https://youtu.be/_NTBPC2CjvA

Exploit Brokers by Forgebound Research

Hey there,

It's Cipherceval — welcome to this week's Hacking News roundup from Exploit Brokers by Forgebound Research. HN Episode 61 just dropped and it's a heavy one. Let's get into it.

Threat Actor
🌐 Shadow Campaigns: 37 Countries Compromised by One Group

Palo Alto Networks' Unit 42 has unveiled a previously undocumented state-backed espionage group — designated TGR-STA-1030 — that compromised at least 70 organizations across 37 countries in a single year. That's roughly one in five nations on Earth breached by a single group. Targets include national law enforcement agencies, finance ministries, and government departments handling trade and diplomacy. They even compromised a nation's parliament.

The attack chains used phishing emails with MEGA-hosted archives deploying the Diaoyu Loader and Cobalt Strike, plus exploitation of Microsoft Exchange, SAP, and Atlassian vulnerabilities. They also developed a custom Linux kernel rootkit called ShadowGuard for persistent, stealthy access. Their activity directly correlated with geopolitical events — ramping up scanning during the US government shutdown and after the Venezuelan president's capture.

🚨Action: Patch your Exchange, SAP, and Atlassian instances. Be extremely cautious with emails linking to file hosting services.

~Cipherceval

CVSS Update
🔓 BeyondTrust CVE-2026-1731: CVSS 9.9 Pre-Auth RCE

BeyondTrust has disclosed a critical vulnerability in its Remote Support and Privileged Remote Access products. CVE-2026-1731 scores a CVSS 9.9 — it's an OS command injection flaw (CWE-78) that requires no authentication, no user interaction, and no prior access. An attacker sends a crafted request and gets full operating system command execution.

Approximately 11,000 instances are exposed to the internet, with ~8,500 on-premises deployments potentially vulnerable. This was discovered using AI-enabled variant analysis by researcher Harsh Jaiswal and the Hacktron AI team. BeyondTrust has patched SaaS customers, but self-hosted instances need manual patches (BT26-02-RS or BT26-02-PRA).

Remember: BeyondTrust was previously exploited by Silk Typhoon (Chinese state-backed) to breach the US Treasury. When BeyondTrust has a vulnerability, threat actors pay attention.

🚨 Action: If you run BeyondTrust, update immediately. A patch does you no good if it isn't installed.

~Cipherceval

Targeted Attacks
📱 Signal Phishing: Hijacking Accounts Without Malware

Germany's BfV and BSI have issued a joint advisory about a state-sponsored campaign targeting Signal users — specifically politicians, military officials, diplomats, and journalists across Europe. No malware. No zero-days. The attackers abuse Signal's own legitimate features.

Two methods: (1) Fake "Signal Support" messages requesting your PIN, and (2) malicious QR codes disguised as group invitations that silently link the attacker's device to your account. The tactics align with Russian-linked groups Star Blizzard, UNC5792, and UNC4221. The same technique extends to WhatsApp.

🚨 Action: Never share your PIN. Enable Registration Lock (Settings → Account). Review linked devices (Settings → Linked Devices) and remove anything you don't recognize.

~Cipherceval

CISA
🛡️ CISA BOD 26-02: Rip Out End-of-Life Edge Devices

CISA issued Binding Operational Directive 26-02, ordering federal civilian agencies to eliminate end-of-support edge devices — firewalls, routers, switches, WAPs, load balancers, and IoT devices that no longer receive security updates. The timeline: immediate updates, 3-month inventory, 12-month decommission, 18-month full replacement, 24-month continuous discovery.

While this technically only applies to federal agencies, CISA's acting director made it clear: unsupported devices should never remain on enterprise networks. If your edge devices can't be updated, it's time to replace them.

🚨 Action: Audit your network perimeter. If it's end-of-life, it's an open invitation.

~Cipherceval

Ransomware
📦 Iron Mountain vs. Everest: Claims vs. Reality

The Everest ransomware gang claimed a 1.4TB breach of Iron Mountain — the S&P 500 company guarding data for 95% of Fortune 1000 companies. Iron Mountain's response: a single compromised credential accessed one folder on a third-party file-sharing site containing primarily marketing materials. No ransomware deployed, no core systems breached, no customer data involved.

🚨 Action: Enforce MFA everywhere. Verify before you panic.

~Cipherceval

🎯 5 Key Takeaways

1. Nation-state espionage is at unprecedented scale — patch your public-facing appliances.

2. Update BeyondTrust immediately — CVE-2026-1731 is the golden goose of vulnerabilities.

3. Encryption doesn't protect you from social engineering — review your linked devices.

4. End-of-life devices are open invitations — if you can't update it, replace it.

5. Verify before you panic — ransomware groups exaggerate to maximize payouts.

🎧 Watch/Listen to the Full Episode

Catch the full breakdown on YouTube, Spotify, or Apple Podcasts — search "Exploit Brokers by Forgebound Research."

Found this valuable? Forward it to someone who touches a computer.

tl;dr sec

tl;dr sec

The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.

The Rundown AI

The Rundown AI

Get the latest AI news and learn how to use it to get ahead in your work and life. Join 2,000,000+ readers from companies like Apple, OpenAI, and NASA.

Unsupervised Learning

Unsupervised Learning

Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.

ByteSize

ByteSize

Your Weekly Dose of IT Intelligence.

Stay vigilant, stay curious, and update your stuff.
— Cipherceval / Forgebound Research

Keep Reading