SIGNALS WEEKLY: Teams QR/callback phishing beats patching

KEV speedrun of the week 🏁: Office CVE-2026-21509 + WinRAR CVE-2025-8088. Patch anyway… then protect sessions 🍪 (Teams QR/callback lures 📱, SSO/SAML token abuse)

SIGNALS WEEKLY: Teams QR/callback phishing beats patching
War room’s on fire. The attacker’s using the front door you forgot existed.

TL;DR

  • [Vulnerabilities] Multiple newly exploited CVEs (Office CVE-2026-21509, Cisco UC, vCenter, WinRAR CVE-2025-8088, dev-tooling and webmail bugs) are driving rapid, opportunistic access across user and admin planes.
  • [Identity] Attackers increasingly favor “session-first” techniques—SSO/SAML abuse, QR/callback/Teams phishing, and post-login admin creation—making patched infrastructure insufficient without strong identity boundaries.
  • [Threat Actors/ICS] Activity ranges from new ransomware (Osiris with BYOVD) to Sandworm’s DynoWiper operations against Poland’s grid, underscoring continued convergence of financially motivated and geopolitical threats.

AlphaHunt

Stop doomscrolling, start decisioning. We chewed through the muck so your team doesn’t have to. → Subscribe!

Like this? Forward this to a friend!

(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))


Current Stories

TL;DR

  • [Vulnerabilities] Patch/mitigate a fast-moving exploitation wave: Microsoft Office CVE-2026-21509 (exploited) plus multiple CISA KEV adds (Cisco UC CVE-2026-20045, VMware vCenter CVE-2024-37079, and Vite/Prettier/Zimbra CVEs).

  • [Identity/Edge] Fortinet reports FortiCloud SSO abuse impacting even fully patched devices; observed rogue SSO logins and follow-on local admin creation (persistence) reinforce a “session-first” attacker focus.

  • [Threat Actors] Multiple actor types continue exploiting WinRAR CVE-2025-8088 (n-day) by dropping payloads into the Windows Startup folder via path traversal + ADS for reliable persistence.

  • [Geopolitics/ICS] ESET attributes the late-2025 attempted disruption of Poland’s power grid to Sandworm, using newly analyzed wiper malware DynoWiper.

  • [Data Breach] Nike is investigating a potential incident after WorldLeaks claimed a large internal data leak; authenticity and customer-data exposure remain unverified in public reporting.

References


AlphaHunt Converge - Plug in your Flight Crew

Get intelligence where it counts. No dashboards. No detours. AlphaHunt Converge teases out your intent, reviews the results and delivers actionable intel right inside Slack. We turn noise into signal and analysts into force multipliers.

CTA Image

Anticipate, Don’t Chase.

Plug it In!

Emerging Stories, Forecasts, Detection Ideas and Suggested Pivots