FortiGate SSO exploits 🚨, Okta vishing kits ☎️, ransomware expansion 💰, active RCE campaigns 🎯, storage flaws 🔓
Daily Threat Intel Digest - 2026-01-23
🔴 Critical Threats & Active Exploitation
[UPDATE] FortiGate Firewalls Targeted in Automated Attacks
Attackers are exploiting FortiOS SSO vulnerabilities (CVE-2025-59718/CVE-2025-59719) through highly automated campaigns that harvest complete firewall configurations within seconds. The operation involves creating persistent backdoor accounts like “secadmin” and “itadmin” after initial access via malicious service accounts (cloud-init@mail.io, cloud-noc@mail.io). Critical IOCs include IPs 104.28.244[.]115, 104.28.212[.]114, and 217.119.139[.]50. Patches may be insufficient as attackers have adapted techniques beyond the original CVEs. Organizations should immediately reset credentials, disable FortiCloud SSO, and restrict management access to trusted networks only [Cyberpress; Arctic Wolf].
[NEW] Okta SSO Accounts Targeted in Sophisticated Vishing Campaigns
A new “as-a-service” phishing kit enables real-time voice-based attacks that bypass MFA through live session manipulation. Attackers impersonate IT support, spoof corporate numbers, and guide victims through fake authentication pages while simultaneously triggering real MFA challenges that appear legitimate. Once authenticated, attackers access integrated platforms like Microsoft 365, Salesforce, and Slack for data exfiltration. Active campaigns target financial and wealth management sectors. Implement phishing-resistant MFA (FIDO2/passkeys) and monitor for authentication anomalies [BleepingComputer; Okta Advisory].
[NEW] SmarterMail Auth Bypass Flaw Actively Exploited
Unauthenticated attackers are resetting administrator passwords on SmarterMail email servers through CVE-less vulnerability in the force-reset-password API endpoint. The flaw enables SYSTEM-level RCE after account hijacking. Exploitation began within days of the January 15 patch release, suggesting reverse-engineering of fixes. All SmarterMail deployments must immediately upgrade to Build 9511 and monitor for suspicious password reset activity [BleepingComputer; watchTowr Analysis].
[NEW] Cisco Unified Communications RCE Under Active Exploitation
Cisco has patched CVE-2026-20045, a high-severity flaw in Unified Communications products allowing unauthenticated RCE via improper HTTP request validation. The vulnerability is being actively exploited in the wild. Organizations should immediately apply vendor patches while monitoring for unusual web management interface activity [Arctic Wolf; Cisco Advisory].
🎯 Threat Actor Activity & Campaigns
[UPDATE] Clop and Qilin Ransomware Expand Multi-Sector Targeting
Both ransomware operations claimed numerous new victims on January 22 across diverse sectors. Clop targeted Canadian mining firm Eastplats, legal firm TOMLLAWYERS.COM, aerospace supplier ECA-USA.COM, and UK firm Warranty First Limited. Qilin struck Argentina’s Proleasing, Sri Lanka’s SiNetCon, and Paraguay’s industrial machinery firm Copetrol. Both groups threaten data leaks unless negotiations occur. The campaigns demonstrate ongoing expansion beyond traditional high-value targets into regional industrial and professional services firms [DeXpose Reports; DeXpose Reports].
[NEW] INC Ransomware Opsec Failure Enables Data Recovery
An operational security mistake exposed INC Ransomware’s Restic backup infrastructure, allowing researchers to recover stolen data from 12 unrelated US organizations in healthcare, manufacturing, and technology sectors. The exposure revealed hardcoded repository credentials and encryption keys stored in PowerShell scripts. Organizations using Restic should monitor for unusual backup processes and implement detection rules for renamed binaries [BleepingComputer; Cyber Centaurs Report].
⚠️ Vulnerabilities & Patches
[NEW] HPE Alletra and Nimble Storage Critical Privilege Escalation
CVE-2026-23594 (CVSS 8.8) allows remote attackers with low privileges to gain full administrative control on HPE Alletra 6000/5000 and Nimble Storage arrays. The flaw affects versions prior to 6.1.2.800 and 6.1.3.300. Administrators should immediately upgrade to patched versions (6.1.2.800/6.1.3.300) and review management interface access controls [Cyberpress; HPE Advisory].
🛡️ Defense & Detection
[NEW] OWASP ZAP Integrates PenTest Kit for Authenticated Testing
The new OWASP ZAP add-on automatically installs the PenTest Kit browser extension in Chrome/Edge/Firefox, enabling security testing within authenticated sessions. The tool treats browser activity as authoritative, capturing real user flows for DAST/IAST/SAST/SCA analysis. This simplifies testing for modern SPAs and authenticated applications [Cyberpress; ZAP Blog].
[NEW] Microsoft Teams Adds Brand Impersonation Warnings
Rolling out in mid-February, this feature will alert users to first-contact external callers attempting to impersonate trusted organizations. The protection engages by default and complements existing malicious URL detection and file type protections. Admins should update support materials to handle user inquiries about the new warnings [BleepingComputer; Microsoft Message Center].
📋 Policy & Industry News
[NEW] TSA-ICE Data Sharing Partnership Under Legal Challenge
American Oversight has sued the TSA and ICE for records about passenger data sharing used for immigration enforcement. The lawsuit challenges the legal basis for sharing domestic travel data without Privacy Act compliance. The program was previously implicated in the controversial deportation of a student at Logan Airport [CyberScoop; NY Times Investigation].
[NEW] Ransomware Leader Pleads Guilty to Four-Year Crime Spree
Russian national Ianis Antropenko admitted leading ransomware operations that targeted over 50 victims using Zeppelin and GlobeImposter variants. The case is notable for Antropenko committing crimes while residing in the US. Authorities seized over $3.4M in cryptocurrency and cash. The plea highlights increasing international cooperation against ransomware operators [CyberScoop; Court Documents].