NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    3. กระทู้
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 1,932
    • กระทู้ 1,933
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    โพสต์ถูกสร้างโดย NCSA_THAICERT

    • Cyber Threat Intelligence 25 February 2026

      Healthcare Sector

      • Digital Risk Is Now a Clinical Challenge
        "The recent breach of New Zealand's ManageMyHealth patient portal exposed sensitive information from roughly 120,000 people, making it one of the country's most significant healthcare privacy incidents. For affected patients, the consequences are deeply personal and potentially lifelong. Unlike a stolen credit card, you can't reset your medical history."
        https://www.bankinfosecurity.com/blogs/digital-risk-now-clinical-challenge-p-4051

      Industrial Sector

      • Bring The Fight To The Edge: Turning Time Into An Advantage In OT Security
        "Industrial organizations are facing a growing paradox in cybersecurity. While operational technology (OT) environments are increasingly connected, most security strategies still assume threats will only materialize once attackers reach the plant floor. In reality, attacks that disrupt industrial operations rarely begin in OT environments. They originate upstream, progress over time and frequently exploit the persistent assumption of isolation. This shift fundamentally changes how defenders must think about visibility, detection and response across Information Technology (IT) and OT domains."
        https://unit42.paloaltonetworks.com/ot-edge-security/
        https://www.paloaltonetworks.com/resources/whitepapers/securing-ot-environments

      New Tooling

      • Explore, Analyse And Correlate Malware At Scale With Azul
        "The Australian Signals Directorate (ASD) has publicly released its open‑source malware analysis tool called Azul. Azul enables government and private sector partners to collaborate on threat understanding, quickly identify common malware behaviours, and improve the speed and precision of response activities."
        https://www.cyber.gov.au/about-us/view-all-content/news/explore-analyse-and-correlate-malware-at-scale-with-azul
        https://www.cyber.gov.au/business-government/detecting-responding-to-threats/cyber-security-incident-response/azul-malware-analysis-tool
        https://github.com/AustralianCyberSecurityCentre/azul

      Vulnerabilities

      • Critical SolarWinds Serv-U Flaws Offer Root Access To Servers
        "SolarWinds has released security updates to patch four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. Serv-U is the company's self-hosted Windows and Linux file transfer software that comes with both Managed File Transfer (MFT) and FTP server capabilities, enabling organizations to securely exchange files via FTP, FTPS, SFTP, and HTTP/S. The most severe of the four security flaws patched by SolarWinds today in Serv-U 15.5.4 is tracked as CVE-2025-40538, and it allows attackers with high privileges to gain root or admin permissions on vulnerable servers."
        https://www.bleepingcomputer.com/news/security/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers/
        https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-4_release_notes.htm
        https://securityaffairs.com/188454/hacking/solarwinds-patches-four-critical-serv-u-flaws-enabling-root-access.html
        https://www.theregister.com/2026/02/24/patch_these_4_critical_makemeroot/
      • CISA Adds One Known Exploited Vulnerability To Catalog
        "CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2026-25108 Soliton Systems K.K. FileZen OS Command Injection Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/02/24/cisa-adds-one-known-exploited-vulnerability-catalog
      • VMware Aria Operations Vulnerability Could Allow Remote Code Execution
        "Broadcom has released patches for several vulnerabilities affecting VMware Aria Operations, including high-severity flaws. The most important of the newly patched vulnerabilities based on CVSS score (8.1) is CVE-2026-22719, a command injection issue that can be exploited by an unauthenticated attacker. “A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress,” Broadcom explained in its advisory."
        https://www.securityweek.com/vmware-aria-operations-vulnerability-could-allow-remote-code-execution/
        https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947
        https://securityaffairs.com/188445/security/vmware-aria-operations-flaws-could-enable-remote-attacks.html
      • Astro Full-Read SSRF Via Host Header Injection
        "Astro is a JavaScript frontend and backend framework in use by many large organizations for making website development much easier. Recently, one of the agents in our Aikido Attack product identified a medium-severity vulnerability in the server-side implementation of this framework. It made any servers directly accessible by the attacker vulnerable to Server-Side Request Forgery (SSRF)."
        https://www.aikido.dev/blog/astro-full-read-ssrf-via-host-header-injection

      Malware

      • SURXRAT: Android RAT Downloads Large LLM Module From Hugging Face To Impact Device Performance
        "SURXRAT is an actively developed Android Remote Access Trojan (RAT) commercially distributed through a Telegram-based malware-as-a-service (MaaS) ecosystem under the SURXRAT V5 branding. The malware is marketed using structured reseller and partner licensing tiers, allowing affiliates to generate and distribute customized builds while the operator maintains centralized infrastructure and operational control. This distribution model reflects the increasing professionalization of the Android threat landscape, where malware developers focus on scalability and monetization through affiliate-driven campaigns."
        https://cyble.com/blog/surxrat-downloads-large-llm-module-from-hugging-face/
      • Refund Scam Impersonates Avast To Harvest Credit Card Details
        "A fraudulent website dressed in Avast’s brand is tricking French-speaking users into handing over their full credit card details—card number, expiry date, and three-digit security code—under the cover story of processing a €499.99 refund that was never owed to them. The operation combines live chat “support,” a hardcoded alarming transaction amount, and a convincing replica of Avast’s visual identity to create urgency and harvest payment data at scale."
        https://www.malwarebytes.com/blog/threat-intel/2026/02/refund-scam-impersonates-avast-to-harvest-credit-card-details
      • 1Campaign: A New Cloaking Platform Helping Attackers Abuse Google Ads
        "Varonis Threat Labs uncovered 1Campaign, a full-service cloaking platform built to help threat actors run malicious Google Ads at scale. The tool passes Google's screening, filters out security researchers, and keeps phishing and crypto drainer pages online for as long as possible, funneling real users to attacker-controlled sites. The developer behind it, operating under the handle DuppyMeister, has been maintaining the platform for over three years with dedicated Telegram channels for support. It combines real-time visitor filtering, fraud scoring, geographic targeting, and a bot guard script generator into a single dashboard."
        https://www.varonis.com/blog/1campaign
        https://www.bleepingcomputer.com/news/security/1campaign-platform-helps-malicious-google-ads-evade-detection/
      • North Korean Lazarus Group Now Working With Medusa Ransomware
        "North Korean state-backed attackers are now using the Medusa ransomware and are continuing to mount extortion attacks on the U.S. healthcare sector. North Korea has long been involved in ransomware attacks and has been previously associated with the Maui and Play ransomware families. However, the Symantec and Carbon Black Threat Hunter Team has uncovered evidence North Korean actors using Medusa in an attack on a target in the Middle East. The same attackers also mounted an unsuccessful attack against a healthcare organization in the U.S."
        https://www.security.com/threat-intelligence/lazarus-medusa-ransomware
        https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/
        https://thehackernews.com/2026/02/lazarus-group-uses-medusa-ransomware-in.html
        https://www.darkreading.com/cyberattacks-data-breaches/lazarus-group-new-position-medusa-ransomware
        https://therecord.media/north-korean-hackers-using-medusa-ransomware
        https://www.bankinfosecurity.com/north-korean-hackers-continue-to-target-us-healthcare-a-30832
        https://www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/
        https://www.theregister.com/2026/02/24/north_koreas_lazarus_group_healthcare_medusa_ransomware/
      • Diesel Vortex: Inside The Russian Cybercrime Group Targeting US & EU Freight
        "In February 2026, Have I Been Squatted, in joint collaboration with Ctrl-Alt-Intel, uncovered a sophisticated criminal phishing operation run by a Russian threat actor group we are designating Diesel Vortex. The group spent at least five months systematically targeting freight and logistics companies across the United States and Europe, stealing over 1,600 unique login credentials from users of major logistics platforms including DAT Truckstop, Penske Logistics, Electronic Funds Source (EFS), and Timocom. Telegram webhook logs recovered from the platform show Armenian-language coordination among operators, indicating an Armenian-speaking component alongside the Russian infrastructure ties."
        https://haveibeensquatted.com/blog/diesel-vortex-inside-the-russian-cybercrime-group-targeting-us-eu-freight
        https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/
        https://therecord.media/phishing-operation-russia-armenia-targeting-us-european-cargo
      • Punchbowl Phishing Attack Explained: How Digital Invites Are Used To Steal Credentials
        "In today's digital age, receiving online invitations to events has become commonplace. Sending and receiving invites has never been more convenient. However, not all electronic invitations are as trustworthy as they may appear. Punchbowl and Paperless Post are two of the largest digital invitation platforms, enabling individuals and organizations to create customized invitations, track RSVPs, and send event updates. Unfortunately, these trusted platforms also provide threat actors with an opportunity to exploit brand familiarity, particularly during certain seasons when digital invitations surge."
        https://cofense.com/blog/punchbowl-phishing-attack-explained-how-digital-invites-are-used-to-steal-credentials
      • ZeroDayRAT: A Next-Generation Mobile Espionage And Financial Theft Platform
        "The MaaS (Malware as a Service) model continues to evolve in the world of cybercrime. This new mobile spyware platform, dubbed “ZeroDayRAT” and examined by Cyberthint researchers, allows anyone without technical expertise to become an advanced cyber spy. Actively marketed through Telegram channels since February 2, 2026, this platform targets Android and iOS devices, combining real-time surveillance with direct financial theft within a single browser panel."
        https://cyberthint.io/zerodayrat-a-next-generation-mobile-espionage-and-financial-theft-platform/
        https://hackread.com/zerodayrat-malware-monitoring-android-ios-devices/
      • Fake Zoom Meeting “update” Silently Installs Surveillance Software
        "A fake Zoom meeting website is silently pushing surveillance software onto Windows machines. Visitors land on a convincing imitation of a Zoom video call. Moments later, an automatic “Update Available” countdown downloads a malicious installer—without asking for permission. The software being installed is a covert build of Teramind, a commercial monitoring tool companies use to record what employees do on work computers. In this campaign, it is being quietly dropped onto the machines of ordinary people who thought they were joining a meeting."
        https://www.malwarebytes.com/blog/scams/2026/02/fake-zoom-meeting-update-silently-installs-surveillance-software
      • RoguePilot: Exploiting GitHub Copilot For a Repository Takeover
        "We forced GitHub to prompt-inject itself. It allowed us to control Copilot’s responses and exfiltrate Codespaces’ GITHUB_TOKEN secret. The end result was a repository takeover. This vulnerability is a type of Passive Prompt Injection, where malicious instructions are embedded in data, content, or environments that the model later processes automatically, without any direct interaction from the attacker."
        https://orca.security/resources/blog/roguepilot-github-copilot-vulnerability/
        https://thehackernews.com/2026/02/roguepilot-flaw-in-github-codespaces.html
        https://www.securityweek.com/github-issues-abused-in-copilot-attack-leading-to-repository-takeover/
      • Mercenary Akula Hits Ukraine-Supporting Financial Institution
        "BlueVoyant’s Security Operations Center (BVSOC) recently identified and responded to a targeted social engineering attack on a European financial institution involved in regional development and reconstruction initiatives. The attack exhibits hallmarks of activity attributed to the Russia-aligned Mercenary Akula (tracked by CERT UA as UAC-0050), a financially motivated mercenary entity also linked to cyber espionage and psychological operations. The attack spoofed a Ukrainian judicial domain to deliver an email containing a link to a remote access payload. The target was a senior legal and policy advisor involved in procurement, a role with privileged insight into institutional operations and financial mechanisms."
        https://www.bluevoyant.com/blog/mercenary-akula-hits-financial-institution
        https://thehackernews.com/2026/02/uac-0050-targets-european-financial.html
      • UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor And MarsSnake Backdoors
        "The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. "The group used several unique and rare instruments of Chinese origin," researchers Alexander Badaev and Maxim Shamanov said."
        https://thehackernews.com/2026/02/unsolicitedbooker-targets-central-asian.html
      • UAE Claims It Stopped ‘terrorist’ Ransomware Attack
        "The United Arab Emirates said it stopped a ransomware attack this weekend that allegedly targeted the country’s digital infrastructure. The country’s Cyber Security Council published a statement on Saturday that said they “successfully thwarted organized cyberattacks of a terrorist nature that targeted the country’s digital infrastructure and vital sectors in an attempt to destabilize the nation and disrupt essential services.”"
        https://therecord.media/uae-claims-it-stopped-terrorist-ransomware-attack
      • Fake Homebrew Typosquats Used To Deliver Cuckoo Stealer Via ClickFix
        "ClickFix has become a reliable trick for attackers who don't want to fight the operating system. Instead of exploiting software, they exploit habits. A fake web page shows what looks like a normal installation command. The user clicks "Copy," pastes it into Terminal, and the attack runs with the victim's own hands. In this case, the lure was Homebrew. We started with a single typosquatted domain and pivoted outward using Hunt.io. What looked like one fake install page turned out to be a coordinated infrastructure cluster delivering a credential-harvesting loader and a second-stage macOS infostealer we've designated Cuckoo Stealer."
        https://hunt.io/blog/fake-homebrew-clickfix-cuckoo-stealer-macos
      • 2025: The Untold Stories Of Check Point Research
        "Check Point Research (CPR) continuously tracks threats, following the clues that lead to major players and incidents in the threat landscape. Whether it’s high-end financially-motivated campaigns or state-sponsored activity, our focus is to figure out what the threat is, report our findings to the relevant parties, and make sure Check Point customers stay protected. Some of our work naturally makes it into the spotlight through public reports and deep blog posts. However, a large portion of what we uncover remains in the shadows but is used on a day-to-day basis to improve protections, connect the dots between incidents, and keep a watchful eye on known threat actors and infrastructure."
        https://research.checkpoint.com/2026/2025-the-untold-stories-of-check-point-research/

      Breaches/Hacks/Leaks

      • Wynn Resorts Confirms Employee Data Breach After Extortion Threat
        "Wynn Resorts has confirmed that a hacker stole employee data from its systems after the company was listed on the ShinyHunters extortion gang's data leak site. In a statement shared today, the company said it activated its incident response procedures and launched an investigation, with assistance from external cybersecurity experts, after discovering the breach. "We have learned that an unauthorized third party acquired certain employee data," reads a statement shared with BleepingComputer."
        https://www.bleepingcomputer.com/news/security/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/
      • ShinyHunters Extortion Gang Claims Odido Breach Affecting Millions
        "The ShinyHunters extortion gang has claimed responsibility for breaching Dutch telecommunications provider Odido and stealing millions of user records from its compromised systems. Odido is one of the largest telecommunications companies in the Netherlands and offers mobile, broadband, and television services to millions of customers nationwide. The company disclosed the breach on February 12, revealing that attackers downloaded the personal data of many of its users after gaining access to its customer contact system on February 7. However, Odido added that no Mijn Odido passwords, call details, location, data, billing data, or scans of identity documents were exposed during the incident."
        https://www.bleepingcomputer.com/news/security/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/

      General News

      • Security And Complexity Slow The Next Phase Of Enterprise AI Agent Adoption
        "Enterprise AI agents are embedded in routine business processes, particularly inside engineering and IT operations. Many organizations report active production deployments, and agent development ranks high on strategic agendas. A new study from Docker, The State of Agentic AI Report, examines how enterprises are deploying agentic systems and the challenges emerging as deployments scale. The data shows that 60% of organizations run AI agents in production environments. Nearly all describe building agents as a strategic priority."
        https://www.helpnetsecurity.com/2026/02/24/ai-agents-business-processes-security-complexity/
      • Faking It On The Phone: How To Tell If a Voice Call Is AI Or Not
        "There was a time when we could believe everything we saw and heard. Unfortunately, those days are probably long gone. Generative AI (GenAI) has democratized the creation of deepfake audio and video, to the point where generating a fabricated clip is as easy as pushing a button or two. This is bad news for everyone, including businesses. Deepfakes are helping scammers bypass Know Your Customer and account authentication checks. They can even enable malicious state actors to masquerade as job candidates. But arguably the biggest threat they pose is financial/wire transfer fraud and the hijacking of executive accounts."
        https://www.welivesecurity.com/en/business-security/faking-it-phone-how-tell-voice-call-ai/
      • CrowdStrike Says Attackers Are Moving Through Networks In Under 30 Minutes
        "Cyberattacks reached victims faster and came from a wider range of threat groups than ever last year, CrowdStrike said in its annual global threat report released Tuesday, adding that cybercriminals and nation-states increasingly relied on predictable tactics to evade detection by exploiting trusted systems. The average breakout time — how long it took financially-motivated attackers to move from initial intrusion to other network systems — dropped to 29 minutes in 2025, a 65% increase in speed from the year prior. “The fastest breakout time a year ago was 51 seconds. This year it’s 27 seconds,” Adam Meyers, head of counter adversary operations at CrowdStrike, told CyberScoop."
        https://cyberscoop.com/crowdstrike-annual-global-threat-report-attack-breakout-time/
        https://www.crowdstrike.com/explore/2026-global-threat-report
        https://www.darkreading.com/cyber-risk/attackers-now-need-just-29-minutes-to-own-a-network
        https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/
      • Why SOCs Are Moving Toward Autonomous Security Operations In 2026
        "The modern security operations center faces a crisis of scale that human effort cannot fix. With alert volumes exponentially growing and threat actors automating their attacks, organizations must pivot to autonomous SOC strategies. This shift to AI-driven defense is the only way to survive the operational realities of 2026."
        https://www.helpnetsecurity.com/2026/02/24/socs-autonomous-security-operations-strategies/
      • AI Is Becoming Part Of Everyday Criminal Workflows
        "Underground forums include long threads about chatbots drafting phishing emails, generating code snippets, and coaching social engineering calls. A new study examined conversations captured between January 1, 2025 and July 31, 2025 across dozens of cybercrime forums to map how AI tools are entering day to day criminal operations."
        https://www.helpnetsecurity.com/2026/02/24/ai-in-cybercrime-research/
        https://arxiv.org/pdf/2602.14783
      • January 2026 Threat Trend Report On APT Attacks (South Korea)
        "Ahnlabs is monitoring APT (Advanced Persistent Threat) attacks in South Korea by utilizing their own infrastructure. This report covers the classification, statistics, and features of APT attacks in South Korea that were identified in January 2026."
        https://asec.ahnlab.com/en/92685/
      • Nowhere, Man: The 2026 Active Adversary Report
        "In a world where so much changes rapidly, it can be interesting and informative to identify when things stay the same. Throughout 2025 many people claimed — as they have for a couple of years now — that this was going to be the year in which AI was going to make a meaningful difference in the threat landscape. Aside from some provable uses of AI to supercharge phishing and other social scams, and a fair number of overdramatic headlines, it just didn't happen. This year’s Active Adversary Report details what happened instead — including a change that does demand your attention."
        https://www.sophos.com/en-us/blog/2026-sophos-active-adversary-report
        https://www.bankinfosecurity.com/hackers-gain-speed-major-new-tradecraft-using-ai-tools-a-30838
      • As Cybersecurity Firms Chase AI, VC Market Skyrockets
        "The cybersecurity venture capital market experienced unprecedented activity in 2025, driven primarily by the rush to AI-native security solutions and a massive surge in mergers and acquisitions that reached record levels. In 2025, VC firms invested $119 billion in cybersecurity businesses, with 400 M&A transactions accounting for the majority of funding and another 820 financing deals totaling nearly $21 billion, according to data from Momentum Cyber, a cybersecurity investment bank. The total value of M&A, financing, and IPO activity in 2025 nearly tripled that of deals in the previous year."
        https://www.darkreading.com/cybersecurity-analytics/cybersecurity-firms-chase-ai-vc-market-skyrockets
      • More Than Dashboards: AI Decisions Must Be Provable
        "Enterprise leaders are asking a blunt question about artificial intelligence (AI) systems: What did it actually do? Not what it was designed to do. Not what the dashboard says it usually does. But what actually happened at the moment the system acted. As AI systems are deployed into regulated and high-risk environments, that question stops being theoretical. Boards, auditors, and regulators increasingly expect organizations to account for specific AI decisions, not just overall performance or intent."
        https://www.darkreading.com/cyber-risk/more-dashboards-ai-decisions-provable
      • Cost Of Insider Incidents Surges 20% To Nearly $20m
        "Employee negligence driven by shadow AI cost organizations more than any other type of insider risk last year, accounting for 53% of the $19.5m lost on average per business, according to DTEX. The security vendor’s Cost of Insider Risks 2026 report was produced by the Ponemon Institute and based on interviews with 8750 IT and security practitioners in 354 global organizations. Malicious incidents such as sabotage, data theft, fraud and unauthorized disclosure accounted for 27% ($4.7m) of the total lost to insider risks last year, DTEX claimed."
        https://www.infosecurity-magazine.com/news/cost-of-insider-incidents-surges/
      • AI Accelerates Attacker Breakout Time To Just Four Minutes
        "AI is helping threat actors to accelerate attacks, but it can also empower incident responders to quickly contain threats, ReliaQuest has claimed in a new report. The firm's Annual Cyber-Threat Report 2026 is based on an analysis of customer incidents. It found that breakout time last year took on average just 34 minutes; 29% quicker than in 2024. The fastest ever recorded time taken from access to lateral movement was just four minutes – 85% faster than the year before. The fastest recorded exfiltration time was just six minutes; down from 4 hours 29 minutes in 2024."
        https://www.infosecurity-magazine.com/news/ai-accelerates-attack-breakout/
        https://reliaquest.com/campaigns/annual-threat-report-2026/
      • US ‘committed’ To Fighting Transnational Gangs Behind Southeast Asian Scam Compounds: FBI
        "The U.S. is “fully committed to leading the global fight” against the transnational criminal networks that have set up scamming compounds throughout Southeast Asia, a senior FBI official said Tuesday. Scott Schelble, the deputy assistant director of the FBI’s International Operations Division, told reporters that he recently met with law enforcement officials in Thailand, Cambodia and Vietnam to discuss the region’s scam operations."
        https://therecord.media/us-committed-to-fighting-southeast-asia-scam-compounds
      • Turn Dependabot Off
        "Dependabot is a noise machine. It makes you feel like you’re doing work, but you’re actually discouraging more useful work. This is especially true for security alerts in the Go ecosystem. I recommend turning it off and replacing it with a pair of scheduled GitHub Actions, one running govulncheck, and the other running your test suite against the latest version of your dependencies."
        https://words.filippo.io/dependabot/
        https://www.theregister.com/2026/02/24/github_dependabot_noise_machine/
      • 2026 GreyNoise State Of The Edge Report: Where Attacks Concentrate And Defenses Fall Short
        "GreyNoise analyzed 2.97 billion sessions over 162 days in H2 2025, and the patterns reveal where edge defenses hold up — and where they fall short. The data exposes specific concentration points in VPN targeting, infrastructure sourcing, and exploitation behavior that challenge conventional defensive assumptions."
        https://www.greynoise.io/blog/2026-greynoise-state-of-the-edge-report-where-attacks-concentrate-defenses-fall-short

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) f41a7f2a-52a4-4d3a-a0f5-29fde30a43bc-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 24 February 2026

      New Tooling

      • Coroot: Open-Source Observability And APM Tool
        "Coroot is an open-source observability and application performance monitoring tool. The core software, published in Go and accompanied by companion repositories such as coroot-node-agent, focuses on collecting telemetry data across systems. It uses extended Berkeley Packet Filter (eBPF) technology to gather metrics and trace inter-service communications without manual instrumentation of application code. Coroot collects standard observability signals that engineering teams rely on. The software aggregates metrics, logs, traces, and continuous profiling data and makes them available in dashboards and structured views. Users can track service health, follow request paths through service maps, and examine performance profiles down to CPU and memory behavior over time."
        https://www.helpnetsecurity.com/2026/02/23/coroot-open-source-observability-apm-tool/
        https://github.com/coroot/coroot

      Vulnerabilities

      • Android Mental Health Apps With 14.7M Installs Filled With Security Flaws
        "Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users’ sensitive medical information. In one of the apps, security researchers discovered more than 85 medium- and high-severity vulnerabilities that could be exploited to compromise users’ therapy data and privacy. Some of the products are AI companions designed to help people suffering from clinical depression, multiple forms of anxiety, panic attacks, stress, and bipolar disorder."
        https://www.bleepingcomputer.com/news/security/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/

      Malware

      • PII Pillage: How Attackers Use BitPanda To Plunder Credentials
        "Given cryptocurrency’s rise in popularity, it has slowly worked its way into the mainstream economy. Coins such as Bitcoin, Ethereum, Sol, and other digital currencies are commonly used in place of traditional currencies to complete transactions. To help manage transactions, an individual will need brokerage apps and services to ensure a safe, smooth, and secure money flow. But what happens when a new method of payment becomes mainstream? Attackers will try to find a way to exploit these systems and take advantage of individuals."
        https://cofense.com/blog/pii-pillage-how-attackers-use-bitpanda-to-plunder-credentials
      • New Large-Scale OpenClaw Malware Campaign Spreading On ClawHub
        "OpenGuardrails has identified a new, rapidly spreading malware campaign targeting the OpenClaw ecosystem through the ClawHub skill community."
        https://openguardrails.com/blog/clawhub-trojan-liucomment-malware-campaign
        https://www.helpnetsecurity.com/2026/02/23/clawhub-malicious-comment-infostealer/
      • From ‘svchoss’ To P(a)yday
        "Alertness and vigilance are crucial in cybersecurity. When repeating this truism, most of us think about social engineering attacks and educating the user how to recognize a phishing mail or a scam call. However, an attentive user can also provide valuable insights on a more technical aspect. A recent incident response case was started, when the user noticed „strange black windows” on the desktop and took screenshots of them. This was accompanied by PayPal transfers from the user’s account, not authorized by the user."
        https://www.secuinfra.com/en/techtalk/from-svchoss-to-payday/
        https://www.infosecurity-magazine.com/news/fraud-investigation-python-malware/
      • Fake Huorong Security Site Infects Users With ValleyRAT
        "A convincing lookalike of the popular Huorong Security antivirus has been used to deliver ValleyRAT, a sophisticated Remote Access Trojan (RAT) built on the Winos4.0 framework, to users who believed they were improving their security. The campaign, attributed to the Silver Fox APT group—a Chinese-speaking threat group known for distributing trojanized versions of popular Chinese software—uses a typosquatted domain to serve a trojanized NSIS installer that deploys a full-featured backdoor with advanced user-mode stealth and injection capabilities."
        https://www.malwarebytes.com/blog/scams/2026/02/huorong
      • Built On ClawHub, Spread On Moltbook: The New Agent-To-Agent Attack Chain
        "Claude Skills have rapidly emerged as one of the most powerful ways to extend Claude's capabilities, enabling users to automate workflows, interact with external services, and build custom tooling directly within the Claude ecosystem. Platforms like clawhub.ai have accelerated this adoption by providing a centralized marketplace for discovering, sharing, and deploying community-built skills. However, our research at Straiker reveals a darker reality lurking beneath the surface. Through systematic analysis of publicly available skills on clawhub.ai, we uncovered a significant number of malicious, deceptive, and high-risk skills actively being distributed to unsuspecting users."
        https://www.straiker.ai/blog/built-on-clawhub-spread-on-moltbook-the-new-agent-to-agent-attack-chain
        https://www.securityweek.com/autonomous-ai-agents-provide-new-class-of-supply-chain-attack/
      • APT28 Targeted European Entities Using Webhook-Based Macro Malware
        "The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. "The campaign relies on basic tooling and the exploitation of legitimate services for infrastructure and data exfiltration," the cybersecurity company said."
        https://thehackernews.com/2026/02/apt28-targeted-european-entities-using.html
      • SANDWORM_MODE: Shai-Hulud-Style Npm Worm Hijacks CI Workflows And Poisons AI Toolchains
        "An active Shai-Hulud-like supply chain worm campaign spreads via typosquatting and AI toolchain poisoning, across at least 19 malicious npm packages and linked to two npm aliases. The sample retains Shai-Hulud hallmarks and adds GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation fallback, MCP server injection with embedded prompt injection targeting AI coding assistants, and LLM API Key harvesting."
        https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning
        https://thehackernews.com/2026/02/malicious-npm-packages-harvest-crypto.html
        https://www.infosecurity-magazine.com/news/shai-hulud-like-worm-devs-npm-ai/
      • Would You Click ‘Accept’? Automatically Detecting Malicious Azure OAuth Applications Using LLMs
        "OAuth applications in Microsoft Entra ID are a common persistence and privilege escalation mechanism used by attackers. Because OAuth apps are frequently created, modified, and forgotten, malicious applications often blend in with legitimate business integrations. By analyzing known OAuth attack campaigns across multiple environments, we developed OAuth Apps Scout - a proactive detection pipeline that automatically surfaces emerging malicious OAuth applications, and has so far helped us identify many malicious apps across dozens of affected organizations."
        https://www.wiz.io/blog/detecting-malicious-oauth-applications
      • Malicious OpenClaw Skills Used To Distribute Atomic MacOS Stealer
        "TrendAI™ Research observed an evolution in how Atomic Stealer (AMOS) is being distributed. Historically spread via “cracked” macOS software, a trend we documented in September 2025, we found the malware being delivered under the guise of OpenClaw skills. This campaign represents a critical evolution in supply chain attacks: the attacker has shifted from deceiving humans into manipulating AI agentic workflows into installing the first stage of the malware. This is an old malware trying to use “social engineering” on AI agents, marking a shift from prompt injection to using the AI itself as a trusted intermediary to trick humans."
        https://www.trendmicro.com/en_us/research/26/b/openclaw-skills-used-to-distribute-atomic-macos-stealer.html

      Breaches/Hacks/Leaks

      • Ad Tech Firm Optimizely Confirms Data Breach After Vishing Attack
        "New York-based ad tech company Optimizely has notified an undisclosed number of customers of a data breach after threat actors compromised some of its systems in a voice phishing attack. Optimizely has nearly 1,500 employees across 21 global offices, and its customer list includes over 10,000 businesses, including high-profile brands like H&M, PayPal, Zoom, Toyota, Vodafone, Shell, Salesforce, and Nike. In breach notification letters sent to affected customers, the company, the threat actors reached out on February 11, claiming they had access to its systems."
        https://www.bleepingcomputer.com/news/security/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/
      • US Healthcare Diagnostic Firm Says 140,000 Affected By Data Breach
        "Nearly 140,000 people are affected by a data breach disclosed by healthcare diagnostic company Vikor Scientific. The number of affected individuals came to light in recent days on the healthcare data breach tracker maintained by the US Department of Health and Human Services (HHS). However, the narrative is not straightforward."
        https://www.securityweek.com/us-healthcare-diagnostic-firm-says-140000-affected-by-data-breach/
      • Air Côte d'Ivoire Confirms Cyberattack Following Ransomware Claims
        "The main airline serving the West African nation of Côte d'Ivoire was hit with a cyberattack earlier this month that forced it to institute business continuity plans. Air Côte d'Ivoire did not respond to requests for comment but released a statement on Friday confirming reports that hackers had breached its systems on February 8. Last week, the INC ransomware gang claimed it stole 208 GB of data from the airline. In its statement, the airline said the cyberattack “affected parts of its information system” and it had to call in technical teams to assist with flights and other operations."
        https://therecord.media/air-cote-divoire-confirms-cyberattack

      General News

      • The Hidden Security Cost Of Treating Labs Like Data Centers
        "In this Help Net Security interview, Rich Kellen, VP, CISO at IFF, explains why security teams should not treat OT labs like IT environments. He discusses how compromise can damage scientific integrity and create safety risks that backups cannot fix. Kellen also outlines what “good enough” OT visibility looks like, why compensating controls can backfire, and how partnering with scientists improves security outcomes."
        https://www.helpnetsecurity.com/2026/02/23/rich-kellen-iff-ot-lab-cybersecurity/
      • Enterprises Are Racing To Secure Agentic AI Deployments
        "AI assistants are tied into ticketing systems, source code repositories, chat platforms, and cloud dashboards across many enterprises. In some environments, these systems can open pull requests, query internal databases, book services, and trigger automated workflows with limited human involvement. The State of AI Security 2026 from Cisco places this level of access inside a growing pattern of AI-driven operations that connect directly to core business systems."
        https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/
      • Identity Verification Systems Are Struggling With Synthetic Fraud
        "Fake and expired IDs keep showing up in routine customer transactions, from alcohol purchases to credit card applications. The problem shows up most often in industries that depend on fast onboarding and remote transactions, where identity checks rely heavily on scanned documents and automated workflows. Intellicheck analyzed nearly 100 million identity verification transactions collected through its cloud-based verification service during 2025. The company said the dataset covers about half of the adult population in the U.S. and Canada."
        https://www.helpnetsecurity.com/2026/02/23/analysis-identity-verification-fraud-report/
      • Spain Arrests Suspected Hacktivists For DDoSing Govt Sites
        "Spanish authorities have arrested four alleged members of a hacktivist group believed to have carried out cyberattacks targeting government ministries, political parties, and various public institutions. The group, which called itself "Anonymous Fénix" and claimed they were affiliated with the Anonymous hacker collective, conducted distributed denial-of-service (DDoS) attacks against targets in Spain and several South American countries, according to the Spanish Civil Guard."
        https://www.bleepingcomputer.com/news/security/spain-arrests-suspected-anonymous-fenix-hacktivists-for-ddosing-govt-sites/
        https://www.theregister.com/2026/02/23/anonymous_arrests_spain/
        https://www.helpnetsecurity.com/2026/02/23/spain-guardia-civil-arrests-anonymous-fenix-ddos-attacks/
      • Enigma Cipher Device Still Holds Secrets For Cyber Pros
        "Enigma cipher machines have endured in the minds of history buffs and cryptography hobbyists for more than a century, still discovered at dusty French flea markets and dredged up from under beach sludge by treasure hunters. And a dive at this year's upcoming RSAC Conference into lessons the Enigma can teach today's defenders suggests cybersecurity professionals should keep the history of the Nazis' hubris and failure of imagination in mind."
        https://www.darkreading.com/threat-intelligence/enigma-cipher-device-secrets-cyber-pros

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 63a675af-03bb-4035-a664-31418f6bb72c-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบ Arkanix Stealer มัลแวร์ขโมยข้อมูลใช้ LLM ช่วยเขียนโค้ดและอัปเกรดฟีเจอร์

      6ee5e14a-0c60-4d5e-9012-e3ae674b79f0-image.png พบ Arkanix Stealer มัลแวร์ขโมยข้อมูลใช้ LLM ช่วยเขียนโ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand d7d4de41-ddb2-4f6b-9b37-6eab56915ebf-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • ตำรวจสเปนจับกุมผู้ต้องสงสัยแฮกระบบจองโรงแรม จ่ายเพียง 1 เซนต์ต่อคืน

      c8fda0bc-6e7c-44af-abf2-bfdb20b13515-image.png ตำรวจสเปนจับกุมผู้ต้องสงสัยแฮกระบบจองโร.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 285f6b47-1f47-496b-8895-349c98bbe65a-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • นักวิจัยเผย 27 รูปแบบการโจมตี "Password Manager" ชั้นนำ เสี่ยงข้อมูลรั่วหากเซิร์ฟเวอร์ถูกแฮก

      5df0c667-ebcd-47c1-b57f-2f7374e6ca3e-image.png นักวิจัยเผย 27 รูปแบบการโจมตี Password Manager ชั้นนำ เ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 69e4e915-a680-4632-a331-fda772cb0f21-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🛑 ด่วน! Microsoft ได้ออกการอัปเดตแก้ไขช่องโหว่ใน Windows Admin Center 🛑

      🛑 ด่วน! Microsoft ได้ออกการอัปเดตแก้ไขช่องโหว่ใน Windows Admin Center 🛑

      ⚠️ ThaiCERT ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ และพบประกาศด้านความมั่นคงปลอดภัย Microsoft ได้ออกการอัปเดตเพื่อแก้ไขช่องโหว่ใน Windows Admin Center (WAC) ซึ่งทำให้ผู้โจมตี ยกระดับสิทธิ์ (Privilege Escalation) ผ่านเครือข่ายได้ แนะนำให้องค์กรที่ใช้งาน WAC ตรวจสอบและอัปเดตโดยเร็ว

      1. รายละเอียดช่องโหว่:
      • CVE-2026-26119 — Windows Admin Center (Elevation of Privilege / Improper Authentication) CVSSV3.1 8.8 การยืนยันตัวตนที่ไม่เหมาะสมใน Windows Admin Center ทำให้ผู้โจมตีที่มีสิทธิ์ใช้งานอยู่แล้ว (authorized attacker) สามารถ ยกระดับสิทธิ์ (elevate privileges) ผ่านเครือข่ายได้
      1. ผลิตภัณฑ์ที่ได้รับผลกระทบ:
      • Windows Admin Center (WAC) 1809.0 ถึงก่อน 2.6.4 (ก่อน 2511/Build 2.6.4)
      1. แนวทางการแก้ไข:
      • อัปเดต Windows Admin Center เวอร์ชัน 2511 (Build 2.6.4) หรือเวอร์ชันที่ Microsoft ระบุว่าแก้ไขแล้ว
      1. หากยังไม่สามารถอัพเดตได้ ควรดำเนินการดังนี้
      • ไม่มีมาตรการชั่วคราว ให้รับดำเนินการอัปเดต Windows Admin Center (WAC)
      1. แหล่งอ้างอิง:
        5.1 https://dg.th/os1m0vy4fa
        5.2 https://dg.th/852ezqkmwi
        5.3 https://dg.th/tiw02l6sve
        5.4 https://dg.th/zis57womrp

      Windows Admin Center v2.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨 เตือนภัยผู้ใช้งาน OpenClaw พบความเสี่ยงช่องโหว่และการตั้งค่าระบบที่ไม่เหมาะสม

      🚨 เตือนภัยผู้ใช้งาน OpenClaw พบความเสี่ยงช่องโหว่และการตั้งค่าระบบที่ไม่เหมาะสม อาจถูกเข้าควบคุมระบบจากระยะไกล ขอให้ผู้ใช้งานเฝ้าระวังอย่างใกล้ชิด

      พบความเสี่ยงด้านความปลอดภัยที่เกี่ยวข้องกับแพลตฟอร์ม OpenClaw ซึ่งเป็นเครื่องมือประเภท ช่วยให้ระบบหรือผู้ใช้งานสามารถสั่งงานอัตโนมัติและเชื่อมต่อบริการต่าง ๆ ได้ โดยผู้เชี่ยวชาญด้านความปลอดภัยพบว่าการตั้งค่าระบบที่ไม่เหมาะสม (Misconfiguration) รวมถึงช่องโหว่บางส่วนของระบบ อาจเปิดโอกาสให้ผู้ไม่หวังดีเข้าถึงระบบหรือดำเนินการโจมตีได้

      เนื่องจากระบบ มักมีการจัดเก็บข้อมูลสำคัญ เช่น authentication tokens ข้อมูลการเชื่อมต่อบริการภายนอก และไฟล์ configuration ภายในเครื่องหรือเซิร์ฟเวอร์ หากถูกเข้าถึงโดยไม่ได้รับอนุญาต อาจนำไปสู่การสวมรอยตัวตน การเข้าถึงบริการ cloud หรือการควบคุม workflow อัตโนมัติขององค์กร

      🔴 รายละเอียดภัยคุกคาม
      ผู้เชี่ยวชาญด้านความปลอดภัยพบว่าระบบ OpenClaw บางส่วนถูกเปิดใช้งานและสามารถเข้าถึงได้จากอินเทอร์เน็ตโดยตรง โดยไม่มีมาตรการป้องกันที่เหมาะสม ส่งผลให้ผู้ไม่หวังดีสามารถค้นหาและพยายามเข้าถึงระบบดังกล่าวได้ หากระบบมีช่องโหว่หรือมีการตั้งค่าที่ไม่ปลอดภัย อาจนำไปสู่การถูกบุกรุกหรือเข้าควบคุมระบบโดยไม่ได้รับอนุญาต

      ภายหลังจากผู้ไม่หวังดีสามารถเข้าถึงระบบได้ อาจมีการสำรวจข้อมูลภายในระบบเพื่อค้นหาข้อมูลสำคัญหรือสิทธิ์การใช้งานเพิ่มเติม รวมถึงอาจมีการดาวน์โหลดโปรแกรมหรือไฟล์อื่นเข้ามาในเครื่อง เพื่อใช้เป็นเครื่องมือในการควบคุมระบบ หรือใช้เป็นช่องทางกลับเข้ามาใช้งานในภายหลัง นอกจากนี้ ผู้โจมตีอาจสั่งงานระบบ อาจมีการเรียกใช้งานคำสั่งหรือเครื่องมือเพิ่มเติมจากภายนอก เพื่อควบคุมระบบหรือสร้างช่องทางเข้าถึงในภายหลัง ซึ่งอาจส่งผลให้ข้อมูลขององค์กรถูกเข้าถึง แก้ไข หรือถูกนำออกไปโดยไม่ได้รับอนุญาต

      🎯 ข้อมูลและระบบที่อาจตกเป็นเป้าหมาย
      • authentication tokens และ credential สำหรับเชื่อมต่อบริการต่าง ๆ
      • configuration files ของ OpenClaw และ AI agent deployment
      • workspace หรือ automation workflow ขององค์กร
      • ข้อมูลที่จัดเก็บภายใน agent memory หรือระบบ automation
      หากข้อมูลดังกล่าวถูกเข้าถึง อาจนำไปสู่การสวมรอยตัวตน การเข้าถึงบัญชี cloud หรือการเข้าถึงระบบหรือบริการอื่นที่เชื่อมต่อภายในองค์กร

      1. แนวทางการตรวจสอบ
        • ตรวจสอบว่าระบบ OpenClaw หรือ AI agent deployment มีการเปิดเผยสู่ Internet โดยตรงหรือไม่
        • ตรวจสอบ logs การเข้าถึงระบบ โดยเฉพาะคำสั่ง shell หรือการเชื่อมต่อจาก IP ที่ไม่รู้จัก
        • ตรวจสอบ Endpoint หรือ Server logs สำหรับพฤติกรรมที่เข้าข่ายการดาวน์โหลดไฟล์หรือ execution ที่ผิดปกติ
        • ตรวจสอบสิทธิ์การเข้าถึง configuration และ credential ภายในระบบ

      2. แนวทางการป้องกัน
        • อัปเดต OpenClaw และเครื่องมือ AI agent ให้เป็นเวอร์ชันล่าสุดที่มีการแก้ไขช่องโหว่ด้านความปลอดภัย
        • หลีกเลี่ยงการเปิด dashboard หรือ API ของระบบสู่ Internet โดยตรง ควรจำกัดการเข้าถึงผ่าน VPN หรือ Access Control
        • จำกัดสิทธิ์การเข้าถึง credential และ configuration ตามหลัก Least Privilege
        • ตรวจสอบความน่าเชื่อถือของปลั๊กอินหรือเครื่องมือเสริมก่อนติดตั้งทุกครั้ง
        • พิจารณาใช้เครื่องมือ SecureClaw ซึ่งเป็น Open-Source Security Tool เพื่อช่วยตรวจสอบการตั้งค่าและความเสี่ยงของ OpenClaw deployment

      อ้างอิง:
      • https://dg.th/to7w861zrq
      • https://dg.th/axhrz5fqcu

      พบการแพร่กระจายมัลแวร์และช่องโหว่ร้ายแร.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨 เตือนภัย Infostealer Malware กำลังเปลี่ยน “ข้อมูลบัญชีที่ถูกขโมย” ให้กลายเป็น “ตัวตนจริง” เสี่ยงยึดบัญชีและโจมตีองค์กร

      ปัจจุบันภัยคุกคามจากมัลแวร์ประเภท Infostealer มีแนวโน้มรุนแรงขึ้นอย่างต่อเนื่อง โดยผู้โจมตีไม่ได้มุ่งเพียงขโมยชื่อผู้ใช้งานและรหัสผ่านเท่านั้น แต่สามารถรวบรวมข้อมูลพฤติกรรม การใช้งานระบบ และข้อมูล session ต่าง ๆ เพื่อนำไปเชื่อมโยงกับตัวบุคคลจริง (Real Identity) ส่งผลให้การโจมตีมีความแม่นยำและสร้างผลกระทบต่อทั้งผู้ใช้งานส่วนบุคคลและองค์กรได้ในวงกว้าง

      จากการวิเคราะห์ข้อมูล Infostealer dumps จำนวนมากพบว่า ข้อมูลที่ถูกขโมยมักถูกนำไปรวบรวม จัดหมวดหมู่ และจำหน่ายในตลาดใต้ดิน ก่อนถูกนำไปใช้ต่อในการโจมตีขั้นสูง เช่น การยึดบัญชีองค์กร การโจมตีแบบ Phishing เจาะจงเป้าหมาย หรือการติดตั้ง Ransomware ในเครือข่ายองค์กร

      🔴 รายละเอียดภัยคุกคาม
      Infostealer malware สามารถรวบรวมข้อมูลจากเครื่องที่ติดมัลแวร์ได้หลากหลายประเภท เช่น
      • Username และ Password
      • Browser cookies และ session token
      • ประวัติการใช้งานเว็บไซต์
      • ไฟล์ในเครื่องผู้ใช้งาน
      • Windows username และข้อมูลระบบ
      ข้อมูลเหล่านี้เมื่อถูกนำมารวมกัน จะช่วยให้ผู้โจมตีสามารถระบุได้ว่าเหยื่อคือใคร ทำงานที่องค์กรใด หรือมีบทบาทหน้าที่ใดในองค์กร ส่งผลให้การโจมตีสามารถขยายจากเครื่องส่วนบุคคลไปสู่ระบบองค์กรได้อย่างรวดเร็ว
      นักวิจัยพบว่าเพียงการติดมัลแวร์ครั้งเดียว ข้อมูลที่ถูกขโมยอาจมีคุณค่าในระยะยาว เนื่องจากสามารถนำไปวิเคราะห์พฤติกรรมและเชื่อมโยงบัญชีหลายบริการเข้ากับบุคคลเดียวกันได้

      🎯 ความเสี่ยงที่อาจเกิดขึ้น
      • ผู้โจมตีสามารถนำข้อมูล Infostealer ไปใช้เพื่อ
      • สวมรอยตัวตนดิจิทัล (Identity Impersonation)
      • เข้าสู่ระบบโดยใช้ session cookies เพื่อหลบเลี่ยง MFA
      • วิเคราะห์ตำแหน่งงานหรือบทบาทของเหยื่อเพื่อโจมตีองค์กร
      • ใช้ข้อมูล LinkedIn หรือ Social Media เพื่อทำ Spear Phishing
      • เข้าถึงระบบองค์กรผ่านบัญชีพนักงาน
      • ใช้เป็น Initial Access สำหรับ Ransomware
      ข้อมูลจากบริการองค์กร เช่น LinkedIn, GitHub, Microsoft Teams และบัญชีองค์กรต่าง ๆ ถูกพบจำนวนมากในข้อมูลที่รั่วไหล ซึ่งช่วยให้ผู้โจมตีเชื่อมโยงบัญชีกับชื่อจริงและสถานที่ทำงานของเหยื่อได้โดยตรง

      ⚠️ สาเหตุที่ Infostealer ยังคงได้ผล
      ภัยคุกคามดังกล่าวมักเกิดจากพฤติกรรมทั่วไปของผู้ใช้งาน เช่น
      • ดาวน์โหลดโปรแกรมจากแหล่งที่ไม่น่าเชื่อถือ
      • ใช้ซอฟต์แวร์เถื่อนหรือ Crack
      • ใช้รหัสผ่านซ้ำระหว่างบัญชีส่วนตัวและบัญชีองค์กร
      • บันทึกรหัสผ่านไว้ใน Browser
      ซึ่งทำให้ข้อมูลสำคัญถูกขโมยได้ง่ายและนำไปใช้ต่อในหลายระบบพร้อมกัน

      1. แนวทางการตรวจสอบ
        หน่วยงานควรดำเนินการตรวจสอบดังนี้
        • ตรวจสอบ Endpoint logs หรือ EDR ว่ามีพฤติกรรม Infostealer หรือไม่
        • ตรวจสอบการ Login ผิดปกติ เช่น Impossible Travel หรือ Session ใหม่ผิดปกติ
        • ตรวจสอบการใช้งานบัญชีองค์กรจากอุปกรณ์ที่ไม่เคยใช้งานมาก่อน
        • ตรวจสอบ Credential Exposure จาก Threat Intelligence หรือ Dark Web Monitoring

      2. แนวทางการป้องกัน
        • หลีกเลี่ยงการใช้รหัสผ่านซ้ำระหว่างบัญชีส่วนตัวและองค์กร
        • เปลี่ยนรหัสผ่านทันทีเมื่อสงสัยว่ามีการติดมัลแวร์
        • ใช้ Multi-Factor Authentication หรือ Passkey
        • จำกัดการบันทึกรหัสผ่านใน Browser สำหรับระบบสำคัญ
        • ใช้ระบบตรวจสอบ Credential Leak อย่างต่อเนื่อง
        • อัปเดตระบบ Endpoint Security และซอฟต์แวร์ให้เป็นเวอร์ชันล่าสุด

      🔗 แหล่งอ้างอิง:
      https://dg.th/l8cuy7q5nr
      ⚠️ ThaiCERT ขอแนะนำให้หน่วยงานที่ใช้งานเครื่องมือ AI agent หรือ OpenClaw เฝ้าระวังและตรวจสอบความเสี่ยงทันที

      Infostealer Malware V3.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 23 February 2026

      New Tooling

      • Uptime Kuma: Open-Source Monitoring Tool
        "Service availability monitoring remains a daily operational requirement across IT teams, SaaS providers, and internal infrastructure groups. Many environments rely on automated checks and alerting to track outages, latency issues, and service degradation across web applications and network endpoints. Uptime Kuma is an open-source uptime monitoring project that supports this type of operational monitoring through a self-hosted deployment model."
        https://www.helpnetsecurity.com/2026/02/20/uptime-kuma-open-source-monitoring-tool/
        https://github.com/louislam/uptime-kuma

      Vulnerabilities

      • CISA Adds Two Known Exploited Vulnerabilities To Catalog
        "CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2025-49113 RoundCube Webmail Deserialization of Untrusted Data Vulnerability
        CVE-2025-68461 RoundCube Webmail Cross-site Scripting Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/02/20/cisa-adds-two-known-exploited-vulnerabilities-catalog
        https://thehackernews.com/2026/02/cisa-adds-two-actively-exploited.html
        https://securityaffairs.com/188324/security/u-s-cisa-adds-roundcube-webmail-flaws-to-its-known-exploited-vulnerabilities-catalog.html

      Malware

      • GitLab Threat Intelligence Team Reveals North Korean Tradecraft
        "We’re sharing intelligence on threat actors associated with North Korean Contagious Interview and IT worker campaigns to raise awareness of emerging trends in operations and tradecraft. We hope this analysis helps the broader security community defend against evolving threats and address the industry-wide challenge of threat actors using legitimate platforms and tools for their operations. Publishing this intelligence reflects our commitment to disrupting threat actor infrastructure. Our security team continuously monitors for accounts that violate our platform’s terms of use and maintains controls designed to prevent the creation of accounts from U.S.-embargoed countries in accordance with applicable trade control laws."
        https://about.gitlab.com/blog/gitlab-threat-intelligence-reveals-north-korean-tradecraft/
      • Massive Winos 4.0 Campaigns Target Taiwan
        "FortiGuard Labs recently observed several targeted phishing campaigns in Taiwan that use themes designed to exploit local business processes. These campaigns disseminate Winos 4.0 (ValleyRat) and subsequent malicious plugins through weaponized attachments or embedded links. The lures mimic official communications, such as tax audit notifications, tax filing software installers, and cloud-based e-invoice downloads. Our analysis of domain registration data reveals that attackers use a rotating set of domains and cloud services to host and distribute malware. The highly volatile nature of this infrastructure renders traditional, static domain blocking insufficient as a primary defense."
        https://www.fortinet.com/blog/threat-research/massive-winos-40-campaigns-target-taiwan
      • Operation Olalampo: Inside MuddyWater’s Latest Campaign
        "The Group-IB Threat Intelligence Team has identified a new cyber campaign attributed with high confidence to the Iranian threat actor known as MuddyWater. This campaign, dubbed Operation Olalampo, targeted multiple organizations and individuals primarily across the MENA region, aligning with the ongoing geopolitical tensions. First observed on 26 January 2026, the operation involved the deployment of several novel malware variants exhibiting tactical and technical overlap with samples previously attributed to the MuddyWater threat group. Notably, one variant leveraged a Telegram bot as a command-and-control (C2) channel."
        https://www.group-ib.com/blog/muddywater-operation-olalampo/
      • Facebook Ads Spread Fake Windows 11 Downloads That Steal Passwords And Crypto Wallets
        "Attackers are running paid Facebook ads that look like official Microsoft promotions, then directing users to near-perfect clones of the Windows 11 download page. Click Download Now and instead of a Windows update, you get a malicious installer—one that silently steals saved passwords, browser sessions, and cryptocurrency wallet data."
        https://www.malwarebytes.com/blog/scams/2026/02/facebook-ads-spread-fake-windows-11-downloads-that-steal-passwords-and-crypto-wallets
      • MIMICRAT: ClickFix Campaign Delivers Custom RAT Via Compromised Legitimate Websites
        "During a recent investigation, Elastic Security Labs identified an active ClickFix campaign compromising multiple legitimate websites to deliver a multi-stage malware chain. Unlike simpler ClickFix deployments that terminate at commodity infostealers, this campaign ends with a capable custom remote access trojan (RAT) we have called MIMICRAT: a native C implant with malleable C2 profiles, token impersonation, SOCKS5 tunneling, and a 22-command dispatch table."
        https://www.elastic.co/security-labs/mimicrat-custom-rat-mimics-c2-frameworks
        https://thehackernews.com/2026/02/clickfix-campaign-abuses-compromised.html
      • How Predator Spyware Defeats iOS Recording Indicators
        "This research is malware analysis documenting how already-deployed commercial spyware (Predator) operates post-compromise. It is not a vulnerability disclosure. This research is not revealing a new iOS security flaw that requires patching, rather, it explains how existing spyware works after a device has already been compromised through other means (zero-days, etc.) This research is intended to help defenders understand the threat and build detection capabilities."
        https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/
        https://www.bleepingcomputer.com/news/security/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity/
      • AI-Augmented Threat Actor Accesses FortiGate Devices At Scale
        "Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale—a trend Amazon Threat Intelligence has been tracking closely. A recent investigation illustrates this shift: Amazon Threat Intelligence observed a Russian-speaking financially motivated threat actor leveraging multiple commercial generative AI services to compromise over 600 FortiGate devices across more than 55 countries from January 11 to February 18, 2026. No exploitation of FortiGate vulnerabilities was observed—instead, this campaign succeeded by exploiting exposed management ports and weak credentials with single-factor authentication, fundamental security gaps that AI helped an unsophisticated actor exploit at scale."
        https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/
        https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/
        https://thehackernews.com/2026/02/ai-assisted-threat-actor-compromises.html
      • The ClickFix Trap: How Fake Captchas Are Delivering Stealthy Infostealers
        "Recently, CyberProof MDR analysts alerted the CyberProof Threat Hunting team to late-stage EDR alerts related to a Fake Captcha Infostealer campaign. Further investigation confirmed that this campaign is likely linked to an infostealer operation. Data correlation revealed significant similarities to previous research on the ClickFix campaign, which targeted restaurant reservations in July 2025. These patterns also match several other infostealers observed spreading via fake captcha pages over the last two months. In this technical deep dive, we examine the mechanics of this campaign and provide hunting queries to assist researchers in their investigations."
        https://www.cyberproof.com/blog/fake-captcha-attack-uncovered-clickfix-infostealer-campaign/
        https://hackread.com/clickfix-attack-crypto-wallets-browsers-infostealer/
      • Hiding In Plain Pixels: Malicious NPM Package Found
        "We recently came across a suspicious NPM package called buildrunner-dev. The package is deceptively simple, containing a package.json with a postinstall hook pointed at an init.js file, but that’s where things got interesting. The postinstall script was triggered upon package installation and dropped a batch file called packageloader.bat. At first glance it looked like pure noise due to thousands of characters that appear to be gibberish; nature-themed REM comments, and variable names that read like a cat walked across someone’s keyboard. But as we started peeling back layer after layer of obfuscation, we uncovered a remarkably well-engineered attack chain that hides its true payloads inside the RGB pixel values of PNG images hosted on a free image service."
        https://www.veracode.com/blog/malicious-npm-package-hiding-in-plain-pixels/
        https://hackread.com/hackers-pulsar-rat-png-images-npm-supply-chain-attack/

      Breaches/Hacks/Leaks

      • PayPal Discloses Data Breach That Exposed User Info For 6 Months
        "PayPal is notifying customers of a data breach after a software error in a loan application exposed their sensitive personal information, including Social Security numbers, for nearly 6 months last year. The incident affected the PayPal Working Capital (PPWC) loan app, which provides small businesses with quick access to financing. PayPal discovered the breach on December 12, 2025, and determined that customers' names, email addresses, phone numbers, business addresses, Social Security numbers, and dates of birth had been exposed since July 1, 2025."
        https://www.bleepingcomputer.com/news/security/paypal-discloses-data-breach-exposing-users-personal-information/
        https://securityaffairs.com/188309/data-breach/paypal-discloses-extended-data-leak-linked-to-loan-app-glitch.html
        https://www.theregister.com/2026/02/20/paypal_app_code_error_leak/
      • Hackers Breach Contractor Linked To Ukraine’s Central Bank Collectible Coin Store
        "Ukraine’s central bank said its online store for collectible coins and numismatic products was temporarily taken offline after a cyberattack exposed some customer information. The National Bank of Ukraine (NBU) said in a statement on Thursday that attackers may have gained access to users’ personal data, including names, phone numbers, email addresses and delivery addresses."
        https://therecord.media/hackers-breach-ukraine-national-bank-contractor
      • ShinyHunters Demands $1.5M Not To Leak Vegas Casino And Resort Chain Data
        "Las Vegas hotel and casino giant Wynn Resorts appears to be the latest victim of data-grabbing and extortion gang ShinyHunters. On Friday, the cybercrime crew listed the hospitality company on its blog, claiming to have stolen more than 800,000 records containing employees' Social Security numbers and other private details. The extortionists set a February 23 deadline for Wynn to "reach out" and threatened to leak the data, "along with several annoying (digital) problems that'll come your way," if the resort chain did not comply with the demands."
        https://www.theregister.com/2026/02/20/shinyhunters_wynn_resorts/

      General News

      • January 2026 Infostealer Trend Report
        "This report provides statistics, trends, and case information regarding the distribution quantity, distribution methods, and obfuscation techniques of Infostealer malware collected and analyzed during the month of January 2026. Below is a summary of the original report content."
        https://asec.ahnlab.com/en/92646/
      • January 2026 Phishing Email Trends Report
        "This report provides the distribution quantity, statistics, trends, and case information on phishing emails and email threats collected and analyzed for one month in January 2026. The following are some statistics and cases included in the original report."
        https://asec.ahnlab.com/en/92621/
      • January 2026 Threat Trend Report On Ransomware
        "This report provides the number of affected systems confirmed during January 2026, DLS-based ransomware-related statistics, and notable ransomware issues in Korea and abroad. Below is a summary of some information. The statistics on the number of ransomware samples and affected systems were based on the diagnostic names assigned by AhnLab, and the statistics on ransomware-affected companies were derived from information publicly disclosed on the DLS (Dedicated Leak Sites, also referred to as ransomware PR sites or PR pages) of ransomware groups, collected based on the timing from the ATIP infrastructure."
        https://asec.ahnlab.com/en/92620/
      • Ukrainian Gets 5 Years For Helping North Koreans Infiltrate US Firms
        "A Ukrainian national was sentenced to five years in prison for providing North Korean IT workers with stolen identities that helped them infiltrate U.S. companies. 39-year-old Oleksandr Didenko of Kyiv, Ukraine, pleaded guilty in November 2025 to aggravated identity theft and wire fraud conspiracy after being arrested in Poland in May 2024. This week, he was sentenced to 60 months in prison and 12 months of supervised release, and agreed to forfeit more than $1.4 million, including cash and cryptocurrency seized from Didenko and his accomplices."
        https://www.bleepingcomputer.com/news/security/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms/
        https://thehackernews.com/2026/02/ukrainian-national-sentenced-to-5-years.html
        https://therecord.media/north-korea-laptop-farm-ukraine
        https://securityaffairs.com/188305/cyber-crime/north-korean-it-worker-scam-nets-ukrainian-five-year-sentence-in-the-u-s.html
        https://www.theregister.com/2026/02/20/north_korean_it_worker_prison/
        https://www.helpnetsecurity.com/2026/02/20/ukrainian-national-sentenced-id-entity-theft-north-korea-it-workers-identity-theft/
      • Keeping Google Play & Android App Ecosystems Safe In 2025
        "The Android ecosystem is a thriving global community built on trust, giving billions of users the confidence to download the latest apps. In order to maintain that trust, we’re focused on ensuring that apps do not cause real-world harm, such as malware, financial fraud, hidden subscriptions, and privacy invasions. As bad actors leverage AI to change their tactics and launch increasingly sophisticated attacks, we’ve deepened our investments in AI and real-time defenses over the last year to maintain the upper hand and stop these threats before they reach users."
        https://security.googleblog.com/2026/02/keeping-google-play-android-app-ecosystem-safe-2025.html
        https://www.bleepingcomputer.com/news/security/google-blocked-over-175-million-play-store-app-submissions-in-2025/
        https://www.helpnetsecurity.com/2026/02/20/google-strengthens-android-safe-app-ecosystem/
      • 'God-Like' Attack Machines: AI Agents Ignore Security Policies
        "AI agents are programmed to be industrious and focused on completing user-assigned tasks, but that single-minded approach often has gone wrong. Last week, a Microsoft Copilot bug reportedly resulted in the AI assistant summarizing confidential emails, while users of AI agents have regularly complained that they are ignoring instructions to protect certain files, modifying them anyway. Last July, during a 12-day vibe-coding event, for example, one user working with AI agents on the software-creation platform Replit reported that the agent repeatedly ignored code freezes and even deleted a production database."
        https://www.darkreading.com/application-security/ai-agents-ignore-security-policies
      • Lessons From AI Hacking: Every Model, Every Layer Is Risky
        "When Hillai Ben Sasson and Dan Segev set out to hack AI infrastructure two years ago, they expected to find vulnerabilities — but they didn't expect to compromise virtually every major AI platform they targeted. The two researchers — who work in offensive and defensive research, respectively, at cloud-security firm Wiz — wanted to experiment with how they could attack the AI infrastructure being deployed as part of foundational models, AI services, and in-house AI projects. Yet, what started as simple attacks on the AI supply chain — such as abusing the widely used Pickle format to run arbitrary code — evolved into a comprehensive threat assessment spanning five distinct layers of the AI stack."
        https://www.darkreading.com/application-security/lessons-ai-hacking-model-every-layer-risky
      • Latin America's Cyber Maturity Lags Threat Landscape
        "Although Latin American countries have made major strides toward cybersecurity maturity, sluggish progress and an aggressive cybercrime ecosystem present challenges ahead for the region. Intel 471 this week published a report detailing Latin America's cyber threat landscape, synthesizing data collected during 2025. Broadly speaking, the report references increasing security maturity for the region — citing a December 2025 report from the Organization of American States (OAS) attesting to this — while observing an increasingly hostile threat landscape."
        https://www.darkreading.com/threat-intelligence/latin-americas-cyber-maturity-lags-threat-landscape
      • Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges
        "Chiplets are replacing old chip designs and driving semiconductor design, enabling breakthroughs in next-generation artificial intelligence (AI) data centers and self-driving vehicles. But they also put applications and infrastructure at risk. By stitching together smaller silicon components — all with different functions — into a single circuit, chiplets offer greater design flexibility and reusability than traditional chips. With traditional monolithic chip designs, each chip is built from scratch for a specific purpose, and changing the use case requires creating a whole new chip. Chiplets are a mix-and-match of components to create solutions that meet the exact needs of the customer, so it is quick and easy to swap out components to adapt to a different use case."
        https://www.darkreading.com/cyber-risk/emerging-chiplet-designs-spark-fresh-cybersecurity-challenges
      • LLMs Change Their Answers Based On Who’s Asking
        "AI chatbots may deliver unequal answers depending on who is asking the question. A new study from the MIT Center for Constructive Communication finds that LLMs provide less accurate information, increase refusal rates, and sometimes adopt a different tone when users appear less educated, less fluent in English, or from particular countries. The team evaluated GPT-4, Claude 3 Opus, and Llama 3-8B using established benchmarks for scientific knowledge and truthfulness. One set of questions came from a science exam style dataset and the other from the TruthfulQA benchmark, which includes factual items and questions structured to trigger common misconceptions."
        https://www.helpnetsecurity.com/2026/02/20/mit-llms-response-reliability-risks-study/
        https://arxiv.org/pdf/2406.17737
      • The CISO View Of Fraud Risk Across The Retail Payment Ecosystem
        "In this Help Net Security interview, Paul Suarez, VP and CISO at Casey’s, explains how his team manages patching and upgrades for fuel payment systems with long hardware lifecycles. He also discusses risks tied to QR code payments and outlines why loyalty abuse can be hard to spot. Suarez shares how Casey’s monitors payment systems across stores, corporate networks, and third-party processors."
        https://www.helpnetsecurity.com/2026/02/20/paul-suarez-caseys-convenience-store-payment-fraud/
      • Quantum Security Is Turning Into a Supply Chain Problem
        "Supplier onboarding, invoice processing, and procurement platforms run on encrypted data flows that were built for long-term trust. In many organizations, that trust still depends on cryptographic standards like RSA and elliptic curve cryptography (ECC), even as security teams begin planning for a post-quantum world. A recent apexanalytix research report argues that supply chain leaders are already operating inside a quantum risk window, even though large-scale quantum computing remains years away."
        https://www.helpnetsecurity.com/2026/02/20/post-quantum-cryptography-supply-chain-priority/
      • Dramatic Escalation In Frequency And Power Of DDoS Attacks
        "The number of Distributed Denial-of-Service (DDoS) attacks has increased significantly and they’re getting more powerful and disruptive, analysis by cybersecurity researchers has warned. The Radware 2026 Global Threat Analysis Report has detailed what is described as a “dramatic escalation in cyber-attack activity” during 2025, with a 168% increase in DDoS attacks compared with 2024. The figure is based on analysis of Radware customer data. During 2025, the average Radware customer faced more than 25,351 attempted DDoS attacks during the reporting period – equivalent to 139 attempted incidents a day."
        https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/
      • Former Google Engineers Indicted Over Trade Secret Transfers To Iran
        "Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the information to unauthorized locations, including Iran. Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, along with her sister Soroor Ghandali, 32, have been accused of conspiring to commit trade secret theft from Google and other leading technology companies, theft and attempted theft of trade secrets, and obstruction of justice."
        https://thehackernews.com/2026/02/three-former-google-engineers-indicted.html
        https://www.theregister.com/2026/02/20/google_ip_theft_charges/
      • Russia Stepping Up Hybrid Attacks, Preparing For Long Standoff With West, Dutch Intelligence Warns
        "Russia’s intensifying cyberattacks, sabotage and covert influence operations across Europe show the Kremlin is preparing for a prolonged confrontation with the West, Dutch intelligence agencies said in a report published this week. In a joint assessment by the General Intelligence and Security Service (AIVD) and the Military Intelligence and Security Service (MIVD), the Dutch agencies warned that while a direct military clash between Russia and NATO remains unlikely, it is no longer unthinkable."
        https://therecord.media/russia-cyberattacks-europe-warfare
      • Romanian Hacker Faces Up To 7 Years For Breaching Oregon Emergency Management Department
        "A 45-year-old Romanian national pleaded guilty this week to hacking into computers at Oregon’s Department of Emergency Management in June 2021 and selling the access he obtained for $3,000 worth of Bitcoin. Catalin Dragomir also hacked into 10 other U.S. companies, causing financial losses of at least $250,000. He was arrested in Romania in November 2024 and was extradited to the U.S. last year. In court on Thursday, Dragomir pleaded guilty to obtaining information from a protected computer and one count of aggravated identity theft. He will be sentenced in May and is facing up to seven years in prison."
        https://therecord.media/romanian-hacker-faces-7-years-oregon-breach

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 35d85d5a-1630-4b25-9ae8-8bcb93cb956f-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨ด่วน!!!! พบช่องโหว่ในผลิตภัณฑ์ Ivanti Endpoint Manager Mobile (EPMM)🚨

      ThaiCERT ติดตามข่าวสารภัยคุกคามทางไซเบอร์ พบรายงานช่องโหว่สองรายการ ได้แก่ CVE-2026-1281 และ CVE-2026-1340 (CVSS:v3.1: 9.8) ในผลิตภัณฑ์ Ivanti Endpoint Manager Mobile (EPMM) ผู้โจมตีสามารถโจมตีได้จากภายนอกเครือข่ายโดยไม่ต้องยืนยันตัวตน

      1. รายละเอียดเหตุการณ์
        • ผู้พัฒนาเปิดเผยช่องโหว่ CVE-2026-1281 และ CVE-2026-1340 ที่ส่งผลต่อระบบ Ivanti Endpoint Manager Mobile ซึ่งเป็นโซลูชันบริหารจัดการอุปกรณ์มือถือในองค์กร
        • ช่องโหว่ทั้งสองรายการจัดว่าเป็นประเภท Code Injection / Remote Code Execution (RCE) โดยผู้โจมตีสามารถรันโค้ดอันตรายบนระบบเป้าหมายโดยไม่ต้องยืนยันตัวตน

      2. เวอร์ชันที่ได้รับผลกระทบ
        • EPMM 12.5.x, 12.6.x, หรือ 12.7.x

      3. พฤติกรรมการโจมตี
        • ผู้โจมตีจะส่ง HTTP/HTTPS request และรันคำสั่งบนระบบ EPMM
        • ทำการสแกนระบบแบบอัตโนมัติหรือ botnet เพื่อคัดกรองเป้าหมาย
        • หลังจากโจมตีสำเร็จ ผู้โจมตีอาจทำการติดตั้ง web shells, backdoors, การดาวน์โหลดมัลแวร์ หรือการทำ reconnaissance ภายในระบบ
        • ปัจจุบันพบการโจมตีอย่างต่อเนื่อง โดยเป็นการสแกนและการยิง payload แบบอัตโนมัติ ไปยังเซิร์ฟเวอร์ EPMM

      4. แนวทางการป้องกันและลดความเสี่ยง
        4.1 อัปเดตระบบและปฏิบัติตามคำแนะนำของผู้พัฒนาอย่างเคร่งครัด
        4.2 ควบคุมการเข้าถึงเครือข่าย โดยจำกัดการเข้าถึงอินเทอร์เฟซการจัดการ EPMM เฉพาะจากเครือข่ายภายในหรือผ่าน VPN เท่านั้น หรือใช้มาตรการ network segmentation เพื่อแยกระบบ MDM ออกจากเครือข่ายหลักและระบบความสำคัญสูง
        4.3 ระบบตรวจจับและตอบสนองภัยคุกคาม เช่น ใช้เครื่องมือ WAF/IDS/IPS เพื่อตรวจจับและบล็อกพฤติกรรมที่ผิดปกติ, ตรวจสอบ log ของระบบอย่างสม่ำเสมอเพื่อหาพฤติกรรม HTTP

      5. มาตรการชั่วคราว (กรณียังไม่สามารถอัปเดตได้ทันที)
        5.1 ปิดการเข้าถึงแบบสาธารณะ
        5.2 จำกัดการเข้าถึงเฉพาะ IP ที่เชื่อถือได้
        5.3 ปรับแต่ง WAF และ IPS
        5.4 ตรวสอบ IoCs และหากพบระบบที่อาจถูกโจมตี ให้แยกระบบนั้นออกจากเครือข่ายทันทีเพื่อลดผลกระทบ

      6. แหล่งอ้างอิง (References)
        6.1 https://dg.th/x5fpbrcikt
        6.2 https://dg.th/z35rkhilp6
        6.3 https://dg.th/1a8kb4hnxu

      แนะนำให้หน่วยงานที่ใช้งาน Ivanti EPMM และยังไม่ได้แพตช์ ดำเนินการแก้ไขโดยเร่งด่วนที่สุด

      Mobile (EPMM).png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 20 February 2026

      Financial Sector

      • January 2026 Security Issues In Korean & Global Financial Sector
        "This report comprehensively addresses actual cyber threats and related security issues that have occurred in domestic and international financial sector companies. It includes an analysis of malware and phishing cases disseminated targeting the financial sector, presents the top 10 major malware aimed at the financial sector, and provides statistics on industries of domestic accounts leaked via Telegram.. It also details cases of phishing emails targeting the financial sector. Additionally, it analyzes major threats and cases related to finance that have occurred on the dark web., threats of credit card data leakage and actual cases,, threats of database leaks in financial institutions and occurrences., ransomware intrusion threats targeting the financial sector and damage cases caused by infections,, and various cyber attack threats against financial institutions along with actual damage cases."
        https://asec.ahnlab.com/en/92626/
      • FBI: More Than 700 ATM Jackpotting Incidents With Losses Over $20 Million Occurred In 2025
        "Criminals are increasingly using malware to steal money out of ATMs, with hundreds of incidents taking place in 2025 alone. In a flash alert on Thursday, the FBI said it has tracked more than 1,900 ATM jackpotting incidents since 2020 and over 700 in 2025 that involved more than $20 million in losses. FBI officials explained that criminals are now taking advantage of physical and software vulnerabilities that allow them to deploy malware on ATMs and dispense cash without transactions."
        https://therecord.media/fbi-atm-jackpotting-2025-report
        https://www.ic3.gov/CSA/2026/260219.pdf
        https://www.theregister.com/2026/02/19/crims_atm_jackpotting/

      Industrial Sector

      • ICS Cybersecurity In 2026: Vulnerabilities And The Path Forward
        "CISA/ICS-CERT has been the authoritative source about vulnerabilities in operational technology/industrial control systems (OT/ICS) since they started the ICS Advisory (ICSA) program in 2010. Between March 2010 and January 31, 2026, CISA/ICS-CERT published 3,637 ICS advisories about 12,174 vulnerabilities affecting 2,783 products from 689 vendors. One hundred seventy eight (178) of these advisories were dedicated to medical devices — nearly 5 %. However, there is a growing number of vulnerabilities on critical devices that are not tracked with associated ICSAs which may leave asset owners and network administrators with blind spots on their networks."
        https://www.forescout.com/blog/ics-cybersecurity-in-2026-vulnerabilities-and-the-path-forward/
        https://www.infosecurity-magazine.com/news/industrial-control-system-vulns/
      • Cyberattacks On Automobile Manufacturers, Taxi Fleets, And Logistics Providers: The Risks To Automotive Infrastructure In 2026
        "Modern cars are complex digital devices with extensive remote communication capabilities that expand the vehicle’s attack surface. Attackers can target not only cars directly but also the systems to which they are connected. Kaspersky experts share a cyberthreat forecast for the automotive industry in 2026. In 2026, financially motivated attackers will continue to target the infrastructure of automobile manufacturers, which may result in production shutdowns or the theft of confidential data. There were several such incidents in 2025."
        https://ics-cert.kaspersky.com/publications/blog/2026/02/19/risks-for-the-automotive-industry-in-2026/

      Vulnerabilities

      • Microsoft Patches CVE-2026-26119 Privilege Escalation In Windows Admin Center
        "Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud. The high-severity vulnerability, tracked as CVE-2026-26119, carries a CVSS score of 8.8 out of a maximum of 10.0"
        https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html
        https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119
        https://www.helpnetsecurity.com/2026/02/19/windows-admin-center-cve-2026-26119/
      • How AI SAST Traced Data Flows To Uncover Six OpenClaw Vulnerabilities
        "In our previous post, we discussed how Endor Labs' AI SAST engine successfully identified seven exploitable vulnerabilities in OpenClaw through systematic analysis and validation. Now that OpenClaw has published patches and security advisories, we can share the technical details of how agentic data flow analysis uncovered these issues and enabled proof-of-concept development. This post examines six disclosed vulnerabilities, walking through how the AI SAST engine traced data paths from user-controlled sources to dangerous sinks and how we validated each finding with working exploits."
        https://www.endorlabs.com/learn/how-ai-sast-traced-data-flows-to-uncover-six-openclaw-vulnerabilities
        https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/

      Malware

      • German Rail Giant Deutsche Bahn Hit By Large-Scale DDoS Attack
        "Deutsche Bahn, Germany’s national rail operator, has been dealing with a large-scale distributed denial-of-service (DDoS) attack that has disrupted some of its IT systems. Regular status updates from Deutsche Bahn indicated that the attack began on February 17 and continued into February 18. According to the rail giant, the attack came in waves and its scale is substantial. The DDoS attack disrupted Deutsche Bahn’s information and ticketing systems, including its websites and the DB Navigator app."
        https://www.securityweek.com/german-rail-giant-deutsche-bahn-hit-by-large-scale-ddos-attack/
        https://www.theregister.com/2026/02/18/deutsche_bahn_ddos/
        https://securityaffairs.com/188254/breaking-news/germanys-national-rail-operator-deutsche-bahn-hit-by-a-ddos-attack.html
      • PromptSpy Ushers In The Era Of Android Threats Using GenAI
        "ESET researchers uncovered the first known case of Android malware abusing generative AI for context-aware user interface manipulation. While machine learning has been used to similar ends already – just recently, researchers at Dr.WEB found Android.Phantom, which uses TensorFlow machine learning models to analyze advertisement screenshots and automatically click on detected elements for large scale ad fraud – this is the first time we have seen generative AI deployed in this manner. Because the attackers rely on prompting an AI model (in this instance, Google’s Gemini) to guide malicious UI manipulation, we have named this family PromptSpy. This is the second AI powered malware we have discovered – following PromptLock in August 2025, the first known case of AI-driven ransomware."
        https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/
        https://www.bleepingcomputer.com/news/security/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/
        https://thehackernews.com/2026/02/promptspy-android-malware-abuses-google.html
        https://www.theregister.com/2026/02/19/genai_malware_android/
        https://www.helpnetsecurity.com/2026/02/19/promptspy-android-malware-generative-ai/
      • Hackers Target Microsoft Entra Accounts In Device Code Vishing Attacks
        "Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. Unlike previous attacks that utilized malicious OAuth applications to compromise accounts, these campaigns instead leverage legitimate Microsoft OAuth client IDs and the device authorization flow to trick victims into authenticating. This provides attackers with valid authentication tokens that can be used to access the victim's account without relying on regular phishing sites that steal passwords or intercept multi-factor authentication codes."
        https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/
      • Massiv: When Your IPTV App Terminates Your Savings
        "Modern mobile threat landscape offers multiple malware families used by lots of single threat actors or organised criminal groups. They are constantly on the lookout for the ways to deliver the Trojans to the victims in the most natural, smooth and unsuspicious way. A modern Android banking Trojan, which is usually distributed through side-loading, must convincingly masquerade as a legitimate application so that it does not raise suspicion and persuades victims to proceed with the installation."
        https://www.threatfabric.com/blogs/massiv-when-your-iptv-app-terminates-your-savings
        https://thehackernews.com/2026/02/fake-iptv-apps-spread-massiv-android.html
        https://www.bleepingcomputer.com/news/security/new-massiv-android-banking-malware-poses-as-an-iptv-app/
        https://www.bankinfosecurity.com/massiv-attack-android-trojan-targets-iptv-users-a-30794
      • Brand Trust As a Weapon: Multi-Brand Impersonation Campaigns Deliver JWrapper Malware
        "In recent threat campaigns, attackers have begun abusing the trust placed in DocuSign, a widely used electronic signature platform, to deliver JWrapper-ackaged malware. By impersonating DocuSign and SimpleHelp communications and embedding malicious executables within seemingly legitimate documents or download links, threat actors trick users into executing harmful payloads."
        https://cofense.com/blog/brand-trust-as-a-weapon-multi-brand-impersonation-campaigns-deliver-jwrapper-malware
      • Supply Chain Attack Targeting Cline Installs OpenClaw
        "Our software supply chain security feed detected a compromised release of the popular AI assistant Cline. It was first reported by Adnan Khan and is tracked as GHSA-9ppg-jx86-fqw7. Version 2.3.0 of the Cline CLI npm package uses a post-install hook to automatically install OpenClaw on the same machine. The malicious version has been flagged in the meantime, but the tarball and metadata are still available at the time of writing. As visible from the metadata, the attacker supposedly got hold of a long-lived token to publish the malicious version, thereby bypassing the trusted publication process established by the Cline maintainers."
        https://www.endorlabs.com/learn/supply-chain-attack-targeting-cline-installs-openclaw
        https://www.darkreading.com/application-security/supply-chain-attack-openclaw-cline-users
      • Starkiller: New Phishing Framework Proxies Real Login Pages To Bypass MFA
        "Most phishing kits rely on static HTML clones of login pages. While effective, they’re inherently fragile: even minor interface updates from the impersonated brand can immediately reveal the deception. A new framework called Starkiller (not to be confused with the legitimate BC Security red team tool of the same name) takes a different approach. Sold openly as a commercial-grade cybercrime platform by a threat group calling itself Jinkusu, Starkiller is distributed like a SaaS product. It launches a headless Chrome instance—a browser that operates without a visible window—inside a Docker container, loads the brand’s real website, and acts as a reverse proxy between the target and the legitimate site."
        https://abnormal.ai/blog/starkiller-phishing-kit
        https://www.darkreading.com/threat-intelligence/starkiller-phishing-kit-mfa
        https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/
      • Beyond Tax Returns: How Shared Malware Infrastructure Scales Brand Abuse In Indonesia
        "The fraud campaign involving fake Coretax apps represents a sophisticated, industrialized threat targeting Indonesia’s digital public infrastructure. Initiated in July 2025 and experiencing a significant escalation in January 2026 — timed to coincide with the national tax season — the campaign leverages the impersonation of the official Coretax web platform to facilitate large-scale financial fraud. The attack chain integrates phishing websites, social engineering (WhatsApp), malicious APK sideloading, and voice phishing (vishing) to achieve full device compromise and unauthorized transfer execution."
        https://www.group-ib.com/blog/indonesia-tax-impersonation-goldfactory-malware/
      • Remcos RAT Expands Real-Time Surveillance Capabilities
        "A newly observed variant of Remcos RAT has introduced real-time surveillance features and stronger evasion techniques, marking a shift in how the malware operates on compromised Windows systems. The updated strain no longer relies primarily on storing stolen data locally. Instead, it establishes direct online communication with attacker-controlled servers, enabling immediate monitoring and data theft. The latest build can stream webcam footage in real time and transmit captured keystrokes instantly, reducing forensic traces left on infected machines."
        https://www.infosecurity-magazine.com/news/remcos-rat-expands-real-time/
      • (Don't) TrustConnect: It's a RAT In An RMM Hat
        "RMM tools continue to be many attackers’ top choice for initial access. Such enterprise remote support software like SimpleHelp, SuperOps, Datto, N-able and others are frequently delivered via email campaigns by cybercrime actors or used as follow-on payloads once an actor achieves initial access. (As always, the legitimate RMM tools mentioned in this report are just that — legitimate. It’s the threat actors doing the abusing. We call out brand names strictly to explain what the actors misused, not because the vendors themselves had any hand in the activity.) But at the end of January, Proofpoint observed a weird twist on the RMM landscape: a threat actor created a malware masquerading as an RMM called “TrustConnect Agent.”"
        https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat
        https://www.theregister.com/2026/02/19/rmm_rat_trustconnect/
      • Arkanix Stealer: a C++ & Python Infostealer
        "In October 2025, we discovered a series of forum posts advertising a previously unknown stealer, dubbed “Arkanix Stealer” by its authors. It operated under a MaaS (malware-as-a-service) model, providing users not only with the implant but also with access to a control panel featuring configurable payloads and statistics. The set of implants included a publicly available browser post-exploitation tool known as ChromElevator, which was delivered by a native C++ version of the stealer. This version featured a wide range of capabilities, from collecting system information to stealing cryptocurrency wallet data. Alongside that, we have also discovered Python implementation of the stealer capable of dynamically modifying its configuration. The Python version was often packed, thus giving the adversary multiple methods for distributing their malware. It is also worth noting that Arkanix was rather a one-shot malicious campaign: at the time of writing this article, the affiliate program appears to be already taken down."
        https://securelist.com/arkanix-stealer/119006/
      • VShell And SparkRAT Observed In Exploitation Of BeyondTrust Critical Vulnerability (CVE-2026-1731)
        "On Feb. 6, 2026, BeyondTrust released a security advisory regarding CVE-2026-1731. BeyondTrust is an identity and access management platform. This specific vulnerability involves a pre-authentication remote code execution (RCE) issue within BeyondTrust remote support software. It could allow attackers to execute operating system commands in the context of the site user, which may lead to system compromise, including unauthorized access, data exfiltration and service disruption."
        https://unit42.paloaltonetworks.com/beyondtrust-cve-2026-1731/
      • Dark Web Profile: Sinobi Ransomware
        "Sinobi Ransomware is a cybercrime operation that emerged in mid-2025, operating as a Ransomware-as-a-Service model. It is believed that the group is a rebrand or direct successor of the Lynx Ransomware group, which itself evolved from the INC Ransomware family. The group calls itself Sinobi, which closely resembles Shinobi (ninja), a term that appears across video games, film, music, comics, and entertainment, most notably in Sega’s long running Shinobi game series and other media titles."
        https://socradar.io/blog/dark-web-profile-sinobi-ransomware/
      • GrayCharlie Hijacks Law Firm Sites In Suspected Supply-Chain Attack
        "Insikt Group has been monitoring GrayCharlie, a threat actor overlapping with SmartApeSG and active since mid-2023, for some time, and is now publishing its first report on the group. GrayCharlie compromises WordPress sites and injects them with links to externally hosted JavaScript that redirects visitors to NetSupport RAT payloads delivered via fake browser update pages or ClickFix mechanisms. These infections often progress to the deployment of Stealc and SectopRAT. Insikt Group identified a large amount of infrastructure linked to GrayCharlie, primarily tied to MivoCloud and HZ Hosting Ltd. This includes NetSupport RAT command-and-control (C2) servers, both actor-controlled and compromised staging infrastructure, and higher-tier infrastructure used to administer operations."
        https://www.recordedfuture.com/research/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack
        https://assets.recordedfuture.com/insikt-report-pdfs/2026/cta-2026-0218.pdf
      • Uncovering The Sophisticated Phishing Campaign Bypassing M365 MFA
        "KnowBe4 Threat Labs has detected a sophisticated phishing campaign targeting North American businesses and professionals. This attack compromises Microsoft 365 accounts (Outlook, Teams, OneDrive) by abusing the OAuth 2.0 Device Authorization Grant flow, bypassing strong passwords and Multi-Factor Authentication (MFA). The victim is directed to the legitimate Microsoft domain (microsoft.com/devicelogin) portal to enter an attack-supplied device code. This action authenticates the victim and issues a valid OAuth access token to the attacker’s application. The real-time theft of these tokens grants the attacker persistent access to the victim’s Microsoft 365 accounts and corporate data."
        https://blog.knowbe4.com/uncovering-the-sophisticated-phishing-campaign-bypassing-m365-mfa

      Breaches/Hacks/Leaks

      • Univ. Of Mississippi Medical Center Dealing With Cyberattack
        "The University of Mississippi Medical Center on Thursday said a ransomware attack has triggered its emergency operations plan and forced its hospitals to cancel all clinic and elective procedures at all locations statewide. The FBI is investigating the incident. "It's too early for us to communicate what we do and don't know, but we are in the process of surging resources both locally and nationally into this incident," said Robert Eikhoff, FBI special agent in charge for Mississippi at a press conference held by the medical center Thursday afternoon, according to a local media outlet."
        https://www.bankinfosecurity.com/univ-mississippi-medical-center-dealing-cyberattack-a-30808
      • Abu Dhabi Finance Week Exposed VIP Passport Details
        "Organizers of one of the Middle East's biggest business and investment summits appear to have inadvertently exposed passport details and other identity information of some 700 attendees, including former British Prime Minister David Cameron and former White House communications director Anthony Scaramucci. An independent security researcher found the sensitive data sitting unprotected on a cloud storage system associated with Abu Dhabi Finance Week (ADFW), according to London's Financial Times, the first to report on the incident. The researcher, whom the Financial Times identified as Roni Suchowski, apparently discovered the data using off-the-shelf software for scanning cloud services for unsecured and publicly accessible data."
        https://www.darkreading.com/cyber-risk/abu-dhabi-finance-week-leaked-vip-passport-details
      • Data Protection Failures On Moldovan Portals Leave Citizens At Risk
        "Breaches involving government entities may be politically motivated, such as the 2022 compromise of the Presidency of Moldova’s email server or the 2024 compromise of Moldova’s parliamentary email servers just days before the country’s presidential election. Other incidents may be due to human error or may be financially motivated. In Part 1, DataBreaches describes a data exposure vulnerability with Moldova’s job application portal. In Part 2, DataBreaches reports on a dark web listing of data allegedly hacked from Moldova’s energy compensation portal."
        https://databreaches.net/2026/02/19/data-protection-failures-on-moldovan-portals-exposed-citizens-to-risk/
        https://databreaches.net/2026/02/19/leaked-data-raises-questions-about-hackers-claims-and-moldovas-prior-denial/
      • Intimate Products Maker Tenga Spilled Customer Data
        "Tenga confirmed reports published by several outlets that the company notified customers of a data breach. The Japanese manufacturer of adult products appears to have fallen victim to a phishing attack targeting one of its employees. Tenga reportedly wrote in the data breach notification:"
        https://www.malwarebytes.com/blog/news/2026/02/intimate-products-producer-tenga-spilled-customer-data
      • Leading Japanese Semiconductor Supplier Responding To Ransomware Attack
        "Japanese semiconductor test equipment supplier Advantest said it is dealing with a ransomware attack that has impacted several company systems. The company said it detected unusual activity within its IT environment on Sunday and activated incident response protocols and isolated the impacted systems. “Preliminary findings appear to indicate that an unauthorized third party may have gained access to portions of the company’s network and deployed ransomware,” Advantest said."
        https://therecord.media/leading-japanese-semiconductor-supplier-ransomware
      • Ransomware Gang Threatens Cheyenne And Arapaho Tribes After Shutting Down Schools
        "The government of the Cheyenne and Arapaho Tribes is being extorted by cybercriminals after a ransomware attack shut down its schools and critical systems in January. The Rhysida ransomware gang took credit for the attack this week and demanded 10 bitcoin, or about $660,000, in exchange for not leaking information stolen from the systems of the Cheyenne and Arapaho Tribes, a federally recognized government headquartered in Concho, Oklahoma. Officials previously confirmed the ransomware attack in January."
        https://therecord.media/cheyenne-arapaho-ransomware-rhysida

      General News

      • January 2026 APT Group Trends Report
        "Sandworm attempted to destroy OT and IT equipment using DynoWiper after exploiting a vulnerable configuration of FortiGate, targeting at least 30 energy facilities, including wind and solar power plants in Poland, by the end of December 2025. They directly damaged RTUs, IEDs, and serial devices or manipulated settings to cause loss of remote control and operational disruption, and even conducted large-scale wiper deployment using GPO. This represents the most significant sabotage attack that has caused a substantial impact on the stability of the European power grid, making it the top priority threat group this month."
        https://asec.ahnlab.com/en/92627/
      • More Than 40% Of South Africans Were Scammed In 2025
        "Africans lose money to scammers nearly twice as often as people from other countries do, according to recent survey data, and the financial costs in countries like South Africa are serious. In October, the Global Anti-Scam Alliance (GASA) released its "Global State of Scams 2025 Report," based on quick online questionnaires taken by 46,000 adults in 42 countries. It found that during the preceding 12 months, 57% of citizens experienced some kind of scam and 23% of them lost money to one."
        https://www.darkreading.com/cybersecurity-analytics/south-africans-scammed-2025
      • Public Mobile Networks Are Being Weaponized For Combat Drone Operations
        "On June 1, 2025, Ukraine launched a coordinated drone strike on five airfields inside Russia, disabling or destroying aircrafts. The attack involved more than 100 drones carrying explosive payloads and targeting aircraft on the ground. The drones used mobile networks to transmit telemetry, receive instructions, and send back images during the operation, highlighting the integration of civilian mobile networks into combat drone operations. Enea researchers examined the progression of that integration, how mobile-connected drones have been used in conflict, and what the trend signals for national infrastructure."
        https://www.helpnetsecurity.com/2026/02/19/enea-mobile-connected-drones-report/
      • Attackers Keep Finding The Same Gaps In Security Programs
        "Attackers keep getting in, often through the same predictable weak spots: identity systems, third-party access, and poorly secured perimeter devices. A new threat report from Barracuda based on Managed XDR telemetry from 2025 shows that many successful incidents still start with basic access and configuration failures, not advanced malware. The report draws on more than two trillion IT events, nearly 600,000 security alerts, and more than 300,000 protected assets monitored over the year. Barracuda’s SOC triaged around 53,000 high-severity threats through its SOAR platform."
        https://www.helpnetsecurity.com/2026/02/19/managed-xdr-threat-report-security-programs/
      • Major Operation In Africa Targeting Online Scams Nets 651 Arrests, Recovers USD 4.3 Million
        "Law enforcement agencies from 16 African countries have made 651 arrests and recovered more than USD 4.3 million in an international cybercrime operation against online scams. Operation Red Card 2.0 (8 December 2025 to 30 January 2026) targeted the infrastructure and actors behind high-yield investment scams, mobile money fraud and fraudulent mobile loan applications. During the eight-week operation, investigations exposed scams linked to over USD 45 million in financial losses and identified 1,247 victims, predominantly from the African continent but also from other regions of the world. Authorities also seized 2,341 devices and took down 1,442 malicious IPs, domains and servers, as well as other related infrastructure."
        https://www.interpol.int/News-and-Events/News/2026/Major-operation-in-Africa-targeting-online-scams-nets-651-arrests-recovers-USD-4.3-million
        https://www.fortinet.com/blog/industry-trends/interpol-operation-red-card-20-turning-collaboration-into-real-worl-cybercrime-disruption
        https://www.bleepingcomputer.com/news/security/police-arrests-651-suspects-in-african-cybercrime-crackdown/
        https://thehackernews.com/2026/02/interpol-operation-red-card-20-arrests.html
      • Connected And Compromised: When IoT Devices Turn Into Threats
        "The number of Internet of Things (IoT) devices operating in a home or office continues to balloon, but security awareness is lagging despite the considerable risks the technologies pose, from credential theft to network access. IoT security is a long-standing topic that evolves as an influx of devices emerges onto the landscape. Devices require internet connectivity, yet many lack sufficient passcode and encryption features and ship with insecure default settings, placing much of the responsibility on the user."
        https://www.darkreading.com/iot/connected-compromised-iot-devices-turn-threats
      • Threat Intelligence Has a Human-Shaped Blind Spot
        "Last weekend, someone used email bombing software to deluge my personal inbox with hundreds of mailing list subscriptions in less than an hour. The goal wasn't to overwhelm my inbox, it was to hide three specific messages. Buried at the bottom of the pile were three welcome emails from American Express for a credit card I didn't apply for. The scheme worked — briefly. By the time I noticed the Amex messages, they were 800 emails deep. Email bombing is certainly not a new technique for covering up the evidence of fraud, but what struck me was where else I'd seen it before. Deluge-by-email has been an online harassment tactic for years. It is a cheap way to make victims feel violated, powerless, and overwhelmed."
        https://www.darkreading.com/threat-intelligence/human-shaped-blind-spot
      • OpenClaw Security Issues Continue As SecureClaw Open Source Tool Debuts
        "OpenClaw is rarely out of the news, but not necessarily under that name. This ‘autonomous personal assistant’ started life as Clawdbot, changed its name to Moltbot, and is now OpenClaw. All references to any of these names refer to the same product. On February 14, 2026, Peter Steinberger – the developer of OpenClaw – announced he is joining OpenAI. OpenClaw is transitioning into the OpenClaw Foundation with OpenAI providing financial and technical support. The most continuous and consistent news, however, remains OpenClaw’s security failings."
        https://www.securityweek.com/openclaw-security-issues-continue-as-secureclaw-open-source-tool-debuts/
      • Have Your Say: NIST Seeks Feedback On Draft Cybersecurity Framework For Transit
        "Transit systems never stop moving, and neither do cyberthreats. The National Institute for Standards and Technology’s (NIST’s) newly released draft cybersecurity framework for transit agencies is open for public comment, and the people who run and secure these systems have a chance to help shape what comes next. Public transportation systems are increasingly attractive targets for cybercriminals. And the consequences of a successful attack can extend far beyond IT disruption. As transit agencies adopt more connected technologies, integrate operational technology (OT) with IT systems and rely on digital tools to manage daily operations, their attack surfaces continue to expand."
        https://blog.barracuda.com/2026/02/19/nist-feedback-cybersecurity-framework-transit
        https://www.nccoe.nist.gov/projects/transit-cybersecurity-framework-csf-community-profile

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 8f09b180-a200-4304-993b-30efd3cd6ae3-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • แจ้งเตือนภัยไซเบอร์: การโจมตี Device Code Phishing เพิ่มความเสี่ยงข้อมูลรั่วไหลในบัญชี Microsoft Entra

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ตรวจพบและติดตามสถานการณ์การโจมตีรูปแบบใหม่ที่ใช้เทคนิค Device Code Phishing ร่วมกับ Voice Phishing (Vishing) มุ่งเป้าบัญชี Microsoft Entra โดยอาศัยกระบวนการยืนยันตัวตนที่ถูกต้องตามขั้นตอนของ Microsoft เพื่อหลอกให้เหยื่อดำเนินการเข้าสู่ระบบและยืนยันตัวตนด้วยตนเอง ส่งผลให้ผู้โจมตีได้รับ Access Token และ Refresh Token ที่ถูกต้องโดยไม่ต้องขโมยรหัสผ่านหรือดักรหัส MFA ทำให้เกิดความเสี่ยงต่อการรั่วไหลของข้อมูล ความเสียหายต่อชื่อเสียง และผลกระทบต่อความต่อเนื่องทางธุรกิจอย่างมีนัยสำคัญ

      1. รายละเอียดภัยคุกคาม
        พบการโจมตีรูปแบบใหม่ที่มุ่งเป้าไปยังบัญชี Microsoft Entra โดยใช้เทคนิคผสมผสานระหว่าง Device Code Phishing และ Voice Phishing (Vishing) เพื่อหลอกให้ผู้ใช้ทำการยืนยันตัวตนผ่านกระบวนการ OAuth 2.0 Device Authorization Grant อย่างถูกต้องตามขั้นตอนจริงของ Microsoft ส่งผลให้ผู้โจมตีได้รับ Access Token และ Refresh Token ที่ถูกต้อง ซึ่งสามารถนำไปใช้เข้าถึงระบบขององค์กรได้โดยไม่ต้องขโมยรหัสผ่านหรือดักรหัส MFA

      จากรายงานข่าว พบความเชื่อมโยงว่ากลุ่มแฮกเกอร์ ShinyHunters อาจอยู่เบื้องหลังการโจมตีดังกล่าว โดยก่อนหน้านี้ ShinyHunters เคยถูกเชื่อมโยงกับการโจมตีแบบ Vishing ที่มุ่งเจาะบัญชี SSO ของ Okta และ Microsoft Entra เพื่อขโมยข้อมูล สะท้อนแนวโน้มการใช้ Social Engineering ควบคู่กับกระบวนการยืนยันตัวตนที่ถูกต้องตามกฎหมาย เพื่อหลีกเลี่ยงกลไกป้องกันแบบดั้งเดิมขององค์กร

      1. ภาพรวมกระบวนการโจมตี
        2.1 ผู้โจมตีใช้ Client ID ของแอป OAuth ที่ถูกต้อง (รวมถึงแอปของ Microsoft) เพื่อสร้าง device_code และ user_code
        2.2 ติดต่อเหยื่อผ่านโทรศัพท์ (Vishing) หรืออีเมล เพื่อหลอกให้กรอกรหัสที่หน้าเว็บไซต์ microsoft[.]com/devicelogin
        2.3 เหยื่อเข้าสู่ระบบและยืนยัน MFA ตามขั้นตอนปกติ ทำให้กระบวนการดูน่าเชื่อถือ
        2.4 หลังจากยืนยันตัวตนสำเร็จ ผู้โจมตีใช้ device_code แลก Refresh Token และ Access Token
        2.5 ใช้โทเคนดังกล่าวเข้าถึง Microsoft Entra และแอป SaaS ที่ผูกกับ SSO เพื่อเข้าถึงหรือขโมยข้อมูลองค์กร

      2. ผลิตภัณฑ์ที่ได้รับผลกระทบ
        3.1 Microsoft Entra (ชื่อเดิม Azure AD)
        3.2 Microsoft 365
        3.3 แอปพลิเคชัน SaaS ที่เชื่อมต่อผ่าน SSO ภายใน Tenant เช่น Salesforce, Google Workspace, Dropbox, SAP, Slack, Zendesk, Atlassian เป็นต้น
        3.4 ระบบที่เปิดใช้งาน OAuth 2.0 Device Authorization Flow

      3. แนวทางการบรรเทาและป้องกันความเสี่ยง

      แม้ Microsoft จะยังไม่มีรายงานเฉพาะเกี่ยวกับแคมเปญ Vishing/Device Code Phishing ดังกล่าวโดยตรง แต่จากเอกสารคำแนะนำด้านความปลอดภัยของ Microsoft และแนวทางการป้องกันของ Microsoft Entra สามารถดำเนินมาตรการบรรเทาความเสี่ยงได้ดังนี้
      4.1 บังคับใช้ Phishing-Resistant Authentication
      กำหนดให้ใช้วิธีการยืนยันตัวตนที่ทนทานต่อการฟิชชิง เช่น FIDO2 Security Keys หรือ Passkeys ผ่าน Conditional Access เพื่อลดความเสี่ยงจากการถูกหลอกให้กรอกข้อมูลยืนยันตัวตน แม้ผู้ใช้จะเข้าสู่หน้า login ที่ถูกต้องก็ตาม
      4.2 ควบคุมและจำกัด OAuth Application Consent
      กำหนด App Consent Policies เพื่อจำกัดสิทธิ์การยินยอมแอปพลิเคชัน โดยอนุญาตเฉพาะแอปที่ได้รับการตรวจสอบหรือได้รับอนุมัติจากผู้ดูแลระบบ และปิดการให้ผู้ใช้ยินยอมแอปภายนอกโดยอัตโนมัติ เพื่อลดความเสี่ยงจาก Consent Phishing
      4.3 บล็อกหรือจำกัดการใช้งาน Device Code Flow ผ่าน Conditional Access
      หากองค์กรไม่มีความจำเป็นต้องใช้ OAuth 2.0 Device Authorization Flow ควรปิดการใช้งาน หรือกำหนดเงื่อนไขจำกัดการใช้งานเฉพาะอุปกรณ์หรือเครือข่ายที่เชื่อถือได้ เพื่อลดพื้นผิวการโจมตี
      4.4 บังคับใช้นโยบาย Conditional Access แบบ Zero Trust
      กำหนดให้การเข้าถึงทรัพยากรสำคัญต้องมาจากอุปกรณ์ที่ผ่านการบริหารจัดการ (Managed/Compliant Devices) และกำหนดเงื่อนไขตามระดับความเสี่ยงของผู้ใช้ (Risk-based Policies) เช่น การบังคับ MFA เพิ่มเติมเมื่อพบพฤติกรรมผิดปกติ
      4.5 เพิกถอน Sign-in Sessions และ Refresh Tokens เมื่อพบความเสี่ยง
      หากตรวจพบพฤติกรรมต้องสงสัย ควรดำเนินการ Revoke Sign-in Sessions หรือเพิกถอน Refresh Token ของผู้ใช้ทันที เนื่องจากการเปลี่ยนรหัสผ่านเพียงอย่างเดียวอาจไม่เพียงพอหากผู้โจมตีมี Token ที่ยังไม่หมดอายุอยู่
      4.6 เปิดใช้งานการตรวจจับความเสี่ยงของ Entra ID Protection
      ใช้ความสามารถด้าน Identity Protection เพื่อตรวจจับการเข้าสู่ระบบที่มีความเสี่ยง (Risky Sign-ins) และกำหนดให้ระบบบังคับแก้ไขความเสี่ยงโดยอัตโนมัติ เช่น บังคับเปลี่ยนรหัสผ่านหรือทำ MFA เพิ่มเติม

      1. คำแนะนำด้านความปลอดภัยเพิ่มเติม
        5.1 ห้ามกรอกรหัส Device Code จากคำแนะนำทางโทรศัพท์หรืออีเมลโดยไม่ได้ตรวจสอบแหล่งที่มา
        5.2 อบรมผู้ใช้งานให้เข้าใจรูปแบบการโจมตีแบบ Vishing และ OAuth Abuse
        5.3 เปิดใช้งานการแจ้งเตือนเมื่อมีการเพิ่ม OAuth Application ใหม่ใน Tenant
        5.4 ใช้ระบบ Endpoint Detection and Response (EDR) และ Cloud App Security เพื่อตรวจจับพฤติกรรมผิดปกติ
        5.5 ทบทวนสิทธิ์การเข้าถึงแบบ Least Privilege เพื่อลดผลกระทบหากบัญชีถูกยึดครอง

      2. แหล่งอ้างอิง
        6.1 https://dg.th/w5cbgo4jke
        6.2 https://dg.th/cmayi3qrgn

      การโจมตี Device Code Phishing.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨 ตรวจสอบด่วน! ช่องโหว่ใน Grandstream GXP1600 VoIP Phones เสี่ยงถูกยึดเครื่อง

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) แจ้งเตือนช่องโหว่ความปลอดภัยระดับ Critical ในโทรศัพท์ Grandstream GXP1600 Series เป็นอุปกรณ์ VoIP ที่นิยมใช้ ซึ่งทำให้ผู้ไม่หวังดีสามารถเข้าควบคุมอุปกรณ์จากระยะไกล หรือดักฟังการสื่อสารได้ หากไม่ได้ดำเนินมาตรการป้องกันที่เหมาะสม

      1. รายละเอียดช่องโหว่
        ช่องโหว่หมายเลข CVE-2026-2329 ได้รับคะแนนความรุนแรง CVSS V4.0 : 9.3 (Critical) เป็นช่องโหว่ประเภท Stack-based Buffer Overflow เกิดขึ้นในบริการ Web-based API ของอุปกรณ์ ซึ่งเปิดให้เข้าถึงผ่านเครือข่ายโดยค่าเริ่มต้น และมีการตรวจสอบข้อมูลนำเข้าไม่เพียงพอ ทำให้ผู้ไม่หวังดีสามารถส่งข้อมูลที่ถูกปรับแต่งเป็นพิเศษเพื่อทำให้เกิด Buffer Overflow และสั่งรันคำสั่งจากระยะไกล (Remote Code Execution: RCE) ได้ โดยไม่ต้องใช้รหัสผ่าน

      2. รุ่นและเวอร์ชันที่ได้รับผลกระทบ
        รุ่นที่ได้รับผลกระทบ

      • GXP1610
      • GXP1615
      • GXP1620
      • GXP1625
      • GXP1628
      • GXP1630
        เวอร์ชันที่ได้รับผลกระทบ 1.0.7.79 และก่อนหน้า
        เวอร์ชันที่แก้ไขแล้ว: 1.0.7.81
      1. แนวทางการแก้ไขและป้องกัน
        3.1 อัปเดตเฟิร์มแวร์เป็นเวอร์ชัน 1.0.7.81 โดยด่วนที่สุด
        3.2 จำกัดหรือปิดการเข้าถึง Web Management Interface จากภายนอกหรือจำกัดให้เข้าได้เฉพาะ IP ที่เชื่อถือได้เท่านั้น
        3.3 แยกเครือข่ายอุปกรณ์ VoIP ออกจาก Network หลัก และไม่ควรเชื่อมต่อกับอินเทอร์เน็ตสาธารณะโดยตรง
        3.4 ควรเปลี่ยนรหัสผ่าน (Admin Password) และ SIP Password ใหม่ทันที หลังการอัปเดต

      อ้างอิง

      1. https://dg.th/hliwc9vnsp
      2. https://dg.th/9bfprn5ylq
      3. https://dg.th/7kys39utop

      หน่วยงานที่ใช้งานอุปกรณ์ดังกล่าวควรดำเนินการตรวจสอบและอัปเดตโดยเร็วที่สุด เพื่อป้องกันความเสี่ยงต่อระบบสื่อสารภายในหน่วยงาน

      #CyberSecurity #ThaiCERT #CVE20262329 #VoIP #Grandstream #RCE

      GXP1600 VoIP Phones V2.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • เช็กด่วน! ช่องโหว่กล้องวงจรปิด Honeywell

      เช็กด่วน! ช่องโหว่กล้องวงจรปิด Honeywell "แฮกเกอร์เข้าถึงกล้องวงจรปิดได้โดยไม่ต้องใช้รหัสผ่าน"

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) แจ้งเตือนภัยคุกคามด้านความมั่นคงปลอดภัยไซเบอร์เกี่ยวกับช่องโหว่ในกล้องวงจรปิด Honeywell ที่อาจทำให้ผู้ไม่หวังดีสามารถยึดบัญชีและเข้าถึงกล้องได้ทันที

      1. รายละเอียดช่องโหว่ที่สำคัญ
        CVE-2026-1670 มีความรุนแรง CVSS V3.x : 9.8 ในผลิตภัณฑ์กล้องวงจรปิด (CCTV) ของ Honeywell โดยช่องโหว่นี้อาจทำให้ผู้ไม่หวังดีสามารถข้ามการยืนยันตัวตน (Authentication Bypass) เพื่อเข้าควบคุมระบบได้โดยไม่ต้องใช้รหัสผ่าน

      2. กล้องวงจรปิดรุ่นที่ได้รับผลกระทบ
        2.1 I-HIB2PI-UL 2MP IP (เวอร์ชัน 6.1.22.1216)
        2.2 SMB NDAA MVO-3 WDR_2MP_32M_PTZ_v2.0
        2.3 PTZ WDR 2MP 32M WDR_2MP_32M_PTZ_v2.0
        2.4 25M IPC WDR_2MP_32M_PTZ_v2.0

      3. แนวทางการตรวจสอบและการป้องกัน
        3.1 ตรวจสอบเวอร์ชันและดำเนินการอัปเดตเฟิร์มแวร์ (Patch) เวอร์ชันล่าสุด
        3.2 จำกัดการเข้าถึงจากอินเทอร์เน็ต เพื่อหลีกเลี่ยงการเชื่อมต่อกล้องวงจรปิดเข้ากับอินเทอร์เน็ตโดยตรง หากจำเป็นต้องดูออนไลน์ ให้ใช้งานผ่าน VPN ที่มีความปลอดภัยสูง
        3.3 กำหนดค่า Firewall ปิดพอร์ตที่ไม่ใช้งาน และจำกัดสิทธิ์การเข้าถึงด้วย IP Whitelist
        3.4 ตรวจสอบประวัติการตั้งค่าและอีเมลที่ใช้สำหรับกู้คืนรหัสผ่านให้เป็นข้อมูลทางการของหน่วยงาน

      "ThaiCET เตือน อย่าปล่อยให้ตาที่คอยระวังภัยกลายเป็นช่องทางให้โจรแอบส่อง"

      อ้างอิง
      1.https://dg.th/ztpo0uv7j9
      2.https://dg.th/asftpb1v65
      3.https://dg.th/1vhbtporg2

      #Honeywell #CCTV #CyberSecurity #Warning #กล้องวงจรปิด #เตือนภัยแฮกเกอร์

      ด้วยความปรารถนาดี
      สำนักงานคณะกรรมการการรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ (สกมช.) / ThaiCERT
      Honeywell V2.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🚨ตรวจสอบด่วน! CISA เพิ่ม 4 ช่องโหว่ถูกใช้โจมตีจริงใน Known Exploited Vulnerabilities (KEV Catalog)

      ThaiCERT แจ้งเตือนพบการโจมตีแบบมีการใช้งานจริง (Actively Exploited) หลัง CISA เพิ่มช่องโหว่จำนวน 4 รายการเข้า (KEV) Catalog โดยช่องโหว่ดังกล่าวถูกยืนยันว่ามีการนำไปใช้โจมตีจริงแล้ว หากไม่เร่งอัปเดตแพตช์ อาจนำไปสู่การถูกยึดเครื่อง (RCE), การอัปโหลดไฟล์อันตรายเพื่อสั่งรันคำสั่งบนเซิร์ฟเวอร์, การเข้าถึงข้อมูลสำคัญโดยไม่ได้รับอนุญาต และการติดตั้งมัลแวร์เพื่อขยายผลในเครือข่ายได้

      รายละเอียดช่องโหว่ที่เกี่ยวข้อง
      1.1 CVE-2026-2441 (CVSS: 8.8) เป็นช่องโหว่ Use-after-free ในส่วน CSS ของ Google Chrome ในเวอร์ชันก่อน 145.0.7632.75 ซึ่งอาจทำให้ผู้โจมตีจากระยะไกลรันโค้ดภายใน sandbox ผ่านเว็บHTML ที่ถูกสร้างขึ้นเป็นพิเศษ
      1.2 CVE-2024-7694 (CVSS: 7.2) เป็นช่องโหว่การอัปโหลดไฟล์ไม่ปลอดภัย (Unrestricted File Upload) ในโปรแกรม ThreatSonar Anti-Ransomware จาก team 5 ทำให้ผู้โจมตีที่มีสิทธิ์ผู้ดูแลระบบบนแพลตฟอร์มสามารถอัปโหลดไฟล์อันตรายและนำไปสู่การสั่งรันคำสั่งบนเซิร์ฟเวอร์ได้ กระทบเวอร์ชันต่ำกว่า 3.5.0
      1.3 CVE-2020-7796 (CVSS: 9.8) เป็นช่องโหว่ใน Zimbra Collaboration Suite (ZCS) ที่อาจถูกใช้เพื่อสั่งให้เซิร์ฟเวอร์ไปเชื่อมต่อหรือดึงข้อมูลจากระบบภายในแทนผู้โจมตี ทำให้มีความเสี่ยงต่อการเข้าถึงข้อมูลสำคัญ โดยเฉพาะกรณีติดตั้ง WebEx zimlet และเปิดใช้งาน zimlet JSP เวอร์ชันก่อน 8.8.15 Patch 7
      1.4 CVE-2008-0015 (CVSS: 8.8) เป็นช่องโหว่เก่าใน Microsoft Windows Video ActiveX Control แต่พบการกลับมาใช้โจมตีจริง โดยเป็นช่องโหว่ Stack-based Buffer Overflow ที่อาจทำให้ผู้โจมตีสามารถเรียกใช้โค้ดจากระยะไกล (RCE) ได้

      แนวทางการป้องกันและลดความเสี่ยง
      2.1 Google Chrome อัปเดตเป็นเวอร์ชัน 145.0.7632.75 หรือใหม่กว่า และรีสตาร์ทเบราว์เซอร์หลังอัปเดต
      2.2 TeamT5 ThreatSonar อัปเดตเป็นเวอร์ชัน 3.5.0 ขึ้นไป จำกัดสิทธิ์ผู้ดูแล และตรวจสอบไฟล์ คำสั่งที่ถูกอัปโหลดหรือรันผิดปกติ
      2.3 Zimbra อัปเกรดเป็น 8.8.15 Patch 7 หรือใหม่กว่า หากไม่จำเป็นควรปิด WebEx zimlet และปิดการใช้งาน zimlet JSP เพื่อลดความเสี่ยง SSRF
      2.4 Windows รุ่นเก่า/Legacy พิจารณาเลิกใช้งานหรือแยกเครือข่าย (isolation) และลดการใช้งาน ActiveX เบราว์เซอร์แบบ legacy รวมถึงจำกัดการท่องเว็บของเครื่อง

      ข้อเสนอแนะเพิ่มเติม
      3.1 ตรวจสอบว่ามีระบบที่ใช้ Chrome,ThreatSonar,Zimbra หรือเครื่อง Windows รุ่นเก่าหลงเหลืออยู่หรือไม่ เพื่อเร่งแก้ไข
      3.2 เฝ้าระวัง Log เหตุผิดปกติ เช่น คำขอ SSRF ไปยังปลายทางภายใน (localhost/169.254.* หรือช่วง IP ภายใน), การอัปโหลดไฟล์ผิดปกติบน ThreatSonar, และพฤติกรรมเบราว์เซอร์ที่นำไปสู่การดาวน์โหลดไฟล์ เรียกใช้โปรเซสผิดปกติ
      3.3 ลดการเปิดเผยบริการต่ออินเทอร์เน็ต จำกัดการเข้าถึงคอนโซลบริหารจัดการอีเมลเซิร์ฟเวอร์ด้วย VPN, MFA และ allowlist เท่าที่จำเป็น
      3.4 ใช้หลักการ Least Privilege ลลดความเสียหายหากระบบถูกยึด และลดโอกาสการลุกลามไปยังระบบอื่นในองค์กร

      อ้างอิง (References)
      4.1 https://dg.th/my6du2f7br
      4.2 https://dg.th/o2vzcai3ux
      4.3 https://dg.th/wqd1z25byh
      4.4 https://dg.th/v2shz6fo9u
      4.5 https://dg.th/r2gt0c4akx
      4.6 https://dg.th/wd6tfb2kr9

      CISA เพิ่ม 4 ช่องโหว่.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 19 February 2026

      Industrial Sector

      • Honeywell CCTV Products
        "Successful exploitation of this vulnerability could lead to account takeovers and unauthorized access to camera feeds; an unauthenticated attacker may change the recovery email address, potentially leading to further network compromise."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-04
        https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/
      • GE Vernova Enervista UR Setup
        "Successful exploitation of these vulnerabilities may allow code execution with elevated privileges."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-03
      • Delta Electronics ASDA-Soft
        "Successful exploitation of this vulnerability may allow an attacker to write arbitrary data beyond the bounds of a stack-allocated buffer, leading to the corruption of a structured exception handler (SEH)."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-02
      • Siemens Simcenter Femap And Nastran
        "Siemens Simcenter Femap and Nastran is affected by multiple file parsing vulnerabilities that could be triggered when the application reads files in NDB and XDB formats. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution. Siemens has released new versions for the affected products and recommends to update to the latest versions."
        https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-01

      New Tooling

      • SecureClaw: Dual Stack Open-Source Security Plugin And Skill For OpenClaw
        "AI agent frameworks are being used to automate work that involves tools, files, and external services. That type of automation creates security questions around what an agent can access, what it can change, and how teams can detect risky behavior. SecureClaw is an open-source project that adds security auditing and rule-based controls to OpenClaw agent environments. The tool is published by Adversa AI and is designed to work with OpenClaw and related agents such as Moltbot and Clawdbot."
        https://www.helpnetsecurity.com/2026/02/18/secureclaw-open-source-security-plugin-skill-openclaw/
        https://github.com/adversa-ai/secureclaw

      Vulnerabilities

      • From PDF To Pwn: Scalable 0day Discovery In PDF Engines And Services Using Multi-Agent LLMs
        "When preparing to emerge from stealth, we sought to demonstrate the efficacy of our research workflow by targeting Apryse WebViewer (formerly PDFTron) and Foxit PDF cloud services. These platforms are widely deployed, feature-rich, and combine client-side UI logic with complex server-side SDKs, making them an ideal proving ground for vulnerability research. Our strategy involved a human-agent symbiosis: our researchers manually identified foundational vulnerability patterns, which were then taught to the Novee agent. Once the agent internalized the “scent” of these bugs, it autonomously explored the massive attack surface of both vendors. The result was the discovery of 13 distinct vulnerability categories, ranging from critical XSS to OS Command Injection."
        https://novee.security/blog/from-pdf-to-pwn-scalable-0day-discovery-in-pdf-engines-and-services-using-multi-agent-llms-2/
        https://www.securityweek.com/vulnerabilities-in-popular-pdf-platforms-allowed-account-takeover-data-exfiltration/
      • CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow In Grandstream GXP1600 VoIP Phones (FIXED)
        "Rapid7 Labs conducted a zero-day research project against the Grandstream GXP1600 series of Voice over Internet Protocol (VoIP) phones. This research resulted in the discovery of a critical unauthenticated stack-based buffer overflow vulnerability, CVE-2026-2329. A remote attacker can leverage CVE-2026-2329 to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. A vendor supplied firmware update, version 1.0.7.81, is available to fully remediate CVE-2026-2329. The vulnerability is present in the device's web-based API service, and is accessible in a default configuration. As all models in the GXP1600 series share a common firmware image, the vulnerability affects all six models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630. CVE-2026-2329 has a CVSSv4 score of 9.3 (Critical), and a Common Weakness Enumeration (CWE) of CWE-121: Stack-based Buffer Overflow."
        https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed/
        https://www.darkreading.com/threat-intelligence/grandstream-bug-voip-security-blind-spot
        https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html
      • Four Vulnerabilities Expose a Massive Security Blind Spot In IDE Extensions
        "IDEs are the weakest link in an organization’s supply chain security, and extensions are often a blind spot for security teams. Developers store their most sensitive information – business logic, API keys, database configurations, environment variables, and sometimes even customer data – on their local file systems, all accessible through the IDE. The OX Security Research team found vulnerabilities in four popular VS Code extensions (later confirmed on Cursor and Windsurf). Three were assigned CVEs – CVE-2025-65715, CVE-2025-65716, and CVE-2025-65717 – totaling over 120 million downloads and posing a significant threat to developers worldwide."
        https://www.ox.security/blog/four-vulnerabilities-expose-a-massive-security-blind-spot-in-ide-extensions/
        https://thehackernews.com/2026/02/critical-flaws-found-in-four-vs-code.html
        https://securityaffairs.com/188185/security/vs-code-extensions-with-125m-installs-expose-users-to-cyberattacks.html
      • Notepad++ Fixes Hijacked Update Mechanism Used To Deliver Targeted Malware
        "Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The version 8.9.2 update incorporates what maintainer Don Ho calls a "double lock" design that aims to make the update process "robust and effectively unexploitable." This includes verification of the signed installer downloaded from GitHub (implemented in version 8.8.9 and later), as well as the newly added verification of the signed XML returned by the update server at notepad-plus-plus[.]org."
        https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html
        https://www.bleepingcomputer.com/news/security/notepad-plus-plus-boosts-update-security-with-double-lock-mechanism/
        https://securityaffairs.com/188192/hacking/notepad-patches-flaw-used-to-hijack-update-system.html
        https://www.theregister.com/2026/02/18/notepadplusplus_security_update/
        https://www.helpnetsecurity.com/2026/02/18/notepad-secure-update-download/
      • CISA Adds Two Known Exploited Vulnerabilities To Catalog
        "CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
        CVE-2021-22175 GitLab Server-Side Request Forgery (SSRF) Vulnerability
        CVE-2026-22769 Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability"
        https://www.cisa.gov/news-events/alerts/2026/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog
        https://therecord.media/fed-agencies-ordered-to-patch-dell-bug-after-exploitation-warning
      • Firebase Misconfiguration Exposes 300M Messages From Chat & Ask AI Users
        "A massive security failure has put the private conversations of millions at risk after an unprotected database was left accessible online. Discovered by an independent researcher, the leak exposed roughly 300 million messages from more than 25 million users of Chat & Ask AI, a popular app with over 50 million downloads across the Google Play and Apple App Stores. The app is owned by Codeway, a Turkish technology firm founded in Istanbul in 2020, and acts as a ‘wrapper’, allowing a single gateway for users to interact with famous AI models like OpenAI’s ChatGPT, Google’s Gemini, and Anthropic’s Claude. Because it serves as a gateway to multiple systems, a single technical slip-up can have a massive impact on the privacy of its global user base."
        https://hackread.com/firebase-misconfiguration-chat-ask-ai-users-expose/
      • Microsoft Says Bug Causes Copilot To Summarize Confidential Emails
        "Microsoft says a Microsoft 365 Copilot bug has been causing the AI assistant to summarize confidential emails since late January, bypassing data loss prevention (DLP) policies that organizations rely on to protect sensitive information. According to a service alert seen by BleepingComputer, this bug (tracked under CW1226324 and first detected on January 21) affects the Copilot "work tab" chat feature, which incorrectly reads and summarizes emails stored in users' Sent Items and Drafts folders, including messages that carry confidentiality labels explicitly designed to restrict access by automated tools."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/

      Malware

      • Telegram Channels Expose Rapid Weaponization Of SmarterMail Flaws
        "Flare researchers monitoring underground Telegram channels and cybercrime forums have observed threat actors rapidly sharing proof-of-concept exploits, offensive tools, and stolen administrator credentials related to recently disclosed SmarterMail vulnerabilities, providing insight into how quickly attackers weaponize new security flaws. The activity occurred within days of the vulnerabilities being disclosed, with threat actors sharing and selling exploit code and compromised access tied to CVE-2026-24423 and CVE-2026-23760, critical flaws that enable remote code execution and authentication bypass on exposed email servers."
        https://www.bleepingcomputer.com/news/security/telegram-channels-expose-rapid-weaponization-of-smartermail-flaws/
      • Scammers Use Fake “Gemini” AI Chatbot To Sell Fake “Google Coin”
        "Scammers have found a new use for AI: creating custom chatbots posing as real AI assistants to pressure victims into buying worthless cryptocurrencies. We recently came across a live “Google Coin” presale site featuring a chatbot that claimed to be Google’s Gemini AI assistant. The bot guided visitors through a polished sales pitch, answered their questions about investment, projecting returns, and ultimately ended with victims sending an irreversible crypto payment to the scammers."
        https://www.malwarebytes.com/blog/ai/2026/02/scammers-use-fake-gemini-ai-chatbot-to-sell-fake-google-coin
        https://www.darkreading.com/endpoint-security/scam-abuses-gemini-chatbots-convince-people-buy-fake-crypto
      • Technical Deep Dive: The Monero Mining Campaign
        "In the contemporary threat landscape, while ransomware grabs headlines with high-impact disruptions, cryptojacking operations have quietly evolved into sophisticated, persistent threats. This report details a comprehensive forensic analysis of a recently identified cryptocurrency mining campaign. This operation distinguishes itself not merely by its payload but by its high level of technical integration and redundant persistence mechanisms."
        https://www.trellix.com/blogs/research/technical-deep-dive-the-monero-mining-campaign/
        https://www.infosecurity-magazine.com/news/cryptojacking-driver-boost-monero/
      • Job Scam Uses Fake Google Forms Site To Harvest Google Logins
        "As part of our investigation into a job-themed phishing campaign, we came across several suspicious URLs that all looked like this: https://forms.google.ss-o[.]com/forms/d/e/{unique_id}/viewform?form=opportunitysec&promo= The subdomain forms.google.ss-o[.]com is a clear attempt to impersonate the legitimate forms.google.com. The “ss-o” is likely introduced to look like “single sign-on,” an authentication method that allows users to securely log in to multiple, independent applications or websites using one single set of credentials (username and password)."
        https://www.malwarebytes.com/blog/scams/2026/02/job-scam-uses-fake-google-forms-site-to-harvest-google-logins
      • Journalism Under Attack: Predator Spyware In Angola
        "A new investigation by Amnesty International’s Security Lab has discovered evidence that the Predator spyware was used in 2024 to target Teixeira Cândido – an Angolan journalist, jurist, press freedom activist, and former Secretary-General of the Syndicate of Angolan Journalists (Sindicato dos Journalists Angolanos). This is the first forensically confirmed case of the Predator spyware being used to target civil society in Angola."
        https://securitylab.amnesty.org/latest/2026/02/journalism-under-attack-predator-spyware-in-angola/
        https://therecord.media/predator-spyware-used-to-infect-phone-angola-journalist
      • The Booking.com Phishing Campaign Targeting Hotels And Customers
        "Since the start of January, we have observed a resurgence in malicious activity targeting the hotel and retail sector. The primary motivation driving this incident is financial fraud, targeting two victims: hotel businesses and hotel customers, in sequential order. The threat actor(s) utilise impersonation of the Booking.com platform through two distinct phishing kits dedicated to harvesting credentials and banking information from each victim respectively."
        https://www.bridewell.com/insights/blogs/detail/the-booking.com-phishing-campaign-targeting-hotels-and-customers

      Breaches/Hacks/Leaks

      • French Ministry Confirms Data Access To 1.2 Million Bank Accounts
        "A hacker gained access to data from 1.2 million French bank accounts using stolen credentials belonging to a government official, according to the French Economy Ministry. French authorities said affected account holders will be notified in the coming days. “The French Economy Ministry said on Wednesday, February 18, that a hacker gained access to a national bank account database and consulted information on 1.2 million accounts.” reports French daily newspaper LeMonde. “Since the end of January, the hacker used the stolen credentials of an official to access and consult “parts of the file of all of the accounts open in French banks and which contains personal data such as bank account numbers, name of the account holder, address and in certain cases the account owner’s tax number,” the ministry said in a statement.”"
        https://securityaffairs.com/188200/hacking/french-ministry-confirms-data-access-to-1-2-million-bank-accounts.html
      • Adidas Investigates Third-Party Data Breach After Criminals Claim They Pwned The Sportswear Giant
        "Adidas has confirmed it is investigating a third-party breach at one of its partner companies after digital thieves claimed they stole information and technical data from the German sportswear giant. "We have been made aware of a potential data protection incident at one of our independent licensing partners and distributor for martial arts products," an Adidas spokesperson told The Register. "This is an independent company with its own IT systems.""
        https://www.theregister.com/2026/02/18/adidas_investigates_thirdparty_data_breach/
      • ShinyHunters Allegedly Drove Off With 1.7M CarGurus Records
        "CarGurus allegedly suffered a data breach with 1.7 million corporate records stolen, according to a notorious cybercrime crew that posted the online vehicle marketplace on its leak site on Wednesday. "This is a final warning to reach out by 20 Feb 2026 before we leak along with several annoying (digital) problems that'll come your way," ShinyHunters wrote in its announcement, seen by The Register and shared on social media. The digital crooks claimed the compromised files included personally identifiable information and "other internal corporate data.""
        https://www.theregister.com/2026/02/18/shinyhunters_cargurus_breach/

      General News

      • The UK’s Cyber Threat Has Changed. Most Organizations Haven’t.
        "For years, ransomware shaped how UK organizations thought about cyber risk. In 2025, that assumption quietly broke. The UK became the most targeted country in Europe, accounting for 16% of all recorded attacks across the region. But volume alone doesn’t explain what changed. The real shift was intent. Attackers didn’t just increase activity; they changed tactics. Disruption overtook monetization. Organizations that spent years preparing for one dominant threat model found themselves exposed to another."
        https://blog.checkpoint.com/research/the-uks-cyber-threat-has-changed-most-organizations-havent/
      • The Defense Industrial Base Is a Prime Target For Cyber Disruption
        "Cyber threats against the defense industrial base (DIB) are intensifying, with adversaries shifting from traditional espionage toward operations designed to disrupt production capacity and compromise supply chains. In this Help Net Security interview, Luke McNamara, Deputy Chief Analyst, Google Threat Intelligence Group, explains how attackers target the broader defense ecosystem and why identity has become the new security boundary."
        https://www.helpnetsecurity.com/2026/02/18/luke-mcnamara-google-dib-defense-industrial-base-cybersecurity/
      • Everyone Uses Open Source, But Patching Still Moves Too Slowly
        "Enterprise security teams rely on open source across infrastructure, development pipelines, and production applications, even when they do not track it as a separate category of technology. Open source has become a default building block in many environments, and the operational risks now look like standard enterprise security problems: patch delays, version sprawl, and aging platforms that stay online longer than planned. TuxCare’s 2026 Open Source Landscape Report describes an open source footprint that continues to expand through developer-led adoption, with security incidents still closely tied to unpatched vulnerabilities."
        https://www.helpnetsecurity.com/2026/02/18/open-source-adoption-patching-challenges/
      • 'Promptware' Attacks Await An Unprepared AI Industry
        "The large language model industry has mostly treated prompt injection attacks as a risk analogous to traditional web server prompt injection attacks. Researchers now say the industry has been solving the wrong problem. Prompt injection, or feeding rogue instructions to an artificial intelligence system, merits its own classification as "promptware" - malware that uses a large language model as its own execution engine, say researchers in a paper co-authored by researchers at Tel Aviv University, Ben-Gurion University of the Negev and Harvard University."
        https://www.bankinfosecurity.com/promptware-attacks-await-unprepared-ai-industry-a-30785
        https://arxiv.org/pdf/2601.09625v2
      • Hackers Increasingly Prefer Fast And Low-Complexity Attacks
        "There's no need to invest into sophisticated hacking operations when moving fast and exploiting well-trod techniques gives threat actors all the access they want. Across a range of different types of attacks, "threat actors are increasingly prioritizing accessible and low-complexity entry points, rather than investing in sophisticated exploits," says a new report from cybersecurity firm Arctic Wolf. Unsurprisingly, phishing is a regular standby. The vast majority of business email compromise attacks started with an infection from a phishing email, a figure that probably will only climb upward as artificial intelligence makes "fraudulent messages more convincing and scalable.""
        https://www.bankinfosecurity.com/hackers-increasingly-prefer-fast-low-complexity-attacks-a-30787
        https://arcticwolf.com/resource/aw/arctic-wolf-threat-report-2026
      • “Good Enough” Emulation: Fuzzing a Single Thread To Uncover Vulnerabilities
        "This blog describes efforts at emulating functionality of the Socomec DIRIS M-70 gateway to discover vulnerabilities. In vulnerability research, knowing which tool to use for the job at hand is crucial. This post will highlight multiple emulation tools and approaches used, detail the benefits and drawbacks of each, and reveal how a "good enough" approach can really pay off."
        https://blog.talosintelligence.com/good-enough-emulation/
      • A CISO's Playbook For Defending Data Assets Against AI Scraping
        "Areejit Banerjee, Senior Manager of Data Protection Strategy & Product Trust; Researcher in AI Governance, Purdue University: Organizations with commercially valuable data face a near-certainty that AI-driven scrapers are already trying to harvest it at scale, turning public endpoints into high-throughput extraction pipelines. Many security teams still treat scraping as a nuisance bot problem to be handled by a vendor, a few WAF rules, and wishful thinking. That framing breaks down as soon as the scraped data underpins revenue or competitive advantage. When attackers can lift the very datasets that fund your business, scraping is no longer a low-priority ticket; it is a board-level risk."
        https://www.darkreading.com/cyber-risk/ciso-playbook-defending-data-assets-against-ai-scraping
      • The Era Of The Digital Parasite: Why Stealth Has Replaced Ransomware
        "For years, ransomware encryption functioned as the industry’s alarm bell. When systems locked up, defenders knew an attack had occurred. Not anymore. New empirical data show that attackers are actively dismantling that signal. According to Picus Security’s Red Report 2026, adversaries are no longer optimizing for disruption; they’re optimizing for residency. Based on a thorough analysis of more than 1.1 million malicious files and 15.5 million adversarial actions from 2025, this year’s report documents a decisive shift in attacker behavior: a noticeable impact has become a liability. Stealthy long-term presence is now the objective."
        https://www.helpnetsecurity.com/2026/02/18/picus-security-red-report-identity-driven-cyberattacks/
      • Record Number Of Ransomware Victims And Groups In 2025
        "Security researchers observed a 30% annual increase in ransomware victims listed on extortion sites last year, with AI helping to lower the barrier to entry for new threat groups. Searchlight Cyber's new report, Ransomware’s Record Year: Tracking a Volatile Landscape in H2 2025, tracked 7458 victims on dark web leak sites in 2025. These numbers were split virtually 50:50 between the first and second half of the year. To put the annual growth figure in perspective, victim numbers increased by just 13% between 2023 and 2024. At the same time, the number of ransomware groups hit a new high of 124, with 73 new groups identified in 2025."
        https://www.infosecurity-magazine.com/news/record-number-ransomware-victims/
        https://slcyber.io/whitepapers-reports/the-ransomware-landscape-in-h2-2025/
      • Your AI-Generated Password Isn't Random, It Just Looks That Way
        "Generative AI tools are surprisingly poor at suggesting strong passwords, experts say. AI security company Irregular looked at Claude, ChatGPT, and Gemini, and found all three GenAI tools put forward seemingly strong passwords that were, in fact, easily guessable. Prompting each of them to generate 16-character passwords featuring special characters, numbers, and letters in different cases, produced what appeared to be complex passphrases. When submitted to various online password strength checkers, they returned strong results. Some said they would take centuries for standard PCs to crack."
        https://www.theregister.com/2026/02/18/generating_passwords_with_llms/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) a62162bd-8606-40a9-a64b-c8bcdc6fc996-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Notepad++ เสริมความปลอดภัยระบบอัปเดตด้วย "Double-lock" ป้องกันภัยคุกคาม Supply Chain

      a2d380c4-9131-4aae-99a5-5e166a5345ec-image.png Notepad++ เสริมความปลอดภัยระบบอัปเดตด้วย Double-lock ป้.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand a112f651-134a-4198-835d-06bfab2964de-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เพิ่ม 4 ช่องโหว่ที่ถูกใช้โจมตีลงใน KEV เตือนเร่งแก้ไขช่องโหว่โดยด่วน

      1fb832ed-b4ee-4c88-9064-9fc6bce51c02-image.png CISA เพิ่ม 4 ช่องโหว่ที่ถูกใช้โจมตีลงใน KEV เตือ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 006533e0-d724-493d-a9f7-5ae0e2fa77d6-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบกลุ่มแฮกเกอร์ APT ใช้ช่องโหว่ Zero-day ของ Dell เจาะระบบ VMware ตั้งแต่กลางปี 2024

      a612244b-46fa-4fd1-8986-40dcf7d3e22c-image.png พบกลุ่มแฮกเกอร์ APT ใช้ช่องโหว่ Zero-day ของ Dell เจา.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 7a0769f7-e94c-40d2-879e-3650d211d39d-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Washington Hotel ถูกโจมตีด้วยมัลแวร์เรียกค่าไถ่ กระทบข้อมูลธุรกิจระดับองค์กร

      eb31cd28-7989-45b0-bd9c-20b6ffdf3019-image.png Washington Hotel ถูกโจมตีด้วยมัลแวร์เรียกค่าไถ่ กระ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 33e32808-8d26-418e-83be-eabaa7ad5c94-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT