BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Infrastructure Under Fire: Fortinet RCE, Russian iOS Exploits, and NetScaler Memory Leaks

Critical Infrastructure Under Fire: Fortinet RCE, Russian iOS Exploits, and NetScaler Memory Leaks

criticalNation-State & APT|March 30, 20262 min read

Originally reported by Security Affairs

#fortinet#russia#apt#ios-exploits#netscaler#rce#memory-leak#ta446
Share

TL;DR

Threat actors are actively exploiting critical vulnerabilities across multiple enterprise platforms this week. A Fortinet FortiClient EMS SQL injection flaw enables remote code execution, while Russian APT TA446 deploys iOS exploit kits against iPhone users.

Why critical?

Multiple critical vulnerabilities are being actively exploited, including a CVSS 9.1 Fortinet RCE flaw and a CVSS 9.3 NetScaler memory leak, both with confirmed threat actor activity.

Critical Fortinet FortiClient EMS Under Active Exploitation

Threat actors are actively exploiting a critical vulnerability in Fortinet's FortiClient Endpoint Management Server (EMS) platform. The flaw, tracked as CVE-2026-21643 with a CVSS score of 9.1, enables remote code execution through SQL injection attacks.

Defused researchers first identified the active exploitation, warning that attackers have weaponized the vulnerability to compromise enterprise networks through the FortiClient EMS management interface. The SQL injection vector allows unauthenticated remote attackers to execute arbitrary code on vulnerable systems.

Organizations running FortiClient EMS should immediately apply available patches and review network logs for signs of compromise. The vulnerability's high CVSS score reflects both its ease of exploitation and potential for complete system compromise.

Russian APT TA446 Deploys iOS Exploit Kit in Targeted Campaign

Russian-linked APT group TA446 (also tracked as SEABORGIUM, ColdRiver, Callisto, and Star Blizzard) has expanded its mobile targeting capabilities with the DarkSword exploit kit. Security researchers report the group is conducting targeted spear-phishing campaigns specifically designed to compromise iOS devices.

The attacks leverage malicious emails containing exploit payloads that target iPhone users. TA446's adoption of mobile-specific exploit frameworks signals a strategic shift toward compromising devices that organizations often consider more secure than traditional endpoints.

This campaign represents a concerning evolution in nation-state mobile targeting, as iOS exploits are typically more complex and expensive to develop. The group's investment in iPhone compromise capabilities suggests high-value targets are the primary objective.

NetScaler Critical Memory Leak Draws Attacker Interest

Citrix NetScaler ADC and Gateway devices face active reconnaissance from threat actors probing a critical memory disclosure vulnerability. The flaw, designated CVE-2026-3055 with a CVSS score of 9.3, allows attackers to extract sensitive data through memory overread conditions.

Citrix released security updates addressing this vulnerability alongside another NetScaler flaw this week. However, security researchers report that scanning activity targeting the memory leak bug began shortly after the advisory's publication, indicating rapid weaponization.

The vulnerability's potential for sensitive data exposure makes it particularly attractive to both cybercriminal and nation-state actors. Organizations should prioritize patching NetScaler systems and monitor for unusual memory access patterns or data exfiltration attempts.

Sources

  • Critical Fortinet FortiClient EMS flaw exploited for Remote Code Execution
  • Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave
  • Urgent Alert: NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data

Originally reported by Security Affairs

Tags

#fortinet#russia#apt#ios-exploits#netscaler#rce#memory-leak#ta446

Threat Actors

🇷🇺Star Blizzard

Related Intelligence

  • Nation-State Intelligence Roundup: Russian Disinformation Targets Baltics, Critical PTC Vulnerability Emerges

    criticalMar 28, 2026
  • Critical Telnetd RCE, Russian Vienna Hub, CISA Staffing Cuts, and AI Malware Evolution

    criticalMar 19, 2026
  • Russian Hacker Leverages AI to Breach 600+ Fortinet Firewalls Across 55 Countries

    criticalFeb 22, 2026

Related Knowledge

  • Threat Intelligence Deep Training

    reference
  • MITRE ATT&CK / D3FEND Deep Reference

    reference
  • NERF Training: Emerging Threats Deep Dive (2025-2026)

    reference

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← European Commission Breached, FBI Director's Email Compromised, WordPress Plugin Flaw Affects 500K Sites

Next Article

Apple's Camera Indicator System: Hardware-Level Privacy Protection Analysis→