BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Underground Channels Weaponize SmarterMail Flaws as AI Tools Leak Enterprise Data

Underground Channels Weaponize SmarterMail Flaws as AI Tools Leak Enterprise Data

February 18, 2026Malware & Threats4 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

#exploit-development#data-breaches#ai-security#supply-chain#zero-day#phishing#telegram#enterprise-security
Share

TL;DR

Underground Telegram channels rapidly weaponize SmarterMail exploits while Chinese APT groups exploit Dell zero-day. Microsoft AI tools leak confidential data as fintech breaches expose millions.

Why critical?

Chinese state-backed actors exploiting a Dell zero-day since mid-2024, combined with rapid weaponization of SmarterMail flaws through underground channels, represents critical enterprise exposure with confirmed active exploitation.

SmarterMail Exploits Hit Underground Markets

Flare researchers documented the rapid weaponization of recently disclosed SmarterMail vulnerabilities through underground Telegram channels. Threat actors shared proof-of-concept exploits and stolen administrator credentials for CVE-2026-24423 and CVE-2026-23760 within days of public disclosure, with activity directly linked to ransomware operations. The research highlights how monitoring criminal communities provides early warning of exploit adoption patterns.

Chinese APT Exploits Dell Zero-Day Since Mid-2024

A suspected Chinese state-backed group has been quietly exploiting a critical Dell security flaw in zero-day attacks dating back to mid-2024. The prolonged exploitation timeline suggests sophisticated persistent access across Dell infrastructure, though specific CVE details and affected products remain undisclosed. The campaign demonstrates advanced persistent threat actors' preference for maintaining long-term access through zero-day exploitation.

Microsoft AI Tools Bypass Data Protection Controls

Microsoft disclosed that Copilot has been summarizing confidential emails since late January due to a bug that bypasses data loss prevention policies. The flaw undermines organizational data protection controls designed to prevent AI systems from accessing sensitive information. Meanwhile, Exchange Online's anti-phishing rules mistakenly quarantined legitimate emails and Teams messages due to faulty heuristic detection algorithms.

VSCode Extensions Harbor Critical Vulnerabilities

Security researchers identified high to critical severity vulnerabilities in popular Visual Studio Code extensions with a combined download count exceeding 128 million. The flaws could enable attackers to steal local files and execute remote code on developer workstations. The findings underscore supply chain risks in the developer tooling ecosystem, where extensions often operate with extensive system permissions.

Fintech Sector Faces Multiple Data Breaches

Figure Technology Solutions disclosed a breach affecting nearly one million user accounts, exposing personal and contact information. Separately, analysis suggests the Betterment data breach may be more severe than initially reported, with leaked data containing detailed personal and financial information suitable for sophisticated phishing campaigns. Both incidents highlight persistent vulnerabilities in financial technology infrastructure.

Supply Chain Security Improvements

Notepad++ implemented a "double-lock" update mechanism to address security gaps that previously enabled supply chain compromises. The enhanced verification process aims to prevent malicious update injection, following industry best practices for secure software distribution. The changes reflect broader industry recognition of update mechanisms as critical attack vectors.

Law Enforcement and Regulatory Actions

Dutch police arrested a 40-year-old man on hacking charges after accidentally sending him access credentials to their own confidential documents. The incident raises questions about proper incident classification and digital evidence handling procedures. Meanwhile, a Glendale resident received a five-year federal sentence for operating a darknet drug marketplace, and Spanish courts ordered NordVPN and ProtonVPN to block 16 piracy websites.

Phishing Campaigns Exploit Trust Mechanisms

Threat actors deployed fake Google Forms pages on lookalike domains to harvest Google credentials from job seekers. A separate campaign uses a fraudulent AI chatbot impersonating Google's Gemini to promote fake "Google Coin" cryptocurrency investments promising unrealistic returns. Both schemes exploit user trust in legitimate Google services for credential theft and financial fraud.

Browser Security and Privacy Concerns

Malwarebytes identified potential data leakage issues with Chrome's preloading feature, which may trigger false positives in Browser Guard protection systems. The findings highlight ongoing tension between browser performance optimization and privacy protection mechanisms.

IoT Security Research Advances

Cisco Talos researchers demonstrated efficient vulnerability discovery in IoT devices through targeted emulation techniques. Using single-thread emulation of the Socomec DIRIS M-70 gateway's Modbus implementation, researchers identified six vulnerabilities that have since been patched, showcasing practical approaches to IoT security testing.

Sources

  • https://www.bleepingcomputer.com/news/security/telegram-channels-expose-rapid-weaponization-of-smartermail-flaws/
  • https://www.bleepingcomputer.com/news/microsoft/microsoft-anti-phishing-rules-mistakenly-blocked-emails-teams-messages/
  • https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/
  • https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/
  • https://www.bleepingcomputer.com/news/security/glendale-man-gets-5-years-in-prison-for-role-in-darknet-drug-trafficking-operation/
  • https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/
  • https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/
  • https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/
  • https://www.bleepingcomputer.com/news/security/notepad-plus-plus-boosts-update-security-with-double-lock-mechanism/
  • https://www.bitdefender.com/en-us/blog/hotforsecurity/dutch-police-arrest-man-hacking-accidentally-sending-confidential-files
  • https://blog.talosintelligence.com/good-enough-emulation/
  • https://www.malwarebytes.com/blog/news/2026/02/betterment-data-breach-might-be-worse-than-we-thought
  • https://www.malwarebytes.com/blog/scams/2026/02/job-scam-uses-fake-google-forms-site-to-harvest-google-logins
  • https://www.malwarebytes.com/blog/ai/2026/02/scammers-use-fake-gemini-ai-chatbot-to-sell-fake-google-coin
  • https://www.malwarebytes.com/blog/product/2026/02/chrome-preloading-could-be-leaking-your-data-and-causing-problems-in-browser-guard

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

Tags

#exploit-development#data-breaches#ai-security#supply-chain#zero-day#phishing#telegram#enterprise-security

Tracked Companies

🇦🇪Telegram
🇺🇸Google

Related Intelligence

  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Week in Malware: CISA Adds n8n to KEV, Iran-Linked Wiper Hits Medical Giant

    criticalMar 12, 2026
  • Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

    criticalFeb 25, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← El Paso Airspace Shutdown Exposes Critical Gaps in Urban Drone Defense

Next Article

Google Patches Zero-Day CSS Vulnerability in Chrome →