Cybersecurity Weekly Briefing, 11-17 April

April 17, 2026

Microsoft patches 165 vulnerabilities, including an actively exploited SharePoint 0-day

Microsoft has released its Patch Tuesday update, addressing 165 vulnerabilities – one of the largest monthly releases in terms of CVE count. Eight flaws are rated critical, two moderate and the rest important. Of particular note is the 0-day CVE-2026-32201 (CVSSv3 6.5 according to the vendor), a spoofing vulnerability in Microsoft SharePoint Server, which is already being actively exploited.

CVE-2026-33825 (CVSSv3 7.8 according to the vendor) is also patched; this is a privilege escalation in Microsoft Defender previously disclosed publicly under the alias BlueHammer. CVE-2026-33827 (CVSSv3 8.1 according to the vendor) affects the Windows TCP/IP stack and allows remote code execution without authentication, with the potential to propagate in environments where IPv6 and IPsec are enabled. CVE-2026-33824 (CVSSv3 9.8 according to the vendor) is a critical RCE vulnerability in the Windows IKE service, exploitable remotely.

Microsoft considers that 19 of the published vulnerabilities are more likely to be exploited in the future.

More info

Multi-stage campaign targeting critical sectors in the Middle East reveals tactics consistent with MuddyWater

Oasis Security analysed a multi-stage campaign cautiously attributed to an actor employing tactics consistent with MuddyWater, which combined mass reconnaissance of over 12,000 exposed systems with the exploitation of at least five recent CVEs, brute-force attacks against OWA, and a modular C2 infrastructure with Python and Go controllers capable of communicating via TCP, UDP and HTTP with AES encryption in CTR mode.

The operation evolved from automated scanning towards targeted intrusions against critical sectors in the Middle East, particularly aviation, energy and public bodies, and culminated in the confirmed exfiltration of sensitive data such as passports, payslips, credit cards and corporate documentation.

The most significant technical feature is the integration of several phases into a single operational chain, ranging from the identification of vulnerable surfaces and credential abuse to staging and information theft, supported by new C2 controllers with communication patterns that the authors consider to be consistent with those previously observed in MuddyWater campaigns.

More info

A DDoS botnet reaches 13.5 million nodes and enables attacks of over 2 Tbps

A report by Qrator Labs indicates that the largest known DDoS botnet has grown to 13.5 million devices, a tenfold increase year-on-year, enabling attacks of up to 2.065 Tbps and 1 billion packets per second.

The infected devices are mainly concentrated in the US (16.0%), Brazil (13.6%) and India (6.5%), making geographical blocking difficult.

More info

APT41 deploys an undetectable ELF backdoor to steal credentials in Linux cloud environments

Breakglass Intelligence has identified an APT41 campaign targeting Linux cloud workloads using a statically linked x86-64 ELF backdoor – which has not been detected on VirusTotal – that utilises SMTP (port 25) as a C2 channel to evade mass scans. The implant extracts credentials and metadata from AWS, GCP, Azure and Alibaba Cloud by exploiting metadata services.

The operation incorporates typosquatted domains mimicking Alibaba Cloud services and the Qianxin brand, registered in bulk in January 2026, and a C2 server that only responds to specific patterns from the malware.

More info

Android banking Trojan affects 21 countries

Infoblox has published a report establishing, for the first time, a confirmed link between a fraud ring based on forced labour in Southeast Asia and an Android banking Trojan used in active campaigns across at least 21 countries.

The investigation, carried out in conjunction with the Vietnamese NGO Chong Lua Dao, links the malware operation to the K99 Triumph City complex in Sihanoukville, Cambodia, where trafficked individuals are forced to participate in the distribution and operation of the fraud.

The malware spreads through the continuous registration of fake domains that mimic legitimate services and banking institutions to trick users into installing malicious Android apps from outside official app stores. Once installed, the trojan allows the interception of SMS messages, bypassing biometric controls, overlaying fake screens on banking apps and manipulating sessions in real time, facilitating the theft of funds. The infrastructure is described as malware-as-a-service, with centralised development and control and affiliates responsible for recruiting victims.

Victims have been identified in Asia, Europe (including Spain) and Latin America, demonstrating an ability to adapt to local banks and languages.

More info