Critical Linux Kernel Flaw, Apache HTTP/2 Bug, and Data Breaches Surge

Events tracked
185
Critical exposure
52

Summary

Today's threat landscape is defined by a convergence of critical infrastructure vulnerabilities and a high volume of data exposure incidents. Defenders must prioritize patching for two severe flaws -- a Linux kernel local privilege escalation and an Apache HTTP/2 remote code execution -- while also accounting for a supply chain compromise affecting DAEMON Tools installers. The data breach activity is heavily concentrated on Israeli and Mexican entities, with multiple actors targeting government, financial, and energy sectors, signaling a shift toward politically and economically motivated operations.

Today's developments

Critical Vulnerabilities Demand Immediate Patching -- Industry researchers at Unit 42 have disclosed a critical Linux kernel local privilege escalation (LPE) tracked as CVE-2026-31431, dubbed "Copy Fail," which allows stealthy root access on millions of systems. Separately, the Apache Software Foundation released patches for CVE-2026-23918, a double-free vulnerability in HTTP/2 protocol handling that could enable remote code execution (CVSS 8.8). SecurityWeek reports that a critical Android RCE, CVE-2026-0073, was also patched, exploitable without user interaction. These vulnerabilities represent a significant attack surface for initial access and lateral movement.

Supply Chain Attack on DAEMON Tools -- Kaspersky researchers identified a supply chain attack where official DAEMON Tools installers, signed with legitimate digital certificates, were compromised to deliver malware. This incident underscores the risk of trusted software distribution channels and the need for runtime integrity checks.

Data Exposure Incidents Concentrate on Israel and Mexico -- Multiple actors claimed breaches affecting Israeli organizations. The BlackH4t MD-Ghost allegedly breached Aviv Energy Tech Ltd (Electrical & Electronic Manufacturing) and ADAMA Ltd (Farming), and claimed a leak from an unidentified Israeli health insurance company. NoHeartz allegedly breached Active CRM (Software), and INFERNALIS claimed a breach of e-commerce platform Podarok. DBHunter claimed a leak of an Israel Email & Contact Database. In Mexico, ColdK3y claimed a breach of Betterware Mexico (10M records), and DBHunter alleged a database leak from Declaranet (Government Administration). hackstage claimed a breach of Agrarian Courts (Legal Services).

Financial and Government Targets Hit Globally -- In the financial sector, mritcat claimed a breach of UK payment provider ECOMMPAY, and ShinyHunters alleged a breach of Colombian fintech Adelante soluciones financieras (Addi). momo78 claimed a breach of Punjab National Bank in India (100,000 records). Government targets included the Magelang City Government in Indonesia (JAX7), DIGERCIC of Ecuador (GordonFreeman, claiming 14.8M records), and the Social Democratic Party of Germany (awedlocust7). Trellix, a US-based cybersecurity firm, also suffered a data breach from an unknown actor.

Ransomware Affiliate Sentenced -- Security reporters at CyberScoop and The Record note that Deniss Zolotarjovs, a Latvian national and affiliate of the Conti and Akira ransomware groups, was sentenced to eight years in prison for money laundering and wire fraud. This follows his guilty plea in July 2025 and highlights ongoing international law enforcement efforts against ransomware ecosystems.

Threat landscape signals

Actor Concentration and Shifting Tactics -- Cinzz remains the most prolific actor with 31 events, likely focused on initial access or DDoS activity. NoName057(16) continues its pro-Russia DDoS campaigns, primarily targeting Ukraine and Israel. The emergence of The Gentlemen (12 events) and SAFEPAY (6 events) suggests new or rebranded groups entering the fray. The high number of data breach (35) and data leak (17) events indicates a sustained focus on data exfiltration over encryption for extortion.

Geographic and Sectoral Targeting -- The United States remains the top victim country (28 events), but the concentration on Israel (17 events) and Mexico (10 events) is notable. Israeli targets span energy, insurance, agriculture, and software, suggesting a broad, possibly politically motivated campaign. Mexican targets include government, legal, and retail sectors, indicating a focus on Latin American markets. The energy sector is also under pressure, with a breach at Brazil's Cemig (Companhia Energetica de Minas Gerais) claimed by tarot.

Operational Security Recommendations -- Given the critical Linux and Apache vulnerabilities, prioritize patching for internet-facing systems and endpoints. Review OAuth token hygiene, as highlighted by industry researchers, to close persistent backdoors. For organizations using DAEMON Tools, verify installer integrity and consider re-imaging affected systems. The CISA guidance on operating critical infrastructure in isolation during conflict is a strategic consideration for OT/ICS environments.

All incidents are reported as alleged claims by threat actors and have not been independently verified by GrayscaleInsight.

Threat intelligence is reported for security awareness purposes only and does not constitute endorsement of any actor, group, or activity.

Recent editions