BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Infrastructure Under Siege: Lazarus Strikes, FBI Raids, and Zero-Days in Production

Critical Infrastructure Under Siege: Lazarus Strikes, FBI Raids, and Zero-Days in Production

March 20, 2026Malware & Threats4 min readhigh

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

#botnet-disruption#state-sponsored#ransomware#zero-day#lazarus-group#apt28#data-breach#infrastructure
Share

TL;DR

This week saw coordinated law enforcement action against massive DDoS botnets, while state-sponsored groups like Lazarus and APT28 launched destructive attacks on medical technology and government infrastructure. Multiple zero-day vulnerabilities in enterprise systems add to the threat landscape.

Why high?

Multiple high-impact threats including state-sponsored attacks on critical infrastructure, FBI seizures of threat actor infrastructure, and actively exploited zero-days in widely deployed systems.

International Law Enforcement Strikes Back

Major Botnet Infrastructure Dismantled

A coordinated international operation has successfully disrupted four of the world's largest DDoS botnets. Authorities from the United States, Germany, and Canada took down Command and Control infrastructure for the Aisuru, KimWolf, JackSkid, and Mossad botnets, which had been compromising Internet of Things devices globally. The operation represents a significant blow to the DDoS-for-hire ecosystem that has plagued critical infrastructure and online services.

FBI Seizes Handala Operations After Medical Device Attack

The FBI seized two websites operated by the Handala hacktivist group following their destructive cyberattack on medical technology giant Stryker. The attack reportedly wiped approximately 80,000 devices, demonstrating the group's capability to conduct operations with severe real-world impact on healthcare infrastructure. The swift law enforcement response highlights the critical nature of attacks targeting medical systems.

State-Sponsored Threat Activity

North Korean Lazarus Group Targets Crypto Platform

Bitrefill, a cryptocurrency-powered gift card service, attributed a recent cyberattack to the North Korean Lazarus group's Bluenoroff subunit. The attack follows the group's established pattern of targeting cryptocurrency and financial services platforms to fund state operations. The incident underscores the persistent threat posed by North Korean cyber operations against digital asset platforms.

APT28 Exploits Zimbra Vulnerability in Ukraine Campaign

Russian military intelligence-linked APT28 has been observed exploiting a Zimbra Collaboration Suite vulnerability in targeted attacks against Ukrainian government entities. The campaign represents continued cyber warfare activities in the ongoing conflict, with Russia's GRU-affiliated hackers focusing on government communications infrastructure.

DarkSword Attack Chain Targets Unpatched iPhones

Researchers have identified state-level attacks using "DarkSword," a sophisticated vulnerability chain targeting unpatched iPhones. The attacks demonstrate advanced persistent threat capabilities against mobile devices, highlighting the critical importance of timely iOS security updates.

Critical Vulnerabilities and Zero-Days

PolyShell Flaw Enables Magento Store Takeovers

A newly disclosed vulnerability dubbed "PolyShell" affects all Magento Open Source and Adobe Commerce stable version 2 installations. The flaw allows unauthenticated remote code execution and complete account takeover, posing significant risk to e-commerce platforms worldwide. Organizations running affected systems should prioritize immediate patching.

Maximum Severity Ubiquiti UniFi Vulnerability

Ubiquiti has addressed two vulnerabilities in the UniFi Network Application, including a maximum-severity flaw that could enable account takeover attacks. Given the widespread deployment of UniFi networking equipment in enterprise environments, administrators should apply patches immediately.

Ransomware and Malware Developments

LeakNet Group Masquerades as Journalists

A new ransomware operation called LeakNet has emerged, uniquely positioning itself as a group of "investigative journalists." The group employs fake CAPTCHA pages to trick employees into executing malware, representing an evolution in social engineering tactics used by ransomware operators.

Job Scam Spreads PureHVNC Malware

Cybercriminals are leveraging fake job postings distributed through Google Forms to spread PureHVNC remote access malware. The campaign targets job seekers with malicious attachments that provide attackers complete device control once executed.

Data Breaches and Insider Threats

Navia Benefits Exposes 2.7 Million Records

Navia Benefit Solutions disclosed a data breach affecting nearly 2.7 million individuals. The incident exposed sensitive personal information to unauthorized actors, adding to the growing list of healthcare and benefits provider breaches.

Former Employee Extorts Company for $2.5 Million

A North Carolina data analyst was found guilty of attempting to extort $2.5 million from his employer, Brightly Software, while still working as a contractor. The case highlights the persistent insider threat risk and the potential for privileged access abuse.

Musician's $10 Million Streaming Fraud Scheme

North Carolina musician Michael Smith pleaded guilty to defrauding streaming platforms of over $10 million using AI-generated music and bot networks. The scheme involved creating fake songs and using automated systems to generate fraudulent plays across Spotify, Apple Music, Amazon Music, and YouTube Music.

Microsoft Security Issues

March Updates Break Enterprise Authentication

Microsoft acknowledged that its March Windows 11 updates are causing sign-in failures across multiple Microsoft services, including Teams and OneDrive. The issue affects enterprise environments relying on Microsoft account authentication, potentially disrupting business operations.

Security Best Practices

Password Reset Security Guidance

Security experts have outlined seven critical measures to prevent privilege escalation attacks through password reset mechanisms. The guidance addresses common weaknesses in reset workflows that attackers frequently exploit to gain unauthorized access.

Identity-Focused Security Strategy

Cisco Talos published analysis positioning identity as the new frontier in cybersecurity defense. The research emphasizes the critical importance of identity and access management as traditional perimeter defenses continue to erode.

Sources

  • https://www.bleepingcomputer.com/news/security/musician-pleads-guilty-to-10m-streaming-fraud-powered-by-ai-bots/
  • https://www.bleepingcomputer.com/news/security/aisuru-kimwolf-jackskid-and-mossad-botnets-disrupted-in-joint-action/
  • https://www.bleepingcomputer.com/news/microsoft/kb5079473-march-windows-11-update-breaks-microsoft-account-sign-ins/
  • https://www.bleepingcomputer.com/news/security/data-analyst-found-guilty-of-extorting-brightly-software-of-25-million/
  • https://www.bleepingcomputer.com/news/security/navia-discloses-data-breach-impacting-27-million-people/
  • https://www.bleepingcomputer.com/news/security/new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores/
  • https://www.bleepingcomputer.com/news/security/bitrefill-blames-north-korean-lazarus-group-for-cyberattack/
  • https://www.bleepingcomputer.com/news/security/fbi-seizes-handala-data-leak-site-after-stryker-cyberattack/
  • https://www.bleepingcomputer.com/news/security/russian-apt28-military-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks/
  • https://www.bleepingcomputer.com/news/security/7-ways-to-prevent-privilege-escalation-via-password-resets/
  • https://www.bleepingcomputer.com/news/security/ubiquiti-warns-of-unifi-flaw-that-may-enable-account-takeover/
  • https://www.fortra.com/blog/leaknet-ransomware-what-you-need-know
  • https://blog.talosintelligence.com/you-have-to-invite-them-in/
  • https://www.malwarebytes.com/blog/threat-intel/2026/03/that-job-brief-on-google-forms-could-infect-your-device
  • https://www.malwarebytes.com/blog/mobile/2026/03/a-darksword-hangs-over-unpatched-iphones

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

Tags

#botnet-disruption#state-sponsored#ransomware#zero-day#lazarus-group#apt28#data-breach#infrastructure

Threat Actors

🇰🇵Lazarus
🇷🇺APT28

Tracked Companies

🇺🇸Google
🇺🇸Amazon
🇺🇸Apple

Related Intelligence

  • Week in Review: North Korean Ransomware, Telecoms Breach, and Mobile App Vulnerabilities

    highFeb 24, 2026
  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

    criticalFeb 25, 2026

Related Knowledge

  • CIPHER Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — CIPHER Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Critical Langflow Exploit Within Hours, Post-Quantum HTTPS Progress, and Ransomware Operations Exposed

Next Article

CISO Whisperer Highlights Eleven Vendors Driving Outcome-Based Security at RSA 2026 →