Cyber Threat Briefing

PUBLISHED 18 May 2026, 04:01 UTC
CLASSIFICATION TLP:CLEAR
AUTO-GENERATED PureTensor Cyber Intelligence
3
Critical CVEs
5
High CVEs
2
KEV Added
0
New IOCs
0
Malware Samples
1
Active C2s
CRITICAL

DELTA — CHANGES SINCE LAST BRIEFING

THREAT LEVEL ASSESSMENT

The overall threat environment remains CRITICAL. Multiple actively exploited vulnerabilities in Microsoft Exchange and Cisco SD‑WAN, combined with ongoing exploitation of web platforms, router firmware flaws, and continued activity from major malware families (notably QakBot), create elevated systemic risk. Active supply‑chain compromises (e.g., node‑ipc, TanStack) and widespread exploitation of WordPress plugins further expand attack surface exposure across enterprises and SMBs. Immediate patching and network-level mitigations are strongly advised.

CRITICAL VULNERABILITIES

CVE Product CVSS Status Impact
CVE-2018-25320 ACL Analytics 11.x–13.0.0.579 9.8 Public exploitation technique available Arbitrary code execution via EXECUTE abuse; enables scripted malware fetch and SYSTEM-level execution.
CVE-2018-25332 GitBucket 4.23.1 9.8 Public exploit methodology known Unauthenticated RCE via weak token generation and malicious plugin upload.
CVE-2018-25335 WordPress Peugeot Music Plugin 1.0 9.8 Public exploit known Arbitrary file upload enabling direct server compromise.
CVE-2026-42897 Microsoft Exchange Server n/a Active exploitation (CISA KEV) XSS via crafted email enabling code execution paths and mailbox compromise.
CVE-2026-20182 Cisco Catalyst SD-WAN Controller n/a Active exploitation (CISA KEV) Authentication bypass enabling full administrative takeover.

ACTIVE EXPLOITS & KEV

CVE Vendor/Product Added to KEV Remediation Due Status
CVE-2026-42897 Microsoft Exchange Server 2026‑05‑15 2026‑05‑29 Active exploitation confirmed
CVE-2026-20182 Cisco Catalyst SD‑WAN Controller 2026‑05‑14 2026‑05‑17 Active exploitation confirmed

MALWARE & THREAT ACTORS

QakBot: Feodo Tracker reports an active C2 node at 50.16.16.211:443. QakBot remains a major credential‑harvesting, lateral‑movement, and ransomware staging platform. Active infrastructure indicates ongoing campaigns targeting enterprise email and financial systems.

Turla / Secret Blizzard: Kazuar backdoor has evolved into a modular P2P botnet enabling stealthy C2, long‑term persistence, and decentralized command distribution. Increased resilience reduces detectability of nation‑state espionage activity.

Supply Chain Threats: Compromise of the node‑ipc NPM package and the TanStack toolchain incident impacting OpenAI employee devices demonstrate persistent targeting of developer ecosystems. Malicious package injection continues to be a high‑impact attack vector.

CYBER NEWS DIGEST

NGINX CVE‑2026‑42945 exploited in the wild (The Hacker News): A newly disclosed NGINX Plus/Open vulnerability is already under active exploitation, causing worker crashes and enabling potential RCE. The rapid weaponization underscores aggressive adversary monitoring of web‑server patch cycles.

Grafana GitHub token breach (The Hacker News): Attackers obtained a GitHub access token allowing full codebase downloads and leveraged the access for extortion. While no production systems were breached, the incident highlights risks associated with source‑code exfiltration and supply‑chain pivoting.

Funnel Builder WordPress plugin exploited for checkout skimming (The Hacker News): Attackers are injecting malicious JavaScript into WooCommerce checkout flows via a critical plugin vulnerability. This represents a major risk for e‑commerce credit‑card theft at scale.

Windows “MiniPlasma” zero‑day (Bleeping Computer): A public proof‑of‑concept for a Windows privilege‑escalation zero‑day enabling SYSTEM‑level compromise on fully patched systems heightens endpoint risk until Microsoft issues a fix.

Kazuar transformed into a modular P2P botnet (Bleeping Computer / The Hacker News): Russian state‑linked operators have upgraded Kazuar into a resilient, distributed botnet with advanced persistence mechanisms, signaling ongoing expansion of long‑term espionage tooling.

Canvas outage tied to extortion attack (Krebs on Security): A widespread disruption affecting U.S. schools resulted from a data‑extortion incident against the Canvas education platform, demonstrating increasing targeting of critical education infrastructure.

CISA highlights Exchange and SD‑WAN exploitation (CISA Alerts): New KEV entries confirm active exploitation of Microsoft Exchange CVE‑2026‑42897 and Cisco SD‑WAN CVE‑2026‑20182, both enabling high‑impact compromise of enterprise messaging and network control environments.

Secret Blizzard DDoS and router‑abuse campaigns (Krebs on Security): Russian operations continue leveraging compromised routers for token theft and botnet expansion, emphasizing persistent infrastructure‑level targeting of enterprise users.

Previous Briefings

DateBriefing
2026-05-18 03:00 UTC Cyber Threat Briefing — 2026-05-18 03:00 UTC
2026-05-18 02:00 UTC Cyber Threat Briefing — 2026-05-18 02:00 UTC
2026-05-18 01:00 UTC Cyber Threat Briefing — 2026-05-18 01:00 UTC
2026-05-18 00:00 UTC Cyber Threat Briefing — 2026-05-18 00:00 UTC
2026-05-17 23:00 UTC Cyber Threat Briefing — 2026-05-17 23:00 UTC
2026-05-17 22:00 UTC Cyber Threat Briefing — 2026-05-17 22:00 UTC
2026-05-17 21:00 UTC Cyber Threat Briefing — 2026-05-17 21:00 UTC
2026-05-17 20:00 UTC Cyber Threat Briefing — 2026-05-17 20:00 UTC
2026-05-17 19:00 UTC Cyber Threat Briefing — 2026-05-17 19:00 UTC
2026-05-17 18:00 UTC Cyber Threat Briefing — 2026-05-17 18:00 UTC
2026-05-17 17:00 UTC Cyber Threat Briefing — 2026-05-17 17:00 UTC
2026-05-17 16:00 UTC Cyber Threat Briefing — 2026-05-17 16:00 UTC
2026-05-17 15:00 UTC Cyber Threat Briefing — 2026-05-17 15:00 UTC
2026-05-17 14:00 UTC Cyber Threat Briefing — 2026-05-17 14:00 UTC
2026-05-17 13:00 UTC Cyber Threat Briefing — 2026-05-17 13:00 UTC
2026-05-17 12:00 UTC Cyber Threat Briefing — 2026-05-17 12:00 UTC
2026-05-17 11:00 UTC Cyber Threat Briefing — 2026-05-17 11:00 UTC
2026-05-17 10:00 UTC Cyber Threat Briefing — 2026-05-17 10:00 UTC
2026-05-17 09:00 UTC Cyber Threat Briefing — 2026-05-17 09:00 UTC
2026-05-17 08:00 UTC Cyber Threat Briefing — 2026-05-17 08:00 UTC
2026-05-17 07:00 UTC Cyber Threat Briefing — 2026-05-17 07:00 UTC
2026-05-17 06:00 UTC Cyber Threat Briefing — 2026-05-17 06:00 UTC
2026-05-17 05:00 UTC Cyber Threat Briefing — 2026-05-17 05:00 UTC
2026-05-17 04:00 UTC Cyber Threat Briefing — 2026-05-17 04:00 UTC
2026-05-17 03:00 UTC Cyber Threat Briefing — 2026-05-17 03:00 UTC
2026-05-17 02:00 UTC Cyber Threat Briefing — 2026-05-17 02:00 UTC
2026-05-17 01:00 UTC Cyber Threat Briefing — 2026-05-17 01:00 UTC
2026-05-17 00:00 UTC Cyber Threat Briefing — 2026-05-17 00:00 UTC
2026-05-16 23:00 UTC Cyber Threat Briefing — 2026-05-16 23:00 UTC