offers through affiliate links."
        https://www.malwarebytes.com/blog/scams/2026/03/friendlydealer-mimics-official-app-stores-to-push-unvetted-gambling-apps
      • Pro-Iranian Nasir Security Is Targeting The Energy Sector In The Middle East
        "Resecurity is tracking a relatively new cybercriminal group called Nasir Security, presumably associated with Iran, that is targeting energy organizations in the Middle East. The energy sector is one of the most impacted areas because of Iranian malicious activity in the region, including the lockdown of the Strait of Hormuz and drone/missile attacks against the energy infrastructure of neighboring countries in the GCC, allies of the US. Based on the artifacts collected by the threat intelligence team at Resecurity, the group is attacking supply chain vendors involved in engineering, safety, and construction. The data stolen as a result of such incidents is authentic but originates from a third party (of the target company), which may lead to incorrect assumptions about the origin of the breach. Notably, the focus of the attacks is centered on the energy sector, which has experienced significant financial and technological damage since the start of the war in Iran. Cyberspace is used to amplify it, following recent attacks against LNG and logistics providers."
        https://www.resecurity.com/blog/article/pro-iranian-nasir-security-is-targeting-the-energy-sector-in-the-middle-east
      • StoatWaffle, Malware Used By WaterPlum
        "WaterPlum is regarded as an attacking group related to North Korea. They are known to have been operating Contagious Interview attacking campaign. WaterPlum can be classified into multiple clusters (or teams), and among them, activity by Team 8 (also known as Moralis or Modilus family) has been observed. In Contagious Interview campaign, Team 8 has been mainly using OtterCookie. Starting around December 2025, Team 8 started using new malware. We named this malware StoatWaffle. In this article, we'll introduce the latest attacking flow for WaterPlum Team 8 and in deep analysis result of StoatWaffle, new malware that they started using just recently."
        https://jp.security.ntt/insights_resources/tech_blog/stoatwaffle_malware_en/
        https://thehackernews.com/2026/03/north-korean-hackers-abuse-vs-code-auto.html
      • When Tax Season Becomes Cyberattack Season: Phishing And Malware Campaigns Using Tax-Related Lures
        "During tax season, threat actors reliably take advantage of the urgency and familiarity of time-sensitive emails, including refund notices, payroll forms, filing reminders, and requests from tax professionals, to trick targets into opening malicious attachments, scanning QR codes, or following multi-step link chains. Every year, there is an observable uptick in tax-themed campaigns as Tax Day (April 15) approaches in the United States, and this year is no different. In recent months, Microsoft Threat Intelligence identified email campaigns using lures around W-2, tax forms, or similar themes, or posing as government tax agencies, tax services firms, and relevant financial institutions. Many campaigns target individuals for personal and financial data theft, but others specifically target accountants and other professionals who handle sensitive documents, have access to financial data, and are accustomed to receiving tax-related emails during this period."
        https://www.microsoft.com/en-us/security/blog/2026/03/19/when-tax-season-becomes-cyberattack-season-phishing-and-malware-campaigns-using-tax-related-lures/
        https://thehackernews.com/2026/03/microsoft-warns-irs-phishing-hits-29000.html
      • Hacker Walks Away With $24.5 Million After Breaching Resolv DeFi Platform
        "Decentralized finance platform Resolv said a recent cyberattack allowed a threat actor to compromise the company’s infrastructure and illicitly create $80 million worth of its USR stablecoin. USR is pegged to the U.S. dollar but plummeted in value on Saturday when the hacker created the uncollateralized coins and traded them for about 11,408 ETH, which is worth about $24.5 million. The company published a statement confirming the incident. USR was depegged from the U.S. dollar after the incident and is now worth about 26 cents."
        https://therecord.media/hacker-breaches-resolv-defi-25-million
      • Russia-Linked Malware Operation Collapses After Security Failures, Developer’s Arrest
        "An Android spyware operation that briefly gained traction in Russia appears to have collapsed within months of its launch after security flaws exposed its infrastructure and authorities arrested its suspected developer, cybersecurity researchers said. The malware, known as ClayRat, was designed for espionage and remote control of infected Android devices. Once installed, it could intercept SMS messages and call logs, access contacts, take photos, record screens, and execute commands sent from a remote command-and-control server. Despite attracting attention shortly after emerging in October 2025, ClayRat’s infrastructure deteriorated rapidly. By December, all known command servers associated with the malware had gone offline, researchers at the Russian cybersecurity firm Solar said in a report released Friday. Solar is a subsidiary of Russian state-owned telecom giant Rostelecom."
        https://therecord.media/russia-malware-arrest-clayrat

      Breaches/Hacks/Leaks

      • Mazda Discloses Security Breach Exposing Employee And Partner Data
        "Mazda Motor Corporation (Mazda) announced that information belonging to its employees and business partners had been exposed in a security incident detected last December. Mazda is one of Japan’s largest automotive manufacturers, with an annual production of 1.2 million vehicles and revenue of nearly $24 billion. The company said the attackers exploited a vulnerability in a system related to warehouse management for parts procured from Thailand. The system did not contain any customer data. Also, the breach is limited to 692 records."
        https://www.bleepingcomputer.com/news/security/mazda-discloses-security-breach-exposing-employee-and-partner-data/
      • Crunchyroll Probes Breach After Hacker Claims To Steal 6.8M Users' Data
        "Popular anime streaming platform Crunchyroll is investigating a breach after hackers claimed to have stolen personal information for approximately 6.8 million people. "We are aware of recent claims and are currently working closely with leading cyber security experts to investigate the matter," Crunchyroll initially told BleepingComputer. "Our investigation is ongoing, and we continue to work with leading cybersecurity experts. At this time, we believe that the information is primarily limited to customer service ticket data following an incident with a third-party vendor," Crunchyroll shared in a later statement."
        https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/
      • Chip Services Firm Trio-Tech Says Subsidiary Hit By Ransomware
        "Semiconductor services firm Trio-Tech says one of its subsidiaries in Singapore fell victim to a ransomware attack. The incident, the company said in a filing with the Securities and Exchange Commission, occurred on March 11 and resulted in the encryption of certain files within its network. The subsidiary, it told the SEC, immediately activated response protocols, proactively taking its systems offline to contain the incident. Additionally, the subsidiary launched an investigation into the attack with help from third-party cybersecurity professionals and notified law enforcement."
        https://www.securityweek.com/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware/
        https://therecord.media/ransomware-trio-tech-semiconductor-sec
        https://www.theregister.com/2026/03/23/us_chip_testing_firm_shrugged/
      • Education Company Kaplan Reports Data Breach Impacting More Than 230,000
        "The educational services company Kaplan told state regulators last week that at least 230,000 people had Social Security and driver’s license numbers leaked following a cybersecurity incident in the fall of 2025. The Florida-based company filed breach notification letters in at least seven states but did not respond to requests for comment about the total number of people impacted by the security incident. The letters sent to victims say law enforcement was called after the incident was discovered and an investigation revealed the hackers had access to Kaplan servers from October 30 to November 18."
        https://therecord.media/kaplan-data-breach-hack-notification

      General News

      • NIST Updates Its DNS Security Guidance For The First Time In Over a Decade
        "DNS infrastructure underpins nearly every network connection an organization makes, yet security configurations for it have gone largely unrevised at the federal guidance level for more than twelve years. NIST published SP 800-81r3, the Secure Domain Name System Deployment Guide, superseding a version that dates to 2013. The document covers three main areas: using DNS as an active security control, securing the DNS protocol itself, and protecting the servers and infrastructure that run DNS services. It is directed at two groups: cybersecurity executives and decision-makers, and the operational networking and security teams who configure and maintain DNS environments."
        https://www.helpnetsecurity.com/2026/03/23/nist-dns-security-guide-sp-800-81r3/
        https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf
      • Your AI Agents Are Moving Sensitive Data. Do You Know Where?
        "In this Help Net Security interview, Gidi Cohen, CEO at Bonfy.AI, addresses what he sees as the most pressing gap in AI agent security: data-layer risk. While the industry focuses on prompt injection and model behavior, Cohen argues the deeper threat is autonomous AI agents operating across systems with no visibility into what data they access, combine, or expose. He explains how Bonfy.AI approaches this through three areas: controlling what data agents can access for grounding, monitoring content as it moves through tool calls and MCP servers, and letting agents query Bonfy in real time to check whether an action is safe before they take it. The conversation covers threat modeling, anomaly detection, multi-agent delegation, model versioning, and practical advice for CISOs navigating pressure to deploy AI at scale."
        https://www.helpnetsecurity.com/2026/03/23/gidi-cohen-bonfy-ai-agent-security/
      • US Soldier Sentenced For Helping North Korean IT Workers
        "A District Court judge sentenced three men for their involvement in a scheme that allowed several North Korean IT workers to use their identities and gain employment at U.S. companies. One of the men, 35-year-old Alexander Paul Travis, was an active duty member of the U.S. Army and was stationed at Fort Gordon in Georgia while participating in the scheme from September 2019, until November 2022. Travis pleaded guilty to accusations that he allowed North Korean IT workers to use his identity on resumes and during employer vetting processes that involved interviews, drug tests and fingerprints. The North Korean IT workers also opened bank accounts in his name to receive payment from employers."
        https://therecord.media/us-soldier-sentencer-for-helping-nk-it-workers
        https://www.bankinfosecurity.com/ex-us-soldier-among-3-sentenced-for-dprk-worker-scam-a-31125
      • 2025 Talos Year In Review: Speed, Scale, And Staying Power
        "The 2025 Talos Year in Review is now available to view online. The pace and scale of adversary activity in 2025 placed sustained pressure on security teams across industries. As with each annual report, our goal at Talos is to provide the security community with a clear analysis of the tactics, techniques, and procedures that shaped adversary operations, and to help organizations prioritize the actions that reduce exposure and strengthen defenses."
        https://blog.talosintelligence.com/2025-talos-year-in-review-speed-scale-and-staying-power/
        https://blog.talosintelligence.com/2025yearinreview
        https://www.theregister.com/2026/03/23/cisco_talos_cybersecurity_report_patch_fast/
      • AI In The SOC: What Could Go Wrong?
        "External, internal, and operational pressures to deploy AI to unlock its promise of increased speed and efficiency has left enterprise cybersecurity professionals in a tough spot — finding they need to enable innovation, while trying to foresee the risks it might introduce. Two enterprise cybersecurity leaders decided to take on the AI challenge and share at this year's RSAC 2026 Conference what they determined it can do well, and what it isn’t ready to take on."
        https://www.darkreading.com/cybersecurity-operations/ai-soc-go-wrong
      • Quantum Threats Are Already Active And The Defense Response Remains Fragmented
        "Enterprises are moving toward post-quantum security at uneven speeds, and the gap between organizations that have built crypto-agility into their infrastructure and those that have adopted the label without the underlying capability is widening. Dr. Tan Teik Guan, CEO of Singapore-based cybersecurity company pQCee, draws a sharp line between the two. Crypto-agility, in his view, requires more than support for multiple algorithms or protocol-level negotiation. It demands the ability to respond with appropriate cryptographic defenses in a cost-effective, timely, and non-disruptive way. That means intelligence, governance, and mitigation working together across a layered defense architecture to maintain a quantum-safe state."
        https://www.helpnetsecurity.com/2026/03/23/ciso-post-quantum-crypto-agility/
      • The Devices Winning The Race To Get Hacked In 2026
        "Enterprise networks keep adding connected devices, expanding the attack surface as threat actors target a wider range of systems, many of which are difficult to inventory, secure, and patch consistently. Forescout’s 2026 Riskiest Devices research maps that shift in IT, IoT, OT, and IoMT environments, with 11 new riskiest asset types entering the list this year. That is the second-largest year-over-year increase on record, and two of the new entries moved straight into the top five riskiest IT assets: serial-to-IP-converters and workstations."
        https://www.helpnetsecurity.com/2026/03/23/connected-devices-security-risk-2026-research/
        https://www.forescout.com/resources/riskiest-devices-2026-report/
      • AI Pulse Poll Reveals Rampant Uncertainty On Enterprise Landscape
        "The artificial landscape remains murky when it comes to accountability, transparency and capabilities for many organizations, as shown in ISACA’s 2026 AI Pulse Poll. The global pulse poll, reflecting responses from more than 3,400 digital trust professionals across IT audit, governance, cybersecurity, privacy and emerging technology roles, finds that even as AI usage accelerates across the enterprise landscape, there appears to be limited human oversight over AI decision-making, little disclosure around AI use, and uncertainty around AI security incident response and accountability for AI system harm. Below are five sneak-peek findings from the 2026 AI Pulse Poll. The full 2026 AI Pulse Poll from ISACA will be released in early May."
        https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2026/ai-pulse-poll-reveals-rampant-uncertainty-on-enterprise-landscape
        https://www.infosecurity-magazine.com/news/cyber-staff-unsure-on-preventing/
      • M-Trends 2026: Data, Insights, And Strategies From The Frontlines
        "Every year, the cyber threat landscape forces defenders to adapt to evolving adversary tactics, techniques, and procedures (TTPs). In 2025, Mandiant observed a clear divergence in adversary pacing that closely aligns with the trends we have been documenting for defenders over the past year. On one end of the spectrum, cyber criminal groups optimized for immediate impact and deliberate recovery denial. On the other end, sophisticated cyber espionage groups and insider threats optimized for extreme persistence, utilizing unmonitored edge devices and native network functionalities to evade detection. Today, we release M-Trends 2026. Grounded in over 500,000 hours of frontline incident investigations conducted by Mandiant globally in 2025, this report provides a definitive look at the TTPs actively being used in breaches today."
        https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026
        https://www.infosecurity-magazine.com/news/high-tech-top-target-cyberattacks/
        https://cyberscoop.com/social-engineering-surge-intrusion-vector-mandiant-m-trends/
        https://www.securityweek.com/m-trends-2026-initial-access-handoff-shrinks-from-hours-to-22-seconds/
        https://www.theregister.com/2026/03/23/voice_phishing_skyrockets_as_smooth/
      • Google Authenticator: The Hidden Mechanisms Of Passwordless Authentication
        "Passwordless authentication is often presented as the end of account takeover. But to understand the real threat landscape, we need to examine how passwordless is actually deployed in the real world. Attackers do not break protocols in theory. They target the most common implementations, the places where usability, scale and architecture intersect. Focusing on one of those common implementations, we examine Google Authenticator. This discussion explores the hidden mechanisms behind synced passkeys and their implementation within the Google ecosystem. Our aim is to help defenders better understand the technology, to lay the groundwork to show how new attack vectors could emerge in a passwordless environment."
        https://unit42.paloaltonetworks.com/passwordless-authentication/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) e8623df9-a9f7-4f12-8dd4-fbb6ee03395d-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🛑 ด่วน! แจ้งเตือนมิจฉาชีพแอบอ้าง Microsoft ใช้ Azure Monitor ส่งอีเมลฟิชชิงแบบ Callback Phishing

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) แจ้งเตือนหน่วยงานและผู้ดูแลระบบเกี่ยวกับการนำบริการ Microsoft Azure Monitor เพื่อส่งอีเมลฟิชชิงแบบ Callback Phishing โดยอีเมลดังกล่าวปลอมเป็นการแจ้งเตือนจากทีมความปลอดภัยหรือฝ่ายเรียกเก็บเงินของ Microsoft เนื้อหาอีเมลอ้างพบบิลหรือรายการเรียกเก็บเงินผิดปกติในบัญชี และเร่งให้ผู้รับติดต่อไปยังหมายเลขโทรศัพท์ที่แนบมา ขอให้ผู้ใช้งานเพิ่มความระมัดระวัง ไม่ติดต่อกลับตามหมายเลขในอีเมล ตรวจสอบข้อเท็จจริงผ่านช่องทางที่เชื่อถือได้ และหลีกเลี่ยงการเปิดเผยข้อมูลสำคัญโดยเด็ดขาด

      1. รายละเอียดเหตุการณ์ [1]
        การโจมตีดังกล่าวเป็นการโจมตีแบบ Callback Phishing โดยผู้โจมตีอาศัยฟังก์ชันการสร้าง Alert ใน Azure Monitor เพื่อกำหนดข้อความหลอกลวงลงในฟิลด์คำอธิบาย (description) ของการแจ้งเตือน จากนั้นตั้งค่าให้ระบบส่งอีเมลแจ้งเตือนไปยังเป้าหมายที่ต้องการ เนื้อหาอีเมลอ้างว่าพบธุรกรรมต้องสงสัย ใบแจ้งหนี้ หรือการเรียกเก็บเงินที่ไม่ได้รับอนุญาต และกดดันให้ผู้ใช้ติดต่อไปยังหมายเลขโทรศัพท์ที่ระบุในข้อความ
        ตัวอย่างข้อความที่พบในการหลอกลวงระบุลักษณะคล้าย “billing and account security notice” พร้อมแจ้งว่าพบการเรียกเก็บเงินผิดปกติ เช่น ค่าใช้จ่ายของ “Windows Defender” มูลค่า 389.90 ดอลลาร์สหรัฐ และอ้างว่าหากไม่รีบดำเนินการอาจถูกระงับบัญชีหรือมีค่าธรรมเนียมเพิ่มเติม เป้าหมายคือหลอกให้ผู้เสียหายติดต่อไปยังหมายเลขโทรศัพท์ของมิจฉาชีพเพื่อเข้าสู่ขั้นตอนหลอกลวงถัดไป

      2. ลักษณะการโจมตีและผลกระทบ
        อีเมลเหล่านี้ไม่ได้ปลอมแปลงโดเมนผู้ส่งแบบทั่วไป แต่ถูกส่งออกจากแพลตฟอร์ม Microsoft Azure Monitor จริง จึงทำให้ส่วนหัวอีเมลและการยืนยันตัวตนดูถูกต้อง นอกจากนี้ผู้โจมตียังใช้ชื่อกฎแจ้งเตือนที่ทำให้ดูคล้ายการแจ้งเตือนอัตโนมัติด้านการชำระเงิน ใบแจ้งหนี้ หรือกิจกรรมในระบบ เพื่อเพิ่มความน่าเชื่อถือและลดความสงสัยของผู้รับ
        แม้รายงานดังกล่าวไม่ได้ยืนยันผลลัพธ์ของการติดต่อในเคสนี้โดยตรง แต่แคมเปญ Callback Phishing ในลักษณะเดียวกันที่ผ่านมาเคยนำไปสู่การขโมยข้อมูลรับรอง การหลอกให้ชำระเงิน หรือการติดตั้งซอฟต์แวร์ควบคุมบนเครื่องของเหยื่อได้ อีกทั้งด้วยธีมอีเมลที่เป็นทางการและเกี่ยวข้องกับองค์กร จึงมีความเป็นไปได้ว่าผู้โจมตีต้องการเข้าถึงเบื้องต้นในเครือข่ายองค์กรเพื่อใช้โจมตีต่อเนื่องในลำดับถัดไป

      3. ผลิตภัณฑ์/บริการที่เกี่ยวข้อง
        กรณีนี้เกี่ยวข้องกับบริการ Microsoft Azure Monitor และ Action Groups/Email Notifications ของระบบแจ้งเตือน ซึ่ง Microsoft ระบุว่าอีเมลแจ้งเตือนจากระบบสามารถถูกส่งจากที่อยู่อีเมล [email protected] ได้ จึงอาจทำให้ผู้ใช้งานเข้าใจผิดว่าเป็นการแจ้งเตือนความปลอดภัยหรือการเงินที่ถูกต้องตามปกติ [2]

      4. แนวทางการป้องกันและลดความเสี่ยง
        4.1 ผู้ใช้งานและเจ้าหน้าที่ Helpdesk ตรวจสอบอีเมลที่อ้างว่าเป็นการแจ้งเตือนจาก Microsoft หรือ Azure โดยเฉพาะกรณีที่แนบหมายเลขโทรศัพท์และเร่งให้ติดต่อเพื่อยืนยันบิล ยกเลิกรายการ หรือแก้ปัญหาบัญชีอย่างเร่งด่วน
        4.2 กำหนดนโยบายภายในองค์กร ไม่ควรติดต่อตามหมายเลขโทรศัพท์ที่ระบุในอีเมลแจ้งเตือน แต่ให้ตรวจสอบผ่านพอร์ทัล Microsoft อย่างเป็นทางการ หรือใช้ช่องทางติดต่อที่องค์กรยืนยันแล้วเท่านั้น
        4.3 ผู้ดูแลระบบอีเมลและ SOC ควรเพิ่มการเฝ้าระวังอีเมลจากผู้ส่งที่เป็นโดเมน Microsoft จริง แต่มีเนื้อหาเรียกเก็บเงินผิดปกติ การขอให้ติดต่อกลับ หรือการใช้ถ้อยคำเร่งด่วนผิดธรรมชาติ
        4.4 หากองค์กรใช้งาน Azure Monitor ควรตรวจสอบการสร้าง Alert Rules และ Action Groups ที่ผิดปกติ รวมถึงรายการอีเมลปลายทางที่ใช้รับการแจ้งเตือน เพื่อค้นหาการใช้งานในทางที่ผิดหรือการตั้งค่าที่ไม่สอดคล้องกับวัตถุประสงค์ของระบบ
        4.5 แจ้งเตือนผู้ใช้งาน “อีเมลจาก Microsoft จริง” ไม่ได้หมายความว่า “เนื้อหาภายในอีเมลนั้นปลอดภัยหรือเป็นของแท้ทั้งหมด” เพราะกรณีนี้อาศัยแพลตฟอร์มที่ถูกต้องในการส่งอีเมล

      5. หากสงสัยว่าได้รับอีเมลลักษณะดังกล่าว
        5.1 ห้ามติดต่อตามหมายเลขโทรศัพท์ในอีเมล ห้ามกดลิงก์ หรือให้ข้อมูลส่วนบุคคล ข้อมูลบัตร หรือข้อมูลบัญชีผู้ใช้
        5.2 ตรวจสอบการเรียกเก็บเงินหรือสถานะบัญชีผ่าน Microsoft/Azure โดยตรง
        5.3 กรณีที่ผู้ใช้งานติดต่อกลับหรือให้ข้อมูลไปแล้ว ควรเปลี่ยนรหัสผ่าน ตรวจสอบบัญชีที่เกี่ยวข้อง และเฝ้าระวังการเข้าถึงหรือติดตั้งโปรแกรมที่ไม่ได้รับอนุญาต
        5.4 ส่งอีเมลที่ต้องสงสัยให้ทีมความมั่นคงปลอดภัยสารสนเทศขององค์กรเพื่อตรวจสอบ

      อ้างอิง
      [1] https://dg.th/e4xncphqrd
      [2] https://dg.th/5uroh2sw7b

      Callback Phishing.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Oracle แจ้งเตือนช่องโหว่ CVE-2026-21992 เพิ่มความเสี่ยงต่อการถูกโจมตีและยึดระบบผ่านเครือข่าย

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ช่องโหว่ด้านความมั่นคงปลอดภัยที่อาจส่งผลกระทบต่อระบบของหน่วยงาน โดยพบช่องโหว่ร้ายแรงในผลิตภัณฑ์ในกลุ่ม Oracle Fusion Middleware โดยเฉพาะระบบจัดการอัตลักษณ์และตัวจัดการเว็บเซอร์วิส ซึ่งสามารถถูกโจมตีผ่านเครือข่ายและนำไปสู่การยึดครองหรือควบคุมระบบได้ จึงขอแนะนำให้ผู้ดูแลระบบเร่งดำเนินการอัปเดตแพตช์เพื่อแก้ไขช่องโหว่โดยทันที

      1. รายละเอียดช่องโหว่
        Oracle ได้เผยแพร่ประกาศด้านความปลอดภัย [1] เกี่ยวกับช่องโหว่ CVE-2026-21992 (คะแนน CVSSv3.1: 9.8) [2] ซึ่งส่งผลกระทบต่อ Oracle Identity Manager ของ Oracle Fusion Middleware (ส่วนประกอบ REST WebServices) และ Oracle Web Services Manager ของ Oracle Fusion Middleware (ส่วนประกอบ Web Services Security) โดยช่องโหว่นี้สามารถถูกใช้เพื่อเข้าควบคุมระบบที่ได้รับผลกระทบได้ผ่านโปรโตคอล HTTP โดยไม่ต้องยืนยันตัวตน (Unauthenticated Remote Exploit) และอาจนำไปสู่การรันโค้ดจากระยะไกล (Remote Code Execution - RCE) ส่งผลให้ผู้โจมตีสามารถยึดครองระบบ Oracle Identity Manager และ Oracle Web Services Manager ได้อย่างสมบูรณ์

      2. ผลิตภัณฑ์ที่ได้รับผลกระทบ
        2.1 Oracle Identity Manager เวอร์ชัน 12.2.1.4.0 และเวอร์ชัน 14.1.2.1.0
        2.2 Oracle Web Services Manager เวอร์ชัน 12.2.1.4.0 และเวอร์ชัน 14.1.2.1.0

      3. แนวทางการแก้ไข
        แนะนำให้ดำเนินการอัปเดตแพตช์จาก Oracle โดยทันที ผ่านชุดอัปเดตของ Fusion Middleware [3] และควรตรวจสอบว่าใช้งานเวอร์ชันที่ยังอยู่ในช่วงการสนับสนุน (Premier / Extended Support) หากไม่สามารถอัปเดตได้ทันที ให้พิจารณามาตรการชั่วคราว (Workaround) ดังนี้

      • จำกัดการเข้าถึงระบบผ่าน HTTP/HTTPS จากภายนอก (เช่น allowlist เฉพาะ IP ที่จำเป็น)
      • ปิดหรือจำกัดการเข้าถึง service ที่ไม่จำเป็น
      • ใช้ Web Application Firewall (WAF) เพื่อช่วยกรองคำขอที่ผิดปกติ
      • แยกระบบ (segmentation) เพื่อลดผลกระทบหากถูกโจมตี
      1. คำแนะนำด้านความปลอดภัยเพิ่มเติม
        4.1 ตรวจสอบ Log การใช้งานย้อนหลัง เพื่อค้นหาพฤติกรรมผิดปกติหรือความพยายามโจมตี
        4.2 เฝ้าระวังการเข้าถึงระบบจากแหล่งที่ไม่น่าเชื่อถือ
        4.3 อัปเดตแพตช์ด้านความปลอดภัยของระบบและซอฟต์แวร์อย่างสม่ำเสมอ
        4.4 จัดทำและทบทวนนโยบายควบคุมการเข้าถึง (Access Control) ให้เหมาะสม
        4.5 จัดทำระบบสำรองข้อมูล (Backup) และทดสอบการกู้คืนอย่างสม่ำเสมอ

      2. แหล่งอ้างอิง
        [1] https://dg.th/gtrvcxjald
        [2] https://dg.th/8uhowa7tmf
        [3] https://dg.th/7dqh5rjcyf

      Oracle.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • WorldLeaks อ้างเจาะระบบเมืองลอสแอนเจลิส ขโมยข้อมูลกว่า 160 GB ขณะที่ Foster City ประกาศภาวะฉุกเฉินหลังถูกแรนซัมแวร์โจมตี

      425a6a0c-40c6-4e80-9df7-2855fcf055ab-image.png WorldLeaks อ้างเจาะระบบเมืองลอสแอนเจลิส ขโมยข้อ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand c568bdcc-4bf4-42ef-9b0b-7eb11c7b4c2d-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบช่องโหว่ “PolyShell” กระทบ Magento และ Adobe Commerce เสี่ยงถูกอัปโหลดไฟล์อันตรายโดยไม่ต้องยืนยันตัวตน

      c5b2f1bb-cfd5-41a0-b2b6-8e81dc25fdbf-image.png พบช่องโหว่ “PolyShell” กระทบ Magento และ Adobe Commerce เสี่ยงถ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand df4f55a9-bd62-442a-9f7d-369bfc874424-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT