Latest

6/recent/ticker-posts

Header Ads Widget

Carnival Breached 7.5M 🚢, DPRK IT Worker Tradecraft 🇰🇵 , FCC Bans Foreign Routers 📶

Have I Been Pwned flagged 7.5 million email addresses from Holland America Line's Mariner Society loyalty program. Carnival says a phishing attack ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 

TLDR

Together With Xbow

TLDR Information Security 2026-04-27

You can go to your dentist twice a year. Pentests don't work that way anymore (Sponsor)

AI-driven attackers don't wait between appointments. Automated recon, exploitation, and lateral movement run continuously, in parallel, and they don't need to rest.

Yet most security programs still rely on scheduled testing and manual validation. That's why Xbow says cybersecurity has entered The Chaos Phase

In their ungated brief, they explain what changed, what breaks first, and how leading teams are adapting. AI-powered hackers aren't waiting for your next scheduled pentest. They're acting now. 

Read the brief (PDF, ungated)

🔓

Attacks & Vulnerabilities

ShinyHunters claim they have cruise giant Carnival's booty as 7.5M emails surface (2 minute read)

Have I Been Pwned flagged 7.5 million email addresses from Holland America Line's Mariner Society loyalty program. ShinyHunters published the data after ransom talks failed, claiming to hold terabytes of corporate data. Carnival says a phishing attack affected a single user account, but the scope of the breach remains unclear. Exposed data includes names, birth dates, and membership details.
Bad Connection: Uncovering Global Telecom Exploitation by Covert Surveillance Actors (30 minute read)

Citizen Lab mapped live SS7 and Diameter attack telemetry to specific operator identifiers for the first time, exposing two long-running covert surveillance campaigns (STA1 and STA2) that exploited the global telecom interconnect ecosystem to track high-value targets across borders. STA1 rotated between 3G and 4G protocols using legitimate signaling identities from Tango Networks UK, 019Mobile Israel, and infrastructure spanning nine countries to evade firewalls, while STA2 deployed a SIMjacker zero-click binary SMS exploit linked to Swiss commercial surveillance vendor Fink Telecom Services, with over 15,700 tracking attempts dating back to October 2022. The findings expose systemic governance failures across the interconnect ecosystem, in which legacy peer-to-peer trust models, weak IPX screening, and unregulated Global Title leasing enable CSVs to operate as "ghost operators" within mobile networks for years without detection.
Critical bug in CrowdStrike LogScale let attackers access files (3 minute read)

CrowdStrike has patched CVE-2026-40050, a critical unauthenticated path-traversal flaw in a LogScale self-hosted cluster API endpoint that allows remote attackers to read arbitrary files from the server's filesystem, potentially exposing configuration files, credentials, and internal data. Discovered through internal product testing with no observed exploitation, the bug spares Next-Gen SIEM customers and was mitigated for SaaS users on April 7, via network-layer controls applied across all clusters. Self-hosted LogScale operators must upgrade to the patched version immediately, since a compromise of a log management platform at the heart of SOC operations could allow attackers to disable alerts, suppress logs, and pivot laterally undetected.
🧠

Strategies & Tactics

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite (21 minute read)

UNC6692 ran a staged intrusion starting with heavy email spam and Microsoft Teams phishing, luring victims into installing a fake “Mailbox Repair Utility” delivered via a malicious Edge-only landing page that harvests credentials and drops AutoHotKey-based loaders. The operation installed the SNOWBELT browser extension plus SNOWGLAZE and SNOWBASIN Python components to maintain a WebSocket tunnel, run a local bindshell, move laterally with PsExec and RDP, and exfiltrate data through S3- and Heroku-hosted C2 infrastructure, all mapped to concrete IOCs and ATT&CK techniques for defenders.
State of Vibe-Coded Security (4 minute read)

4,783 AI-assisted apps were scanned, turning up 727 critical and over 5,000 high-severity issues, with 7% of Lovable and Bolt apps exposing Supabase databases publicly, while a YC control group had none. Several production systems leaked real data: therapy billing and schedules, full booking histories with chat logs, patient records via simple ID changes, CRM tables via public anon keys, and college enrollment data. Most criticals came from Supabase RLS left disabled, followed by client-exposed API keys, IDOR, unauthenticated OpenAPI endpoints, and AI-written code that referenced nonexistent security checks.
Inside the computers of DPRK IT workers (8 minute read)

NoxHunt shifted from ZachXBT's April 8 investigation into the luckyguys[.]site payment hub to retrieve infostealer logs from two DPRK IT worker devices via STEALINT, revealing the tradecraft behind the fraudulent freelance ecosystem. Both operators ("SuperDev" and "DevWisdom") used Korean Windows installs behind Astrill VPN with US/Japan exit nodes, used DeskIn and AnyDesk for remote work, maintained multiple fake GitHub portfolios with many repos across languages, and used AI interview copilots like jobright.ai and ntro.io while targeting Middle East clients, including fake Saudi gym brands linked to the Memvera/Shijazi88 persona. Defenders should look for Astrill VPN ranges, DeskIn/AnyDesk pairings, recent fake GitHub accounts with diverse languages and recycled repos, and virtual number providers on freelance platform signups.
🧑‍💻

Launches & Tools

33% of enterprise employees use AI assistants daily. Most organizations have no idea what they're doing (Sponsor)

83% of orgs don't have visibility into what their agents are doing. Find out how to close the gap with the Secure AI Adoption Kit by Knowbe4 - a collection of practical whitepapers, webinars, frameworks and playbooks covering AI defense agents (AIDA), AI training programs, AI-powered risk management, and more. Download the full kit, free ↗️
RedAI (GitHub Repo)

RedAI is a terminal workbench for AI-driven vulnerability discovery and live validation, surpassing static scanning by spinning up validator agents inside the target to confirm or disprove findings. Scanner agents (Claude Code or Codex) triage source code into candidates, then validator agents execute PoC scripts, hit endpoints, click UI, and capture evidence like screenshots, transcripts, and logs. Built on Bun, it includes Chrome and iOS Simulator environments. RedAI treats validation targets as plugins, allowing extension to Linux VMs, Android emulators, Kubernetes, or embedded devices, with verdicts and full artifacts in Markdown, HTML, and JSON reports.
Trailmark (GitHub Repo)

Trail of Bits' Trailmark parses source code into queryable graphs of functions, classes, calls, and semantic annotations, using tree-sitter for AST parsing and rustworkx for graph traversal. It supports 21 languages, including Python, Rust, Go, Solidity, Cairo, and Circom, and exposes a QueryEngine API with security-focused operations. Trailmark also augments graphs with SARIF and weAudit findings, and supports structural diffing between git refs to surface attack-surface changes across PRs.
Copperhelm (Product Launch)

Copperhelm is a cloud security platform that enables autonomous agents to monitor cloud workloads, investigate suspicious behavior, and apply targeted controls, such as WAF rules, in real time for large enterprises.
🎁

Miscellaneous

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software (4 minute read)

Fast16 is a Lua-based malware from 2005 that predates Stuxnet by five years. It targets high-precision calculation software like LS-DYNA, PKPM, and MOHID to inject systematic errors into engineering and physics simulations. The malware spreads through weak credentials and avoids systems with antivirus software installed. Forensic links tie it to NSA tools leaked by The Shadow Brokers.
Bitwarden Statement on Checkmarx Supply Chain Incident (8 minute read)

A malicious @bitwarden/cli@2026.4.0 npm package, downloaded by 334 users between 5:57 and 7:30 PM ET on April 22, was contained within 93 minutes of the broader Checkmarx supply chain compromise, which propagated through a malicious Checkmarx VSCode extension on a Bitwarden engineer's workstation rather than a CI/CD dependency. The package's preinstall script triggered credential theft during installation alone, lifting tokens, SSH keys, and environment secrets, though analyses confirmed that vault data remained out of scope. Bitwarden issued a CVE, deprecated the package, shipped 2026.4.1, and directed impacted users to rotate exposed secrets, audit GitHub workflows and CI credentials, and clear npm caches with install scripts disabled during cleanup.
GPT-5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities (2 minute read)

OpenAI has announced a new Bio bug bounty program for its GPT-5.5 model. The program is specifically a challenge to find a universal jailbreak that can lead the model to answer the 5 challenge problems that OpenAI prepared. The challenge is by invitation or application only and only applies to the model running in Codex Desktop.

Quick Links

73% of consumers have abandoned checkout due to payment security concerns: Sift Report (Sponsor)

As fraud shifts upstream, confidence at checkout weakens and conversion drops. See what's driving it.
White House Accuses China of Industrial-Scale Theft of AI Technology (2 minute read)

The White House released a memo accusing “foreign entities, principally based in China” of stealing AI models via distillation.
XChat launches standalone iOS app as security concerns remain (3 minute read)

X shipped a dedicated XChat iOS app marketed as end-to-end encrypted, but Mysk's traffic analysis found that all Juicebox protocol "realms" hosted under x.com domains lacked certificate pinning, allowing X to reconstruct private keys protected only by a four-digit PIN.
FAQs on Recent Updates to FCC Covered List Regarding Routers Produced in Foreign Countries (5 minute read)

The FCC added all foreign-produced consumer routers (including ISP residential gateways and LTE/5G CPE) to its Covered List on March 23 following a White House interagency National Security Determination, blocking new equipment authorizations and US import or sale unless DoW or DHS grants a Conditional Approval while leaving previously authorized devices and consumer use untouched.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? 📰

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

Want to work at TLDR? 💼

Apply here, create your own role or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! TLDR is one of Inc.'s Best Bootstrapped businesses of 2025.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


Manage your subscriptions to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please unsubscribe.

Post a Comment

0 Comments