BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

February 25, 2026Malware & Threats3 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Malwarebytes Labs

#zero-day#sanctions#solarwinds#data-breach#phishing#privacy#critical-vulnerabilities#ransomware
Share

TL;DR

The U.S. sanctioned a Russian exploit broker involved in zero-day trading while SolarWinds patched four critical remote code execution vulnerabilities. Multiple major data breaches affected Wynn Resorts and CarGurus, exposing millions of records.

Why critical?

Critical SolarWinds Serv-U vulnerabilities offering root access combined with active zero-day exploit trading represent immediate enterprise threats requiring urgent attention.

Treasury Sanctions Russian Zero-Day Broker

The U.S. Treasury Department sanctioned a Russian exploit broker who purchased stolen hacking tools from a former U.S. defense contractor executive. The sanctions target the procurement and distribution network for zero-day exploits, highlighting the ongoing threat from state-sponsored cybercriminal enterprises operating across jurisdictional boundaries.

The action represents continued efforts to disrupt the commercial exploit trade that enables advanced persistent threat groups and ransomware operators to acquire sophisticated attack tools.

Critical SolarWinds Serv-U Vulnerabilities Patched

SolarWinds addressed four critical remote code execution vulnerabilities in Serv-U that could grant attackers root access to unpatched servers. The flaws represent significant exposure for organizations running the file transfer solution, particularly given SolarWinds' history as a high-value target for nation-state actors.

Administrators should prioritize immediate patching of Serv-U instances to prevent potential compromise through these attack vectors.

Freight Sector Under Phishing Attack

A financially motivated threat group designated "Diesel Vortex" is conducting credential theft campaigns against freight and logistics operators across the U.S. and Europe. The operation leverages 52 domains in phishing attacks specifically targeting the transportation sector's operational infrastructure.

The campaign demonstrates continued adversary focus on critical supply chain components, with credential theft enabling potential downstream attacks on logistics networks.

Major Data Breaches Hit Gaming and Hospitality

Wynn Resorts confirmed employee data theft after appearing on the ShinyHunters extortion gang's leak site. Separately, ShinyHunters published personal information from over 12.4 million CarGurus accounts, exposing data from the automotive platform's user base.

Both incidents underscore the persistent threat from extortion groups targeting high-profile organizations for data monetization schemes.

Microsoft Enhances AI Security Controls

Microsoft expanded data loss prevention controls to prevent Microsoft 365 Copilot from processing confidential documents regardless of storage location. The enhancement addresses enterprise concerns about AI systems accessing sensitive information across distributed cloud environments.

The update also included native System Monitor (Sysmon) functionality in Windows 11 KB5077241, providing built-in advanced logging capabilities previously requiring separate installation.

Privacy and Child Safety Enforcement Actions

The UK Information Commissioner's Office fined Reddit £14.47 million ($19.5 million) for unlawful collection and use of children's personal data without adequate safeguards. Los Angeles County separately filed suit against Roblox, alleging the gaming platform provides predators with tools to target children.

A $10,000 bounty was offered for methods to run Ring doorbell cameras locally, cutting off data transmission to Amazon servers amid growing privacy concerns over smart home device data collection practices.

Sources

  • US sanctions Russian exploit broker for buying stolen zero-days
  • Windows 11 KB5077241 update improves BitLocker, adds Sysmon tool
  • Phishing campaign targets freight and logistics orgs in the US, Europe
  • Wynn Resorts confirms employee data breach after extortion threat
  • CarGurus data breach exposes information of 12.4 million accounts
  • Microsoft adds Copilot data controls to all storage locations
  • Identity-First AI Security: Why CISOs Must Add Intent to the Equation
  • UK fines Reddit $19 million for using children's data unlawfully
  • Critical SolarWinds Serv-U flaws offer root access to servers
  • $10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon
  • Roblox gives predators "powerful tools" to target children, says LA County

Originally reported by BleepingComputer, Graham Cluley, Malwarebytes Labs

Tags

#zero-day#sanctions#solarwinds#data-breach#phishing#privacy#critical-vulnerabilities#ransomware

Threat Actors

🏴ShinyHunters

Tracked Companies

🇺🇸Reddit
🇺🇸Amazon

Related Intelligence

  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Threat Roundup: Zero-Days, Data Breaches, and Evolving Attack Vectors

    criticalFeb 17, 2026
  • Critical Infrastructure Vulnerabilities and Evolving Attack Vectors: Weekly Threat Roundup

    criticalFeb 27, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Weekly Security Digest: AI-Assisted Attacks, Android Banking Trojans, and Model Distillation Abuse

Next Article

Privacy Roundup: AI Training Data Poisoning, Cartel Tech Operations, and Google Subpoena Transparency →