Cyber Threat Brief — April 1 2026

⚠️ This report is AI-generated. Always validate findings.

1. Axios npm Supply Chain Compromise — WAVESHAPER.V2 RAT (UNC1069)

TL;DR: Malicious axios npm versions 1.14.1 and 0.30.4 published March 31 drop a cross-platform RAT via the plain-crypto-js dependency. GTIG attributes the attack to North Korean UNC1069; the ~3-hour exposure window on a 100M-weekly-download package demands immediate artifact hunting.

What’s New:

  • Maintainer account @jasonsaayman compromised; attacker published to both release branches within 39 minutes (00:21–03:00 UTC March 31)
  • Dependency [email protected] pre-staged 18 hours prior; postinstall script decodes via string-reversal + Base64 then XOR key OrDeR_7077 (position-dependent: 7 * i² % 10)
  • Platform-specific WAVESHAPER.V2 RAT: in-memory PE injection (Windows), LaunchAgent persistence (macOS), Python RAT (Linux)
  • Capabilities: system recon, process listing, arbitrary shell execution, in-memory PE loading
  • Malicious versions removed from npm by 03:29 UTC; safe versions: 1.14.0 / 0.30.3

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
[email protected] (SHA1: 07d889e2dadce6f3910dcbc253317d28ca61c766)Malicious packageT1195.002npm audit, SBOMBlock/alert on package name and hash in CI/CD
[email protected] (SHA1: 2553649f232204966871cea80a5d0d6adc700ca)Compromised packageT1195.002npm audit, SBOMScan lockfiles for these exact versions
[email protected] (SHA1: d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71)Compromised packageT1195.002npm audit, SBOMScan lockfiles for these exact versions
sfrclak[.]comC2 domainT1071.001DNS, proxy logsBlock and hunt in DNS/proxy logs
142.11.206.73C2 IPT1071.001Firewall, NDRBlock and hunt in netflow/firewall logs
/Library/Caches/com.apple.act.mondmacOS RAT pathT1543.001EDR, fs monitoringHunt for file creation at this path
%PROGRAMDATA%\wt.exeWindows RAT pathT1059Sysmon EID 1/11, EDRAlert on wt.exe execution from ProgramData
/tmp/ld.pyLinux RAT pathT1059.006auditd, EDRHunt for python executing /tmp/ld.py
XOR key OrDeR_7077Decoder artifactT1140YARA, script analysisYARA rule on string in postinstall scripts

Detection

SourceRuleGap
Splunk ESCUNone specificNeed: npm postinstall shell execution → outbound C2 correlation rule
ElasticAxios WAVESHAPER.V2 Detection (published March 31)Review Elastic blog for full rule set
SigmaNone specificNeed: Suspicious npm postinstall script execution; wt.exe from ProgramData

Sources: Google Cloud / GTIG Attribution · Snyk Advisory · Elastic Security Labs · Socket.dev


2. Operation TrueChaos — CVE-2026-3502 (TrueConf Zero-Day)

TL;DR: Chinese-nexus actor exploited TrueConf’s update mechanism (CVE-2026-3502, CVSS 7.8) to push Havoc C2 framework payloads to all connected clients in Southeast Asian government networks. Patch to TrueConf client 8.5.3+.

What’s New:

  • Zero-day in TrueConf Windows client update validation — attacker controlling on-prem TrueConf server replaces legitimate update with malicious payload
  • DLL sideloading chain: benign poweriso.exe + malicious 7z-x64.dll dropped to C:\ProgramData\PowerISO\
  • Havoc C2 framework deployed post-exploitation; C2 hosted on Alibaba Cloud and Tencent infrastructure
  • Check Point Research attributes to Chinese-nexus actor (moderate confidence) based on DLL sideloading TTPs, C2 infrastructure, and victimology
  • Patched in TrueConf Windows client 8.5.3 (released March 2026)

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
C:\ProgramData\PowerISO\poweriso.exeSideload hostT1574.002Sysmon EID 1/11, EDRHunt for poweriso.exe in ProgramData (not normal install path)
C:\ProgramData\PowerISO\7z-x64.dllMalicious DLLT1574.002Sysmon EID 7, EDRAlert on 7z-x64.dll loaded from ProgramData\PowerISO
Havoc C2 beacon trafficC2 frameworkT1071.001NDR, proxy logsDeploy Havoc C2 Malleable-C2 JA3/JA4 signatures
Alibaba Cloud / Tencent C2 infrastructureC2 hostingT1583.003Proxy, firewallHunt for unusual outbound to Chinese cloud providers from gov/enterprise
TrueConf update mechanism abuseInitial accessT1195.002Application logsAudit TrueConf server update integrity; verify server hasn’t been compromised
trueconf.exe spawning poweriso.exeProcess chainT1204.002Sysmon EID 1, EDRAlert on TrueConf process spawning unexpected children

Detection

SourceRuleGap
Splunk ESCUNone specificNeed: DLL sideload via poweriso.exe from non-standard path; TrueConf child process anomaly
ElasticSuspicious DLL Loaded via Side-Loading (generic)Gap: No TrueConf-specific rule
Sigmasysmon_dll_sideloading_7z.yml (community, partial)Gap: No rule for poweriso.exe sideload chain or TrueConf update abuse

Sources: Check Point Research · The Hacker News · Check Point Blog


Status Updates

  • CVE-2026-3055 (Citrix NetScaler): CISA KEV added March 30; active exploitation confirmed via SAMLRequest and /wsfed/passive paths; Metasploit module available; federal deadline April 2 — patch immediately. Previous brief.
  • CVE-2026-20131 (Cisco FMC): Interlock ransomware exploitation ongoing; no new artifacts. Previous brief.
  • CVE-2025-53521 (F5 BIG-IP APM): Federal deadline passed March 30; UNC5221 BRICKSTORM exploitation ongoing; no new artifacts. Previous brief.
  • CVE-2026-4681 (PTC Windchill): German police physically warning affected orgs; still no patch available; imminent exploitation threat persists. Previous brief.