Yesterday's security developments from Sunday, March 22, 2026. We analyzed 14 articles covering espionage campaigns, critical vulnerabilities, and new offensive techniques. All attribution is by the article authors. All article analysis is automated.
According to Krypt3ia, Iranian state-aligned group MuddyWater, also known as MANGO SANDSTORM, conducted a targeted espionage campaign in February 2026 against organizations in the US, Israel, and Canada. The operation deployed Dindoor backdoor using Deno runtime and Fakeset Python implant to establish persistence and exfiltrate data via Rclone to cloud storage, targeting a US financial institution, airport, Canadian non-profit, and Israeli subsidiary of a US defense software company.
The Threat Hunter Team reports that between November 2025 and February 2026, a suspected state-sponsored espionage campaign targeted Libyan organizations including an oil refinery, telecommunications organization, and state institution using AsyncRAT backdoor. The attack chain utilized spear-phishing emails with lure documents about Libyan current affairs, delivering a VBS downloader that fetched a PowerShell dropper from cloud storage, with the targeting of critical energy infrastructure during regional geopolitical instability suggesting strategic intelligence collection objectives.
Microsoft announced that Sentinel now supports Unified Role-Based Access Control with row-level access, allowing granular permission management through the Microsoft Defender portal. The update enables security operations teams to implement data segregation using scope tags and KQL rules within Data Collection Rules, restricting users to view only data relevant to their assigned roles and improving access control for organizations with multiple SOC teams operating in shared Sentinel environments.
SecureLayer7 reports CVE-2026-22730, a high-severity SQL injection vulnerability in Spring AI's MariaDB Vector Store component affecting versions 1.0.x prior to 1.0.4 and 1.1.x prior to 1.1.3. The flaw arises from improper string handling in filter expressions where the doSingleValue method wraps values in single quotes without escaping, enabling authenticated attackers to inject malicious SQL that can lead to access control bypass, sensitive data exposure, and data deletion.
A security researcher discovered four vulnerabilities in the AWS Security Agent, an AI-powered penetration testing tool. The vulnerabilities include DNS confusion attacks, reverse shell exploitation leading to sandbox escape and AWS credential theft, and overly aggressive testing actions that could expose sensitive information.
Maor Sabag demonstrates enhancing the Adaptix C2 agent DLL's stealth capabilities by integrating it with a Crystal Palace Reflective DLL Loader. The technique implements memory permission fixes, IAT hooking of Windows API calls, and Ekko-style sleep obfuscation using timer queue ROP chains to evade SOC detection, enabling red team operators to maintain persistence while avoiding security monitoring systems.
Andreisss released KslDump, a post-exploitation technique that abuses a vulnerable, Microsoft-signed kernel driver from Windows Defender to extract credentials from PPL-protected LSASS. The technique requires administrative privileges and exploits an older driver version that remained on disk after patching, enabling arbitrary kernel memory reads via IOCTL commands to bypass PPL protections.
Daem0nc0re published proof-of-concept C# code demonstrating abuse of Windows SeLockMemoryPrivilege to consume physical memory through Large Pages or Address Windowing Extensions. The PoC shows how an attacker with this privilege can potentially cause system instability through memory exhaustion, including P/Invoke declarations for Windows API memory management functions.
Bishop Fox released a tool demonstrating the use of WebAssembly as a stager for the Sliver C2 framework, enabling in-browser execution of malicious implants. The technique allows attackers to deliver and execute C2 payloads through compromised websites, potentially bypassing traditional network defenses that don't inspect WASM execution, with the repository providing methods to compile Go code into WASM binaries and embed them in HTML for client-side compromise.
The Sysdig Threat Research Team reports that attackers exploited CVE-2026-33017 in Langflow, an open-source AI application builder, within 20 hours of disclosure. The vulnerability allowed remote code execution through a public build endpoint, enabling attackers to harvest credentials, environment variables, and sensitive data from internet-exposed instances through automated scanning and custom exploit scripts.
According to Philipp Burckhardt and Peter van der Zee, the GlassWorm campaign has escalated with over 20 new malicious extensions and 20 sleeper extensions on Open VSX registry that activate to deliver malware to developer IDEs. Attackers are using typosquatted extensions that download malicious VSIX packages directly from GitHub infrastructure, bypassing Open VSX dependencies and enumerating local IDEs to install payloads leading to arbitrary code execution in developer environments.
The Threat Hunter Team at Broadcom discovered a new infostealer malware named Speagle targeting users of Cobra DocGuard software. The malware leverages the legitimate DocGuard client to hide its activities while stealing browser data, user information, and in some variants, files related to Chinese ballistic missiles like the Dongfeng-27, with Speagle attempting to delete itself using file renaming techniques after exfiltration.
InfinityCurveLabs released vm-filesystem, a project demonstrating remote filesystem interaction capabilities through the Firebeam Virtual Machine by monkey-patching Python functions in the Havoc Framework's File Browser. The tool allows operators to perform filesystem operations on agents using Firebeam bytecode execution instead of embedding filesystem code directly into agents, showcasing modular approaches to C2 framework extensibility for red team operations.
0xROOTPLS released Fritter, a modified fork of the Donut shellcode generator that creates position-independent shellcode for in-memory execution of various file types including VBScript, JScript, EXE, DLL, and .NET assemblies. The tool uses randomization techniques for its entry stub, encoding layer, and loader blob to evade signature-based detection, manipulating memory permissions at runtime to minimize executable footprint and maintain stealth during offensive operations.
That concludes today's briefing.