TridentLocker ransomware π¨, Chrome extension data theft π±, China energy attacks β‘, Router RCE flaws π, Post-quantum crypto π‘οΈ
Daily Threat Intel Digest - 2026-01-07
π΄ Critical Threats & Active Exploitation
[NEW] Sedgwick Government Solutions breach exposes federal agency data
TridentLocker ransomware group compromised Sedgwick’s federal contractor subsidiary, stealing 3.39 GB of sensitive data from clients including DHS, CISA, USCIS, CBP, and ICE. The attack exploited an isolated file transfer system, with network segmentation preventing wider impact, but stolen data may include claims processing information for government agencies. TridentLocker’s emerging RaaS operation has claimed 12 victims since November 2025, targeting critical infrastructure contractors across North America and Europe [Cyberpress; GBHackers; BleepingComputer].
[NEW] Malicious Chrome extensions steal 900,000 users’ AI chats
Two data-stealing browser extensions impersonating AITOPIA (“Chat GPT for Chrome with GPT-5” and “AI Sidebar with Deepseek”) exfiltrated ChatGPT/DeepSeek conversations from 900,000+ users via deepaichats[.]com C2. The malware harvested complete chat transcripts (including proprietary code and corporate strategies) every 30 minutes, exploiting excessive browser permissions. Despite researcher disclosure in December 2025, both extensions remained active on Chrome Web Store, with one holding Google’s “Featured” badge [Cyberpress; GBHackers].
[NEW] China-linked attacks on Taiwan’s energy sector surge 1000%
Taiwan’s National Security Bureau reported Chinese state actors (BlackTech, Flax Typhoon, Mustang Panda, APT41, UNC3886) increased attacks on energy infrastructure tenfold in 2025. Attackers targeted petroleum/electricity/natural gas systems, injecting malware during software upgrades and exploiting hardware/software flaws. Spikes coincided with political events, with 54% more attacks on emergency services/hospitals overall. Industrial control system compromises enable operational intelligence theft [BleepingComputer].
β οΈ Vulnerabilities & Patches
[NEW] Critical D-Link DSL router flaw actively exploited
CVE-2026-0625 (unauthenticated command injection via dnscfg.cgi) affects end-of-life DSL-526B, DSL-2640B, DSL-2740R, and DSL-2780B models. Active exploitation observed through honeypots allows RCE without authentication. D-Link urges immediate device replacement as firmware updates are unavailable β these 2020 EoL devices remain common in consumer/SMB environments [BleepingComputer].
[NEW] Google patches high-severity WebView bypass
CVE-2026-0628 enables attackers to circumvent security policies in Chrome’s WebView component, potentially allowing malicious content delivery in embedded browser contexts. Fixed in Chrome 143.0.7499.192/.193; enterprises using WebView-reliant applications should prioritize updates [GBHackers].
[NEW] Veeam Backup flaw enables root-level RCE
Critical vulnerability in Veeam Backup & Replication v13.0.1.180 and earlier permits attackers to execute arbitrary code with root privileges. Though technical details are sparse, Veeam’s urgent advisory indicates widespread impact on backup infrastructure β a high-value target for ransomware operators [GBHackers].
π‘οΈ Defense & Detection
[NEW] Interactive analysis overcomes static phishing detection gaps
Sophisticated phishing campaigns (QR codes, CAPTCHA-protected redirect chains, OAuth abuse) evade traditional email filters. Controlled detonation environments like ANY.RUN enable analysts to solve CAPTCHAs, follow redirects, and submit test credentials to confirm credential harvesting in minutes. This approach captures multi-stage TTPs missed by sandbox-only detection [Cyberpress].
[NEW] Agentic AI closes identity risk remediation loop
Qualys’ Agent Grant correlates signals from AD/Entra/Okta to compute quantifiable Identity TruRisk scores, then automates remediation (disabling accounts, enforcing MFA, reducing entitlements) with policy guardrails. Validated risk reduction replaces motion metrics like password rotation rates, addressing identityβs role in 74% of breaches [Qualys Blog].
π Policy & Industry News
[NEW] Australia mandates post-quantum crypto migration by 2030
ASDβs Cryptographic Bill of Materials (CBOM) framework requires phasing out RSA/DH/ECDH/ECDSA by end-2030, adopting ML-DSA-87/ML-KEM-1024. Hybrid schemes are discouraged. The LATICE framework (Locate-Assess-Triage-Implement-Communicate) prioritizes long-lived data/infrastructure. Immediate steps: inventory crypto dependencies and demand PQC readiness from vendors [SOCFortress].
[NEW] FCC imposes $10K fines for false robocall database reports
New Robocall Mitigation Database rules require annual recertification and 2-factor authentication for submissions. Violations include $10K penalties for false/inaccurate filings and $1K for untimely updates. The policy combats spoofing after voice-cloning attacks exploited verification gaps [CyberScoop].