17 min read
Cyber Threat Intelligence Report
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
KEY TAKEAWAYS
Software supply chain attacks are here to stay. Learn about the latest compromises and how you can protect your organization.
Critical and high severity vulnerabilities in Cisco, Fortinet, and Progress, plus updates to CISA KEV, patch now!
Software supply chain attacks are rapidly becoming one of the biggest cybersecurity threats of 2026. What was once a rare occurrence (think Solarwinds) is now almost a weekly story. In the most recent attacks, threat actors have leveraged these compromises to deploy infostealer malware, steal additional tokens and secrets to enable further attacks, and deploy additional malware such as remote access trojans (RATs). This article will review these recent attacks in an effort to spread awareness so organizations can identify if they have been impacted, and help protect against future attacks.
Axios Supply Chain Attack
On March 30, the popular HTTP client known as Axios was compromised. Two versions of the npm package, version 1.14.1 and 0.30.4, were found to inject a fake dependency: "plain-crypto-js" version 4.2.1. This fake dependency was used to execute a postinstall script that effectively acts as a RAT dropper which targeted Windows, Linux, and MacOS. Any user who installed these versions of Axios should assume compromise, and ensure they rotate secrets and credentials immediately, as well as downgrade to a safe version of the library, such as 1.14.0 or 0.30.3.
The Axios library averages 83 million weekly downloads and is present in approximately 80% of cloud and code environments, creating a massive potential blast radius for this attack. The attack is attributed to North Korea, with Microsoft linking the attack to Sapphire Sleet (APT38, Stardust Cholima) and Google Threat Intelligence linking the attack to UNC1069.
Details of how the compromise happened have recently emerged. The lead Axios maintainer, @jasonsaayman, was targeted by a sophisticated social engineering attack. The threat actor cloned the identity of a legitimate, well-known company founder and created a fake Slack workspace imitating a corporate CI/CD environment. Saayman was then invited to a Microsoft Teams meeting under the guise of a collaboration opportunity, which triggered a fabricated "system error" message, prompting him to download a RAT disguised as a fix for the fake problem. This RAT enabled the threat actors to steal session cookies from his browser, bypassing MFA protections. This chain of events resulted in the threat actor's ability to compromise the npm registry trust model without arising any suspicion.
The recent Axios CTI report from Google includes several steps organizations can take to secure their environment from this threat:
Isolate developer environments in containers or sandboxes to restrict host filesystem access. Migrate plaintext secrets to the OS keychain using aws-vault. This will ensure malicious packages cannot programmatically scrape credentials or execute malicious scripts directly on the host machine.
Other Notable Supply Chain Attacks
Conclusion
Software supply chain attacks are here to stay. The secrets harvested from one supply chain attack feed the next attack, and on it goes. Organizations and developers can no longer trust "legitimate" software libraries and code dependencies. Steps must be taken to ensure development environments are isolated and credentials and secrets are secure. It is more important than ever for organizations to know what libraries and dependencies are running in the software on their systems (SBOMs). Automatically upgrading to the latest version of any software package now involves a large amount of risk. Developers and maintainers of code packages must also acknowledge that they are targets and take steps to protect themselves. In an age where everyone is vibe coding and developing applications at a breakneck pace, we need to slow down and ensure our software is being developed securely.
Resources
https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package
https://www.microsoft.com/en-us/security/blog/2026/04/01/mitigating-the-axios-npm-supply-chain-compromise/
https://labs.cloudsecurityalliance.org/research/csa-research-note-unc1069-axios-npm-supply-chain-20260403-cs/
https://www.wiz.io/blog/axios-npm-compromised-in-supply-chain-attack
https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan
https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
https://www.bleepingcomputer.com/news/security/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions/
https://thehackernews.com/2026/03/trivy-hack-spreads-infostealer-via.html
https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/
https://www.cisa.gov/topics/cyber-threats-and-advisories/sbom/sbomresourceslibrary
Vulnerability Roundup
Cisco recently disclosed two critical vulnerabilities, one for their Integrated Management Controller (IMC), and the other for their Smart Software Manager On-Prem (SSM On-Prem). The first flaw, CVE-2026-20093, is a critical vulnerability in IMC due to its incorrect handling of password change requests. Per the Cisco advisory, a threat actor can exploit this vulnerability by simply sending a crafted HTTP request to a vulnerable device. Successful exploitation can allow an attacker to bypass authentication, alter passwords of any user on the system, and gain access to the system as that user. The following products are affected:
The second critical vulnerability Cisco disclosed is tracked as CVE-2026-20160, and affects Cisco SSM On-Prem. The flaw is a result of an unintentional exposure of an internal service, whereby the threat actor can achieve remote code execution with root privileges by sending a crafted request to the API of the exposed service. This issue was patched in Cisco SSM On-Prem version 9-202601. Administrators are urged to apply these fixes as soon as possible.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-cli-execution-cHUcWuNr
https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
A critical SQL injection vulnerability in Fortinet FortiClient Endpoint Management Server (EMS), tracked as CVE-2026-21643 and originally disclosed on February 6, has recently been observed being exploited in the wild. The issue affects FortiClient EMS 7.4.4 and is fixed in versions 7.4.5 and above.
Over the weekend, Fortinet released an out-of-band fix for a separate vulnerability in FortiClient EMS that is also being actively exploited. Tracked as CVE-2026-35616, Fortinet says this is an Improper Access Control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted messages. The issue affects versions 7.4.5 through 7.4.6, and will be addressed in version 7.4.7. Administrators are urged to apply these fixes as soon as possible.
Details of an authentication bypass flaw (CVE-2026-2699) and a remote execution flaw (CVE-2026-2701) were recently disclosed for Progress ShareFile, an enterprise file transfer solution. These vulnerabilities specifically reside in the Storage Zone Controller, which is a customer-managed gateway that allows companies to store files in their own storage on-prem while still using the ShareFile SaaS interface. By chaining these exploits together, threat actors can achieve unauthenticated file exfiltration. The vulnerabilities affect branch 5.x of Progress Sharefile and were patched in version 5.12.4, released on March 10. Due to the exploitation details released by security researchers at watchTowr last week, risk of exploitation has increased. Vulnerabilities in public-facing file transfer solutions are frequently targeted by ransomware groups. Administrators are urged to patch as soon as possible.
https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26.html
https://www.bleepingcomputer.com/news/security/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks/
The following vulnerabilities were added to CISA's Known Exploited Vulnerabilities Catalog in the last 2 weeks:
This report is provided FREE to the cybersecurity community.
Visit our Cyber Threat Intelligence Blog for additional reports.
Subscribe to be notified of future Reports:
NOTE
We have enhanced our report with data from SOCRadar. You may need to register to view their threat intelligence content.
DISCLAIMER
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.
17 min read
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
17 min read
This week, we briefed our clients on the findings from Google's 2025 ransomware investigations. We highlighted the key TTPs used by ransomware...
16 min read
This week, we briefed our clients on a wave of new phishing campaigns worth noting due to their large scale and varied techniques—here are the TTPs.