Threat Research Center
Real-World Cloud Attack Intelligence
Breach Analysis, Attack Paths & Security Insights
Computer/Network Security
Showing 12 / 2147 threat reports
Impact (MEDIUM)
Flickr's 2026 Data Breach: A Wake-Up Call for Third-Party Security
In early February 2026, Flickr, a prominent photo-sharing platform, identified a security vulnerability within a third-party email service provider's system. This flaw potentially exposed user data, including names, email addresses, usernames, account types, IP addresses, general locations, and Flickr activity. Importantly, passwords and payment card information remained secure. Upon discovery on February 5, Flickr promptly disabled access to the compromised system and initiated a comprehensive investigation to assess the breach's scope and impact. ([forbes.com](https://www.forbes.com/sites/daveywinder/2026/02/06/photo-sharing-platform-flickr-issues-data-breach-warning/?utm_source=openai))
This incident underscores the critical importance of robust security measures and vigilant monitoring of third-party service providers. As organizations increasingly rely on external vendors, ensuring these partners adhere to stringent security protocols is essential to safeguard sensitive user information and maintain trust.
3 days ago
Kill Chain at a Glance
Impact (HIGH)
Illinois Man's Phishing Scheme Compromises Hundreds of Women's Snapchat Accounts
Between May 2020 and February 2021, Kyle Svara, a 26-year-old from Illinois, orchestrated a phishing campaign targeting nearly 600 women to gain unauthorized access to their Snapchat accounts. By impersonating Snap Inc. representatives, he solicited security codes from over 4,500 individuals, successfully compromising at least 59 accounts to steal and distribute private images. Notably, Svara collaborated with former Northeastern University track coach Steve Waithe, who hired him to hack accounts of female student-athletes. Waithe was sentenced to five years in prison in March 2024 for related offenses. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/man-pleads-guilty-to-hacking-nearly-600-womens-snapchat-accounts/?utm_source=openai))
This incident underscores the persistent threat of social engineering attacks and the exploitation of personal data for malicious purposes. Organizations must remain vigilant against such tactics, emphasizing the importance of user education and robust security measures to protect sensitive information.
3 days ago
Kill Chain at a Glance
Impact (CRITICAL)
SmarterMail 2026 Ransomware Attack via RCE Vulnerability
In early 2026, a critical vulnerability (CVE-2026-24423) was discovered in SmarterTools' SmarterMail email server, allowing unauthenticated remote code execution via the ConnectToHub API. This flaw was actively exploited by ransomware actors, leading to unauthorized access and potential data breaches. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added this vulnerability to its Known Exploited Vulnerabilities catalog, urging immediate patching by February 26, 2026. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/cisa-warns-of-smartermail-rce-flaw-used-in-ransomware-attacks/?utm_source=openai))
The exploitation of this vulnerability underscores the increasing targeting of email servers by cybercriminals, emphasizing the need for organizations to promptly apply security updates and monitor for unusual activities to mitigate potential threats.
3 days ago
Kill Chain at a Glance
Impact (MEDIUM)
DKnife: The Linux Toolkit Hijacking Router Traffic for Espionage
In February 2026, cybersecurity researchers uncovered 'DKnife,' a sophisticated Linux-based toolkit active since 2019, designed to hijack router traffic for espionage and malware delivery. DKnife comprises seven modules enabling deep packet inspection, traffic manipulation, credential harvesting, and malware deployment, including the ShadowPad and DarkNimbus backdoors. The toolkit specifically targets Chinese services and exhibits Simplified Chinese language artifacts, indicating a China-nexus threat actor. DKnife's capabilities include DNS hijacking, intercepting Android app updates, and monitoring user activities on platforms like WeChat and Signal. As of January 2026, its command-and-control servers remain active. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/dknife-linux-toolkit-hijacks-router-traffic-to-spy-deliver-malware/?utm_source=openai))
3 days ago
Kill Chain at a Glance
Impact (HIGH)
Germany 2026: Signal Account Hijacking Targets Senior Figures
In February 2026, Germany's Federal Office for the Protection of the Constitution (BfV) and the Federal Office for Information Security (BSI) issued a warning about state-sponsored threat actors targeting high-ranking individuals through phishing attacks on messaging apps like Signal. The attackers employed social engineering tactics, impersonating support teams to deceive politicians, military officers, diplomats, and investigative journalists into granting access to their accounts. This campaign did not exploit technical vulnerabilities or deploy malware but leveraged legitimate app features to gain unauthorized access to sensitive communications. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/germany-warns-of-signal-account-hijacking-targeting-senior-figures/?utm_source=openai))
This incident underscores a growing trend of sophisticated social engineering attacks that exploit trust in legitimate platforms. Organizations must enhance user awareness and implement robust security measures to mitigate such threats, especially as attackers increasingly target high-profile individuals through commonly used communication tools.
3 days ago
Kill Chain at a Glance
Impact (CRITICAL)
Anthropic's Claude Opus 4.6: A Game-Changer in AI-Driven Cybersecurity
In February 2026, Anthropic's AI model, Claude Opus 4.6, identified over 500 previously unknown high-severity vulnerabilities in widely used open-source libraries, including Ghostscript, OpenSC, and CGIF. The model autonomously discovered these flaws without specific instructions, demonstrating advanced code analysis capabilities. The vulnerabilities ranged from system crashes to memory corruption issues, all of which have since been patched by the respective maintainers. This incident underscores the growing role of AI in cybersecurity, highlighting both its potential to enhance defense mechanisms and the necessity for robust safeguards against misuse. The discovery also emphasizes the critical need for continuous monitoring and rapid patching of open-source software to maintain security integrity.
3 days ago
Kill Chain at a Glance
Impact (HIGH)
dYdX Supply Chain Attack Exposes Cryptocurrency Wallets to Theft
In early February 2026, dYdX, a decentralized cryptocurrency exchange, experienced a significant supply chain attack. Malicious actors compromised legitimate npm and PyPI packages—@dydxprotocol/v4-client-js and dydx-v4-client, respectively—by publishing infected versions using legitimate developer credentials. These compromised packages were designed to steal wallet credentials and, in the case of the PyPI package, deploy a remote access trojan (RAT) for executing arbitrary commands on affected systems. The attack underscores the vulnerabilities inherent in software supply chains and the potential for widespread impact when trusted distribution channels are exploited.
This incident highlights a persistent pattern of adversaries targeting dYdX-related assets through trusted distribution channels, following similar attacks in 2022 and 2024. The coordinated cross-ecosystem deployment and sophisticated obfuscation techniques suggest that threat actors had direct access to publishing infrastructure, emphasizing the need for enhanced security measures in software development and distribution processes.
3 days ago
Kill Chain at a Glance
Impact (CRITICAL)
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
Between January 2024 and February 2026, the cyber espionage group TGR-STA-1030, assessed to be state-aligned and operating out of Asia, compromised at least 70 government and critical infrastructure organizations across 37 countries. The group employed phishing emails and exploited known software vulnerabilities to gain initial access, subsequently deploying tools like the Diaoyu Loader and the ShadowGuard rootkit to maintain persistence and exfiltrate sensitive data. Notable targets included national law enforcement agencies, ministries of finance, and departments focusing on trade and diplomacy. ([unit42.paloaltonetworks.com](https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/?utm_source=openai))
This incident underscores the escalating sophistication and reach of state-sponsored cyber espionage activities, highlighting the urgent need for enhanced cybersecurity measures and international cooperation to protect critical infrastructure and sensitive governmental data.
3 days ago
Kill Chain at a Glance
Impact (HIGH)
DKnife AitM Framework: A New Threat to Network Security
In February 2026, cybersecurity researchers uncovered 'DKnife,' a sophisticated adversary-in-the-middle (AitM) framework operated by China-linked threat actors since at least 2019. This Linux-based toolkit comprises seven implants designed for deep packet inspection, traffic manipulation, and malware delivery via compromised routers and edge devices. DKnife primarily targets Chinese-speaking users by hijacking binary downloads and Android application updates to deploy backdoors like ShadowPad and DarkNimbus. ([thehackernews.com](https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html?utm_source=openai)) The discovery of DKnife underscores the escalating threat posed by AitM attacks leveraging compromised network infrastructure. This incident highlights the need for enhanced security measures to protect routers and edge devices from sophisticated exploitation techniques. ([thehackernews.com](https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html?utm_source=openai))
4 days ago
Kill Chain at a Glance
Impact (CRITICAL)
CISA's 2026 Directive: Strengthening Federal Network Security by Removing Unsupported Edge Devices
In February 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive 26-02, mandating Federal Civilian Executive Branch agencies to identify and remove unsupported edge devices—such as routers, firewalls, and switches—that no longer receive security updates. This directive aims to mitigate risks posed by state-sponsored threat actors exploiting these vulnerable devices to gain unauthorized access to federal networks. Agencies are required to update, catalog, and decommission these devices within specified timeframes, culminating in the establishment of a continuous lifecycle management process within 24 months. This initiative underscores the critical need for proactive asset management and the elimination of technical debt to enhance national cybersecurity resilience.
4 days ago
Kill Chain at a Glance
Impact (HIGH)
Moltbook's 2026 Security Breach: A Cautionary Tale of Cloud Misconfiguration
In late January 2026, Moltbook, an AI-exclusive social platform, suffered a significant security breach due to a misconfigured Supabase database. This vulnerability exposed sensitive data, including 1.5 million AI agent API tokens, 35,000 email addresses, and private messages. The misconfiguration allowed unauthorized access and modification of agent records, leading to potential impersonation and data manipulation. Promptly addressing the issue, Moltbook resolved the vulnerability within hours of disclosure. ([techradar.com](https://www.techradar.com/pro/security/ai-agent-social-media-network-moltbook-is-a-security-disaster-millions-of-credentials-and-other-details-left-unsecured?utm_source=openai))
This incident underscores the critical importance of robust security configurations in cloud-based platforms, especially those handling sensitive user data. It highlights the risks associated with rapid deployment of AI-driven services without comprehensive security assessments, emphasizing the need for stringent access controls and regular security audits to prevent similar breaches.
4 days ago
Kill Chain at a Glance
Impact (HIGH)
Shai-Hulud: Unveiling the 2025 npm Supply Chain Attack
In September 2025, the Shai-Hulud malware campaign emerged as a significant supply chain attack targeting the npm ecosystem. The self-replicating worm compromised over 180 npm packages within 48 hours, including those maintained by prominent organizations like CrowdStrike. By exploiting post-install scripts, the malware harvested developer credentials, including npm tokens, GitHub personal access tokens, and cloud service keys. It established persistence through malicious GitHub Actions workflows, enabling further propagation by republishing infected versions across the victim maintainer's other packages. This attack underscored the vulnerabilities inherent in open-source supply chains and the potential for widespread impact when trusted developer pipelines are exploited. ([protoslabs.io](https://www.protoslabs.io/resources/deep-dive-shai-hulud-the-self-replicating-npm-supply-chain-worm?utm_source=openai))
The Shai-Hulud incident highlights a growing trend of sophisticated supply chain attacks that leverage automation and trusted relationships within the developer ecosystem. The rapid escalation and scale of this campaign serve as a stark reminder of the critical need for enhanced security measures, including stringent access controls, continuous monitoring, and the adoption of zero-trust principles to safeguard against such pervasive threats. ([tomshardware.com](https://www.tomshardware.com/tech-industry/cyber-security/shai-hulud-malware-campaign-dubbed-the-largest-and-most-dangerous-npm-supply-chain-compromise-in-history-hundreds-of-javascript-packages-affected?utm_source=openai))
4 days ago