Cyber Threat Brief — April 12 2026

⚠️ This report is AI-generated. Always validate findings.

1. CPUID Supply-Chain Attack Delivers STX RAT — CPU-Z / HWMonitor

TL;DR: Attackers compromised CPUID’s download API (April 9–10) and served trojanized CPU-Z 2.19 and HWMonitor installers containing a Zig-compiled CRYPTBASE.dll sideload that drops STX RAT with HVNC, credential theft, and DoH-based C2.

What’s New:

  • Compromise window: ~April 9 15:00 UTC to April 10 10:00 UTC; download URLs redirected to attacker-controlled Cloudflare R2 buckets
  • Technique: legitimate signed CPUID executables repackaged with malicious CRYPTBASE.dll (DLL sideloading via LoadLibrary search order)
  • Loader chain: Zig-compiled DLL → embedded shellcode → IPv6-encoded .NET deserialization → STX RAT core
  • Persistence via MSBuild inline task execution and script-based scheduled tasks
  • C2 uses DNS-over-HTTPS to resolve welcome.supp0v3.com; same infrastructure linked to March 2026 trojanized FileZilla campaign
  • 150+ confirmed victims per Kaspersky telemetry; primarily individual users and sysadmins

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
CRYPTBASE.dll outside %SystemRoot%\System32FileT1574.001EDR, Sysmon EID 7 (ImageLoaded)Alert — legitimate cryptbase.dll loads only from System32
SHA-256 52862b538459c8faaf89cf2b5d79c2f0030f79f80a68f93d65ec91f046f05be6Hash (STX RAT)T1059.001EDR, AVBlock
welcome.supp0v3.comDomain (C2)T1071.001DNS logs, proxy, Zeek dns.logBlock and hunt — also check DoH traffic to dns.google, cloudflare-dns.com with this domain in queries
DNS-over-HTTPS POST requests to dns.google/resolve or cloudflare-dns.com/dns-query from non-browser processesNetworkT1071.004Proxy, Zeek, EDR network telemetryHunt — legitimate DoH rare from cpuz.exe or MSBuild.exe
MSBuild.exe spawning from user temp or AppData pathsProcessT1127.001Sysmon EID 1, EDRAlert — MSBuild persistence for .NET inline task execution
Downloads from *.r2.cloudflarestorage.com by CPUID executablesURLT1195.002Proxy logs, browser historyHunt — legitimate CPUID downloads use download.cpuid.com

Detection

SourceRuleGap
Splunk ESCUDetect CRYPTBASE DLL Sideloading (generic sideload), MSBuild Suspicious ProcessNo rule specific to CRYPTBASE.dll outside System32 — write custom
ElasticDLL Side-Loading via a Renamed Legitimate ApplicationDoesn’t key on CRYPTBASE.dll specifically; needs custom rule for non-System32 path
Sigmasysmon_dll_sideloading_cryptbase.yml (community), win_susp_msbuild.ymlDoH-based C2 from non-browser processes lacks coverage

Sources: Kaspersky Securelist · The Hacker News · BleepingComputer · N3mes1s Analysis · Cyderes


2. Storm-1175 Chains Zero-Days for High-Velocity Medusa Ransomware — CVE-2026-23760

TL;DR: China-linked Storm-1175 exploited CVE-2026-23760 (SmarterMail auth bypass) and CVE-2025-10035 (GoAnywhere MFT) as zero-days, moving from initial access to Medusa ransomware deployment in under 24 hours. Healthcare, education, and professional services orgs in US/UK/AU are primary targets.

What’s New:

  • CVE-2026-23760: unauthenticated password reset of SmarterMail admin accounts via force-reset-password API — no token or prior auth required; affects versions prior to build 9511
  • Storm-1175 exploited both CVEs approximately one week before public disclosure
  • Post-compromise chain: web shell or RMM tool → admin account creation → RDP enabled via Windows Firewall modification → Defender exclusions set → lateral movement via PsExec/PowerShell/Impacket → data staged with Bandizip → exfil via Rclone to cloud storage → Medusa deployed via PDQ Deployer (RunFileCopy.cmd)
  • Microsoft reports sub-24-hour dwell time in multiple intrusions
  • Same actor linked to historical exploitation of Exchange, PaperCut, Ivanti, ConnectWise, TeamCity, SimpleHelp, CrushFTP, BeyondTrust

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST /api/force-reset-password to SmarterMail from external IPURI/HTTPT1190Web server access logs, WAF, reverse proxyBlock external access; alert on any unauthenticated call to this endpoint
RunFileCopy.cmd executed by PDQ Deployer serviceFile/ProcessT1072Sysmon EID 1, EDR, Windows Event LogAlert — PDQ executing batch scripts for ransomware delivery
Rclone.exe or rclone process with sync or copy flags to external cloud storageProcess/CLIT1567.002EDR, Sysmon EID 1, command-line loggingAlert — data exfiltration tool
Bandizip.exe / bz.exe archiving sensitive directoriesProcess/CLIT1560.001Sysmon EID 1, EDRHunt — unusual archiving tool in enterprise environments
New Windows Firewall rule enabling inbound RDP (port 3389)ConfigT1562.004Windows Security EID 4946, Sysmon EID 13Alert — firewall rule modification enabling remote access
Defender exclusion paths added via Set-MpPreference -ExclusionPathConfigT1562.001Defender operational log EID 5007, PowerShell ScriptBlockAlert — Defender tampering
Cloudflare tunnel binaries (cloudflared.exe) or new admin accounts post-exploitationProcess/AccountT1572, T1136.001EDR, Windows Security EID 4720Alert

Detection

SourceRuleGap
Splunk ESCURclone Process Execution, PsExec Lateral Movement, Windows Defender Exclusion AddedNo rule for PDQ Deployer abuse or SmarterMail auth bypass URI pattern
ElasticRclone Execution, PsExec Network Connection, Windows Firewall Rule ModificationNo SmarterMail-specific rule; PDQ Deployer as deployment vector not covered
Sigmawin_proc_creation_rclone.yml, win_defender_exclusion.yml, win_firewall_rule_add.ymlNo coverage for Bandizip staging or force-reset-password API abuse

Sources: Microsoft Security Blog · The Hacker News · Dark Reading · NVD CVE-2026-23760


Status Updates

  • CVE-2026-39987 (Marimo): Sysdig confirms 150+ exploitation attempts in first 48 hours; no public PoC yet but attack tooling is trivial (WebSocket client). Previous brief.
  • CyberAv3ngers PLC Campaign (AA26-097A): STIX/JSON IOC package now available from CISA; 5,219 Rockwell PLCs identified as internet-exposed per Shodan. Previous brief.