BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Threat Roundup: Zero-Days, Data Breaches, and Evolving Attack Vectors

Threat Roundup: Zero-Days, Data Breaches, and Evolving Attack Vectors

criticalMalware & Threats|February 17, 20263 min read

Originally reported by BleepingComputer, Checkpoint Research, Malwarebytes Labs

#ransomware#data-breach#zero-day#infostealer#clickfix#chrome#beyondtrust#passkeys
Share

TL;DR

Critical Chrome zero-day, BeyondTrust vulnerability, major data breaches at Eurail and Canada Goose, plus evolving infostealer campaigns targeting AI frameworks.

Why critical?

CISA issued emergency directive ordering federal agencies to patch BeyondTrust vulnerability within three days, combined with actively exploited Chrome zero-day, Eurail railway data sold on dark web, ransomware hitting Washington Hotel Japan, and ClickFix evolution. CISA emergency directive indicates confirmed active exploitation at scale.

Browser Security Crisis

Google Patches First Chrome Zero-Day of 2026

Google released emergency Chrome updates addressing a high-severity vulnerability actively exploited in zero-day attacks. The flaw marks the first such critical security issue patched since the start of the year, underlining the continued targeting of browser infrastructure by threat actors. Security teams should prioritize immediate Chrome updates across enterprise environments.

Critical Infrastructure Under Fire

CISA Issues 3-Day Patch Deadline for BeyondTrust Flaw

The Cybersecurity and Infrastructure Security Agency ordered federal agencies to secure BeyondTrust Remote Support instances within three days due to active exploitation of a critical vulnerability. The emergency directive highlights the severity of threats against privileged access management platforms, which provide attackers with potential pathways to critical infrastructure systems.

Hospitality and Travel Sector Breaches

Washington Hotel Japan Hit by Ransomware

The Washington Hotel brand in Japan disclosed a ransomware infection compromising servers and exposing business data. The incident adds to the growing list of hospitality sector breaches, demonstrating continued threat actor interest in organizations handling large volumes of personal and payment information.

Eurail Data Surfaces on Dark Web Markets

Eurail B.V., providing access to 250,000 kilometers of European railways, confirmed that data stolen in an earlier breach is being actively sold on dark web marketplaces. The incident affects travelers across the European rail network and represents a significant supply chain security event for continental transportation infrastructure.

Retail and E-commerce Compromises

Canada Goose Investigates 600K Record Leak

ShinyHunters claimed responsibility for stealing over 600,000 Canada Goose customer records containing personal and payment data. The luxury retailer stated the dataset appears related to past transactions and found no evidence of direct system compromise, suggesting potential third-party vendor involvement or legacy system exposure.

Emerging Attack Vectors

Infostealers Target OpenClaw AI Frameworks

Researchers identified the first infostealer campaigns specifically targeting OpenClaw agentic AI assistant secrets, including API keys and authentication tokens. The development signals threat actor adaptation to emerging AI infrastructure, potentially enabling unauthorized access to enterprise AI systems and associated cloud resources.

ClickFix Evolves with DNS Lookup Tactics

Microsoft researchers documented ClickFix campaigns incorporating nslookup commands to facilitate Remote Access Trojan deployment. The technique exploits legitimate system tools to bypass security controls, representing tactical evolution in social engineering campaigns targeting end-user systems.

Compliance and Authentication

Passwordless Security and ISO 27001 Alignment

Security practitioners are navigating passkey implementation while maintaining ISO/IEC 27001 compliance requirements. The transition from password-based authentication requires careful alignment with Annex A controls and comprehensive risk assessment frameworks.

Law Enforcement and Data Protection

Dutch Arrest Over Police Data Extortion

Dutch authorities arrested a 40-year-old individual who downloaded confidential police documents accidentally shared online and demanded compensation for their deletion. The case highlights the intersection of data protection law and opportunistic threat actor behavior.

Sources

  • https://www.bleepingcomputer.com/news/security/washington-hotel-in-japan-discloses-ransomware-infection-incident/
  • https://www.bleepingcomputer.com/news/security/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web/
  • https://www.bleepingcomputer.com/news/security/man-arrested-for-demanding-reward-after-accidental-police-data-leak/
  • https://www.bleepingcomputer.com/news/security/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/
  • https://www.bleepingcomputer.com/news/security/passwords-to-passkeys-staying-iso-27001-compliant-in-a-passwordless-era/
  • https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days/
  • https://www.bleepingcomputer.com/news/security/google-patches-first-chrome-zero-day-exploited-in-attacks-this-year/
  • https://www.bleepingcomputer.com/news/security/canada-goose-investigating-as-hackers-leak-600k-customer-records/
  • https://research.checkpoint.com/2026/16th-february-threat-intelligence-report/
  • https://www.malwarebytes.com/blog/news/2026/02/clickfix-added-nslookup-commands-to-its-arsenal-for-downloading-rats
  • https://www.malwarebytes.com/blog/news/2026/02/a-week-in-security-february-9-february-15

Originally reported by BleepingComputer, Checkpoint Research, Malwarebytes Labs

Tags

#ransomware#data-breach#zero-day#infostealer#clickfix#chrome#beyondtrust#passkeys

Threat Actors

🏴ShinyHunters

Tracked Companies

🇺🇸Google

Related Intelligence

  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

    criticalFeb 25, 2026
  • Critical Infrastructure Under Siege: Lazarus Strikes, FBI Raids, and Zero-Days in Production

    highMar 20, 2026

Related Knowledge

  • NERF Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — NERF Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — NERF Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Three New Side-Channel Attacks Expose LLM Privacy Through Network Metadata

Next Article

Threat Roundup: Remote Access Abuse, PDF Security Flaws, and Data Exposure Risks→