Cyber Threat Brief — February 25, 2026

⚠️ This report is AI-generated. Always validate findings.

Cyber Threat Brief — February 25, 2026

Window: February 24–25, 2026 | Audience: Detection Engineers

Detection Engineering Brief | Wednesday, February 25, 2026 | 05:00 PT


1. CVE-2026-25108 — FileZen OS Command Injection (CISA KEV, Active Exploitation)

What’s New

CISA added CVE-2026-25108 to the Known Exploited Vulnerabilities catalog on February 24, 2026, after Soliton Systems confirmed receiving “multiple reports of damage” from exploitation in the wild. Timing correlation with a ransomware incident at Japan’s Washington Hotel suggests the flaw may already be weaponized for pre-ransomware access.

Technical Details

FieldValue
CVECVE-2026-25108
CVSS8.7 (CVSSv4)
AffectedFileZen v4.2.1–4.2.8, v5.0.0–v5.0.10 (physical & virtual)
ExploitConfirmed in-the-wild; no public PoC
VendorSoliton Systems K.K. (Tokyo-based, government/enterprise customer base)
PatchUpgrade to v5.0.11 or later
FCEB DeadlineMarch 17, 2026

Root Cause: OS command injection via a specially crafted HTTP POST request to a specific field on the post-login admin screen. The vulnerability is only exploitable when the FileZen Antivirus Check Option is enabled. Does not affect FileZen S.

Access Requirements: Authenticated, low-privileged user account (general user tier). The attacker must either compromise an existing account via phishing/credential spray or guess credentials.

Forensic Note: FileZen’s file-monitoring feature for system directories logs file modifications — if the system directory files were altered during exploitation, those logs should contain evidence.

TTPs

TacticTechniqueObservable
Initial AccessT1190 — Exploit Public-Facing AppHTTP POST requests to FileZen admin panel from unusual IPs
ExecutionT1059.004 — Unix ShellOS command spawned from web server process (java/nginx/apache)
Credential AccessT1078 — Valid AccountsLow-privilege account login followed by admin-level behavior
ImpactT1486 — Data Encrypted for ImpactRansomware deployment post-exploitation (unconfirmed, circumstantial)

Detection Opportunities

# Web server spawning shell processes (linux)
process.parent.name IN ("java", "nginx", "httpd", "python") 
AND process.name IN ("sh", "bash", "cmd.exe", "powershell.exe")
AND event.type = "process_start"

# HTTP POST to FileZen admin endpoints
http.request.method = "POST" 
AND url.path CONTAINS "/fileupload" OR url.path CONTAINS "/antivirus"
AND http.response.status_code IN (200, 302)
AND source.ip NOT IN [known_admin_IPs]

# FileZen system directory file modification (if monitoring enabled)
file.path CONTAINS "/opt/filezen/system/" AND event.type = "change"

# Password reset storm (post-compromise indicator)
# Multiple user password changes in short window from FileZen admin

Investigate: Examine FileZen access logs for the timeframe around the suspicious activity. Look for:

  • Logins with general user accounts followed by unexpected admin operations
  • HTTP requests with unusual character encoding in form fields
  • New processes spawned by the FileZen JVM/web server

Log Sources

  • FileZen access logs (system directory file monitoring)
  • Web application firewall logs
  • EDR (process creation from web server parent)
  • Network flow logs (C2 callbacks post-exploitation)

Detection Coverage

SourceStatus
Sigma❌ Gap — No FileZen-specific rules
Splunk ESCU❌ Gap — File transfer command injection (generic pattern only via Ivanti Connect Secure Command Injection Attempts)
Elastic⚠️ Partial — Web Server Potential Command Injection Request (generic)
KQL❌ Gap

Recommendation: Create a Sigma rule for web server spawning unexpected OS shells, and monitor FileZen-specific log paths if deployed.

Sources


2. SolarWinds Serv-U 15.5 — Four Critical RCEs (CVE-2025-40538/39/40/41)

What’s New

SolarWinds published security advisory and Serv-U 15.5.4 release notes on February 24, 2026, addressing a cluster of four critical vulnerabilities all rated CVSS 9.1. No in-the-wild exploitation yet, but Serv-U has an extensive exploitation history (CVE-2021-35211 by Chinese APT Storm-0322, CVE-2024-28995 mass exploitation). This pattern makes rapid weaponization highly likely.

Technical Details

FieldValue
CVECVE-2025-40538, CVE-2025-40539, CVE-2025-40540, CVE-2025-40541
CVSS9.1 (Critical) — all four
AffectedSolarWinds Serv-U version 15.5 (FTP Server + MFT editions)
PlatformsWindows, Linux
ExploitNo public PoC; attack chain documented in advisory
PatchUpgrade to Serv-U 15.5.4

CVE-by-CVE:

CVETypeImpact
CVE-2025-40538Broken Access ControlCreate system admin user → arbitrary code as root via domain/group admin
CVE-2025-40539Type ConfusionExecute arbitrary native code as root
CVE-2025-40540Type ConfusionExecute arbitrary native code as root
CVE-2025-40541IDOR (Insecure Direct Object Reference)Execute native code as root

Important caveat: All four require existing admin-level credentials (domain admin or group admin). Risk amplifier: compromised admin credentials via phishing, password reuse, or credential spraying make these escalation paths immediately exploitable. Windows deployments are less critical because Serv-U typically runs as a less-privileged service account.

Orca Security researchers (credited for discovery) note: “In real-world scenarios where administrative credentials are compromised — through phishing, password reuse, or credential spraying — they significantly increase the impact of that compromise.”

TTPs

TacticTechniqueObservable
Privilege EscalationT1078.002 — Domain AccountsAdmin account used to create new system admin user
ExecutionT1059 — Command and ScriptingUnexpected process spawning from Serv-U service
Credential AccessT1110.003 — Password SprayingAdmin credential compromise preceding exploitation
PersistenceT1098 — Account ManipulationNew administrator account created in Serv-U
Defense EvasionT1036 — MasqueradingServ-U running as root on Linux performing unexpected system ops

Detection Opportunities

# New admin user created in Serv-U (event log)
EventID = 4720 (Windows) OR Linux audit: useradd/usermod
parent_process = "ServU.exe" OR "servud"

# Unexpected privileged process from Serv-U
process.parent.name IN ("ServU.exe", "servud")
AND process.name IN ("cmd.exe", "powershell.exe", "sh", "bash")
AND NOT process.args CONTAINS [known_legit_args]

# Type confusion/IDOR: Serv-U making network connections to unusual destinations
network.destination.ip NOT IN [known_sftp_clients]
AND process.name = "ServU.exe"
AND event.category = "network"

# Credential spray targeting Serv-U (FTP/SFTP auth failures)
event.action = "authentication_failure"
AND service.name IN ("Serv-U", "FTP", "SFTP")
AND source.ip aggregated > 50 failures in 5 minutes

Log Sources

  • SolarWinds Serv-U application logs
  • Windows Event Log (4720, 4728, 4732 — account/group changes)
  • EDR process creation
  • Syslog (Linux — PAM auth, useradd)
  • Network flow logs (FTP/SFTP port 21/22/990 traffic)

Detection Coverage

SourceStatus
Sigma❌ Gap — No Serv-U-specific rules for these CVEs
Splunk ESCU❌ Gap — No file transfer server RCE detection
Elastic⚠️ Partial — File Transfer Utility Launched from Unusual Parent (generic)
KQL❌ Gap

Recommendation: Monitor SolarWinds Serv-U logs for unexpected admin account creation. Given the exploitation history of Serv-U, prioritize patching to 15.5.4 immediately.

Sources


3. Lazarus Group × Medusa Ransomware — Healthcare & Middle East Targeting

What’s New

Symantec’s Threat Hunter Team (Broadcom) published research on February 24, 2026 revealing North Korean Lazarus Group affiliates are now operating as Medusa ransomware-as-a-service affiliates. This is the first confirmed link between Lazarus and Medusa. Four U.S. healthcare and nonprofit organizations were claimed on Medusa’s leak site since November 2025, including a mental health nonprofit and an educational facility for autistic children.

Technical Details

FieldValue
Threat ActorLazarus Group (subgroup: Andariel/Stonefly — possibly also Diamond Sleet overlap)
RansomwareMedusa RaaS (operated by “Spearwing”)
TargetsU.S. healthcare organizations, Middle East entity
Average Ransom$260,000
Total Medusa Claims366+ attacks since 2023 launch
IOCsProvided by Symantec (network infra + file hashes)

Toolset observed in Lazarus-linked Medusa attacks:

ToolTypeAttribution
ComebackerCustom backdoor/loaderLazarus-exclusive
BlindingcanRemote Access TrojanLazarus-exclusive
ChromeStealerChrome credential extractorLazarus-linked
InfohookInformation stealerLazarus-linked
MimikatzCredential dumpingCommodity
RP_ProxyCustom proxy toolLazarus-linked
CurlData transferCommodity

Strategic context: Lazarus (via Stonefly/Andariel) uses ransomware proceeds to fund espionage operations targeting U.S., Taiwan, and South Korean defense/government/tech sectors. The July 2025 U.S. DOJ indictment of Rim Jong Hyok (RGB/Stonefly) for healthcare ransomware attacks did not deter operations.

TTPs

TacticTechniqueObservable
Initial AccessT1566 — PhishingSpear phishing leading to Comebacker execution
ExecutionT1059.003 — Windows Command ShellComebacker/Blindingcan command execution
Credential AccessT1555.003 — Browser CredentialsChromeStealer targeting Chrome Login Data db
Credential AccessT1003.001 — LSASS MemoryMimikatz process injection
CollectionT1113 — Screen CaptureInfohook screenshot capabilities
Command & ControlT1090.002 — External ProxyRP_Proxy for encrypted C2 routing
ExfiltrationT1041 — Exfiltration Over C2Curl-based data staging/transfer
ImpactT1486 — Data Encrypted for ImpactMedusa ransomware deployment

Detection Opportunities

# ChromeStealer: Access to Chrome credential database
file.path CONTAINS "\\Google\\Chrome\\User Data\\Default\\Login Data"
AND process.name NOT IN ("chrome.exe", "chromium.exe", "msedge.exe", "opera.exe")
AND event.type IN ("open", "read")

# Comebacker/Blindingcan: Backdoor characteristics
# Often masquerades as legitimate Windows DLLs
ImageLoaded CONTAINS ".dll"
AND Signed = false
AND (
  ParentImage CONTAINS "\\system32\\" 
  AND NOT CommandLine CONTAINS [known-legit-patterns]
)

# Mimikatz: LSASS access
process.name NOT IN ("lsass.exe", "svchost.exe", "MsMpEng.exe")
AND process.target.name = "lsass.exe"
AND event.action = "OpenProcess"
AND access.rights IN (0x1010, 0x1410)

# RP_Proxy: Custom proxy detection
# Unusual outbound TCP connections from non-browser processes
network.destination.port IN (443, 8443, 8080)
AND process.name NOT IN ("chrome.exe", "firefox.exe", "msedge.exe")
AND network.direction = "outbound"
AND network.bytes_out > 100000

# Infohook: Screenshot capture behavior
process.name NOT IN ("snippingtool.exe", "SnippingTool.exe")
AND process.args CONTAINS "screenshot" OR
event.api_call = "BitBlt" AND process.name != "dwm.exe"

Log Sources

  • EDR (process creation, DLL loading, LSASS access)
  • Sysmon Event IDs: 1 (process), 7 (image load), 10 (process access), 11 (file create)
  • Windows Event Log: 4688 (process creation), 4656 (object access)
  • Web proxy / firewall logs (C2 callbacks)
  • File integrity monitoring on Chrome profile paths

Detection Coverage

SourceStatus
SigmaMimikatz DC Sync, Mimikatz Use, HackTool - Mimikatz Execution — Mimikatz covered
SigmaSuspicious File Access to Browser Credential Storage — ChromeStealer covered
Sigma❌ Gap — No Comebacker/Blindingcan/Infohook/RP_Proxy specific rules
Splunk ESCULinux Medusa Rootkit — Medusa Linux payload detection
Splunk ESCU❌ Gap — No Comebacker/Blindingcan rules
ElasticRansomware - Detected - Elastic Defend — Generic ransomware
KQL❌ Gap

Recommendation: Lazarus-specific tooling (Comebacker, Blindingcan, Infohook) requires custom YARA/Sigma rules based on IOCs from the Symantec report. Priority: healthcare SOCs should enable ChromeStealer and LSASS access detections immediately.

Sources


4. VMware Aria Operations — VMSA-2026-0001 (RCE + XSS + Privilege Escalation)

What’s New

Broadcom released VMSA-2026-0001 on February 24, 2026 addressing three vulnerabilities in VMware Aria Operations. The most severe (CVE-2026-22719, CVSS 8.1) allows unauthenticated remote code execution during support-assisted product migrations. This affects VMware Cloud Foundation 4.x/5.x/9.x and Telco Cloud Platform environments — widely deployed in enterprise and telecom infrastructure.

Technical Details

CVECVSSTypeAuthDescription
CVE-2026-227198.1Command Injection → RCENoneExploitable during migration support windows; workaround KB430349 available
CVE-2026-227208.0Stored XSSLow (Privileged user)Custom benchmark creation → admin script execution; no workaround
CVE-2026-227216.2Privilege EscalationHigh (vCenter)vCenter-privileged actors gain Aria Operations admin access

Affected Products:

ProductAffected VersionsFixed Version
VMware Aria Operations8.x8.18.6
VMware Cloud Foundation (VCF)9.x9.0.2.0
VMware Cloud Foundation5.x, 4.xKB92148
VMware Telco Cloud Platform5.x, 4.xKB428241
VMware Telco Cloud Infrastructure3.x, 2.xKB428241

CVE-2026-22719 Attack Vector: Exploitable only during support-assisted migrations — this implies either a specific time window or that attacker-controlled migration triggers could be induced. The unauthenticated nature (AV:N/AC:H/PR:N) makes it particularly dangerous if that migration state can be triggered externally.

TTPs

TacticTechniqueObservable
Initial AccessT1190 — Exploit Public-Facing AppUnauthenticated requests to Aria Operations API during migration
ExecutionT1059 — Command and ScriptingOS commands executed from Aria Operations service account
Privilege EscalationT1548 — Abuse Elevation ControlvCenter account → Aria Operations admin
PersistenceT1505.003 — Web ShellPost-RCE web shell placement in Aria Operations web root
CollectionT1560 — Archive Collected DataStored XSS leveraged to exfiltrate monitoring data/credentials

Detection Opportunities

# CVE-2026-22719: Unexpected process from Aria Operations service
process.parent.name IN ("vmware-vcops", "analytix", "casa", "vcops-*")
AND process.name IN ("sh", "bash", "python", "wget", "curl")
AND NOT process.args CONTAINS [known_migration_scripts]

# CVE-2026-22720: Stored XSS payload pattern in benchmark definitions
# Monitor Aria Ops API for unusual benchmark creation requests
http.request.uri CONTAINS "/suite-api/api/policy" OR "/suite-api/api/alertdefinitions"
AND http.request.body CONTAINS ("<script", "javascript:", "onerror=", "onload=")

# CVE-2026-22721: vCenter → Aria Ops privilege escalation
# Unexpected admin session from vCenter service account
event.action = "login"
AND user.name CONTAINS "vcsystemaccount" OR user.name CONTAINS "vcenter"
AND destination.service = "aria-operations-admin"

# Post-exploitation: Lateral movement from monitoring infrastructure
# Aria Ops has visibility into all monitored VMs — high-value pivot point
process.parent = "vcops*"
AND network.destination.ip NOT IN [known_monitored_endpoints, aria_ops_server]

Log Sources

  • VMware Aria Operations audit log (/data/vcops/log/analytics/)
  • vCenter Server audit log
  • EDR (if agent deployed on Aria Ops VM)
  • Web application firewall (API gateway logs)
  • syslog/journald on Aria Ops appliance

Detection Coverage

SourceStatus
Sigma❌ Gap — No VMware Aria Operations-specific detection rules
Splunk ESCU❌ Gap
Elastic❌ Gap
KQL❌ Gap

Recommendation: VMware Aria Operations monitors your entire virtual infrastructure. Compromise gives attackers visibility into every monitored endpoint, VM performance data, and potentially stored credentials. Treat as critical infrastructure — patch immediately, apply KB430349 as interim for CVE-2026-22719.

Sources


5. IBM X-Force Threat Index 2026 + Sophos Active Adversary Report — Intelligence Summary

What’s New

Two major annual threat intelligence reports dropped today/yesterday with actionable statistics for detection program prioritization.


IBM X-Force Threat Intelligence Index 2026

Published: February 25, 2026

Key findings relevant to detection engineering:

StatFigureDetection Implication
Public-facing app exploitation+44% YoYPrioritize WAF/web server behavioral detections
ChatGPT credentials on dark web (2025)300,000+Infostealer detection critical; AI platform credentials = enterprise access path
Distinct ransomware/extortion groups109 groups (up from 73)Signature-based ransomware detection insufficient; behavior needed
Supply chain incidents4× increase over 5 yearsCI/CD, SaaS integration, and developer identity monitoring
Top targeted industryManufacturingOT/ICS SOC teams should elevate priority
Ransomware ecosystem fragmentationTop 10 groups’ dominance −25%Expect unknown RaaS affiliates; don’t rely on IOC lists alone

Source: IBM X-Force Threat Intelligence Index 2026 — Published February 25, 2026


Sophos Active Adversary Report 2026

Published: February 24, 2026

Key findings:

StatFigureDetection Implication
Identity-related incident root cause67% of all IR/MDR casesMFA bypass, token theft, and Kerberoasting detections are highest ROI
Top ransomware groupsAkira (GOLD SAHARA), Qilin (GOLD FEATHER)Ensure specific TTPs for both are covered
Threat groups observedRecord highAttribution-independent behavioral detection more important than ever

Key TTP focus for Akira/Qilin:

  • Akira: ESXi locker, legitimate VPN abuse, double extortion
  • Qilin: VMware ESXi targeting, BYOD exploitation, living-off-the-land techniques

Source: Sophos Active Adversary Report 2026 — Published February 24, 2026


Coverage Gap Summary

Gap AreaPriorityRecommendation
FileZen web server command injectionHIGHCreate Sigma: web server spawning OS shell
Serv-U admin account creationHIGHMonitor SolarWinds Serv-U logs + Windows account creation events
Comebacker/Blindingcan backdoorHIGHRequest IOCs from Symantec report; build YARA
VMware Aria Operations API abuseMEDIUMInstrument Aria Ops audit logs → SIEM
AI credential harvesting (ChatGPT/Copilot)MEDIUMAdd AI platform credential stores to infostealer monitoring

Sources verified with original publications. All threats confirmed published February 24–25, 2026.