Executive Summary
In 2025, Red Canary analyzed over 110,000 threats across more than 4.5 million identities, endpoints, and cloud assets, revealing significant shifts in the cyber threat landscape. Key findings include a surge in identity-related attacks, with adversaries targeting credentials through info stealers, consent phishing, and OAuth abuse. Browsers have become primary attack vectors, serving as both the main workspace for users and a conduit for malicious payloads via compromised extensions and token theft. Additionally, the abuse of Remote Monitoring and Management (RMM) tools has escalated, with adversaries leveraging these tools for unauthorized access and control. (redcanary.com)
These trends underscore the evolving tactics of cyber adversaries and the necessity for organizations to implement layered security controls. The interconnected nature of identity compromise, browser exploitation, and social engineering highlights the importance of comprehensive defense strategies combining device trust, user authentication, and behavioral monitoring to mitigate these emerging threats. (redcanary.com)
Why This Matters Now
The 2026 Threat Detection Report highlights a significant evolution in cyber threats, emphasizing the urgent need for organizations to adapt their security strategies. The rise in identity-based attacks, browser exploitation, and RMM tool abuse demonstrates that traditional defenses are increasingly insufficient. Implementing comprehensive, layered security measures is critical to protect against these sophisticated and interconnected threats. (redcanary.com)
Attack Path Analysis
Adversaries initiated the attack by compromising user identities through consent phishing and infostealers, gaining unauthorized access to cloud accounts. They escalated privileges by exploiting OAuth tokens and manipulating IAM roles to expand their access. Utilizing compromised credentials, they moved laterally across cloud services and regions, accessing sensitive data and critical systems. Established command and control channels were maintained via remote monitoring and management tools, enabling persistent access. Sensitive data was exfiltrated by copying it to external cloud storage and leveraging covert channels. The attack culminated in significant impact, including data destruction and business disruption.
Kill Chain Progression
Initial Compromise
Description
Adversaries gained initial access by targeting user identities through consent phishing and deploying infostealers to harvest credentials.
Related CVEs
CVE-2026-21637
CVSS 7.5A flaw in Node.js TLS error handling allows unhandled exceptions in SNICallback to crash the process.
Affected Products:
Node.js Node.js – 20.x, 22.x, 24.x, 25.x
Exploit Status:
no public exploitCVE-2026-21710
CVSS 7.5A flaw in Node.js HTTP request handling causes an uncaught TypeError when a request is received with a header named __proto__, leading to a process crash.
Affected Products:
Node.js Node.js – 20.x, 22.x, 24.x, 25.x
Exploit Status:
no public exploitCVE-2026-21711
CVSS 5.3A flaw in Node.js Permission Model allows Unix Domain Socket server operations without required permission checks, enabling unauthorized inter-process communication.
Affected Products:
Node.js Node.js – 25.x
Exploit Status:
no public exploit
MITRE ATT&CK® Techniques
Drive-by Compromise
User Execution: Malicious Link
Command and Scripting Interpreter: JavaScript
Application Layer Protocol: Web Protocols
Hide Artifacts: Hidden Files and Directories
OS Credential Dumping
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Hijack Execution Flow: DLL Side-Loading
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Training and Monitoring
Control ID: 500.14
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Multi-vector threats targeting Node.js environments and browser-based applications expose software development workflows to identity compromise, credential theft, and malicious code injection.
Financial Services
Identity-based attacks through OAuth abuse and session token theft threaten financial platforms relying on browser interfaces, compromising customer data and regulatory compliance.
Information Technology/IT
East-west traffic vulnerabilities and inadequate zero trust segmentation expose IT infrastructure to lateral movement, while encrypted traffic gaps enable data exfiltration.
Computer/Network Security
Security organizations face challenges defending against evolving social engineering tactics, DLL sideloading techniques, and Node.js-based threats requiring enhanced detection capabilities.
Sources
- Identity, browsers, and node.js: Everything you missed in the Threat Detection Report miniserieshttps://redcanary.com/blog/security-operations/tdr-secops-recap/Verified
- Tuesday, March 24, 2026 Security Releaseshttps://nodejs.org/en/blog/vulnerability/march-2026-security-releasesVerified
- Node.js Security Bulletin: CVE-2026-21637 and Other Fixes Explainedhttps://www.secpod.com/blog/node-js-security-bulletin-cve-2026-21637-and-other-fixes-explained/Verified
- CVE-2026-21711: Node.js Privilege Escalation Vulnerabilityhttps://www.sentinelone.com/vulnerability-database/cve-2026-21711/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it embeds security directly into the cloud fabric, potentially limiting unauthorized lateral movement and data exfiltration.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The CNSF may limit the attacker's ability to exploit compromised credentials by enforcing strict identity-aware access controls.
Control: Zero Trust Segmentation
Mitigation: Zero Trust Segmentation would likely restrict unauthorized privilege escalation by enforcing least-privilege access policies.
Control: East-West Traffic Security
Mitigation: East-West Traffic Security could constrain lateral movement by monitoring and controlling internal traffic flows.
Control: Multicloud Visibility & Control
Mitigation: Multicloud Visibility & Control would likely limit the establishment of command and control channels by providing comprehensive monitoring across cloud environments.
Control: Egress Security & Policy Enforcement
Mitigation: Egress Security & Policy Enforcement could restrict data exfiltration by controlling outbound traffic and detecting anomalies.
The implementation of CNSF controls would likely reduce the overall impact by limiting the attacker's ability to access and manipulate critical systems.
Impact at a Glance
Affected Business Functions
- Web Application Services
- API Endpoints
Estimated downtime: 2 days
Estimated loss: $50,000
Potential exposure of sensitive user data due to process crashes and unauthorized inter-process communication.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and limit lateral movement within the cloud environment.
- • Deploy Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
- • Utilize Multicloud Visibility & Control to gain comprehensive insights across cloud platforms, enabling detection of anomalous activities.
- • Apply Threat Detection & Anomaly Response mechanisms to identify and respond to suspicious behaviors in real-time.
- • Ensure robust Identity Governance to manage and monitor user access, reducing the risk of credential compromise.



