BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Iran-Criminal Collusion, Spyware Policy Shifts, and Critical n8n Zero-Click Flaw

Iran-Criminal Collusion, Spyware Policy Shifts, and Critical n8n Zero-Click Flaw

March 13, 2026Industry & Policy3 min readhigh

Originally reported by Dark Reading, Infosecurity Magazine

#iran-apt#commercial-spyware#pam-acquisition#disaster-recovery#android-malware#zero-click-vulnerability
Share

TL;DR

Iranian state actors are now directly collaborating with cybercriminal groups while uncertainty surrounds US commercial spyware policies. Meanwhile, a critical zero-click vulnerability in n8n workflow automation platform allows full server compromise without authentication.

Why high?

The critical zero-click vulnerability in n8n requiring no authentication combined with Iran's evolving cyber-criminal collaboration tactics represents significant active threats to enterprise security.

Iran-Criminal Nexus Deepens Cyber Threat Landscape

Multiple developments this week highlight evolving state-sponsored cyber operations and enterprise security challenges, from Iranian APT collaboration with criminal groups to critical infrastructure vulnerabilities.

Iranian Intelligence Directly Partners With Cybercriminals

Iranian Advanced Persistent Threat groups have moved beyond mimicking cybercriminal operations to actively collaborating with actual criminal organizations, according to Dark Reading analysis. This shift represents a significant evolution from traditional state-sponsored APT tactics, where Iranian groups previously masqueraded as criminal entities to obscure attribution. The Ministry of Intelligence and Security (MOIS) backing of these hybrid operations blurs the line between state-sponsored espionage and financially motivated cybercrime, complicating threat attribution and response strategies for defenders.

US Commercial Spyware Policy Creates Confusion

The Trump administration's approach to commercial spyware has generated uncertainty among policy advocates following rescinded sanctions and reactivated government contracts. Dark Reading reports that the policy reversals have created confusion about where the administration draws enforcement lines regarding commercial surveillance technology. The shifts affect both domestic procurement decisions and international diplomatic efforts to curb spyware proliferation, potentially undermining previous attempts to establish clear boundaries around government use of commercial surveillance tools.

Delinea Expands PAM Through StrongDM Acquisition

Delinea's acquisition of StrongDM signals the privileged access management sector's evolution toward cloud-native and developer-focused security models. The acquired company specializes in injecting ephemeral, real-time credentials into developer workflows, extending traditional PAM capabilities across cloud, Software-as-a-Service, Kubernetes, and database environments. This consolidation reflects growing enterprise demand for privilege management solutions that integrate seamlessly with modern DevOps and cloud infrastructure patterns.

Stryker Attack Exposes Disaster Recovery Gaps

The Iranian cyberattack against medical device manufacturer Stryker has highlighted critical gaps in enterprise disaster recovery planning, particularly for attacks targeting operational technology and manufacturing systems. Dark Reading analysis suggests the incident serves as a stress test that most business continuity programs fail to adequately address. The attack demonstrates how state-sponsored actors can disrupt critical healthcare supply chains, forcing organizations to reevaluate their recovery strategies beyond traditional IT system failures.

PixRevolution Trojan Targets Brazilian Payment System

A new Android malware variant dubbed PixRevolution has emerged targeting Brazil's PIX instant payment system through accessibility service abuse. Infosecurity Magazine reports the trojan can hijack PIX transfers in real time, representing a sophisticated attack against the country's primary digital payment infrastructure. The malware's ability to manipulate payments during transaction processing poses significant risks to Brazil's financial ecosystem and demonstrates continued evolution in mobile banking threats.

Critical Zero-Click Vulnerability Compromises n8n Automation Platform

A critical vulnerability affecting the n8n workflow automation platform allows complete server compromise without requiring authentication or even an n8n account. The zero-click flaw impacts both cloud-hosted and self-hosted instances of the popular automation tool used across enterprise environments. The vulnerability's severity stems from its ability to provide full system access through a commonly deployed automation platform, potentially affecting organizations that rely on n8n for critical workflow orchestration.

Sources

  • https://www.darkreading.com/threat-intelligence/iran-mois-criminals-cyberattacks
  • https://www.darkreading.com/threat-intelligence/commercial-spyware-opponents-fear-us-policy-shifting
  • https://www.darkreading.com/identity-access-management-security/delinea-strongdm-acquisition-highlights-changing-role-pam
  • https://www.darkreading.com/cybersecurity-operations/stryker-outage-disaster-recovery-wake-up-call
  • https://www.infosecurity-magazine.com/news/pixrevolution-malware-brazils-pix/
  • https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/

Originally reported by Dark Reading, Infosecurity Magazine

Tags

#iran-apt#commercial-spyware#pam-acquisition#disaster-recovery#android-malware#zero-click-vulnerability

Related Intelligence

  • Supply Chain Malware, Nation-State Attacks, and Living-Off-the-Land Techniques Dominate Threat Landscape

    highFeb 18, 2026
  • Ransomware Devastates Oceania Healthcare While New Threats Target Critical Infrastructure

    highMar 12, 2026
  • March Security Roundup: Microsoft Patches Zero-Days, Cloud Configs Under Fire, and Geopolitical Threats Escalate

    highMar 11, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Nation-State Roundup: Iran's Handala Wiper Campaign Escalates, China Targets Southeast Asian Military

Next Article

Critical Zero-Days Hit Chrome, Linux AppArmor Flaws Enable Root Escalation, Veeam RCE Vulnerabilities Patched →