Daily Intel - threat intelligence visualization
Summary

In the last 24 hours, 6 notable items were detected (6 critical, 0 high, 0 moderate). Top highlights: DigiCert Hacked via Weaponized Screensaver File to Obtain EV Code Signing Certificates · CVE-2026-41571: Note Mark is an open-source note-taking application. In version 0.19.2, IsPasswordMatch in backend/db/models.go falls back to a hard-coded bcrypt("null") placeholder whenever a user has no stored password. OIDC-registered users are created · CVE-2026-42088: OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the o.

Signal Mix (last 24h)
Critical6
High0
Moderate0
Topics
General3
Vulnerability2
Malware1
Industries
Multiple6
Geography
Multiple6

Top Highlights

#1Topic: MalwareIndustry: MultipleGeo: Multiple
DigiCert Hacked via Weaponized Screensaver File to Obtain EV Code Signing Certificates
Score 95Conf 1Cyber Security News2026-05-04T17:50:41.000Z
Top Insight

A threat actor reportedly compromised DigiCert support staff with a weaponized screensaver file and used stolen EV code signing certificates to distribute Zhong Stealer malware.

Why it matters

Abused EV code signing certificates can undermine endpoint trust decisions and enable malware to evade reputation-based controls. Organizations should assume signed binaries are not inherently safe and validate certificate provenance, signer reputation, and behavioral telemetry.

Context
Severity: criticalExploit: actively_exploitedActor: unknown sophisticated threat actorTTP: social engineering via support chatTTP: phishing with malicious ZIP attachmentTTP: weaponized screensaver file executionTTP: malware delivery
IOCs
Recommended Actions
  • Hunt for Zhong Stealer indicators, suspicious signed binaries, and recently introduced executables signed with DigiCert EV code signing certificates.
  • Review endpoint telemetry for execution of .scr files, ZIP attachments from support/chat workflows, and anomalous child processes from browsers, chat tools, or archive utilities.
  • Increase scrutiny of newly observed signed binaries across Windows endpoints, especially those with low prevalence, unusual paths, or network connections to unknown infrastructure.
  • Validate Okta, Google Workspace, Microsoft 365, GitLab, AWS, and Slack logs for credential theft indicators, suspicious sessions, MFA fatigue, token use, and impossible travel.
#2Topic: GeneralIndustry: MultipleGeo: Multiple
CVE-2026-41571: Note Mark is an open-source note-taking application. In version 0.19.2, IsPasswordMatch in backend/db/models.go falls back to a hard-coded bcrypt("null") placeholder whenever a user has no stored password. OIDC-registered users are created
Score 95Conf 1CVE2026-05-04T17:42:32.428Z
Top Insight

CVE-2026-41571 allows unauthenticated takeover of OIDC-created Note Mark users by logging in with the password value "null" in version 0.19.2.

Why it matters

Crypto organizations commonly rely on OIDC/SSO for internal tools; bypassing it can expose notes, operational procedures, secrets, incident records, or customer-sensitive data. If Note Mark is internet-accessible, exploitation could be rapid and low-noise.

Context
Severity: criticalExploit: theoreticalTTP: Authentication bypassTTP: Hard-coded credential fallbackTTP: OIDC account takeoverTTP: Unauthenticated login
Recommended Actions
  • Upgrade Note Mark from version 0.19.2 to 0.19.3 or later immediately.
  • Review Note Mark authentication logs for internal login attempts using password value "null" or unusual sessions for OIDC-created users.
  • Invalidate active Note Mark sessions after patching and monitor for suspicious access to sensitive notes or assets.
References:
cve.org
#3Topic: GeneralIndustry: MultipleGeo: Multiple
CVE-2026-42088: OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0-rc3, the Script Runner widget allows users to execute Python and Ruby scripts directly from the o
Score 95Conf 1CVE2026-05-04T17:21:27.311Z
Top Insight

CVE-2026-42088 lets non-admin OpenC3 COSMOS script users bypass API permissions and perform administrative actions across shared Docker services.

Why it matters

Crypto organizations with embedded, hardware, or operational technology workflows could see secrets, logs, plugins, and system command configurations altered by a lower-privileged user. Administrative bypass in a command-and-control platform can create safety, integrity, and operational disruption risks.

Context
Severity: criticalExploit: theoreticalTTP: Privilege escalationTTP: Container network pivotingTTP: Abuse of script executionTTP: API permission bypass
Recommended Actions
  • Upgrade OpenC3 COSMOS to version 7.0.0-rc3 or later immediately.
  • Review Script Runner permissions and audit scripts run by non-admin users for direct Redis, bucket service, or internal container network access.
  • Monitor COSMOS Redis, bucket service, configuration, plugin, and settings changes for unauthorized modifications or suspicious script-originated activity.
References:
cve.org
#4Topic: VulnerabilityIndustry: MultipleGeo: Multiple
CVE-2026-42796: Arelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /rest/configure REST endpoint that accepts a plugins query parameter and forwards it to the plugin manager without authentication or authorization.
Score 95Conf 1CVE2026-05-04T17:19:43.020Z
Top Insight

CVE-2026-42796 allows unauthenticated remote code execution in Arelle before 2.39.10 via malicious plugin URLs passed to /rest/configure.

Why it matters

Crypto organizations may use XBRL or reporting tooling for finance, audit, compliance, or regulatory workflows. Compromise of Arelle could expose financial data, credentials, reports, or provide a foothold into internal systems.

Context
Severity: criticalExploit: theoreticalTTP: Unauthenticated remote code executionTTP: Malicious plugin loadingTTP: Remote Python code executionTTP: Abuse of REST configuration endpoint
Recommended Actions
  • Upgrade Arelle to version 2.39.10 or later immediately.
  • Identify any exposed Arelle webserver instances and review /rest/configure access logs for plugins parameters referencing external URLs or unexpected Python files.
  • Monitor Arelle hosts for new plugin files, unexpected outbound downloads, Python child activity, and suspicious process or network behavior.
References:
cve.org
#5Topic: VulnerabilityIndustry: MultipleGeo: Multiple
CVE-2026-42076: Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a command injection vulnerability in the _extractLLM() function allows attackers to execute arbitrary shell commands on the server. The function construct
Score 95Conf 1CVE2026-05-04T16:48:51.446Z
Top Insight

CVE-2026-42076 is a command injection vulnerability in Evolver before 1.69.3 that can allow arbitrary shell command execution via _extractLLM().

Why it matters

In a crypto environment, RCE in agent infrastructure can expose secrets, cloud credentials, source code, wallets, signing services, or internal systems. Agent runtimes often have broad integration access, making rapid inventory, patching, and compromise review important.

Context
Severity: criticalExploit: unknownTTP: Command injectionTTP: Remote code executionTTP: Unsafe shell command constructionTTP: Abuse of AI agent corpus parameter
Recommended Actions
  • Identify any Evolver deployments in agentic automation, servers, developer tooling, or CI/CD and check for versions before 1.69.3.
  • Upgrade Evolver to version 1.69.3 or later to remediate command injection in _extractLLM().
  • Review process, shell, EDR, and network telemetry for suspicious curl, execSync, shell metacharacter use, or unexpected child processes from Evolver runtimes.
References:
cve.org
#6Topic: GeneralIndustry: MultipleGeo: Multiple
CVE-2026-26956: vm2 is an open source vm/sandbox for Node.js. In version 3.10.4, vm2 is vulnerable to full sandbox escape with arbitrary code execution. Attacker code inside VM.run() obtains host process object and runs host commands with zero host coopera
Score 95Conf 1CVE2026-05-04T16:37:31.538Z
Top Insight

CVE-2026-26956 is a full vm2 sandbox escape in version 3.10.4 that allows attacker code to execute arbitrary host commands.

Why it matters

Crypto organizations may use Node.js sandboxes in automation, plugin systems, CI/CD, bots, or agentic workflows, where host compromise could expose secrets, source code, signing material, cloud credentials, or production access. Any service executing untrusted JavaScript through vm2 3.10.4 should be treated as high-risk until patched and reviewed.

Context
Severity: criticalExploit: poc_availableTTP: Sandbox escapeTTP: Arbitrary code executionTTP: Host process object accessTTP: Execution of host commands
Recommended Actions
  • Search codebases, lockfiles, containers, and runtime dependency inventories for vm2 version 3.10.4, especially services executing untrusted JavaScript.
  • Upgrade vm2 to version 3.10.5 or later and redeploy affected Node.js services and containers.
  • Review logs, EDR, process trees, and network telemetry for unexpected child processes, shell commands, or outbound connections from Node.js services using vm2.
References:
cve.org