Cyber Threat Brief — March 4 2026

⚠️ This report is AI-generated. Always validate findings.

Cyber Threat Brief — March 4 2026

Focus: Actionable technical intel for detection engineers. Every entry has MITRE-mapped artifacts and real detection coverage. Sources verified within 24 hours.


1. Dohdoor Backdoor (UAT-10027) — DNS-over-HTTPS C2 + DLL Sideloading

Summary

Dohdoor is a novel backdoor targeting US education and healthcare sectors via a phishing → PowerShell → batch dropper → DLL sideload chain. The malware tunnels C2 through Cloudflare’s DoH resolver with irregularly-cased subdomain names (.OnLiNe, .DeSigN, .SoFTWARe) specifically to beat string-match blocklists, and reflectively loads Cobalt Strike Beacon as a follow-on payload. Full Talos technical teardown is fresh — this one has concrete, huntable artifacts.

What’s New (Last 24 Hours)

Cisco Talos published a full technical teardown of the Dohdoor backdoor used by UAT-10027 in campaigns targeting US education and healthcare. Key details confirmed: the batch dropper uses curl.exe /111111?sub=d as its DLL download signature, sideloads via legitimate LOLBins (Fondue.exe, mblctr.exe, ScreenClippingHost.exe) from ProgramData/Public, and performs RunMRU registry anti-forensics on exit.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
curl.exe /111111?sub=dTTPT1105EDR process telemetry / command-line logsHunt for curl.exe invocations with URL path /111111?sub= — this is the batch dropper’s DLL download command
Fondue.exe / mblctr.exe / ScreenClippingHost.exe executing from C:\ProgramData\ or C:\Users\Public\TTPT1574.002EDR process/file telemetryAlert on these LOLBins running outside their expected system paths — this is the sideload trigger pattern
propsys.dll / batmeter.dll (written to non-system paths)TTPT1574.002EDR file telemetryHunt for these DLL names written to ProgramData or Users\Public; known Dohdoor masquerade DLL names
MswInSofTUpDloAd / DEEPinSPeCTioNsyStEM (C2 subdomain patterns)IOCT1071.004DNS logs / DoH proxy logsSearch DNS query logs for mixed-case subdomains matching this pattern; flag .OnLiNe / .DeSigN / .SoFTWARe TLDs from any endpoint
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU deletionTTPT1112EDR registry telemetryAlert on deletion of this key post-execution; it is the batch dropper’s anti-forensics cleanup step

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkWindows RunMRU Registry Key or Value DeletedDirectly maps to Dohdoor’s anti-forensics step — RunMRU deletion after batch execution
ElasticModification of AmsiEnable Registry KeyCovers registry modification behavior; no direct Dohdoor RunMRU rule found — gap exists for the specific key deletion
SigmaAbusable DLL Potential Sideloading From Suspicious LocationCovers DLL sideloading from non-system paths — maps to Fondue.exe/mblctr.exe loading propsys.dll/batmeter.dll from ProgramData

Sources


2. SloppyLemming (Outrider Tiger) — BurrowShell + Rust Keylogger Targeting South Asian Critical Infrastructure

Summary

SloppyLemming (India-nexus APT, also tracked as Outrider Tiger and Fishing Elephant) dramatically expanded its toolset over 2025–2026, adding the BurrowShell in-memory shellcode implant and a Rust-based keylogger to supplement its Cobalt Strike/Havoc kit. The group now runs 112 Cloudflare Workers domains mimicking Pakistani and Bangladeshi government entities for C2, with C2 traffic masquerading as Windows Update. Targets include Pakistani nuclear regulatory bodies, Navy logistics, and Bangladeshi energy utilities.

What’s New (Last 24 Hours)

Arctic Wolf published a comprehensive technical report (2026-03-02) documenting the new BurrowShell implant (in-memory x64 shellcode, 15 supported commands, SOCKS proxy, RC4-encrypted C2), the Rust keylogger with port scanning/network recon, and the 112-domain Cloudflare Workers infrastructure expansion. Open directory misconfigurations exposed staged Havoc framework loaders.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
NGenTask.exe executing from non-dotnet system path (loads mscorsvc.dll)TTPT1574.002EDR process/file telemetryHunt for NGenTask.exe outside %ProgramFiles%\dotnet\; alert on mscorsvc.dll loaded from non-System32 locations
mscorsvc.dll written to non-system directoryIOCT1574.002EDR file telemetryAlert on this DLL written or loaded outside System32/SysWOW64; masquerades as legitimate .NET runtime DLL
8faeea306a331d86ce1acb92c8028b4322efbd11a971379ba81a6b769ff5ac4bIOCT1566.001Email gateway / file hash telemetryBlock/alert at email gateway; Stage 1 PDF lure delivering the BurrowShell chain
*.workers.dev DNS queries with government-entity subdomain namesTTPT1102.001DNS / proxy logsAlert on *.workers.dev resolutions from non-developer endpoints; filter subdomains mimicking government entities (e.g., webmail-pnra, gov-pk)
Outbound HTTP to non-Microsoft IPs with Windows Update user-agent stringsTTPT1071.001Proxy / network flow logsBurrowShell masks C2 as Windows Update — hunt for Windows Update-style traffic to non-Microsoft IP space

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkWindows Phishing PDF File Executes URL LinkCovers the Stage 1 PDF lure clicking/execution — maps to the ClickOnce delivery vector
ElasticPotential Execution via FileFix Phishing AttackCovers ClickOnce-style phishing execution chains from PDFs and web lures
SigmaPotential Initial Access via DLL Search Order HijackingCovers DLL search order abuse — directly maps to NGenTask.exe sideloading mscorsvc.dll

Sources


3. DeepSeek-Claw — Malicious GitHub Repo Installs Browser Session Hijack + macOS C2 Agent

Summary

A malicious GitHub repo (TriangleMagistrate/DeepSeek-Claw) marketed as a cheap AI API alternative installs a 2.5MB obfuscated Node.js C2 agent on macOS that clones live Chrome profiles, intercepts 2FA in real time, executes remote shell commands, and persists via launchd. A confirmed victim lost banking access within 41 minutes of install. The repo had 177 stars before being reported — meaning this ran in the wild against real developers.

What’s New (Last 24 Hours)

Security researcher @iamian publicly documented the full post-mortem: install script deploys ~/.cache/.npm_telemetry/monitor.js, injects persistence into four shell init files, registers ai.openclaw.gateway.plist as a LaunchAgent, and uses NODE_CHANNEL=cryptoexth4 as the C2 channel ID. Capabilities include Chrome profile cloning via CDP, Gmail monitoring, iMessage monitoring, and Telegram credential harvesting.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
~/.cache/.npm_telemetry/monitor.jsIOCT1059.007EDR file telemetry / endpoint filesystem scanHunt for this path on macOS; any presence indicates infection. Alert on Node.js processes spawned from ~/.cache/.npm_telemetry/
ai.openclaw.gateway.plist (in ~/Library/LaunchAgents/)IOCT1543.001EDR persistence/file telemetryHunt for this LaunchAgent plist name; boot persistence artifact for the C2 agent
NODE_CHANNEL=cryptoexth4 (process environment variable)IOCT1071.001EDR process telemetryQuery for processes with NODE_CHANNEL=cryptoexth4 in environment variables — unique C2 channel ID
Injection into ~/.zshrc / ~/.zshenv / ~/.bash_profile / ~/.bashrcTTPT1546.004EDR file telemetryAlert on unexpected appended content (base64 or Node.js invocations) in shell init files on developer endpoints
TriangleMagistrate/DeepSeek-Claw GitHub repo / openclaw npm packageIOCT1195.001Browser history / shell history / npm audit logsQuery shell history for references to this repo or npm install openclaw; treat any install as confirmed compromise

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkLinux Auditd Unix Shell Configuration ModificationCovers shell config modification (zshrc/bashrc injection) — Linux-centric but logic applies to macOS with auditd/EDR
ElasticBash Shell Profile ModificationCross-platform rule directly covering .zshrc/.bashrc modification persistence — high relevance to this threat
SigmaPotential Persistence Via PlistBuddyCovers macOS LaunchAgent plist creation — maps to ai.openclaw.gateway.plist persistence mechanism

Sources


4. VMware Aria Operations Unauthenticated Command Injection — Active Exploitation (CISA KEV)

Summary

Broadcom VMware Aria Operations (formerly vROps) has an unauthenticated command injection flaw (CVE-2026-22719, CVSS 8.1) that’s now confirmed exploited in the wild and added to CISA KEV. Exploitation is triggered during support-assisted product migration. Patch to 8.18.6 or run the provided shell script workaround immediately. FCEB agencies have a March 24 deadline.

What’s New (Last 24 Hours)

CISA added CVE-2026-22719 to KEV on 2026-03-03. Broadcom confirms active exploitation. A shell-script workaround (aria-ops-rce-workaround.sh) is available for immediate risk reduction. CVE-2026-22720 (stored XSS) and CVE-2026-22721 (privilege escalation) were also patched in the same advisory.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
Unexpected script/shell execution from Aria Operations appliance processesTTPT1059.004EDR / endpoint process telemetryIf workaround is not deployed, hunt for unexpected child processes spawned by Aria Operations services — especially during any migration activity
Unexpected outbound HTTP(S) from Aria Operations appliance to non-Broadcom IPsTTPT1190Firewall / proxy logsBaseline Aria Operations appliance outbound connections; alert on new destinations during or after support-migration tasks

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkVMWare Aria Operations Exploit AttemptDirect detection for Aria Operations exploitation attempts — maps to CVE-2026-22719 command injection behavior
ElasticTelnet Authentication Bypass via User Environment VariableCovers Linux appliance auth bypass patterns; no direct Aria-specific rule found — Splunk rule is primary coverage
SigmaNone foundNo direct Sigma rule for VMware Aria Operations exploitation; monitor with custom rule on appliance process telemetry

Sources


5. Juniper Junos OS Evolved PTX — Pre-Auth RCE via Exposed Anomaly Detection Framework

Summary

watchTowr Labs confirmed that the On-Box Anomaly Detection Framework in Junos OS Evolved PTX Series is listening on TCP/8160 bound to 0.0.0.0 — despite Juniper’s advisory claiming it “should only be reachable by internal processes.” The API server (/usr/sbin/monitor/api_server.py) is reachable externally and enables unauthenticated root code execution. CVSS 9.8. Affects Junos OS Evolved 25.4 before 25.4R1-S1-EVO.

What’s New (Last 24 Hours)

watchTowr published a full technical writeup on 2026-03-03 confirming the misconfigured binding, providing the service port/process path, and demonstrating that “should be internal” was aspirational. Juniper issued an out-of-cycle security bulletin with patched versions.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
Inbound TCP/8160 to Junos OS Evolved PTX devices from non-management subnetsTTPT1190Firewall / network flow logsHunt for inbound connections to TCP/8160 on PTX infrastructure; prioritize first-seen IPs and repeated probing patterns
/usr/sbin/monitor/api_server.py (On-Box Anomaly Detection API server process)TTPT1059Device process telemetry / management-plane EDRBaseline this service; alert on unexpected child-process spawns or anomalous command strings from the API process

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkAccess to Vulnerable Ivanti Connect Secure Bookmark EndpointIndirect — covers web-facing service exploitation pattern but is Ivanti-specific; no direct Junos rule found. Build custom rule on TCP/8160 inbound.
ElasticAccepted Default Telnet Port ConnectionCovers non-standard port inbound connections — logic adapts to TCP/8160 monitoring but no direct rule exists
SigmaAbusable DLL Potential Sideloading From Suspicious LocationNot directly applicable; no Sigma rule for Junos OS Evolved network service exploitation. Firewall rule for TCP/8160 is the primary detection lever.

Sources


6. Cisco Catalyst SD-WAN — Pre-Auth PoC Enabling Rogue Peer + NETCONF Admin Access

Summary

A public PoC repository for CVE-2026-20127 was posted, demonstrating a pre-authentication vulnerability in Cisco Catalyst SD-WAN Controller (vSmart) and Manager (vManage). The exploit creates a rogue peer on the management/control plane, bypasses authentication entirely, and grants administrative access including NETCONF on port 830 for full fabric configuration manipulation. Reportedly exploited since 2023 by threat cluster UAT-8616.

What’s New (Last 24 Hours)

A public working PoC repo (zerozenxlabs/CVE-2026-20127) was posted 2026-03-04, lowering the exploitation bar significantly. UAT-8616 is described as a “highly sophisticated” actor that has been using this zero-day since 2023.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
Inbound TCP/830 (NETCONF) from first-seen or unexpected source IPsTTPT1133Firewall / network flow logsHunt for new inbound NETCONF sessions to SD-WAN components; correlate with subsequent config changes or new peer additions
Unexpected new SD-WAN peer joining the management/control planeTTPT1190Cisco SD-WAN audit/config logsAlert on newly-added peers or controllers outside approved maintenance windows; triage trust relationship changes

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkIvanti VTM New Account CreationCovers unexpected account/peer creation on network appliances — logic maps to SD-WAN unauthorized peer creation, though Ivanti-specific. No direct Cisco SD-WAN rule found.
ElasticNone foundNo Elastic rule for Cisco SD-WAN exploitation; monitor via network flow logs for TCP/830 anomalies
SigmaFortiGate - New VPN SSL Web Portal AddedAnalogous pattern (unexpected network gateway config change) — no Cisco SD-WAN specific Sigma rule exists; build custom on NETCONF session logs

Sources


7. MajorDoMo — Three Unauthenticated RCE Metasploit Modules Published

Summary

Three Metasploit modules for unauthenticated RCE in MajorDoMo (a popular Russian open-source smart home platform) landed in a single PR on 2026-03-03, covering console eval via missed redirect, command injection via cycle_execs.php, and supply-chain RCE via update URL poisoning in the saverestore module. Public weaponization dramatically increases opportunistic exploitation risk for any internet-exposed MajorDoMo instances.

What’s New (Last 24 Hours)

Metasploit PR #21000 added three fully-documented unauthenticated RCE modules with Docker lab setups. All three modules have distinct exploit paths and are independently weaponizable.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
rc/index.php (unusual POST parameters or eval strings)TTPT1190Web server access logsHunt for anomalous POSTs to rc/index.php — especially with console/eval-style parameters — followed by php spawning sh/cmd/powershell
cycle_execs.php (bursty requests from untrusted IPs)TTPT1190Web server access logsAlert on burst request patterns to cycle_execs.php from non-admin IPs; pivot to server-side process execution telemetry for child process spawns
saverestore module outbound fetches to unknown domainsTTPT1190App logs / outbound proxy / DNS logsInventory configured update URLs in MajorDoMo; alert on unexpected outbound fetches and follow-on execution from downloaded files

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkSpring4Shell Payload URL RequestCovers web-based RCE payload URL patterns — indirect; no MajorDoMo-specific rule. Custom web log rule on rc/index.php and cycle_execs.php is the primary lever.
ElasticWindows Server Update Service Spawning Suspicious ProcessesCovers update service spawning unexpected processes — maps to saverestore update URL poisoning vector if running on Windows
SigmaNone foundNo Sigma rule for MajorDoMo; build custom detection on web access logs for exploit path patterns

Sources


8. MuddyWater — Fresh C2 IOCs: Custom UDP/1269 “Key C2” + Blockchain PS1 Loader

Summary

Researcher @nahamike01 identified a new MuddyWater open directory (157.20.182[.]49:8000) exposed in mid-February, with over 1,000 staged files. Key artifacts: a custom C2 server called “Key C2” operating on UDP/1269, a PowerShell dropper (reset.ps1) executing obfuscated JavaScript, downloading Node.js v18.17.0, and communicating with blockchain-based infrastructure at 185.236.25[.]119:3001. Tsundere Botnet panels were identified on the same C2 IP. UAE engineering company NMDC Group appears to be a newly-identified target.

What’s New (Last 24 Hours)

Fresh IOC cluster posted on 2026-03-03 via pivot on FMAPP.exe in HuntIO Attack Capture — new C2 IPs, a unique PowerShell hash, and a non-standard UDP C2 port not previously associated with MuddyWater.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
157.20.182[.]49IOCT1071.001Firewall / network flow logsBlock and alert on any outbound connection to this IP; pivot on historical connections to identify compromised endpoints
185.236.25[.]119IOCT1071.001Firewall / network flow logsBlock/alert on 185.236.25.119 across ports 80, 3000, and 3001 — active Tsundere Botnet panels and MuddyWater C2
7ab597ff0b1a5e6916cad1662b49f58231867a1d4fa91a4edf7ecb73c3ec7fe6 (reset.ps1)IOCT1059.001EDR file / email gateway telemetryHunt for this SHA-1 hash; the script downloads Node.js, executes obfuscated JS, and communicates with blockchain C2
Outbound UDP/1269 from endpoints or serversTTPT1095Firewall / network flow logsAlert on outbound UDP/1269 — non-standard port used by MuddyWater’s custom “Key C2” framework

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkDetect Empire with PowerShell Script Block LoggingCovers obfuscated PowerShell execution patterns via script block logging — maps to reset.ps1 obfuscated JS execution
ElasticPotential PowerShell Obfuscated Script via High EntropyDetects high-entropy obfuscated PowerShell — directly applicable to the obfuscated JavaScript payloads inside reset.ps1
SigmaInvoke-Obfuscation Obfuscated IEX Invocation - PowerShellCovers obfuscated IEX invocations commonly used in the obfuscated JS/PS payload execution chain

Sources