BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Chrome Zero-Day Under Active Attack, North Korean Campaigns Target KakaoTalk, Supply Chain Attacks Hit Python Repos

Critical Chrome Zero-Day Under Active Attack, North Korean Campaigns Target KakaoTalk, Supply Chain Attacks Hit Python Repos

March 17, 2026Vulnerabilities & Exploits3 min readcritical

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#zero-day#supply-chain#chrome#north-korea#apt#github#python#ai-security
Share

TL;DR

Google confirms active exploitation of Chrome zero-day CVE-2026-3909 affecting Skia rendering. Meanwhile, North Korean Konni group leverages KakaoTalk for malware distribution and GlassWorm campaign injects malware into hundreds of Python repositories using stolen GitHub tokens.

Why critical?

Google confirms active exploitation of Chrome zero-day CVE-2026-3909, making this critical. Combined with North Korean APT campaigns and widespread Python supply chain attacks targeting developer infrastructure.

Chrome Zero-Day Under Active Exploitation

Google has confirmed active exploitation of CVE-2026-3909, an out-of-bounds write vulnerability in Chrome's Skia graphics library. Microsoft's security update guide notes that "Google is aware that an exploit for CVE-2026-3909 exists in the wild," indicating immediate patching priority for organizations running Chromium-based browsers.

North Korean APT Weaponizes KakaoTalk for Malware Distribution

South Korean threat intelligence firm Genians has attributed a sophisticated campaign to the North Korean Konni group, which combines spear-phishing with abuse of legitimate messaging infrastructure. The operation begins with phishing emails designed to compromise targets, then leverages access to victims' KakaoTalk desktop applications to distribute malicious payloads to specific contacts. This technique transforms compromised users into unwitting distribution nodes, amplifying the campaign's reach through trusted communication channels.

Python Supply Chain Under Siege via GitHub Token Theft

StepSecurity researchers have documented the GlassWorm campaign, which exploits stolen GitHub authentication tokens to inject malware into hundreds of Python repositories. The attack targets critical files including setup.py, main.py, and app.py across Django applications, machine learning research code, Streamlit dashboards, and PyPI packages. The malware uses obfuscated code appended to legitimate files, creating a supply chain risk for any developer or system executing the compromised code.

AI Security Readiness Lags Behind Deployment Reality

Pentera's AI and Adversarial Testing Benchmark Report 2026 reveals a critical gap between AI adoption and security preparedness among 300 surveyed US CISOs and senior security leaders. The research highlights that organizations are deploying AI systems faster than they can develop appropriate security controls, creating potential attack vectors in enterprise environments.

Microsoft Teams Becomes Vector for Voice Phishing

Microsoft's Detection and Response Team (DART) has documented a sophisticated voice phishing campaign targeting Microsoft Teams users. The attack demonstrates how threat actors exploit trusted communication platforms and social engineering techniques to achieve identity-based compromises, bypassing traditional email security controls.

Network Obfuscation via IPv6 Address Mapping

SANS researchers have identified attackers using IPv4-mapped IPv6 addresses to potentially obfuscate proxy scanning activities. These addresses, defined in RFC 4038, serve as transition mechanisms for IPv6 deployment but can be abused to complicate detection and attribution efforts in network security monitoring.

Critical Vulnerabilities Across Multiple Platforms

Several notable CVEs have been disclosed:

  • CVE-2026-23943: Pre-authentication SSH denial of service through unbounded zlib inflation
  • CVE-2026-4105: Systemd privilege escalation via improper access control in RegisterMachine D-Bus method
  • CVE-2026-2673: OpenSSL TLS 1.3 server key agreement group selection issue
  • CVE-2026-32249: Vim null pointer dereference in NFA regex engine affecting versions prior to 9.2.0137
  • CVE-2026-23941: HTTP request smuggling vulnerability in Erlang/OTP inets httpd
  • CVE-2026-1703: Limited path traversal vulnerability when installing wheel archives

Sources

  • https://thehackernews.com/2026/03/ai-is-everywhere-but-cisos-are-still.html
  • https://thehackernews.com/2026/03/konni-deploys-endrat-through-spear.html
  • https://thehackernews.com/2026/03/glassworm-attack-uses-stolen-github.html
  • https://www.microsoft.com/en-us/security/blog/2026/03/16/help-on-the-line-how-a-microsoft-teams-support-call-led-to-compromise/
  • https://isc.sans.edu/diary/rss/32804
  • https://isc.sans.edu/diary/rss/32800
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3909
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23943
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4105
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2673

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#zero-day#supply-chain#chrome#north-korea#apt#github#python#ai-security

Tracked Companies

🇺🇸Google

Related Intelligence

  • Critical Infrastructure Under Fire: Cisco Zero-Day Exploited Since 2023, Google Disrupts China APT

    criticalFeb 26, 2026
  • Critical Zero-Days Hit Chrome, Linux AppArmor Flaws Enable Root Escalation, Veeam RCE Vulnerabilities Patched

    criticalMar 13, 2026
  • CISA KEV Updates, APT28 Campaign, and Agentic AI Security Challenges

    criticalMar 10, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Data Breach Roundup: AI Service Secrets Surge 81% on GitHub, Steam Games Hide Wallet Drainers, AWS Bedrock Leak Risk

Next Article

CISA Flags Active Exploitation While New Ransomware Tactics and AI Shadow Operations Emerge →