BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Weekly Threat Roundup: EU Breach, Insider Extortion, and North Korean Crypto Heist

Weekly Threat Roundup: EU Breach, Insider Extortion, and North Korean Crypto Heist

highMalware & Threats|April 3, 20264 min read

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs, Fortinet

#threat-roundup#data-breach#insider-threat#cryptocurrency#north-korea#malware#enterprise-security#supply-chain
Share

TL;DR

Major security incidents this week include a TeamPCP breach of EU Commission systems exposing data from 30 entities, North Korean hackers stealing $280 million from Drift Protocol, and discovery of pre-authentication RCE vulnerabilities in Progress ShareFile.

Why high?

Multiple high-impact incidents including a major EU data breach affecting 30 entities, a $280M cryptocurrency theft attributed to North Korean actors, and critical vulnerabilities in enterprise file-sharing platforms.

EU Commission Breach Exposes 30 Entities

CERT-EU has attributed the European Commission cloud infrastructure breach to the TeamPCP threat group, revealing the incident exposed sensitive data belonging to at least 29 other EU entities beyond the Commission itself. The breach demonstrates the cascading impact of cloud infrastructure compromises in interconnected government environments, highlighting critical risks in shared cloud architectures used by governmental organizations.

North Korean Hackers Drain $280M from Drift Protocol

The Drift Protocol suffered a devastating $280 million loss after threat actors, likely linked to North Korean state operations, seized control of the platform's Security Council administrative powers. The sophisticated attack represents one of the largest cryptocurrency thefts of the year and underscores the continuing threat posed by DPRK-linked groups to decentralized finance platforms.

Insider Extortion Plot Locks 254 Servers

A former core infrastructure engineer pleaded guilty to an extortion scheme that locked Windows administrators out of 254 servers at his New Jersey-based industrial employer. The case highlights the persistent threat of malicious insiders with privileged access and the critical importance of robust access controls and monitoring for departing employees with administrative privileges.

Progress ShareFile Vulnerabilities Enable Pre-Auth RCE

Researchers discovered two vulnerabilities in Progress ShareFile that can be chained together to enable unauthenticated file exfiltration from affected enterprise environments. The pre-authentication remote code execution attack path poses significant risks to organizations using the popular secure file transfer solution, particularly given ShareFile's widespread adoption in enterprise environments.

Apple Expands DarkSword Exploit Kit Patches

Apple has quietly extended patches against vulnerabilities exploited by the DarkSword exploit kit to include iOS and iPadOS 18.7.7. The expanded patch coverage suggests the vulnerabilities targeted by DarkSword represent a broader threat surface than initially disclosed, emphasizing the importance of prompt iOS updates.

Stryker Recovers from Data-Wiping Attack

Medical technology giant Stryker Corporation has returned to full operational status three weeks after the Iranian-linked Handala hacktivist group claimed responsibility for a data-wiping cyberattack that severely disrupted the company's systems. The incident demonstrates both the destructive capabilities of state-affiliated threat groups and the resilience planning required for critical healthcare infrastructure.

DPRK Groups Leverage GitHub for C2 Operations

Fortinet researchers detailed a North Korean campaign using LNK files and GitHub repositories as covert command-and-control infrastructure. The technique demonstrates the continued evolution of DPRK cyber operations, utilizing legitimate platforms to evade detection while maintaining persistent access to compromised Windows environments through multi-stage PowerShell execution chains.

Claude Code Leak Exploited for Malware Distribution

Threat actors are capitalizing on the recent Claude Code source code leak by creating fake GitHub repositories that deliver Vidar information-stealing malware. The campaign highlights how high-profile security incidents create opportunities for follow-on attacks targeting users seeking leaked or compromised code.

Romance Scammer Caught by Fellow Fraudster

A Nigerian romance scammer received a 15-year prison sentence after accidentally targeting another fraudster, who provided investigators with incriminating chat logs. The case offers rare insight into the operational security failures that can bring down otherwise sophisticated social engineering operations.

Exchange Online Access Issues Persist

Microsoft continues investigating intermittent Exchange Online mailbox access problems affecting Outlook mobile and macOS users over several weeks. The ongoing availability issues highlight the operational risks associated with cloud email dependencies and the challenges of maintaining service reliability at scale.

Additional Security Developments

Residential Proxy Evasion: Research indicates residential proxies successfully evaded IP reputation systems in 78% of over 4 billion analyzed sessions, demonstrating significant blind spots in current threat detection methodologies.

Physical-Digital Crime Convergence: Threat actors are exploiting vacant properties as mail intercept points, combining traditional fraud techniques with digital identity theft in hybrid criminal operations.

Microsoft Force Upgrades: Microsoft has begun automatically upgrading unmanaged Windows 11 24H2 devices to version 25H2, potentially creating compatibility issues for organizations with delayed patch management cycles.

Sources

  • https://www.bleepingcomputer.com/news/security/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities/
  • https://www.bleepingcomputer.com/news/security/drift-loses-280-million-north-korean-hackers-seize-security-council-powers/
  • https://www.bleepingcomputer.com/news/security/man-admits-to-extortion-plot-locking-coworkers-out-of-thousands-of-windows-devices/
  • https://www.bleepingcomputer.com/news/security/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks/
  • https://www.malwarebytes.com/blog/news/2026/04/apple-expands-darksword-patches-to-ios-18-7-7
  • https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-fully-operational-after-data-wiping-attack/
  • https://feeds.fortinet.com/~/953053052/0/fortinet/blog/threat-research~DPRKRelated-Campaigns-with-LNK-and-GitHub-C
  • https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github/
  • https://www.bitdefender.com/en-us/blog/hotforsecurity/nigerian-romance-scammer-jailed
  • https://www.bleepingcomputer.com/news/microsoft/microsoft-still-working-to-fix-exchange-online-mailbox-access-issues/
  • https://www.bleepingcomputer.com/news/security/residential-proxies-evaded-ip-reputation-checks-in-78-percent-of-4b-sessions/
  • https://www.bleepingcomputer.com/news/security/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime/
  • https://www.bleepingcomputer.com/news/microsoft/microsoft-now-force-upgrades-unmanaged-windows-11-24h2-pcs/

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs, Fortinet

Tags

#threat-roundup#data-breach#insider-threat#cryptocurrency#north-korea#malware#enterprise-security#supply-chain

Tracked Companies

🇺🇸Apple

Related Intelligence

  • Threat Intelligence Digest: Chinese APT Campaign, Critical Router RCE, and Agent Tesla Resurgence

    highFeb 26, 2026
  • LiteLLM PyPI Package Compromised: Real-Time Incident Response Analysis

    highMar 27, 2026
  • Weekly Threat Roundup: Government Breaches, Geopolitical Wiper Attacks, and Mass Data Exposures

    highMar 24, 2026

Related Knowledge

  • NERF Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — NERF Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — NERF Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← CISA Adds Google Dawn CVE to KEV as North Korean APT UNC1069 Claims Axios Supply Chain Attack

Next Article

Weekly Roundup: Sub-Hour Ransomware, AI Dominance at RSA, and Multi-Channel Malware Campaigns→