Cyber Threat Brief — March 31 2026

⚠️ This report is AI-generated. Always validate findings.

1. DeepLoad Loader — ClickFix + AI-Obfuscated WMI Persistence

TL;DR: New loader disclosed March 30 by ReliaQuest combines ClickFix social engineering, AI-generated PowerShell obfuscation, and WMI event subscription persistence to steal browser credentials. Credential exfiltration begins within minutes and survives loader removal.

What’s New:

  • ClickFix lure → mshta.exe → obfuscated PowerShell XOR shellcode loader (AI-generated variable padding defeats static signatures)
  • Payload injected into LockAppHost.exe (legitimate lock screen process — atypical for outbound network activity)
  • WMI event subscription re-executes attack ~72 hours post-cleanup with no user interaction
  • Standalone credential stealer filemanager.exe runs on separate C2 infrastructure — survives main loader containment
  • /t1_usb path observed in C2 traffic within 10 minutes of infection, indicating USB activity tracking

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
mshta.exe spawning PowerShellProcess chainT1218.005Sysmon EID 1, EDRAlert on mshta→powershell chain
LockAppHost.exe outbound networkAnomalous process behaviorT1055Sysmon EID 3, firewallHunt: LockAppHost.exe should not make outbound connections
WMI event subscription persistenceWMI consumerT1546.003Sysmon EID 19/20/21, WMI logsHunt all WMI __EventConsumer creations
filemanager.exe (standalone stealer)Process nameT1555.003Sysmon EID 1Alert on unexpected filemanager.exe execution
/t1_usb in HTTP pathC2 beacon patternT1071.001Proxy/firewall logsHunt for /t1_usb in outbound HTTP URIs
PowerShell Script Block with XOR + padded variablesObfuscated scriptT1059.001PowerShell ScriptBlock (EID 4104)Hunt: high-entropy variable assignments preceding XOR routines
Browser extension files in non-standard pathsCredential accessT1176Sysmon EID 11Hunt: .crx/.xpi writes outside default browser extension dirs

Detection

SourceRuleGap
Splunk ESCU”Suspicious mshta Child Process” (partial)No rule for LockAppHost.exe outbound or WMI consumer from WmiPrvSE→PowerShell chain
Elastic”Suspicious Script Object Execution”No WMI event subscription persistence detection specific to this chain
Sigmaproc_creation_win_mshta_spawn_shell.yml (partial)Missing: LockAppHost.exe network anomaly, WMI __EventConsumer with PowerShell payload, filemanager.exe process

Sources: ReliaQuest, The Hacker News, CyberScoop

2. Citrix NetScaler Memory Overread — CVE-2026-3055 (CISA KEV)

TL;DR: CISA added CVE-2026-3055 to KEV on March 30 confirming active exploitation (upgraded from recon). Attackers leak session cookies, private keys, and plaintext credentials via crafted SAML requests. Federal deadline April 2. Metasploit module available.

What’s New:

  • CISA KEV addition March 30 — confirmed active exploitation (previously only recon/fingerprinting)
  • Exploitation mechanism: malformed SAMLRequest to /saml/login omitting AssertionConsumerServiceURL triggers memory overread
  • Leaked data returned via NSC_TASS cookie (Base64-encoded memory contents including session tokens, private keys, plaintext creds)
  • Second exploitation path: /wsfed/passive?wctx — presence of wctx parameter without = triggers buffer read
  • Metasploit module now available, lowering exploitation barrier
  • Federal remediation deadline: April 2, 2026

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST/GET /saml/login with malformed SAMLRequestExploitation attemptT1190WAF, NetScaler syslog, proxyBlock/alert: SAMLRequest missing AssertionConsumerServiceURL
GET /cgi/GetAuthMethodsRecon/fingerprintingT1595.002NetScaler syslog, proxyAlert on external requests to this endpoint
GET /wsfed/passive?wctx (no = after wctx)Exploitation attemptT1190WAF, NetScaler syslogBlock/alert: wctx param present without value
NSC_TASS cookie with Base64 blob in responseData leak indicatorT1005NetScaler logs, packet captureHunt: oversized NSC_TASS cookies in responses
Patch: 14.1-66.59+ / 13.1-62.23+RemediationVuln scannerValidate patched versions across all SAML IDP-configured instances

Detection

SourceRuleGap
Splunk ESCUNoneNo NetScaler SAML exploitation rule — need custom SPL for /saml/login malformed requests and oversized NSC_TASS response cookies
ElasticNoneNo coverage — custom rule needed for NetScaler access logs
SigmaNoneNo NetScaler-specific rules — community rule for /cgi/GetAuthMethods fingerprinting needed

Sources: CISA KEV, Rapid7, watchTowr, BleepingComputer

Status Updates

  • TeamPCP (Trivy/litellm/Telnyx): SIGNIFICANT ESCALATION — TeamPCP launched Vect ransomware mass affiliate program via BreachForums (~300K users received affiliate keys). First confirmed Vect deployment using TeamPCP-sourced credentials. Hunt for models.litellm[.]cloud, ~/.config/sysmon/sysmon.py, unexpected .pth files in site-packages/, node-setup-* K8s pods. March 29 brief. SANS ISC Update.
  • CVE-2025-53521 (F5 BIG-IP APM): Federal CISA KEV deadline passed March 30. UNC5221 BRICKSTORM exploitation ongoing. Patch to 17.1.0.4/16.1.4.3/15.1.10.2 immediately. March 28 brief.
  • CVE-2026-4681 (PTC Windchill): Still no patch. CVSS 10.0 pre-auth Java deserialization RCE. Apply servlet path deny rules. Monitor for GW.class/payload.bin/dpr_*.jsp. March 27 brief.
  • CVE-2026-20131 (Cisco FMC): Interlock ransomware exploitation ongoing. Public PoC available. No new artifacts. March 19 brief.
  • CVE-2026-33017 (Langflow): Exploitation ongoing. CISA KEV deadline April 8. No new IOCs. March 21 brief.