CyberSecurity Knuggets
Mar 17, 2026
Email 1: Risky Bulletin by Catalin Cimpanu (Published 16 Mar 2026)
Main topic: Meta’s crackdown on Mexican and Latin American drug cartel accounts on Facebook and Instagram
- Meta suspended thousands of accounts tied to drug cartels last year.
- These accounts were used for recruitment, drug advertising, organizing violence, and extortion.
- Meta used AI to detect coded cartel language and photos of drugs; human reviewers confirmed suspicions.
- Most accounts operated in Mexico; some in the U.S.
- Some accounts glorified criminal activity to recruit vulnerable youth.
- Meta issued warnings to users interacting with these accounts, increasing account deactivation and unfriending.
- Effort expanded to Brazil, Colombia, and Haiti.
- Other significant operations included taking down Iranian influence campaigns and nearly 11 million cyber scam accounts.
- Additional News Highlights:
- Former German intelligence official fell victim to signal phishing attacks.
- Leak of Swedish government e-portal source code by hacker “ByteToBreach.”
- Public parking meters in Russia’s Perm city crashed due to DDoS attack.
- Malware hijacking cryptocurrency addresses discovered via supply chain attack on AppsFlyer.
- Instagram to disable end-to-end encrypted DMs in May 2026.
- Adobe settled a $75 million DOJ investigation related to hidden termination fees.
- Activision targets Call of Duty game leakers with cease and desist letters.
- Chrome to release a version for Linux Arm64 in Q2 2026.
- European Office alternative—Office.eu—launched.
- Meta implicated in lobbying for age-verification laws moved from social networks to OS/app store level.
- UK pushes tech companies for stronger age verification on platforms.
- FBI FISA searches increased by about 35% in 2025.
- Spyware controversy in Greece involving company Intellexa and government accusations.
- Moscow mobile internet cut off for over a week without explanation.
- Cybercrime and arrests:
- Interpol detained 94 individuals in a global cybercrime crackdown.
- British man charged in Dubai for posting Iranian missile strike videos.
- Tennessee grandmother jailed for 6 months due to AI facial recognition error.
- Trial against Israeli company linked to cyber scam software underway in Germany.
- New ransomware group AiLock leaks victims.
- FBI probes Steam platform malware affecting games via stolen credentials.
- Malware technical analysis included new variants such as Phexia Stealer (macOS), ACRStealer, MIMICRAT RAT, GlassWorm self-replicating worm, and AI-generated ransomware backdoor code Slopoly.
- Reports on advanced persistent threat groups in Southeast Asia and Middle East.
- Vulnerabilities patched in Chrome including zero-days; cracks in AppArmor Linux framework dubbed “CrackArmor.”
- New tools released: Pius asset discovery, Betterleaks secrets scanner, IRFlow Timeline for DFIR, Elfina ELF loader.
- Risky Business and Between Two Nerds podcasts with topics on US cyber operations and Trump’s cyber strategy.
Email 2: The Cybersecurity Club Newsletter – WK 11, 2026 (Published 16 Mar 2026)
Main topics: FBI network breach, major cybersecurity incidents & vulnerabilities
- Executive update: CNCERT issues second warning on critical security risks in OpenClaw AI agent, widely deployed by Chinese government and cloud services despite vulnerabilities leading to potential credential theft, data exfiltration, and command misinterpretation.
- Malware & vulnerabilities:
- Google patches two active zero-day bugs in Chrome.
- CrackArmor vulnerability impacts millions of Linux systems using AppArmor.
- SQL injection vulnerability patched in Ally WordPress plugin (200,000+ sites).
- Breaches & incidents:
- Former Department of Government Efficiency (DOGE) employee accused of stealing 500 million Social Security numbers on a thumb drive.
- FBI investigating breach of its own Digital Collection System Network, suspecting Chinese involvement.
- Loblaw investigates breach exposing customer names, phones, emails.
- Starbucks phishing attack disclosed affecting 889 employees exposing PII including SSNs.
- Threat Intel & Info Sharing:
- UK financial sector identifies 29 short-term operational threats emphasizing nation-state cyberattacks.
- Iran-backed Handala group wiper malware hit medical device firm Stryker, wiping systems globally.
- Poland foiled cyberattack targeting nuclear research center with suspected Iranian involvement.
- Business email compromise scam cost Laurens County $1.5 million.
- PixRevolution trojan hijacks real-time Pix payment transactions in Brazil.
- Meta to shut down Instagram’s end-to-end encrypted chats in May 2026 to improve content moderation.
- Fake government and Starlink apps used in malware campaigns in Brazil.
- Federal investigation into ransomware facilitator linked to DigitalMint, responsible for $75 million in extortions.
- ShinyHunters threatens ~400 companies over stolen Salesforce data.
- Fake Cisco SD-WAN PoCs causing confusion amid real exploits.
- Laws & regulations:
- INTERPOL’s Operation Synergia III dismantled 45,000 malicious IPs, arrested 94 suspects.
- CISA flags critical remote code execution bug in n8n software; many instances remain vulnerable.
- Taiwan indicts 62 over scam center operation in Cambodia.
- Russian ransomware administrator pleads guilty to wire fraud conspiracy.
- Chinese authorities issue second warning on OpenClaw AI risks.
- US Cyber National Mission Force changes commander.
- FBI searches of US persons’ data increased significantly in 2025.
- Privacy posts:
- New regulatory focus on “choice integrity” in data consent with stronger enforcement demands from California, France, and FTC.
- California AG’s Disney settlement emphasizes durable and frictionless consumer opt-outs.
- Trends & reports:
- France’s ANSSI reports 3,586 cyber events in 2025 (down 18% YoY), focused on education, government, healthcare, telecom sectors.
- Increasing convergence of cybercrime and state-sponsored activity.
- Upcoming events/Sponsors: Invitations to sponsor cybersecurity events.
Email 3: Metacurity – FBI probes crypto theft linked to malware-infected Steam games (Published 16 Mar 2026)
- FBI seeks info from victims who installed malware-infected Steam games between May 2024 – Jan 2026.
- Notable malware-infected games: BlockBlasters, Chemia, Dashverse, Lampy, Lunara, PirateFi, Tokenova.
- Malware designed to steal cryptocurrency and hijack user accounts.
- One streamer reported $32,000+ loss during a livestream from crypto drain.
- Interpol arrested 94 suspects in Operation Synergia III targeting global cybercrime rings including phishing and romance scams.
- North Korea’s Konni Group used KakaoTalk to spread info-stealing malware targeting South Korean victims.
- Japan saw 226 ransomware incidents in 2025, mostly affecting small/midsize businesses.
- China requested proof from Costa Rica regarding allegations of Chinese cyber espionage at Costa Rican Electricity Institute.
- Greek government implicated in a spyware scandal involving Intellexa sales of Predator spyware.
- UK Companies House website had vulnerability exposing corporate and personal data of company directors.
- “Online Services Accord Against Scams” signed by major tech firms including Google, Meta, Microsoft, and Amazon to share threat intelligence and combat scams.
- EU proposes ban on AI tools generating sexual deepfake content without consent, driven by abuses in “Grok” AI on platform X.
- Swedish e-government platform data breach by ByteToBreach hacker group leaking source code and citizen data.
- Printer security underestimated in SMBs despite risk of data exposure.
- IBM X-Force identified AI-assisted backdoor malware “Slopoly” used in ransomware attacks.
- Meta enhancing detection of impersonation and low-quality AI content on Facebook.
- DHS funding AI-based surveillance projects raising privacy concerns.
- Romania Ministry of Foreign Affairs suffered DDoS attacks on online platforms.
- Meta to discontinue Instagram end-to-end encrypted messages May 8, 2026.
- Samsung Galaxy S26 Ultra introduces software-based Privacy Display for screen content obscuring.
- Open-source security tool Betterleaks released for detecting secret exposures in code bases.
- Scanner cybersecurity startup raises $22 million in Series A funding.
- Warnings about misinformation and misuse of AI-generated content in ongoing conflicts.
Email 4: N2K CyberWire Daily Briefing (March 16, 2026)
- Drone strike on Qatar helium facility shuts down about 1/3 global helium supply, critical to semiconductor manufacturing. Disruptions expected for months; South Korea especially vulnerable.
- Chinese cyberespionage campaign targeting Southeast Asian military since 2020. Focused and patient intelligence gathering on military capabilities and cooperation.
- Telus Digital investigating breach claims of near a petabyte of data stolen by ShinyHunters group. TELUS denies disruption and reopening investigation.
- Updates & technical news:
- FBI investigates malware hidden in Steam-hosted games.
- Attackers exploiting AI faster than defenders can.
- Microsoft releases out-of-band hotpatch to fix critical Windows 11 vulnerability.
- Advertisements for Meter secure network and CyberWire podcast promotions.
Email 5: SecurityWeek – Supply Chain Security Summit Invitation
- Invitation to virtual event on March 18, 2026: Supply Chain & Third-Party Risk Security Summit.
- Topics: software supply chain risk, malware, data exposure, compromised dependencies.
- Features top security experts sharing frameworks, tools, best practices.
- Details and registration links included.
Email 6: SecurityWeek – Oracle EBS Hack, Data Breaches & Vulnerabilities (March 16, 2026)
- Oracle E-Business Suite hack: Four major companies remain silent on breach impact.
- Security incidents:
- Starbucks employee data breach disclosed.
- Sophisticated phishing attack targets security firm executive.
- China-linked hackers attack Asian militaries in espionage campaign.
- Credential theft campaign targeting VPN users.
- Python repos compromised by ForceMemo after GlassWorm credential theft.
- Attempted hack on Poland’s nuclear research center.
- Loblaw data breach exposed customer info.
- Technical patches:
- Critical HPE AOS-CX vulnerability allowing admin password resets.
- Chrome 146 patches two exploited zero-days.
- Apple patches iOS legacy versions for Coruna exploits.
- WordPress plugin flaw affects over 200,000 sites.
- Cisco patches multiple vulnerabilities; n8n RCE exploit fixed.
- Supply chain attack linked to North Korea impacts 100k sites.
- Virtual events and expert insight articles on social vetting, vulnerability management, SIM swap attack risks.
- Other news: Meta disrupts scam centers, Google bug bounties total $17 million in 2025, new security startups funding.
Summary:
Across these emails dated mid-March 2026, major themes include heightened cyber espionage and cybercrime activities globally, with a focus on:
- Government and military targeted campaigns from state actors like China, Iran, North Korea.
- Significant breaches affecting US government entities (FBI, SSA), corporations (Starbucks, Telus, Loblaw), and infrastructure assets.
- Increasing adoption and warnings over AI agent software like OpenClaw that pose novel cybersecurity risks.
- Expanded law enforcement actions including Interpol’s Operation Synergia III arrests.
- Ongoing software supply chain risks and vulnerabilities patched across multiple platforms and ecosystems.
- Concerns about privacy, surveillance, and regulatory enforcement mature with US and EU tightening rules on data and AI-generated content.
- Technology trends like embedded hardware privacy features and improved threat intel sharing alliances.
The urgent need for improved cyber defenses, vulnerability management, and cross-industry collaboration is emphasized, alongside emerging challenges posed by AI-powered tools and sophisticated malware campaigns.
Stay Well!
