Last Updated On

DDAAIILLYY--22002266--00443300
CCrriittiiccaall
AAccttiivvee  EExxppllooiittaattiioonn  CCoonnffiirrmmeedd

Water Plants, Windows Zero Days, and Developer Infrastructure Under Fire

Five vulnerabilities on the CISA Known Exploited Vulnerabilities catalog with confirmed active exploitation. A four-agency US government advisory documenting Iranian interference with water infrastructure control systems. A supply chain attack on four official SAP developer packages stealing cloud credentials from CI pipelines. A Windows zero-day linked to APT28 targeting EU and Ukrainian governments. A signed software tool disabling antivirus at scale across 23,500 systems including Fortune 500 and healthcare networks. And 88 percent of GitHub Enterprise Server deployments unpatched against a critical RCE disclosed in March.

9.8

CVSS Score

12

IOC Count

18

Source Count

85

Confidence Score

CVEs

CVE-2026-34197, CVE-2024-32114, CVE-2026-34040, CVE-2026-32202, CVE-2026-21510, CVE-2026-21513, CVE-2026-5281, CVE-2026-34621, CVE-2026-3055, CVE-2024-1708, CVE-2024-1709, CVE-2026-21643, CVE-2026-41940, CVE-2026-3854, CVE-2026-3965, CVE-2026-4047

Actors

APT28 (Forest Blizzard / Fancy Bear / UAC-0001), Storm-1175 (Medusa ransomware affiliate), Iran-affiliated APT actors, Volt Typhoon, Flax Typhoon, China-based cybercrime syndicates, TeamPCP

Sectors

Water and Wastewater Systems, Energy, Critical Infrastructure, Government and Municipal Services, Banking and Financial Services, Healthcare, Utilities, Education, Software Development and DevOps, Web Hosting and ISPs

Regions

North America, Europe, Middle East (GCC), Asia-Pacific, Ukraine

Chapter 01 - Executive Overview

Today's brief is Critical severity. Nine distinct security incidents are documented within the reporting window. Two carry CISA-mandated federal patching deadlines. One is backed by a four-agency US government joint advisory confirming active interference with physical infrastructure at water and wastewater facilities. A supply chain compromise targeting enterprise developer tooling is actively harvesting cloud credentials and CI and CD secrets. A digitally signed adware tool has disabled endpoint defenses at scale across more than 23,500 systems in a single day, including in Fortune 500 enterprises, utilities, government bodies, and healthcare providers.

The dominant threat pattern today is exploitation of trusted and internet-facing management interfaces. ActiveMQ's Jolokia bridge, Docker's remote API, cPanel and WHM's management panel, ConnectWise ScreenConnect's remote support interface, and Citrix NetScaler's ADC and Gateway are all being actively targeted. This is not coincidental. Attackers consistently prioritize the same category of target: systems that are internet-reachable, managed by administrators rather than end users, and often deprioritized in patch cycles because they are treated as infrastructure rather than applications.

A secondary pattern is the escalating targeting of developer infrastructure. The SAP npm supply chain compromise and the GitHub Enterprise Server remote code execution vulnerability both target the environments where software is built and deployed, not the software itself. Credential theft from CI and CD pipelines provides direct access to cloud environments, repositories, and production systems that would otherwise require multiple escalation steps to reach.

State-sponsored actors are active on multiple vectors in this window. APT28 is linked to ongoing Windows Shell exploitation targeting Ukraine and EU governments. Iranian-affiliated actors are confirmed to be manipulating PLC configurations and sensor readings at US water facilities. Volt Typhoon and Flax Typhoon are documented in a CISA and NCSC-UK joint advisory as relying on covert botnet infrastructure to mask their operations. China-nexus actors broadly are described as having shifted away from self-operated infrastructure toward professionally maintained networks of compromised devices.

ActiveMQ CVE-2026-34197: Messaging Backbone Under Active Exploitation and Past KEV Deadline

A critical code injection flaw in Apache ActiveMQ Classic (CVE-2026-34197, CVSS 8.8) is under confirmed active exploitation and was added to the CISA KEV catalog on April 13, 2026 with a federal patch deadline of April 30, 2026. The affected component is the Jolokia JMX-HTTP management bridge, which is frequently exposed to the internet with default credentials or no authentication in certain version ranges. On versions 6.0.0 through 6.1.1, the related CVE-2024-32114 can leave the Jolokia API fully unauthenticated, effectively converting CVE-2026-34197 into an unauthenticated remote code execution flaw. Vendor telemetry from SAFE Security and Fortinet documented active scanning and exploitation attempts peaking around April 14, 2026. Because ActiveMQ underpins banking, healthcare, government, and enterprise middleware integration stacks, successful exploitation provides direct access to message flows and adjacent application tiers. The federal patch deadline has now passed. Organizations that have not patched or isolated exposed instances should treat this as an emergency action item today.

Executive decision: Escalate. Treat ActiveMQ instances as a critical-path dependency. Require emergency change windows until all instances are identified, patched to ActiveMQ Classic 5.19.4 or 6.2.3 or later, or isolated. Confirm Jolokia and web console exposure is closed and document remediation for audit.

Iranian-Backed OT Intrusions into Water and Municipal Infrastructure

A joint advisory from the EPA, FBI, CISA, and NSA warns that Iranian-affiliated actors are actively exploiting internet-connected operational technology, including Rockwell and Allen-Bradley PLCs at US drinking water and wastewater facilities and other critical infrastructure sectors. Documented activity includes malicious interaction with PLC project files, manipulation of process data on HMI and SCADA displays, and wiping or misconfiguring devices to disrupt safe operation of physical processes. The advisory notes that insecure remote access, misconfigured OT systems, and limited OT network visibility are the key enabling conditions for these intrusions. Financial loss and operational disruption have been reported. The initial CISA advisory on this campaign was published March 20, 2026, with the EPA-led water-sector-specific advisory following on April 6 to 7, 2026.

Executive decision: Escalate. Ensure OT and water and utility operations risk is on today's agenda for risk, operations, and safety leadership. Mandate validation of segmentation, remote access controls, and incident reporting readiness.

Windows Shell KEV Zero-Day and Lateral Movement Risk (CVE-2026-32202)

CISA added CVE-2026-32202 to the KEV catalog on April 28, 2026, following Microsoft's advisory update acknowledging real-world exploitation. The flaw is a protection mechanism failure in Windows Shell tied to an incomplete fix for CVE-2026-21510, which was exploited alongside CVE-2026-21513 in prior campaigns. Akamai researchers linked the current exploitation to APT28, also known as Forest Blizzard, documenting attacks against Ukrainian and EU government targets active since December 2025. The vulnerability enables NTLM hash theft when a user executes an attacker-supplied file, enabling pass-the-hash lateral movement across domain environments. Storm-1175, a China-nexus actor attributed by Microsoft, is separately using CVE-2024-1708 and CVE-2024-1709 in ConnectWise ScreenConnect to deliver Medusa ransomware. Federal patching deadline for CVE-2026-32202 is May 12, 2026.

Executive decision: Escalate. Treat this as a credential-theft and lateral-movement enabler across core Windows estates. Require confirmation that KEV-mandated patches are deployed and that exposure windows are documented for audit.

Signed Software Used for AV Killing and Mass Access Enablement

Researchers identified a digitally signed adware tool that gained SYSTEM-level privileges and disabled antivirus protections across more than 23,500 endpoints in 124 countries in a single day. At least 324 of these endpoints were inside high-value networks including Fortune 500 companies, utilities, government bodies, and healthcare providers. While current payloads are limited to adware and AV-killing scripts, the same distribution and update mechanism could deliver ransomware, credential theft tools, or persistent remote access agents at scale with minimal additional effort from the threat operator. The signed status of the tool means it bypasses many software trust controls.

Executive decision: Monitor with urgency. Require an immediate inventory for the specific signed software, confirm AV and EDR health at scale, and track this access vector on the risk register as a precursor condition for future high-impact intrusions.

cPanel and WHM CVE-2026-41940: Mass Hosting Platform at Critical Risk

An unauthenticated authentication bypass in cPanel and WHM (CVE-2026-41940, CVSS 9.8) was issued an emergency patch on April 29, 2026. Namecheap, one of the largest global hosting providers, pre-emptively blocked management ports 2083 and 2087 for all customers until patching was complete. No exploitation has been publicly confirmed in the wild at time of publication. However, a CVSS 9.8 authentication bypass with full public disclosure and a broad attack surface across shared and VPS hosting globally should be treated as a high-urgency patching item. Exploitation would grant an attacker full control over hosted websites, email systems, and databases without any prior authentication.

Executive decision: Escalate. Validate that the emergency update has been applied via the upcp script or via your hosting provider and confirm management port exposure is closed.

GitHub Enterprise Server CVE-2026-3854: Critical RCE Exposing Private Repositories

Wiz Research disclosed CVE-2026-3854 on March 4, 2026, revealing a critical remote code execution vulnerability in GitHub's git push handling. A single malicious git push grants read and write access to all private repositories on the affected node. GitHub.com was patched within hours of disclosure. However, approximately 88 percent of reachable GitHub Enterprise Server instances remain unpatched as of April 29, 2026, per Wiz Research telemetry. On GitHub.com, the flaw exposed cross-tenant repository access on shared nodes. No exploitation prior to the responsible disclosure was confirmed by GitHub's telemetry. Wiz described this as one of the most severe software-as-a-service vulnerabilities ever found.

Executive decision: Escalate. Engineering and security leadership must immediately audit whether on-premise GitHub Enterprise Server instances are running patched versions across the 3.14 through 3.20 release lines and enforce emergency upgrades if not.

SAP npm Supply Chain Compromise: Developer Credential Harvesting at Scale

Four official SAP npm packages used in the SAP Cloud Application Programming Model and Cloud MTA frameworks were found to contain a malicious information-stealer payload. Attribution with medium confidence points to the TeamPCP threat actor, based on code and TTP overlap with prior attacks on Bitwarden, Checkmarx, and Trivy. The stealer captures npm tokens, GitHub tokens, SSH keys, cloud API credentials for AWS, Azure, and GCP, Kubernetes secrets, and CI and CD pipeline variables. On CI and CD runners, the payload reads directly from process memory to bypass log masking. Stolen credentials are exfiltrated to GitHub repositories created under the victim's account. The malware self-propagates by using stolen publishing credentials to inject the same payload into other packages the developer has access to publish.

Executive decision: Escalate. Direct immediate audit of any npm dependency trees referencing the four affected package versions, rotate all developer and CI and CD credentials exposed in the last 30 days, and halt deployment pipelines until integrity is confirmed.

Qinglong Task Scheduler CVE-2026-3965 and CVE-2026-4047: Cryptominer Deployed via Auth Bypass

Two chained authentication bypass vulnerabilities in the Qinglong open-source task scheduler have been actively exploited since February 7, 2026 to deploy a cryptominer. CVE-2026-3965 exploits a misconfigured rewrite rule. CVE-2026-4047 exploits a case sensitivity mismatch in the authentication middleware. The deployed cryptominer is downloaded from file.551911.xyz and stored as .fullgc, deliberately mimicking a legitimate JVM garbage collection process. The maintainer's first patch (PR 2924) was confirmed insufficient by Snyk researchers. Only the post-PR 2941 build correctly addresses the authentication bypass chain.

Executive decision: Escalate for any development team running a self-hosted Qinglong instance. Verify the version is post-PR 2941, audit for the .fullgc process indicator, and investigate any period of unexplained high CPU utilization.

Covert Botnets and Chinese Syndicate Infrastructure Shift

A joint CISA and NCSC-UK advisory, analyzed by Barracuda, documents a strategic shift by China-based cybercrime syndicates and associated actors including Volt Typhoon and Flax Typhoon. These groups are increasingly operating through large covert botnet infrastructures built from compromised corporate and consumer devices rather than self-registered infrastructure. This makes attribution harder, enables more persistent and stealthy operations, and means malicious traffic may originate from otherwise reputable IP ranges hosting compromised devices.

Executive decision: Monitor. Ensure threat models and tabletop exercises for China-nexus activity explicitly account for covert botnet use. Validate that ISP, DNS, and proxy telemetry are sufficient to detect long-lived, low-and-slow command and control traffic.

Chapter 02 - Threat & Exposure Analysis

Today's threat activity is anchored around five converging patterns: exploited server-side management interfaces (ActiveMQ, Citrix NetScaler, Docker Engine, cPanel), credential theft and pass-the-hash weaknesses in Windows, state-backed OT targeting bypassing traditional IT-only controls, supply chain infiltration of developer tooling, and covert botnet infrastructure enabling stealthy persistent access for China-nexus actors. Across incidents, the common enabling conditions are insecure remote management interfaces, incomplete patching of known flaws, insufficient monitoring of signed or trusted software channels, and developer environments lacking the same security controls applied to production systems.

ActiveMQ Jolokia Code Injection: CVE-2026-34197 Exploiting the Management Bridge

CVE-2026-34197 is an improper input validation flaw in Apache ActiveMQ Classic's Jolokia JMX-HTTP management bridge. Attackers send specially crafted requests to exposed Jolokia endpoints, triggering code injection and arbitrary command execution on the underlying broker. In many deployments, default admin credentials of admin and admin remain unchanged. On versions 6.0.0 through 6.1.1, CVE-2024-32114 leaves the Jolokia API unauthenticated, effectively providing unauthenticated remote code execution. CISA added CVE-2026-34197 to KEV on April 13, 2026, with vendor telemetry from SAFE Security and Fortinet confirming active scanning and exploitation peaking around April 14. Fixed versions are ActiveMQ Classic 5.19.4 and 6.2.3.

Iranian OT Operations: Targeting PLCs and HMIs in Water and Energy

The joint EPA, FBI, CISA, and NSA advisory describes Iranian-affiliated exploitation of internet-facing PLCs and other OT devices across US water, wastewater, energy, and municipal critical infrastructure. Documented attack activities include malicious interactions with PLC project files, manipulation of process data on HMI and SCADA displays, configuration wiping, and disruption of physical process operations with confirmed financial and safety impacts. The advisory identifies insecure remote access, misconfigured OT systems, and limited OT network visibility as the primary enabling conditions. Organizations are directed to remove OT devices from direct internet exposure, enforce MFA on all remaining remote access pathways, and review configurations for unexpected changes.

Windows Shell CVE-2026-32202: NTLM Hash Leak and APT28 Tradecraft

CVE-2026-32202 is a protection mechanism failure in Windows Shell resulting from an incomplete fix for CVE-2026-21510. When a user executes a crafted file delivered via email, download, or shared drive, the vulnerability leaks the user's NTLM hash to an attacker-controlled server. The attacker then uses that hash to authenticate as the compromised user across the network without knowing the underlying password, enabling lateral movement at low complexity. Akamai researchers linked CVE-2026-32202 to APT28 (Forest Blizzard), building on prior campaign telemetry showing the group exploiting CVE-2026-21510 and CVE-2026-21513 against Ukrainian and EU targets since December 2025. Microsoft's Akamai-corroborated advisory update on April 28, 2026 acknowledged active exploitation and triggered the CISA KEV addition. The federal patch deadline is May 12, 2026.

ConnectWise ScreenConnect: CVE-2024-1708 and CVE-2024-1709 Chained for Medusa Ransomware Delivery

CVE-2024-1708 (CVSS 8.4, path traversal) is being chained with CVE-2024-1709 (CVSS 10.0, authentication bypass) by Storm-1175, a China-nexus actor attributed by Microsoft. CVE-2024-1709 enables unauthenticated access to the ScreenConnect management interface. CVE-2024-1708 then enables path traversal for remote code execution or direct data access. Post-exploitation, Storm-1175 deploys Medusa ransomware. Both vulnerabilities have been in KEV since February 2024. Any unpatched ScreenConnect instance deployed in healthcare, financial services, or managed service provider environments remains fully exposed to this ransomware delivery chain.

Signed Adware as a System-Level AV Killer and Access Platform

A digitally signed adware tool, once installed, runs with SYSTEM privileges and disables endpoint antivirus and security agents. More than 23,500 compromised endpoints in 124 countries contacted the operator's infrastructure in a single day. At least 324 endpoints were inside high-value networks. The operator controls a SYSTEM-level update channel capable of pushing arbitrary payloads. Current use is limited to AV-killing scripts, but the same mechanism could deliver ransomware or credential stealers at scale. The signed digital certificate status means the tool bypasses software trust and application control policies that rely on signature validation.

Covert Botnet Expansion by China-Nexus Actors

Barracuda's analysis of the joint CISA and NCSC-UK advisory describes a documented trend in which China-based syndicates and associated actors such as Volt Typhoon and Flax Typhoon increasingly rely on covert botnet infrastructures built from compromised devices. Rather than registering and managing their own infrastructure, these groups rent or maintain professionally run networks of infected corporate and consumer systems to proxy attacks and obscure their true origin. This increases operational resilience and stealth, complicates attribution, and means defenders may observe malicious traffic from reputable IP ranges hosting compromised third-party devices.

Citrix NetScaler, Docker Engine, FortiClient, and Adobe Acrobat: Additional Exploited and High-Risk Perimeter Vulnerabilities

CVE-2026-3055 in Citrix NetScaler ADC and Gateway (CVSS 9.3) is confirmed under active exploitation. Researchers warn that multiple flaws may be chained in an ongoing campaign with potential to rival the 2023 CitrixBleed wave in scope. CVE-2026-34040 in Docker Engine (CVSS 8.8) allows bypass of authorization plugins via an oversized HTTP request body, enabling creation of privileged containers that mount the host filesystem and expose cloud credentials, kubeconfig files, and SSH keys. Researchers demonstrated that AI coding agents operating inside Docker sandboxes can be triggered via prompt injection in GitHub repositories to autonomously construct and execute the exploit. CVE-2026-21643 in FortiClient EMS (CVSS 9.1) is a SQL injection flaw appearing in recent advisories and recaps as actively exploited or critical for organizations with large Windows footprints. CVE-2026-34621 in Adobe Acrobat Reader (CVSS 8.6) appears in the same recap sources as a zero-day requiring prioritized patching for organizations with large document-processing environments.

cPanel and WHM CVE-2026-41940: Pre-Authentication Bypass at Hosting Scale

CVE-2026-41940 (CVSS 9.8) allows access to the cPanel and WHM hosting control panel without any prior authentication. No PoC or active exploitation has been publicly confirmed at time of publication. However, the severity score, emergency patch response, and Namecheap's decision to proactively block management ports 2083 and 2087 across all customer environments indicate a trivially exploitable flaw with a broad global attack surface. Successful exploitation would allow a threat actor to plant web shells, redirect traffic, steal database credentials, and use the hosting platform as phishing infrastructure. Servers on unsupported cPanel versions cannot apply the patch without a full version upgrade.

GitHub Enterprise Server CVE-2026-3854: Server-Side Injection in git push Handling

The vulnerability lies in how GitHub processes user-supplied options during git push operations. User-supplied values are incorporated into internal server metadata without sufficient sanitization. By chaining multiple injected values, an attacker with push access to any repository can bypass sandboxing protections and achieve arbitrary code execution on the push-handling server. On GitHub.com, this exposed cross-tenant repository access on shared nodes. With 88 percent of internet-accessible GitHub Enterprise Server instances still unpatched as of April 29, 2026, the attack surface remains extremely broad for on-premise deployments.

SAP npm Supply Chain: TeamPCP Credential Harvesting Campaign

The attacker introduced a malicious preinstall script into four SAP npm packages. Upon npm install, the script executes setup.mjs, downloads the Bun JavaScript runtime from GitHub, and runs a heavily obfuscated execution.js information stealer. On CI and CD runners, the payload reads from /proc/<pid>/maps and /proc/<pid>/mem for the Runner.Worker process, extracting secrets matching the pattern "key": with isSecret set to true directly from process memory. This bypasses log masking applied by the CI platform. Stolen credentials are exfiltrated to GitHub repositories created under the victim's account and identified by the repository description "A Mini Shai-Hulud has Appeared." The malware uses GitHub commit search for messages matching OhNoWhatsGoingOnWithGitHub followed by base64-encoded data to retrieve tokens and expand access. Using stolen publishing credentials, it injects itself into other packages the developer has rights to publish. An exposed CircleCI job producing an npm token is the suspected initial compromise vector, though SAP had not confirmed this at time of publication.

Qinglong Auth Bypass: Chained Vulnerabilities Enabling Cryptominer Deployment

CVE-2026-3965 exploits a misconfigured rewrite rule that maps /open/* requests to /api/*, exposing authenticated admin endpoints through an unauthenticated path. CVE-2026-4047 exploits a case sensitivity mismatch: the authentication middleware treats paths case-sensitively as /api/, while Express.js routing matches them case-insensitively, allowing requests such as /aPi/... to reach protected endpoints without authentication. Chained together, these two flaws enable unauthenticated remote code execution. The deployed cryptominer is downloaded from file.551911.xyz, stored at /ql/data/db/.fullgc, and executed in the background. The process name .fullgc deliberately mimics the legitimate Full GC JVM garbage collection process to evade detection. Separate binaries are hosted for Linux x86_64, ARM64, and macOS. Infections were first identified by users observing 85 to 100 percent sustained CPU utilization.

Cross-Incident Pattern: Developer Infrastructure as a High-Value and Under-Defended Target

The SAP npm supply chain attack, the Qinglong exploitation campaign, and the GitHub Enterprise Server RCE all share a common attack surface: the environments developers use to build, test, and deploy software. These systems frequently operate with elevated cloud permissions, broad repository access, and minimal endpoint security controls compared to production environments. An attacker who compromises developer infrastructure often acquires the credentials and access rights needed to reach production environments without needing to exploit them directly. This pattern warrants explicit representation in organizational threat models and dedicated security controls for CI and CD pipelines, developer workstations, and open-source dependency management.

Chapter 03 - Operational Response

Defender priority order for today: ActiveMQ CVE-2026-34197 RCE with CISA KEV deadline passed, Iranian OT intrusions against water and municipal infrastructure, Windows Shell CVE-2026-32202 NTLM hash leak with May 12 federal deadline, cPanel CVE-2026-41940 unauthenticated bypass at hosting scale, GitHub Enterprise Server CVE-2026-3854 RCE with 88 percent unpatched exposure, SAP npm supply chain compromise and developer credential exfiltration, Citrix NetScaler CVE-2026-3055 and other high-severity perimeter CVEs, Qinglong cryptominer deployment via auth bypass, signed adware AV-killer campaign in high-value networks, covert botnet infrastructure used by China-nexus actors.

ActiveMQ CVE-2026-34197: Immediate Response and Containment

Do this now, within hours. Identify all Apache ActiveMQ Classic instances on-premises and in cloud environments and determine whether the Jolokia management interface is exposed to the internet or to untrusted networks, with or without authentication. Temporarily restrict external access to ActiveMQ web consoles and Jolokia endpoints at firewalls and reverse proxies, requiring VPN or dedicated admin jump-hosts where feasible. Apply vendor patches to bring exposed instances to 5.19.4 or 6.2.3 or later.

Do this within 24 hours. Review HTTP and application logs for suspicious requests to Jolokia endpoints, particularly from foreign hosting providers and on ports associated with ActiveMQ management, correlating with any unusual broker or JVM behavior. Change default or weak ActiveMQ admin credentials, disable unnecessary accounts, and enforce least-privilege access for all management interfaces. Record which systems were affected, patch dates, and verification steps to satisfy CISA KEV remediation documentation requirements.

Iranian OT Campaign: Water, Wastewater, and Municipal Systems

Do this now. For PLCs and other OT devices referenced in the advisory, remove direct internet connectivity where possible, fronting access with secure gateways and appropriately configured firewalls. Review and lock down remote access pathways into water, wastewater, energy, and municipal control networks, disabling unused remote desktop, VPN, or vendor access accounts and enforcing MFA where remote access is genuinely required. Direct OT and engineering teams to check for unexpected configuration changes, wiped project files, or anomalous HMI readings on Rockwell and Allen-Bradley and similar assets.

Do this within 24 hours. Use the advisory's TTPs and indicators to review OT and IT logs linked to water and energy operations, focusing on anomalous commands to PLCs and suspicious network activity targeting OT ports. Convene OT, safety, operations, and cyber teams to ensure unified incident response procedures and communication paths including escalation to sector regulators. Engage EPA water cybersecurity programs and CISA reporting channels where operational impact is detected or suspected.

Windows Shell CVE-2026-32202: Hash Theft and Lateral Movement

Do this now. Confirm deployment of April 2026 updates addressing CVE-2026-32202 across all Windows fleets, prioritizing internet-facing systems, domain controllers, and jump-hosts. Restrict execution of untrusted files from email, downloads, and shared drives using application control and hardening policies. Focus on systems used by administrators and privileged roles and ensure they are patched and monitored for abnormal authentication attempts and hash-related anomalies.

Do this within 24 hours. Analyze authentication logs for lateral movement patterns consistent with NTLM hash abuse, particularly logons from unusual hosts or sequences following file execution events. If your organization operates in sectors or geographies previously targeted by APT28, validate threat hunting coverage for the broader exploit chains involving CVE-2026-21510 and CVE-2026-21513. Integrate learnings from this vulnerability into Windows hardening standards, including NTLM usage reduction and improved monitoring for execution of downloaded content.

cPanel and WHM CVE-2026-41940: Emergency Patch Verification

Do this now. Confirm that the emergency cPanel update has been applied via /scripts/upcp --force on all managed cPanel and WHM servers. Verify with your hosting provider that the update has been applied if you do not manage your own server. Confirm that management ports 2083 and 2087 are not exposed to the open internet.

Do this within 24 hours. Review access logs on cPanel and WHM instances for any anomalous or unauthorized login attempts or configuration changes from the period before the patch was applied. Assess whether servers running unsupported cPanel versions can be upgraded as a matter of urgency, and if not, pursue compensating controls including firewall restrictions on management port access.

GitHub Enterprise Server CVE-2026-3854: Emergency Upgrade Audit

Do this now. Audit all on-premise GitHub Enterprise Server instances and confirm whether each is running a patched version. Patched builds are available across the 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4, and 3.20.0 release lines. Treat any unpatched instance as a high-urgency emergency upgrade.

Do this within 24 hours. Review push event logs for any anomalous or unexpected git push activity since the March 4, 2026 disclosure date. Audit contributor permissions across repositories on affected GHES instances and apply least-privilege access to reduce the prerequisite access required for exploitation. Brief development leadership on the scope and urgency of the risk.

SAP npm Supply Chain: Credential Rotation and Pipeline Integrity

Do this now. Audit all npm dependency trees for the four affected SAP package versions. Halt deployment pipelines referencing those versions until integrity is confirmed. Rotate all npm tokens, GitHub tokens, AWS, Azure, and GCP credentials, and SSH keys accessible from any developer machine or CI and CD runner that installed the affected packages in the last 30 days.

Do this within 24 hours. Scan CI and CD runner environments for the presence of the Bun runtime, execution.js, or GitHub repositories matching the description "A Mini Shai-Hulud has Appeared." Review GitHub commit history for messages matching the OhNoWhatsGoingOnWithGitHub exfiltration pattern. Audit which other packages were published by affected developer accounts in the window following potential compromise, and coordinate with npm security for package integrity verification.

Citrix NetScaler and Other Perimeter CVEs: Preventing the Next CitrixBleed

Do this now. Apply Citrix guidance to upgrade affected NetScaler ADC and Gateway versions addressing CVE-2026-3055, prioritizing internet-facing appliances linked to high-value applications. Ensure NetScaler management interfaces are not exposed to the internet and are reachable only from dedicated admin networks.

Do this within 24 hours. Run targeted scans for exposed management consoles and APIs associated with all vulnerabilities covered in this brief: ActiveMQ, Docker Engine, Citrix, cPanel, and GitHub Enterprise Server. Validate that your patch management program tracks CISA KEV due dates with clear accountability and exception management processes. Assess FortiClient EMS and Adobe Acrobat Reader deployments against CVE-2026-21643 and CVE-2026-34621 respectively and prioritize patching based on internet exposure and user population.

Signed Adware AV-Killer: Enterprise Hygiene and Control Validation

Do this now. Search for the specific signed adware package described in reporting across all managed endpoints and remove it where found. Verify AV and EDR health at scale across the fleet, focusing on organizations in education, utilities, government, healthcare, and large enterprise environments matching the observed victim profile.

Do this within 24 hours. Review and tighten policies for software permitted to run with SYSTEM privileges and for any third-party distribution mechanisms in your environment. Develop a contingency playbook for rapid response if the same channel begins delivering ransomware or data-stealing payloads, including backup validation and incident response engagement readiness.

Covert Botnets and China-Nexus Infrastructure: Threat Model and Detection Updates

Do this within 24 hours. Ensure threat models and tabletop exercises for China-nexus activity explicitly assume use of third-party covert botnet infrastructure. Validate that ISP, DNS, and proxy telemetry are sufficient to detect long-lived, low-and-slow command and control traffic. Review whether current network detection rules are calibrated to flag traffic from compromised device ranges rather than relying solely on known bad IP reputation lists.

Apache ActiveMQ CVE-2026-34197

2026-04-13: CISA adds CVE-2026-34197 to the Known Exploited Vulnerabilities catalog, citing confirmed active exploitation and setting an April 30, 2026 patch deadline for federal agencies.

2026-04-15 to 2026-04-20: Vendor telemetry from SAFE Security and Fortinet records active scanning and exploitation attempts against exposed Jolokia endpoints, with activity peaking around April 14.

2026-04-30: The KEV federal patch deadline passes. Organizations that have not completed patching or exposure reduction are now non-compliant with CISA Binding Operational Directive 22-01.

Iranian Affiliated OT Intrusions into Water and Critical Infrastructure

2026-03-20: CISA and partners publish a joint advisory on Iranian affiliated actors exploiting internet facing programmable logic controllers across US critical infrastructure sectors.

2026-04-06 to 2026-04-07: EPA, FBI, CISA, and NSA issue a joint cybersecurity advisory directed specifically at water and wastewater system operators. The advisory documents active exploitation causing configuration wiping, sensor data manipulation, and confirmed operational and financial disruption.

Windows Shell CVE-2026-32202 and the APT28 Exploit Chain

2025-12 (approximate, not confirmed in a primary advisory): Akamai campaign telemetry places the start of APT28 exploitation of CVE-2026-21510 and CVE-2026-21513 against Ukrainian and EU government targets at approximately December 2025.

2026-04-08: Microsoft releases patches for CVE-2026-32202 as part of April 2026 Patch Tuesday.

2026-04-28: Microsoft updates its advisory for CVE-2026-32202, acknowledging confirmed active exploitation. CISA adds CVE-2026-32202 to KEV with a May 12, 2026 federal patch deadline. Akamai publishes research connecting CVE-2026-32202 to the incomplete fix for CVE-2026-21510 and to documented APT28 tradecraft.

ConnectWise ScreenConnect CVE-2024-1708 and CVE-2024-1709 Ransomware Chain

2024-02 (prior window): CISA adds CVE-2024-1709 to KEV following mass exploitation of ConnectWise ScreenConnect. Patches are available but deployment remains incomplete across many managed service environments.

2026-04-28: CISA adds CVE-2024-1708 to KEV, documenting active chaining of both CVEs by Storm-1175 in campaigns delivering Medusa ransomware.

Signed Software AV Killer Campaign

2026-04-14: BleepingComputer reports that a digitally signed adware tool is actively disabling antivirus protections on more than 23,500 endpoints in 124 countries. At least 324 endpoints are confirmed inside high value networks including Fortune 500 companies, utilities, government bodies, and healthcare providers.

Covert Botnet Expansion by China Nexus Actors

2026-04-28 to 2026-04-29: CISA and NCSC-UK publish a joint advisory on covert botnet expansion. Analysis by Barracuda published on April 29 documents the specific roles of Volt Typhoon, Flax Typhoon, and China based cybercrime syndicates in operating and maintaining these networks.

cPanel and WHM CVE-2026-41940

2026-04-29: cPanel issues an emergency patch for CVE-2026-41940, a CVSS 9.8 unauthenticated authentication bypass. Namecheap proactively blocks management ports 2083 and 2087 for all customers until patching is complete.

GitHub Enterprise Server CVE-2026-3854

2026-03-04: Wiz Research discloses CVE-2026-3854 to GitHub under responsible disclosure. GitHub.com is patched within hours. Patches for GitHub Enterprise Server are released across all supported version lines.

2026-04-29: Wiz Research publishes full technical disclosure. Telemetry confirms approximately 88 percent of internet accessible GitHub Enterprise Server instances remain unpatched.

SAP npm Supply Chain Compromise

2026-04-29: Aikido Security and Socket publish findings documenting four trojanized official SAP npm packages containing a credential harvesting payload. Attribution with medium confidence to the TeamPCP threat actor is based on structural and behavioral overlap with prior attacks against Bitwarden, Checkmarx, and Trivy npm packages.

Qinglong Task Scheduler CVE-2026-3965 and CVE-2026-4047

2026-02-07: Active exploitation of the Qinglong authentication bypass chain is first confirmed by Snyk researchers after users report unexplained sustained high CPU utilization on developer servers.

2026-04-29: Snyk publishes full public disclosure of CVE-2026-3965 and CVE-2026-4047. The maintainer's first patch via PR 2924 is confirmed insufficient. The post-PR 2941 build is confirmed as the correct remediation.

Chapter 04 - Detection Intelligence

Apache ActiveMQ CVE-2026-34197: Code Injection via the Jolokia JMX HTTP Bridge

CVE-2026-34197 is an improper input validation flaw in Apache ActiveMQ Classic's Jolokia JMX HTTP management bridge. Jolokia is a REST-like HTTP interface that exposes Java management operations, including the ability to invoke MBeans and execute arbitrary JVM operations. In the default configuration, the Jolokia endpoint is accessible via the ActiveMQ web console on port 8161. An attacker sends a specially crafted POST request to the Jolokia API with malicious input that exploits the validation gap, triggering code injection and arbitrary command execution on the underlying broker host at the privilege level of the service account running ActiveMQ.

Authentication conditions affecting exploitability: In many production deployments, the default credential pair of admin and admin remains unchanged on the Jolokia interface. On versions 6.0.0 through 6.1.1, the companion flaw CVE-2024-32114 can leave the Jolokia API fully unauthenticated, converting CVE-2026-34197 into an unauthenticated remote code execution pathway for that specific version range. Both conditions were confirmed present in actively exploited deployments per vendor telemetry from SAFE Security and Fortinet.

Post-exploitation impact: Successful exploitation grants OS-level command execution on the broker host. Because ActiveMQ typically serves as a middleware integration layer, a compromised broker has access to message flows, adjacent application servers, database connection strings, and cloud connected integration endpoints. Lateral movement from a compromised broker into database tiers and application servers is a well-documented enterprise middleware post-exploitation path. Affected versions are Apache ActiveMQ Classic prior to 5.19.4 and prior to 6.2.3. Both are now patched.

Docker Engine CVE-2026-34040: Authorization Plugin Bypass via Oversized HTTP Request Body

CVE-2026-34040 (CVSS 8.8) is an authorization control bypass in Docker Engine that affects deployments using third-party authorization plugins to enforce API access control policies. The Docker daemon is designed to forward every incoming API request to configured authorization plugins before acting on it. The flaw arises from how the daemon handles request bodies that exceed a certain size threshold: when the body is too large, the daemon strips it from the forwarded request before sending it to the authorization plugin. The plugin evaluates a bodyless request and finds no policy violation. The daemon then proceeds to execute the original request including its full content.

An attacker exploits this by crafting an API request with a malicious body padded to exceed the threshold. The demonstrated impact is the creation of a privileged container that mounts the host filesystem, exposing cloud credential files, Kubernetes configuration files, and SSH private keys stored on the host. Researchers additionally documented that AI coding agents operating inside Docker sandboxes can be directed via prompt injection payloads embedded in GitHub repositories to autonomously construct and submit the padded request, converting a legitimate developer debugging workflow into an exploitation vector. Fixed in Docker Engine 29.3.1.

Windows Shell CVE-2026-32202: Protection Mechanism Failure Enabling NTLM Hash Capture

CVE-2026-32202 is a protection mechanism failure in Windows Shell resulting from an incomplete fix for CVE-2026-21510. When a victim user executes or interacts with a crafted file delivered via email, web download, or shared network drive, Windows Shell initiates an NTLM authentication exchange to an attacker-controlled remote server. The victim's NTLM credential hash is transmitted in this exchange and captured by the attacker. The attacker then uses the captured hash in a pass the hash attack, authenticating to other systems on the network as the victim user without knowing the underlying plaintext password.

CERT-UA and Microsoft previously documented APT28, known as Forest Blizzard, exploiting CVE-2026-21510 and CVE-2026-21513 in campaigns against Ukrainian and EU government targets using malicious LNK files delivered via spearphishing email to trigger the same class of NTLM hash capture. Akamai researchers connected CVE-2026-32202 to this same tradecraft tradition, identifying it as the continuation of an incompletely patched exploit chain active since approximately December 2025. Attack complexity is low. No elevated privileges or special target configuration are required. The attacker only needs to deliver and have a user execute a crafted file.

Addressed in April 2026 Patch Tuesday. CISA KEV federal deadline: May 12, 2026.

ConnectWise ScreenConnect CVE-2024-1708 and CVE-2024-1709: Chained RCE for Medusa Ransomware Delivery

CVE-2024-1709 (CVSS 10.0) is an authentication bypass in ConnectWise ScreenConnect that allows an unauthenticated attacker to access the management interface by manipulating the application setup flow. Once authenticated, CVE-2024-1708 (CVSS 8.4) is a path traversal flaw enabling arbitrary file writes or code execution in the context of the ScreenConnect service account. These two vulnerabilities are routinely chained: CVE-2024-1709 provides unauthenticated initial access and CVE-2024-1708 provides code execution capability. Storm-1175, a China nexus actor attributed by Microsoft, is actively using this chain to deploy Medusa ransomware against healthcare, financial services, and managed service provider environments. Both CVEs were patched in February 2024. Any unpatched ScreenConnect deployment remains fully exploitable against a known weaponized ransomware delivery chain.

Citrix NetScaler ADC and Gateway CVE-2026-3055: Confirmed Exploitation with Scale Risk

CVE-2026-3055 (CVSS 9.3) is an insufficient input validation flaw in Citrix NetScaler ADC and Gateway that leads to memory over-read behavior. Researchers have confirmed active exploitation and warn that additional flaws may be chained with it in ongoing campaigns targeting large enterprise VPN and application delivery infrastructure. The scale of potential impact has been compared to the 2023 CitrixBleed exploitation wave, which enabled widespread compromise of major enterprises via session token extraction from vulnerable appliances. Citrix has released patched versions. CISA added CVE-2026-3055 to KEV with an aggressive remediation deadline.

Signed Adware Tool: System-Level AV Killing and Access Platform Enabling

A digitally signed adware tool was confirmed to have gained SYSTEM-level execution privileges and to have disabled endpoint antivirus and security tools across more than 23,500 endpoints in 124 countries in a single observed day. At least 324 of those endpoints were inside high-value networks including Fortune 500 companies, utilities, government bodies, and healthcare providers. The tool's digital signature allows it to bypass application control and software trust policies that rely on certificate validation. The operator controls a SYSTEM-level update channel that can push arbitrary payloads to all compromised endpoints. Current payloads are limited to adware and AV-killing scripts, but the same distribution mechanism could deliver ransomware, credential theft tools, or persistent remote access agents at scale with minimal additional development effort.

cPanel and WHM CVE-2026-41940: Pre-Authentication Bypass at Global Hosting Scale

CVE-2026-41940 (CVSS 9.8) is an unauthenticated authentication bypass in cPanel and WHM. No technical proof-of-concept details were publicly disclosed in the sources reviewed for this report, consistent with responsible coordinated disclosure timing. The CVSS 9.8 score reflects a network-accessible attack vector with no authentication prerequisite and no user interaction required, indicating a trivially exploitable condition. Namecheap's decision to proactively block management ports 2083 and 2087 across its entire customer base prior to patching underscores the severity assessment. Successful exploitation grants an attacker full control over the targeted hosting environment, including all hosted websites, email systems, databases, and configuration files. Servers running unsupported cPanel versions cannot receive the patch without a full version upgrade of the cPanel installation.

GitHub Enterprise Server CVE-2026-3854: Remote Code Execution via git push Injection

CVE-2026-3854 is a server-side injection vulnerability in how GitHub processes user-supplied options during git push operations. User-supplied values are incorporated into internal server metadata during push handling without sufficient sanitization. By chaining multiple injected values, an attacker with push access to any repository on the target instance can bypass sandboxing protections and achieve arbitrary code execution on the push-handling server. On GitHub.com, this flaw exposed cross-tenant repository access on shared infrastructure nodes, meaning exploitation could expose private repositories from multiple distinct organizations sharing the same compute node. Wiz Research described this as one of the most severe software-as-a-service vulnerabilities ever publicly documented.

The attack prerequisite is push access to any repository on the target instance. Given that many organizations maintain liberal contributor access policies or use shared CI and CD build agents with repository push access, the real-world prerequisite is moderate to low in many environments. GitHub.com was patched within six hours of the March 4, 2026 responsible disclosure. Patched GitHub Enterprise Server builds are available across the 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4, and 3.20.0 release lines. Approximately 88 percent of internet-accessible GitHub Enterprise Server instances remain unpatched as of April 29, 2026, per Wiz Research telemetry.

SAP npm Supply Chain: TeamPCP Credential Harvesting via Trojanized Developer Packages

The attacker, attributed with medium confidence to TeamPCP, introduced a malicious preinstall script into four official SAP npm packages used in the SAP Cloud Application Programming Model and Cloud MTA frameworks. Upon execution of npm install referencing any of the affected package versions, the preinstall script executes setup.mjs, which downloads the Bun JavaScript runtime binary from GitHub and then runs a heavily obfuscated file named execution.js. The execution.js payload is the primary credential harvesting component.

The stealer collects npm authentication tokens, GitHub personal access tokens, SSH private keys, AWS access keys and secrets, Azure credentials, GCP service account credentials, Kubernetes configuration files and secrets, and CI and CD pipeline environment variables. On CI and CD runner environments specifically, the payload performs direct process memory reading against the Runner.Worker process by accessing /proc/<pid>/maps to identify memory region layouts and /proc/<pid>/mem to read memory contents. It extracts values matching the JSON pattern "key" with isSecret set to true directly from process memory. This approach bypasses log masking applied by the CI platform, meaning secrets that have been correctly masked in pipeline logs are still exposed when read directly from the runner process memory.

Stolen credentials are exfiltrated using GitHub's own infrastructure as a dead-drop command and control channel. The malware creates GitHub repositories under the victim's account with the repository description "A Mini Shai-Hulud has Appeared" and uses GitHub's commit search API, querying for commit messages matching "OhNoWhatsGoingOnWithGitHub" followed by base64-encoded data, to retrieve tokens and expand access scope. Using stolen npm or GitHub publishing credentials, the malware attempts to inject the same malicious payload into other packages the victim developer has rights to publish, enabling organic propagation through the broader npm ecosystem. A misconfigured CircleCI job exposing an npm authentication token is the suspected initial compromise vector, though SAP had not confirmed this at time of publication. Attribution to TeamPCP with medium confidence is based on structural and behavioral overlap with prior attacks against Bitwarden, Checkmarx, and Trivy npm packages.

Qinglong Task Scheduler CVE-2026-3965 and CVE-2026-4047: Authentication Bypass Chain Enabling Cryptominer Deployment

CVE-2026-3965 exploits a misconfigured URL rewrite rule in the Qinglong task scheduler that maps requests to /open/* paths through to /api/* endpoints. This inadvertently exposes API endpoints that require authentication via an unauthenticated /open/ path prefix, allowing an attacker to call privileged management endpoints without supplying credentials.

CVE-2026-4047 exploits a case sensitivity mismatch between the authentication middleware and the Express.js routing layer. The authentication middleware enforces access control on requests to paths matching /api/ using case-sensitive string comparison. Express.js, however, performs case-insensitive route matching by default. A request to /aPi/ or any other mixed-case variant of /api/ passes through Express.js routing to the correct endpoint handler but is not intercepted by the authentication middleware, which does not recognize the mixed-case path as requiring authentication. Chained together, these two flaws provide unauthenticated remote code execution capability against any exposed Qinglong instance.

Post-exploitation behavior: The deployed cryptominer binary is downloaded from file.551911.xyz and written to /ql/data/db/.fullgc. The file name .fullgc is chosen deliberately to mimic the legitimate Full GC JVM garbage collection process name, making it visually indistinguishable from a legitimate JVM subprocess in process listings. The malware executes in the background and sustains CPU utilization at 85 to 100 percent. Separate compiled binaries are served for Linux x86_64, Linux ARM64, and macOS architectures. Active exploitation began February 7, 2026. The maintainer's first patch released as PR 2924 was confirmed insufficient by Snyk researchers. The post-PR 2941 build is the correct and complete remediation.

The public advisories, vendor disclosures, and news summaries reviewed for this report acknowledge the existence of full IOC sets associated with several of these campaigns but do not reproduce the raw indicator tables in the open-text summaries that were directly retrievable for this brief. The following table reflects only IOCs that were explicitly present in directly fetched source content.

Confirmed IOC Values from Directly Retrieved Source Content

Qinglong cryptominer download domain: file.551911.xyz. Confidence: confirmed per Snyk researcher disclosure.

Qinglong malware binary path on disk: /ql/data/db/.fullgc. Confidence: confirmed per Snyk researcher disclosure.

Qinglong malware process name: .fullgc. Confidence: confirmed. Note that this name mimics the legitimate JVM Full GC process. Presence of this process in any non-JVM context should be treated as a confirmed compromise indicator.

SAP npm dead-drop repository description string: "A Mini Shai-Hulud has Appeared". Confidence: confirmed per Aikido and Socket researcher disclosure.

SAP npm exfiltration commit message pattern: "OhNoWhatsGoingOnWithGitHub" followed by base64-encoded payload data. Confidence: confirmed per Aikido and Socket researcher disclosure.

SAP npm stealer runtime binary: Bun JavaScript runtime downloaded from GitHub during payload execution. Confidence: confirmed per researcher disclosure.

SAP npm primary stealer payload filename: execution.js. Confidence: confirmed per researcher disclosure.

SAP npm preinstall bootstrap filename: setup.mjs. Confidence: confirmed per researcher disclosure.

IOC Sets Referenced in Source Advisories but Not Available in Open-Text Summaries for This Brief

The following campaigns carry full IOC sets in their underlying advisory documents. Practitioners should retrieve machine-readable indicator packages directly from the named advisory documents rather than from this report summary.

Iranian affiliated OT attack campaign against water and critical infrastructure: full IOC set available in the EPA, FBI, CISA, and NSA joint advisory dated April 6 to 7, 2026.

Apache ActiveMQ CVE-2026-34197 exploitation campaign: IOC details referenced in vendor telemetry from SAFE Security and Fortinet and in the CISA KEV entry for CVE-2026-34197.

Windows Shell CVE-2026-32202 exploitation and APT28 tradecraft: IOC details referenced in Akamai's April 28, 2026 research publication and in Microsoft's updated advisory for CVE-2026-32202.

Signed adware AV-killer campaign: IOC details including C2 infrastructure and signed binary hashes referenced in the BleepingComputer research report dated April 14, 2026.

ConnectWise ScreenConnect exploitation by Storm-1175: IOC details referenced in Microsoft threat intelligence reporting and in the CISA KEV entries for CVE-2024-1708 and CVE-2024-1709.

Covert botnet infrastructure operated by Volt Typhoon and Flax Typhoon: IOC details available in the CISA and NCSC-UK joint advisory on covert botnet expansion dated April 28 to 29, 2026.

Infrastructure Pattern Intelligence (Qualitative)

Iranian OT activity targets internet-exposed PLCs and OT management ports, with malicious traffic frequently originating from overseas hosting providers as documented in the joint government advisory. Exposed Modbus, EtherNet/IP, and similar industrial protocol ports on publicly routable addresses are the primary access vectors.

ActiveMQ exploitation concentrates on the Jolokia HTTP endpoint accessible on the management console port, with scanning and exploitation attempts confirmed across the public internet against both port 8161 and custom port configurations.

China nexus actors operating through covert botnet infrastructure route malicious traffic through large networks of compromised corporate and consumer devices. Traffic attributed to these campaigns may originate from reputable IP ranges hosting compromised third-party devices, making reputation-based blocking an insufficient detection control.

The SAP npm dead-drop C2 mechanism abuses GitHub's own commit search API, meaning outbound HTTPS connections to github.com cannot be blocked as a mitigation without disrupting legitimate developer workflows. Detection must rely on behavioral and process-level indicators rather than network blocking.

All rules below are experimental unless explicitly marked stable. Validate against your environment before production deployment. False positive rates will vary significantly based on deployment context and existing baseline.

Apache ActiveMQ CVE-2026-34197: Jolokia Exploitation Detection

title: Apache ActiveMQ Jolokia Exploitation Attempt CVE-2026-34197
status: experimental
description: >
  Detects inbound POST requests to ActiveMQ Jolokia JMX-HTTP bridge endpoints
  from non-RFC-1918 source addresses, consistent with CVE-2026-34197 exploitation
  attempts against exposed management interfaces.
logsource:
  category: webserver
detection:
  selection:
    cs-uri-stem|contains:
      - '/jolokia/'
      - '/api/jolokia'
    cs-method: 'POST'
  filter_internal:
    c-ip|cidr:
      - '10.0.0.0/8'
      - '172.16.0.0/12'
      - '192.168.0.0/16'
  condition: selection and not filter_internal
falsepositives:
  - Legitimate external monitoring systems calling Jolokia from non-RFC-1918 addresses
level: high
tags:
  - attack.initial_access
  - attack.t1190
  - cve.2026-34197
index=web_proxy OR index=apache_access
  uri_path IN ("*/jolokia/*","*/api/jolokia*")
  http_method=POST
  NOT src_ip IN ("10.0.0.0/8","172.16.0.0/12","192.168.0.0/16")
| stats count by src_ip, dest_host, uri_path, http_status, _time
| where count > 3
| eval risk="CVE-2026-34197 Jolokia POST from external source"
| table _time, src_ip, dest_host, uri_path, http_status, count, risk
| sort - count

Windows Shell CVE-2026-32202: NTLM Hash Capture and Pass-the-Hash Detection

title: NTLM Hash Capture via Risky File Execution Path CVE-2026-32202
status: experimental
description: >
  Detects process creation events from user-writable paths such as Downloads,
  AppData Temp, Desktop, and Public directories, which are consistent with
  CVE-2026-32202 exploitation via malicious file delivery and execution.
logsource:
  product: windows
  category: process_creation
detection:
  file_exec_risky_path:
    EventID: 4688
    NewProcessName|contains:
      - '\Downloads\'
      - '\AppData\Local\Temp\'
      - '\Desktop\'
      - '\Users\Public\'
  condition: file_exec_risky_path
falsepositives:
  - Developers legitimately running scripts from Downloads or Temp directories
level: medium
tags:
  - attack.credential_access
  - attack.t1550.002
  - cve.2026-32202
title: Outbound NTLM Network Logon Following Risky File Execution CVE-2026-32202
status: experimental
description: >
  Detects NTLM Type 3 network logon from a workstation within five minutes of
  a process being launched from a user-writable location, indicating possible
  NTLM hash capture and pass-the-hash lateral movement activity.
logsource:
  product: windows
  category: authentication
detection:
  ntlm_network_logon:
    EventID: 4624
    LogonType: 3
    AuthenticationPackageName: 'NTLM'
    IpAddress|not_startswith:
      - '10.'
      - '172.16.'
      - '192.168.'
      - '127.'
  condition: ntlm_network_logon
  timeframe: 5m
  relate: file_exec_risky_path on WorkstationName
falsepositives:
  - Shared service accounts legitimately using NTLM for remote file shares
level: high
tags:
  - attack.lateral_movement
  - attack.t1550.002
  - cve.2026-32202
index=windows EventCode=4624
  LogonType=3
  AuthenticationPackageName=NTLM
| eval suspicious_logon=if(
    match(IpAddress,"^(10\.|172\.(1[6-9]|2[0-9]|3[01])\.|192\.168\.|127\.)"),0,1)
| where suspicious_logon=1
| join type=inner WorkstationName [
    search index=windows EventCode=4688
      NewProcessName IN
        ("*\\Downloads\\*","*\\AppData\\Local\\Temp\\*",
         "*\\Desktop\\*","*\\Users\\Public\\*")
    | rename ComputerName as WorkstationName
    | eval exec_time=_time
    | table WorkstationName, NewProcessName, exec_time]
| where abs(_time - exec_time) < 300
| table _time, WorkstationName, IpAddress, TargetUserName, NewProcessName, exec_time
| sort - _time

SAP npm Supply Chain: TeamPCP Stealer Detection

rule TeamPCP_SAP_NPM_Stealer_ExfiltrationMarkers
{
    meta:
        description     = "Detects TeamPCP SAP npm supply chain stealer markers in JavaScript payloads"
        author          = "Inferlume CTI"
        date            = "2026-04-30"
        confidence      = "medium"
        reference       = "SAP npm supply chain compromise April 2026"
        mitre_technique = "T1195.002, T1528, T1003"

    strings:
        $gh_deadrop     = "OhNoWhatsGoingOnWithGitHub" ascii wide
        $shai_hulud     = "A Mini Shai-Hulud has Appeared" ascii wide
        $proc_mem       = "/proc/" ascii
        $exec_payload   = "execution.js" ascii
        $secret_pattern = "\"isSecret\":true" ascii wide
        $setup_script   = "setup.mjs" ascii
        $bun_ref        = "bun" ascii nocase

    condition:
        filesize < 10MB and (
            ($gh_deadrop or $shai_hulud) or
            ($proc_mem and $exec_payload and $secret_pattern) or
            ($setup_script and $bun_ref and $proc_mem)
        )
}
title: CI Runner Process Memory Read by JavaScript Runtime (TeamPCP SAP npm Pattern)
status: experimental
description: >
  Detects reads of another process's /proc/<pid>/maps or /proc/<pid>/mem files
  by a Bun or Node.js parent process, consistent with the TeamPCP SAP npm stealer
  extracting masked secrets from CI runner process memory.
logsource:
  product: linux
  category: file_access
detection:
  proc_mem_access:
    TargetFilename|re: '^/proc/[0-9]+/(maps|mem)$'
  risky_parent:
    ParentImage|endswith:
      - '/bun'
      - '/node'
  filter_legitimate:
    Image|contains:
      - 'gdb'
      - 'strace'
      - 'perf'
      - 'java'
  condition: proc_mem_access and risky_parent and not filter_legitimate
falsepositives:
  - Legitimate Node.js debugging or profiling agents with explicit proc access grants
level: critical
tags:
  - attack.credential_access
  - attack.t1003
  - attack.t1528
  - attack.t1195.002
index=linux_auditd OR index=sysmon_linux
  event_type=file_access
  file_path IN ("/proc/*/maps", "/proc/*/mem")
  parent_process IN ("bun","node","npm")
  NOT process_name IN ("gdb","strace","perf","java")
| stats count by host, parent_process, process_name, file_path, user, _time
| eval risk="TeamPCP proc memory read pattern - SAP npm stealer candidate"
| table _time, host, user, parent_process, process_name, file_path, risk
| sort - _time

Qinglong CVE-2026-3965 and CVE-2026-4047: Cryptominer and Auth Bypass Detection

title: Qinglong .fullgc Cryptominer Process Execution
status: stable
description: >
  Detects execution of the .fullgc cryptominer binary deployed via the Qinglong
  authentication bypass chain. The binary is stored at /ql/data/db/.fullgc and
  named to mimic a JVM garbage collection process. No legitimate process should
  carry this name outside of a JVM context.
logsource:
  product: linux
  category: process_creation
detection:
  fullgc_process:
    Image|endswith: '/.fullgc'
  fullgc_path:
    Image|startswith: '/ql/data/db/'
  condition: fullgc_process or fullgc_path
falsepositives:
  - None expected in production environments
level: critical
tags:
  - attack.impact
  - attack.t1496
  - cve.2026-3965
  - cve.2026-4047
title: Qinglong API Authentication Bypass via Mixed-Case Path CVE-2026-4047
status: experimental
description: >
  Detects HTTP requests to Qinglong management API using mixed-case path variants
  such as /aPi/ instead of /api/, consistent with exploitation of the Express.js
  case-insensitive routing versus case-sensitive authentication middleware mismatch.
logsource:
  category: webserver
detection:
  mixed_case_api:
    cs-uri-stem|re: '^/[Aa][Pp][Ii]/'
  filter_normal:
    cs-uri-stem|startswith: '/api/'
  condition: mixed_case_api and not filter_normal
falsepositives:
  - Misconfigured clients sending incorrectly cased API paths
level: high
tags:
  - attack.initial_access
  - attack.t1190
  - cve.2026-4047
index=qinglong_access OR index=nginx_access
  uri_path=*
| rex field=uri_path "^(?P<path_prefix>/[^/]+/)"
| eval is_mixed_case=if(
    match(path_prefix,"(?i)^/api/$") AND NOT match(path_prefix,"^/api/$"),
    1, 0)
| where is_mixed_case=1
| stats count by src_ip, uri_path, http_method, http_status, _time
| eval risk="CVE-2026-4047 mixed-case API auth bypass attempt"
| table _time, src_ip, uri_path, http_method, http_status, count, risk
| sort - _time
index=linux_process OR index=sysmon_linux
  process_name=".fullgc" OR process_path="/ql/data/db/.fullgc"
| stats count by host, user, process_name, process_path, parent_process, _time
| eval risk="Qinglong cryptominer .fullgc confirmed compromise indicator"
| table _time, host, user, process_name, process_path, parent_process, risk

Iranian OT Campaign: Detection for PLC Anomalies and Remote Access Abuse

title: Unexpected Outbound Connection from OT Network to Internet Hosted IP
status: experimental
description: >
  Detects outbound connections from OT network segments to non-RFC-1918 addresses,
  consistent with direct internet exposure of PLCs and HMI systems as described
  in the Iranian-affiliated OT intrusion advisory.
logsource:
  category: firewall
detection:
  ot_outbound:
    src_zone: 'OT'
    dst_ip|not_cidr:
      - '10.0.0.0/8'
      - '172.16.0.0/12'
      - '192.168.0.0/16'
    dst_port|contains:
      - '502'
      - '44818'
      - '102'
      - '20000'
      - '4840'
      - '3389'
      - '22'
  condition: ot_outbound
falsepositives:
  - Vendor remote access sessions through approved gateways if firewall zones are not granular
level: critical
tags:
  - attack.initial_access
  - attack.t1190
  - attack.t1485

Docker CVE-2026-34040: Oversized Authorization Plugin Bypass Detection

title: Docker API Oversized Request Body for Authorization Plugin Bypass CVE-2026-34040
status: experimental
description: >
  Detects unusually large HTTP POST or PUT requests to the Docker Engine remote API,
  consistent with the body-padding technique used to bypass authorization plugins
  in CVE-2026-34040 exploitation.
logsource:
  category: webserver
  product: docker
detection:
  large_docker_api_request:
    cs-uri-stem|contains: '/v1.'
    cs-method:
      - 'POST'
      - 'PUT'
    sc-bytes|gte: 1000000
  condition: large_docker_api_request
falsepositives:
  - Large image layer pushes to Docker registries on the same port
level: medium
tags:
  - attack.defense_evasion
  - attack.t1609
  - cve.2026-34040
index=docker_daemon_logs OR index=docker_api_access
  request_method IN ("POST","PUT")
  request_uri IN ("*/v1.*/containers/create*","*/v1.*/exec/*")
  request_size > 1000000
| stats count by src_ip, request_uri, request_method, request_size, _time
| eval risk="CVE-2026-34040 oversized Docker API request - possible AuthZ bypass"
| table _time, src_ip, request_uri, request_method, request_size, count, risk
| sort - request_size

No source article in this reporting window explicitly stated ATT&CK technique IDs. All technique mappings below are inferred from documented behavior described across source material. Each mapping includes the behavioral basis that justifies the inference. No technique is presented as source-confirmed.

T1190 - Exploit Public-Facing Application [INFERRED]
Behavioral basis: ActiveMQ Jolokia endpoint, Citrix NetScaler ADC and Gateway, ConnectWise ScreenConnect management interface, Docker Engine remote API, and cPanel and WHM control panel all targeted via network-accessible interfaces requiring no prior authenticated foothold. This is the dominant initial access technique across this reporting window.

T1078 - Valid Accounts [INFERRED]
Behavioral basis: Default credential abuse documented for the ActiveMQ Jolokia interface (admin and admin credentials). cPanel CVE-2026-41940 grants unauthenticated access that is functionally equivalent to valid account possession. NTLM hash capture via CVE-2026-32202 enables authenticated lateral movement as a legitimate user without credential knowledge.

T1550.002 - Use Alternate Authentication Material: Pass the Hash [INFERRED]
Behavioral basis: CVE-2026-32202 explicitly described as enabling NTLM hash capture from file execution, with pass-the-hash lateral movement documented as the primary post-exploitation technique by Akamai and Microsoft researchers.

T1003 - OS Credential Dumping [INFERRED]
Behavioral basis: SAP npm TeamPCP stealer reads directly from CI runner process memory via /proc/<pid>/maps and /proc/<pid>/mem to extract masked authentication secrets, bypassing CI platform log masking controls. This is a behavioral match to process memory credential dumping adapted for Linux CI environments.

T1195.002 - Supply Chain Compromise: Compromise Software Supply Chain [INFERRED]
Behavioral basis: Four official SAP npm packages were trojanized with a malicious preinstall script. The packages are published under the official SAP organization namespace, meaning victims install them through normal and trusted dependency management workflows.

T1528 - Steal Application Access Token [INFERRED]
Behavioral basis: SAP npm stealer payload explicitly targets npm tokens, GitHub personal access tokens, AWS access keys, Azure credentials, GCP service account credentials, Kubernetes secrets, and CI and CD pipeline variables as its primary collection objectives.

T1496 - Resource Hijacking [INFERRED]
Behavioral basis: Qinglong exploitation chain actively deployed cryptominer binaries since February 7, 2026, sustaining CPU utilization at 85 to 100 percent on compromised developer servers. Separate binaries confirmed for Linux x86_64, Linux ARM64, and macOS.

T1562.001 - Impair Defenses: Disable or Modify Tools [INFERRED]
Behavioral basis: Digitally signed adware tool confirmed to have disabled antivirus and endpoint security agents at SYSTEM privilege level across more than 23,500 endpoints. The signed status allows bypass of application control policies relying on certificate validation.

T1059.007 - Command and Scripting Interpreter: JavaScript or JScript [INFERRED]
Behavioral basis: SAP npm payload executes obfuscated execution.js via the Bun JavaScript runtime. Docker CVE-2026-34040 AI agent exploitation vector involves prompt injection into an agent executing scripted API calls.

T1071.001 - Application Layer Protocol: Web Protocols [INFERRED]
Behavioral basis: SAP npm stealer exfiltrates credentials and receives command tokens via GitHub's HTTPS commit search API, using GitHub's own public infrastructure as a dead-drop channel. All communication occurs over standard HTTPS, making it indistinguishable from legitimate GitHub traffic at the network layer.

T1566 - Phishing and Spearphishing File Delivery [INFERRED]
Behavioral basis: CVE-2026-32202 exploited via crafted file delivery through email, downloads, or shared drives, consistent with documented APT28 tradecraft using malicious LNK files in prior Ukrainian and EU targeting campaigns.

T1105 - Ingress Tool Transfer [INFERRED]
Behavioral basis: Qinglong post-exploitation chain downloads cryptominer binaries from file.551911.xyz. SAP npm payload downloads the Bun runtime from GitHub as an execution dependency.

T1609 - Container Administration Command [INFERRED]
Behavioral basis: CVE-2026-34040 in Docker Engine bypasses authorization plugin controls to enable creation of privileged containers mounting the host filesystem and exposing cloud credentials and configuration files.

T1485 - Data Destruction [INFERRED]
Behavioral basis: Iranian-affiliated actors documented in the joint government advisory to have wiped PLC project files, manipulated process sensor readings, and disrupted physical operational processes at US water and wastewater facilities. This is operationally consistent with destructive intent against physical infrastructure control systems.

T1072 - Software Deployment Tools [INFERRED]
Behavioral basis: Signed adware tool operates via a software distribution and update mechanism that pushes payloads to enrolled endpoints at SYSTEM privilege, functioning as an adversary-controlled software deployment platform.

MITRE D3FEND Defensive Countermeasures

D3-HBPI - Hardware-Based Process Isolation: Relevant for containing Docker container escape risk from CVE-2026-34040 by enforcing hardware isolation between container workloads and host processes.

D3-NTA - Network Traffic Analysis: Relevant for detecting low-and-slow covert botnet command and control traffic from Volt Typhoon and Flax Typhoon infrastructure, where reputable IP ranges hosting compromised devices make reputation-based detection insufficient.

D3-SCF - Software Component Filtering: Directly applicable to the SAP npm supply chain compromise. Enforcing verified and pinned software component manifests and monitoring for unverified runtime downloads during npm install would have blocked the Bun runtime download component of the TeamPCP payload.

D3-UAP - User Account Permissions: Applicable to CVE-2026-32202 lateral movement. Reducing NTLM usage across the environment and enforcing least-privilege account policies limit the blast radius of pass-the-hash attacks following NTLM hash capture.

D3-OTMON - OT Network Monitoring: Directly applicable to Iranian OT intrusion detection. Monitoring for anomalous commands to PLCs, unexpected configuration write operations, and unusual HMI data patterns provides the visibility needed to detect and respond to the documented manipulation activity.

D3-IOPR - Inbound Traffic Filtering for OT Protocols: Applicable to the Iranian OT campaign. Blocking direct inbound and outbound connections to OT protocol ports from internet-routable addresses addresses the primary enabling condition for PLC exploitation documented in the joint government advisory.

Chapter 05 - Governance, Risk & Compliance

Today's incidents carry direct regulatory and governance implications across multiple frameworks. The CISA KEV federal deadline for CVE-2026-34197 passed today. The KEV deadline for CVE-2026-32202 is May 12, 2026. Both deadlines apply directly to US Federal Civilian Executive Branch agencies under CISA Binding Operational Directive 22-01 and carry documented non-compliance risk for organizations subject to federal oversight.

For organizations operating under the NIST Cybersecurity Framework 2.0, today's incidents map to the Identify, Protect, Detect, Respond, and Govern functions. The developer infrastructure targeting pattern through the SAP npm compromise and the GitHub Enterprise Server RCE is a direct supply chain risk management concern under NIST CSF Govern function category GV.SC. The Iranian OT advisory maps to the Identify function asset inventory controls and the Protect function access control categories specific to operational technology environments.

For organizations operating under NIS2 in the European Union, the APT28 exploitation of CVE-2026-32202 against Ukrainian and EU government targets, combined with the Citrix NetScaler and ActiveMQ active exploitation confirmed by CISA KEV, creates direct compliance obligations around incident notification and patching timelines under Article 21 essential entity security measures. NIS2 requires notification of significant incidents within 24 hours of detection. Organizations in EU member states using any of the KEV-listed products in essential or important sector roles should confirm whether today's confirmed exploitation activity in their environment constitutes a notifiable incident under their national NIS2 transposition.

For organizations operating under ISO 27001:2022, today's developer infrastructure targeting incidents are directly relevant to Annex A control 8.8 on vulnerability management and Annex A control 8.30 on outsourced development. The SAP npm supply chain compromise represents a concrete realized risk against the software supply chain controls organizations are expected to implement under ISO 27001:2022 Annex A control 5.19 and 5.20 covering information security in supplier relationships.

For healthcare organizations specifically, the ConnectWise ScreenConnect chain delivering Medusa ransomware combined with Storm-1175's documented targeting of healthcare environments creates specific HIPAA Security Rule obligations around contingency planning, access control, and audit control safeguards. HIPAA covered entities and business associates using ScreenConnect should confirm patch status and evaluate whether Medusa ransomware activity has occurred in their environments.

For organizations managing critical infrastructure in the water and energy sectors, the Iranian OT advisory is a direct regulatory trigger. US water utilities subject to America's Water Infrastructure Act must report cybersecurity incidents to the EPA. The joint advisory explicitly references EPA reporting channels as available to affected organizations. Energy sector organizations subject to NERC CIP should evaluate whether the documented PLC targeting TTPs apply to their control system environments and whether existing NERC CIP-007 patch management and CIP-005 electronic security perimeter controls adequately address the described attack vectors.

Board and executive reporting obligations: The confirmed exploitation of KEV-listed vulnerabilities in an organization's environment and the confirmed presence of the signed AV-killing adware tool at SYSTEM level in an organization's network are both material cybersecurity events that should be reported to executive leadership and the board risk committee with actionable status updates. The signed adware campaign in particular, given its confirmed presence in Fortune 500, utilities, government, and healthcare environments, warrants immediate escalation beyond routine IT patching operations.

Third-party and vendor risk obligations: The SAP npm supply chain compromise requires immediate vendor risk management action. Organizations should formally engage with SAP regarding the compromise of their published npm packages, request written confirmation of the incident scope and remediation, and evaluate whether the compromise falls within existing vendor security obligation clauses in their SAP contracts. Organizations using managed service providers running ConnectWise ScreenConnect should request written confirmation of patch status and should audit whether those providers have experienced any Medusa ransomware-related activity.

Chapter 06 - Adversary Emulation

The following emulation scenarios are intended for red team exercises, purple team validation, and detection engineering validation. All procedures use documented real-world tradecraft from the incidents in this report. Emulation should be conducted only in authorized and isolated environments with explicit written authorization.

Scenario One: NTLM Hash Capture via Crafted File Delivery (CVE-2026-32202 and APT28 Tradecraft)

Objective: Validate detection coverage for NTLM hash capture via crafted file execution and subsequent pass-the-hash lateral movement, replicating the documented APT28 tradecraft linked to CVE-2026-32202.

Emulation procedure:

Step one: On an authorized attacker-controlled machine on the network segment, stand up an SMB server using Responder or a similar tool configured to capture NTLM Type 3 authentication messages.

Step two: Create a malicious LNK file with a UNC path pointing to the attacker-controlled SMB server. The LNK file should be crafted to auto-execute on folder open, consistent with APT28 tradecraft documented in CERT-UA reporting for CVE-2026-21510 campaigns.

Step three: Deliver the LNK file to an authorized test endpoint simulating user interaction via email attachment or shared drive placement.

Step four: Confirm NTLM hash capture on the attacker-controlled SMB server. Record the NTLM Type 3 response hash.

Step five: Use the captured hash in a pass-the-hash lateral movement attempt against a second authorized test system using a tool such as Mimikatz sekurlsa::pth or Impacket psexec.py.

Detection validation targets: Windows Security Event ID 4624 LogonType 3 with NTLM authentication package from a non-standard source host. Windows Security Event ID 4688 process creation from user-writable path within five minutes preceding the authentication event. SMB outbound connection to non-RFC-1918 addresses from the test endpoint.

Expected SIGMA rule triggers: Both SIGMA rules written for CVE-2026-32202 in the Detection Intelligence section of this report.

Scenario Two: Qinglong Authentication Bypass and Cryptominer Deployment Simulation (CVE-2026-4047)

Objective: Validate detection coverage for mixed-case HTTP path authentication bypass and post-exploitation process execution mimicking the .fullgc cryptominer pattern.

Emulation procedure:

Step one: Deploy an authorized Qinglong instance on a test network running a version prior to post-PR 2941 or simulate the authentication middleware mismatch in an isolated test container.

Step two: Send an authenticated API request to /api/env using standard casing and confirm the authentication middleware correctly blocks or requires credentials.

Step three: Resend the identical request substituting /aPi/env as the path and confirm that the authentication middleware bypass allows access to the protected endpoint.

Step four: On a separate authorized test host, create a benign process named .fullgc stored at /ql/data/db/.fullgc (containing a no-operation script) and execute it to simulate the cryptominer execution behavior.

Detection validation targets: Web access log entry for a mixed-case /aPi/ path request. Linux process creation event for a process named .fullgc or originating from the path /ql/data/db/. Network connection to file.551911.xyz (can be simulated via DNS sinkhole in the test environment).

Expected detection rule triggers: The Qinglong mixed-case path SIGMA rule and the .fullgc cryptominer process execution SIGMA rule written in the Detection Intelligence section.

Scenario Three: SAP npm Supply Chain Stealer Simulation (TeamPCP CI Memory Read Pattern)

Objective: Validate detection coverage for process memory reading by a JavaScript runtime against CI runner processes, replicating the core credential extraction technique of the TeamPCP SAP npm payload.

Emulation procedure:

Step one: On an authorized CI runner test instance, deploy a Node.js script that reads /proc/self/maps to validate that proc filesystem access from a Node.js process generates the expected telemetry events.

Step two: Extend the script to attempt a read of /proc/<pid>/maps for a specific non-self process PID, simulating the cross-process memory access performed by the TeamPCP execution.js payload against the Runner.Worker process.

Step three: Execute the script via an npm preinstall hook in a test package to simulate the delivery mechanism exactly as documented in the SAP npm incident.

Step four: Confirm that auditd or sysmon for Linux generates file access events for /proc/<pid>/maps with the node or npm parent process.

Detection validation targets: Linux file access event for /proc/<numeric PID>/maps with parent process node or npm. GitHub API call to commit search endpoint using a string matching the OhNoWhatsGoingOnWithGitHub pattern in network logs (simulate via a benign commit search query using that string in an authorized test repository).

Expected detection rule triggers: The CI runner process memory read SIGMA rule and the TeamPCP YARA rule written in the Detection Intelligence section.

Scenario Four: ActiveMQ Jolokia Exploitation Simulation (CVE-2026-34197)

Objective: Validate detection coverage for external HTTP POST requests to exposed Jolokia endpoints consistent with CVE-2026-34197 exploitation attempts.

Emulation procedure:

Step one: Deploy an authorized ActiveMQ Classic test instance with the Jolokia endpoint accessible. Confirm that the test instance is isolated from production networks and has no connectivity to production systems.

Step two: From a test machine simulating an external non-RFC-1918 source address (achievable via network namespace configuration in the test environment), send a benign but correctly structured HTTP POST request to the Jolokia endpoint at /jolokia/ to simulate the request pattern of CVE-2026-34197 exploitation without executing any malicious payload.

Step three: Confirm that web access logs record the POST request from the simulated external source.

Detection validation targets: Web access log entry for a POST request to a URI containing /jolokia/ from a non-RFC-1918 source address. SIEM alert generation from the ActiveMQ Jolokia SIGMA rule written in the Detection Intelligence section.

Intelligence Confidence85%

The combined report achieves a confidence score of 85. The floor of this score is raised substantially by three high-anchor elements: the EPA, FBI, CISA, and NSA joint advisory for Iranian OT activity, which represents the highest-confidence intelligence type available for any cyber threat claim; CISA KEV listings for CVE-2026-34197, CVE-2026-32202, CVE-2024-1708, and CVE-2026-3055, which are authoritative and non-disputable confirmations of in-the-wild exploitation; and Wiz Research's direct disclosure of CVE-2026-3854 as a primary vendor research publication with high evidential weight.

The score is held below 90 for the following specific reasons. Actor attribution for two of the highest-profile incidents relies on secondary news reporting rather than directly retrieved primary research publications. APT28 attribution for CVE-2026-32202 exploitation is carried via Akamai researcher findings cited in news summaries rather than a directly retrieved advisory from Microsoft MSTIC, CrowdStrike, Mandiant, or a government body. Storm-1175 attribution for ConnectWise exploitation is Microsoft-sourced but accessed through secondary reporting rather than a directly retrieved Microsoft Threat Intelligence blog post. TeamPCP attribution is explicitly described as medium confidence by the original researching teams based on behavioral overlap rather than definitive technical evidence. The cPanel CVE-2026-41940 entry rests on a single secondary source with no primary advisory retrieved. The December 2025 first-observed date for APT28 exploitation activity is unconfirmed by any primary advisory and should be treated as indicative only.