Major Data Breaches
Berkadia Ransomware Attack
Summary:
Berkadia, a major real estate services provider, suffered a ransomware attack attributed to the ShinyHunters group. Over 5 million Salesforce records, including personally identifiable information (PII) and internal corporate data, were compromised. The attack highlights the persistent threat of ransomware to the real estate and financial sectors, with attackers targeting large data repositories for extortion and data theft.
Key Details:
- Organization: Berkadia (New York, USA)
- Data Exposed: Over 5 million Salesforce records, including PII and internal data
- Attack Vector: Ransomware (ShinyHunters group)
- Discovery Date: March 2026
- Response: Incident under investigation; details on ransom demand not disclosed
Technical Details:
- Ransomware Family: ShinyHunters
- Data Exfiltration: Confirmed
- Impact: Disruption of business operations and potential exposure of sensitive client information
HackerOne Employee Data Breach
Summary:
HackerOne, a leading bug bounty platform, disclosed a breach involving a third-party system that exposed employee personal data. The incident underscores the risks associated with third-party vendors, even for organizations at the forefront of cybersecurity.
Key Details:
- Organization: HackerOne
- Data Exposed: Employee personal data (specifics not disclosed)
- Attack Vector: Third-party system compromise
- Discovery Date: March 2026
- Response: Investigation ongoing; enhanced monitoring of third-party vendors
Infinite Campus Data Breach
Summary:
Infinite Campus, a widely used K-12 student information system, reported a data breach following an extortion attempt by a threat actor. The breach has raised concerns about the security of educational technology platforms and the sensitive nature of student data.
Key Details:
- Organization: Infinite Campus
- Data Exposed: Not fully disclosed; extortion attempt involved
- Attack Vector: Extortion by threat actor
- Discovery Date: March 24, 2026
Significant Cyberattacks
European Commission Web Platform Attack
Summary:
The European Commission confirmed a cyberattack on its cloud-hosted Europa web platform. Early indications suggest data exfiltration may have occurred, though internal systems were reportedly unaffected. The incident highlights the ongoing targeting of government platforms in Europe and the risks associated with public-facing infrastructure.
Key Details:
- Organization: European Commission
- Attack Vector: Cloud platform compromise
- Discovery Date: March 24, 2026
- Response: Breach contained; investigation ongoing
Source: Reuters via Barefoot Cyber2
Surge in State-Linked Attacks on Critical Infrastructure
Summary:
Poland reported a sharp increase in cyberattacks, including a destructive attack on energy infrastructure believed to be linked to Russian-affiliated actors. This reflects a broader trend of state-aligned cyber operations targeting critical infrastructure across NATO and EU regions.
Key Details:
- Country: Poland
- Sector: Energy infrastructure
- Attack Vector: Destructive malware, suspected Russian affiliation
- Discovery Date: March 2026
Source: AP News via Barefoot Cyber2
GitHub Supply Chain Attack: TeamPCP Targets CI/CD Pipelines
Summary:
Attackers linked to TeamPCP compromised Checkmarx GitHub Actions using stolen CI credentials, extending a broader campaign targeting CI/CD pipelines. This incident marks a continued evolution of supply chain attacks, moving beyond software dependencies into development workflows.
Key Details:
- Target: Checkmarx GitHub Actions
- Attack Vector: Stolen CI credentials, supply chain compromise
- Discovery Date: March 2026
Stryker Cyberattack by Iran-Linked Group
Summary:
Stryker, a global medical technology provider, confirmed a cyberattack attributed to the Iran-linked Handala group. The attackers weaponized Microsoft Intune to wipe data from thousands of devices, causing temporary disruption to manufacturing and shipping. The attack is part of a broader trend of targeting healthcare and critical infrastructure.
Key Details:
- Organization: Stryker (USA)
- Attack Vector: Microsoft Intune device management compromise
- Threat Actor: Handala (Iran-linked)
- Discovery Date: March 2026
- Response: Attack contained; restoration underway
Critical Vulnerabilities
Citrix NetScaler ADC and Gateway (CVE-2026-3055)
Summary:
A critical vulnerability (CVE-2026-3055, CVSS 9.3) in Citrix NetScaler ADC and Gateway allows unauthenticated remote attackers to leak sensitive information from device memory. The flaw is actively exploited as of March 27, 2026, particularly in appliances configured as SAML Identity Providers. Citrix urges immediate patching.
Key Details:
- CVE: CVE-2026-3055
- CVSS Score: 9.3
- Affected Products: NetScaler ADC and Gateway (various versions)
- Attack Vector: Out-of-bounds read, memory overread
- Mitigation: Upgrade to fixed versions immediately
Fortinet FortiClient EMS (CVE-2026-21643)
Summary:
A critical SQL injection vulnerability (CVE-2026-21643, CVSS 9.1) in Fortinet FortiClient EMS is under active exploitation. The flaw allows unauthenticated attackers to execute unauthorized code or commands via crafted HTTP requests. Fortinet released a patch in version 7.4.5.
Key Details:
- CVE: CVE-2026-21643
- CVSS Score: 9.1
- Affected Product: FortiClient EMS
- Attack Vector: SQL injection via HTTP header
- Mitigation: Update to version 7.4.5
GNU InetUtils telnetd (CVE-2026-32746)
Summary:
A critical, unpatched vulnerability (CVE-2026-32746, CVSS 9.8) in GNU InetUtils telnetd allows unauthenticated remote code execution as root. The flaw is due to an out-of-bounds write in the LINEMODE SLC handler and affects all versions through 2.7. A fix is expected by April 1, 2026.
Key Details:
- CVE: CVE-2026-32746
- CVSS Score: 9.8
- Affected Product: GNU InetUtils telnetd (all versions through 2.7)
- Attack Vector: Pre-auth buffer overflow via port 23
- Mitigation: Disable telnetd, block port 23, run without root privileges
Government Responses
CISA Adds Exploited Vulnerabilities to Catalog
Summary:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added several new vulnerabilities to its Known Exploited Vulnerabilities Catalog between March 24 and March 27, 2026. The advisories urge immediate patching and hardening of affected systems, particularly those exposed to the internet.
Key Details:
- Agency: CISA
- Action: Added new vulnerabilities to KEV Catalog
- Date: March 24–27, 2026
- Focus: Urgent patching and mitigation for critical flaws
FCC Bans Import of Foreign-Made Routers
Summary:
The U.S. Federal Communications Commission (FCC) announced a ban on the import of new, foreign-made consumer routers, citing unacceptable risks to national security. Only routers with conditional approval from the Department of Homeland Security or Department of War are exempt.
Key Details:
- Agency: FCC
- Action: Ban on foreign-made consumer routers
- Date: March 2026
- Rationale: National security concerns
Miscellaneous
“DarkSword” iPhone Exploit Goes Public
Summary:
A previously restricted exploit known as “DarkSword” for iPhones has leaked publicly, making it easier for attackers to target vulnerable devices and extract sensitive data. The exploit, originally used for targeted surveillance, is now available to a broader range of threat actors.
Key Details:
- Exploit Name: DarkSword
- Affected Devices: Certain iOS versions
- Impact: Increased risk of mobile device compromise, especially in finance and government sectors
- Mitigation: Update all devices, enforce MDM, restrict access policies
Source: Tom’s Guide via Barefoot Cyber2
Red Menshen “Sleeper Cell” Implants in Telecom Networks
Summary:
A China-linked threat actor, Red Menshen, has deployed stealthy BPFDoor implants in global telecom backbone infrastructure. These implants act as sleeper cells, remaining dormant until activated, and are designed for long-term espionage and persistence.
Key Details:
- Threat Actor: Red Menshen (China-linked)
- Target: Global telecom networks
- Technique: Kernel-level implants, passive backdoors
- Impact: Long-term, hard-to-detect espionage
Conclusion
This week’s cybersecurity landscape was marked by a surge in state-linked attacks on critical infrastructure, high-profile data breaches, and the rapid exploitation of newly disclosed vulnerabilities. Organizations are urged to prioritize patching, enhance third-party risk management, and remain vigilant against evolving supply chain and mobile threats. The increasing sophistication and coordination of cyber-physical attacks, as well as the public release of advanced exploits, underscore the need for robust, adaptive security strategies.
For further details and technical advisories, consult the linked sources throughout this report.
