18th May – Threat Intelligence Report
This threat intelligence report highlights a surge in ransomware activity, critical zero-day vulnerabilities in Windows, and the active exploitation of Cisco Catalyst SD-WAN controllers. Additionally, it details emerging AI-driven threats, including malicious Hugging Face repositories and the abuse of AI website generators for phishing, alongside an APT intrusion by FamousSparrow targeting the energy sector.
Authors: Check Point Research
Source:Check Point
- cve
- cve
- cve
- cve
Detection / HunterGoogle
What Happened
Several major companies, including Vodafone and Foxconn, recently suffered data breaches and ransomware attacks. At the same time, hackers are exploiting new vulnerabilities in popular software like Windows, Cisco, and Apple devices, while also using AI tools to create fake websites and hide malicious programs. These attacks can lead to stolen data, financial loss, and disrupted business operations. Organizations should urgently apply available security updates, especially for Cisco and Apple products, and remain vigilant against fake websites and suspicious software downloads.
Key Takeaways
- Multiple high-profile ransomware and extortion attacks impacted Vodafone, Foxconn, and West Pharmaceutical Services.
- Critical, actively exploited vulnerabilities were disclosed, including Cisco Catalyst SD-WAN (CVE-2026-20182) and two unpatched Windows zero-days (YellowKey, GreenPlasma).
- Threat actors are increasingly leveraging AI platforms, such as Vercel's v0.dev for phishing and malicious Hugging Face repositories for infostealers.
- The FamousSparrow APT targeted an Azerbaijani oil and gas company using Microsoft Exchange exploits to deploy Deed RAT and TernDoor.
Affected Systems
- Windows 11
- Windows Server
- macOS 26.4.1 (M5 chips)
- Apple iOS and iPadOS
- Cisco Catalyst SD-WAN controllers
- F5 NGINX (versions 0.6.27 through 1.30.0)
- Microsoft Exchange
- OpenClaw AI platform
Vulnerabilities (CVEs)
- CVE-2026-44112
- CVE-2026-42945
- CVE-2026-20182
- CVE-2026-28819
Attack Chain
Threat actors are utilizing a variety of initial access vectors, including unpatched vulnerabilities in Microsoft Exchange, Cisco, and Fortinet devices, as well as NTLM relay attacks and compromised third-party development software. Following initial access, attackers deploy web shells, infostealers, or remote access trojans like Deed RAT and TernDoor to establish persistence and harvest credentials. In ransomware and extortion campaigns, this access is leveraged to exfiltrate sensitive data and deploy encryption payloads, ultimately leading to extortion demands.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
- Platforms: Check Point IPS, Check Point Threat Emulation, Harmony Endpoint
Check Point provides protection against the NGINX Heap Overflow (CVE-2026-42945) and The Gentlemen ransomware via its IPS, Threat Emulation, and Harmony Endpoint solutions, though specific rule bodies are not detailed in the text.
Detection Engineering Assessment
EDR Visibility: High — EDR solutions are well-positioned to detect infostealer activity, privilege escalation attempts (such as GreenPlasma abusing CTFMON), and the deployment of known RATs like Deed RAT and TernDoor. Network Visibility: Medium — Network sensors can detect exploitation attempts against public-facing applications (Exchange, Cisco SD-WAN) and C2 communication, though encrypted channels may limit payload visibility. Detection Difficulty: Moderate — While known RATs and infostealers have established signatures, detecting zero-day exploitation (YellowKey, GreenPlasma) and AI-generated phishing pages requires behavioral analysis and robust anomaly detection.
Required Log Sources
- Windows Event Logs (Security, System)
- Web Server Access Logs
- Network IDS/IPS Logs
- EDR Telemetry
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for anomalous child processes spawned by the CTFMON framework, which may indicate exploitation of the GreenPlasma privilege escalation vulnerability. | EDR process creation logs | Privilege Escalation | Low |
| Monitor for unexpected web shell creation or anomalous process execution originating from Microsoft Exchange worker processes (w3wp.exe), potentially indicating FamousSparrow activity. | EDR process ancestry, Web server logs | Persistence | Medium |
Control Gaps
- Lack of patching for edge devices and public-facing applications
- Insufficient validation of third-party AI/ML repositories
- Physical security controls (for YellowKey BitLocker bypass)
Key Behavioral Indicators
- CTFMON framework spawning unusual child processes
- w3wp.exe spawning cmd.exe or powershell.exe on Exchange servers
- Unexpected outbound connections from AI development environments to unknown IPs
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Verify against your organization's incident response runbook and team escalation paths before acting.
- Immediately apply Cisco's security updates for Catalyst SD-WAN controllers to mitigate CVE-2026-20182.
- Patch Apple devices to address the CVE-2026-28819 Wi-Fi vulnerability.
- Review Microsoft Exchange servers for signs of web shell deployment or unpatched vulnerabilities.
Infrastructure Hardening
- Implement strict physical security controls and monitor Windows Recovery Environment access to mitigate the YellowKey BitLocker bypass.
- Restrict outbound network access from development environments and AI platforms to prevent data exfiltration by malicious packages.
- Enforce MFA on all external-facing services, including OWA and M365, to defend against initial access techniques used by ransomware groups.
User Protection
- Deploy EDR solutions to monitor for infostealer activity and unauthorized privilege escalation attempts.
- Educate developers and users on the risks of downloading unverified packages from repositories like Hugging Face.
Security Awareness
- Train employees to recognize highly realistic, AI-generated phishing pages mimicking popular brands.
- Incorporate threat intelligence regarding World Cup 2026-themed phishing campaigns into security awareness programs.
MITRE ATT&CK Mapping
- T1190 - Exploit Public-Facing Application
- T1505.003 - Server Software Component: Web Shell
- T1068 - Exploitation for Privilege Escalation
- T1555 - Credentials from Password Stores
- T1566.002 - Phishing: Spearphishing Link