The Indicator — Weekly Threat Intelligence

Weekly Threat Intel
April 3–10, 2026

Published April 10, 2026 | Based on 43 IOC reports | TLP: CLEAR
43 Reports analyzed
2,900+ IOCs extracted
4 Nation-state actors
3 Ransomware groups
8+ Infostealer families
Key Takeaways for Security Professionals
  • Developer workstations are primary targets. Three campaigns this week weaponized IDEs, package registries, and AI tooling — treat developer environments with production-grade security rigor.
  • Patch edge devices immediately. Storm-1175 achieved sub-24-hour dwell time from initial access to Medusa ransomware deployment using zero-day exploits in BeyondTrust, SmarterMail, and GoAnywhere.
  • EDR alone is insufficient. Qilin’s custom loader disables 300+ EDR drivers via DLL sideloading — layer kernel-level protections and behavioral analytics alongside endpoint agents.
  • Audit AI infrastructure exposure. ComfyUI servers, university AI endpoints, and ChatGPT browser extensions were all exploited — inventory and harden all AI-facing services.
  • ClickFix is cross-platform now. Social engineering via fake CAPTCHAs has expanded from Windows to macOS (Infiniti Stealer) — update user awareness training accordingly.
  • Vet VS Code extensions rigorously. GlassWorm used a single trojanized OpenVSX extension to infect six IDEs simultaneously via native Zig binaries that bypass the JavaScript sandbox.
  • Monitor for DPRK synthetic identities. North Korean operatives are using AI-generated photos and fake credentials to infiltrate dev teams at up to $300K/year — strengthen hiring verification processes.
This week’s threat landscape was dominated by the weaponization of developer trust — from fake Claude Code repositories delivering Vidar stealer, to a trojanized VS Code extension infecting six IDEs simultaneously, to a malicious PyPI package that stole an entire Claude system prompt and hijacked a university’s AI infrastructure. Meanwhile, Storm-1175 continued burning through zero-day vulnerabilities to deploy Medusa ransomware at unprecedented speed, and Pawn Storm’s PRISMEX campaign revealed an intensifying Russian focus on NATO logistics supply chains.
01 — TOP STORY

Developer Trust Under Siege: Claude Code, GlassWorm, and hermes-px

Three distinct campaigns this week exploited developer tooling and AI infrastructure as attack vectors — each targeting a different link in the software supply chain.

AI Lure

Claude Code Leak Weaponized with Vidar & GhostSocks

After Anthropic accidentally exposed Claude Code’s full source via an npm source map on March 31, threat actors moved within hours. A GitHub repository titled “Leaked Claude Code” appeared near the top of search results, offering a Rust-based dropper (ClaudeCode_x64.exe) disguised as the leaked source. On execution, the dropper delivers Vidar v18.7 (infostealer) and GhostSocks (SOCKS5 proxy malware that converts victim machines into residential proxy infrastructure). The campaign was particularly effective because it exploited legitimate developer curiosity around a real, newsworthy event.

67 IOCs · Hashes, C2 domains, dropper artifacts
IDE Supply Chain

GlassWorm: Zig Dropper Infects Six IDEs at Once

Aikido Security discovered a trojanized OpenVSX extension (code-wakatime-activity-tracker) impersonating the legitimate WakaTime tool. The extension bundles Zig-compiled native binaries (win.node / mac.node) that execute outside the JavaScript sandbox with full OS-level access. The dropper scans the system for six IDE installations — VS Code, VS Code Insiders, Cursor, Windsurf, VSCodium, and Positron — and silently force-installs a secondary malicious extension into all of them. The second-stage implant uses blockchain-based C2 with geofencing to deploy a persistent RAT.

9 IOCs · Extension IDs, Zig binaries, C2 endpoints
AI Infrastructure

hermes-px: PyPI Package Hijacks University AI Endpoint

JFrog researchers uncovered hermes-px, a malicious PyPI package marketed as a “Secure AI Inference Proxy” that routes requests through Tor. In reality, it hijacks a Tunisian university’s private AI endpoint, bundles a stolen 246K-character Claude system prompt (bulk-renamed to “AXIOM-1” by “EGen Labs”), and exfiltrates every user prompt to a Supabase database — bypassing the very anonymity it promises. The package was unusually well-crafted, with polished documentation designed to avoid suspicion. All four versions were uploaded within a 46-minute window on April 3.

15 IOCs · Package versions, Supabase endpoints, hijacked infrastructure

Why it matters: These three campaigns collectively demonstrate that developer tooling — IDEs, package registries, AI inference endpoints — has become a primary attack surface. Each exploited a different trust relationship: curiosity about leaked source code, trust in extension marketplaces, and trust in open-source AI tooling. Defenders should treat developer workstation security with the same rigor applied to production infrastructure.

02 — NATION-STATE ACTIVITY

Four Fronts: Russia, DPRK, South Asia, and China-Nexus

State-aligned threat activity this week spanned espionage, sabotage, financial theft, and hack-for-hire operations — with a notable escalation in Russian targeting of NATO logistics infrastructure.

Russia — APT28 / Pawn Storm

PRISMEX Campaign Targets Ukraine & NATO Logistics

Trend Micro documented an intensifying Pawn Storm (APT28) campaign deploying the PRISMEX malware suite against Ukrainian defense bodies, NATO logistics hubs, and defense supply chains across Poland, Romania, Slovenia, Turkey, Slovakia, and the Czech Republic. PRISMEX exploits CVE-2026-21509 and CVE-2026-21513 to deliver payloads via malicious LNK files without user warnings, combining steganography, COM hijacking, and cloud service abuse for C2. Domain registration for WebDAV C2 servers began two weeks before public disclosure — indicating possible zero-day exploitation.

25 IOCs · LNK files, WebDAV servers, PRISMEX components
North Korea — DPRK IT Workers

Synthetic Identities & Ottercookie Infrastructure

Two reports this week expanded the picture of DPRK cyber operations. Group-IB exposed a pipeline for creating synthetic developer identities using AI-generated photos, fake passports, and automated LinkedIn/email accounts — enabling North Korean operatives to infiltrate Western companies as remote developers earning up to $300K annually. Separately, Walmart Global Tech mapped active Ottercookie infrastructure — a NodeJS-based stealer and backdoor targeting developers through fake job interview scenarios.

144 IOCs · Synthetic identity artifacts, Ottercookie C2, infrastructure overlaps
South Asia — BITTER APT

Hack-for-Hire Operation Targets MENA Journalists

Lookout uncovered a hack-for-hire campaign linked to BITTER APT (suspected Indian government ties) targeting journalists, activists, and government officials across Bahrain, UAE, Saudi Arabia, Egypt, and the UK. The operation deploys ProSpy Android spyware masquerading as Signal, WhatsApp, and Zoom, while iPhone targets are social-engineered into surrendering Apple ID credentials for iCloud backup access. The campaign has been operational since at least 2022.

1,524 IOCs · Mobile malware, phishing domains, C2 infrastructure
China-Nexus — UAT-10362

LucidRook Lua Malware Targets Taiwanese NGOs

Cisco Talos identified UAT-10362 conducting spear-phishing campaigns against Taiwanese NGOs and universities with LucidRook, a sophisticated Lua-based stager that embeds a Lua interpreter and Rust-compiled libraries within a DLL. The companion dropper “LucidPawn” includes region-specific anti-analysis checks that only execute in Traditional Chinese language environments. C2 infrastructure abuses compromised FTP servers and OAST (Out-of-band Application Security Testing) services.

38 IOCs · LNK files, Lua payloads, FTP C2 servers
03 — RANSOMWARE & EXTORTION

Storm-1175 Burns Zero-Days; Qilin Kills 300+ EDR Drivers

Ransomware operations this week were notable for their speed and their investment in neutralizing endpoint defenses before encryption.

Actor / Campaign Initial Access Notable TTPs Severity
Storm-1175 / Medusa CVE-2026-1731 (BeyondTrust RCE), CVE-2026-23760 (SmarterMail 0day), CVE-2025-10035 (GoAnywhere 0day) Initial access to encryption in under 24 hours; PowerShell AV exclusion paths; Bandizip collection; Rclone exfiltration to attacker cloud Critical
Qilin Ransomware Various (most active RaaS group in recent months) Custom msimg32.dll loader via DLL sideloading; EDR killer disables 300+ drivers from nearly every vendor; unregisters monitoring callbacks before process termination Critical
Warlock Ransomware BYOVD (Bring Your Own Vulnerable Driver) Shares EDR-killing techniques with Qilin; kernel-level driver exploitation to disable security tooling High

Trend to watch: Microsoft’s report on Storm-1175 reveals the group has exploited more than a dozen CVEs since 2023 across Exchange, PaperCut, Ivanti, ConnectWise, TeamCity, SimpleHelp, CrushFTP, GoAnywhere, SmarterMail, and BeyondTrust — including at least three zero-days. Their sub-24-hour dwell time from initial access to ransomware deployment represents a significant compression of the attack timeline that leaves minimal window for defender response.

04 — INFOSTEALERS & CREDENTIAL THEFT

ClickFix Proliferates; New Stealers Target Every Platform

The infostealer ecosystem continued its rapid expansion this week, with ClickFix social engineering emerging as the dominant delivery mechanism across multiple independent campaigns.

Campaign

WordPress ClickFix: Vidar, Impure Stealer & VodkaStealer

Rapid7 documented a large-scale compromise of 250+ WordPress sites across 12 countries, including a U.S. Senate candidate’s official webpage. Fake Cloudflare CAPTCHA pages trick users into executing PowerShell, which downloads a “DoubleDonut” two-stage shellcode loader that injects into svchost.exe before deploying Vidar, the new Impure Stealer (.NET with custom TLV encoding), or VodkaStealer (C++). The campaign features 31+ language support and anti-analysis debugger traps.

114 IOCs · Compromised domains, loader hashes, C2 infrastructure
macOS

Infiniti Stealer: ClickFix Comes to macOS

Malwarebytes identified Infiniti Stealer, a new macOS-native infostealer using ClickFix social engineering to trick users into running a Terminal command. The payload is a Nuitka-compiled Python binary that harvests credentials, cookies, and cryptocurrency wallets. The appearance of ClickFix on macOS marks a significant expansion of the technique beyond its Windows origins.

9 IOCs
ClickFix + MaaS

Modular NodeJS RAT via gRPC over Tor

Netskope documented a new ClickFix campaign delivering a modular Windows RAT built on NodeJS that uses gRPC over Tor for C2 communication — an unusual protocol choice that makes traffic interception extremely difficult. The operation features a MaaS admin panel for managing cryptocurrency theft operations.

19 IOCs
Cross-Platform

Reddit TradingView Lures: Vidar & AMOS

Hexastrike identified a campaign using hijacked and newly created subreddits to distribute fake TradingView Premium builds. Windows targets receive Vidar; macOS targets get AMOS (Atomic macOS Stealer) — demonstrating continued threat actor investment in cross-platform credential theft. The campaign capitalizes on financial software brand trust.

29 IOCs
MaaS

SantaStealer & PureLog Stealer

Two new MaaS stealers surfaced this week. Rapid7 documented SantaStealer (formerly BluelineStealer), featuring modular in-memory execution and browser credential theft, being advertised on underground forums. Separately, Trend Micro analyzed PureLog Stealer, delivered entirely in-memory via encrypted fileless techniques disguised as legal copyright violation notices.

84 IOCs combined
Impersonation

Fake Avast Site Delivers Venom Stealer

Malwarebytes documented a fake Avast antivirus website that simulates a virus scan before tricking users into downloading Venom Stealer, which harvests credentials, session cookies, and cryptocurrency wallets and exfiltrates to a disguised C2 domain.

20 IOCs

ChatGPT Ad Blocker: Browser Extension as Exfiltration Channel

DomainTools identified a malicious Chrome extension named “ChatGPT Ad Blocker” that silently copies users’ ChatGPT conversation HTML and exfiltrates it to a Discord webhook. The extension targets the growing population of users who interact with AI assistants for sensitive business tasks — making conversation data an increasingly valuable theft target.

05 — INFRASTRUCTURE & BOTNETS

AI Servers Conscripted; Telecom Networks Infiltrated

AI Infrastructure

ComfyUI Servers: Cryptomining & Proxy Botnet

Censys discovered attackers exploiting unauthenticated ComfyUI AI image generation servers to deploy cryptominers and a Hysteria v2 proxy botnet. A Python scanner continuously sweeps cloud IP ranges, automatically installing exploitable custom nodes. Payloads include XMRig (Monero) and lolMiner (Conflux), with evasion via memfd_create fileless execution and process masquerading as kernel threads. A Flask-based C2 dashboard manages the operation. Out of 624 live instances scanned, 97 were successfully compromised in a single run — a 15.5% hit rate.

35 IOCs · Mining pools, C2 endpoints, rootkit hashes
Telecom

BPFDoor: 7 New Variants Target Global Telecom

Rapid7 Labs uncovered 7 new BPFDoor variants, including httpShell (HTTP tunneling with kernel-level packet filtering across IPv4/IPv6) and icmpShell (interactive sessions entirely over ICMP with dynamic PID-bound mutation). Both use stateless C2 routing that eliminates hardcoded C2 addresses. The ICMP relay functionality transforms infected systems into invisible network routers for lateral movement, masquerading as HPE ProLiant servers common in 4G/5G core systems. One variant uses NTP-over-SSL beaconing to blend with legitimate time-sync traffic.

22 IOCs · eBPF programs, C2 patterns, NTP domains
IoT

Masjesu: Stealthy IoT DDoS-for-Hire Botnet

Trellix analyzed Masjesu, a commercially operated IoT botnet offering DDoS-for-hire services. It targets multiple CPU architectures and exploits various router vulnerabilities to build its fleet, supporting both application-layer and transport-layer attacks with evasion capabilities designed to avoid honeypot detection.

45 IOCs

Note: The ComfyUI campaign is significant because it represents the first documented mass exploitation of AI inference infrastructure for botnet recruitment. As GPU-equipped servers proliferate for AI workloads, they present an attractive target: high-bandwidth, high-compute machines often deployed with minimal authentication.

06 — VULNERABILITIES & EXPLOITATION

React2Shell at Scale; Kubernetes Under Pressure

CVE / Threat Product Impact Status
CVE-2025-55182 Next.js (React Server Components) UAT-10608 exploited React2Shell to compromise 766+ hosts, deploying NEXUS Listener to harvest credentials, SSH keys, cloud tokens, and Kubernetes secrets at scale Active exploitation
CVE-2026-1731 BeyondTrust Remote Support / PRA Critical RCE used by Storm-1175 for initial access in Medusa ransomware operations Active exploitation
CVE-2026-21509 / CVE-2026-21513 Microsoft (LNK / security bypass) Chained by Pawn Storm to deliver PRISMEX malware without user warnings; domain registration pre-dated disclosure by 2 weeks Active exploitation
CVE-2026-23760 SmarterMail Zero-day exploited by Storm-1175 one week before public disclosure Patched
Kubernetes threats Various (service account tokens, RBAC) Unit 42 documented escalating attacks against Kubernetes environments, including React2Shell-based token theft and privilege escalation via misconfigured RBAC Ongoing

Trend to watch: The React2Shell exploitation campaign by UAT-10608 is notable for its automation. Using Shodan/Censys-style scanning to enumerate Next.js deployments, the group systematically harvested environment variables, SSH keys, Docker configs, and cloud provider credentials from 766 hosts — a fully industrialized credential harvesting pipeline that treats web applications as ore to be mined rather than targets to be selectively compromised.

07 — ALSO THIS WEEK

Additional Threats Worth Tracking

Russia

RGB-Team: CMoon Worm & DarkBuilder

Kaspersky published analysis connecting the pro-Ukrainian hacktivist group RGB-Team to the CMoon self-spreading worm and revealing its lineage through DarkBuilder, a malware builder that also produces WhiteSnake stealer samples. The shared codebase between CMoon and WhiteSnake reveals how a single builder framework can produce both worm and stealer payloads with identical obfuscation functions.

25 IOCs
Fileless

In-Memory Loader Drops ScreenConnect

Zscaler documented an attack chain using a fake Adobe Acrobat Reader download to deploy an in-memory loader that installs ConnectWise ScreenConnect (a legitimate RMM tool) via obfuscated VBScript and PowerShell, bypassing UAC. The abuse of legitimate remote access tools continues to blur the line between authorized administration and unauthorized access.

22 IOCs
Supply Chain

ClipBanker via Trojanized Proxifier

Kaspersky identified a trojanized Proxifier installer distributed via GitHub that initiates a fileless infection chain to deploy ClipBanker, which silently replaces cryptocurrency wallet addresses in the clipboard. The use of a popular legitimate networking tool as a trojan horse highlights the continued risk of downloading software from unofficial sources.

20 IOCs
Supply Chain

@velora-dex/sdk npm Package Compromised

SafeDep identified version 9.4.1 of @velora-dex/sdk compromised to deliver a Go-based RAT (minirat) targeting macOS systems via a base64-encoded payload — continuing the trend of npm packages as malware delivery vectors.

26 IOCs
Phishing

SaaS Notification Pipeline Weaponization

Cisco Talos documented how threat actors are abusing automated notification infrastructure of legitimate SaaS platforms like GitHub and Jira to deliver spam and phishing emails that bypass traditional email security filters. By triggering notifications from trusted services, phishing emails inherit the sender reputation and DKIM signatures of the legitimate platform.

15 IOCs
Forum Intel

XSS Forum C&C Domain Compilation

Security Boulevard published a compilation of malware C2 domains and associated MD5 hashes belonging to members of the XSS underground forum — providing defenders with a rich set of indicators for blocking known criminal infrastructure.

124 IOCs

Analyst Assessment: April 3–10 in Context

This week crystallized a trend that has been building throughout Q1 2026: the developer is the new perimeter. Three of the week’s most significant campaigns — the Claude Code lure, GlassWorm’s multi-IDE infection, and hermes-px’s AI proxy trojan — specifically targeted developer workstations and AI tooling. Combined with the ongoing DPRK synthetic identity infiltration of development teams, the message is clear: adversaries view the software development lifecycle not as a peripheral target but as a primary attack surface.

On the ransomware front, Storm-1175’s sub-24-hour dwell time from initial access to encryption represents a new operational tempo that most detection and response programs are not staffed to match. When combined with Qilin’s ability to neutralize 300+ EDR products before encryption, defenders face a shrinking window in which increasingly blind security tools must detect and respond to increasingly fast adversaries.

Finally, the exploitation of AI infrastructure as attack surface — ComfyUI servers conscripted into botnets, university AI endpoints hijacked via PyPI, ChatGPT conversations exfiltrated via browser extensions — signals that the AI tooling boom has outpaced the security measures protecting it. Organizations deploying AI inference infrastructure should audit authentication, network exposure, and supply chain dependencies with the same urgency they apply to traditional production systems.

Sources

  1. Trend MicroWeaponizing Trust: Claude Code Lures and GitHub Release Payloads
  2. Zscaler ThreatLabzAnthropic Claude Code Leak Analysis
  3. Aikido SecurityGlassWorm: Zig Dropper Infects Every IDE on Your Machine
  4. JFrog Security Researchhermes-px: The “Privacy” AI Proxy That Steals Your Prompts
  5. Trend MicroPawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure
  6. Group-IBDPRK Fake Remote Developers: Synthetic Identities at Scale
  7. Walmart Global TechMapping Ottercookie Infrastructure
  8. Lookout Threat IntelligenceBeyond BITTER: MENA Civil Society Targeted in Hack-For-Hire Operation
  9. Cisco TalosNew Lua-Based Malware “LucidRook” in Targeted Attacks Against Taiwanese Organizations
  10. Microsoft Security BlogStorm-1175 Focuses Gaze on Vulnerable Web-Facing Assets in High-Tempo Medusa Ransomware Operations
  11. Cisco TalosQilin EDR Killer Infection Chain
  12. CyberSec SentinelBYOVD Ransomware Attacks Now Capable of Defeating Every Major EDR Product
  13. Rapid7WordPress Compromise Advances Global Stealer Operation
  14. MalwarebytesInfiniti Stealer: A New macOS Infostealer Using ClickFix and Python Nuitka
  15. NetskopeFrom ClickFix to MaaS: Exposing a Modular Windows RAT and Its Admin Panel
  16. HexastrikeReddit TradingView Lures Leading to Vidar and AMOS Stealers
  17. Rapid7SantaStealer Is Coming to Town
  18. Trend MicroCopyright Lures Mask a Multistage PureLog Stealer Attack
  19. MalwarebytesBogus Avast Website Fakes Virus Scan, Installs Venom Stealer Instead
  20. DomainToolsChatGPT Ad Blocker Extension Malware
  21. CensysComfyUI Servers: Cryptomining and Proxy Botnet
  22. Rapid7 LabsStealthy BPFDoor Variants Uncovered
  23. TrellixMasjesu: Rising Stealth IoT Botnet with DDoS Evasion
  24. Cisco TalosUAT-10608: Inside a Large-Scale Automated Credential Harvesting Operation
  25. Unit 42 / Palo Alto NetworksModern Kubernetes Threats
  26. Kaspersky / SecurelistRGB-Team: The Hacktivists Behind CMoon
  27. Zscaler ThreatLabzFileless Memory Loader Drops ScreenConnect
  28. Kaspersky / SecurelistClipBanker Malware Distributed via Trojanized Proxifier
  29. SafeDepMalicious @velora-dex/sdk Delivers Go RAT
  30. Cisco TalosWeaponizing SaaS Notification Pipelines
  31. Security BoulevardXSS Forum C&C Domain Compilation
  32. DomainToolsDPRK Malware Modularity, Diversity, and Functional Specialization
  33. Red PiranhaThreat Intelligence Report: March 31–April 6, 2026

This post was generated with Claude by Anthropic, based on source reporting from the publications listed above.