The Lyceum: Cybersecurity Daily — Mar 16, 2026
Photo: lyceumnews.com
Monday, March 16, 2026
The Big Picture
This weekend, attackers proved — again — that the tools your team trusts most are the ones most worth poisoning. A supply chain campaign called GlassWorm figured out how to slip malware into VSCode extensions after they pass security review, Microsoft unmasked a threat group serving signed trojans through Google search results for enterprise VPN clients, and INTERPOL dismantled over 45,000 malicious servers in a sweep that netted 94 arrests. The theme: the infrastructure you rely on to build, connect, and defend is the infrastructure under attack.
Today's Stories
GlassWorm Weaponizes Auto-Updates — 72 Malicious VSCode Extensions Found in Open VSX
If your developers use VSCode or any editor pulling from the Open VSX registry — the open-source alternative to Microsoft's extension marketplace — read this before Monday standup.
Security firm Socket disclosed Friday that the GlassWorm supply chain campaign has escalated significantly. Instead of embedding malicious code directly in new extension listings, the threat actor is now abusing extensionPack and extensionDependencies fields to turn clean-looking extensions into transitive malware delivery vehicles through later updates. You install something that passes review. A future auto-update quietly makes it dangerous. Your tooling approved it. Your team trusted it. The payload arrived later.
Socket identified at least 72 additional malicious Open VSX extensions since January 31, mimicking popular developer utilities — linters, formatters, AI coding helpers. The attack surface is every developer workstation with auto-updates enabled, which is most of them by default.
What to do: Audit installed extensions, disable auto-updates for unvetted packages, and watch for Socket's IOC list to hit threat feeds this week. Treat Open VSX with the same skepticism you'd give a random npm package.
Microsoft Unmasks Storm-2561 — Poisoning Search Results to Steal VPN Credentials
Here's the scenario that should keep IT managers up at night: an employee Googles their VPN client, clicks a legitimate-looking result, and downloads a digitally signed trojan that hands over the credentials your entire remote workforce uses to get in.
Microsoft Threat Intelligence says Storm-2561 has been running this play since mid-January 2026, redirecting users searching for enterprise software to attacker-controlled sites hosting signed trojans disguised as trusted VPN clients. The targets are specific: users searching for software from SonicWall, Hanwha Vision, and Pulse Secure (now Ivanti Secure) — all enterprise network security tools, meaning the campaign is hunting credentials belonging to people with privileged network access.
The word "digitally signed" matters. Most endpoint security tools let properly signed executables run without raising alarms. Storm-2561 has essentially figured out how to walk past the front door wearing a name badge.
What to do: Block execution of software installed outside approved channels. Brief helpdesk staff to stop sending users to Google for VPN reinstalls. Watch Microsoft's threat intelligence blog for updated IOCs if targeting expands to other vendor names.
INTERPOL's Operation Synergia III: 94 Arrests, 45,000 Malicious Servers Seized
Law enforcement just scored a major operational win. Operation Synergia III, an INTERPOL-coordinated multi-country effort, disrupted over 45,000 malicious IP addresses and servers tied to phishing, malware distribution, and ransomware infrastructure, resulting in 94 arrests across multiple jurisdictions.
Takedowns at this scale raise attacker costs and create short-term windows of reduced malicious capacity — command-and-control channels go dark, hosting infrastructure vanishes, and active campaigns stall. But history teaches restraint: motivated actors regroup, migrate services, and reuse stolen tooling within weeks.
What to do: Treat this as a tactical window, not a strategic victory. If you're a threat intel consumer, watch for follow-up disclosures identifying specific marketplaces, hosting providers, or botnet infrastructure that went offline — that intel can sharpen your detection rules and hunt priorities.
Poland's Nuclear Research Centre Blocked a Cyberattack Before It Did Damage
Not every cyber incident ends in a ransom note. Poland's National Centre for Nuclear Research (NCBJ) — the country's primary nuclear research institution, home to its only research reactor — says hackers targeted its IT infrastructure but the attack was detected and blocked before causing impact.
The targeting itself is the story. Since Russia's expanded aggression in Eastern Europe, research institutions affiliated with NATO member states have seen a marked increase in intrusion attempts, particularly those with nuclear, energy, or defense connections. Some reporting cites logs aligning with Iran-linked infrastructure, though attribution hasn't been publicly confirmed. Failed intrusions like this are reconnaissance: adversaries mapping the perimeter of European critical infrastructure, testing response times and detection capabilities.
What to do: Watch for follow-up from Poland's CERT Polska. If you operate in European scientific or energy research, treat this as a signal to review detection coverage on your perimeter — someone is testing doors.
⚡ What Most People Missed
Commented-out code can jailbreak your AI coding assistant. A new paper called "Comment Traps" shows that dead code sitting in comments can steer AI assistants into writing vulnerable logic — boosting the chance of fresh vulnerabilities by over 50% in their experiments across multiple models. Telling the model to ignore comments only partially helped. If your repos are full of legacy examples and commented-out experiments, your AI helpers may be resurrecting insecure patterns.
FileZen's CISA patch deadline is March 17, 2026. CVE-2026-25108, an OS command injection flaw in Soliton Systems' FileZen secure file transfer appliance, has confirmed active exploitation and a CISA remediation deadline of March 17, 2026. FileZen's Japan-heavy distribution footprint has kept this off most Western radar, but if you acquired one through a vendor relationship, you might not even know you have it.
An AI found a CVSS 9.8 bug in a Microsoft product. Buried in last week's Patch Tuesday: CVE-2026-21536 was discovered not by a human but by XBOW, an autonomous AI penetration-testing agent. Microsoft already mitigated it server-side, but the precedent — machines autonomously finding critical-severity flaws — changes the timeline for both offense and defense.
Trojanized FileZilla installers are dropping RATs on ops machines. Attackers are distributing backdoored copies of the popular FTP client that install the real application to avoid suspicion while quietly loading a multi-stage Remote Access Trojan. Sysadmins and developers — people with access to sensitive servers — are the target profile.
Two unprivileged-to-root AppArmor flaws affect Debian and Ubuntu. Newly disclosed TOCTOU race conditions in AppArmor — the security module designed to confine programs — let local attackers escape confinement and gain root. Kernel and AppArmor updates are available; prioritize them if you've had any recent unauthorized access events.
📅 What to Watch
- If the Fortra file transfer CVE gets a public proof-of-concept this week, expect exploitation to move fast — Cl0p used the last Fortra zero-day to hit 100+ organizations within days, and the playbook is already written.
- If Storm-2561 expands its VPN impersonation to Cisco, Palo Alto, or Fortinet installers, monitoring and EDR allowlists will be insufficient at scale; expect defenders to need new signed-binary controls and enterprise software allowlisting policies quickly.
- If Socket or another firm confirms GlassWorm's
extensionPackvector crossing from Open VSX into Microsoft's own VS Marketplace, every developer using VS Code auto-updates is directly in scope — a much larger blast radius for supply-chain poisoning. - If Poland's CERT Polska publicly attributes the NCBJ probe to a state actor, it becomes a diplomatic signal, not just a security incident — expect allied governments to coordinate disclosures and potential sanctions steps.
- If the Payload ransomware group begins leaking Royal Bahrain Hospital data, sensitive medical and identity records leaking from a single hospital can seed international fraud rings and cross-border identity-theft chains.
The Closer
A malware campaign that waits until you trust it to betray you, a VPN trojan wearing a digital signature like a borrowed suit, and over 45,000 criminal servers blinking off like a city losing power. Meanwhile, an AI found a 9.8-severity Microsoft bug before any human did, and hardware researchers continue to find unexpected attack surfaces on consumer devices. Stay sharp, stay patched, stay skeptical of anything that auto-updates itself.
If someone you know is still Googling their VPN downloads, forward this before they click.