< ciso
brief />
Chip Flaws, Browser Threats, And Ransomware Pressure

Chip Flaws, Browser Threats, And Ransomware Pressure

Coverage: 19 Jan 2026 (UTC)

< view all daily briefs >

Preventive controls led the day. Researchers detailed StackWarp, a microarchitectural flaw that weakens AMD SEV‑SNP isolation in confidential VMs, while Mandiant released rainbow tables that make cracking NTLMv1 trivial, pressing organizations to retire legacy authentication. Alongside cloud and SaaS hardening, defenders confronted enterprise-targeted browser threats and renewed ransomware pressure, from law‑enforcement action against Black Basta to stealth tooling discovered inside a Fortune 100 network.

Hardening chips, protocols, and AI agents

Academics disclosed StackWarp, tracked as CVE‑2025‑29943, showing how a host with administrative control and a coordinated hyperthread can manipulate the stack pointer inside an AMD SEV‑SNP‑protected VM by abusing the CPU’s stack engine optimization. The demonstration included recovering an RSA‑2048 key from a faulty signature, bypassing OpenSSH password prompts and sudo, and gaining kernel‑mode execution inside a confidential VM. AMD has issued microcode updates, with additional AGESA patches scheduled for certain EPYC Embedded models, and operators are urged to apply firmware updates and consider disabling hyperthreading where practical. The finding underscores how subtle microarchitectural effects can undermine system‑level isolation even when memory remains encrypted.

Separately, AppOmni detailed BodySnatcher, a severe flaw in ServiceNow Now Assist AI Agents and the legacy Virtual Agent API that allowed unauthenticated execution of privileged agentic workflows via shared tokens, default example agents, and permissive linking. In a proof‑of‑concept, the Record Management AI Agent created and elevated a backdoor account to full admin. ServiceNow patched hosted instances and issued updates for self‑hosted customers; administrators should audit provider definitions, token use, and linking scripts, enforce MFA for linking, and enable steward approvals via AI Control Tower. In parallel, a Miggo Security disclosure showed how indirect prompt injection in Gemini could turn calendar invites into a covert exfiltration channel by having the assistant summarize private meetings into a new event visible to an attacker. Google addressed the issue, and the case illustrates the risks of granting assistants broad read/write scopes in productivity suites.

To push legacy protocol retirement, Mandiant published precomputed tables that map NTLMv1 challenge‑responses back to NT hashes in roughly 12 hours on modest hardware, making the protocol’s weaknesses impossible to ignore. Organizations should locate where NTLMv1 persists—often in older devices, drivers, and embedded stacks—classify it as high risk, and set removal timelines. Looking ahead to timekeeping risks, guidance from Kaspersky warns that Y2K38 (32‑bit Unix time overflow) still lurks in embedded and OT/IoT systems, certain filesystems and protocols. Teams should improve asset inventories, test in controlled, time‑isolated environments, and plan migrations or replacements where fixes are unavailable; incorrect time can also break certificate validation and communications.

Browser threats target enterprises

Huntress tracked a malvertising campaign that pushed a fake ad‑blocker, “NexShield,” to the Chrome Web Store. Branded as a lightweight, privacy‑first extension, it instead induced a browser hang by spawning infinite runtime port connections—a ClickFix variant Huntress calls CrashFix. After the crash, victims were prompted to paste a command that launched an obfuscated PowerShell chain; domain‑joined hosts received a Python‑based remote access tool, ModeloRAT, capable of reconnaissance, registry edits, and further payload deployment. The extension delayed execution to evade detection and attempted to hinder analysis, indicating a shift toward enterprise‑focused tradecraft.

In a separate cluster, researchers at Socket uncovered five malicious Chrome extensions posing as productivity helpers that targeted Workday, Netsuite and SAP SuccessFactors. As reported by Socket, the add‑ons harvested authentication cookies and session tokens—some exfiltrating every 60 seconds—while manipulating admin pages to frustrate remediation. The combination of cookie theft and defensive disruption enabled persistent session hijacking. Enterprises should enforce Chrome Enterprise allowlists, scrutinize extension permissions tied to HR/ERP platforms, and treat coordinated extension activity as a high‑priority threat.

Ransomware pressure and covert footholds

German federal authorities announced an arrest warrant for the alleged head of the Black Basta ransomware group and searched residences in Ukraine, seizing digital and physical evidence. According to CSO, Black Basta has been among the most active actors in recent years, with over 100 extortion incidents in Germany and more than €20 million in ransom paid within the country. Partners in the Netherlands, Switzerland and the UK joined the operation, which aims to map infrastructure, affiliates, and financial flows to support further arrests and legal action. The case highlights the sustained, transnational approach required to disrupt ransomware ecosystems.

On the operations side, responders identified a stealthy Windows backdoor dubbed PDFSider during an incident at a Fortune 100 financial firm. As detailed by BleepingComputer, attackers abused DLL side‑loading via a signed PDF24 Creator binary and a tampered cryptbase.dll to run code under a trusted process. PDFSider remains memory‑resident, executes commands through anonymous pipes to cmd.exe, and exfiltrates system data over encrypted DNS to attacker‑controlled VPS infrastructure, employing anti‑analysis checks and AES‑256‑GCM encryption via the Botan library. Resecurity has observed the tool in ransomware contexts, warning that its stealth and flexible C2 resemble espionage‑style tradecraft.

Incidents and disruptive operations

The technology distributor Ingram Micro disclosed that a July 2025 ransomware‑related intrusion led to data theft affecting more than 42,000 individuals. According to BleepingComputer, exfiltrated files included names, contact details, dates of birth, and government‑issued identifiers, alongside certain work‑related evaluations. The incident also caused outages that impacted internal systems, and while the company has not confirmed attribution, a ransomware operation publicly claimed responsibility and large‑scale data theft.

The UK’s NCSC warned of sustained disruptive activity by Russian‑aligned hacktivist groups, citing coordinated DoS/DDoS campaigns that target local government bodies and critical infrastructure operators. As summarized by Infosecurity, groups such as NoName05716 use public channels to marshal volunteers and tooling; while technically simple, the attacks can impose significant recovery costs and service degradation. The advisory urges layered mitigations, redundancy and failover planning, and continuous testing to preserve operational resilience.

In related research, CyberArk demonstrated that an XSS flaw in the StealC infostealer’s web panel could be weaponized to harvest the operators’ own session cookies and telemetry. CyberArk reports the exploit exposed an actor linked to large‑scale credential and cookie theft, highlighting how malware‑as‑a‑service operations can be undermined by their own implementation weaknesses.