BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Active Exploitation Surge: Cisco SD-WAN Flaws, iOS Exploit Kit, and Law Enforcement Disruptions

Active Exploitation Surge: Cisco SD-WAN Flaws, iOS Exploit Kit, and Law Enforcement Disruptions

March 5, 2026Malware & Threats5 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs, Fortinet

#cisco-vulnerabilities#ios-exploits#ransomware#law-enforcement#phishing-campaigns#active-exploitation#apt-groups#infrastructure-disruption
Share

TL;DR

Security teams face multiple actively exploited vulnerabilities in Cisco SD-WAN and Android devices, while a sophisticated iOS exploit kit targets crypto theft. Law enforcement scored wins against ransomware operations and phishing platforms.

Why critical?

Multiple actively exploited vulnerabilities including Cisco SD-WAN flaws and Qualcomm Android components, combined with sophisticated spyware-grade iOS exploit kits targeting high-value victims.

Active Exploitation Escalates Across Enterprise Infrastructure

Cisco SD-WAN Vulnerabilities Under Active Attack

Cisco has flagged two additional Catalyst SD-WAN Manager security flaws as actively exploited in the wild, marking a concerning escalation in attacks against enterprise network infrastructure. The networking giant urges administrators to immediately upgrade vulnerable devices as threat actors continue targeting these critical network management systems.

Maximum Severity Cisco Firewall Flaws Grant Root Access

Cisco released security updates for two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software that could grant attackers root-level access to compromised systems. These CVSS 10.0 flaws represent the highest possible severity rating and demand immediate patching attention.

FreeScout Zero-Click RCE Enables Mail Server Hijacking

Researchers disclosed a maximum severity vulnerability in the FreeScout helpdesk platform that allows remote code execution without user interaction or authentication. Dubbed "Mail2Shell," this zero-click attack vector enables complete server compromise through malicious email processing.

Mobile Device Threats Intensify

Coruna iOS Exploit Kit Targets Cryptocurrency Theft

Security researchers uncovered "Coruna," a previously undocumented collection of 23 iOS exploits deployed by multiple threat actors in both espionage campaigns and financially motivated attacks targeting cryptocurrency assets. The spyware-grade exploit kit demonstrates the increasing sophistication of mobile device compromise techniques.

Actively Exploited Qualcomm Flaw Hits Android Devices

Google patched 129 Android vulnerabilities in its March security update, including an actively exploited high-severity flaw affecting a widely deployed Qualcomm component. The targeted attacks demonstrate continued threat actor focus on mobile device compromise through hardware-level vulnerabilities.

APT Activity and Geopolitical Threats

Chinese APT Targets South American Telecoms

Cisco Talos disclosed UAT-9244, a China-nexus advanced persistent threat actor with high confidence ties to Famous Sparrow. The group deployed three new malware implants against South American telecommunications providers, highlighting continued APT focus on critical infrastructure sectors.

Cyber Fallout Assessment After Regional Strikes

Following U.S.-Israeli strikes on Iran, FortiGuard Labs observed rising regional cyber activity but noted the absence of large-scale cyber retaliation. Organizations should strengthen cyber hygiene, rotate credentials, and reduce exposure as geopolitical tensions may trigger future campaigns.

Law Enforcement Disruptions Target Cybercrime Infrastructure

FBI Seizes LeakBase Forum, 142,000 Member Records

The FBI seized the LeakBase cybercrime forum, a major marketplace where cybercriminals bought and sold hacking tools and stolen data. The operation captured data from 142,000 forum members, dealing a significant blow to the underground economy.

Europol Dismantles Tycoon2FA Phishing Platform

An international law enforcement operation coordinated by Europol disrupted Tycoon2FA, a major phishing-as-a-service platform linked to tens of millions of phishing messages monthly. The takedown removes a critical infrastructure component used by multiple threat actors.

Phobos Ransomware Administrator Pleads Guilty

A Russian national pleaded guilty to wire fraud conspiracy charges related to administering the Phobos ransomware operation, which breached hundreds of victims worldwide. The legal action represents continued law enforcement pressure on ransomware operators.

Healthcare and Infrastructure Recovery

Mississippi Medical Center Resumes Operations

The University of Mississippi Medical Center resumed normal operations nine days after a ransomware attack blocked access to electronic medical records and disabled IT systems. The incident highlights ongoing ransomware threats to critical healthcare infrastructure.

Ransomware Infrastructure Analysis Reveals RaaS Ecosystem

Huntress Labs detailed how a routine RDP brute-force alert uncovered a geo-distributed VPN-linked infrastructure connected to suspected ransomware-as-a-service operations tied to initial access brokers. The analysis demonstrates the interconnected nature of modern cybercrime ecosystems.

Social Engineering and Phishing Campaigns

LastPass Users Targeted in Credential Theft Campaign

LastPass warned users of phishing campaigns using fake unauthorized account access alerts to steal vault passwords. The attacks demonstrate continued threat actor focus on password manager users as high-value targets.

HungerRush Customers Receive Mass Extortion Emails

Customers of restaurants using the HungerRush point-of-sale platform received extortion emails from threat actors warning that restaurant and customer data could be exposed if the company fails to respond to demands.

OAuth Redirect Abuse Enables Phishing Attacks

Researchers discovered attackers abusing OAuth's built-in redirect functionality to send users from legitimate Microsoft or Google login pages to phishing sites or malware downloads, exploiting trust in major authentication providers.

Security Tool Updates and Policy Developments

Bitwarden Adds Windows 11 Passkey Support

Bitwarden announced support for logging into Windows 11 devices using passkeys stored in the manager's vault, enabling phishing-resistant authentication and advancing passwordless security adoption.

Supreme Court to Review Geofence Warrant Constitutionality

The Supreme Court will decide whether geofence warrants are constitutional, with Google urging justices to strike down the controversial warrants that can sweep up location data from hundreds of phones near crime scenes.

Sources

  • https://www.bleepingcomputer.com/news/security/cisco-flags-more-sd-wan-flaws-as-actively-exploited-in-attacks/
  • https://www.bleepingcomputer.com/news/security/phobos-ransomware-admin-pleads-guilty-to-wire-fraud-conspiracy/
  • https://www.bleepingcomputer.com/news/security/bitwarden-adds-support-for-passkey-login-on-windows-11/
  • https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/
  • https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5075039-update-fixes-broken-recovery-environment/
  • https://www.bleepingcomputer.com/news/security/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/
  • https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/
  • https://www.bleepingcomputer.com/news/security/spyware-grade-coruna-ios-exploit-kit-now-used-in-crypto-theft-attacks/
  • https://www.bleepingcomputer.com/news/security/hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons/
  • https://www.bleepingcomputer.com/news/security/fbi-seizes-leakbase-cybercrime-forum-data-of-142-000-members/
  • https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/
  • https://www.bleepingcomputer.com/news/security/mississippi-medical-center-reopens-clinics-hit-by-ransomware-attack/
  • https://www.bleepingcomputer.com/news/security/how-a-brute-force-attack-unmasked-a-ransomware-infrastructure-network/
  • https://grahamcluley.com/smashing-security-podcast-457/
  • https://blog.talosintelligence.com/uat-9244/
  • https://www.malwarebytes.com/blog/product/2026/03/windows-file-shredder-when-deleting-a-file-isnt-enough
  • https://www.malwarebytes.com/blog/news/2026/03/supreme-court-to-decide-whether-geofence-warrants-are-constitutional
  • https://www.malwarebytes.com/blog/news/2026/03/does-the-uk-really-want-to-ban-vpns-and-can-it-be-done
  • https://www.malwarebytes.com/blog/news/2026/03/attackers-abuse-oauths-built-in-redirects-to-launch-phishing-and-malware-attacks
  • https://www.malwarebytes.com/blog/news/2026/03/high-severity-qualcomm-bug-hits-android-devices-in-targeted-attacks
  • https://feeds.fortinet.com/~/949515869/0/fortinet/blog/threat-research~Cyber-Fallout-After-the-Strikes-Signal-Noise-and-What-Comes-Next

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs, Fortinet

Tags

#cisco-vulnerabilities#ios-exploits#ransomware#law-enforcement#phishing-campaigns#active-exploitation#apt-groups#infrastructure-disruption

Threat Actors

🏴Phobos

Tracked Companies

🇺🇸Google
🇺🇸Near Intelligence

Related Intelligence

  • Critical Infrastructure Under Siege: From Actively Exploited BeyondTrust RCE to Healthcare Ransomware Shutdowns

    criticalFeb 20, 2026
  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Threat Roundup: Phobos Ransomware Arrest, X/Grok Investigation, IoT Security Mishap, and Android Backdoor Discovery

    highFeb 17, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Iranian Prayer App Compromised for US/Israeli Propaganda Campaign

Next Article

Threat Landscape Roundup: Zero-Day Surge, State Actor Campaigns, and Multi-Million Dollar Fraud Operations →