BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Microsoft Patches RCE in Windows RRAS, Storm-2561 Deploys Trojan VPN Clients via SEO Poisoning

Microsoft Patches RCE in Windows RRAS, Storm-2561 Deploys Trojan VPN Clients via SEO Poisoning

March 14, 2026Vulnerabilities & Exploits2 min readhigh

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

#remote-code-execution#windows-rras#seo-poisoning#trojan-vpn#clickfix#credential-theft#microsoft-patches#vulnerability-roundup
Share

TL;DR

Microsoft addressed a remote code execution vulnerability in Windows RRAS while threat actors continue deploying sophisticated social engineering campaigns including trojan VPN clients and evolved ClickFix techniques. Multiple library vulnerabilities across CoreDNS, zlib, and other components require attention.

Why high?

Windows RRAS remote code execution vulnerability (CVE-2026-25172) represents a high-severity threat to enterprise infrastructure, combined with active credential theft campaigns using sophisticated social engineering techniques.

Windows RRAS Remote Code Execution Patched

Microsoft has issued patches for CVE-2026-25172, a remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS). According to Microsoft's advisory, the hotpatch has been re-released to ensure comprehensive coverage across all affected scenarios, indicating the criticality of this flaw for organizations running RRAS infrastructure.

Storm-2561 Campaign Distributes Trojan VPN Clients

Microsoft's threat intelligence team has documented a credential theft operation by Storm-2561 that leverages search engine optimization (SEO) poisoning to distribute malicious VPN clients. The campaign redirects users searching for legitimate enterprise software to attacker-controlled websites hosting digitally signed trojans that masquerade as trusted VPN applications. This technique exploits the trust users place in search results and code signing certificates to bypass security controls.

ClickFix Social Engineering Evolution

Researchers have identified new variants of ClickFix attacks being deployed in active campaigns. SANS ISC documented the SmartApeSG campaign, which uses ClickFix pages to deliver Remcos RAT payloads. These attacks continue to evolve their social engineering techniques to manipulate users into executing malicious code under the guise of fixing legitimate system issues.

Multiple Library Vulnerabilities Disclosed

Several vulnerabilities affecting widely-used libraries have been published:

  • CVE-2026-26018: CoreDNS loop detection denial of service vulnerability that could impact DNS resolution services
  • CVE-2026-31802: node-tar symlink path traversal vulnerability allowing directory traversal via drive-relative linkpaths
  • CVE-2026-3381: Compress::Raw::Zlib for Perl uses potentially insecure versions of the underlying zlib library
  • CVE-2026-27141: HTTP/2 frame handling vulnerability in golang.org/x/net that can cause server panics
  • CVE-2026-27171: zlib CPU consumption vulnerability through unbounded loops in CRC32 combination functions

Developer Tool and Browser Security Updates

CVE-2026-21257 addresses an elevation of privilege vulnerability affecting GitHub Copilot and Visual Studio, while CVE-2026-3942 fixes incorrect security UI behavior in Chromium's Picture-in-Picture feature. Microsoft noted that updates to security information links have been made for the GitHub Copilot issue.

Meta Discontinues Instagram E2EE

Meta announced plans to discontinue end-to-end encryption support for Instagram chats after May 8, 2026. Users with affected chats will receive instructions for downloading messages and media they wish to preserve before the encryption feature is removed.

Sources

  • https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html
  • https://thehackernews.com/2026/03/storm-2561-spreads-trojan-vpn-clients.html
  • https://thehackernews.com/2026/03/investigating-new-click-fix-variant.html
  • https://isc.sans.edu/diary/rss/32796
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26018
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31802
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3381
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27141
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27171
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3942
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25172
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21257

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

Tags

#remote-code-execution#windows-rras#seo-poisoning#trojan-vpn#clickfix#credential-theft#microsoft-patches#vulnerability-roundup

Tracked Companies

🇺🇸Meta Platforms

Related Intelligence

  • Critical n8n RCE Hits KEV Catalog While Attackers Weaponize SOC Fatigue and Target Developers

    criticalMar 12, 2026
  • Weekly Security Roundup: Critical OCaml RCE, FreePBX Mass Compromise, and 900+ Systems Still Infected

    highFeb 28, 2026
  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Schneier's Friday Squid Blogging: Open Security Discussion Thread

Next Article

HIPAA Breach Tracker: 301 Million Healthcare Records Exposed in 2025 →