Featured image of post Cybersecurity Week in Review: April 28, 2026 – May 4, 2026

Cybersecurity Week in Review: April 28, 2026 – May 4, 2026

Cyberattacks, data breaches, zero-days, and global responses—discover the biggest cybersecurity headlines of this week.

Major Data Breaches

France Titres Government Agency Data Breach

Summary:
France Titres, the French government agency responsible for issuing and managing administrative documents, disclosed a significant data breach this week. The breach was confirmed after a threat actor claimed responsibility for stealing citizen data. While the agency has not yet released the full scope of the incident, the exposure of sensitive government-held personal information raises concerns about the security of national identity systems and the potential for identity theft or fraud. The agency is currently investigating the breach and has notified affected individuals and relevant authorities1.

Key Details:

  • Organization: France Titres (France)
  • Data Exposed: Citizen personal data (exact details pending official disclosure)
  • Discovery Date: Early May 2026
  • Response: Ongoing investigation, notifications issued

Significant Cyberattacks

RMM Tools Abused in Stealthy Phishing Campaign

Summary:
A sophisticated phishing campaign has been uncovered, leveraging two remote monitoring and management (RMM) tools to evade detection. The campaign has impacted over 80 organizations, with attackers using legitimate RMM software to establish persistence and bypass traditional security controls. This method allows threat actors to blend in with normal IT activity, making detection and remediation more challenging. The campaign highlights the growing risk of supply chain and tool abuse in enterprise environments2.

Key Details:

  • Attack Vector: Abuse of legitimate RMM tools
  • Victims: Over 80 organizations (global)
  • Discovery Date: May 4, 2026
  • Response: Security advisories issued, organizations urged to audit RMM usage

Lotus Wiper Attack Targets Venezuelan Energy Sector

Summary:
A destructive cyberattack using the Lotus Wiper malware targeted energy firms and utilities in Venezuela. The attack, discovered on April 29, 2026, aimed to disrupt operations by wiping critical systems. This incident is part of a broader trend of wiper malware being used for sabotage rather than financial gain, particularly against critical infrastructure in geopolitically sensitive regions2.

Key Details:

  • Target: Venezuelan energy firms and utilities
  • Malware: Lotus Wiper
  • Discovery Date: April 29, 2026
  • Impact: Operational disruption, data destruction

Critical Vulnerabilities

Critical cPanel Vulnerability Threatens Millions

Summary:
A critical vulnerability in cPanel, a widely used web hosting control panel, has been identified and is being actively exploited. The flaw, which affects millions of websites, allows attackers to gain unauthorized access and potentially take control of affected servers. Security experts warn that the exploit could lead to widespread website defacements, data theft, and further compromise if not patched promptly. Organizations using cPanel are urged to apply security updates immediately2.

Key Details:

  • Product: cPanel (web hosting control panel)
  • Vulnerability: Critical (details pending CVE assignment)
  • Impact: Millions of websites at risk
  • Response: Emergency patches released

Vect 2.0 Ransomware Acts as Wiper

Summary:
A new variant of the Vect 2.0 ransomware has been observed acting as a wiper due to a design error. Instead of encrypting files for ransom, the malware irreversibly destroys data, leaving victims with no recovery options. This shift from extortion to destruction underscores the evolving threat landscape and the increasing use of ransomware as a tool for sabotage2.

Key Details:

  • Malware: Vect 2.0 ransomware (wiper behavior)
  • Discovery Date: April 29, 2026
  • Impact: Irreversible data loss

Government Responses

US and UK Warn of Firestarter Backdoor Malware

Summary:
US and UK authorities issued a joint advisory warning about the Firestarter backdoor malware, which has been found to persist even after patching affected Cisco devices. The campaign, attributed to a sophisticated threat actor, targeted a federal agency and exploited known vulnerabilities in Cisco hardware. The advisory urges organizations to review their environments for signs of compromise and to implement additional security measures beyond patching3.

Key Details:

  • Malware: Firestarter backdoor
  • Affected Products: Cisco devices
  • Victims: US federal agency, others
  • Response: Joint US-UK advisory, recommended mitigations

North Korea-Linked Actor Targets Web3 Executives

Summary:
A North Korea-linked threat actor launched a social engineering campaign targeting Web3 company executives to gain access to cryptocurrency wallets. The campaign, reported on April 27, 2026, involved compromising founders and top executives through tailored phishing and social engineering tactics. This incident highlights the ongoing targeting of the cryptocurrency sector by state-sponsored actors3.

Key Details:

  • Target: Web3 company executives
  • Attack Vector: Social engineering, phishing
  • Discovery Date: April 27, 2026
  • Response: Security alerts issued to crypto sector

Miscellaneous

76% of All Crypto Stolen in 2026 Attributed to North Korea

Summary:
A new analysis revealed that 76% of all cryptocurrency stolen in 2026 has been traced to North Korean threat actors. The report underscores the scale and sophistication of North Korea’s cyber operations targeting digital assets, with billions of dollars in losses attributed to these campaigns. The findings have prompted renewed calls for international cooperation and enhanced security measures in the crypto sector2.

Key Details:

  • Attribution: North Korean state-sponsored groups
  • Impact: Billions in stolen cryptocurrency
  • Response: Calls for increased sector vigilance

Cross-Reference Notes

  • The France Titres breach is confirmed by BleepingComputer, with ongoing investigation and limited details released1.
  • The RMM phishing campaign, cPanel vulnerability, and Vect 2.0 ransomware incidents are all reported by Dark Reading, with technical details and response measures2.
  • Government advisories and the North Korea-linked Web3 campaign are corroborated by Cybersecurity Dive3.
  • The North Korea crypto theft statistic is consistent across multiple industry reports2.

Sources:


This week’s review highlights the persistent and evolving threats facing organizations worldwide, from government agencies to critical infrastructure and the cryptocurrency sector. The incidents underscore the importance of timely patching, vigilant monitoring, and cross-sector collaboration to defend against increasingly sophisticated cyber adversaries.