Exploit Brokers by Forgebound Research
Hey there,
It's Cipherceval — welcome to this week's Hacking News roundup from Exploit Brokers by Forgebound Research. HN Episode 61 just dropped and it's a heavy one. Let's get into it.
Threat Actor
🌐 Shadow Campaigns: 37 Countries Compromised by One Group
Palo Alto Networks' Unit 42 has unveiled a previously undocumented state-backed espionage group — designated TGR-STA-1030 — that compromised at least 70 organizations across 37 countries in a single year. That's roughly one in five nations on Earth breached by a single group. Targets include national law enforcement agencies, finance ministries, and government departments handling trade and diplomacy. They even compromised a nation's parliament.
The attack chains used phishing emails with MEGA-hosted archives deploying the Diaoyu Loader and Cobalt Strike, plus exploitation of Microsoft Exchange, SAP, and Atlassian vulnerabilities. They also developed a custom Linux kernel rootkit called ShadowGuard for persistent, stealthy access. Their activity directly correlated with geopolitical events — ramping up scanning during the US government shutdown and after the Venezuelan president's capture.
🚨Action: Patch your Exchange, SAP, and Atlassian instances. Be extremely cautious with emails linking to file hosting services.
CVSS Update
🔓 BeyondTrust CVE-2026-1731: CVSS 9.9 Pre-Auth RCE
BeyondTrust has disclosed a critical vulnerability in its Remote Support and Privileged Remote Access products. CVE-2026-1731 scores a CVSS 9.9 — it's an OS command injection flaw (CWE-78) that requires no authentication, no user interaction, and no prior access. An attacker sends a crafted request and gets full operating system command execution.
Approximately 11,000 instances are exposed to the internet, with ~8,500 on-premises deployments potentially vulnerable. This was discovered using AI-enabled variant analysis by researcher Harsh Jaiswal and the Hacktron AI team. BeyondTrust has patched SaaS customers, but self-hosted instances need manual patches (BT26-02-RS or BT26-02-PRA).
Remember: BeyondTrust was previously exploited by Silk Typhoon (Chinese state-backed) to breach the US Treasury. When BeyondTrust has a vulnerability, threat actors pay attention.
🚨 Action: If you run BeyondTrust, update immediately. A patch does you no good if it isn't installed.
Targeted Attacks
📱 Signal Phishing: Hijacking Accounts Without Malware
Germany's BfV and BSI have issued a joint advisory about a state-sponsored campaign targeting Signal users — specifically politicians, military officials, diplomats, and journalists across Europe. No malware. No zero-days. The attackers abuse Signal's own legitimate features.
Two methods: (1) Fake "Signal Support" messages requesting your PIN, and (2) malicious QR codes disguised as group invitations that silently link the attacker's device to your account. The tactics align with Russian-linked groups Star Blizzard, UNC5792, and UNC4221. The same technique extends to WhatsApp.
🚨 Action: Never share your PIN. Enable Registration Lock (Settings → Account). Review linked devices (Settings → Linked Devices) and remove anything you don't recognize.
CISA
🛡️ CISA BOD 26-02: Rip Out End-of-Life Edge Devices
CISA issued Binding Operational Directive 26-02, ordering federal civilian agencies to eliminate end-of-support edge devices — firewalls, routers, switches, WAPs, load balancers, and IoT devices that no longer receive security updates. The timeline: immediate updates, 3-month inventory, 12-month decommission, 18-month full replacement, 24-month continuous discovery.
While this technically only applies to federal agencies, CISA's acting director made it clear: unsupported devices should never remain on enterprise networks. If your edge devices can't be updated, it's time to replace them.
🚨 Action: Audit your network perimeter. If it's end-of-life, it's an open invitation.
Ransomware
📦 Iron Mountain vs. Everest: Claims vs. Reality
The Everest ransomware gang claimed a 1.4TB breach of Iron Mountain — the S&P 500 company guarding data for 95% of Fortune 1000 companies. Iron Mountain's response: a single compromised credential accessed one folder on a third-party file-sharing site containing primarily marketing materials. No ransomware deployed, no core systems breached, no customer data involved.
🚨 Action: Enforce MFA everywhere. Verify before you panic.
🎯 5 Key Takeaways
1. Nation-state espionage is at unprecedented scale — patch your public-facing appliances.
2. Update BeyondTrust immediately — CVE-2026-1731 is the golden goose of vulnerabilities.
3. Encryption doesn't protect you from social engineering — review your linked devices.
4. End-of-life devices are open invitations — if you can't update it, replace it.
5. Verify before you panic — ransomware groups exaggerate to maximize payouts.
🎧 Watch/Listen to the Full Episode
Catch the full breakdown on YouTube, Spotify, or Apple Podcasts — search "Exploit Brokers by Forgebound Research."
Found this valuable? Forward it to someone who touches a computer.
Stay vigilant, stay curious, and update your stuff.
— Cipherceval / Forgebound Research




