Cyber Threat Brief — March 20 2026

⚠️ This report is AI-generated. Always validate findings.

Previous brief: Cyber Threat Brief — March 19 2026


1. GlassWorm Supply Chain Phase 3 — Sleeper Extensions & GitHub VSIX Delivery

TL;DR: Dormant Open VSX extensions activated March 17–18, now force-installing malicious VSIX payloads hosted on GitHub Releases — beyond registry takedown reach. 433 compromised components identified across GitHub, npm, and Open VSX; C2 uses Solana blockchain memos making takedown near-impossible.

What’s New:

  • Sleeper extensions on Open VSX activated, converting benign extensions into malicious packs via extensionPack/extensionDependencies manifest fields
  • VSIX payloads now hosted on GitHub Releases (github[.]com/francesca898/dqwffqw/releases/), force-installed via --install-extension --force
  • Compromised npm packages published March 12: @aifabrix/miso-client v4.7.2, @iflow-mcp/watercrawl-watercrawl-mcp v1.3.0–1.3.4
  • Invisible Unicode obfuscation (PUA ranges U+FE00–U+FE0F, U+E0100–U+E01EF) hides malicious code in all editors
  • March 18 wave extensions remain live on Open VSX as of March 20

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
Marker variable lzcdrtfxyqiplpdIOC / CodeT1195.002SAST, code scanningSearch all codebases for this string
~/init.json persistence fileIOC / FileT1547.004EDR, Sysmon Event 11Alert on creation in developer home dirs
~/node-v22* directoriesIOC / FileT1059.007EDR File CreateAlert on Node.js installs outside package manager paths
github[.]com/francesca898/dqwffqw/releases/IOC / NetworkT1105Web proxy, DNSBlock/alert on requests to this repo
Solana RPC polling every 5–10s from dev workstationsNetwork / C2T1102.002Web proxy, NetFlowAlert on repeated Solana RPC from non-crypto hosts
--install-extension --force CLI invocationsProcessT1059EDR Process CreateAlert on VS Code CLI spawning with force-install from extension host
Git commits where committer date >> author dateTTPT1195.002Git audit logsAudit repos for anomalous timestamp patterns

Detection

SourceRuleGap
Splunk ESCULinux Ingress Tool Transfer Hunting, Suspicious Process File PathNo rules for VS Code extension abuse, Solana C2, or Unicode code injection
ElasticSuspicious Browser Extension InstallationNo IDE extension supply chain coverage
SigmaSuspicious File In User Home, Suspicious Node.js Child ProcessNo VS Code extension or blockchain C2 rules

Sources: Socket · Aikido · BleepingComputer · The Hacker News · Sonatype


2. PolyShell — Unauthenticated RCE in All Magento/Adobe Commerce 2.x

TL;DR: Every Magento 2 installation through 2.4.9-alpha2 has an unrestricted file upload via the REST API cart custom options endpoint, enabling unauthenticated RCE through polyglot PHP uploads. No isolated patch exists for production versions; exploit methodology is already circulating publicly.

What’s New:

  • Sansec published full technical disclosure on March 19, 2026
  • Exploit methodology publicly circulating — automated exploitation expected imminently
  • No isolated patch for production Magento 2.x; only 2.4.9 pre-release contains the fix
  • Mass defacement campaign (15,000 hostnames, 7,500 domains) ongoing since Feb 27 may share the same upload vector
  • No active RCE exploitation confirmed yet, but disclosure window is open

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST to REST API with file_info containing PHP/polyglot payloadsNetwork / ExploitT1190WAF, web server logsWAF rule to inspect file_info for executable content
New files in pub/media/custom_options/quote/File / WebshellT1505.003FIM, Sysmon Event 11Alert on any file creation in this directory
HTTP requests to pub/media/custom_options/quote/*.phpNetworkT1505.003Web server logsAlert on execution attempts in custom_options dir
Base64 PHP in REST API bodies (e.g., PD9waHA = <?php)NetworkT1027WAF, web proxyWAF rule to detect base64-encoded PHP patterns
.txt file uploads to web-accessible dirs (defacement)FileT1491.002FIM, web server logsMonitor for unexpected text files in Magento web dirs

Detection

SourceRuleGap
Splunk ESCUWeb Shell Indicator, W3WP Spawning ShellNo Magento-specific upload monitoring or polyglot detection
ElasticWebshell Detection: Script Process Child of Common Web ProcessesNo file creation monitoring scoped to Magento dirs
SigmaWebshell Detection via File Creation, Suspicious PHP File CreationNo polyglot file or API-based upload vector detection

Sources: Sansec · The Hacker News · BleepingComputer · Sam James


Previously Covered — Status Updates

  • CVE-2026-20131 / CVE-2026-20079 (Cisco FMC / Interlock Ransomware): No new IOCs or TTPs beyond Amazon MadPot disclosure. March 19 brief.
  • CVE-2026-20963 (Microsoft SharePoint RCE): Federal deadline March 21. No new exploitation reports. March 19 brief.
  • CVE-2025-66376 (Zimbra XSS / APT28 GhostMail): Federal deadline April 1. No new IOCs. March 19 brief.
  • DarkSword iOS Exploit Kit: No new malware families or targeting changes. March 19 brief.
  • CVE-2026-3909 / CVE-2026-3910 (Chrome Skia/V8): Federal deadline March 27. No new TTPs. March 18 brief.
  • CVE-2026-32746 (GNU InetUtils telnetd): No patch until April 1. No exploitation reports. March 18 brief.
  • CVE-2025-47813 / CVE-2025-47812 (Wing FTP Server): No new artifacts. March 17 brief.
  • LeakNet ClickFix + Deno BYOR Campaign: No new IOCs. March 18 brief.
  • Payload Ransomware (Babuk derivative): No new victims or TTPs. March 18 brief.
  • ACRStealer / HijackLoader: No new IOCs. March 18 brief.
  • Konni APT EndRAT via KakaoTalk: No new C2 or targeting changes. March 18 brief.