Cyber Threat Brief — March 12 2026

⚠️ This report is AI-generated. Always validate findings.

1. n8n RCE (CVE-2025-68613) — CISA KEV, Active Exploitation Confirmed

Summary

n8n’s workflow expression evaluation sandbox is being actively exploited in the wild. CISA added CVE-2025-68613 (CVSS 9.9) to its KEV catalog on March 11 — the first n8n flaw to make the list. Over 24,700 unpatched instances remain internet-exposed, with 12,300+ in North America alone. Any authenticated user can escape the expression sandbox and execute arbitrary code with the privileges of the n8n process. A secondary critical flaw (CVE-2026-27577, CVSS 9.4) was disclosed the same day by Pillar Security, classified as “additional exploits” in the same evaluation system. FCEB agencies must patch by March 25, 2026.

What’s New (Last 24 Hours)

  • CISA added CVE-2025-68613 to KEV on 2026-03-11 based on confirmed active exploitation evidence.
  • Pillar Security disclosed CVE-2026-27577 (CVSS 9.4) — a second exploitable path in the same n8n expression evaluator (Hacker News, 2026-03-11).
  • Shadowserver data: 24,700+ unpatched public instances as of early March 2026; no specific exploit mechanism details released publicly.
  • Fixed in n8n versions 1.120.4, 1.121.1, and 1.122.0 (December 2025 patch).

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
n8n process spawning unexpected child processes (shell, python, etc.) post-authenticationTTPT1059EDR process telemetryAlert on node / n8n parent process spawning interpreter children (bash, sh, python, cmd)
Authenticated HTTP POST to n8n /rest/ or /webhook/ endpoints resulting in OS executionTTPT1059.007Web/App logsHunt for n8n HTTP 200 responses on /rest/workflows/ followed by unexpected outbound connections
Outbound connections from n8n process to external IPs following workflow executionTTPT1071.001EDR network telemetry, ProxyAlert on n8n process initiating outbound connections to non-whitelisted IPs
n8n version strings < 1.120.4 in HTTP response headers or service bannersIndicatorT1190Asset inventory, Web server logsInventory exposed n8n instances; version compare against patched baseline
/jffs/.asusrouter file creation (co-infection indicator from KEV exposure)IndicatorT1505File integrity monitoringFlag unexpected hidden files in web app directories

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkJetBrains TeamCity RCE Attempt · Ollama Possible RCE via Model Loading · Confluence Pre-Auth RCE via OGNL InjectionNo n8n-specific Splunk ESCU rule exists. Closest coverage: NodeJS RCE web patterns (URL-based detection via web logs). Gap — recommend creating a custom SPL hunting for n8n process ancestry anomalies (n8n → shell/python child).
ElasticReact2Shell (CVE-2025-55182) Exploitation Attempt · GitHub Actions Workflow Modification BlockedNo n8n-specific Elastic rule. Workflow expression injection pattern is analogous to React2Shell’s server-side code execution path — adapt that rule’s process spawn logic to n8n parent process.
SigmaPotential RCE Exploitation Attempt In NodeJS · Windows Defender AMSI Trigger DetectedSigma’s NodeJS RCE rule is the closest match — it targets NodeJS process execution anomalies that align with n8n’s runtime. Tune the nodejs_rce_exploitation_attempt.yml rule to scope specifically to the n8n process on applicable log sources.

Sources


2. UNC6426: nx npm Supply Chain → GitHub OIDC → AWS Admin in 72 Hours

Summary

Google’s Cloud Threat Horizons H1 2026 report detailed a full cloud compromise executed by threat actor UNC6426 — all stemming from the August 2025 nx npm supply chain attack. The attacker leveraged stolen GitHub Personal Access Tokens (PATs) extracted by the QUIETVAULT credential stealer to abuse GitHub-to-AWS OIDC trust, escalate to AWS administrator, exfiltrate S3 data, destroy EC2/RDS production instances, and rename all victim GitHub repos to public /s1ngularity-repository-* strings. Total time from stolen token to full cloud destruction: under 72 hours.

What’s New (Last 24 Hours)

  • Google Cloud Threat Horizons H1 2026 published 2026-03-11 — first public case study of UNC6426 post-compromise chain.
  • Full attack path documented: QUIETVAULT stealer → GitHub PAT → Nord Stream CICD secret extraction → OIDC STS token → CloudFormation stack deploy → AdministratorAccess IAM role → S3 exfil + EC2/RDS destruction.
  • Detection hints published: hunt for CreateStack events with CAPABILITY_NAMED_IAM + AdministratorAccess policy attachment; hunt for repo rename events matching s1ngularity-repository-* pattern.

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
QUIETVAULT JavaScript credential stealer (postinstall script in trojanized nx package)MalwareT1195.002EDR file/process telemetryAlert on postinstall scripts spawning processes that read env variables or access ~/.npmrc, ~/.gitconfig, SSH key paths
GitHub PAT exfiltration to public repo /s1ngularity-repository-1TTPT1552.001GitHub Audit LogsAlert on GitHub repo creation events with pattern s1ngularity-repository-*; monitor for PAT usage from anomalous geo/IP
Nord Stream tool (--aws-role parameter) used to extract CI/CD secretsToolT1552.004CI/CD logs, CloudTrailHunt for sts:AssumeRoleWithWebIdentity calls from GitHub Actions service accounts outside expected workflow context
AWS CreateStack with CAPABILITY_NAMED_IAM + arn:aws:iam::aws:policy/AdministratorAccessTTPT1098AWS CloudTrailAlert on cloudformation:CreateStack events attaching AdministratorAccess managed policy to new IAM roles
GitHub repo bulk rename to s1ngularity-repository-[random] + visibility set to publicTTPT1485GitHub Audit LogsAlert on bulk repository rename events + visibility change to public within a short time window
EC2/RDS instance termination following IAM privilege escalationTTPT1485CloudTrailCorrelate IAM role creation events with subsequent ec2:TerminateInstances / rds:DeleteDBInstance calls

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkAWS Create Policy Version to allow all resources · ASL AWS SAML Update identity provider · AWS IAM Successful Group DeletionStrong IAM policy attachment coverage via AWS Create Policy Version to allow all resources — directly maps to UNC6426’s CloudFormation stack deploying AdministratorAccess. Tune to also alert on cloudformation:CreateStack with that policy ARN specifically.
ElasticAWS IAM AdministratorAccess Policy Attached to Role · AWS IAM Assume Role Policy Update · AWS Access Token Used from Multiple AddressesExcellent direct coverage: AdministratorAccess Policy Attached to Role precisely matches UNC6426’s privilege escalation step. AWS Access Token Used from Multiple Addresses would catch the stolen STS token being reused. High-fidelity detections — enable these if not already active.
SigmaGithub New Secret Created · AWS Suspicious SAML Activity · AWS Root CredentialsSigma covers GitHub secret creation (useful for PAT monitoring) and SAML/OIDC abuse patterns. No direct rule for the s1ngularity-repository-* rename pattern — recommend creating one targeting GitHub audit log repo.rename events with that string pattern.

Sources


3. KadNap Botnet — ASUS Routers Hijacked via Kademlia DHT P2P C2

Summary

Black Lotus Labs (Lumen) has published a full analysis of KadNap, a sophisticated router botnet first detected in August 2025 that has now compromised 14,000+ edge devices — mostly ASUS routers, but also targeting any ARM/MIPS edge device with unpatched RCE vulnerabilities. What makes KadNap notable is the use of a custom Kademlia DHT (Distributed Hash Table) implementation to hide C2 server IPs inside a peer-to-peer network, making traditional blocklist-based detection useless. Infected nodes are then leased as anonymous proxies through the “Doppelgänger” criminal proxy service (believed to be a rebrand of the Faceless service that previously powered the TheMoon botnet). Over 60% of victims are US-based. Lumen has blocked all known C2 traffic and released IoCs into public feeds.

What’s New (Last 24 Hours)

  • Lumen Black Lotus Labs full technical analysis published 2026-03-10 with IoCs and malware behavior.
  • THN follow-up published 2026-03-12 with additional victim geographic breakdown and Doppelgänger proxy service linkage.
  • Ars Technica coverage 2026-03-12 — emphasis on takedown-resistance due to DHT C2.
  • Key artifacts: dropper script aic.sh pulled from 212.104.141[.]140; persistence ELF renamed to .asusrouter; cron job runs at 55-minute mark hourly; executable renamed to kad; port 22 closed by fwr.sh and /tmp/.sose files.
  • Doppelgänger proxy service: doppelganger[.]shop — launched May/June 2025; claims 50+ country coverage.
  • C2 IPs from secondary botnet version: 74.194.191[.]52, 38.59.219[.]27, 83.252.42[.]112.
  • SHA-256: 691e4ec280aaff33270f33a9bb48a3fc38e2bd91c7359e687e3f0bd682f20b54

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
212.104.141[.]140 — Initial dropper C2 (aic.sh download server)IP IOCT1190Firewall/proxy logs, DNSBlock/alert on outbound connections to this IP from SOHO/edge device ranges
74.194.191[.]52 · 38.59.219[.]27 · 83.252.42[.]112 — Secondary botnet C2 IPsIP IOCT1571Firewall, NetFlowAlert on outbound traffic to these IPs from router/gateway management segments
/jffs/.asusrouter — Hidden persistence script file pathFile IOCT1053.003File integrity monitoring, EDRAlert on creation of .asusrouter hidden file in /jffs/ on router filesystems
kad — ELF binary filename (Kademlia DHT implant)File IOCT1027EDR file telemetryAlert on new ELF binary creation with filename kad on Linux/embedded systems
Cron job created to run at minute 55 every hour pulling remote shell scriptTTPT1053.003Cron/syslog, EDRHunt for cron entries containing external URLs or curl/wget at interval 55
fwr.sh / /tmp/.sose — Scripts closing SSH (port 22) and extracting C2 IP listsTTPT1562.004System logs, network monitoringAlert on iptables DROP rules being applied to port 22 by non-administrative processes
691e4ec280aaff33270f33a9bb48a3fc38e2bd91c7359e687e3f0bd682f20b54 — KadNap ELF SHA-256Hash IOCT1027EDR, VirusTotalHash-match on file scan telemetry
doppelganger[.]shop — Criminal proxy service domainDomain IOCT1090DNS, Proxy logsAlert on DNS resolution or HTTP connections to this domain from enterprise egress
NTP query burst followed by Kademlia DHT peer lookups (non-standard UDP traffic on router)TTPT1071NetFlow, PCAPHunt for routers initiating high-volume UDP traffic to random IPs after NTP sync

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkLinux Add Files In Known Crontab Directories · Linux Possible Append Cronjob Entry on Existing Cronjob File · Cisco Isovalent - Cron Job CreationSolid cron-persistence coverage maps directly to KadNap’s hourly cron job mechanism. The /jffs/.asusrouter cron payload would trigger linux_add_files_in_known_crontab_directories. However, no SOHO router-specific telemetry integration — these rules assume Linux EDR data, which most ASUS router environments won’t ship.
ElasticCron Job Created or Modified · Executable Bit Set for Potential Persistence Script · Potential Persistence via File ModificationFile modification and cron creation rules would catch KadNap persistence if Elastic Agent is deployed on managed Linux systems. Primary gap: ASUS routers typically cannot run Elastic Agent. Best coverage comes from network-layer detection — alert on the C2 IPs at the perimeter firewall/DNS layer.
SigmaPersistence Via Cron Files · Modifying Crontab · Scheduled Cron Task/Job - LinuxGood cron detection coverage. These rules would fire if syslog data from the router is shipped to a SIEM. Pair with network-layer IoC blocking (IPs above) for organizations without router-level log ingestion.

Sources


4. CISA Triple KEV: SolarWinds WHD + Ivanti EPM + Workspace One SSRF

Summary

CISA added three actively exploited enterprise vulnerabilities to KEV on March 9, 2026. The most urgent: SolarWinds Web Help Desk’s AjaxProxy deserialization bug (CVE-2025-26399, CVSS 9.8) is being actively exploited by the Warlock ransomware crew for initial access. The Ivanti Endpoint Manager credential-leak auth bypass (CVE-2026-1603, CVSS 8.6) has a known exploitation IP. The legacy Workspace One SSRF (CVE-2021-22054) is being chained with other SSRF vulns in coordinated campaigns. FCEB deadline for SolarWinds patch: today, March 12, 2026. Remaining two due March 23, 2026.

What’s New (Last 24 Hours)

  • CISA KEV triple-add published 2026-03-09; THN coverage 2026-03-11.
  • Warlock ransomware crew confirmed as exploitation actor for CVE-2025-26399 (SolarWinds WHD AjaxProxy deserialization → RCE).
  • CVE-2026-1603 exploitation IP confirmed: 103.69.224[.]98 (Ivanti EPM auth bypass).
  • CVE-2021-22054 (Workspace One SSRF) being chained with other SSRF vulns — GreyNoise flagged coordinated multi-product SSRF campaign.
  • FCEB deadline for SolarWinds WHD patch is today (2026-03-12).

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
103.69.224[.]98 — Exploitation IP for Ivanti EPM CVE-2026-1603 auth bypassIP IOCT1190Firewall/WAF logs, Web logsBlock/alert on inbound connections from this IP to Ivanti EPM management interfaces
HTTP POST to /helpdesk/WebObjects/Helpdesk.woa/ws/ (SolarWinds WHD AjaxProxy endpoint) with deserialization payload patternsTTPT1190Web/App logs, WAFAlert on requests to WHD AjaxProxy endpoint with unexpected content types or large binary payloads
Unauthenticated outbound HTTP requests from Workspace One UEM server to internal/arbitrary IPs (SSRF)TTPT1090.002Web proxy, FirewallAlert on UEM server initiating outbound connections to RFC1918 ranges or metadata services
Warlock ransomware: SolarWinds WHD exploitation for initial access → lateral movementTTPT1133Auth logs, VPN/RDP logsAlert on administrative access from SolarWinds WHD process context; hunt for LOLBin execution under WHD service account
Ivanti EPM stored credential leak via unauthenticated path bypassTTPT1078Web logs, Auth logsHunt for successful access to Ivanti EPM API endpoints without preceding authentication events; correlate with 103.69.224[.]98

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkIvanti Connect Secure SSRF in SAML Component · Ivanti Sentry Authentication Bypass · Ivanti EPM SQL Injection Remote Code Execution · VMware Workspace ONE Freemarker Server-side Template InjectionStrong Ivanti-family and Workspace One coverage. Ivanti EPM SQL Injection RCE is close to CVE-2026-1603’s auth-bypass pattern — adapt URI pattern to match the EPM credential-leak endpoint. No SolarWinds WHD-specific ESCU rule exists; recommend hunting web logs for the AjaxProxy endpoint.
ElasticSuspicious SolarWinds Web Help Desk Java Module Load or Child Process · Command Execution via SolarWinds ProcessDirect SolarWinds WHD exploit coverage via Suspicious SolarWinds Web Help Desk Java Module Load — this rule was purpose-built for WHD exploitation and maps precisely to CVE-2025-26399’s deserialization-to-RCE path. Enable immediately if running SolarWinds WHD.
SigmaVMToolsd Suspicious Child Process · Potential Persistence Via VMwareToolBoxCmd.EXESigma has VMware/Workspace One process-level persistence rules but no SolarWinds WHD or Ivanti EPM-specific rules. For WHD, adapt the vmtoolsd_susp_child_process.yml pattern to the WHD Java process; hunt for unexpected cmd/powershell children under the WHD service.

Sources


5. March 2026 Patch Tuesday — Six “More Likely Exploited” LPE Flaws

Summary

March 2026 Patch Tuesday dropped 80+ patches, with zero actively exploited zero-days but six vulnerabilities rated “more likely to be exploited” — all local privilege escalation paths to SYSTEM or Admin. The most notable: ATBroker.exe (Windows Accessibility Infrastructure, CVE-2026-24291) is a particularly prized target because it escalates all the way to SYSTEM (not just Admin), capable of bypassing EDR tools. Print Spooler gets another authenticated RCE (CVE-2026-23669). Two Office RCE bugs (CVE-2026-26110 and CVE-2026-26113) are exploitable via the Preview Pane. An Excel XSS bug (CVE-2026-26144) could coerce the Copilot Agent to exfiltrate data.

What’s New (Last 24 Hours)

  • Microsoft released March 2026 Patch Tuesday updates on 2026-03-11 patching 84 CVEs.
  • Six LPE vulnerabilities flagged “more likely to be exploited”: CVE-2026-24289 and CVE-2026-26132 (Windows Kernel use-after-free), CVE-2026-23668 (Windows Graphics race condition), CVE-2026-24294 (SMB Server improper auth), CVE-2026-25187 (Winlogon), CVE-2026-24291 (ATBroker.exe).
  • CVE-2026-24291 (ATBroker.exe): SYSTEM-level — particularly high-value for post-compromise LPE.
  • CVE-2026-23669: Print Spooler authenticated RCE — another in a long line of Spooler bugs reaching weaponization.
  • CVE-2026-26144: Excel XSS capable of triggering Copilot Agent data exfiltration — novel attack class.
  • Two publicly disclosed (not yet exploited) zero-days: CVE-2026-21262 (SQL Server SQLAdmin priv), CVE-2026-26127 (.NET DoS).

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
ATBroker.exe spawning unexpected child processes or registry key modifications under HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AccessibilityTTPT1068EDR process/registry telemetryAlert on ATBroker.exe spawning cmd/powershell children or writing registry outside expected Accessibility paths
Print Spooler service (spoolsv.exe) spawning unexpected child processes (CVE-2026-23669)TTPT1068EDR process telemetryAlert on spoolsv.exe spawning cmd, wscript, powershell, or cscript children
Kernel use-after-free exploitation patterns: process from non-SYSTEM parent acquiring SYSTEM token (CVE-2026-24289, CVE-2026-26132)TTPT1068EDR process integrityAlert on user-mode process integrity change from Medium to System without explicit service context
SMB Server improper auth (CVE-2026-24294): unexpected SMB session authentication without prior Kerberos/NTLM negotiationTTPT1021.002Windows Security event logsAlert on Event ID 4624/4625 with unusual logon type from SMB sessions targeting unpatched systems
Winlogon (winlogon.exe) creating unexpected child processes or writing new DLL paths (CVE-2026-25187)TTPT1547EDR process/file telemetryAlert on winlogon.exe spawning non-standard children or creating files in System32
Excel .xlsx file previewed in Outlook triggering network connections (CVE-2026-26110, CVE-2026-26113)TTPT1566.001Email logs, EDR network telemetryHunt for Excel/Outlook preview pane process initiating outbound network connections

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkPrint Spooler Adding A Printer Driver · Print Spooler Failed to Load a Plug-in · Windows Privilege Escalation System Process Without System Parent · Windows Privilege Escalation User Process Spawn System ProcessExcellent Spooler and kernel privilege escalation coverage. Windows Privilege Escalation System Process Without System Parent directly catches the kernel UAF LPE pattern for CVE-2026-24289/26132. Ensure print_spooler_adding_a_printer_driver is tuned for CVE-2026-23669 exploitation context.
ElasticUnusual Print Spooler Child Process · Suspicious PrintSpooler Service Executable File Creation · Expired or Revoked Driver Loaded · First Time Seen Driver LoadedStrong Print Spooler and kernel driver coverage. Unusual Print Spooler Child Process is the primary rule for CVE-2026-23669. First Time Seen Driver Loaded catches novel kernel drivers often used for UAF privilege escalation chains.
SigmaAtbroker Registry Change · DCERPC SMB Spoolss Named Pipe · Winlogon Helper DLL · Winlogon Notify Key Logon PersistenceSigma has excellent targeted coverage for all the high-priority CVEs: Atbroker Registry Change maps directly to CVE-2026-24291 exploitation; Winlogon Notify Key Logon Persistence covers CVE-2026-25187; DCERPC SMB Spoolss Named Pipe covers Print Spooler abuse. Enable all four if not already active.

Sources