Subscribe

Social Media Links

Insights

 | 3 minute read

Ankura CTIX FLASH Update – January 13, 2026

Malware Activity

A new wave of cyber threats is actively targeting both developers and everyday users. The “GlassWorm” malware campaign has shifted its tactics to infect macOS systems via malicious extensions for coding platforms like VSCode, aiming to steal passwords, cryptocurrency keys, and even hijack wallets. Attempts to replace legitimate wallet software are currently unsuccessful. Despite warnings, over 33,000 downloads of these harmful extensions highlight their widespread reach. Simultaneously, cybersecurity experts have uncovered a low-cost, highly obfuscated Python-based malware called VVS Stealer, which is designed to stealthily extract sensitive data such as Discord credentials, browser info, and cookies. This malware can hijack active sessions and is often used by cybercriminals to spread further attacks, turning compromised systems into tools for larger malicious activities. Both threats emphasize the importance of vigilance. Developers and users are urged to delete suspicious software, update passwords, and monitor their systems for signs of infection to safeguard their data and digital assets. CTIX analysts will continue to report on the latest malware strains and attack methodologies.


Threat Actor Activity

DarkSpecture’s Zoom Stealer Campaign Exploits Browser Extensions to Collect Meeting Data


Vulnerabilities

More than 10,000 Fortinet FortiGate firewalls remain exposed online and vulnerable to active exploitation of a critical two-factor authentication bypass flaw first patched in July 2020. The vulnerability, tracked as CVE-2020-12812, allows attackers to bypass FortiToken 2FA by altering the case of usernames under specific LDAP configurations, enabling unauthorized access to unpatched systems. Despite long-standing guidance from Fortinet and warnings from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the FBI, the issue continues to be abused in-the-wild, including in ransomware activity. Recent telemetry from Shadowserver shows over 1,300 vulnerable devices located in the United States alone. The continued exposure highlights a broader trend of threat actors persistently targeting Fortinet products, including newer authentication bypass and zero-day flaws, and mirrors past state-sponsored activity such as exploitation by Volt Typhoon, underscoring the ongoing risk posed by delayed patching and insecure configurations in perimeter security infrastructure. CTIX analysts urge all administrators and cybersecurity personnel to ensure that their infrastructure security stays as current as possible to prevent exploitation.

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with