BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical iOS Zero-Day Kit and Cisco FMC Ransomware Attacks Highlight AI Security Gaps

Critical iOS Zero-Day Kit and Cisco FMC Ransomware Attacks Highlight AI Security Gaps

March 19, 2026Vulnerabilities & Exploits4 min readcritical

Originally reported by The Hacker News, Microsoft Security, Qualys, SANS ISC, MSRC Security Updates

#ios-exploits#zero-day#ransomware#cisco-fmc#ai-security#darksword#interlock-ransomware#cve-2026-20131
Share

TL;DR

A new iOS exploit kit called DarkSword uses three zero-days for complete device compromise, while Interlock ransomware actively exploits a critical Cisco FMC vulnerability with CVSS 10.0 severity. Meanwhile, AI coding agents like Claude Code are operating in enterprise environments without traditional security controls.

Why critical?

The DarkSword iOS exploit kit includes three zero-day vulnerabilities for full device takeover, and Interlock ransomware is actively exploiting a critical CVSS 10.0 Cisco FMC vulnerability. Both represent immediate, high-impact threats to enterprise security.

The cybersecurity landscape faces multiple critical threats this week, from sophisticated iOS exploit chains to active ransomware campaigns targeting network infrastructure. Simultaneously, the emergence of AI coding agents has created new security blind spots in enterprise environments.

DarkSword iOS Exploit Kit Weaponizes Three Zero-Days

Google Threat Intelligence Group, iVerify, and Lookout have documented a new iOS exploit kit dubbed DarkSword that has been active since at least November 2025. According to GTIG, the kit exploits six vulnerabilities total, including three zero-day flaws, to achieve full device takeover on Apple iOS devices.

Multiple commercial surveillance vendors and suspected state-sponsored actors have deployed the full-chain exploit kit. The sophisticated nature of the attack chain suggests significant resources and technical capabilities behind its development, marking a concerning escalation in mobile device targeting.

Interlock Ransomware Exploits Critical Cisco FMC Zero-Day

Amazon Threat Intelligence reports an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software. The flaw, rated CVSS 10.0, stems from insecure deserialization of user-supplied Java byte streams, allowing unauthenticated remote attackers to gain root access.

The vulnerability enables attackers to completely compromise FMC deployments, providing a foothold for lateral movement and ransomware deployment across managed firewall infrastructure. Organizations using Cisco FMC should prioritize patching this critical exposure.

AI Coding Agents Create New Security Control Gaps

Ceros research highlights a significant security blind spot as AI coding agents like Claude Code operate across enterprise environments without traditional identity and access controls. These agents read files, execute shell commands, and call external APIs while remaining largely invisible to existing security frameworks.

Security teams have invested years in building controls for human users and service accounts, but AI agents represent an entirely new category of actor that operates outside these established boundaries. This gap requires immediate attention as AI coding tools scale across engineering organizations.

Microsoft Observability Framework for AI Systems

Microsoft Security published guidance on observability for AI systems, emphasizing the need for visibility into autonomous AI behavior to detect risks proactively. As AI systems grow more autonomous, traditional security monitoring approaches require adaptation to capture AI decision-making processes and potential security implications.

The framework addresses the growing need for security teams to understand and monitor AI system behavior, particularly as these systems gain greater autonomy and access to sensitive resources.

OFAC Sanctions North Korean IT Worker Network

The U.S. Treasury's Office of Foreign Assets Control sanctioned six individuals and two entities involved in North Korean IT worker schemes designed to defraud U.S. businesses. The network uses fake remote job positions to generate illicit revenue for North Korea's weapons of mass destruction programs.

This action highlights the ongoing threat posed by DPRK IT workers infiltrating legitimate businesses, often using sophisticated identity fraud techniques to secure remote positions and access sensitive systems.

Linux Kernel Security Updates Address Critical Flaws

Microsoft Security Response Center published multiple CVE advisories covering Linux kernel vulnerabilities, including:

  • CVE-2026-23231: Use-after-free vulnerability in netfilter nf_tables
  • CVE-2026-23242: NULL pointer dereference in RDMA/siw header processing
  • CVE-2026-23245: Race condition in network scheduler act_gate
  • CVE-2026-23246: Bounds-check issue in Wi-Fi mac80211 implementation
  • CVE-2026-23247: TCP sequence number security weakness

Additional vulnerabilities include file system flaws in f2fs (CVE-2026-23233) and NTFS3 (CVE-2025-71266), along with Python cookie validation issues (CVE-2026-3644) and pyOpenSSL TLS bypass conditions (CVE-2026-27448).

Honeypot Intelligence and Scanning Activity

SANS ISC documented interesting developments in attack patterns, including a specific payload signature "MAGIC_PAYLOAD_KILLER_HERE_OR_LEAVE_EMPTY_iranbot_was_here" appearing in Cowrie honeypot logs. The activity, traced to IP 64.89.161.198, included port scanning, successful Telnet authentication, and web-based attacks.

Separately, SANS researchers noted increased scanning activity targeting Adminer, the lightweight alternative to phpMyAdmin. While Adminer maintains a better security record than its predecessor, its single-file deployment model and minimal configuration requirements make it an attractive target for automated scanning campaigns.

Compliance and Audit Automation

Qualys outlined a five-step approach for transforming reactive compliance checks into continuous audit readiness. The framework addresses the persistent challenge of manual coordination when audit periods approach, despite continuous generation of security findings and control data across multiple systems.

Sources

  • https://thehackernews.com/2026/03/darksword-ios-exploit-kit-uses-6-flaws.html
  • https://thehackernews.com/2026/03/interlock-ransomware-exploits-cisco-fmc.html
  • https://thehackernews.com/2026/03/how-ceros-gives-security-teams.html
  • https://www.microsoft.com/en-us/security/blog/2026/03/18/observability-ai-systems-strengthening-visibility-proactive-risk-detection/
  • https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html
  • https://isc.sans.edu/diary/rss/32810
  • https://isc.sans.edu/diary/rss/32808
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20131
  • https://blog.qualys.com/product-tech/2026/03/18/continuous-audit-readiness-5-steps-audit-outcomes-qualys

Originally reported by The Hacker News, Microsoft Security, Qualys, SANS ISC, MSRC Security Updates

Tags

#ios-exploits#zero-day#ransomware#cisco-fmc#ai-security#darksword#interlock-ransomware#cve-2026-20131

Tracked Companies

🇺🇸Google
🇺🇸Amazon
🇺🇸Apple

Related Intelligence

  • Critical Telnetd RCE, Ubuntu Privilege Escalation, and AI Platform Vulnerabilities Hit Multiple Vendors

    criticalMar 18, 2026
  • Critical Chrome Zero-Day Under Active Attack, North Korean Campaigns Target KakaoTalk, Supply Chain Attacks Hit Python Repos

    criticalMar 17, 2026
  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Critical SharePoint Exploits, Mobile Malware, and Data Breaches Hit Major Organizations

Next Article

AI Security Vulnerabilities, Evasive Malware, and Computer Vision Framework Trends →