Malware Activity
How Attackers Are Turning Trusted Platforms into Weapons
Recent cyber campaigns show how attackers are increasingly exploiting trust in well‑known brands and platforms to carry out effective attacks. In one case, criminals set up a fake Claude AI website that looks legitimate and tricks Windows users into downloading malware hidden inside a supposed “Claude‑Pro Relay” tool, giving attackers remote control over infected systems. In another campaign, hackers abuse Google’s paid search ads to impersonate GoDaddy’s ManageWP login, leading victims to a nearly identical sign‑in page that steals usernames, passwords, and even two‑factor codes in real time. Both attacks rely on appearing authentic, using trusted names, professional design, and top search results, to lower suspicion and increase success. Once access is gained, the impact can be severe, ranging from full system control to takeover of hundreds of connected WordPress sites. Together, these incidents highlight a growing pattern where threat actors combine social engineering, advertising platforms, and familiar branding to bypass security awareness and technical defenses with alarming ease. CTIX analysts will continue to report on the latest malware strains and attack methodologies.
- BleepingComputer: Fake Claude AI Website Delivers New ‘Beagle’ Windows Malware article
- BleepingComputer: Hackers Abuse Google Ads For GoDaddy ManageWP Login Phishing article
Threat Actor Activity
US “Laptop Farmers” Jailed for Helping North Korean IT Workers Infiltrate Companies
Two (2) US nationals, Matthew Isaac Knoot and Erick Ntekereze Prince, were each sentenced to eighteen (18) months in prison for operating “laptop farms” that helped North Korean IT workers fraudulently obtain remote jobs at nearly seventy (70) American companies. Acting as facilitators, they received company issued laptops tied to stolen identities, installed unauthorized remote access tools, and allowed North Korean workers to appear as legitimate US-based employees. Companies unknowingly paid over $1.19 million in salaries to these workers, with most funds routed overseas, while remediation and auditing costs exceeded $1.5 million. Knoot and Prince must also forfeit and pay restitution totaling over $100,000. The sentences are part of a broader US crackdown on North Korea’s illicit revenue schemes, which rely on thousands of IT workers using identity theft to infiltrate Western firms. Other US “laptop farmers” have recently received prison terms, including one Arizona woman sentenced to one hundred and two (102) months for enabling North Korean workers to be hired by more than three hundred (300) US companies.
Vulnerabilities
State Sponsored Threat Actors Exploit Critical PAN-OS Zero-Day to Compromise Edge Infrastructure
Palo Alto Networks has disclosed active exploitation of CVE-2026-0300, a critical PAN-OS zero-day vulnerability affecting the User-ID Authentication Portal and Captive Portal features on PA-Series and VM-Series firewalls that allows unauthenticated remote code execution (RCE) with root privileges via specially crafted packets. The flaw, caused by a memory corruption and buffer overflow condition within the User-ID Authentication Portal service, has been linked to a suspected state-sponsored espionage cluster tracked as CL-STA-1132, which began unsuccessfully probing vulnerable internet-facing devices as early as April 9, 2026, before successfully achieving RCE roughly one (1) week later by injecting shellcode into nginx worker processes on compromised firewalls. Following initial access, the attackers conducted extensive anti-forensics activity, including clearing kernel crash messages, deleting nginx crash logs and core dump files, and removing other indicators of compromise in an effort to evade detection. Researchers observed the adversaries conducting Active Directory enumeration and deeper post-exploitation reconnaissance while leveraging open-source tunneling and proxy tools such as EarthWorm and ReverseSocks5 (utilities previously associated with multiple China-nexus threat groups) to facilitate persistence and lateral movement. The campaign reportedly escalated further on when attackers generated large volumes of authentication traffic to force failover to a secondary firewall appliance, which they then compromised and equipped with additional remote access tooling. Palo Alto warned that the attackers intentionally relied on intermittent hands-on-keyboard activity and publicly available tooling to remain below behavioral and signature-based detection thresholds. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has since added the flaw to its Known Exploited Vulnerabilities (KEV) catalog despite patches not yet being available. The activity reflects a broader multi-year trend in which state-backed cyber espionage actors increasingly target edge-network infrastructure because these systems provide privileged network access while often lacking the extensive logging, telemetry, and endpoint security controls commonly deployed on traditional endpoints. Until patches are released, CTIX analysts urge organizations to restrict User-ID Authentication Portal access to trusted zones, disable the feature entirely if unused, disable Response Pages on exposed interfaces, and enable Threat ID 510019 protections through Advanced Threat Prevention updates.
📧 Never Miss a Briefing
Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure.
Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.
