EvilBit Threat Digest - Network Edge Pummeled, Supply-Chain Worms Get Better, AI Starts Finding the Bugs

Cisco SD-WAN CVSS 10.0 under active exploit, May Patch Tuesday brings a wormable Windows DNS Client RCE, and the npm worm reaches OpenAI.

Share

Four things landed on top of each other this cycle and they keep rhyming. The network edge is back to eating critical bugs. The supply-chain worms got measurably better at faking provenance. NIST quietly admitted it can only enrich roughly the top 20% of new CVEs. And on the Microsoft and Palo Alto Networks patch cycles, the bugs being fixed are increasingly the ones AI agents found first.

Cisco SD-WAN and Microsoft Patch Tuesday

Cisco's Catalyst SD-WAN stack got hammered with a CVSS 10.0 authentication bypass that Cisco PSIRT confirms is already seeing limited exploitation in the wild. The flaw (CVE-2026-20182) lets unauthenticated remote attackers spoof peering requests over UDP/12346 against the vdaemon DTLS service, climb straight to high-privileged vmanage-admin access, and start reconfiguring the fabric via NETCONF. The Hacker News tracks the bypass as actively exploited to gain admin access, and defend.network's daily briefing corroborates exploitation in the wild since the start of May. Patches are out; the advisory ships the exact log lines and show control connections checks to hunt for unauthorized logins and challenge-ack:0 peers. If you run on-prem SD-WAN, treat this like the house is on fire. Collect admin-tech bundles before upgrading, and restrict the SD-WAN management plane to trusted segments if you can't patch immediately.

Microsoft's May 2026 Patch Tuesday followed the familiar drumbeat, with a side helping of disagreement on the count. The Hacker News tallies 138 vulnerabilities (30 critical, 104 important); Infosecurity Magazine puts it at 120 CVEs with 17 critical; TechRepublic also lands at 120 / 17 critical / 31 RCEs. The gap usually comes down to whether you include Edge Chromium and republished advisories. The headliners agree across all three: an unauthenticated heap-based buffer overflow RCE in the Windows DNS Client (CVE-2026-41096, CVSS 9.8) and a stack buffer overflow RCE in Netlogon (CVE-2026-41089, CVSS 9.8). The DNS one is particularly tasty for lateral movement once an attacker can spoof responses on your network. Apply the cumulative updates, restrict outbound DNS to trusted resolvers where possible, and watch for child processes spawned from network services. The usual suspects (SharePoint, Office, Hyper-V) round out the list, and nothing in the May tranche was being exploited as a zero-day at release.

AI Is Now Finding the Bugs

SecurityWeek's joint coverage of Microsoft and Palo Alto Networks confirms that AI agents found a measurable slice of this month's Patch Tuesday fixes on both sides. Microsoft's MDASH multi-model agentic security system reports finding 16 of the 137 Patch Tuesday vulnerabilities, including four critical RCEs in Windows networking and authentication. Palo Alto Networks Unit 42's May 2026 update reports that AI-driven scans found 75 vulnerabilities across 130+ of its own products, leading to 26 CVE advisories on the same patch cycle. Unit 42 calls out a probable 3-5 month defender-advantage window before AI-enabled exploit development catches up. CyberScoop's reporting on the AISI and PANW cyber benchmarks lines up: frontier models are solving 32-step attack simulations and discovering real bugs at a rate that breaks every existing benchmark. Bruce Schneier's analysis of Anthropic's withheld Mythos AI is the right calibration: short-term attacker edge, long-term defender advantage if you wire it into your own pipeline.

Synthesia's writeup of their agentic AppSec stack (Semgrep for entry-point mapping plus Haiku, Sonnet, and Opus for vulnerability hunting, deduplication, and validation) is one of the cleaner end-to-end examples of how you actually wire that pipeline together. Sysdig's argument that runtime security is where you actually catch the AI-era zero-days belongs in the same conversation, as does Tenable's piece on agentic AI for cleaning up zombie cloud assets (orphaned IPs, unattached volumes, stale snapshots are the kind of accidental attack surface AI-assisted attackers will find first). For the regulatory side, the UK ICO's five-step plan to counter AI-powered attacks is the first official guidance to read like it was written by someone who has actually faced one.

Supply-Chain Worms Keep Spreading

TeamPCP's Mini Shai-Hulud worm and its Tor-backed cousin are still chewing through npm and PyPI. The latest wave hit 160+ packages including OpenSearch and Mistral AI SDKs, with @tanstack also caught in the blast radius. Beazley's Q1 2026 quarterly threat report puts that wave in context: TeamPCP is industrializing supply-chain compromise with AI-assisted bots, and Trivy is in the confirmed-compromise list alongside the npm and PyPI hits. The payloads steal OIDC tokens, AWS creds, and Vault secrets, then republish trojanized versions with valid Sigstore provenance to keep spreading. The blast radius is no longer hypothetical: OpenAI has now confirmed two employee devices were compromised via the TanStack wave, with limited internal credentials stolen.

Behavioral hunting is your friend here: look for preinstall hooks, .claude/settings.json drops, portable WinPython in %APPDATA%, and unusual environment variable strings across Mac, Linux, and Windows. The detection tiers from Deriv (credential harvest to in-memory eval to LOLBAS to persistence) give you a solid framework, and the top tiers are where the tightest detection cadence pays off.

On the Linux side, Intezer dropped a deep track on OrBit, an evolved fork of the open-source Medusa LD_PRELOAD rootkit. Two distinct lineages have been active since 2022, used by both UNC3886 and the eCrime crew BLOCKADE SPIDER. The usual LD_PRELOAD magic, PAM/SSH credential harvesting, hidden directories, and XOR-obfuscated strings are all present, plus fresh IoCs and YARA ideas. If you run vCenter, Juniper gear, or IoT/VPS fleets, add /etc/ld.so.preload and /lib/libseconf/ to your monitoring list. Red Canary's Linux DFIR primer on cgroups pairs well if your Linux IR muscle is rusty.

Fraud That Hides in Plain Sight

SANS ISC published a solid guest diary tearing apart SEO-poisoned compromised WordPress sites that redirect victims to fake marketplaces harvesting payment cards. The attack chain is depressingly reliable: compromise, SEO, flashy storefront, payment skimmer. The post ships concrete IOC domains, redirectors, and a methodology that defenders can actually use: VirusTotal domain scans, registration-age checks, reverse image searches on the product photos, and healthy skepticism toward deals that look too good. Blue teams can turn those checks into lightweight hunting queries; for analyst awareness training, this is also one of the cleaner case studies in a while.

On the meaner end of the fraud spectrum, Bitdefender catalogs ransomware crews escalating to physical violence threats (the FBI's PSA on "The Com" network: shootings, kidnappings, violence-as-a-service; Semperis says 40-46% of ransomware attacks now include some flavor of physical threat). If your IR playbook still ends at "restore from backup," it's incomplete. Two pieces worth bookmarking for that conversation: Group-IB on what an incident response retainer actually buys you, and the UHSP CISO's first-24-hours framework from a real LockBit response.

NIST NVD Narrows the Enrichment Pipeline

NIST updated its NVD enrichment policy to focus only on CISA KEV entries, federal software, and EO 14028 critical software. That covers roughly 15-20% of new CVEs, which means the old CVSS-and-CPE firehose is drying up. Vulnerability management teams that still lean exclusively on NVD will start seeing gaps. Time to lean harder on EPSS, exploit-in-wild signals, threat actor activity, and commercial enrichment. Audit where your scanners and workflows get their data; the shift was predictable once CVE volume passed the 40k-per-year mark. If you build dashboards or risk scoring on top of NVD's CVSS/CPE data, plan a tabletop on what breaks when those fields stop arriving for the bottom 80% of CVEs.

Federal and Policy Beat

Quick Hits

Also Tracking

Items on the radar that didn't earn a full writeup this week:

Closing note: The edge is still the easy way in. The supply chain is no longer something you can trust just because Sigstore says yes. NVD is going to cover less and less of what hits your scanners next year. And AI now sits on both sides of the bug-finding desk, which is going to keep changing the shape of patch cycles for a while. If you are still treating every CVE as equally urgent, the math is not on your side anymore. Stay patched, hunt the behavioral signals, and maybe stop clicking on suspiciously cheap electronics marketplaces.

Hold the lines. The web waits for slack.

~ UncleSp1d3r