
Exploited Admin Tools, New ZIP Defenses, And SaaS Fines
Coverage: 13 Feb 2026 – 15 Feb 2026 (UTC)
< view all daily briefs >Organizations faced a mixed day of pressure and progress. A new capability from Check Point aims to close a common gap in email and perimeter defenses by inspecting malware concealed in password-protected ZIP archives. At the same time, attackers continued to weaponize enterprise management and remote-access tools, with BleepingComputer reporting active exploitation of a critical Microsoft Configuration Manager flaw and BleepingComputer detailing intrusions through a critical BeyondTrust Remote Support/Privileged Remote Access vulnerability.
Exploited admin tools spur urgent patching
Attackers are actively abusing BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) via CVE-2026-1731, achieving pre-authentication command execution and full appliance compromise in observed cases, according to BleepingComputer. Post-compromise activity included deployment of renamed SimpleHelp binaries, creation of new high-privilege domain accounts, Active Directory enumeration, and lateral movement with PSexec and Impacket. Older and end-of-life appliances complicate remediation, and a public proof-of-concept increases the risk window. In parallel, CISA added CVE-2026-1731 to its Known Exploited Vulnerabilities catalog, directing federal agencies to remediate by deadline and urging all organizations to prioritize patches, log review, and hunting for indicators such as unexpected binaries and unauthorized admin account creation.
Separately, CISA has designated CVE-2024-43468 in Microsoft Configuration Manager as exploited in the wild. As reported by BleepingComputer, the SQL injection bug—patched in October 2024—can enable remote code execution through crafted unauthenticated requests. Agencies face a March 5 remediation deadline under BOD 22-01; private-sector defenders are advised to inventory deployments, apply updates, and monitor for suspicious queries and command execution given the potential for full system compromise.
Outside of patch advisories, exploitation activity also concentrated against edge management platforms. BleepingComputer highlighted GreyNoise findings that a single IP—hosted by an alleged bulletproof provider—drove over 83% of observed attacks against two critical Ivanti Endpoint Manager Mobile flaws. The actor used DNS callbacks to validate code execution and rotated hundreds of user agents, indicating automated tooling. Ivanti issued hotfixes and advised temporary mitigations, including building replacement instances and migrating data as the most conservative path until full patches arrive.
SaaS misconfigurations draw record fines
South Korea’s PIPC fined the Korean subsidiaries of Louis Vuitton, Christian Dior Couture, and Tiffany a combined KRW 36.033 billion for Personal Information Protection Act violations tied to breaches of a cloud customer management service, per CSO Online. Investigators cited absent IP-based access controls, weak or missing multi-factor authentication, unblocked bulk exports, delayed log reviews, and late breach notifications. The regulator underscored that SaaS platforms processing personal data are “personal information processing systems” under law, and controllers must enforce least privilege, strong remote authentication (such as one-time passwords, digital certificates, or hardware tokens), and timely reporting. The action signals that adopting SaaS does not transfer security obligations and sets concrete expectations for configuration, monitoring, and response.
Software supply chains and browsers targeted
Researchers tracked a sustained developer-targeted supply-chain operation, dubbed Graphalgo, in which impostor recruiters for blockchain and trading firms lure JavaScript and Python candidates into executing malicious projects that pull dependencies from npm and PyPI. As reported by BleepingComputer, at least 192 malicious packages delivered a remote access trojan capable of command execution, file exfiltration, and payload delivery, with indicators such as shifts in package naming and delayed activation to evade detection. The campaign’s use of legitimate registries and rotating components illustrates why download counts and provenance are weak trust signals; the guidance is to rotate tokens, follow published IoCs, and consider clean reinstalls where RAT persistence is suspected.
Enterprise browsers and inboxes also came under pressure from marketplace abuse. Multiple investigations summarized by BleepingComputer describe malicious Chrome extensions that harvest authentication material, session data, and business information. Clusters included a 32-extension set themed around AI tools that render remote, operator-controlled iframes to act as privileged proxies, as well as campaigns hijacking VKontakte accounts at scale and large numbers of extensions quietly exfiltrating browsing histories to data brokers. Recommended controls include strict allowlisting, regular audits of installed add-ons and permissions, and profile segregation for sensitive workflows. Why it matters: browser extensions run with privileged access to authenticated pages, making them high-impact when abused.
In parallel, The Hacker News detailed Cisco Talos research into UAT-9921 and its modular VoidLink framework. The toolkit blends a Zig implant, C plugins, and a Go-based backend, compiles plugins on demand across Linux distributions, and includes evasion features to detect and adapt around EDR. Operators deploy SOCKS proxies for internal scanning and lateral movement and can tailor plugins or exploits based on reconnaissance. The capability to extend implants dynamically and operate across cloud and enterprise environments lowers the barrier for sustained, stealthy access.
AI systems face IP abuse and state-linked operations
Google described a large-scale attempt to extract or distill the proprietary reasoning abilities of its Gemini model through more than 100,000 prompts, a campaign it said it blocked in real time. The company’s findings, covered by CSO Online, frame systematic model extraction as intellectual property theft and outline mitigations such as vigilant API monitoring, response filtering, and adversary-informed testing to detect and limit abusive access patterns. The report also documented misuse of model APIs by government-backed groups and the shutdown of linked projects and accounts embedding or wrapping model access.
Two additional GTIG reports spotlighted state-aligned activity. One, summarized by The Hacker News, links clusters from China, Iran, Russia, and North Korea to coordinated campaigns against the defense industrial base, focusing on targeted personnel lures, exploitation of edge devices, and manufacturing supply-chain breaches while emphasizing low-footprint intrusion tactics. Another, via The Hacker News, details a suspected Russian actor’s CANFAIL phishing chains against Ukrainian organizations, using obfuscated JavaScript loaders and memory-resident PowerShell droppers, with evidence of large language model assistance for reconnaissance and lure creation. Together, the findings depict sustained, multi-vector pressure on sectors tied to national security and conflict response.