The Threat Signal created by the FortiGuard Labs is intended to provide you with insight on emerging issues that are trending within the cyber threat landscape. The Threat Signal will provide concise technical details about the issue, mitigation recommendations and a perspective from the FortiGuard Labs team in an FAQ style format.
|
What is the Attack? |
A newly disclosed vulnerability, CVE-2026-32202, has emerged due to an incomplete patch by Microsoft for a previously exploited remote code execution flaw (CVE-2026-21510). While the original update addressed both RCE and SmartScreen bypass, it failed to eliminate a residual zero-click NTLM authentication coercion issue. This allows attackers to silently force a victim system to authenticate against a malicious server without user interaction.
|
|
What is the recommended Mitigation? |
Mitigation & Recommendations
Detection Opportunities
|
|
What FortiGuard Coverage is available? |
• FortiGuard Intrusion Prevention System (IPS) Service: FortiGuard IPS provides coverage to detect and block exploitation attempts targeting CVE-2026-32202.
Intrusion Prevention | FortiGuard Labs
• FortiGuard Endpoint Vulnerability Service provides a systematic and automated method of patching, eliminating manual processes while reducing the attack surface for CVE-2026-21510, CVE-2026-21513, and CVE-2026-32202
.
|
|
What is the Vulnerability? |
CVE-2026-34197 is a high-severity remote code execution (RCE) vulnerability affecting Apache ActiveMQ Classic. The flaw resides in the exposed Jolokia JMX-HTTP interface and allows attackers to execute arbitrary commands on the underlying system via crafted broker management requests.
|
|
What is the recommended Mitigation? |
• Immediate Actions: Upgrade to:
|
|
What FortiGuard Coverage is available? |
• FortiGuard Intrusion Prevention System (IPS) Service: FortiGuard IPS Service is available to detect and block exploit attempts targeting CVE-2026-34197. • FortiGuard Antivirus & Behavior Detection: Protects against known malware and leverages advanced behavioral analysis to detect suspicious activity, including abnormal process execution originating from exploited ActiveMQ services. • FortiGuard Incident Response: Organizations that suspect exposure or compromise involving vulnerable Apache ActiveMQ instances should engage FortiGuard Incident Response for rapid investigation, containment, and remediation. • FortiGuard Web Filtering: Prevent access to malicious payload hosting. |
|
What is the Attack? |
Microsoft Threat Intelligence has identified Storm-1175, a financially motivated threat actor conducting high-tempo ransomware operations leveraging the Medusa ransomware variant. The group specializes in rapidly exploiting vulnerable web-facing systems, often weaponizing newly disclosed vulnerabilities (N-days) and even zero-days before public disclosure.
Storm-1175 | Medusa ransomware operations | Microsoft Security Blog
|
|
What is the recommended Mitigation? |
• Patch immediately: Prioritize newly disclosed vulnerabilities affecting internet-facing systems
|
|
What FortiGuard Coverage is available? |
• FortiGuard IPS Service: Detects and blocks exploit attempts targeting vulnerable web-facing assets.
|
|
What is the Attack? |
Operation TrueChaos is a targeted cyber espionage campaign exploiting a zero-day vulnerability in the TrueConf video conferencing platform. The campaign primarily targets government entities in Southeast Asia by replacing a legitimate update with a malicious one. Threat actors effectively weaponized the product’s trusted update mechanism, transforming it into a covert malware distribution channel.
|
|
What is the recommended Mitigation? |
|
|
What FortiGuard Coverage is available? |
|
|
What is the Attack? |
A software supply chain attack targeted the widely used JavaScript library Axios after an attacker reportedly compromised a maintainer’s npm account and published malicious package versions 1.14.1 and 0.30.4. These versions introduced a concealed dependency, plain-crypto-js@4.2.1, which executed during installation and deployed a cross-platform remote access trojan (RAT). Axios is a widely adopted HTTP client for both browser and Node.js environments, with more than 100 million weekly downloads and extensive use across:
- Web applications
The malicious versions were available for approximately 2–3 hours before being removed. Any system that executed npm install during that period and retrieved the affected versions should be treated as potentially fully compromised.
This is a high-impact software supply chain compromise that abused a trusted package distribution channel. By using a hidden dependency and install-time execution, the attacker enabled automated compromise at scale, with particular risk to developer workstations, build servers, and software delivery pipelines.
|
|
What is the recommended Mitigation? |
To mitigate this vulnerability, users of affected packages should immediately downgrade to safe versions and audit their environments for indicators of compromise. Treat affected systems as fully compromised and perform the following actions:
|
|
What FortiGuard Coverage is available? |
|
|
What is the Attack? |
Researchers from Google Threat Intelligence Group identified DarkSword, a sophisticated full-chain iOS exploit framework actively used by multiple surveillance vendors and suspected state-sponsored actors. Observed since at least November 2025, the exploit has been deployed in targeted campaigns across Saudi Arabia, Turkey, Malaysia, and Ukraine, enabling silent compromise of iOS devices and delivery of post-exploitation malware.
|
|
What is the recommended Mitigation? |
|
|
What FortiGuard Coverage is available? |
• FortiGuard Incident Response: Organizations that suspect compromise of iOS devices via the DarkSword exploit chain should engage FortiGuard Incident Response for rapid investigation, containment, forensic analysis, and recovery support. Focus areas include identification of exploit-triggering web activity, analysis of post-exploitation malware (GHOSTBLADE, GHOSTKNIFE, GHOSTSABER), validation of device compromise scope, and detection of potential data exfiltration or persistent surveillance mechanisms.
|
|
What is the Attack? |
A large-scale cyberattack against medical technology company Stryker resulted in widespread system outages. The attack was driven by a destructive wiper campaign attributed to Iran-linked threat actors, including the hacktivist group Handala.
|
|
What is the recommended Mitigation? |
• Harden endpoint management configurations (Intune and equivalents).
|
|
What FortiGuard Coverage is available? |
• FortiGuard Incident Response: Organizations that suspect compromise of endpoint management infrastructure (e.g., Microsoft Intune or equivalent platforms) should engage FortiGuard Incident Response for rapid investigation, containment, forensic analysis, and recovery support. Focus areas include privileged account abuse, unauthorized policy deployment, and potential destructive actions across managed endpoints.
|
|
What are the Vulnerabilities? |
Ivanti disclosed two vulnerabilities, CVE-2025-0282 and CVE-2025-0283, impacting Ivanti Connect Secure (“ICS”) VPN appliances. CVE-2025-0282 is an unauthenticated stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. Successful exploitation could result in unauthenticated remote code execution and CVE-2025-0283 is a stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 that allows a local authenticated attacker to escalate their privileges.
|
|
What is the recommended Mitigation? |
|
|
What FortiGuard Coverage is available? |
|
|
What is the Attack? |
The attack involves the threat cluster UNC6201 (a suspected China-nexus Advanced Persistent Threat (APT)) actively exploiting a critical zero-day vulnerability in Dell’s RecoverPoint for Virtual Machines platform. The flaw (CVE-2026-22769) stems from hard-coded credentials embedded within the appliance, allowing unauthenticated remote attackers to gain administrative access. Because RecoverPoint is a disaster recovery and backup solution, successful exploitation gives attackers high-value access to core infrastructure systems that often sit deep inside enterprise networks.
|
|
What is the recommended Mitigation? |
• Immediately upgrade vulnerable instances of Dell RecoverPoint for Virtual Machines to the fixed release. Dell has released remediations for CVE-2026-22769, and customers are urged to follow the guidance in the official Security Advisory.
DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability | Dell US
|
|
What FortiGuard Coverage is available? |
• FortiGuard Labs is actively monitoring exploitation activity associated with the UNC6201 campaign targeting Dell RecoverPoint for VM. The team continues to track evolving attacker infrastructure, tooling, and tactics, and will provide ongoing intelligence updates, newly identified indicators, and protection guidance as the situation develops.
|
|
What is the Vulnerability? |
A Local File Inclusion (LFI) vulnerability (CVE-2025-68645) exists in the Zimbra Collaboration Suite (ZCS) Webmail Classic UI due to improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft malicious requests, potentially exposing sensitive configuration and application data and aiding further compromise.
|
|
What is the recommended Mitigation? |
• Apply vendor patches immediately for all affected ZCS versions (Zimbra Collaboration (ZCS) 10.0 – 10.0.17- Zimbra Collaboration (ZCS) 10.1.0 – 10.1.12), and Fixed versions are 10.0.18 and 10.1.13.
|
|
What FortiGuard Coverage is available? |
• FortiGuard Intrusion Prevention System (IPS) Service: FortiGuard IPS Service is available to detect and block exploit attempts targeting CVE-2025-68645.
Intrusion Prevention | FortiGuard Labs
|