CyberSecurity Knuggets

Mar 14, 2026

Subject: Risky Bulletin: Another residential proxy provider falls as authorities continue crackdowns

Sender: risky-biz@ghost.io

Key Points:

– American and European law enforcement seized infrastructure of SocksEscort, a residential proxy provider operating since 2021 with over 369,000 IPs.

– SocksEscort was linked by FBI, Europol, Dutch Police, and Lumen’s Black Lotus Labs to a malware operation infecting modems and home routers, associated with the AVRecon botnet.

– The botnet supported various cybercrime activities: ransomware, DDoS attacks, CSAM distribution. Operators reportedly earned over €5 million.

– FBI released advisories for telcos and consumers to protect routers and detect AVRecon infections.

– US crackdown ongoing against residential proxy networks used by foreign adversaries for masking attacks.

– Notable past takedowns include botnets like 911 S5, RSOCKS, Moobot, VPNFilter, and others.

– Breaches & incidents reported this week include:

* Former DOGE employee accused of stealing SSA data affecting 500 million Americans.

* FBI hacked in 2023, Epstein sex trafficking documents stolen.

* Iranian hackers wiped Stryker medical device maker’s systems; attributed to hacktivist group Handala.

* Cyberattacks targeted Polish nuclear center, Israel Railways signage, and Albania Parliament, linked to Iranian actors.

* Multiple data breaches reported at Quittr, Loblaw, Telus, Laurens county (SC), and Lotte Card fined for data leak.

* Michelin hit by Oracle EBS server hacking spree.

– General tech news: Dutch ISP Odido removed unauthorized AI telemetry data collection; Node.js slows release schedule; Atlassian layoffs; Automattic launches local WordPress instance; Chrome 146 release with new Sanitizer API; YouTube expands likeness detection; Meta introduces parental controls on WhatsApp.

– Government & policy: China warns against OpenClaw AI agent due to security risks; Iran threatens US tech firms; France reports rising data theft amid declining ransomware; new US Cyber Command leader appointed; EU extends voluntary CSAM scanning but Parliament votes to end untargeted mass scanning.

– Arrests & cybercrime: Thai police arrest 21 in scam operations; Nigerian hackers arrested in India; DigitalMint employee charged for ransomware attacks; Dutch police warn against hostile web hosting resellers; Joint ISAC advisory on Iranian threats; CISA mandates Cisco SD-WAN log uploads; malicious themes and campaigns uncovered; new threat actor techniques involving RMM daisy-chaining and Telegram bot abuse.

– Malware reports: Several botnets (RCtea, RondoDox), new malware variants (BlackSanta, Falcon, Venon), and attacks like PixRevolution highlighted.

– APT activity: Increased espionage around Middle East conflicts; Iranian hacktivist Handala profiled; Russian APT28 leaked Roundcube exploit kit.

– Vulnerabilities & patches: Apple patches iOS exploits (Coruna), Cisco advisories, live n8n exploitation, Simple-Git RCE, Azure Arc local privilege escalation patched, new ZIP evasion techniques, Google bug bounty totals top $17 million in 2025.

– Industry & events: Logpoint rebrands to Guardsix; Google closes Wiz deal; Kaspersky cuts French staff; ENISA releases package manager security guide; open source tools and conference videos released; podcasts on Trump Cyber Strategy and US cyber operations in Iran.

Subject: International operation takes down massive cybercrime proxy network SocksEscort

Sender: info@metacurity.com

Key Points:

– USA and European law enforcement dismantled SocksEscort, a global proxy network built from hacked routers and devices.

– SocksEscort operated a paid residential proxy service, facilitating cybercrime by masking attacker locations via approx. 369,000 compromised IPs across 163 countries since 2020.

– Action involved FBI, Europol, Eurojust, and agencies from Austria, France, Netherlands, and USA; seizure of 34 domains, 23 servers, and freezing roughly $3.5M cryptocurrency.

– The malware AVrecon infected routers, allowing attackers to route malicious traffic anonymously; botnet kept ~20,000 active infected devices at once.

– Crimes facilitated include cryptocurrency theft, account takeovers, and financial fraud in US, e.g., $1M crypto theft, $700k manufacturing fraud, $100k military credit card fraud.

– FBI issued advisory on securing routers: firmware updates, disable remote access features, change default passwords, monitor suspicious activity.

– Case highlights criminals’ increasing use of hijacked home devices to evade detection.

– Other major incidents:

* Telus investigates breach claimed by extortion group ShinyHunters; no impact on core services confirmed.

* Medical device maker Stryker hit by disruptive cyberattack linked to Iran-aligned actors, causing operational delays; Handala hacktivist claims responsibility.

* Former DOGE employee John Solly accused of stealing SSA data; internal and agency investigations ongoing; Solly denies allegations.

* GAO finds gaps in Pentagon’s Cybersecurity Maturity Model Certification (CMMC) rollout planning; DoD plans risk assessments.

* Google fixes two actively exploited Chrome zero-days (CVE-2026-3909 and CVE-2026-3910).

* Endor Labs exposes PhantomRaven npm supply-chain malware campaign stealing developer credentials and CI/CD tokens.

* Starbucks reports breach of 889 employee HR accounts; data exposed includes sensitive personal and banking info; identity protection offered.

* England Hockey investigates ransomware claim by AiLock group with 129GB data theft threat.

* FBI’s searches of Americans’ data collected under Section 702 FISA increased ~35% in 2025, raising privacy concerns amid upcoming reauthorization.

* Google paid $17M+ in bug bounties in 2025, a 40% increase over previous year, including new AI-related bug bounty programs.

– European Parliament voted against untargeted mass scanning of private communications (“Chat Control”).

– Data Labelers Association in Kenya demands better pay and conditions for AI training work.

– US officials warn about China’s extensive infiltration of telecoms.

– False positives in facial recognition continue to cause wrongful arrests as in recent Tennessee case.

Subject: Hacker Newsletter #786s

Sender: kale@hackernewsletter.com

Summary:

– Weekly curated content from Hacker News community.

– Highlights include tech essays, programming language development using Claude Code, software projects, and discussions on AI-assisted coding.

– Features articles on software tools, programming tips, design resources like turning handwriting into fonts, and thought pieces on stagnancy in publishing, science fiction, and personal productivity.

– Miscellaneous topics on workplace culture, security interviews, manufacturing precision, and leisure gaming.

– Community discussions on research projects, OSINT dashboards, automation, and AI agent engineering.

– The newsletter emphasizes human-driven conversation without AI-generated moderation.

Subject: The Homeland Security surveillance machines

Sender: info@metacurity.com

Key Points:

– Series of press investigations expose DHS’s quietly built surveillance system tracking Americans’ movements, identities, and digital activities.

– Mother Jones reports on DHS and US Secret Service plan for a central travel records database collecting airline passenger manifests and itineraries nationwide.

– Wired reveals internal turmoil in DHS privacy oversight after disclosure of biometric identification tools capturing data from migrants and US citizens; privacy teams reassigned and documents withheld from FOIA requests.

– Privacy Threshold Analyses, important for public transparency on surveillance, are being classified as privileged, limiting access.

– Independent reports from 404 Media highlight immigration enforcement’s use of commercial data brokers and analytics platforms to track individuals.

– The investigations collectively indicate a sweeping expansion of DHS’s surveillance infrastructure with limited public knowledge or oversight.

Subject: Europol and Interpol announce counter-cybercrime operations | The CyberWire 3.13.26s

Sender: editor@newsletter.n2k.com

Highlights:

– Europol launched “Operation Lightning,” dismantling SocksEscort criminal proxy service with over 369,000 compromised routers/IoT devices globally; seizure of domains/servers in seven countries; $3.5M crypto frozen; cooperation from Eurojust, Austria, France, Netherlands, US.

– Interpol concluded third wave of Operation Synergia with takedown of 45,000 malicious IPs/servers and 94 arrests across 72 countries; 40 arrests in Bangladesh; 110 under investigation.

– Google released emergency patches for two actively exploited Chrome zero-days: CVE-2026-3909 (out-of-bounds write in Skia) and CVE-2026-3910 (remote code execution in V8 engine).

– US DOJ charged Angelo Martino, former ransomware negotiator, for collaborating with BlackCat ransomware group to increase ransom payouts; co-conspirators previously pleaded guilty; DigitalMint and Sygnia firms not accused.

– Sponsored messaging emphasizes controlling application execution and security through ThreatLocker and Meter enterprise network solutions.

– CyberWire also promotes RSAC 2026 conference to gather cybersecurity community in San Francisco.

Subject: Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During Wars

Sender: news@securityweek.com

Summary:

– Iran-linked hackers continue disruptive cyber operations, including the attack on Stryker disrupting manufacturing and shipping.

– Increasing cyberattacks targeting US and allied targets raise concerns about escalation during ongoing and future conflicts.

– Exploitation of vulnerabilities in platforms like n8n workflow automation software; spreading Slopoly malware.

– Interpol announces cybercrime crackdowns aligning with similar international enforcement actions against SocksEscort.

– Major data breach at Starbucks affecting hundreds of employees due to phishing access of internal HR accounts; compromised sensitive PII and banking details.

– Security funding landscape evolving with new startups raising $40M.

– Google’s bug bounty payout surpasses $17M in 2025, showing continued emphasis on vulnerability discovery.

– Meta launches new security tools and platform protections.

– Chrome 146 update patches two active zero-days; Apple updates legacy iOS versions to address Coruna exploit framework.

– Other key stories: ransomware and malware developments, federal leadership appointments, and major cybersecurity conferences upcoming.


Summary of Insights Across Emails:

– Significant international law enforcement coordination culminated in the takedown of SocksEscort, a major residential proxy crime network based on infected home internet devices globally.

– Related disclosures highlight growing risks from malware like AVrecon and supply-chain infection campaigns (e.g., PhantomRaven npm malware).

– High-profile cyberattacks and data breaches continue, notably involving Iranian-linked threat actors and targeting medical, government, and corporate sectors.

– Software patching remains critical; Chrome zero-day exploits fixed urgently and numerous advisories released.

– Privacy and surveillance concerns arise around DHS’s expanded domestic tracking infrastructure and increasing FBI querying of surveillance data.

– Security research and bug bounty programs are growing, with large payouts from Google and increasing attention to AI-related vulnerabilities.

– Cybersecurity community and industry initiatives continue with events, tool releases, and collaborative threat intelligence sharing.

Stay Well!

summy
summy