The Lyceum: Cybersecurity Daily — Mar 26, 2026
Photo: lyceumnews.com
Thursday, March 26, 2026
The Big Picture
The supply chain is still burning, and the fire is spreading room to room. TeamPCP — the criminal group behind the Trivy scanner compromise — just poisoned a popular AI gateway library on PyPI, confirming this isn't a one-off but a conveyor belt. Meanwhile, CISA's remediation deadline for two CVSS 9.8 flaws in Hikvision cameras and Rockwell industrial software expires today, a full-chain iPhone exploit kit is now public on GitHub, and a tax-season malvertising campaign is actively blinding endpoint security tools before robbing victims. It's a patch-or-perish morning.
What Just Dropped
- CVE-2026-21385 — Qualcomm display component (234 Android chipsets): patched via Android March 2026 security bulletin, high-severity memory corruption, actively exploited in limited, targeted attacks.
- CVE-2026-21262 — Microsoft SQL Server 2016+: patched (March 2026 Patch Tuesday), CVSS 8.8 Elevation of Privilege, publicly disclosed zero-day, no active exploitation confirmed.
- CVE-2026-26127 — Microsoft .NET 9.0/10.0: patched (March 2026 Patch Tuesday), CVSS 7.5 Denial of Service, publicly disclosed zero-day, no active exploitation confirmed.
Today's Stories
The TeamPCP Supply Chain Attack Just Hit a Popular AI Gateway
If you use LiteLLM — the Python library that lets developers talk to multiple large language models through a single API — two poisoned versions sat on the official PyPI repository until yesterday.
On March 24, versions 1.82.7 and 1.82.8 of LiteLLM were published to PyPI by attackers using credentials stolen during an earlier phase of the TeamPCP campaign, the same criminal operation that compromised the Trivy vulnerability scanner on March 19 and then pivoted into Checkmarx's CI/CD workflows. This wasn't a typosquatting trick with a similarly named package — this was the real project, hijacked. GoSecure's analysis traces the chain directly: stolen Trivy credentials enabled the Checkmarx compromise, and that compromise enabled the LiteLLM poisoning. One breach became the skeleton key for the next.
What changes if this pattern continues: every open-source dependency in your build pipeline becomes a potential propagation vector, not just a risk in isolation. TeamPCP is demonstrating that a single set of stolen CI/CD credentials can cascade across unrelated projects in days. PyPI has quarantined LiteLLM, but any environment that pulled those versions should be treated as fully compromised — secrets, environment variables, source code, all of it.
What to watch: if a fourth project surfaces with TeamPCP's credential-stealer payload this week, it confirms the group has automated the hop-and-poison cycle. The signal will be another popular open-source tool suddenly publishing an unexpected minor version bump with obfuscated code in its post-install hook.
Langflow's 20-Hour Exploit Window Gets an Official Stamp from CISA — Patch Deadline April 8
CISA added CVE-2026-33017 — a CVSS 9.3 remote code execution flaw in Langflow, the open-source platform for building AI agent workflows — to its Known Exploited Vulnerabilities catalog on March 25. Federal civilian agencies must patch by April 8.
The timeline is the story. Sysdig observed the first exploitation attempts within 20 hours of the advisory's March 17 publication, with no public proof-of-concept code available at the time. Attackers reverse-engineered working exploits directly from the patch diff — the same document your team reads to understand what changed. Per Rapid7's 2026 Global Threat Landscape Report, the median time from vulnerability publication to KEV inclusion has dropped to five days, while the median time for organizations to actually deploy patches sits at roughly 20 days. That's a 15-day window where defenders are exposed and attackers are already inside.
If your organization runs Langflow or any internet-exposed AI/ML tooling, patch now and remove public access until you do. If you miss the April 8 deadline, you become exactly the kind of straggler that threat actors scan for following federal deadlines.
DarkSword iPhone Exploit Kit Leaked on GitHub — Apple's Emergency Patch Out Now
A full-chain exploit kit for iOS 18 and earlier — dubbed DarkSword — was dumped publicly on GitHub yesterday. It chains six vulnerabilities, including three zero-days, to achieve complete device control: contacts, messages, call logs, keychain passwords (your saved app logins and WiFi credentials), all exfiltrated silently. iVerify and Google's Threat Analysis Group flagged it as repurposed state-grade spyware now going commercial. Apple released an emergency update to close the chain.
This matters beyond individual phones. Mobile devices are primary authentication factors for enterprise MFA and SSO. A compromised iPhone isn't just a personal privacy problem — it's a session-token harvesting opportunity that can unlock corporate accounts. FreeBuf's Chinese-language technical analysis confirms the kit's sophistication and notes its modular design makes adaptation to future iOS versions straightforward. (Source: FreeBuf — Chinese).
The failure scenario is slow adoption of the emergency update. Every week of delay gives attackers time to fork DarkSword's public code into commodity campaigns targeting the long tail of devices that never update. Watch app store analytics and MDM compliance dashboards — if your fleet's update rate is below 80% within two weeks, you have a measurable exposure window.
Two CVSS 9.8 Flaws in Hikvision Cameras and Rockwell Industrial Software — Your Patch Deadline Is Today
Today — March 26 — is the CISA-mandated remediation deadline for two CVSS 9.8 vulnerabilities in Hikvision IP cameras and Rockwell Automation ThinManager, both confirmed exploited in the wild.
The Rockwell flaw involves insufficient credential protection in Studio 5000 Logix Designer. An attacker with network access to a Logix controller — the device running physical industrial processes — can connect directly without proper authorization. The Hikvision vulnerability is equally severe and affects a camera platform deployed in countless businesses, hospitals, and government facilities as physical security infrastructure.
Industrial control system vulnerabilities don't just threaten data — they threaten physical equipment, manufacturing lines, and building systems. Both patches have been available for weeks. With the federal deadline arriving today, expect proof-of-concept exploits to surface publicly within days, as attackers routinely use KEV deadlines as a shopping list for where to start scanning. If you haven't patched, you're about to become the path of least resistance.
⚡ What Most People Missed
- Your security camera is now a shell with no patch. A command injection vulnerability (CVE-2025-60787) in motionEye — the open-source camera management platform popular on Raspberry Pis and home NAS devices — hit Exploit-DB today with a working exploit and a Metasploit module. No official fix exists. If your motionEye instance is internet-facing, put it behind a VPN before lunch.
- A self-hosted email server's password reset is trivially hijackable. A host header poisoning flaw in mailcow (version 2025-01a) lets an attacker redirect password-reset links to a server they control, silently capturing valid reset tokens. If you run mailcow, check your reverse proxy's Host header enforcement immediately.
- The WordPress backup-plugin exploit pipeline is industrializing. CVE-2026-1357 in WPvivid Backup now has 20+ public PoCs on GitHub, including a scanner hitting 3,000–4,000 domains per second. Separately, a working RCE exploit for the Backup Migration plugin (v1.3.7) also landed on Exploit-DB. Two different backup plugins, two public exploits, one message: update everything.
- Node.js shipped emergency patches for seven vulnerabilities, including an unauthenticated remote crash via malformed TLS handshake (CVE-2026-21637). If you run internet-facing Node servers, this is a fix-today item.
- A researcher reported a bug exposing children's data. The company sent lawyers. The blog post is sitting at 900+ upvotes on Hacker News. The legal threats designed to prevent disclosure produced the most detailed public disclosure possible. If your organization's reflex to a vulnerability report involves counsel before engineers, you're one angry letter away from never hearing about your next critical bug.
From the Foreign Press
Tycoon2FA Phishing Platform Resurfaces After Law Enforcement Takedown
Xakep.ru reports that Tycoon2FA — the phishing-as-a-service platform specifically designed to bypass multi-factor authentication on Microsoft 365 and Google accounts — has rebuilt its infrastructure and resumed operations after a recent law enforcement disruption. The platform uses adversary-in-the-middle techniques to intercept session tokens in real time, rendering standard MFA ineffective. Its return means the MFA-bypass phishing market has no meaningful downtime, and defenders should expect a fresh wave of token-theft campaigns within days. (Source: Xakep.ru — Russian). No English-language coverage confirmed at time of publication.
Intoxalock Attack Disables Vehicles Equipped with Alcohol Interlock Devices
Xakep.ru reports that a cyberattack on Intoxalock — a major U.S. provider of ignition interlock devices (court-ordered breathalyzer systems that prevent a car from starting if the driver has been drinking) — left vehicles unable to start. The attack disrupted the backend systems that manage device calibration and compliance reporting, effectively stranding drivers whose cars require a functioning interlock to operate. This is a vivid example of how attacking a SaaS backend can produce immediate physical-world consequences for thousands of people. (Source: Xakep.ru — Russian). No English-language coverage confirmed at time of publication.
APT28 Exploiting CVE-2026-21509 Against Ukraine and EU Countries
CERT-UA Advisory #19542 documents UAC-0001 (APT28, Russia's GRU-linked threat group) conducting active cyberattacks against Ukraine and EU member states using an exploit for CVE-2026-21509. The advisory provides indicators of compromise and tactical details for defenders in affected sectors. This is a live, state-sponsored campaign with cross-border reach. (Source: CERT-UA — Ukrainian). No English-language coverage confirmed at time of publication.
- situational gdelt_conflict Fight @ Kyiv, Kyyiv, Misto, Ukraine — Turkey vs Oil Tanker (Goldstein -10.0) https://www.channelstv.com/2026/03/26/turkey-operated-oil-tanker-attacked-in-black-
- situational gdelt_conflict Reduce relations @ Kyiv, Kyyiv, Misto, Ukraine — Hungary vs Ukraine (Goldstein -5.6) https://www.timesofearth.com/2026/03/26/hungary-will-cut-natural-gas-suppli
- situational gdelt_conflict Reject @ Druzhba, Odes'ka Oblast, Ukraine — Unknown vs Hungary (Goldstein -5.0) https://hungarytoday.hu/no-oil-no-gas-hungary-hits-back-at-ukraine-over-druzhba-
📅 What to Watch
- If a fourth open-source project surfaces with TeamPCP's credential-stealer payload, it confirms the group has automated supply-chain hopping — and every GitHub Action in your pipeline becomes suspect until individually audited.
- If public PoC exploits for the Hikvision or Rockwell CVSS 9.8 flaws appear this week, mass exploitation of unpatched cameras and industrial controllers will follow within days — the federal deadline effectively tells attackers exactly where the soft targets are.
- If Tycoon2FA's resumed operations produce a measurable spike in MFA-bypass phishing, it validates that law enforcement takedowns of phishing platforms now buy weeks of disruption, not months.
- If adoption of the emergency iOS update stays below 70% after two weeks, the public DarkSword exploit kit will be forked into commodity campaigns targeting the update-resistant long tail — watch MDM compliance rates as your leading indicator.
The Closer
A criminal group using stolen keys to poison the tools that check for poison, a tax-season Google Ad that blinds your antivirus before it robs you, and a breathalyzer vendor hack that turned court-ordered sobriety devices into bricks.
Somewhere, a security researcher is drafting a responsible disclosure email and their cursor is hovering over the send button, wondering if they'll get a thank-you note or a cease-and-desist.
Stay patched, stay skeptical.
If someone you know runs WordPress, Node.js, or an iPhone that hasn't been updated this week — forward this their way.