BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Week: Cisco IMC Auth Bypass, $285M DeFi Exploit, and Mobile Wallet Theft Campaign

Critical Week: Cisco IMC Auth Bypass, $285M DeFi Exploit, and Mobile Wallet Theft Campaign

criticalVulnerabilities & Exploits|April 3, 20263 min read

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#critical-vulnerabilities#mobile-malware#defi-exploit#authentication-bypass#credential-harvesting#webshells#ai-threats
Share

TL;DR

This week delivered a cascade of critical threats: Cisco released patches for CVSS 9.8 authentication bypass flaws, attackers drained $285 million from Drift Protocol using novel social engineering, and SparkCat malware returned to app stores targeting cryptocurrency recovery phrases.

Why critical?

Multiple critical vulnerabilities with CVSS 9.8 scores requiring immediate patching, combined with active exploitation campaigns targeting mobile wallets and enterprise infrastructure.

Critical Infrastructure Compromises

Cisco Patches Critical IMC Authentication Bypass

Cisco addressed a severe authentication bypass vulnerability in its Integrated Management Controller (IMC) that allows unauthenticated remote attackers to gain elevated system access. The flaw, tracked as CVE-2026-20093, carries a CVSS score of 9.8 and affects the core authentication mechanism. Cisco also patched a related vulnerability in its Smart Software Manager (SSM) with similar severity. Organizations using Cisco IMC should prioritize immediate patching to prevent complete system compromise.

$285 Million DeFi Protocol Drain Linked to DPRK

Solana-based decentralized exchange Drift Protocol confirmed attackers drained approximately $285 million through a sophisticated social engineering attack exploiting "durable nonces" on April 1, 2026. The attackers gained unauthorized access to Drift's Security Council administrative powers, enabling rapid protocol takeover. Security researchers have linked the attack methodology to North Korean threat actors, representing one of the largest DeFi exploits of 2026.

Mobile and Web Application Threats

SparkCat Malware Returns to Target Crypto Wallets

Cybersecurity researchers discovered a new variant of SparkCat malware infiltrating both the Apple App Store and Google Play Store, more than a year after its initial discovery. The trojan conceals itself within legitimate-appearing applications including enterprise messaging and food delivery services. This iteration specifically targets cryptocurrency wallet recovery phrase images, representing a direct threat to digital asset security. The malware's persistence across multiple app store security reviews demonstrates sophisticated evasion techniques.

Mass Next.js Credential Harvesting Campaign

Cisco Talos identified a large-scale credential harvesting operation exploiting the React2Shell vulnerability (CVE-2025-55182) to compromise 766 Next.js hosts. Attackers systematically extracted database credentials, SSH private keys, AWS secrets, shell command history, Stripe API keys, and GitHub tokens. The campaign demonstrates how web framework vulnerabilities can become vectors for enterprise-wide credential compromise.

Vite Build Tool Exploitation Attempts

SANS Internet Storm Center reported active exploitation attempts targeting exposed Vite development server installations via CVE-2025-30208. Vite, a popular frontend build tool, presents attack surface when development instances remain accessible in production environments. Organizations should audit their development tool exposure and implement proper network segmentation.

Advanced Persistent Techniques

Cookie-Controlled PHP Webshells

Microsoft Security researchers detailed a sophisticated webshell technique using HTTP cookies to control PHP backdoors in Linux hosting environments. These cookie-gated webshells employ obfuscation, PHP-FPM execution, and cron-based persistence mechanisms to evade traditional detection methods. The technique demonstrates how threat actors are evolving beyond simple file-based webshells toward more subtle persistence mechanisms.

AI-Enhanced Attack Evolution

Microsoft reported threat actors are rapidly advancing from using AI as a tool to targeting AI systems as attack surfaces. Generative AI-enhanced phishing campaigns show 450% higher click-through rates compared to traditional methods. Additionally, attackers are industrializing multi-factor authentication bypass techniques using AI-generated social engineering content.

Vulnerability Disclosures

OpenSC Smart Card Library Flaw

Microsoft disclosed CVE-2025-66038 in the OpenSC smart card library, where the sc_compacttlv_find_tag function can return out-of-bounds pointers. This vulnerability affects smart card authentication implementations across multiple platforms.

Cryptography Library DNS Constraint Bypass

The Python cryptography library received patches for CVE-2026-34073, addressing incomplete DNS name constraint enforcement on peer names. This flaw could allow certificate validation bypasses in certain configurations.

Azure AI Foundry Privilege Escalation

Microsoft patched CVE-2026-32213 in Azure AI Foundry, an elevation of privilege vulnerability allowing unauthorized network-based privilege escalation due to improper authorization controls.

Chromium Navigation Use-After-Free

Chromium addressed CVE-2026-5289, a use-after-free vulnerability in the navigation component that affects Microsoft Edge and other Chromium-based browsers.

Sources

  • https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html
  • https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html
  • https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html
  • https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
  • https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html
  • https://www.microsoft.com/en-us/security/blog/2026/04/02/threat-actor-abuse-of-ai-accelerates-from-tool-to-cyberattack-surface/
  • https://www.microsoft.com/en-us/security/blog/2026/04/02/cookie-controlled-php-webshells-tradecraft-linux-hosting-environments/
  • https://isc.sans.edu/diary/rss/32862
  • https://isc.sans.edu/diary/rss/32860
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66038
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34073
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32213
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5289

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#critical-vulnerabilities#mobile-malware#defi-exploit#authentication-bypass#credential-harvesting#webshells#ai-threats

Threat Actors

🏴Play

Tracked Companies

🇺🇸Google
🇺🇸Apple

Related Intelligence

  • Critical Cisco IMC Auth Bypass, F5 RCE Exposure, and Active Zero-Day Attacks Dominate Threat Landscape

    criticalApr 2, 2026
  • Critical Vulnerabilities Under Attack: CISA Adds CVSS 9.8 Flaws While APTs Deploy New Tools

    criticalMar 6, 2026
  • Critical Infrastructure Under Fire: Cisco Zero-Day Exploited Since 2023, Google Disrupts China APT

    criticalFeb 26, 2026

Related Knowledge

  • NERF Training: Vulnerability Research Deep Dive

    offensive
  • NERF Web Security Deep Dive — Training Knowledge Base

    offensive
  • NERF Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Data Breach Roundup: ShinyHunters Targets Cisco, New Yurei Ransomware Emerges, Storm Infostealer Goes Commercial