BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Nation-State Roundup: EU Commission Breach Exposes 30 Entities, North Korea Drains $285M from Crypto Exchange

Nation-State Roundup: EU Commission Breach Exposes 30 Entities, North Korea Drains $285M from Crypto Exchange

criticalNation-State & APT|April 4, 20264 min read

Originally reported by Security Affairs, The Record, Palo Alto Unit 42

#nation-state#apt#teamtcp#north-korea#cisa-kev#european-commission#cryptocurrency#ai-security
Share

TL;DR

The European Commission suffered a major breach attributed to TeamPCP affecting 30 EU entities, while North Korean hackers executed a sophisticated $285 million cryptocurrency theft from Drift. CISA has given federal agencies two weeks to patch a video conferencing vulnerability actively exploited by Chinese hackers.

Why critical?

CISA added a video conferencing vulnerability to the KEV catalog with confirmed active exploitation by Chinese hackers, and a sophisticated North Korean cryptocurrency heist netted $285 million.

EU Commission Breach Exposes Data from 30 Entities

CERT-EU attributed a European Commission cloud infrastructure breach to the TeamPCP threat group, confirming that data from at least 30 EU entities was compromised. The incident was publicly disclosed on March 27 following media inquiries that prompted confirmation of the breach.

The attack targeted cloud infrastructure used by the European Commission, though specific details about the attack vector and timeline remain limited. TeamPCP represents a previously known threat actor, though their specific attribution and capabilities require further investigation by security researchers.

North Korean Hackers Execute $285M Cryptocurrency Heist

Threat actors likely linked to North Korea successfully drained $285 million from the Drift cryptocurrency platform in a sophisticated attack that leveraged advanced blockchain manipulation techniques. The attackers utilized durable nonce accounts to pre-sign and delay transactions while simultaneously compromising multisig approval mechanisms.

The attack demonstrates the continued evolution of North Korean cryptocurrency theft operations, which have become increasingly sophisticated in their technical execution. The use of nonce-based transaction manipulation represents a notable advancement in blockchain-focused attack methodologies.

CISA Orders Federal Agencies to Patch Video Conferencing Vulnerability

CISA issued a directive requiring all federal agencies to patch a vulnerability in video conferencing software within two weeks, citing active exploitation by Chinese hackers. The vulnerability affects a popular line of video conferencing products, though specific product details and CVE information were not immediately available.

The two-week patching deadline indicates the severity of the threat and suggests the vulnerability may provide significant access to targeted systems. The attribution to Chinese threat actors aligns with ongoing patterns of infrastructure targeting by nation-state groups.

CrystalX RAT Emerges as New Malware-as-a-Service Offering

Kaspersky researchers discovered a Telegram-based campaign promoting CrystalX RAT, a previously unknown malware offered as a service with three subscription tiers. The malware combines remote access trojan capabilities, data theft functionality, and keylogging features into a comprehensive surveillance platform.

The malware's MaaS model with tiered pricing suggests professional development and commercialization efforts. The combination of spyware, stealer, and remote access capabilities makes it attractive to various threat actors seeking comprehensive victim monitoring tools.

FCC Proposes $4.5 Million Fine for Suspicious Call Traffic

The Federal Communications Commission proposed a $4.5 million fine against voice service provider Voxbeam for allegedly hosting suspicious foreign call traffic that led to financial impersonation robocalls targeting American consumers. The FCC cited the use of non-compliant and long-dormant accounts in facilitating the malicious traffic.

The enforcement action highlights the intersection between telecommunications infrastructure and fraud operations, particularly those with potential foreign origins. The substantial fine reflects the scale of consumer impact from the alleged violations.

Massachusetts Emergency Communications Hit by Cyberattack

An emergency communications system serving several small towns in northern Massachusetts was disrupted by a cyberattack. The incident affected the ability of these communities to send emergency alerts to residents, though specific details about the attack method and attribution remain undisclosed.

Attacks on emergency communications infrastructure represent a critical threat to public safety, particularly in smaller communities that may have limited cybersecurity resources and backup systems.

Unit 42 Identifies AI Security Risks in Amazon Bedrock

Palo Alto Networks Unit 42 researchers published findings on security risks in multi-agent AI systems running on Amazon Bedrock, identifying new attack surfaces and prompt injection vulnerabilities. The research highlights emerging security challenges as organizations deploy increasingly complex AI applications.

The findings demonstrate that multi-agent AI systems introduce novel attack vectors that traditional security controls may not adequately address. Prompt injection risks in these environments could potentially allow attackers to manipulate AI behavior and access sensitive data.

Sources

  • https://securityaffairs.com/190333/security/european-commission-breach-exposed-data-of-30-eu-entities-cert-eu-says.html
  • https://securityaffairs.com/190330/hacking/north-korea-linked-hackers-drain-285m-from-drift-in-sophisticated-attack.html
  • https://securityaffairs.com/190310/cyber-crime/crystalx-rat-new-maas-malware-combines-spyware-stealer-and-remote-access.html
  • https://therecord.media/fcc-proposes-5-million-fine-robocall
  • https://therecord.media/trueconf-cyberattack-cisa-hackers
  • https://therecord.media/european-commission-cyberattack-teampcp
  • https://therecord.media/massachusetts-emergency-alert-cyberattack
  • https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/

Originally reported by Security Affairs, The Record, Palo Alto Unit 42

Tags

#nation-state#apt#teamtcp#north-korea#cisa-kev#european-commission#cryptocurrency#ai-security

Tracked Companies

🇦🇪Telegram
🇺🇸Amazon

Related Intelligence

  • CISA Adds Google Dawn CVE to KEV as North Korean APT UNC1069 Claims Axios Supply Chain Attack

    criticalApr 2, 2026
  • Nation-State Intelligence Roundup: Russian Disinformation Targets Baltics, Critical PTC Vulnerability Emerges

    criticalMar 28, 2026
  • Nation-State Roundup: CISA KEV Updates, North Korean IT Infiltration, and Russian Hybrid Warfare Escalation

    criticalFeb 21, 2026

Related Knowledge

  • Threat Intelligence Deep Training

    reference
  • MITRE ATT&CK / D3FEND Deep Reference

    reference
  • NERF Training: Emerging Threats Deep Dive (2025-2026)

    reference

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Supply Chain Security Under Fire: From Claude Code Leaks to iOS Patch Precedents

Next Article

Meta Suspends Mercor Partnership Following Data Breach Threatening AI Training Secrets→