<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>LockBit — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/lockbit/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Feb 2026 09:22:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/lockbit/feed.xml" rel="self" type="application/rss+xml"/><item><title>Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)</title><link>https://feed.craftedsignal.io/briefs/2026-02-activemq-rce/</link><pubDate>Wed, 25 Feb 2026 09:22:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-activemq-rce/</guid><description>CVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.</description><content:encoded>&lt;p>CVE-2023-46604 is a critical remote code execution (RCE) vulnerability affecting Apache ActiveMQ message brokers. This vulnerability allows a remote attacker with network access to the ActiveMQ broker to execute arbitrary shell commands by manipulating serialized class types within the OpenWire protocol. The vulnerability affects Apache ActiveMQ versions 5.16.0 before 5.16.7, 5.17.0 before 5.17.6, 5.18.0 before 5.18.3, and before 5.15.16, as well as corresponding versions of the Legacy OpenWire…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>activemq</category><category>rce</category><category>cve-2023-46604</category><category>ransomware</category></item></channel></rss>