{"id":377888,"date":"2026-04-06T13:09:15","date_gmt":"2026-04-06T13:09:15","guid":{"rendered":"https:\/\/www.newsbeep.com\/il\/377888\/"},"modified":"2026-04-06T13:09:15","modified_gmt":"2026-04-06T13:09:15","slug":"6th-april-threat-intelligence-report","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/il\/377888\/","title":{"rendered":"6th April \u2013 Threat Intelligence Report"},"content":{"rendered":"<p>For the latest discoveries in cyber research for the week of 30th March, please download our <a href=\"https:\/\/research.checkpoint.com\/wp-content\/uploads\/2026\/04\/Threat_Intelligence_News_2026-04-06.pdf\" rel=\"nofollow noopener\" target=\"_blank\">Threat Intelligence Bulletin.<\/a><\/p>\n<p>TOP ATTACKS AND BREACHES<\/p>\n<p>The European Commission, the European Union\u2019s executive body, has <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-commission-confirms-data-breach-after-europaeu-hack\/\" rel=\"nofollow noopener\" target=\"_blank\">confirmed<\/a> a data breach after its Europa.eu platform was compromised through a third-party exchange linked to the Trivy supply chain attack. The incident affected at least one Amazon Web Services account and resulted in data theft, while websites and internal systems remained operational.<br \/>\nGlobal toys and games manufacturing giant Hasbro has <a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/toying-around-hasbro-attack-remediate\" rel=\"nofollow noopener\" target=\"_blank\">disclosed<\/a> a cyberattack after detecting unauthorized access to its network on March 28. Some systems were taken offline, and the company warned that recovery could take weeks and cause delays.<br \/>\nCryptocurrency trading platform Drift Protocol on Solana has\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/drift-loses-280-million-as-hackers-seize-security-council-powers\/\" rel=\"nofollow noopener\" target=\"_blank\">suffered<\/a> a major breach after an attacker gained enough Security Council approvals to execute pre-signed transactions on April 1. Drift said roughly $280 million was affected, froze platform activity, and stated the incident did not involve a smart contract flaw or seed phrase compromise.<br \/>\nLuxury camping providers Roan and Eurocamp have\u00a0<a href=\"https:\/\/cybernews.com\/security\/roan-eurocamp-data-breach-tourists-whatsapp-scams\/\" rel=\"nofollow noopener\" target=\"_blank\">experienced<\/a> a data breach that exposed guest names, email addresses, phone numbers, travel destinations, booking dates, and prices. Attackers are using the stolen data in WhatsApp payment scams, while the companies said the flaw was patched and no passwords or payment data were taken.<\/p>\n<p>AI THREATS<\/p>\n<p>Check Point Research\u00a0<a href=\"https:\/\/research.checkpoint.com\/2026\/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime\/\" rel=\"nofollow noopener\" target=\"_blank\">demonstrated<\/a> a hidden outbound channel in ChatGPT\u2019s execution runtime that enabled silent exfiltration of user data. A single malicious prompt or a backdoored GPT could transmit chat content and uploaded files to attackers through DNS.<br \/>\nCheck Point <a href=\"https:\/\/blog.checkpoint.com\/artificial-intelligence\/claude-mythos-wake-up-call-what-ai-vulnerability-discovery-means-for-cyber-defense\/\" rel=\"nofollow noopener\" target=\"_blank\">warns<\/a> that based on leaked details about Anthropic\u2019s Claude \u201cMythos\u201d, the model will likely accelerate vulnerability discovery, exploit development, and multi-step attack automation. The new capabilities could sharply reduce time to exploit and make advanced offensive techniques more broadly accessible.<br \/>\nResearchers\u00a0<a href=\"https:\/\/cybernews.com\/ai-news\/research-major-flaws-ai-agents-pretend-owner\/\" rel=\"nofollow noopener\" target=\"_blank\">examined<\/a> six AI agents and found that impersonation and fabricated urgency can push them to disclose data or take harmful actions. In testing, an agent forwarded 124 emails containing personal and financial details, while others deleted files and reassigned admin access.<br \/>\nResearchers\u00a0<a href=\"https:\/\/cybersecuritynews.com\/google-clouds-vertex-ai-platform-vulnerability\/\" rel=\"nofollow noopener\" target=\"_blank\">observed<\/a> a flaw in Google Cloud\u2019s Vertex AI Agent Engine that could let attackers extract service agent credentials and pivot into customer projects. The exposed privileges enabled access to storage and Artifact Registry resources, and permissive OAuth scopes also increased the risk of wider Google Workspace exposure.<\/p>\n<p>VULNERABILITIES AND PATCHES<\/p>\n<p>Cisco\u00a0<a href=\"https:\/\/cybersecuritynews.com\/cisco-imc-vulnerability-2\/\" rel=\"nofollow noopener\" target=\"_blank\">released<\/a> urgent fixes for CVE-2026-20093, a critical authentication bypass in its Integrated Management Controller software used across ENCS 5000, Catalyst 8300 uCPE, and UCS C-Series M5 and M6 servers. Remote attackers can reset any account, including Admin, allowing full device takeover.<br \/>\nResearchers\u00a0<a href=\"https:\/\/cybersecuritynews.com\/chrome-0-day-flaw-exploited\/\" rel=\"nofollow noopener\" target=\"_blank\">discovered<\/a> CVE-2026-5281, a zero-day memory flaw in Chrome\u2019s WebGPU component, Dawn, that also impacts Edge, Brave, Opera, and other Chromium-based browsers. The vulnerability is being actively exploited and can enable code execution on user systems, prompting inclusion in CISA\u2019s Known Exploited Vulnerabilities catalog.<br \/>\nProgress has\u00a0<a href=\"https:\/\/www.securityweek.com\/critical-sharefile-flaws-lead-to-unauthenticated-rce\/\" rel=\"nofollow noopener\" target=\"_blank\">addressed<\/a> two critical ShareFile vulnerabilities, including CVE-2026-2699 with a CVSS score of 9.8, that can be chained for unauthenticated remote code execution. The flaws let attackers reach restricted configuration pages and upload arbitrary files to the server without logging in to affected installations.<br \/>\nF5\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-14-000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\">reclassified<\/a> CVE-2025-53521, a BIG-IP Access Policy Manager vulnerability, as a critical remote code execution flaw under active exploitation. More than 14,000 internet-exposed systems were still visible online, and the company published indicators of compromise and rebuild guidance for affected devices.<\/p>\n<p>THREAT INTELLIGENCE REPORTS<\/p>\n<p>Check Point Research has\u00a0<a href=\"https:\/\/research.checkpoint.com\/2026\/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets\/\" rel=\"nofollow noopener\" target=\"_blank\">unmasked<\/a> TrueChaos, a campaign exploiting a 0-day vulnerability (CVE-2026-3502) in TrueConf\u2019s on-premises update process to push malicious updates to Southeast Asian government networks. Attackers delivered Havoc payloads through trusted servers, and the activity was assessed with moderate confidence as being affiliated with a Chinese nexus.<br \/>\nCheck Point Research have\u00a0<a href=\"https:\/\/blog.checkpoint.com\/research\/iran-nexus-password-spray-campaign-targeting-cloud-environments-with-a-focus-on-the-middle-east\/\" rel=\"nofollow noopener\" target=\"_blank\">outlined<\/a> an Iran-nexus password-spraying campaign against Microsoft 365 in the Middle East, conducted in three waves during March. The activity focused on Israel and the UAE, targeting municipalities and using Tor and VPN infrastructure to evade geofencing and complicate attribution.<br \/>\nCheck Point Research have\u00a0<a href=\"https:\/\/blog.checkpoint.com\/research\/tax-season-2026-how-cyber-criminals-are-preparing-their-attacks-months-in-advance\/\" rel=\"nofollow noopener\" target=\"_blank\">uncovered<\/a> coordinated tax-season phishing and malware activity, with hundreds of newly registered tax-themed domains and rising risk levels. In March 2026, one in ten new domains was flagged as risky, while IRS-impersonating sites harvested personal data and Spain-themed emails delivered malware loaders.<br \/>\nResearchers\u00a0<a href=\"https:\/\/securityaffairs.com\/190221\/security\/attackers-hijack-axios-npm-account-to-spread-rat-malware.html\" rel=\"nofollow noopener\" target=\"_blank\">documented<\/a> a supply chain compromise of the Axios npm package, a widely used HTTP client with millions of monthly downloads, that briefly pushed malicious releases delivering a remote access trojan. The tampered versions used a hidden dependency to fetch a second-stage payload and erase traces after installation.<\/p>\n","protected":false},"excerpt":{"rendered":"For the latest discoveries in cyber research for the week of 30th March, please download our Threat Intelligence&hellip;\n","protected":false},"author":2,"featured_media":377889,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[114,85,46],"class_list":{"0":"post-377888","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"tag-business","9":"tag-il","10":"tag-israel"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/377888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/comments?post=377888"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/377888\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media\/377889"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media?parent=377888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/categories?post=377888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/tags?post=377888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}