Svoboda Cybersecurity Brief January 28, 2026

Private VPN — just $1.2/mo

FortiCloud SSO Zero-Day Exploited for Administrative Access

Fortinet confirmed CVE-2026-24858, a critical authentication bypass flaw in FortiCloud SSO, allowing attackers to gain administrative access to FortiOS, FortiManager, and FortiAnalyzer devices. Exploits observed in the wild created rogue admin accounts and exfiltrated configurations.
Impact: Full device compromise via SAML SSO bypass.
Mitigation: Disable FortiCloud SSO (admin-forticloud-sso-login disable) or apply server-side restrictions until patches are released.
Source: BleepingComputer

WinRAR Path Traversal Flaw Actively Exploited by Multiple Threat Actors

CVE-2025-8088, a WinRAR vulnerability, is being exploited by state-sponsored and criminal groups to deploy malware via malicious archives. Attackers use Alternate Data Streams (ADS) to hide payloads in decoy files (e.g., PDFs) and execute them via LNK/HTA files in Startup folders.
Impact: Initial access leading to malware like NESTPACKER, AsyncRAT, and banking trojans.
Mitigation: Update WinRAR or block archive execution from untrusted sources.
Source: BleepingComputer

Mustang Panda Deploys Upgraded CoolClient Backdoor with Infostealers

The Chinese APT group Mustang Panda updated its CoolClient backdoor to steal browser credentials, clipboard data, and deploy a rootkit. Targets include government entities in Myanmar, Mongolia, and Russia, leveraging DLL side-loading via legitimate software like Sangfor.
Impact: Data theft (Chrome/Edge credentials) and persistent access via VBScript/UAC bypass.
Mitigation: Monitor for unusual scheduled tasks/registry changes and block malicious IPs (e.g., 47.238.184[.]9).
Source: BleepingComputer

SmarterMail Servers Vulnerable to RCE via Authentication Bypass

Over 6,000 SmarterMail servers exposed to CVE-2026-23760, allowing unauthenticated attackers to reset admin passwords and gain RCE. Exploits observed in automated attacks since January 21.
Impact: Full server compromise via admin account takeover.
Mitigation: Update to build 9511+ or set GRIST_SANDBOX_FLAVOR=gvisor.
Source: BleepingComputer

ShinyHunters Targets 100+ Organizations in SSO Phishing Campaign

ShinyHunters launched vishing attacks against SSO accounts (Okta, Microsoft) at companies like Atlassian, Moderna, and ZoomInfo. Phishing kits intercept MFA tokens via real-time browser manipulation.
Impact: Credential theft and potential SaaS environment breaches.
Mitigation: Enforce phishing-resistant MFA (FIDO2/passkeys) and monitor for anomalous API activity.
Source: SecurityWeek

GNU Telnetd Authentication Bypass Exploited in Wild (CVE-2026-24061)

CISA added CVE-2026-24061 to its KEV catalog after attackers exploited the GNU telnetd flaw to gain root access via crafted USER environment variables. Over 200,000 Telnet-exposed systems potentially vulnerable.
Impact: Remote root access via Telnet protocol manipulation.
Mitigation: Disable telnetd or upgrade GNU Inetutils beyond v2.7.
Source: SecurityWeek

Microsoft Office Zero-Day (CVE-2026-21509) Patched After Active Exploitation

Microsoft patched a security feature bypass in Office allowing attackers to evade OLE protections via malicious documents. Exploits likely limited to targeted attacks.
Impact: Local privilege escalation via COM/OLE control bypass.
Mitigation: Apply patches (e.g., Office 2019 v16.0.10417.20095) or registry edits to restrict COM compatibility.
Source: TheHackerNews

Chrome/Edge Extensions Steal ChatGPT Sessions via MAIN-World Scripts

16 malicious extensions (900+ downloads) injected scripts into chatgpt.com to exfiltrate session tokens and user data. Extensions abused MAIN-world execution to evade detection.
Impact: Unauthorized access to ChatGPT history and third-party services.
Mitigation: Remove suspicious extensions and audit token usage.
Source: SecurityWeek

SoundCloud Breach Exposes 29.8M Accounts via ShinyHunters

ShinyHunters leaked emails, usernames, and profile stats from SoundCloud after a December 2025 breach. Data used in extortion attempts via email flooding.
Source: BleepingComputer

US Charges 31 in ATM Jackpotting Scheme Using Ploutus Malware

Tren de Aragua gang members charged for deploying Ploutus malware to force ATMs to dispense cash. Attacks involved physical access to machines and hard drive replacement.
Source: BleepingComputer

Share this brief: https://svo.bz/FeZJ

If you want to support us, you can donate here: Donate