Executive Summary -
Highlights of Cyber Threat Intelligence Digest
Vulnerabilities
Elastic Patches Improper Verification of Cryptographic Signature Vulnerability CVE-2026-33467 Affecting Elastic Package Registry - On 28 April 2026, Elastic patched a cryptographic signature verification vulnerability, tracked as CVE-2026-33467, affecting Elastic Package Registry versions 1.37.0 and earlier. The flaw could allow a threat actor positioned to intercept network traffic to substitute a tampered package without triggering an integrity check failure, effectively bypassing a key supply chain security control. At the time of writing, there are no confirmed reports of exploitation in the wild.
To mitigate the risk posed by CVE-2026-33467, organisations running affected versions of Elastic Package Registry should update to version 1.38.0 as a priority. Given the nature of the vulnerability, environments where network traffic may be subject to interception, such as those lacking robust network segmentation or encrypted communications, should treat this update with particular urgency.
Fortinet Patches CVE-2026-44277 and CVE-2026-26083 Affecting FortiSandbox and FortiAuthenticator - On 12 May 2026, Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, both scoring 9.1 in severity, affecting FortiAuthenticator and FortiSandbox respectively. CVE-2026-44277 is an improper access control flaw allowing an unauthenticated actor to execute unauthorised code via crafted API requests, whilst CVE-2026-26083 is a missing authorisation vulnerability in the FortiSandbox PaaS web UI, exploitable through crafted HTTP requests. Fortinet reported no known exploitation of either vulnerability at the time of publication.
Organisations should prioritise patching given the unauthenticated nature and critical severity of both flaws. FortiAuthenticator users should update to versions 8.0.3, 6.6.9, or 6.5.7 or later, and FortiSandbox administrators should consult Fortinet's advisory to identify the appropriate patched release for their environment.
Zoom Communications Discloses Three Vulnerabilities in Zoom Workplace and Zoom Rooms - On 12 May 2026, Zoom disclosed three vulnerabilities affecting Zoom Workplace and Zoom Rooms, with no active exploitation reported at the time of writing. CVE-2026-30904 is a low-severity protection mechanism failure in Zoom Workplace for iOS (prior to version 7.0.0) enabling an authenticated actor with physical access to disclose information. CVE-2026-30905 is a high-severity file path control vulnerability in the Zoom Workplace VDI Plugin for Windows (prior to 6.6.11), and CVE-2026-30906 is a high-severity untrusted search path vulnerability in Zoom Rooms for Windows (prior to 7.0.0), both allowing an authenticated local actor to escalate privileges.
Organisations should apply the latest available updates via zoom.us/download to remediate all three vulnerabilities. Whilst the privilege escalation flaws require local authenticated access and the information disclosure vulnerability requires physical access, both conditions are realistic in shared or unmanaged device environments, and patching remains the recommended course of action.
Potential Threats
Threat Actors Use Fake Claude AI Install Pages to Deliver Multi-Stage Fileless Malware via InstallFix Campaign - On 5 May 2026, Trend Micro published analysis of the InstallFix campaign, in which threat actors use malicious Google Ads to redirect users searching for Claude Code to fraudulent installer pages. These pages instruct victims to run a PowerShell command that downloads and executes a file named claude.msixbundle, disguised as a legitimate installer but containing a ZIP/HTA polyglot to evade validation. The payload executes through a chain involving mshta.exe, obfuscated VBScript, and a PowerShell stager that bypasses AMSI controls before retrieving and executing a next-stage payload entirely in memory.
Once active, the malware establishes persistence via scheduled tasks, harvests browser credentials and e-wallet data, and beacons to threat actor-controlled infrastructure across several IP addresses. Trend Micro links the final payload to RedLine Stealer, which employs fileless execution and multiple obfuscation layers to evade detection. Organisations should block the associated indicators of compromise, apply controls to restrict unauthorised PowerShell and mshta.exe execution, and educate users to download software only from verified, official sources rather than via sponsored search results.
Malicious OpenClaw skill named DeepSeek-Claw Delivers Remcos RAT and GhostLoader - On 5 May 2026, Zscaler ThreatLabz reported a campaign distributing a malicious OpenClaw skill named DeepSeek-Claw, designed to deliver either Remcos RAT or GhostLoader depending on the victim's operating system. On Windows, following the automated installation path causes a PowerShell command to silently retrieve a remote MSI package that sideloads a malicious DLL alongside a legitimate GoToMeeting executable. The DLL employs extensive anti-analysis techniques before decrypting and executing Remcos RAT, which establishes an encrypted C2 connection, logs keystrokes, captures clipboard data, steals browser session cookies, and supports session theft capable of bypassing MFA controls.
On macOS and Linux, an alternative installation path triggers obfuscated Node.js lifecycle scripts that deliver GhostLoader, which uses spoofed sudo prompts to harvest credentials before exfiltrating macOS keychain contents, SSH keys, cryptocurrency wallets, and cloud API tokens to threat actor-controlled infrastructure. This campaign is notable for targeting developers directly through a supply chain vector, exploiting trust in open-source AI agent tooling. Organisations should restrict the use of unvetted third-party AI skills and repositories, enforce controls around msiexec and npm lifecycle script execution, and block the associated indicators of compromise.
New Linux PAM-Based Backdoor PamDOORa Steals SSH Credentials - On 7 May 2026, Flare published research on PamDOORa, a Linux PAM-based backdoor advertised for sale by a threat actor operating under the alias darkworm on the Russian-speaking cybercrime forum Rehub, initially listed at $1,600 before being reduced to $900. Deployment requires the attacker to have already obtained root access, after which they modify the PAM authentication workflow and install malicious shared object files, enabling PamDOORa to execute during authentication events including OpenSSH logins. Once active, it captures and XOR-encrypts credentials, storing them locally, whilst also enabling covert access via a specific port and password combination that bypasses normal authentication entirely.
Beyond credential harvesting, PamDOORa implements anti-debugging techniques, maps authentication attempts to live network connections by inspecting /proc/[pid]/fd socket metadata, exfiltrates stolen data, and suppresses forensic visibility by tampering with lastlog and likely btmp, utmp, and wtmp log files. Organisations running Linux infrastructure should audit PAM configurations and shared object files for unauthorised modifications, monitor for unexpected changes to authentication logs, and ensure robust controls are in place to detect and prevent privilege escalation, which is a prerequisite for PamDOORa deployment.
General News
European countries are exporting surveillance tech to countries with poor human rights records - A report published by Human Rights Watch alleges that European surveillance technology companies have sold spyware and intrusion tools to over two dozen nations with documented human rights abuses, with Bulgaria and Poland identified as notable exporters. Bulgaria sold surveillance technology to countries including the United Arab Emirates and Azerbaijan, whilst Poland permitted the sale of phone interception systems to Rwanda. France, Greece, Spain, Germany, and Italy declined to share relevant trade records, limiting the scope of the findings. The report also notes that all but two companies named in a 2024 Google Threat Analysis Group report on the commercial surveillance industry are based in the EU.
Human Rights Watch argues that the European Commission has failed to effectively enforce the bloc's 2021 updated export control rules, which were designed to require member states to consider human rights conditions in destination countries before approving surveillance technology exports. With the Commission due to evaluate those rules in September, the report calls for strengthened due diligence and transparency requirements. The Commission responded by reaffirming the significance of export controls whilst noting that individual member states retain ultimate responsibility for licensing decisions.
UK water company allowed hackers to lurk undetected for nearly two years - The UK's Information Commissioner's Office (ICO) has fined South Staffordshire Water £963,900 after the Cl0p ransomware group maintained undetected access to the company's network for nearly two years following initial compromise via a malicious email attachment in September 2020. The intrusion was only discovered in July 2022 when an IT performance slowdown prompted an internal investigation, by which point the attacker had moved laterally using a domain administrator account and exfiltrated approximately 4.1 terabytes of data, subsequently published on the dark web, including names, addresses, bank account details, and National Insurance numbers belonging to 633,887 customers and employees.
The ICO's investigation identified several significant security failures, including the absence of least privilege controls, no vulnerability scanning conducted during the nearly two-year intrusion period, monitoring coverage of only 5% of the IT environment, legacy systems still running Windows Server 2003, and two domain controllers left unpatched against the critical ZeroLogon vulnerability, which the attacker successfully exploited. The fine was reduced following South Staffordshire's cooperation, early admission of liability, and a voluntary settlement. The incident highlights the broader cyber risk facing UK water infrastructure, with five incidents reported to the Drinking Water Inspectorate between January 2024 and October 2025, and the government's Cyber Security and Resilience Bill expected to introduce expanded mandatory reporting requirements for critical infrastructure operators.
US govt seeks Instructure testimony on massive Canvas cyberattack - The US House Committee on Homeland Security has called on Instructure executives to testify following two cyberattacks by the ShinyHunters extortion group against the company's Canvas learning management platform within the space of a single week. The first breach, detected on 29 April 2026, resulted in the theft of data belonging to students and staff across 8,809 colleges, school districts, and online education platforms, with ShinyHunters claiming to have stolen 280 million records including names, email addresses, student identification numbers, and messages between students and teachers. A second attack exploited multiple cross-site scripting vulnerabilities to obtain authenticated admin sessions and deface Canvas login portals across institutions in at least eleven US states, disrupting final examinations and forcing some colleges to cancel assessments entirely.
Instructure subsequently reached an agreement with ShinyHunters to halt the public leak and ensure the stolen data was deleted, though the company stopped short of confirming whether a ransom was paid. The Homeland Security Committee has requested that a senior Instructure representative participate in a briefing no later than 21 May to address both intrusions, the scope of stolen data, containment and notification efforts, and coordination with federal agencies. The committee noted that the repeated compromises raise serious questions about Instructure's incident response capabilities and its obligations to protect the data of the tens of millions of students and educators who rely on the platform.
Threat Actor Weekly Graph
Over the past 7 days, we have been tracking the following intent and opportunity changes within our Threat Actor Landscape.
Intent represents the potential targets of a group. When a group is observed attacking a different organisation or entity, their intent will increase.
Opportunity represents the various methods and technologies these groups may use. For example, if a group started using a new attack vector, such as a new kind of ransomware, their opportunity would increase.
Both intent and opportunity are scored out of 100 and are responsible for scoring the group's severity. These updates can be seen below.
| ● Limited Severity | ● Basic Severity | ● Moderate Severity | ● High Severity |
| Threat Actor | Severity Increase | Opportunity | Intent | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Dragon Force Group | ● Moderate | → | ● Moderate | ● 64 | → | ● 63 | ● 49 | → | ● 49 |
| ShinyHunters | ● Moderate | → | ● Moderate | ● 49 | → | ● 49 | ● 58 | → | ● 59 |
| GreenGolf | ● Moderate | → | ● Moderate | ● 60 | → | ● 61 | ● 30 | → | ● 30 |
| CMD Organization Group | NEW | → | ● Basic | NEW | → | ● 25 | NEW | → | ● 36 |
| yesdaddy |
NEW | → | ● Basic | NEW | → | ● 30 | NEW | → | ● 25 |
Global Trends Powered by Recorded Future
Within each category, we have provided the current top five globally trending items. Each item is linked to how actively trending it is and is marked with a small symbol.
The spikes in references are calculated over 60 days and are normalised to ensure they aren't disproportionate when compared to bigger entities that will naturally have more baseline mentions.
▲- Spike – This indicates a large increase in reporting volume and a high diversity in the event descriptions.
▲- Rise – This indicates a small increase in reporting volume with little diversity in the descriptions.
| Attackers | Methods | Vulnerabilities | Targets | |||||
|---|---|---|---|---|---|---|---|---|
| Nitrogen Ransomware Group | ▲ | Python RAT | ▲ | CVE-2026-41490 | ▲ | Manufacturing | ▲ | |
| RansomHouse Group | ▲ | Shai-Hulud | ▲ | CVE-2026-31431 | ▲ | Foxconn | ▲ | |
| ShinyHunters | ▲ | Nitrogen Ransomware | ▲ | CVE-2026-0300 | ▲ | Canvas | ▲ | |
| 313 Team | ▲ |
Bravox Ransomware |
▲ | CVE-2026-8088 | ▲ | Apple | ▲ | |
| Lynx Ransomware Group | ▲ | DeedRAT | ▲ | CVE-2026-41096 | ▲ | NVIDIA | ▲ | |
Prominent Information Security Events
Malicious OpenClaw skill named DeepSeek-Claw Delivers Remcos RAT and GhostLoader
Source: Insikt Group | Validated Intelligence Event
IOC: Hash - 670ba1799495280dc9f300e5b320b1ba49f2f8d324a411a72e0fcabcd29b071a
On 5 May 2026, Zscaler ThreatLabz published a report detailing a campaign in which threat actors weaponised a malicious OpenClaw skill named DeepSeek-Claw to deliver either Remcos RAT or GhostLoader. OpenClaw is an open-source autonomous AI agent platform capable of executing real-world tasks and multi-step workflows, formerly known as Clawdbot and Moltbot. The campaign exploits developer trust by presenting the DeepSeek-Claw repository as a legitimate OpenClaw integration for DeepSeek, when in reality it contains embedded malicious instructions within its SKILL.md file.
On Windows systems, the attack is initiated via a PowerShell command that silently retrieves a remote MSI package, installing both a legitimate GoToMeeting executable (G2M.exe) and a malicious DLL (g2m.dll). The DLL is sideloaded by G2M.exe and performs a range of evasion techniques before decrypting and executing the Remcos RAT payload. Once active, Remcos establishes a TLS-encrypted C2 connection, enables stealth mode, and carries out extensive data theft, including keystroke logging, clipboard capture, and browser session cookie harvesting from local SQLite databases, with the latter supporting potential MFA bypass.
A second execution path targets macOS and Linux users, where following alternative manual setup instructions triggers npm lifecycle scripts that execute an obfuscated Node.js payload named setup.js, delivering GhostLoader. On Unix-based systems, GhostLoader employs terminal-based social engineering, such as spoofed sudo password prompts, to harvest credentials before collecting sensitive data, including macOS keychain contents, SSH keys, cryptocurrency wallets, and cloud API tokens. Exfiltration is directed to threat actor-controlled infrastructure, with trackpipe[.]dev identified as one such endpoint at the time of reporting.
Threat Actors Use Fake Claude AI Install Pages to Deliver Multi-Stage Fileless Malware via InstallFix Campaign
Source: Insikt Group | Validated Intelligence Event
IOC: IP- 77[.]91[.]97[.]244
On 5 May 2026, Trend Micro published a technical analysis detailing an InstallFix campaign leveraging fake Claude AI installer pages to distribute malware. The campaign uses malicious Google Ads to redirect victims searching for "Claude Code" to fraudulent installation pages that mimic legitimate instructions, tricking users into executing commands that deploy malware capable of collecting system data, disabling security controls, establishing persistence, and connecting to threat actor-controlled infrastructure for additional payload delivery.
The infection chain begins when a victim clicks a malicious Google Ads link and is directed to a fake Claude installer page, where they are prompted to run a PowerShell command. This triggers mshta.exe to download and execute a file named claude.msixbundle, which disguises itself as a legitimate installer whilst concealing a ZIP or HTA polyglot to pass validation checks. During execution, explorer.exe launches PowerShell, which invokes mshta.exe to process the embedded HTA payload. The HTA then runs obfuscated VBScript using the Shell.Application COM object to execute commands silently, ultimately reconstructing and launching a PowerShell stager that generates a victim-specific identifier, bypasses AMSI via memory modification, and retrieves a victim-unique next-stage payload executed entirely in memory via Invoke-Expression.
Once the in-memory payload executes, it creates scheduled tasks to maintain persistence and proceeds to harvest sensitive data, including browser credentials and electronic wallet information. It then establishes outbound C2 connections to threat actor-controlled infrastructure, including 104[.]21[.]0[.]95, 185[.]177[.]239[.]255, and 77[.]91[.]97[.]244 (hosted-by[.]yeezyhost[.]net), with the latter remaining active at the time of writing. Trend Micro attributes the payload to RedLine Stealer activity, noting the use of multiple obfuscation layers and fileless execution techniques designed to evade detection whilst maintaining persistent access to compromised systems.
Remediation Actions
Following the information provided above, we recommend that the technologies mentioned be fully patched and updated. We also want to highlight and recommend applying the following patches where applicable:
-
CVE-2026-33467 (Elastic) – This vulnerability can be mitigated by updating to version 1.38.0.
-
CVE-2026-44277, CVE-2026-26083 (FortiSandbox/FortiAuthenticator) – These vulnerabilities can be remediated by updating to version 8.03, 6.6.9, or 6.5.7 or later.
-
CVE-2026-30904, CVE-2026-30905, CVE-2026-30906 (Zoom) – These vulnerabilities can be remediated by updating Zoom Workplace and Zoom Rooms to the most recent versions.
If you are currently an Acumen Cyber Vulnerability Management customer, we will be proactively performing related searching and hunting activities within your environment.