Good morning. This is your security briefing for Tuesday, April 07, 2026, covering ten articles from yesterday's developments. All attribution is by the article authors. All article analysis is automated.
CISA has added a critical vulnerability to its Known Exploited Vulnerabilities catalog affecting Fortinet FortiClient EMS. Versions 7.4.5 through 7.4.6 contain an unauthenticated remote code execution flaw that allows attackers to execute arbitrary code via crafted network requests. This vulnerability is being actively exploited in the wild as a zero-day against internet-facing servers. Organizations must immediately patch to version 7.4.7 or 7.2.11 or later, check for indicators of compromise, and restrict network access to these servers until patching is complete.
The FBI's Internet Crime Complaint Center has released its 2025 annual report showing cyber-enabled fraud losses surpassed twenty billion dollars last year. The report documents complaint data and fraud trends, including specific findings on state, cryptocurrency, and elder fraud.
German authorities have identified and publicly exposed Daniil Maksimovich Shchukin, a 31-year-old Russian national alleged to be the leader of the GandCrab and REvil ransomware operations, according to KrebsOnSecurity. These groups were responsible for at least 130 cyberattacks against German victims between 2019 and 2021, extorting nearly two million euros and causing over thirty-five million euros in total damage. GandCrab and REvil pioneered double extortion tactics and operated sophisticated affiliate programs that enabled widespread ransomware attacks globally.
GHOST Breakglass Intelligence reports that the SideWinder APT group conducted a five-month credential harvesting campaign targeting defense and government organizations across Pakistan and Bangladesh, including the Pakistan Air Force, Bangladesh Navy, and defense contractors. The operation employed a novel dual-password harvesting technique using phishing pages impersonating military webmail portals, while leveraging eight legitimate Platform-as-a-Service providers across twenty infrastructure nodes to evade detection and takedown efforts.
A website administrator has implemented Anubis, a Proof-of-Work based system inspired by Hashcash, to prevent aggressive web scraping by AI companies that causes server downtime. The system requires computational challenges to verify legitimacy and relies on modern JavaScript features, serving as a temporary measure while more advanced headless browser detection methods are developed.
The Fenrisk research team has discovered a critical remote code execution vulnerability in Control Web Panel affecting several recent versions. The flaw combines an authentication bypass in the addons module with command injection in the dompath parameter, allowing attackers with knowledge of a valid username to execute arbitrary commands. The vulnerability has been patched in version 0.9.8.1224.
R.B.C describes creative methods for coding Fully Undetected stagers that evade modern Endpoint Detection and Response systems by downloading raw shellcode from remote URLs and executing it directly in memory without writing to disk. These techniques employ obfuscation methods such as reversed API names and strings, along with low-level NT APIs, to bypass static analysis and API monitoring used by security software.
Maximilian Barz has released KslKatzBof, a Beacon Object File tool that extracts credentials from Process Protection Light protected LSASS processes using a Bring Your Own Vulnerable Driver technique with the Microsoft-signed driver. The tool performs in-line credential extraction without process injection, capable of extracting MSV authentication hashes and WDigest cleartext passwords, demonstrating how attackers can bypass protections by exploiting legitimate signed drivers.
SilentNimvest is a Nim-based credential dumping tool that implements the Silent Harvest technique to extract local user hashes, cached domain credentials, LSA secrets, and DPAPI keys from Windows SAM and Security hives. The tool uses the RegQueryMultipleValues API to evade EDR detection while requiring SeBackupPrivilege for execution, demonstrating an advanced credential access technique that bypasses common security monitoring by leveraging less-alerted registry read APIs.
PoisonKiller is a proof-of-concept Bring Your Own Vulnerable Driver tool that uses a signed Microsoft driver to terminate any Windows process, including those protected by Process Protection Light such as CrowdStrike Falcon EDR. The driver was signed on March 25, 2025, has a valid Microsoft signature, and had zero VirusTotal detections at discovery, making it highly stealthy against signature-based defenses.
That concludes today's briefing.