{"id":437,"date":"2026-04-02T14:30:47","date_gmt":"2026-04-02T14:30:47","guid":{"rendered":"https:\/\/cybercolombia.co\/index.php\/2026\/04\/02\/pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories-cyberdefensa-mx\/"},"modified":"2026-04-02T14:30:47","modified_gmt":"2026-04-02T14:30:47","slug":"pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories-cyberdefensa-mx","status":"publish","type":"post","link":"https:\/\/cybercolombia.co\/index.php\/2026\/04\/02\/pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories-cyberdefensa-mx\/","title":{"rendered":"Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &#038; 10 More Stories \u2013 CYBERDEFENSA.MX"},"content":{"rendered":"<div id=\"articlebody\">\n<p>The\u00a0latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No\u00a0corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping systems safe this\u00a0week.<\/p>\n<p>Things\u00a0are moving fast. The\u00a0list includes researchers chaining small bugs together to create massive backdoors, old software flaws coming back to haunt us, and some very clever new tricks that let attackers bypass security logs entirely without leaving a trace. We\u00a0are also seeing sketchier traffic on the underground and the usual supply chain mess, where one bad piece of code threatens thousands of\u00a0apps.<\/p>\n<p>It\u00a0is definitely worth a quick scan before you log off for the day, if only to make sure none of this is sitting in your own network. Let\u2019s get into\u00a0it.<\/p>\n<div class=\"td-wrap\">\n<section aria-labelledby=\"threatsday-title\" class=\"td-section\">\n<ol class=\"td-timeline\" role=\"list\">\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Pre-auth RCE chain exposed<\/span><\/p>\n<p class=\"td-desc\">\n      watchTower Labs has <a href=\"https:\/\/labs.watchtowr.com\/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701\/\">disclosed<\/a> two security flaws in Progress ShareFile (CVE-2026-2699 and CVE-2026-2701) that could be chained to achieve pre-authenticated remote code execution. While CVE-2026-2699 is an authentication bypass via the \u00ab\/ConfigService\/Admin.aspx\u00bb endpoint, CVE-2026-2701 refers to a case of post-authenticated remote code execution. An attacker could combine the two vulnerabilities to sidestep authentication and upload web shells. Progress released fixes for the vulnerabilities with Storage Zone Controller 5.12.4 released on March 10, 2026. There are about 30,000 internet-facing instances, making patching against the flaws crucial.\n    <\/p>\n<\/div>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEioKTXaq7xM4Vt_WU85ZwiPlldNVEkHLGi8Sj9yuRHhcAgXYVi7N1XqOyerEZFy73AJvqAjuukO-oQnv6YGbBCGtYidicrPXY0cF9m_105jf5QEx3aIfS1jyFqMG1mk9eotWtJZ8XN1ozEsgx7HCYC3OwcOyrZCmuQ90k1h6S2i9zW6CO39l1_umedd_St4\/s1700-e365\/watch.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEioKTXaq7xM4Vt_WU85ZwiPlldNVEkHLGi8Sj9yuRHhcAgXYVi7N1XqOyerEZFy73AJvqAjuukO-oQnv6YGbBCGtYidicrPXY0cF9m_105jf5QEx3aIfS1jyFqMG1mk9eotWtJZ8XN1ozEsgx7HCYC3OwcOyrZCmuQ90k1h6S2i9zW6CO39l1_umedd_St4\/s1700-e365\/watch.png\" alt=\"\" border=\"0\" data-original-height=\"840\" data-original-width=\"1600\"\/><\/a><\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Rootkit spreads via 50+ apps<\/span><\/p>\n<p class=\"td-desc\">\n      A new Android malware named NoVoice has been distributed via more than 50 apps that were downloaded at least 2.3 million times. While apps masqueraded as utilities, image galleries, and games, and offered the advertised functionality, the malware attempted to obtain root access on the device by exploiting 22 Android vulnerabilities that received patches between 2016 and 2021. \u00abIf the exploits succeed, the malware gains full control of the device,\u00bb McAfee Labs <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-research-operation-novoice-rootkit-malware-android\/\">said<\/a>. \u00abFrom that moment onward, every app that the user opens is injected with attacker-controlled code. This allows the operators to access any app data and exfiltrate it to their servers.\u00bb The malware avoids infecting devices in certain regions, like Beijing and Shenzhen in China, and implements more than a dozen checks for emulators, debuggers, and VPNs. It then contacts a remote server to send device information and fetch appropriate exploits to gain root access and disable SELinux. Upon gaining elevated access, the rootkit modifies system libraries to facilitate the execution of malicious code when specific apps are opened, install arbitrary apps, and enable persistence. NoVoice has been found to share some level of overlap with Triada. One of the targeted apps is WhatsApp, which enabled the malware to harvest data from the app as soon as it was launched. Google has since removed the apps. The highest concentration of infections has been reported in Nigeria, Ethiopia, Algeria, India, and Kenya.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">FBI flags foreign app risks<\/span><\/p>\n<p class=\"td-desc\">\n      The U.S. Federal Bureau of Investigation (FBI) is warning of the data security risks associated with foreign-developed mobile applications. \u00abAs of early 2026, many of the most downloaded and top-grossing apps in the United States are developed and maintained by foreign companies, particularly those based in China,\u00bb the FBI <a href=\"https:\/\/www.ic3.gov\/PSA\/2026\/PSA260331\">said<\/a>. \u00abThe apps that maintain digital infrastructure in China are subject to China\u2019s extensive national security laws, enabling the Chinese government to potentially access mobile app users\u2019 data.\u00bb The bureau also warned that these apps may harvest contact information under the pretext of inviting friends to use them, store personal data in Chinese servers, or contain malware that could collect data beyond what is authorized by the user. \u00abThis could include malicious code and hard-to-remove malware designed to exploit known vulnerabilities in various operating systems and insert a backdoor for escalated privileges, such as enabling the download and execution of additional malicious packages designed to provide unauthorized access to users\u2019 data,\u00bb it added. The FBI did not name the apps, but TikTok, Shein, Temu, and DeepSeek fit the profile.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">New bureau targets cyber threats<\/span><\/p>\n<p class=\"td-desc\">\n      The U.S. State Department has officially launched the <a href=\"https:\/\/www.state.gov\/bureaus-offices\/under-secretary-for-arms-control-and-international-security-affairs\/bureau-of-emerging-threats\/\">Bureau of Emerging Threats<\/a>, a new unit <a href=\"https:\/\/abcnews.com\/Politics\/state-department-launches-effort-counter-cyberattacks-ai-risks\/story?id=131265350\">tasked<\/a> with protecting U.S. national security against cyber attacks against critical infrastructure, threats in the space domain, and misuse of artificial intelligence (AI) and other advanced technology risks from Iran, China, Russia, and North Korea.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Cybercrime kingpin extradited<\/span><\/p>\n<p class=\"td-desc\">\n      Li Xiong, the former chairman of a Cambodian financial conglomerate, <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2025-08-01\/huione-s-24-billion-hub-for-cybercrime-is-an-amazon-for-criminals\">HuiOne<\/a>, has been extradited to China. He has been accused of operating gambling dens, fraud, unlawful business operations, and money laundering. According to <a href=\"https:\/\/english.news.cn\/20260401\/ae7ef0da373145ceaaeb35170d1c9c2c\/c.html\">Xinhua<\/a>, Li is said to be a key member of the transnational cybercrime syndicate masterminded by Chen Zhi, the chairman of Prince Group, who was <a href=\"https:\/\/english.news.cn\/20260108\/cc5f710c876b4c8dbc4216a0b300d726\/c.html\">extradited<\/a> to China in January 2026 and has been indicted by the U.S. for operating large-scale, forced-labor \u00abpig butchering\u00bb scam compounds in Southeast Asia. In May 2025, the U.S. Treasury\u2019s Financial Crimes Enforcement Network labeled Huione Group \u00aba financial institution of primary money laundering concern.\u00bb\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Gmail username change arrives<\/span><\/p>\n<p class=\"td-desc\">\n      Google <a href=\"https:\/\/blog.google\/products-and-platforms\/products\/workspace\/google-account-username-change\/\">said<\/a> it\u2019s rolling out the ability to change a username to Google Account users in the U.S. \u00abYour previous Google Account email ending in gmail.com will become an alternate email address,\u00bb Google <a href=\"https:\/\/support.google.com\/accounts\/answer\/19870\">said<\/a> in a support document. \u00abYou\u2019ll receive emails to both your old and new addresses. The data saved in your account won\u2019t be affected. This includes things like photos, messages, and emails sent to your previous email address.\u00bb While users can change back to their previous email address at any time, it\u2019s not possible to create a new Google Account email ending in gmail.com for the next 12 months. The new email address cannot be deleted either.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Court halts AI risk label<\/span><\/p>\n<p class=\"td-desc\">\n      A U.S. federal judge has <a href=\"https:\/\/www.axios.com\/2026\/03\/26\/judge-temporarily-blocks-pentagon-ban-anthropic\">temporarily blocked<\/a> the Trump administration\u2019s designation of Anthropic as a supply chain risk. The AI company had argued that the designation was causing immediate and irreparable harm. \u00abNothing in the governing statute supports the Orwellian notion that an American company may be branded a potential adversary and saboteur of the U.S. for expressing disagreement with the government,\u00bb District Judge Rita Lin wrote in the ruling.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Phishing apps target mobile users<\/span><\/p>\n<p class=\"td-desc\">\n      Cybercriminals have set their sights on Android users through a new phishing scheme that disguises malicious applications as beta-testing opportunities for ChatGPT and Meta advertising tools. In these attacks, what appears to be an invitation to advertising apps turns out to be a carefully planned attempt to steal Facebook credentials and hijack control of user accounts. \u00abThese messages push malicious apps delivered through \u2018firebase-noreply@google.com\u2019 via Firebase App Distribution, a legitimate Google service for distributing pre-release apps to testers,\u00bb LevelBlue <a href=\"https:\/\/x.com\/SpiderLabs\/status\/2036076835889418406\">said<\/a>. \u00abOnce installed, these apps request Facebook credentials, leading to phishing and account takeover.\u00bb A similar campaign has leveraged phishing emails impersonating ChatGPT and Gemini to push users into downloading malicious iOS apps from the Apple App Store. \u00abDisguised as business or ad management tools, these apps prompt for Facebook credentials, leading to credential harvesting,\u00bb the company <a href=\"https:\/\/x.com\/SpiderLabs\/status\/2029557536488038488\">added<\/a>.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Drive adds ransomware defense<\/span><\/p>\n<p class=\"td-desc\">\n      Google has made ransomware detection and file restoration in Drive generally available after launching the feature in beta in September 2025 to help organizations minimize the impact of malware attacks on personal computers. Ransomware detection pauses file syncing, and file restoration allows users to bulk restore their files to a previous version in Drive. \u00abCompared to when the feature was in beta, we are now able to detect even more types of ransomware encryption and are able to do it faster,\u00bb Google <a href=\"https:\/\/workspaceupdates.googleblog.com\/2026\/03\/ransomware-detection-and-file-restoration-for-Google-Drive-now-generally-available.html\">said<\/a>. \u00abOur latest AI model is detecting 14x more infections, leading to even more comprehensive protection.\u00bb\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">GhostSocks activity intensifies<\/span><\/p>\n<p class=\"td-desc\">\n      Cybersecurity company Darktrace <a href=\"https:\/\/www.darktrace.com\/blog\/phantom-footprints-tracking-ghostsocks-malware\">said<\/a> it has observed a steady increase in GhostSocks activity across its customer base since late 2025. \u00abIn one notable case from December 2025, Darktrace detected GhostSocks operating alongside Lumma Stealer, reinforcing that the partnership between Lumma and GhostSocks remains active despite recent attempts to disrupt Lumma\u2019s infrastructure,\u00bb it said. Originally marketed on the Russian underground forum xss[.]is as a malware-as-a-service (MaaS), GhostSocks enables threat actors to turn compromised devices into residential proxies, leveraging the victim\u2019s internet bandwidth to route malicious traffic through it. It utilizes the SOCKS5 proxy protocol, creating a SOCKS5 connection on infected devices. It began to be widely adopted following its partnership with Lumma Stealer in 2024.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Open-source malware spikes 14x<\/span><\/p>\n<p class=\"td-desc\">\n      The number of malware advisories across open-source ecosystems has increased 13.6x since January 2024, as threat actors take control of trusted packages to poison the software supply chain. \u00abOf the 1,011 npm ATO [Account takeover] advisories recorded in the OSV database over all time, 930 were filed in 2025, a roughly 12x year-over-year increase representing 92% of all ATOs reported on npm,\u00bb Endor Labs <a href=\"https:\/\/www.endorlabs.com\/learn\/new-research-malware-in-open-source-ecosystems-surges-14x-as-attackers-hijack-trusted-packages\">said<\/a>. Among the 2025 npm ATO cases, 38.4% of affected packages had more than 1,000 monthly downloads, 18.5% exceeded 10,000, and 11.1% had more than 100,000. Attackers are deliberately targeting packages that are deeply embedded in production systems and automated CI\/CD pipelines, maximizing the blast radius of each compromise.\u00bb\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">XLoader boosts stealth tactics<\/span><\/p>\n<p class=\"td-desc\">\n      An updated version of the XLoader information-stealing malware (version 8.7) has been found to incorporate several changes to the code obfuscation to make automation and analysis more difficult. These include the use of encrypted strings that are decrypted at runtime, encrypted code blocks consisting of functions that are decrypted at runtime, and improved methods to conceal hard-coded values and specific functions, per Zscaler. XLoader also uses a combination of multiple encryption layers with different keys for encrypting network traffic. \u00abXLoader continues to be a highly active information stealer that constantly receives updates,\u00bb the company <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/latest-xloader-obfuscation-methods-and-network-protocol\">said<\/a>. \u00abAs a result of the malware\u2019s multiple encryption layers, decoy C2 servers, and robust code obfuscation, XLoader has been able to remain largely under the radar.\u00bb\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">ImageMagick zero-days enable RCE<\/span><\/p>\n<p class=\"td-desc\">\n      Cybersecurity researchers have found multiple zero-day vulnerabilities in ImageMagick that could be chained to achieve remote code execution through a single image or PDF upload. According to <a href=\"https:\/\/pwn.ai\/blog\/imagemagick-from-arbitrary-file-read-to-rce-in-every-policy-zeroday\">Pwn.ai<\/a>, the attack works on the default configuration and the most restrictive \u00absecure\u00bb configuration. The issue affects every major Linux distribution, as well as WordPress installations that process image uploads. It remains unpatched as of writing. In the interim, it\u2019s advised to process PDFs in an isolated sandbox with no network access, disable XML-RPC in WordPress, and block GhostScript.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">Attackers evade CloudTrail logging<\/span><\/p>\n<p class=\"td-desc\">\n      Adversaries are <a href=\"https:\/\/www.abstract.security\/blog\/how-attackers-disable-cloudtrail-without-calling-stoplogging-or-deletetrail\">bypassing<\/a> traditional CloudTrail detections, like StopLogging or DeleteTrail, and instead using lesser-known AWS APIs to blind logging systems. This includes creating \u00abinvisible activity zones\u201d using PutEventSelectors, using StopEventDataStoreIngestion and DeleteEventDataStore to halt or destroy long-term forensic visibility, disabling anomaly detection via PutInsightSelectors, neutralizing cross-account protections through DeleteResourcePolicy and DeregisterOrganizationDelegatedAdmin. \u00abThe real risk is in the sequence: individually, these API calls look like routine maintenance\u2014but chained together, they allow attackers to erase evidence and evade detection entirely,\u00bb Abstract Security said.\n    <\/p>\n<\/div>\n<\/li>\n<li class=\"td-item\">\n  <span aria-hidden=\"true\" class=\"td-dot\"\/><\/p>\n<div class=\"td-stack\">\n    <span class=\"td-punch\">LofyGang deploys dual-payload RAT<\/span><\/p>\n<p class=\"td-desc\">\n      The threat actor known as LofyGang resurfaced with a fake npm package (\u00abundicy-http\u00bb) that delivers a dual-payload attack: a Node.js-based Remote Access Trojan (RAT) with live screen streaming, and a native Windows PE binary that uses direct syscalls to inject into browser processes and steal credentials, cookies, credit cards, IBANs, and session tokens from more than 50 web browsers and 90 cryptocurrency wallet extensions. The session hijacking module targets Roblox, Instagram, Spotify, TikTok, Steam, Telegram, and Discord. \u00abThe Node.js layer independently operates as a full RAT with remote shell, screen capture, webcam\/microphone streaming, file upload, and persistence capabilities, all controlled through a WebSocket C2 panel,\u00bb JFrog <a href=\"https:\/\/research.jfrog.com\/post\/lofygang-returns-a-dual-payload-npm-package\/\">said<\/a>. The Node.js layer also downloads a native PE binary to facilitate data exfiltration via a Discord webhook and a Telegram bot.\n    <\/p>\n<\/div>\n<\/li>\n<\/ol>\n<\/section>\n<\/div>\n<p>Nothing here looks huge on its own. That\u2019s the point. Small\u00a0changes, repeated enough times, start to matter. Things\u00a0that used to be hard are getting easier. Things\u00a0that were noisy are getting quiet. You\u00a0stop seeing the obvious signs and start missing the subtle\u00a0ones.<\/p>\n<p>Read it like a pattern, not a list. Same\u00a0ideas showing up in slightly different forms. Systems doing what they\u2019re designed to do\u2014just used differently. That\u00a0gap is where most problems live now. That\u2019s the\u00a0recap.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The\u00a0latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No\u00a0corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping systems safe this\u00a0week. Things\u00a0are moving fast. The\u00a0list includes researchers chaining small bugs together to create massive backdoors, old software flaws coming [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":438,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25,5],"tags":[75,634,1504,24,1350,1502,1503,23],"class_list":["post-437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias","category-trending","tag-android","tag-chains","tag-cloudtrail","tag-cyberdefensa-mx","tag-evasion","tag-preauth","tag-rootkits","tag-stories"],"_links":{"self":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/posts\/437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/comments?post=437"}],"version-history":[{"count":0,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/posts\/437\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/media\/438"}],"wp:attachment":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/media?parent=437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/categories?post=437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/tags?post=437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}