BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Multi-Platform RATs, AI-Driven Attacks, and Certificate Abuse: Weekly Vulnerability Roundup

Multi-Platform RATs, AI-Driven Attacks, and Certificate Abuse: Weekly Vulnerability Roundup

March 4, 2026Vulnerabilities & Exploits4 min readhigh

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#malware#apt#supply-chain#certificates#fortigate#crushftp#rat#ai-attacks
Share

TL;DR

Multiple sophisticated attack campaigns emerged this week, including cross-platform RATs distributed via fake Laravel packages, APT41-linked Silver Dragon targeting governments, and AI-assisted attacks hitting FortiGate devices across 55 countries. Certificate abuse and social engineering tactics continue enabling persistent enterprise access.

Why high?

Multiple active attack campaigns including AI-driven FortiGate exploitation across 55 countries, APT41-linked operations, and widespread malware distribution through compromised certificates and supply chain attacks represent significant ongoing threats requiring immediate attention.

Malicious Laravel Packages Deploy Cross-Platform RATs

Security researchers have identified three malicious PHP packages on Packagist masquerading as legitimate Laravel utilities. The packages—nhattuanbl/lara-helper, nhattuanbl/simple-queue, and nhattuanbl/lara-swagger—collectively garnered 115 downloads while deploying a cross-platform remote access trojan capable of operating on Windows, macOS, and Linux systems.

The supply chain attack demonstrates continued threat actor interest in targeting developer ecosystems through trusted package repositories. Organizations using PHP dependency management should audit their package dependencies and implement verification processes for third-party components.

APT41-Linked Silver Dragon Targets Government Entities

Check Point researchers have documented a new APT group dubbed Silver Dragon, linked to APT41 operations targeting government entities across Europe and Southeast Asia since mid-2024. The group employs dual initial access vectors: exploiting public-facing internet servers and delivering malicious attachments via phishing campaigns.

Silver Dragon leverages Cobalt Strike beacons with Google Drive as command-and-control infrastructure, demonstrating sophisticated operational security practices. The campaign's geographic scope and government targeting align with typical APT41 objectives, suggesting continued evolution of this threat actor's capabilities.

AI-Assisted FortiGate Campaign Uses CyberStrikeAI Platform

Team Cymru's analysis revealed that threat actors behind recent AI-driven attacks against Fortinet FortiGate appliances utilized CyberStrikeAI, an open-source AI-native security testing platform. The campaign, spanning 55 countries, represents a concerning evolution in automated vulnerability exploitation capabilities.

The use of legitimate security testing tools for malicious purposes highlights the dual-use nature of AI-powered offensive security platforms. Organizations should monitor for unusual authentication attempts and implement robust logging for internet-facing appliances.

Microsoft Exposes Certificate Abuse Campaign

Microsoft Security documented a campaign leveraging stolen Extended Validation (EV) certificates to sign malware impersonating workplace applications. The signed malware deploys legitimate remote monitoring and management (RMM) tools to establish persistent access within enterprise environments.

The campaign's use of valid certificates circumvents traditional signature-based detection mechanisms, emphasizing the need for behavioral monitoring and certificate validation controls. Organizations should implement certificate pinning where possible and monitor RMM tool deployments.

Fake Tech Support Campaign Deploys Havoc C2

Huntress researchers identified a social engineering campaign affecting five partner organizations, where threat actors posed as fake IT support personnel. The attacks begin with spam emails followed by phone calls directing victims to install the Havoc command-and-control framework.

This campaign demonstrates the continued effectiveness of voice-based social engineering techniques combined with legitimate-appearing remote access tools. The Havoc framework serves as a precursor to data exfiltration or ransomware deployment, requiring immediate incident response when detected.

XWorm Distribution Campaign Evolves Delivery Methods

SANS Internet Storm Center documented another wave of XWorm malware distribution employing multi-technology delivery mechanisms. While XWorm remains a well-known malware family, threat actors continue refining distribution techniques to evade detection systems.

The evolving delivery methods underscore the importance of maintaining current threat intelligence and updating detection rules to account for new distribution vectors.

CrushFTP Faces Renewed Brute Force Activity

Security researchers observed increased brute force scanning activity targeting CrushFTP installations. The Java-based file transfer system has experienced multiple critical vulnerabilities, including CVE-2024-4040 (template injection leading to RCE), CVE-2025-31161 (authentication bypass), and the actively exploited zero-day CVE-2025-54309.

Organizations running CrushFTP should ensure all patches are applied and implement additional access controls to mitigate brute force attempts.

Microsoft Addresses ANSI Escape Sequence Log Poisoning

Microsoft published details for CVE-2025-58160, addressing a vulnerability where tracing log user input could result in log poisoning through ANSI escape sequences. While specific impact details remain limited, log integrity vulnerabilities can complicate incident response and forensic analysis.

Sources

  • Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
  • APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
  • Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
  • Signed malware impersonating workplace apps deploys RMM backdoors
  • Want More XWorm?, (Wed, Mar 4th)
  • Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)
  • CVE-2025-58160 Tracing logging user input may result in poisoning logs with ANSI escape sequences

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#malware#apt#supply-chain#certificates#fortigate#crushftp#rat#ai-attacks

Threat Actors

🇨🇳APT41

Tracked Companies

🇺🇸Google

Related Intelligence

  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026
  • Active Android Exploit, Government-Targeted Campaigns, and OAuth Abuse Highlight March Threat Landscape

    highMar 3, 2026
  • March Patch Tuesday: Microsoft Fixes 84 Flaws Including Zero-Days, Supply Chain Attacks Surge

    highMar 11, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← OpenClaw's Security Posture Under Fire: 160+ Advisories Signal Systemic Issues

Next Article

Critical VMware RCE Exploited, Major Breaches Hit LexisNexis and AkzoNobel →