BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Supply Chain Attacks and Malware Campaigns Dominate Weekly Threat Landscape

Supply Chain Attacks and Malware Campaigns Dominate Weekly Threat Landscape

highVulnerabilities & Exploits|April 2, 20263 min read

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

#supply-chain#malware#phishing#ransomware#whatsapp#banking-trojans#cryptocurrency-miners#vulnerabilities
Share

TL;DR

The TeamPCP supply chain campaign continues expanding with confirmed victims while threat actors leverage WhatsApp, fake installers, and phishing to deploy malware ranging from cryptocurrency miners to banking trojans. Multiple CVE disclosures affecting various open source components require attention.

Why high?

The TeamPCP supply chain campaign represents an active, widespread threat with confirmed victims and ransomware operations. Combined with multiple active malware campaigns targeting WhatsApp users and banking systems, this constitutes a high-severity threat environment.

Supply Chain Operations Escalate

TeamPCP Campaign Expands with Confirmed Victims

SANS ISC published their fifth update on the ongoing TeamPCP supply chain campaign, documenting the first confirmed victim disclosure and post-compromise cloud enumeration activities. The campaign, detailed in the report "When the Security Scanner Became the Weapon," has evolved to include dual ransomware operations and continues targeting organizations through compromised security scanning tools. Attribution analysis points toward the Axios group, with investigators tracking developments through dual ransomware operations and data exfiltration activities.

Mobile Platform Compromises

WhatsApp Users Targeted Through Multiple Attack Vectors

Meta alerted approximately 200 users who were deceived into installing a malicious iOS application masquerading as WhatsApp, with the majority of targets located in Italy according to La Repubblica and ANSA reporting. The fake application contained spyware deployed through social engineering techniques, prompting potential legal action against an Italian firm connected to the operation.

Separately, Microsoft identified a campaign beginning in late February 2026 that weaponizes WhatsApp messages to distribute malicious Visual Basic Script files. These VBS payloads initiate multi-stage infection chains designed to establish persistence and enable remote access through User Account Control bypass techniques.

Financial Threat Operations

Cryptocurrency Mining Campaign Leverages ISO Lures

Elastic Security researchers uncovered REF1695, a financially motivated operation active since November 2023 that deploys remote access trojans and cryptocurrency miners through fake software installers. The threat actors monetize infections through multiple revenue streams, including Cost Per Action fraud that redirects victims to content locker pages disguised as legitimate software registration portals.

Banking Trojans Target Latin America and Europe

Trend Micro attributed a multi-pronged phishing campaign to the Brazilian cybercrime group Augmented Marauder (also tracked as Water Saci), targeting Spanish-speaking users across Latin America and Europe. The operation delivers Casbaneiro banking trojans (also known as Metamorfo) through dynamic PDF lures and an intermediate malware called Horabot.

Government Agency Impersonation

CERT-UA Targeted in Massive Phishing Campaign

The Computer Emergency Response Team of Ukraine disclosed that threat actors tracked as UAC-0255 impersonated the agency in a phishing campaign affecting approximately one million email addresses. The March 26-27, 2026 attacks distributed password-protected ZIP archives containing the AGEWHEEZE remote administration tool while masquerading as official CERT-UA communications.

Vulnerability Disclosures

Multiple Open Source Components Affected

Microsoft published CVE disclosures for vulnerabilities affecting various open source projects:

  • CVE-2026-5107: FRRouting EVPN Type-2 Route access control issue in bgp_evpn.c
  • CVE-2026-4046: iconv crash due to assertion failure with untrusted input
  • CVE-2026-5119: Libsoup information disclosure via cleartext cookie transmission during HTTPS tunnel establishment
  • CVE-2026-4897: Polkit denial of service through unbounded input processing
  • CVE-2026-29785: NATS Server panic via malicious compression on leafnode port
  • CVE-2025-49010: OpenSC stack buffer overflow in GET RESPONSE functionality
  • CVE-2026-2100: P11-kit null dereference via c_derivekey with specific parameters
  • CVE-2026-4732: Out-of-bounds read overflow in tildearrow/furnace
  • CVE-2026-32287: Infinite loop vulnerability in github.com/antchfx/xpath

Additional CVEs CVE-2026-34714 were disclosed without detailed descriptions.

Industry Analysis

Open Source Security State Assessment

A comprehensive report on trusted open source consumption patterns revealed insights into container image projects, language libraries, and associated vulnerability landscapes across enterprise deployments. The analysis examined what development teams actively pull, deploy, and maintain in production environments.

Sources

  • https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html
  • https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html
  • https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html
  • https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html
  • https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html
  • https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html
  • https://isc.sans.edu/diary/rss/32856
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5107
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34714
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4046
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5119
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4897
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29785
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49010
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2100
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4732
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32287

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

Tags

#supply-chain#malware#phishing#ransomware#whatsapp#banking-trojans#cryptocurrency-miners#vulnerabilities

Tracked Companies

🇺🇸Meta Platforms

Related Intelligence

  • Perseus Banking Malware, DarkSword iPhone Exploits, and 54 EDR Killers Lead Week of Diverse Threats

    highMar 20, 2026
  • Multi-Platform RATs, AI-Driven Attacks, and Certificate Abuse: Weekly Vulnerability Roundup

    highMar 4, 2026
  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026

Related Knowledge

  • NERF Training: Vulnerability Research Deep Dive

    offensive
  • NERF Web Security Deep Dive — Training Knowledge Base

    offensive
  • NERF Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← AI-Generated FreeBSD Kernel RCE Exploit Demonstrates LLM Security Research Capabilities

Next Article

Privacy Surveillance Roundup: US iPhone Hacking Tools Leaked, Hackback Strategy Debate, and Federal Agent Force Records Exposed→