BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Infrastructure Under Siege: From Actively Exploited BeyondTrust RCE to Healthcare Ransomware Shutdowns

Critical Infrastructure Under Siege: From Actively Exploited BeyondTrust RCE to Healthcare Ransomware Shutdowns

February 20, 2026Malware & Threats4 min readcritical

Originally reported by BleepingComputer, Malwarebytes Labs, Fortinet

#ransomware#data-breach#active-exploitation#healthcare-security#critical-infrastructure#atm-malware#ai-malware#supply-chain
Share

TL;DR

CISA warns of actively exploited BeyondTrust RCE in ransomware campaigns while healthcare systems face operational shutdowns and AI-powered malware emerges on Android.

Why critical?

CISA confirms active exploitation of BeyondTrust RCE vulnerability in ransomware attacks, combined with critical infrastructure disruption at UMMC affecting statewide healthcare operations.

Actively Exploited Critical Vulnerabilities

BeyondTrust RCE Now Weaponized in Ransomware Campaigns

CISA added BeyondTrust Remote Support vulnerability CVE-2026-1731 to the Known Exploited Vulnerabilities catalog, confirming active exploitation in ransomware attacks. The remote code execution flaw allows attackers to compromise systems running the privileged access management solution, creating a pathway for lateral movement and ransomware deployment. Organizations running BeyondTrust Remote Support must apply patches immediately or face imminent compromise.

Critical Infrastructure Impact

Mississippi Medical System Suffers Statewide Shutdown

The University of Mississippi Medical Center closed all clinic locations across the state following a ransomware attack, demonstrating the cascading operational impact of healthcare-targeted campaigns. The closure affects patient care delivery statewide, highlighting how ransomware groups continue prioritizing healthcare infrastructure for maximum disruption leverage.

Japanese Semiconductor Giant Advantest Breached

Advantest Corporation, a major semiconductor testing equipment manufacturer, disclosed a ransomware attack potentially compromising customer and employee data. The breach affects a critical supply chain component in the global semiconductor ecosystem, raising concerns about intellectual property theft and supply chain integrity in an already strained industry.

Evolving Attack Vectors

First AI-Powered Android Malware Discovered

Security researchers identified PromptSpy, the first known Android malware incorporating generative AI into its execution flow. The malware leverages Google's Gemini model to dynamically adapt its persistence mechanisms across different device configurations, marking a significant evolution in mobile threat sophistication. This represents a new frontier where threat actors weaponize large language models for real-time attack adaptation.

ATM Jackpotting Surge Nets $20M+ in 2025

The FBI reported over $20 million in losses from ATM malware attacks during 2025, representing a massive surge in "jackpotting" incidents. Criminals deploy malware to force cash dispensers to expel currency, targeting financial infrastructure with increasingly sophisticated techniques. The scale suggests organized campaigns rather than opportunistic attacks.

Data Breach Landscape

PayPal Software Error Exposed User Data for Six Months

PayPal disclosed a data breach affecting customers through a loan application software error that exposed sensitive personal information, including Social Security numbers, for nearly six months. The extended exposure window demonstrates how application vulnerabilities can create prolonged data exposure risks in financial services platforms.

French Banking Registry Compromises 1.2 Million Accounts

The French Ministry of Finance announced a cybersecurity incident affecting 1.2 million accounts in the national bank registry system. The breach impacts a significant portion of France's banking infrastructure, potentially exposing financial records and personal data of account holders across multiple institutions.

Additional Threat Intelligence

Winos 4.0 Campaigns Intensify Against Taiwan

FortiGuard Labs documented massive Winos 4.0 (ValleyRat) campaigns specifically targeting Taiwanese organizations through phishing lures, DLL sideloading, and bring-your-own-vulnerable-driver abuse. The geopolitically-focused campaign demonstrates continued state-sponsored or state-aligned threat activity against Taiwan's digital infrastructure.

Facebook Ads Weaponized for Windows 11 Malware Distribution

Threat actors exploited Facebook's advertising platform to distribute password-stealing malware disguised as legitimate Windows 11 downloads. The campaign targets cryptocurrency wallets and stored credentials, leveraging social media advertising to achieve broad malware distribution while evading traditional security controls.

Ukrainian Sentenced for North Korean IT Worker Infiltration Scheme

A Ukrainian national received a five-year prison sentence for providing stolen identities to North Korean IT workers, enabling their infiltration of U.S. companies. The case illustrates sophisticated state-sponsored efforts to penetrate American corporate networks through identity theft and insider placement operations.

Age Verification Vendor Persona Exposed Frontend Systems

Researchers discovered that identity verification company Persona left frontend systems exposed, revealing extensive background screening capabilities hidden behind basic age verification interfaces. The exposure highlights how identity verification services collect far more personal data than users realize.

Sources

  • https://www.bleepingcomputer.com/news/security/japanese-tech-giant-advantest-hit-by-ransomware-attack/
  • https://www.bleepingcomputer.com/news/security/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/
  • https://www.bleepingcomputer.com/news/security/data-breach-at-french-bank-registry-impacts-12-million-accounts/
  • https://www.bleepingcomputer.com/news/security/paypal-discloses-data-breach-exposing-users-personal-information/
  • https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/
  • https://www.bleepingcomputer.com/news/security/fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025/
  • https://www.bleepingcomputer.com/news/security/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms/
  • https://www.bleepingcomputer.com/news/security/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/
  • https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed
  • https://www.malwarebytes.com/blog/scams/2026/02/facebook-ads-spread-fake-windows-11-downloads-that-steal-passwords-and-crypto-wallets
  • https://feeds.fortinet.com/~/948054752/0/fortinet/blog/threat-research~Massive-Winos-Campaigns-Target-Taiwan

Originally reported by BleepingComputer, Malwarebytes Labs, Fortinet

Tags

#ransomware#data-breach#active-exploitation#healthcare-security#critical-infrastructure#atm-malware#ai-malware#supply-chain

Tracked Companies

🇺🇸Meta Platforms
🇺🇸Google

Related Intelligence

  • Active RoundCube Exploitation, AI-Generated Stealers, and France's FICOBA Breach

    criticalFeb 23, 2026
  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Threat Intelligence Digest: Chinese APT Campaign, Critical Router RCE, and Agent Tesla Resurgence

    highFeb 26, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Starkiller Phishing Service Proxies Real Login Pages to Bypass MFA

Next Article

Critical BeyondTrust RCE Exploited in Wild, Plus Supply Chain Attacks Hit Developer Tools →