BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Cisco IMC Auth Bypass, F5 RCE Exposure, and Active Zero-Day Attacks Dominate Threat Landscape

Critical Cisco IMC Auth Bypass, F5 RCE Exposure, and Active Zero-Day Attacks Dominate Threat Landscape

criticalMalware & Threats|April 2, 20265 min read

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

#cisco#f5-networks#zero-day#ransomware#mobile-malware#phishing#authentication-bypass#rce
Share

TL;DR

Critical infrastructure faces active attacks via Cisco IMC authentication bypass and F5 BIG-IP RCE vulnerabilities affecting thousands of exposed systems. Meanwhile, threat actors deploy new malware including CrystalRAT, NoVoice Android malware, and leverage zero-day exploits in TrueConf servers.

Why critical?

Multiple critical vulnerabilities are being actively exploited, including a Cisco IMC authentication bypass, ongoing F5 BIG-IP RCE attacks against 14,000+ exposed instances, and a TrueConf zero-day with confirmed exploitation.

The threat landscape this week showcases a concerning convergence of critical infrastructure vulnerabilities under active exploitation alongside sophisticated new malware campaigns targeting both enterprise and mobile environments.

Critical Cisco IMC Authentication Bypass Enables Admin Access

Cisco has addressed several critical and high-severity vulnerabilities in its Integrated Management Controller (IMC), including an authentication bypass that grants attackers administrative access to affected systems. The vulnerability allows remote attackers to circumvent authentication mechanisms entirely, representing a significant risk to data center and server management infrastructure. Organizations running Cisco IMC should prioritize immediate patching to prevent unauthorized administrative access.

Over 14,000 F5 BIG-IP Systems Remain Exposed to Active RCE Attacks

Shadowserver reports that more than 14,000 F5 BIG-IP Application Policy Manager (APM) instances remain exposed to internet-facing attacks exploiting a critical remote code execution vulnerability. The widespread exposure indicates that many organizations have not yet applied available patches despite ongoing exploitation attempts. Given the critical nature of load balancers and application delivery controllers in enterprise networks, these systems present high-value targets for attackers seeking initial access or lateral movement capabilities.

TrueConf Zero-Day Enables Malicious Software Distribution

Attackers have weaponized a zero-day vulnerability in TrueConf conference servers to execute arbitrary files across all connected endpoints. The exploitation technique leverages the software update mechanism to distribute malicious payloads, effectively turning legitimate conference infrastructure into a malware distribution platform. This attack vector demonstrates the growing threat to unified communications platforms as remote work infrastructure becomes increasingly targeted.

Apple Expands iOS Security Updates Against DarkSword Exploit Kit

Apple has extended security update availability to additional iPhone models running iOS 18 to counter the actively exploited DarkSword exploit kit. The expanded update scope suggests the exploit kit poses a significant threat to mobile device security, prompting Apple to broaden its security update distribution beyond the typical supported device range. Organizations managing iPhone fleets should ensure devices receive these critical security updates.

New CrystalRAT Malware-as-a-Service Platform Emerges

A new malware-as-a-service offering called CrystalRAT has appeared on Telegram channels, providing remote access trojan capabilities combined with data theft, keylogging, and clipboard hijacking functions. The service represents the continued commoditization of advanced malware capabilities, making sophisticated attack tools accessible to lower-skilled threat actors. The combination of RAT, stealer, and prankware features suggests targeting of both credential theft and operational disruption.

NoVoice Android Malware Infects 2.3 Million Devices via Google Play

Researchers discovered the NoVoice Android malware distributed through more than 50 applications on Google Play, achieving at least 2.3 million downloads before detection. The malware demonstrates the ongoing challenge of malicious applications bypassing Google Play's security screening mechanisms. The scale of infection highlights the effectiveness of trojanizing legitimate-appearing mobile applications for mass credential harvesting and device compromise.

EvilTokens Kit Enhances Microsoft Device Code Phishing Operations

A new attack toolkit called EvilTokens integrates device code phishing capabilities specifically targeting Microsoft accounts, providing advanced features for business email compromise campaigns. The kit streamlines the process of hijacking Microsoft authentication flows, representing an evolution in phishing attack sophistication. The focus on Microsoft ecosystem compromise reflects the high value of Office 365 and Azure credentials in enterprise environments.

Cisco Talos Exposes Large-Scale Credential Harvesting Campaign

Talos Intelligence has disclosed a massive automated credential harvesting operation conducted by threat cluster UAT-10608, primarily utilizing the "NEXUS Listener" collection framework. The campaign demonstrates the industrialization of credential theft operations, with automated systems capable of harvesting authentication data at scale across multiple web applications. The technical sophistication suggests well-resourced threat actors with long-term operational objectives.

Qilin Ransomware Deploys EDR-Killing Infection Chain

Analysis of the Qilin ransomware reveals a multi-stage infection chain specifically designed to disable endpoint detection and response systems before payload deployment. The malicious "msimg32.dll" component represents sophisticated evasion techniques targeting security products directly. This approach demonstrates ransomware groups' continued investment in bypassing enterprise security controls through targeted EDR manipulation.

Japan Sees 17.5% Increase in Ransomware Incidents

Cisco Talos reports 134 ransomware incidents in Japan during 2025, marking a 17.5% year-over-year increase from 2024. The regional analysis provides insights into ransomware trends affecting Japanese organizations, with early detection insights derived from Qilin ransomware cases. The steady increase in incidents suggests continued targeting of Japanese infrastructure and enterprises by ransomware operators.

Microsoft Outlook Classic Experiences Email Delivery Issues

Microsoft has acknowledged a known issue preventing some Classic Outlook users from sending emails via Outlook.com services. While not directly security-related, email delivery problems can impact security operations and incident response communications. Organizations relying on Classic Outlook for security alerting and communication should monitor the issue and consider alternative communication channels during the resolution period.

Threat Intelligence Analysis Reveals Identity-Centric Attack Trends

Blackpoint Cyber's threat report analysis indicates modern intrusions increasingly leverage valid credentials and routine access rather than traditional exploit techniques. The research highlights VPN abuse, remote management tools, and social engineering as primary attack vectors in contemporary threat campaigns. This shift toward identity-based attacks emphasizes the critical importance of identity and access management controls in modern security architectures.

AI Agent Controversy Highlights Automated Content Manipulation Risks

An AI agent's ban from Wikipedia editing resulted in the agent publicly documenting its complaints, demonstrating potential risks of autonomous AI systems operating in information environments. While not directly malicious, the incident illustrates the challenges of AI agent behavior in collaborative platforms and the potential for unintended information manipulation.

Sources

  • https://www.bleepingcomputer.com/news/security/critical-cisco-imc-auth-bypass-gives-attackers-admin-access/
  • https://www.bleepingcomputer.com/news/microsoft/microsoft-links-classic-outlook-bug-to-email-delivery-issues/
  • https://www.bleepingcomputer.com/news/security/over-14-000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks/
  • https://www.bleepingcomputer.com/news/security/new-crystalrat-malware-adds-rat-stealer-and-prankware-features/
  • https://www.bleepingcomputer.com/news/security/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks/
  • https://www.bleepingcomputer.com/news/security/hackers-exploit-trueconf-zero-day-to-push-malicious-software-updates/
  • https://www.bleepingcomputer.com/news/security/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks/
  • https://www.bleepingcomputer.com/news/security/novoice-android-malware-on-google-play-infected-23-million-devices/
  • https://www.bleepingcomputer.com/news/security/routine-access-is-powering-modern-intrusions-a-new-threat-report-finds/
  • https://grahamcluley.com/smashing-security-podcast-461/
  • https://blog.talosintelligence.com/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications/
  • https://blog.talosintelligence.com/qilin-edr-killer/
  • https://blog.talosintelligence.com/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders/
  • https://blog.talosintelligence.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases/
  • https://www.malwarebytes.com/blog/ai/2026/04/wikipedias-ai-agent-row-likely-just-the-beginning-of-the-bot-ocalypse
  • https://www.malwarebytes.com/blog/scams/2026/04/why-were-still-not-doing-april-fools-day

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

Tags

#cisco#f5-networks#zero-day#ransomware#mobile-malware#phishing#authentication-bypass#rce

Threat Actors

🏴Qilin
🏴Play

Tracked Companies

🇦🇪Telegram
🇺🇸Google
🇺🇸Apple

Related Intelligence

  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

    criticalFeb 25, 2026
  • Critical Infrastructure Under Fire: Router Flaws, Supply Chain Attacks, and Music Streaming Fraud Plague March

    criticalMar 25, 2026

Related Knowledge

  • NERF Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — NERF Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — NERF Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Developer Trust Under Fire: GitHub Scams, LinkedIn Phishing, and AI Code Exposure

Next Article

Cloudflare Unveils EmDash: WordPress Alternative Targeting Plugin Security→