BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Weekly Threat Roundup: CISA Warns of Dormant Ivanti Malware, APT37 Air-Gap Tools, Major Cybercrime Arrests

Weekly Threat Roundup: CISA Warns of Dormant Ivanti Malware, APT37 Air-Gap Tools, Major Cybercrime Arrests

February 28, 2026Malware & Threats3 min readhigh

Originally reported by BleepingComputer, Malwarebytes Labs

#apt37#ivanti#resurge-malware#air-gap-attacks#europol#fake-id#gemini-api#windows-security
Share

TL;DR

CISA released technical details on RESURGE malware exploiting Ivanti zero-days, while North Korean APT37 unveiled new tools for breaching air-gapped networks via removable drives. Law enforcement made significant progress with 30 arrests in the Europol-led takedown of The Com cybercrime collective.

Why high?

CISA's warning about RESURGE malware targeting critical infrastructure devices combined with APT37's new air-gap infiltration tools represents significant active threats to enterprise security.

Weekly Threat Roundup: CISA Warns of Dormant Ivanti Malware, APT37 Air-Gap Tools, Major Cybercrime Arrests

This week brought critical infrastructure warnings, sophisticated nation-state tooling, and significant law enforcement victories against cybercriminals.

CISA Issues Technical Advisory on RESURGE Malware

The Cybersecurity and Infrastructure Security Agency released detailed technical analysis of RESURGE, a persistent malware implant targeting Ivanti Connect Secure devices. The malware exploits CVE-2025-0282, a zero-day vulnerability that allows attackers to establish dormant backdoors on critical network infrastructure.

CISA's advisory emphasizes that RESURGE can remain undetected for extended periods, making it particularly dangerous for organizations relying on Ivanti solutions for secure remote access. The implant's persistence mechanisms allow threat actors to maintain access even after apparent remediation efforts.

APT37 Develops Air-Gap Infiltration Arsenal

North Korean state-sponsored group APT37 has deployed newly discovered malware specifically designed to breach air-gapped networks. The tools enable data exfiltration between isolated and internet-connected systems through removable drives, representing a significant evolution in the group's capabilities.

The malware suite includes components for covert surveillance and automated data staging, allowing operators to systematically compromise high-security environments that rely on physical network isolation for protection.

Europol Dismantles The Com Cybercrime Network

Operation Compass, a year-long international investigation, resulted in 30 arrests and identified 179 suspects linked to The Com cybercrime collective. The network specifically targeted children and teenagers through sophisticated social engineering campaigns.

The operation demonstrates enhanced coordination between international law enforcement agencies in dismantling organized cybercrime groups that exploit vulnerable populations.

Microsoft Enhances Windows 11 Batch File Security

Microsoft's latest Windows 11 Insider Preview builds introduce security improvements for batch file and CMD script execution. The enhancements focus on preventing common attack vectors that exploit Windows scripting capabilities while maintaining backward compatibility for legitimate administrative tasks.

Ukrainian Operator of AI-Powered Fake ID Service Pleads Guilty

A Ukrainian national admitted to operating OnlyFake, an artificial intelligence-powered service that generated over 10,000 fraudulent identification documents. The platform sold fabricated driver's licenses, passports, and other official documents to customers worldwide.

The case highlights the increasing sophistication of AI-enabled fraud services and their potential impact on identity verification systems.

Google API Keys Expose Gemini AI Data

Security researchers discovered that publicly exposed Google API keys, previously considered low-risk, can now provide unauthorized access to Gemini AI services and associated data. The finding challenges conventional assumptions about API key sensitivity in cloud environments.

The research underscores the need for organizations to reassess their API key management practices as cloud services expand their functionality.

Third-Party Software Patching Challenges

Security analysts highlighted the persistent challenge of managing vulnerabilities in third-party applications like PDF readers, email clients, and archive utilities. These commonly deployed tools often represent significant portions of an organization's actual attack surface despite receiving less attention than enterprise applications.

Sources

  • https://www.bleepingcomputer.com/news/microsoft/microsoft-testing-windows-11-batch-file-security-improvements/
  • https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
  • https://www.bleepingcomputer.com/news/security/police-crackdown-on-the-com-cybercrime-gang-leads-to-30-arrests/
  • https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/
  • https://www.bleepingcomputer.com/news/security/third-party-patching-and-the-business-footprint-we-all-share/
  • https://www.bleepingcomputer.com/news/security/ukrainian-man-pleads-guilty-to-running-ai-powered-fake-id-site/
  • https://www.malwarebytes.com/blog/news/2026/02/public-google-api-keys-can-be-used-to-expose-gemini-ai-data

Originally reported by BleepingComputer, Malwarebytes Labs

Tags

#apt37#ivanti#resurge-malware#air-gap-attacks#europol#fake-id#gemini-api#windows-security

Threat Actors

🇰🇵APT37

Tracked Companies

🇺🇸Google

Related Intelligence

  • Malware Threats Weekly: CISA Flags Ivanti EPM Zero-Day, APT28 Leverages Covenant Framework, Meta Ad Network Powers Global Scam Operations

    criticalMar 10, 2026
  • Threat Landscape Weekly: Iranian Cyber Warnings, TV Surveillance Settlements, and Malicious FileZilla Distribution

    highMar 2, 2026
  • Kimwolf Botmaster 'Dort' Escalates to Swatting After Vulnerability Disclosure

    highFeb 28, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Wiz Outlines Secure-by-Design Approaches for FedRAMP Compliance in Part 3 of Agile Playbook

Next Article

Weekly Security Roundup: Critical OCaml RCE, FreePBX Mass Compromise, and 900+ Systems Still Infected →