BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Weekly Threat Brief: Feb 22-Mar 1, 2026 , AI Arms Race Accelerates as Critical Infrastructure Under Fire

Weekly Threat Brief: Feb 22-Mar 1, 2026 , AI Arms Race Accelerates as Critical Infrastructure Under Fire

March 1, 2026Industry & Policy9 min readcritical
#weekly-roundup#threat-intelligence#ai-powered-attacks#critical-infrastructure#nation-state-threats#ransomware-surge#supply-chain-attacks#zero-day-exploits
Share

TL;DR

This week marked a inflection point in AI-assisted cyber operations, with an amateur Russian actor leveraging AI to compromise over 600 FortiGate firewalls across 55 countries. Meanwhile, critical infrastructure faces sustained pressure from a three-year-old Cisco SD-WAN zero-day and coordinated nation-state campaigns targeting 42 countries.

Why critical?

Weekly summary severity reflects the highest severity story of the week (critical).

Executive Summary

The cybersecurity landscape reached a critical juncture this week as artificial intelligence democratized advanced attack capabilities, enabling amateur threat actors to achieve nation-state-level impacts. A Russian-speaking attacker leveraged AI services to compromise over 600 FortiGate firewalls across 55 countries within five weeks, signaling a fundamental shift in threat actor capabilities.

Simultaneously, critical infrastructure vulnerabilities dominated the threat landscape, with CISA confirming active exploitation of a Cisco SD-WAN zero-day that has been leveraged since 2023. Nation-state operations intensified across multiple fronts, including Chinese APT campaigns targeting 42 countries and Iranian psychological operations weaponizing mobile prayer apps during airstrikes.

Key Threats This Week

AI-Powered Attack Democratization

The most significant development emerged from Amazon's reporting of a Russian-speaking threat actor who successfully leveraged AI services to compromise over 600 FortiGate firewalls across 55 countries within a five-week timeframe. This represents a paradigm shift where advanced persistent threat capabilities become accessible to amateur actors through AI assistance.

Parallel developments included the discovery of AI-generated Arkanix Stealer malware and Chinese firms allegedly stealing Claude model capabilities through massive query campaigns for training purposes. The Oasis Security team also disclosed ClawJacked, a vulnerability enabling browser-based AI agent hijacking through malicious tabs.

Critical Infrastructure Under Siege

Critical infrastructure faced unprecedented pressure this week. CISA added a Cisco SD-WAN command injection flaw to the Known Exploited Vulnerabilities catalog, with Five Eyes agencies confirming the vulnerability has been actively exploited since 2023. The FileZen command injection vulnerability also received KEV designation following confirmed active exploitation.

Additional critical vulnerabilities surfaced in SolarWinds (RCE flaws in server products), BeyondTrust (RCE under active exploitation), and Juniper routers. The cumulative effect represents a sustained campaign against enterprise networking infrastructure.

Nation-State Campaign Escalation

Nation-state operations intensified across multiple theaters. A Chinese APT campaign successfully compromised organizations across 42 countries, while Russian APT28 launched the MacroMaze campaign targeting European entities with macro-based malware. Iranian MuddyWater continued operations with fresh malware targeting MENA organizations.

The Lazarus group demonstrated ransomware pivot capabilities by deploying Medusa ransomware in Middle East healthcare targeting. Additionally, a former U.S. Air Force officer faced arrest for allegedly training Chinese military pilots, highlighting the intersection of cyber and kinetic warfare preparation.

Supply Chain and Development Environment Targeting

Developers faced sustained targeting through multiple vectors. A supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages targeting AI development tools. Simultaneously, threat actors distributed malicious NuGet packages targeting the financial sector and deployed compromised Chrome extensions like QuickLens to steal cryptocurrency.

GitHub patched a Copilot vulnerability while threat actors increasingly targeted developers through malicious repositories, representing a systematic campaign against software development infrastructure.

Mobile and IoT Security Degradation

Mobile threat landscapes expanded with ZeroDayRAT emerging as a new Mobile-as-a-Service surveillance offering. Intellexa's Predator spyware demonstrated advanced iOS compromise capabilities by hooking SpringBoard to bypass recording indicators while streaming camera and microphone feeds.

IoT security research identified five recurring vulnerabilities causing 75% of production deployment failures, while an accidental hack exposed 6,700 camera-enabled robot vacuums, demonstrating mass surveillance potential in consumer devices.

By the Numbers

  • 62 total security stories tracked across the reporting period
  • Critical severity incidents: 19% of all stories (12/62)
  • High severity incidents: 37% of all stories (23/62)
  • Nation-state activity: 16% of coverage (10/62 stories)
  • Malware campaigns: 21% of coverage (13/62 stories)
  • Infrastructure compromises: Over 1,500 systems across multiple campaigns
  • Geographic scope: 55 countries affected by FortiGate campaign alone

Attack Vector Distribution

  • Critical infrastructure targeting: Cisco, SolarWinds, BeyondTrust, Juniper
  • Supply chain attacks: npm, NuGet, Chrome extensions
  • Mobile surveillance: iOS, Android banking trojans
  • AI/ML targeting: Agent hijacking, model theft, training data poisoning

Notable Developments

Quantum Resistance Preparation

Google Chrome announced a three-phase plan for deploying quantum-resistant HTTPS certificates using Merkle Tree Certificates, beginning with a feasibility study alongside Cloudflare in 2026. This represents proactive preparation for post-quantum cryptographic transitions.

Anonymity Network Attacks

The I2P network suffered one of the most severe Sybil attacks in anonymity network history, with a botnet accidentally deploying 700,000 hostile nodes against the network's ~15-20k legitimate nodes on February 3rd. This demonstrates the fragility of anonymity infrastructure against large-scale adversaries.

Psychological Operations Evolution

Hackers compromised an Iranian prayer app to send surrender messages during Israeli airstrikes, demonstrating the weaponization of trusted mobile platforms for psychological operations during kinetic military actions.

Regulatory and Enforcement Actions

The U.S. Treasury Department sanctioned a Russian zero-day broker, while Europol arrested 30 individuals in a major cybercrime crackdown. France disclosed a 1.2 million account breach in its national banking registry (FICOBA), highlighting persistent challenges in government data protection.

Outlook

Next week's monitoring priorities should focus on:

AI Attack Evolution: Track additional instances of AI-assisted compromise campaigns and defensive countermeasures. The FortiGate campaign represents a proof-of-concept that will likely inspire copycat operations.

Infrastructure Vulnerability Management: Monitor for additional exploitation of the Cisco SD-WAN vulnerability and prepare for potential disclosure of related zero-days affecting critical networking infrastructure.

Nation-State Response Patterns: Observe whether the Chinese 42-country campaign triggers coordinated international response measures and whether attribution efforts accelerate diplomatic consequences.

Supply Chain Resilience: Expect continued targeting of developer environments and package repositories as threat actors recognize the force multiplication potential of compromising development tools.

Mobile Security Posture: Anticipate expanded mobile surveillance capabilities following the Predator iOS bypass techniques and increased targeting of consumer IoT devices for surveillance infrastructure.

The convergence of AI democratization with traditional cyber operations suggests the threat landscape is entering a new phase where traditional capability barriers no longer constrain threat actor impact potential.

Sources

  • ClickFix Campaign Expands to Target Cryptocurrency Wallets and 25+ Browsers
  • Massive Sybil Attack Cripples I2P Network with 700,000 Hostile Nodes
  • Predator Spyware Hooks iOS SpringBoard to Bypass Recording Indicators
  • Russian Hacker Leverages AI to Breach 600+ Fortinet Firewalls Across 55 Countries
  • Security Clearance Form Failures: A 1988 Lesson in Operational Security
  • Active RoundCube Exploitation, AI-Generated Stealers, and France's FICOBA Breach
  • Critical BeyondTrust RCE Under Active Exploitation, Romanian Hacker Pleads Guilty to State Network Breach
  • Fraud Investigation Exposes Advanced Python Malware with Obfuscation Tactics
  • Multi-Stage Threats: Wormable Cryptominers, Steganographic Malware, and LLM Infrastructure Risks
  • Nation-State Roundup: Russian AI-Powered Campaigns and Hybrid Warfare Operations
  • Research Reveals Server-Side Vulnerabilities in Major Password Managers
  • Steganography Strikes: Malware Hidden in Images Targets Enterprise Systems
  • Supply Chain Worm Mimics Shai-Hulud Malware, Targets Developers Through npm and AI Tools
  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup
  • Weekend Security Roundup: PDF Platform Zero-Days, PayPal Data Leak, and Development Stack Trends
  • Weekly Threat Roundup: Vishing Breaches, Zero-Knowledge Gaps, and RAT Distribution Networks
  • AI Arms Race Reshapes Democratic Engagement as Automated Systems Overwhelm Government Processes
  • APT Threat Roundup: AI-Assisted Malware, Healthcare Ransomware, and Cryptojacking Campaigns
  • APT28 Macro Campaign, AI Model Theft, and Central Asian Telecom Attacks
  • Data Breach Intelligence: New Mobile Surveillance Malware, Victim Notification Gaps, and 2026 Threat Evolution
  • Digital Frontlines Weekly: AI-Armed Amateurs, Iranian Campaigns, and ATM Jackpotting Surge
  • Week in Review: North Korean Ransomware, Telecoms Breach, and Mobile App Vulnerabilities
  • Wiz Receives Four Awards in 2026 Latio Application Security Report
  • CISA Adds FileZen to KEV as Multiple Critical Vulnerabilities Surface
  • Hardware Hacking Case Study: Repurposing Legacy Kindle as IoT Display
  • Industry Intelligence: OT Incident Scaling, AI-Accelerated Attacks, and Multi-Million Dollar Enforcement Actions
  • Nation-State Roundup: Lazarus Deploys Medusa Ransomware, VMware Vulnerabilities, and Global Cybercrime Operations
  • Privacy Roundup: AI Training Data Poisoning, Cartel Tech Operations, and Google Subpoena Transparency
  • Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers
  • Weekly Security Digest: AI-Assisted Attacks, Android Banking Trojans, and Model Distillation Abuse
  • Wiz Integrates Cloud Security Data with Notion Custom Agents for Workflow Automation
  • Critical Cisco SD-WAN Exploitation, Claude AI Vulnerabilities, and Million-Scale Data Breaches
  • Critical Infrastructure Under Fire: Cisco Zero-Day Exploited Since 2023, Google Disrupts China APT
  • Cyber Defense Weekly: Zero-Day Alerts, AI Code Risks, and Ransomware Forum Disruption
  • Google Expands AI-Powered Scam Detection to Samsung Devices, Adds Gemini Model for Complex Threats
  • Research Reveals Predictable Patterns in LLM-Generated Passwords
  • ShinyHunters Claims 21M Records in Dutch Telecom Breach; Industry Updates
  • Threat Intelligence Digest: Chinese APT Campaign, Critical Router RCE, and Agent Tesla Resurgence
  • Critical Infrastructure Vulnerabilities and Evolving Attack Vectors: Weekly Threat Roundup
  • Industry Roundup: Three-Year Cisco Zero-Day, Law Enforcement Wins, and UK Policy Shifts
  • Nation-State Roundup: China-Linked Espionage Campaign Hits 42 Countries, CISA Adds Critical Cisco Flaws to KEV
  • New Campaign Targets Healthcare & Education While Blockchain C2 Evolves Evasion
  • Privacy Surveillance Roundup: Iran's Digital Apartheid, Job Scam Malware, and $21B Identity Theft Costs
  • Weekly Roundup: Ad Cloaking Platform Exposed, OAuth Risks, and SOC Efficiency Insights
  • Chrome Announces Quantum-Safe Certificate Program Using Merkle Tree Certificates
  • ClawJacked Vulnerability in OpenClaw Enables Browser-Based AI Agent Hijacking
  • Healthcare Under Siege, Event Security Gaps, and AI Code Review Reality Check
  • Iran Internet Blackout During Strikes, Blockchain Botnet C2, and NATO Clears Consumer Devices
  • Kimwolf Botmaster 'Dort' Escalates to Swatting After Vulnerability Disclosure
  • Privacy Infrastructure Updates: Tails Security Patches, iOS Identity Requirements, and Darknet Writing Contests
  • Privacy Roundup: Robot Vacuum Mass Surveillance, Geopolitical Cyber Disruption, and Security Miscellany
  • Weekly Security Roundup: Critical OCaml RCE, FreePBX Mass Compromise, and 900+ Systems Still Infected
  • Weekly Threat Roundup: CISA Warns of Dormant Ivanti Malware, APT37 Air-Gap Tools, Major Cybercrime Arrests
  • Wiz Outlines Secure-by-Design Approaches for FedRAMP Compliance in Part 3 of Agile Playbook
  • Compromised QuickLens Chrome Extension Deploys Crypto-Stealing Malware via ClickFix Tactics
  • Critical Heap Overflow Discovered in Vim Text Editor
  • Five Critical IoT Vulnerabilities Derailing Production Deployments
  • Korean Tax Agency Accidentally Exposes Seized Wallet Seed, Enables $4.8M Theft
  • Nation-State Activity Roundup: APT28 MacroMaze Campaign, MuddyWater Operations, and Mass Infrastructure Compromises
  • Prayer App Compromised to Send Surrender Messages to Iranians During Airstrikes
  • UAE's Real-Time Missile Defense System Intercepts Iranian Strike Package
  • Weekly Vulnerability Roundup: OpenClaw AI Agent Hijacking, Vim Command Injection, and Vitess Path Traversal

Tags

#weekly-roundup#threat-intelligence#ai-powered-attacks#critical-infrastructure#nation-state-threats#ransomware-surge#supply-chain-attacks#zero-day-exploits

Threat Actors

🏴Medusa
🇰🇵Lazarus
🏴ShinyHunters
🇮🇷MuddyWater
🇷🇺APT28
🇰🇵APT37

Tracked Companies

🇬🇷Intellexa
🇰🇷Samsung
🇺🇸Google
🇺🇸Amazon

Related Intelligence

  • Weekly Threat Brief: Feb 23 - Mar 2, 2026 , Critical Infrastructure Under Active Exploitation

    criticalMar 2, 2026
  • Weekly Threat Brief: March 1-8, 2026 — AI Weaponization and Kinetic-Cyber Convergence

    criticalMar 8, 2026
  • Weekly Threat Brief: Feb 16-23, 2026 , AI-Powered Attacks and Critical Infrastructure Under Siege

    criticalFeb 23, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Critical Heap Overflow Discovered in Vim Text Editor

Next Article

Weekly Roundup: Pakistani Media Hijacked, Gaming RAT Campaign, and European DDoS Surge →