March 2026 (30)
EmEditor Supply Chain Compromise Delivering Infostealer
2 rules 1 TTPA trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.
Entra ID Federated Identity Credential Issuer Modified
2 rules 2 TTPsModification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.
DarkSword iOS Exploit Kit Targeting iOS Devices
2 rules 3 TTPsThe DarkSword exploit kit targets iOS devices, leveraging unknown vulnerabilities to compromise devices.
NetNTLM Hash Phishing via Archive Extraction (CVE-2025-59284)
2 rules 1 TTPA phishing technique, potentially still viable due to incomplete patching, allows attackers to obtain NetNTLM hashes from archive extraction on Windows systems (CVE-2025-59284).
SOC Analyst Toolkit with Threat Hunting Queries
2 rules 1 TTP 2 IOCsA free, offline SOC toolkit aimed at Tier 1 analysts includes IR checklists, triage playbooks, and threat hunting guides mapped to MITRE ATT&CK, with Splunk and Elastic queries for threats such as Kerberoasting, Pass-the-Hash, LOLBAS, scheduled task persistence, and C2 on non-standard ports.
Credential Guard Bypass and Detection Strategies
2 rules 2 TTPs 1 IOCThis brief covers offensive techniques to bypass Credential Guard, a Windows security feature designed to protect credentials, and provides detection strategies for these bypass attempts.
Self-Hosted Email Threat Detection Tool
2 rulesA user created a self-hosted email threat detection tool, named VerdictMail, employing IMAP IDLE for real-time monitoring and multi-stage enrichment via SPF, DKIM, DMARC, DNSBL, WHOIS, URLhaus, and VirusTotal, coupled with an LLM for threat assessment.
Angular Cross-Site Scripting (XSS) Vulnerability
2 rules 5 TTPsA cross-site scripting (XSS) vulnerability exists in Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, allowing attackers to execute arbitrary code within the context of the vulnerable application, potentially leading to session hijacking, data exfiltration, and unauthorized actions.
Iranian Botnet Operation Exposed via Open Directory
1 rule 1 TTP 1 IOCAn Iranian botnet operation utilizing a 15-node relay network and active C2 infrastructure was exposed through an open directory.
Azure Service Principal Sign-In Followed by Arc Cluster Credential Access
2 rules 2 TTPsDetects a service principal authenticating to Microsoft Entra ID and then listing credentials for an Azure Arc-connected Kubernetes cluster within a short time window, indicating potential unauthorized access to Kubernetes clusters via stolen service principal secrets.
GlassWorm Threat: DLL Injection and Chrome Hijacking
2 rules 2 TTPsThe GlassWorm threat involves DLL injection and Chrome hijacking via COM abuse, confirming a full supply chain loop, potentially leading to data theft and system compromise.
CrackArmor: AppArmor Flaws Enable Local Privilege Escalation
2 rules 1 TTPQualys discovered critical vulnerabilities in AppArmor, enabling local privilege escalation to root on vulnerable Linux systems.
Persistnux - Linux Persistence Detection Tool
3 rules 3 TTPsPersistnux is a bash-based tool designed to identify known Linux persistence mechanisms used by attackers to maintain access to compromised systems, generating detailed reports for DFIR analysis.
HushSpec: Security Policy Specification for AI Agent Action Boundaries
2 rules 1 TTP 1 IOCHushSpec is an open specification under development to standardize security policies at the action boundary of AI agents, focusing on actions such as file access, network egress, and shell execution, aiming to create a portable and engine-agnostic policy layer.
Stealthy WMI Lateral Movement via StealthyWMIExec.py
2 rules 1 TTPThe StealthyWMIExec.py script facilitates lateral movement via WMI, potentially evading standard detection mechanisms by employing stealthy techniques.
GlassWorm Campaign Deploying Wave 3 Windows Payload
2 rules 2 TTPsThe GlassWorm campaign has been observed deploying a Wave 3 Windows payload, indicating ongoing malicious activity targeting Windows systems.
JPCERT/CC Study on Reverse Engineering Rust Binaries
2 rulesJPCERT/CC published a study on the reverse engineering of binaries created with the Rust programming language, providing insights for malware analysis and detection engineering.
Mirai C2 Remote Denial-of-Service Vulnerability (CVE-2024-45163)
2 rules 1 TTPCVE-2024-45163 is a remote denial-of-service vulnerability affecting Mirai command and control (C2) infrastructure, potentially disrupting botnet operations and related malicious activities.
Unscoped API Keys in AI Agent Frameworks
2 rules 1 TTP 2 IOCsA research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.
PylangGhost RAT Observed on npm Registry
2 rules 1 TTPA new remote access trojan (RAT) named PylangGhost has been observed on the npm registry, posing a supply chain risk to developers and applications using affected packages.
Maltrail IOC Feed Update for Multiple Threats
3 rules 6 TTPs 40 IOCsThis brief summarizes IOCs extracted from the Maltrail feed on March 15, 2026, covering domains and URLs associated with threats targeting macOS and Android platforms, including OSX_Atomic, FakeApp, Android_Joker, Lummack2, APT_Sidewinder, APT_Kimsuky, and Hak5Cloud_C2.
Fileless Multi-Stage Remcos RAT via Phishing
2 rules 4 TTPsA fileless multi-stage Remcos RAT is delivered via phishing, achieving memory-resident execution, but specific technical details are not provided in this brief.
Malware Spreading Through Fake 'Claude Code' Google Ads
2 rules 1 TTPMalware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.
Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories
3 rules 4 TTPs 1 IOCThe Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.
GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis
2 rules 2 TTPsAnalysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.
Phishing Campaign Abusing Google Cloud Storage Redirectors
2 rules 1 TTP 2 IOCsA phishing campaign leverages Google Cloud Storage as a redirect layer to serve victims scam pages related to surveys, giveaways, rewards, alerts, and job lures, primarily hosted on .autos domains.
Multiple Network Intrusion Attempts Detected
3 rules 2 TTPs 8 IOCsMultiple network-based intrusion attempts were detected on 2026-03-14, targeting PHP information exposure, Fortigate VPN exploitation, sensitive file access, and credential exposure.
CISA Adds Google Skia and Chromium V8 Vulnerabilities to KEV Catalog
2 rules 3 TTPsCISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, highlighting the need for timely remediation.
Multiple Critical Vulnerabilities in Veeam Backup & Replication Allow Remote Code Execution
2 rules 3 TTPsMultiple critical vulnerabilities in Veeam Backup & Replication, including CVE-2026-21666, CVE-2026-21668, CVE-2026-21669, CVE-2026-21670, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708, allow for remote code execution, privilege escalation, and arbitrary file manipulation by authenticated users, potentially leading to a complete compromise of the backup infrastructure.
KRVTZ-NET IDS Alerts Analysis: Network Scanning and Exploitation Attempts
3 rules 4 TTPsMultiple IDS alerts indicate potential network reconnaissance, vulnerability exploitation attempts targeting Fortigate VPN (CVE-2023-27997), and ColdFusion servers originating from various IP addresses on March 13, 2026.