BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Malware Threats Roundup: Active AI Framework Exploitation, New macOS Stealers, and Browser Supply Chain Attacks

Malware Threats Roundup: Active AI Framework Exploitation, New macOS Stealers, and Browser Supply Chain Attacks

March 27, 2026Malware & Threats3 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

#langflow#cve-2026-33017#macos-malware#infostealer#browser-extension#coruna-exploit#glassworm#supply-chain
Share

TL;DR

CISA confirmed active exploitation of a critical Langflow AI framework vulnerability, prompting emergency patches. Meanwhile, new macOS infostealers are using fake CAPTCHA tricks and browser extensions are being weaponized for supply chain surveillance attacks.

Why critical?

CISA added CVE-2026-33017 affecting Langflow AI frameworks to their KEV catalog with confirmed active exploitation, making this critical severity despite other lower-impact stories in the roundup.

Active Exploitation Targets AI Infrastructure

The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning that threat actors are actively exploiting CVE-2026-33017, a critical vulnerability in the Langflow framework used for building AI agents and workflows. The flaw allows attackers to hijack AI-powered applications and potentially access sensitive data processed by these systems. Organizations using Langflow should immediately apply available patches and review their AI infrastructure for signs of compromise.

New macOS Malware Campaign Uses Social Engineering

Malwarebytes researchers discovered Infiniti Stealer (formerly NukeChain), a new macOS infostealer that leverages fake CAPTCHA pages to trick users into executing malicious commands. The malware uses Python/Nuitka compilation and employs ClickFix social engineering techniques to bypass macOS security controls. Once installed, it harvests credentials, browser data, and cryptocurrency wallet information from infected systems.

Browser Extensions Weaponized for Supply Chain Attacks

The GlassWorm attack campaign installs malicious browser extensions that masquerade as legitimate developer tools. According to Malwarebytes analysis, these extensions monitor web activity, steal authentication data, and create persistent surveillance capabilities that can spread across development environments. The attack demonstrates how browser-based threats can escalate into broader supply chain compromises.

Sophisticated iOS Exploit Framework Evolution

Security researchers linked the Coruna exploit kit to the Operation Triangulation campaign that targeted iPhones in 2023 through zero-click iMessage exploits. The framework represents an evolution of nation-state-level iOS exploitation capabilities, suggesting continued development of advanced mobile attack vectors by sophisticated threat actors.

Fake Security Software Delivers Venom Stealer

A fraudulent Avast website discovered by Malwarebytes conducts fake virus scans before installing Venom Stealer malware instead of providing legitimate security protection. The campaign targets users seeking antivirus software, delivering credential theft capabilities that harvest passwords, session tokens, and cryptocurrency wallet data.

Law Enforcement Actions Disrupt Criminal Infrastructure

Russian authorities arrested the suspected owner of LeakBase, a major cybercrime forum used for trading stolen data and hacking tools. Separately, the UK sanctioned Xinbi, a Chinese-language marketplace that supplies stolen data and satellite internet equipment to Southeast Asian scam operations. These actions represent coordinated efforts to disrupt cybercriminal supply chains.

Dutch Organizations Face Targeted Attacks

The Dutch National Police disclosed a security breach following a successful phishing attack, though officials stated citizen data remained unaffected. Additionally, Ajax Football Club revealed that attackers exploited system vulnerabilities to access fan data and potentially hijack match tickets, affecting several hundred individuals.

Security Updates and Vulnerability Disclosures

Microsoft released KB5079391 for Windows 11, introducing Smart App Control improvements designed to better detect and block malicious applications. Cisco Talos disclosed 30 vulnerabilities across TP-Link, Canva, and HikVision products, all of which have been patched by their respective vendors.

Sources

  • https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/
  • https://www.malwarebytes.com/blog/threat-intel/2026/03/infiniti-stealer-a-new-macos-infostealer-using-clickfix-and-python-nuitka
  • https://www.malwarebytes.com/blog/news/2026/03/glassworm-attack-installs-fake-browser-extension-for-surveillance
  • https://www.bleepingcomputer.com/news/security/coruna-ios-exploit-framework-linked-to-triangulation-attacks/
  • https://www.malwarebytes.com/blog/threat-intel/2026/03/bogus-avast-website-fakes-virus-scan-installs-venom-stealer-instead
  • https://www.bleepingcomputer.com/news/security/russia-arrests-suspected-owner-and-admin-of-leakbase-cybercrime-forum/
  • https://www.bleepingcomputer.com/news/security/uk-sanctions-xinbi-marketplace-linked-to-asian-scam-centers/
  • https://www.bleepingcomputer.com/news/security/dutch-police-discloses-security-breach-after-phishing-attack/
  • https://www.bleepingcomputer.com/news/security/ajax-football-club-hack-exposed-fan-data-enabled-ticket-hijack/
  • https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5079391-update-rolls-out-smart-app-control-improvements/
  • https://blog.talosintelligence.com/tp-link-canva-hikvision-vulnerabilities/
  • https://www.fortra.com/blog/world-leaks-data-extortion-what-you-need-know

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

Tags

#langflow#cve-2026-33017#macos-malware#infostealer#browser-extension#coruna-exploit#glassworm#supply-chain

Tracked Companies

🇨🇳Hikvision
🇨🇳TP-Link

Related Intelligence

  • Supply Chain Strikes and AI Evasion: March Malware Intelligence Roundup

    highMar 18, 2026
  • GlassWorm Campaign Escalates: 72 Malicious Extensions Weaponize Open VSX Dependencies

    highMar 15, 2026
  • LiteLLM PyPI Package Compromised: Real-Time Incident Response Analysis

    highMar 27, 2026

Related Knowledge

  • CIPHER Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — CIPHER Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Nation-State Roundup: CISA KEV Addition, APT Clusters Target Southeast Asia, and RedLine Developer Extradited

Next Article

LiteLLM PyPI Package Compromised: Real-Time Incident Response Analysis→