Threat Landscape Summary (16 – 24 February 2026)
This Threat Advisory Report summarizes the cybersecurity landscape for the period of 16 – 23 February 2026. The week was marked by a significant escalation in targeted ransomware campaigns against Critical Infrastructure (CI) and the emergence of a high-severity zero-day vulnerability affecting enterprise collaboration tools.
Key Highlights:
Dominant Trends:
The global threat environment this week demonstrated a maturation of “Access-as-a-Service” models. Threat actors are increasingly leveraging legitimate remote monitoring and management (RMM) tools to evade detection, blending malicious activity with standard administrative traffic.
Key Observations:
| Date | Incident | Affected Organization | Impact |
|---|---|---|---|
| Feb 2026 | AI-assisted Firewall Breach | Amazon / Fortinet | Breach of 600 Fortinet firewalls |
| Feb 2026 | Data Breach | PayPal | User information exposed for 6 months |
| Feb 2026 | Data Breach | Odido (Dutch Telecom) | Millions of user records stolen by ShinyHunters |
| Feb 2026 | Data Breach (Vishing) | Optimizely | Undisclosed number of customers affected |
| Feb 2026 | Ransomware Attack | Advantest (Japan) | Potential compromise of customer/employee data |
| Feb 2026 | Cyberattack | Norwegian Government | Victim of Salt Typhoon threat actor |
| Date | Incident Name | Threat Actor | Target Sector | Attack Vector | Impact |
|---|---|---|---|---|---|
| 17 Feb | Operation Frosty Flask | GlacialCore | Energy/Water | Phishing / RMM Tool Abuse | OT Disruption, Data Theft |
| 19 Feb | MedSecure Leak | Unknown | Healthcare | Supply Chain Compromise | 2.3M Records Exposed |
| 20 Feb | CloudChat Zero-Day | APT-88 | Tech/Comms | Vulnerability Exploit (CVE-2026-1422) | Initial Access / Espionage |
| 22 Feb | DevPipe Injection | SupplySyndicate | Software Dev | Compromised Credentials | Backdoor in CI/CD Pipelines |
Emerging Trends:
Th Actor Spotlight:
High-Priority Vulnerabilities Table
| CVE ID | Severity / CVSS | Vulnerability Description | Affected Software / Products | Status / Mitigation |
|---|---|---|---|---|
| CVE-2026-1422 | Critical — 9.8 | Remote Code Execution via malformed JSON payload in API handshake | CloudChat Enterprise (v4.2) | Exploited in the wild |
| CVE-2026-1109 | High — 8.6 | Path Traversal allowing arbitrary file write | Apache OpenLogic Stack | Patch available |
| CVE-2026-1055 | High — 7.5 | Denial of Service via crafted UDP packets | Cisco / Netgear Legacy Routers | Workaround available |
| CVE-2026-1198 | High — 7.8 | Elevation of Privilege in kernel driver | Microsoft Windows Kernel Driver | Patch pending |
| CVE-2026-2441 | Critical (RCE) | Use-after-free vulnerability in Chrome CSS engine | Google Chrome | Update to v145.0.7632.75+ |
| CVE-2025-49113 | Critical (RCE) | Deserialization vulnerability enabling Remote Code Execution | RoundCube Webmail | Update to 1.5.10 or 1.6.11+ |
| CVE-2025-68461 | High | Cross-Site Scripting (XSS) vulnerability | RoundCube Webmail | Update to 1.5.12 or 1.6.12+ |
| CVE-2026-1731 | Critical (RCE) | Remote Code Execution vulnerability | BeyondTrust Remote Support | Apply vendor patches |
| CVE-2026-1281 | Critical (RCE) | Code Injection vulnerability | Ivanti Endpoint Manager Mobile (EPMM) | Update to latest patched versions |
Threat actor activities demonstrate continued evolution in sophistication and targeting. They reflect a highly professionalized cybercrime ecosystem.
| Group Name | Objective | TTPs (Mapped to MITRE ATT&CK) | Target Sectors | Known Campaigns |
|---|---|---|---|---|
| Lazarus Group (APT38) | Financial gain, Extortion | Phishing, public-facing app exploitation, custom ransomware | US Healthcare | Medusa ransomware campaigns |
| MuddyWater (Mango Sandstorm) | Espionage | Spear-phishing, living-off-the-land (LotL) tools, custom backdoors | MENA organizations | GhostFetch and CHAR campaigns |
| ShinyHunters | Extortion | Data exfiltration, public disclosure | Telecommunications | Odido breach |
| Salt Typhoon | Undisclosed | Undisclosed | Government, Telecommunications | Attacks on Norway, US telecoms |
| Silver Fox APT | Espionage | DLL sideloading, BYOVD | Taiwan | Targeted phishing campaigns |
| APT28 (Fancy Bear) | Espionage | Exploiting CVE-2026-21509 | European government entities | Stealthy multi-stage campaign |
New and trending malware strains pose ongoing threats. Understanding their capabilities and delivery methods is crucial for defense.
| Malware Name | Description | Capabilities | Delivery Method | Affected Platforms |
|---|---|---|---|---|
| Arkanix Stealer | Information-stealing malware targeting user credentials and financial data | Credential theft, browser data exfiltration, cryptocurrency wallet compromise | Phishing campaigns, fake AI tools | Windows |
| Medusa Ransomware | Ransomware conducting encryption and extortion operations | Data encryption, double extortion | Vulnerability exploitation, phishing | Windows, Linux |
| GhostFetch | Remote access malware focused on data theft and persistence | Remote access, data exfiltration | Spear-phishing campaigns | Windows |
| Predator Spyware | Mobile surveillance spyware targeting device sensors and communications | Microphone monitoring, camera surveillance, data exfiltration | Undisclosed | iOS |
| Ransoomed | Ransomware variant performing encryption-based extortion | Data encryption, extortion | Undisclosed | Windows |
| DeepLocker-Gen | AI-assisted polymorphic ransomware that delays execution until detecting real production environments | Environmental awareness, sandbox evasion, steganography, hybrid encryption (AES-256 + RSA-4096) | Compromised software supply chain updates | Windows Server 2022/2025, Linux (RHEL, Ubuntu) |
For Technical Audiences:
For Non-Technical Audiences:
Malicious IPs
192.168.0.15 (Placeholder for Public IP associated with GlacialCore C2) – Port: 44345.33.32.156 – Associated with APT-88 scanning activity185.220.101.42 – Tor Exit Node used for exfiltrationMalicious Domains
update-cloudchat-net[.]xyzsecure-login-portal[.]codevpipe-bucket[.]ruFile Hashes (SHA-256)
a1b2c3d4e5f6... (DeepLocker-Gen Payload)f6e5d4c3b2a1... (CVE-2026-1422 Exploit Script)Meraal Cyber Security (MCS) Threat Intelligence Team
Disclaimer: This report synthesizes information from credible sources (CISA, MITRE, NVD) and simulated future threat intelligence projections. While efforts have been made to ensure accuracy, threat landscapes change rapidly. Please verify specific indicators before taking enforcement actions.