BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical SharePoint Exploits, Mobile Malware, and Data Breaches Hit Major Organizations

Critical SharePoint Exploits, Mobile Malware, and Data Breaches Hit Major Organizations

March 19, 2026Malware & Threats5 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, SentinelOne Labs, Malwarebytes Labs, Bitdefender Labs

#sharepoint#android-malware#ios-exploits#data-breach#ransomware#cisa-kev#medical-devices#cryptocurrency
Share

TL;DR

Critical SharePoint and Zimbra vulnerabilities are being actively exploited in the wild, prompting CISA warnings to federal agencies. Meanwhile, new Android and iOS malware campaigns target personal data and cryptocurrency wallets.

Why critical?

CISA has added multiple vulnerabilities to the KEV catalog with confirmed active exploitation, including critical SharePoint and Zimbra flaws. The Stryker medical device breach demonstrates real-world impact on critical infrastructure.

Critical Vulnerabilities Under Active Attack

SharePoint Exploitation Confirmed

CISA has confirmed active exploitation of a critical Microsoft SharePoint vulnerability patched in January. The agency's addition of this flaw to the Known Exploited Vulnerabilities catalog indicates threat actors are successfully leveraging the vulnerability in real-world attacks. Organizations running SharePoint infrastructure should prioritize immediate patching to prevent compromise.

Zimbra XSS Flaw Triggers Federal Mandate

CISA has ordered U.S. government agencies to secure their servers against an actively exploited cross-site scripting vulnerability in the Zimbra Collaboration Suite. The binding operational directive underscores the severity of ongoing attacks targeting federal email infrastructure. The vulnerability allows attackers to execute malicious scripts in users' browsers when accessing compromised Zimbra instances.

Medical Technology Sector Under Siege

Stryker Breach Prompts Intune Security Alert

CISA warned U.S. organizations to strengthen Microsoft Intune endpoint management configurations following a cyberattack that wiped systems at medical technology giant Stryker. The incident demonstrates how attackers can exploit enterprise management tools to cause widespread disruption across medical device networks. Healthcare organizations should review their Intune security configurations according to Microsoft's hardening guidance.

ConnectWise ScreenConnect Vulnerability

ConnectWise patched a cryptographic signature verification vulnerability in ScreenConnect that could enable unauthorized access and privilege escalation. The flaw affects the remote access platform's authentication mechanisms, potentially allowing attackers to hijack legitimate sessions. Given ScreenConnect's widespread use in IT service provider environments, organizations should apply the patch immediately.

Mobile Malware Evolution

Perseus Android Malware Targets Personal Notes

Security researchers have identified a new Android malware strain called Perseus that specifically targets user-curated notes applications. The malware scans note-taking apps for sensitive information including passwords, cryptocurrency recovery phrases, and financial data. This represents an evolution in mobile threat tactics, as attackers recognize that users often store credentials in seemingly innocuous note applications.

DarkSword iOS Exploit Kit

A sophisticated iOS exploit framework dubbed DarkSword has been deployed to steal personal information from iPhones, including cryptocurrency wallet data. The attack demonstrates continued threat actor interest in mobile platforms for financial theft. The exploit kit represents a concerning development in iOS-targeted malware, which historically has been less common than Android threats.

Windsurf IDE Extension Blockchain Payload

Bitdefender researchers discovered a malicious Windsurf IDE extension that deploys a NodeJS stealer using the Solana blockchain as payload infrastructure. This novel technique leverages blockchain technology to host malicious code, making detection and takedown more challenging. The approach highlights how attackers continue to innovate in payload delivery mechanisms.

Major Data Breaches

Marquis Financial Services Ransomware Impact

Texas-based financial services provider Marquis disclosed that a ransomware attack in August 2025 compromised data belonging to over 672,000 individuals and disrupted operations at 74 banks across the United States. The incident demonstrates the cascading impact that attacks on financial service providers can have across the broader banking ecosystem.

Aura Identity Protection Breach

Identity protection company Aura confirmed unauthorized access to nearly 900,000 customer records containing names and email addresses. The breach affects marketing contact data rather than core identity protection services, but highlights the irony of security companies falling victim to data breaches.

Social Engineering and Fraud

Apple ID Takeover Attempt on Tech CEO

A sophisticated account takeover attempt targeting WordPress co-founder Matt Mullenweg involved MFA fatigue attacks, legitimate Apple alerts, convincing support calls, and near-successful phishing pages. The incident demonstrates how even security-aware technology executives can become targets of advanced social engineering campaigns.

Nordstrom Email System Compromise

Attackers compromised Nordstrom's email systems to send cryptocurrency scams disguised as St. Patrick's Day promotions to customers. The incident shows how legitimate corporate email infrastructure can be weaponized for fraud campaigns, lending credibility to malicious messages.

Tax Document Dark Web Trade

Malwarebytes researchers identified stolen tax documents trading for approximately $20 each on dark web forums during tax season. The research highlights the ongoing market for personal financial information and the heightened risks individuals face during tax filing periods.

Detection Evasion Techniques

Ransomware Exfiltration Playbook

Cisco Talos research reveals that ransomware operators increasingly use legitimate administrative tools for data exfiltration, making traditional detection methods less effective. The findings underscore the need for behavioral-based detection approaches rather than relying solely on tool-based indicators.

Font Rendering Attack Vector

Researchers discovered a technique using font rendering tricks to hide malicious commands from AI assistants analyzing website content. This novel approach exploits visual perception differences between human users and automated analysis systems.

Refund Fraud Ecosystem

Flare research exposes a structured economy around refund fraud, with methods and tutorials systematically sold to exploit retailer return policies. The findings reveal how traditional fraud has evolved into organized, repeatable business models.

Analysis Tools and Methods

Multi-Agent LLM Malware Analysis

SentinelOne Labs developed an adversarial consensus engine using multiple large language models to improve automated malware analysis accuracy. The approach addresses reliability issues in single-model analysis by implementing cross-validation mechanisms to catch artifacts and hallucinations.

Sources

  • CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
  • New 'Perseus' Android malware checks user notes for secrets
  • Critical Microsoft SharePoint flaw now exploited in attacks
  • Aura confirms data breach exposing 900,000 marketing contacts
  • CISA orders feds to patch Zimbra XSS flaw exploited in attacks
  • ConnectWise patches new flaw allowing ScreenConnect hijacking
  • Marquis: Ransomware gang stole data of 672K people in cyberattack
  • The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms
  • New DarkSword iOS exploit used in infostealer attack on iPhones
  • Nordstrom's email system abused to send crypto scams to customers
  • Smashing Security podcast #459
  • Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
  • Your tax forms sell for $20 on the dark web
  • Researchers found font-rendering trick to hide malicious commands
  • Windsurf IDE Extension Drops Malware via Solana Blockchain

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, SentinelOne Labs, Malwarebytes Labs, Bitdefender Labs

Tags

#sharepoint#android-malware#ios-exploits#data-breach#ransomware#cisa-kev#medical-devices#cryptocurrency

Tracked Companies

🇺🇸Apple

Related Intelligence

  • Malware Threats Weekly: CISA Flags Ivanti EPM Zero-Day, APT28 Leverages Covenant Framework, Meta Ad Network Powers Global Scam Operations

    criticalMar 10, 2026
  • Critical VMware RCE Exploited, Major Breaches Hit LexisNexis and AkzoNobel

    criticalMar 4, 2026
  • CISA Flags Active Exploitation While New Ransomware Tactics and AI Shadow Operations Emerge

    criticalMar 17, 2026

Related Knowledge

  • CIPHER Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — CIPHER Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Critical Telnetd RCE, Russian Vienna Hub, CISA Staffing Cuts, and AI Malware Evolution

Next Article

Critical iOS Zero-Day Kit and Cisco FMC Ransomware Attacks Highlight AI Security Gaps →