Malware Activity
Data Theft, Social Engineering, and Malicious Apps
Recent reports highlight a surge in sophisticated cyberattacks involving data theft, social engineering, and malware. The hacking group ShinyHunters, along with similar threat actors, uses fake phone calls (vishing) and impersonation of IT staff to trick employees into revealing login details and multi-factor authentication codes. These attackers gain access to cloud services like Google Drive and Microsoft 365, then move laterally to steal or delete sensitive information, often engaging in extortion by leaking data. Meanwhile, a new Android malware campaign exploits trusted platforms like Hugging Face to host malicious APK files, which disguise themselves as legitimate security apps. Once installed, these apps use device permissions to monitor activity, capture data, and mimic banking apps to steal financial information. Experts warn users to avoid third-party app stores, scrutinize app permissions, and enable stronger security measures such as hardware security keys and vigilant monitoring to defend against these evolving threats. CTIX analysts will continue to report on the latest malware strains and attack methodologies.
- BleepingComputer: Mandiant Details How ShinyHunters Abuse SSO To Steal Cloud Data article
- TheHackerNews: Mandiant Finds ShinyHunters Style Vishing Attacks Stealing MFA to Breach SaaS Platforms article
- BleepingComputer: Hugging Face Abused To Spread Thousands Of Android Malware Variants article
- SecurityWeek: Hugging Face Abused to Deploy Android RAT article
Threat Actor Activity
Notepad++ Supply Chain Attack Targeted Update Feature to Deliver Malware, Suspected State-Sponsored Hackers
State-sponsored attackers, likely linked to Chinese groups as reported by multiple independent researchers, hijacked Notepad++’s update mechanism to redirect traffic to malicious servers. The attack, which compromised the hosting provider’s infrastructure rather than Notepad++ code, began in June 2025 and targeted specific users, particularly in telecommunications and financial services in East Asia. The attackers exploited a flaw in the update verification process, allowing them to serve tampered update manifests. Despite losing server access temporarily in September 2025, they maintained control until December by using stolen internal service credentials. The incident was attributed to the Violet Typhoon group (aka APT31) and later linked to the Chinese APT group Lotus Blossom by Rapid 7 researchers, who identified a sophisticated backdoor named Chrysalis. This campaign exposes aspects of security exposure faced by software supply chains, especially those involving open-source projects. The attack followed a pattern similar to previous incidents like ASUS’s ShadowHammer campaign, with selective targeting rather than broad exploitation. Notepad++ has since migrated to a new hosting provider, strengthened its update mechanism, and implemented cryptographic signing for updates in version 8.8.9. CTIX Analysts advise users to change credentials, update systems, and enable automatic updates. The Notepad++ team plans further security enhancements, including mandatory certificate signature verification in version 8.9.2, expected soon.
- Bleeping Computer: Notepad++ Attack Article
- The Record: Notepad++ Attack Article
- The Hacker News: Notepad++ Attack Article
- SentinelOne: ASUS Supply Chain Attack Article
Vulnerabilities
Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Prompting Emergency Mitigations and Federal Action
Ivanti disclosed and patched two (2) critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM),
- Bleeping Computer: CVE-2026-1281 and CVE-2026-1340 Article
- The Hacker News: CVE-2026-1281 and CVE-2026-1340 Article
📧 Never Miss a Briefing
Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure.
Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.
