BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Vulnerabilities Under Attack: CISA Adds CVSS 9.8 Flaws While APTs Deploy New Tools

Critical Vulnerabilities Under Attack: CISA Adds CVSS 9.8 Flaws While APTs Deploy New Tools

March 6, 2026Vulnerabilities & Exploits3 min readcritical

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#cisa-kev#critical-vulnerabilities#apt-campaigns#malware#hikvision#rockwell-automation#muddywater#lumma-stealer
Share

TL;DR

CISA confirmed active exploitation of critical vulnerabilities in Hikvision cameras and Rockwell automation systems. Meanwhile, Iranian MuddyWater hackers target US organizations with new Dindoor backdoor, and Chinese APT UAT-9244 deploys sophisticated implants against South American telecommunications infrastructure.

Why critical?

CISA added two critical CVSS 9.8 vulnerabilities to the KEV catalog with confirmed active exploitation, indicating immediate threat to organizations.

Critical Vulnerabilities Added to CISA KEV Catalog

CISA added two critical-severity vulnerabilities to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild. The flaws affect widely-deployed industrial and surveillance systems:

  • CVE-2017-7921 (CVSS 9.8): Improper authentication vulnerability in Hikvision IP cameras
  • Rockwell Automation vulnerability (CVSS 9.8): Critical flaw in industrial automation systems

The KEV additions mandate federal agencies patch these vulnerabilities immediately, signaling confirmed exploitation across enterprise environments.

Iranian MuddyWater Deploys New Dindoor Backdoor

Broadcom's Symantec and Carbon Black Threat Hunter Team discovered Iranian state-sponsored group MuddyWater (Seedworm) embedding themselves in multiple US organizational networks. The campaign targets banks, airports, non-profits, and the Israeli arm of a software company using a newly identified backdoor called Dindoor.

The intrusions demonstrate MuddyWater's continued focus on long-term persistence within critical infrastructure and financial sector networks.

Chinese APT Targets South American Telecom Infrastructure

Cisco Talos identified China-linked APT group UAT-9244 conducting sustained attacks against telecommunications infrastructure across South America since 2024. The group, closely associated with FamousSparrow, deployed three distinct implants:

  • TernDoor: Windows and Linux implant for initial access
  • PeerTime: Network reconnaissance tool
  • BruteEntry: Edge device compromise utility

The campaign specifically targets critical telecommunications infrastructure, indicating potential supply chain and communications interception objectives.

ClickFix Campaign Weaponizes Windows Terminal

Microsoft disclosed a widespread ClickFix social engineering campaign observed in February 2026 that leverages Windows Terminal to deploy Lumma Stealer malware. The attack chain represents an evolution from previous ClickFix campaigns that relied on Windows Run dialog commands.

The technique exploits user trust in legitimate Windows applications to execute malicious payloads, demonstrating attackers' adaptation to security awareness training focused on suspicious PowerShell execution.

Malicious AI Extensions Harvest LLM Chat Histories

Microsoft Security identified malicious AI assistant browser extensions that collected chat histories from ChatGPT, DeepSeek, and other LLM platforms. The campaign achieved nearly 900,000 installs across more than 20,000 enterprise tenants.

The extensions specifically targeted:

  • LLM conversation histories
  • Browsing data and credentials
  • Enterprise tenant information

This attack vector highlights emerging risks as organizations integrate AI tools into workflows without adequate browser extension security controls.

Microsoft Security Updates

Microsoft published multiple CVE entries affecting various components:

  • CVE-2026-23651: Microsoft ACI Confidential Containers privilege escalation via permissive regex in Azure Compute Gallery
  • CVE-2026-21536: Microsoft Devices Pricing Program remote code execution vulnerability
  • CVE-2026-23865: Integer overflow in FreeType library affecting OpenType variable fonts
  • CVE-2026-3338: PKCS7_verify signature validation bypass in AWS-LC
  • CVE-2026-24821: Heap buffer over-read in WickedEngine Lua compiler
  • CVE-2026-23235: Out-of-bounds access in f2fs sysfs attribute handling

Sources

  • https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html
  • https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
  • https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
  • https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
  • https://www.microsoft.com/en-us/security/blog/2026/03/05/malicious-ai-assistant-extensions-harvest-llm-chat-histories/
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23651
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21536
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23865
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3338
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24821
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23235

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#cisa-kev#critical-vulnerabilities#apt-campaigns#malware#hikvision#rockwell-automation#muddywater#lumma-stealer

Threat Actors

🇨🇳Salt Typhoon
🇮🇷MuddyWater

Tracked Companies

🇨🇳Hikvision

Related Intelligence

  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026
  • Critical n8n RCE Hits KEV Catalog While Attackers Weaponize SOC Fatigue and Target Developers

    criticalMar 12, 2026
  • CISA KEV Updates, APT28 Campaign, and Agentic AI Security Challenges

    criticalMar 10, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Cyber Threat Landscape Shifts: AI-Powered Attacks, Critical Cisco Flaws, and Global Enforcement Wins

Next Article

Wiz Launches Tenant Manager for Multi-Cloud Security Consolidation →