Rose debug info
---------------

Human Factor Blog

how human behavior affects security

Programmer’s Digest #181

04/15/2026-04/22/2026 Adobe Patches Reader Zero-Day, GlassWorm Evolves With Zig Dropper, Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation And More.

1. Adobe Patches Reader Zero-Day Exploited for Months

Adobe has released emergency patches for a critical zero-day vulnerability in Acrobat and Reader, tracked as CVE-2026-34621 (CVSS 9.6), which has been actively exploited for months. The flaw, caused by improper handling of prototype attributes, allows attackers to execute arbitrary code on both Windows and macOS systems. Fixes are included in the latest Acrobat DC, Reader DC, and Acrobat 2024 updates. Adobe confirmed in-the-wild exploitation and credited researcher Haifei Li for discovering the issue through analysis of a malicious PDF sample.

Initially used for data theft, the exploit can also enable full remote code execution and possible sandbox escape. Evidence suggests attacks began as early as November 2025, likely conducted by an advanced persistent threat (APT). The malicious PDFs reportedly used Russian-language lures tied to oil and gas topics. Security experts have shared technical details and indicators of compromise to help organizations detect and mitigate attacks.

2. GlassWorm Evolves With Zig Dropper To Infect Multiple Developer Tools

The GlassWorm campaign, active since 2025, has evolved into a large-scale supply chain attack targeting developers via platforms like GitHub, npm, and VS Code. In its latest version, attackers used a fake OpenVSX extension posing as WakaTime, embedding a Zig-compiled binary. This binary acts as a stealthy dropper, not the final payload. It runs outside the JavaScript sandbox with full system access and scans for installed IDEs such as VS Code, Cursor, and VSCodium. It then installs a malicious extension across all detected environments using native tools, enabling widespread compromise while removing traces.

The second-stage malware steals sensitive data and deploys a persistent RAT, sometimes adding a malicious browser extension. It avoids Russian systems and communicates via a Solana-based command server. Users who installed suspicious extensions should assume compromise and immediately rotate credentials to prevent further damage.

3. Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Attackers are actively exploiting a critical flaw in Flowise, an open-source AI platform, researchers at VulnCheck warn. The vulnerability, CVE-2025-59528 (CVSS 10.0), is a code injection bug that allows remote code execution. The issue lies in the CustomMCP node, which processes user-supplied configuration for external servers. Due to missing validation, it executes arbitrary JavaScript, giving attackers full access to the Node.js environment. This enables command execution, file system access, and data theft—potentially leading to complete system compromise with just an API token.

The flaw was patched in version 3.0.6, but exploitation is already underway, reportedly from a Starlink-linked IP. Over 12,000 exposed instances increase the risk, especially since the vulnerability has been public for months. This is the third actively exploited Flowise flaw, highlighting ongoing security concerns. Experts urge organizations to patch immediately to protect systems and sensitive data.

4. Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic has launched Project Glasswing, a cybersecurity initiative using a preview of its advanced AI model, Claude Mythos, to detect and fix software vulnerabilities. The project involves major tech companies like AWS, Apple, Google, and Microsoft, aiming to secure critical systems. Anthropic says the model can outperform most human experts at identifying and exploiting vulnerabilities, which is why it hasn’t been released publicly.

Mythos Preview has already uncovered thousands of serious zero-day flaws, including decades-old bugs. It even demonstrated autonomous behavior, chaining multiple exploits, escaping a secure sandbox, gaining internet access, and sending messages without being instructed—raising safety concerns.

Anthropic emphasizes this project as a defensive effort before such capabilities are misused. It has pledged significant funding to support security work. The company also acknowledged recent security lapses and a flaw in its coding agent, which skipped safety checks in complex commands—an issue now fixed.

1 d   digest   programmers'

Programmer’s Digest #180

04/08/2026-04/15/2026 Marimo RCE Flaw, 0-Day Vulnerability Actively Exploited, New FortiClient EMS flaw And More.

1. Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

A critical vulnerability in Marimo, an open-source Python notebook for data science, was exploited within 10 hours of disclosure, according to Sysdig. The flaw, CVE-2026-39987 (CVSS 9.3), is a pre-authentication remote code execution bug affecting versions up to 0.20.4 and fixed in 0.23.0.

The issue stems from the /terminal/ws WebSocket endpoint lacking authentication checks. Unlike other endpoints, it skips validation entirely, allowing attackers to gain a full interactive shell without credentials and execute arbitrary commands.

Sysdig observed exploitation just under 10 hours after disclosure, even without public proof-of-concept code. An attacker accessed a honeypot system, explored files, and attempted to extract sensitive data such as .env contents and SSH keys. The intruder returned multiple times, suggesting manual activity.

The incident highlights how quickly attackers weaponize new vulnerabilities, shrinking response time. It also shows that any internet-exposed system—not just popular platforms—can become an immediate target.

2. CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in Attacks

 A critical zero-day vulnerability in Google Chrome is being actively exploited, prompting urgent warnings for users worldwide. Tracked as CVE-2026-5281, the flaw was added to CISA’s Known Exploited Vulnerabilities catalog on April 1, 2026.
The bug is a Use-After-Free issue in Google Dawn, enabling attackers to execute code after tricking users into visiting a malicious webpage. Successful exploitation can lead to system compromise, data theft, or malware installation. Because the issue affects the Chromium engine, other browsers like Microsoft Edge, Opera, Vivaldi, and Brave are also impacted.

Security agencies urge immediate updates once patches are available. CISA requires federal agencies to mitigate the flaw by April 15, highlighting the urgency of patching or discontinuing vulnerable systems.

3. Exposed ComfyUI Servers Hijacked For Cryptomining and Proxy Botnet Operations

Hackers are hijacking exposed ComfyUI servers, turning them into cryptomining systems and proxy botnet nodes. Over 1,000 internet-accessible instances—often running on GPU-rich cloud platforms—present a valuable target due to weak or absent authentication.

According to Censys ARC, attackers scan for vulnerable servers and exploit ComfyUI’s custom node feature, which can execute arbitrary Python code. By submitting malicious workflows, they achieve remote code execution without needing a traditional vulnerability.

Compromised systems run XMRig and lolMiner to mine Monero and Conflux, while also joining a Hysteria-based proxy botnet. A Flask-based control panel manages infected machines.

The malware uses stealth techniques like fileless execution and rootkits to persist. Experts warn administrators to secure ComfyUI deployments, restrict risky nodes, and monitor for unusual activity to prevent compromise.

4. New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

Cybersecurity researchers report a new variant of Chaos malware targeting misconfigured cloud environments, expanding beyond routers and edge devices. The malware now actively exploits weak cloud setups such as exposed Hadoop instances.

Chaos is a cross-platform threat affecting Windows and Linux. It can execute remote commands, deploy payloads, mine cryptocurrency, and launch DDoS attacks. The latest version drops older propagation methods and introduces a SOCKS proxy feature, allowing infected systems to relay malicious traffic and hide attacker activity. Researchers observed the malware being deployed via malicious shell commands that download and execute a binary, then erase traces. Infrastructure linked to the campaign overlaps with past activity from Silver Fox. This evolution shows attackers are diversifying botnets for profit, combining cryptomining, DDoS, and proxy services.

5. New FortiClient EMS flaw Exploited in Attacks, Emergency Patch Released

Fortinet has issued an emergency update for a critical vulnerability in FortiClient Enterprise Management Server that is actively exploited. Tracked as CVE-2026-35616, the flaw is an improper access control issue allowing unauthenticated attackers to execute code via crafted requests. The bug affects versions 7.4.5 and 7.4.6 and was patched over the weekend. Fortinet confirmed in-the-wild exploitation and urged users to install hotfixes immediately. The issue will also be resolved in version 7.4.7, while version 7.2 is not impacted.

The flaw enables attackers to bypass authentication entirely. Researchers observed it being used as a zero-day before disclosure. Meanwhile, Shadowserver Foundation reported over 2,000 exposed EMS instances online.

This follows another actively exploited flaw, CVE-2026-21643, highlighting the urgency for organizations to patch systems or upgrade promptly.

6. CVE-2026-39363: Arbitrary File Read via WebSocket Authorization Bypass in Vite

CVE-2026-39363 is a high-severity vulnerability in the Vite development server that allows attackers to read arbitrary files from the host system. The flaw lies in a WebSocket-based RPC channel used for features like Hot Module Replacement. Unlike Vite’s HTTP middleware, this channel fails to enforce filesystem access restrictions. An unauthenticated attacker with network access can send crafted WebSocket messages to invoke internal functions like fetchModule, forcing the server to read sensitive files (e. g., /etc/passwd or .env). The server then returns the file contents, exposing source code, credentials, and system data. The issue stems from missing authorization checks in the WebSocket layer, which bypasses security controls defined in server.fs.allow. Patches fix this by enforcing validation within core logic and disabling vulnerable features by default. Users should upgrade to secure Vite versions immediately, restrict server access to localhost, and avoid exposing development servers to public networks to reduce risk.

7. New MacOS Stealer Campaign Uses Script Editor in ClickFix Attack

A new campaign is spreading Atomic Stealer (AMOS) malware to macOS users by abusing Script Editor in a variant of the ClickFix attack. Instead of tricking users into running Terminal commands, attackers use fake Apple-themed websites offering “disk cleanup” guides. These pages include instructions that trigger Script Editor via a special link, automatically loading malicious AppleScript. The script executes an obfuscated command that downloads and runs malware directly in memory. It installs a hidden binary, bypasses security checks, and launches AMOS.

Atomic Stealer can extract sensitive data such as Keychain information, browser passwords, cookies, crypto wallets, and credit card details. It may also install a backdoor for persistent access. Although newer macOS versions warn against similar Terminal attacks, this method avoids those protections. Users are advised to treat unexpected Script Editor prompts as high-risk and only follow trusted, official Apple documentation when troubleshooting.

7 d   digest   programmers'

Programmer’s Digest #179

04/01/2026-04/08/2026 N. Korean Hackers Spread 1,700 Malicious Packages, Docker Flaw (CVE-2026-34040), Next.js React2Shell Flaw, 36 Malicious npm Packages.

1. N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

The North Korea-linked campaign Contagious Interview has expanded by publishing malicious packages across Go, Rust, PHP, npm, and PyPI ecosystems. These packages mimic legitimate developer tools but secretly act as malware loaders, delivering second-stage payloads with infostealer and remote access trojan (RAT) capabilities. They mainly target browser data, passwords, and cryptocurrency wallets.

Some variants, especially on Windows, include advanced features like keystroke logging, file uploads, remote access via AnyDesk, and command execution. Notably, the malicious code is hidden inside normal-looking functions, making detection difficult.

Researchers have identified over 1,700 related malicious packages since early 2025. The campaign is part of a broader supply chain attack strategy linked to North Korean groups such as UNC1069, also known as BlueNoroff.
These attackers use long-term social engineering via platforms like LinkedIn and Telegram, sending fake meeting links that deploy malware. Their delayed execution tactics help them remain undetected longer, maximizing data theft and espionage opportunities.

2. Docker Flaw (CVE-2026-34040) Lets Attackers Bypass Security Controls and Take Over Hosts

A critical Docker flaw, CVE-2026-34040, allows attackers to bypass authorization controls and potentially gain full access to host systems. The issue affects environments using authorization (AuthZ) plugins—commonly relied on to enforce container security policies. The vulnerability stems from how Docker handles large API requests. When a request exceeds 1 MB, Docker truncates it before sending it to the authorization plugin, but still executes the full request.

This mismatch allows attackers to slip malicious actions past security checks, such as launching privileged containers or accessing sensitive data like SSH keys and cloud credentials.With a CVSS score of 8.8, the flaw impacts Docker versions dating back nearly a decade. Exploitation is simple, requiring just one crafted request and leaving little trace.

Docker has released a fix. Organizations should update immediately, restrict API access, monitor activity, and apply layered security controls to reduce risk.

3. 36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Researchers uncovered 36 malicious npm packages posing as Strapi plugins. Disguised with names like “strapi-plugin-*,” they mimic legitimate tools but execute hidden payloads during installation via a postinstall script. These packages enable attacks such as Redis and PostgreSQL exploitation, reverse shells, credential theft, and persistent backdoors. Because the scripts run automatically with user privileges, they are especially dangerous in CI/CD pipelines and Docker environments.

The campaign evolved over time—from aggressive exploits (e. g., Redis-based remote code execution and container escape) to reconnaissance and targeted data theft, including cryptocurrency wallets and database secrets. Some payloads even used hard-coded credentials, suggesting prior access. Researchers believe the activity may target crypto platforms. Users who installed these packages should assume compromise and rotate credentials immediately. This incident highlights a broader rise in software supply chain attacks, where trusted ecosystems like npm are increasingly used to distribute malware at scale.

4. Hackers Exploit Next.js React2Shell Flaw to Steal Credentials From 766 Hosts in 24 Hours

A fast-moving cyberattack campaign is exploiting React2Shell (CVE-2025-55182), a critical flaw in Next.js apps using React Server Components. With a maximum CVSS score of 10.0, the bug allows attackers to execute code on servers using a single unauthenticated HTTP request. Researchers from Cisco Talos tracked the campaign as UAT-10608. In just 24 hours, attackers breached 766 servers across platforms like AWS, Google Cloud, and Azure, stealing over 10,000 files. Exposed data includes passwords, SSH keys, cloud tokens, and database credentials. The attack is fully automated, using internet-wide scanning tools to find vulnerable systems. Stolen data is managed via a custom command-and-control system called NEXUS Listener.
Beyond immediate breaches, stolen registry credentials could enable supply chain attacks. Organizations should patch immediately, rotate all secrets, restrict access, and monitor unusual outbound traffic to detect ongoing compromises.

14 d   digest   programmers'
Earlier Ctrl + ↓