Cyber Threat Brief — April 10 2026

⚠️ This report is AI-generated. Always validate findings.

1. Adobe Reader Unpatched Zero-Day — No CVE Assigned

TL;DR: EXPMON researcher Haifei Li disclosed an actively exploited Adobe Acrobat/Reader zero-day on April 9. No CVE, no patch. Weaponized PDFs with Russian-language oil/gas lures have been in the wild since at least November 2025, fingerprinting victims and exfiltrating data to a hardcoded C2.

What’s New:

  • Public disclosure April 9 by EXPMON; Adobe has not acknowledged or patched.
  • Exploit abuses Acrobat JavaScript engine privileged APIs for system fingerprinting, arbitrary file read, and AES-encrypted second-stage payload delivery.
  • Earliest known VT sample (Invoice540.pdf) submitted November 28, 2025; second sample March 23, 2026.
  • Russian-language lures referencing oil/gas industry current events — likely espionage-motivated.
  • User-Agent string Adobe Synchronizer used in C2 callbacks.

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
54077a5b15638e354fa02318623775b7a1cc0e8c21e59bcbab333035369e377fSHA-256 (Invoice540.pdf)T1203EDR / file hashBlock / hunt
169.40.2.68:45191C2 IP:portT1071.001Firewall / proxyBlock
User-Agent: Adobe SynchronizerHTTP headerT1071.001Proxy / NDRAlert on outbound from Acrobat processes
Obfuscated JS in PDF /OpenActionExecution triggerT1059.007EDR process treeHunt: AcroRd32.exe / Acrobat.exe spawning network calls

Detection

SourceRuleGap
Splunk ESCUNoneNeed: PDF-spawned outbound connection to non-Adobe IP; Acrobat JS API abuse via process telemetry
ElasticNoneNeed: Acrobat child process network connection rule
SigmaNoneNeed: proc_creation_win_acrobat_suspicious_network.yml — Acrobat process connecting to non-whitelisted IPs

Sources: EXPMON / Haifei Li disclosure, The Hacker News, SecurityWeek, Forensic analysis (SHA-256)


2. APT28 PRISMEX Campaign — CVE-2026-21509 / CVE-2026-21513

TL;DR: Trend Micro published full analysis (April 8) of APT28/Pawn Storm deploying the PRISMEX malware suite against Ukraine and NATO ally defense/logistics orgs since September 2025. Four-stage chain: Excel steganography dropper → COM hijack persistence → PNG-embedded .NET payload → COVENANT Grunt C2 over Filen.io. Dual espionage/wiper capability confirmed.

What’s New:

  • Trend Micro report published April 8; SOC Prime detection content released April 9.
  • Four modular components: PrismexSheet (VBA stego dropper), PrismexDrop (COM hijack), PrismexLoader/PixyNetLoader (PNG “Bit Plane Round Robin” extraction), PrismexStager (COVENANT Grunt → Filen.io C2).
  • Rapid weaponization of CVE-2026-21509 and CVE-2026-21513 — infrastructure prep observed January 12, two weeks before public disclosure.
  • Wiper capability: %USERPROFILE% directory erasure via Grunt payload observed in October 2025 incident.
  • Sectors: Ukraine government/defense/hydro, Poland rail, Romania/Slovenia/Turkey maritime, Czech/Slovak ammunition logistics.

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
wellnesscaremed[.]comC2 domainT1071.001DNS / proxyBlock
gateway.filen.ioC2 (cloud abuse)T1102.002Proxy / CASBMonitor; block if no business use
adwapi64.dllDropped DLLT1546.015EDR file createHunt in %APPDATA% paths
EhStoreShell.dllProxy DLLT1574.001EDR file createHunt
SplashScreen.png, background.pngStego carriersT1027.003EDR file createHunt: large PNGs in Office temp dirs
CLSID {68DDBB56-9D1D-4FD9-89C5-C0DA2A625392}COM hijackT1546.015Registry (Sysmon 13)Alert: HKCU\Software\Classes\CLSID writes
Scheduled task OneDriveHealthPersistenceT1053.005Sysmon 1 / WinEventLogHunt: task restarting explorer.exe
aefd15e3c395edd16ede7685c6e97ca0350a702ee7c8585274b457166e86b1faSHA-256 (exploit)T1203EDR / VTBlock / hunt

Detection

SourceRuleGap
Splunk ESCUSuspicious Scheduled Task Created via schtasks.exe (generic)Need: specific rule for OneDriveHealth task restarting explorer.exe
ElasticCOM Object Hijacking (generic)Need: rule scoping HKCU CLSID writes to adwapi64.dll or EhStoreShell.dll
Sigmaregistry_set_com_hijack_inprocserver.yml (partial)Need: Filen.io gateway network rule; stego PNG detection in Office temp dirs

Sources: Trend Micro, The Hacker News, SOC Prime, Security Affairs


3. CyberAv3ngers Target U.S. Critical Infrastructure PLCs — CISA AA26-097A

TL;DR: Joint FBI/CISA/NSA/EPA/DOE/CNMF advisory (April 7) confirms IRGC-CEC-linked CyberAv3ngers compromising internet-exposed Rockwell Automation PLCs across U.S. water, energy, and government facilities since March 2026. Attackers use Studio 5000 Logix Designer (not a vuln exploit) to modify PLC logic and falsify HMI displays while deploying Dropbear SSH for persistence.

What’s New:

  • Joint advisory AA26-097A published April 7 with STIX IOCs (XML + JSON) downloadable from CISA.
  • No software vulnerability exploited — attackers target absent authentication on internet-exposed Rockwell CompactLogix/Micro850 PLCs.
  • Post-access: Dropbear SSH on port 22 for persistent C2, PLC project file extraction/modification, SCADA HMI data manipulation (false readings).
  • Operational disruption and financial loss confirmed at multiple victim sites.
  • Escalation assessed as response to U.S.-Iran/Israel hostilities.

Actionable Intel

ArtifactTypeATT&CK (ICS)Log SourceAction
Port 44818 (EtherNet/IP)NetworkT0883Firewall / IDSBlock from internet; alert on external inbound
Port 2222 (EtherNet/IP alt)NetworkT0883Firewall / IDSBlock from internet
Port 502 (Modbus TCP)NetworkT0883Firewall / IDSBlock from internet
Port 22 (Dropbear SSH)PersistenceT1219Firewall / PLC logsHunt: unexpected SSH on OT endpoints
Dropbear SSH binaryToolT1219EDR / file hashHunt on PLC-adjacent hosts
Modified PLC project filesLogic manipulationT0839Change mgmt / Rockwell logsDiff project files against known-good baselines
Falsified HMI dataImpactT0565Historian / SCADA logsCross-check HMI values vs. sensor data

Detection

SourceRuleGap
Splunk ESCUNone (OT/ICS gap)Need: Rockwell EtherNet/IP external connection rule; Dropbear process on non-standard OT host
ElasticNone (OT/ICS gap)Need: ICS protocol detection on internet-facing interfaces
SigmaNone (OT/ICS gap)Need: Dropbear SSH process creation on Windows/Linux OT hosts

Sources: CISA AA26-097A, SecurityWeek, Picus Security, 1898 Advisories


Status Updates

  • CVE-2026-35616 (FortiClient EMS): Federal CISA KEV deadline passed April 9; exploitation ongoing since March 31, still no full patch (7.4.7 pending), only hotfix available. Original brief.
  • CVE-2026-1340 / CVE-2026-1281 (Ivanti EPMM): Second CVE-2026-1281 added to CISA KEV; federal deadline April 11; “thousands” of exploitation attempts confirmed; Ivanti released RPM detection tool for IOC scanning. Original brief.
  • CVE-2026-4681 (PTC Windchill): Still no patch; German police continue physically notifying affected orgs; CISA ICS advisory ICSA-26-085-03 active. Original brief.
  • CVE-2025-53521 (F5 BIG-IP APM): UNC5221 BRICKSTORM exploitation ongoing; federal deadline passed March 30. Original brief.