BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Nation-State Roundup: Russian APT Exploits Zimbra Zero-Day, Iranian Group Hits Stryker via Microsoft Intune

Nation-State Roundup: Russian APT Exploits Zimbra Zero-Day, Iranian Group Hits Stryker via Microsoft Intune

March 20, 2026Nation-State & APT3 min readhigh

Originally reported by Security Affairs, The Record

#russian-apt#iranian-apt#zero-day#zimbra#microsoft-intune#cisco-firewall#ransomware#opsec
Share

TL;DR

Nation-state actors continue sophisticated campaigns with Russian APT exploiting Zimbra zero-day against Ukrainian targets and Iranian threat actors compromising Stryker through Microsoft Intune. Meanwhile, ransomware groups exploit Cisco firewall zero-days and law enforcement disrupts major IoT botnets.

Why high?

Multiple active nation-state campaigns including Russian APT exploiting Zimbra zero-day against Ukraine and Iranian group compromising major medical device manufacturer via legitimate Microsoft infrastructure.

Russian APT Exploits Zimbra Zero-Day Against Ukraine

A Russia-linked threat actor has been exploiting a high-severity cross-site scripting vulnerability in Zimbra Collaboration to target users in Ukraine. The vulnerability, tracked as CVE-2025-66376 with a CVSS score of 7.2, allows attackers to execute scripts through insufficiently sanitized HTML emails when opened by victims.

The campaign demonstrates continued nation-state targeting of Ukrainian infrastructure through email-based attack vectors, leveraging zero-day vulnerabilities in widely deployed collaboration platforms.

Iranian Group Compromises Stryker via Microsoft Intune

FBI and CISA issued warnings about Microsoft Intune security risks following an Iran-linked cyberattack against medical device manufacturer Stryker. The attackers broke into the legitimate Microsoft device management system and used it to wipe company data without deploying traditional malware.

This living-off-the-land technique highlights the growing trend of nation-state actors abusing legitimate cloud management platforms to avoid detection while maximizing operational impact.

Interlock Ransomware Exploited Cisco Firewall Zero-Day

Amazon researchers revealed that the Interlock ransomware gang exploited a zero-day vulnerability in Cisco firewalls weeks before public disclosure. The pre-disclosure exploitation timeline suggests either independent discovery or potential access to vulnerability information through supply chain or intelligence channels.

CISA has since added a related Cisco vulnerability (CVE-2026-20131) affecting Secure Firewall Management Center (FMC) Software and Security Cloud Control (SCC) Firewall Management to its Known Exploited Vulnerabilities catalog, indicating confirmed active exploitation.

Global Law Enforcement Disrupts IoT Botnets

The U.S. Department of Justice, working with Canadian and German authorities alongside major technology companies, disrupted command-and-control infrastructure used by several IoT botnets including AISURU, Kimwolf, JackSkid, and Mossad. The coordinated operation targeted botnet operators and their global infrastructure.

While not directly nation-state activity, these botnets often serve as infrastructure for subsequent APT campaigns or are leveraged by state-sponsored actors for initial access operations.

OPSEC Failure Exposes French Aircraft Carrier

French aircraft carrier Charles de Gaulle was tracked in real time through a sailor's Strava fitness app activity, according to Le Monde reporting. The operational security failure allowed real-time location tracking of the strategic naval asset through publicly shared running data.

This incident mirrors previous OPSEC failures involving military personnel and fitness tracking applications, highlighting persistent challenges in managing personal device security within military environments.

Policy and Administrative Developments

U.S. intelligence chiefs urged lawmakers to extend Section 702 surveillance powers without modifications during the House Intelligence Committee's annual worldwide threats hearing. The remarks represented the most vocal support for President Trump's surveillance strategy to date.

Separately, the White House definitively rejected speculation about cyber "letters of marque" that would allow private companies to conduct cyberattacks on behalf of the U.S. government, clarifying the administration's position on private sector involvement in offensive cyber operations.

Sources

  • https://securityaffairs.com/189673/security/russian-apt-targets-ukraine-via-zimbra-xss-flaw-cve-2025-66376.html
  • https://therecord.media/fbi-cisa-warn-of-microsoft-intune-risks-stryker
  • https://therecord.media/cisco-ransomware-interlock-firewalls
  • https://securityaffairs.com/189682/security/u-s-cisa-adds-a-flaw-in-cisco-fmc-and-cisco-scc-firewall-management-to-its-known-exploited-vulnerabilities-catalog.html
  • https://securityaffairs.com/189710/cyber-crime/global-law-enforcement-operation-targets-aisuru-kimwolf-jackskid-botnet-operators.html
  • https://securityaffairs.com/189696/intelligence/french-aircraft-carrier-charles-de-gaulle-tracked-via-strava-activity-in-opsec-failure.html
  • https://therecord.media/us-intel-chiefs-urge-lawmakers-to-extend-section-702
  • https://therecord.media/offensive-cyber-white-house-hacking

Originally reported by Security Affairs, The Record

Tags

#russian-apt#iranian-apt#zero-day#zimbra#microsoft-intune#cisco-firewall#ransomware#opsec

Tracked Companies

🇺🇸Amazon

Related Intelligence

  • Russian Hackers Deploy DarkSword Zero-Day for Drive-By iOS 18 Exploitation

    criticalMar 19, 2026
  • Magento Under Siege: PolyShell Zero-Day Fuels Mass Defacements, AI Fraud Tactics Emerge

    highMar 21, 2026
  • Nation-State Roundup: North Korea Hits Crypto Platform, Iran War Escalates Cyber Threats, Healthcare Under Fire

    highMar 18, 2026

Related Knowledge

  • Threat Intelligence Deep Training

    reference
  • MITRE ATT&CK / D3FEND Deep Reference

    reference
  • CIPHER Training: Emerging Threats Deep Dive (2025-2026)

    reference

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Perseus Banking Malware, DarkSword iPhone Exploits, and 54 EDR Killers Lead Week of Diverse Threats

Next Article

Critical Langflow Exploit Within Hours, Post-Quantum HTTPS Progress, and Ransomware Operations Exposed →