Cyber Threat Brief — April 25 2026

⚠️ This report is AI-generated. Always validate findings.

1. Bitwarden CLI Supply Chain — Shai-Hulud Credential Worm

TL;DR: @bitwarden/[email protected] was backdoored for 93 minutes on April 22 via a compromised Checkmarx GitHub Action. The payload — “Shai-Hulud: The Third Coming” — steals dev credentials, npm/GitHub tokens, cloud keys, and explicitly targets AI coding tool configs (Claude Code, Cursor, Codex CLI).

What’s New:

  • TeamPCP (same actor behind Trivy/litellm/telnyx compromises) pivoted to Bitwarden via cascading Checkmarx CI/CD token theft
  • bw_setup.js downloads Bun runtime, launches obfuscated bw1.js credential stealer
  • Exfil via AES-256-GCM to audit.checkmarx[.]cx (94.154.172[.]43) with GitHub repo fallback under victim accounts
  • Self-propagating npm worm creates repos named {sardaukar|fremen|atreides}-{sandworm|ornithopter}-NNN with description “Shai-Hulud: The Third Coming”
  • Attacker GitHub account helloworm00 (created April 20, email [email protected]) used for staging

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
@bitwarden/[email protected]Malicious npm packageT1195.002npm audit / SBOMRemove, rotate all creds on host
audit.checkmarx[.]cxExfil domainT1567DNS/ProxyBlock
94.154.172.43C2 IPT1071.001FirewallBlock
bw_setup.js, bw1.jsMalware loader/stealerT1059.007EDR (file create)Hunt in node_modules
helloworm00 GitHub reposExfil repos (Dune-themed names)T1567.001GitHub audit logHunt for repo creation under org accounts
bw1|checkmarx|butlerian|shai-hulud|tmp.987654321Shell RC persistence markersT1546.004EDR / .bashrc/.zshrcGrep developer workstations
~/.claude/, ~/.cursor/, .codex/ config accessAI tool credential theftT1552.001EDR (file read)Alert on unexpected reads

Detection

SourceRuleGap
Splunk ESCUNoneNeed: npm preinstall script spawning Bun runtime; bw_setup.js file creation
ElasticNoneNeed: Node.js process downloading Bun binary; GitHub API repo creation from CI runner
SigmaNoneNeed: Shell RC file modification with known Shai-Hulud markers

Sources: Aikido · HackerNews · Endor Labs · OX Security · Bitwarden Statement

TL;DR: CISA added 4 actively exploited CVEs on April 24: Samsung MagicINFO unauthenticated JSP upload delivering Mirai, SimpleHelp RMM chain enabling DragonForce ransomware, and D-Link EoL router RCE for Mirai botnet recruitment.

What’s New:

  • CVE-2024-7399 (Samsung MagicINFO 9 Server): Unauthenticated path traversal JSP upload → RCE as SYSTEM; Mirai variant “tuxnokill” deployed; version 21.1050.0 still vulnerable despite vendor claims; CISA deadline May 15
  • CVE-2024-57726 + CVE-2024-57728 (SimpleHelp ≤5.5.7): Missing authorization → admin API key creation → Zip Slip arbitrary file write → RCE; DragonForce ransomware precursor per Sophos/Field Effect; CISA deadline May 15
  • CVE-2025-29635 (D-Link DIR-823X): Command injection, EoL device — no patch forthcoming; Mirai “tuxnokill” campaign per Akamai SIRT; CISA deadline May 15

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST to MagicINFO upload endpoint with .jsp extensionExploit payloadT1190WAF/Reverse proxyBlock unauthenticated JSP uploads
Mirai variant “tuxnokill”Botnet payloadT1583.005EDR/IDSHunt for binary name
SimpleHelp technician API key creation from low-priv accountPrivilege escalationT1078.004SimpleHelp audit logsAlert on API key creation by non-admin
Zip file uploads to SimpleHelp with ../ path componentsZip Slip exploitT1105SimpleHelp server logsWAF rule for path traversal in archives
D-Link DIR-823X on networkVulnerable assetT1190Asset inventoryDecommission — no patch available

Detection

SourceRuleGap
Splunk ESCUNone for MagicINFO or SimpleHelp-specificNeed: JSP file creation in MagicINFO web root; SimpleHelp API key escalation
ElasticNone specificNeed: SimpleHelp zip upload with path traversal indicators
SigmaNone specificNeed: Samsung MagicINFO unauthenticated upload detection

Sources: CISA Alert · BleepingComputer - MagicINFO · Akamai - D-Link Mirai · HackerNews · Arctic Wolf

3. Tropic Trooper (APT23) Pivots to AdaptixC2 — GitHub C2

TL;DR: Zscaler ThreatLabz caught Tropic Trooper deploying a trojanized SumatraPDF reader with a custom AdaptixC2 beacon that uses GitHub Issues as C2, targeting Chinese-speaking military/government entities. Staging server ties to prior Cobalt Strike and EntryShell infrastructure.

What’s New:

  • March 12 2026 ZIP archive with military-themed lure: “Comparative Analysis of US-UK and US-Australia Nuclear Submarine Cooperation (2025).exe” — trojanized SumatraPDF
  • TOSHIS loader hijacks _security_init_cookie, resolves APIs via Adler-32, downloads AES-128-CBC encrypted shellcode from staging server
  • AdaptixC2 Beacon generates per-session RC4 key, gets victim external IP from ipinfo.io, posts to GitHub Issues for task assignment/result upload
  • VS Code tunnels used for interactive remote access post-beacon
  • Staging server 158.247.193[.]100 previously hosted Cobalt Strike Beacon and EntryShell backdoor (known Tropic Trooper tooling)

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
158.247.193.100Staging/C2 serverT1105Firewall/ProxyBlock
GitHub Issues API calls from non-dev endpointsC2 channelT1102.002Proxy/CASBAlert on GitHub API from unexpected hosts
ipinfo.io lookups from endpointsVictim fingerprintingT1016DNS/ProxyCorrelate with other suspicious activity
SumatraPDF with modified _security_init_cookieTrojanized binaryT1036.005EDR (hash mismatch)Baseline legitimate SumatraPDF hashes
VS Code tunnel connections from non-developer hostsRemote accessT1219Proxy/EDRAlert on unexpected code tunnel usage
Adler-32 API resolution patternLoader behaviorT1027.010EDR (API call pattern)Behavioral rule for hashed API resolution

Detection

SourceRuleGap
Splunk ESCUNoneNeed: VS Code tunnel from non-dev host; GitHub Issues API abuse from endpoint
ElasticSuspicious Remote Access Tool Execution (partial for VS Code)Need: SumatraPDF spawning network connections; GitHub API as C2
Sigmawin_susp_vscode_tunnel.yml (community, partial)Need: Adler-32 loader pattern; trojanized PDF reader behavioral detection

Sources: Zscaler ThreatLabz · HackerNews · GBHackers


Status Updates

  • CVE-2026-4681 (PTC Windchill): Still no patch; German police physical outreach continues; imminent exploitation threat persists. Original brief.
  • CVE-2026-33825 / BlueHammer (Windows Defender): CISA KEV addition April 22; federal deadline May 7; RedSun and UnDefend remain unpatched. Original brief.
  • CVE-2026-35616 (FortiClient EMS): Federal deadline passed April 9; 7.4.7 full fix still pending; exploitation ongoing since March 31. Original brief.
  • CVE-2026-34621 (Adobe Reader): ITW exploitation ongoing since Dec 2025; CISA KEV deadline May 4; no new IOCs. Original brief.