← Back to Archive

Lotus Wiper Malware Strikes Venezuelan Energy Grid as CISA Director Nomination Collapses; Supply Chain Attacks Surge Across npm Ecosystem

Critical Infrastructure Intelligence Briefing

Report Date: Thursday, April 23, 2026

Reporting Period: April 16–23, 2026


1. Executive Summary

This week's intelligence landscape reveals significant developments across multiple critical infrastructure sectors, with particular concern for energy systems, software supply chains, and organizational leadership at key cybersecurity agencies.

Major Developments:

  • Energy Sector Attack: A newly discovered wiper malware dubbed "Lotus Wiper" targeted Venezuelan energy infrastructure in late 2025 and early 2026, demonstrating continued threat actor interest in disrupting power systems. The malware systematically destroys recovery mechanisms and overwrites drives.
  • CISA Leadership Vacuum: Sean Plankey has withdrawn his nomination as CISA director after waiting over a year for confirmation, leaving the agency without permanent leadership during a period of heightened nation-state threats and organizational upheaval.
  • Supply Chain Crisis Escalates: Multiple coordinated attacks against the npm ecosystem have been identified, including a self-propagating worm that steals developer tokens and malicious packages in the Checkmarx/KICS Docker repository, highlighting systemic vulnerabilities in software supply chains.
  • Nation-State Activity Intensifies: The UK's National Cyber Security Centre (NCSC) warns of a "perfect storm" driven by Russia, Iran, and China, while North Korean actors deploy new macOS attack techniques targeting financial institutions.
  • Critical Vulnerabilities: Microsoft issued emergency out-of-band patches for a critical ASP.NET Core privilege escalation flaw (CVE-2026-40372), while Oracle released 450 vulnerability patches in its April CPU, including over 300 remotely exploitable flaws.

Cross-Sector Concerns:

  • Serial-to-Ethernet converters used across critical infrastructure sectors contain significant security flaws that could enable remote compromise
  • AI-driven vulnerability discovery is accelerating, with Claude Mythos identifying 271 Firefox vulnerabilities, signaling a potential surge in disclosed flaws
  • Software Bill of Materials (SBOM) implementation challenges persist as supply chain attacks continue to rise

2. Threat Landscape

Nation-State Threat Actor Activities

United Kingdom Assessment

The UK's NCSC has issued a stark warning that the nation faces a cyber "perfect storm" driven by the convergence of rapid technological advancement and escalating nation-state threats. According to the agency's cyber chief, Russia, Iran, and China now represent the most serious cyberattack threats to the UK.

  • British businesses are advised to prepare defenses against potential large-scale targeting if the UK becomes involved in international conflict
  • The assessment reflects growing concerns about the weaponization of cyber capabilities in geopolitical disputes

Source: SecurityWeek

Harvester APT - South Asia Operations

The threat actor known as Harvester has deployed a new Linux variant of its GoGra backdoor targeting entities in South Asia. Key characteristics include:

  • Utilizes Microsoft Graph API for command-and-control communications
  • Leverages legitimate Microsoft Outlook infrastructure for stealthy payload delivery
  • Demonstrates sophisticated use of legitimate services to evade detection

Source: The Hacker News

Mustang Panda - Financial Sector Targeting

Chinese-linked APT Mustang Panda has deployed a new variant of LOTUSLITE malware with campaigns targeting:

  • Indian banking sector institutions
  • South Korean policy circles
  • The backdoor communicates with dynamic infrastructure, complicating detection and blocking efforts

Source: The Hacker News

North Korean Operations - macOS Focus

North Korean threat actors have expanded their macOS attack capabilities using:

  • AppleScript and ClickFix techniques in fresh attack campaigns
  • Primary targets include cryptocurrency firms, venture capital organizations, and blockchain entities
  • Represents continued evolution of DPRK financial theft operations

Source: SecurityWeek

Ransomware and Cybercriminal Developments

Kyber Ransomware - Post-Quantum Encryption

A new ransomware operation dubbed Kyber has emerged with concerning technical capabilities:

  • Targets both Windows systems and VMware ESXi endpoints
  • One variant implements Kyber1024 post-quantum encryption, potentially rendering current decryption approaches obsolete
  • Represents a significant evolution in ransomware encryption sophistication

Source: Bleeping Computer

Former Ransomware Negotiator Convicted

A former ransomware negotiator has pleaded guilty to abusing their position by working with the BlackCat/ALPHV cybercrime group, highlighting insider threat risks in the cybersecurity industry.

Source: Infosecurity Magazine

Caller-as-a-Service Operations

Research reveals that fraud operations now function like professional call centers with:

  • Formal hiring and training processes
  • Performance tracking metrics
  • Professionalized "Caller-as-a-Service" business models

Source: Bleeping Computer

Emerging Attack Vectors

NFC Tap-to-Pay Exploitation

Security researchers have documented new techniques for exploiting NFC tap-to-pay systems, representing a potential threat to payment infrastructure and financial services.

Source: CSO Online

Silent Subject Phishing Campaigns

A surge in phishing attacks using null/empty subject lines has been observed:

  • Campaigns specifically target VIP users and executives
  • Techniques include QR code abuse and Remote Monitoring and Management (RMM) tool exploitation
  • Designed to bypass traditional email security filters

Source: Infosecurity Magazine

macOS Living-off-the-Land Techniques

New research documents how threat actors are using macOS native tools and metadata abuse to conduct stealthy enterprise attacks while evading detection.

Source: Infosecurity Magazine


3. Sector-Specific Analysis

Energy Sector

Lotus Wiper - Venezuelan Energy Infrastructure Attack

A previously undocumented destructive malware called Lotus Wiper has been identified in attacks against Venezuelan energy systems conducted in late 2025 and early 2026:

Technical Capabilities:

  • Systematically targets and destroys recovery mechanisms
  • Overwrites drives to prevent data recovery
  • Methodically deletes files across compromised systems
  • Designed for maximum destructive impact on operational systems

Implications for Energy Sector:

  • Demonstrates continued threat actor interest in disrupting energy infrastructure
  • Wiper malware represents existential threat to operational continuity
  • Recovery from such attacks requires extensive offline backup capabilities
  • Timing coincides with geopolitical tensions involving Venezuela

Recommended Actions:

  • Review and test offline backup and recovery procedures
  • Implement network segmentation between IT and OT environments
  • Deploy behavioral detection capabilities for wiper malware indicators
  • Ensure critical systems have air-gapped backup copies

Sources: SecurityWeek, The Hacker News

Energy and War Production Concerns

A CSIS report warns that energy constraints could limit U.S. war production capabilities, highlighting the critical intersection of energy infrastructure security and national defense readiness.

Source: Homeland Security Today

Water & Wastewater Systems

DC Water Infrastructure Incident

The EPA and DOJ have filed suit against DC Water over a sewer collapse that triggered federal emergency response, highlighting infrastructure resilience concerns in the water sector.

Source: Homeland Security Today

Serial-to-Ethernet Converter Vulnerabilities

Critical security flaws have been identified in serial-to-Ethernet converters commonly used in water treatment facilities and other critical infrastructure:

  • These devices bridge legacy industrial systems with modern networks
  • Vulnerabilities could enable remote compromise of connected industrial systems
  • Water utilities should inventory and assess these devices immediately

Source: CSO Online

Communications & Information Technology

Supply Chain Attack Surge

Multiple coordinated attacks against software supply chains have been identified this week:

npm Ecosystem Worm:

  • Self-propagating malware spreading through stolen developer npm tokens
  • Compromised packages automatically attempt to spread to other projects
  • Targets developer credentials for further supply chain compromise

Checkmarx/KICS Docker Compromise:

  • Malicious images pushed to official "checkmarx/kics" Docker Hub repository
  • Demonstrates risk of trusting even official-appearing repositories

Malicious Developer Tools:

  • Malicious pgserve and automagik packages discovered in npm registry
  • Targets developers working with database and automation tools

Sources: The Hacker News, CSO Online, Bleeping Computer

SBOM Implementation Challenges

Despite regulatory push for Software Bill of Materials adoption, research indicates:

  • Supply chain attacks continue to rise despite SBOM requirements
  • Security teams struggle to operationalize SBOM data effectively
  • Missing component: governance-driven intelligence layer to translate SBOM/VEX data into actionable security decisions

Source: SecurityWeek

DDoS Attacks on Social Platforms

Following attacks on Bluesky, the Mastodon social network was targeted in a significant DDoS attack:

  • Attack caused major outage before mitigation within hours
  • Pattern suggests coordinated targeting of decentralized social platforms

Source: SecurityWeek

Financial Services

North Korean Targeting of Financial Institutions

DPRK threat actors continue aggressive targeting of financial sector entities:

  • Cryptocurrency exchanges and platforms
  • Venture capital firms
  • Blockchain technology companies
  • New macOS-specific attack techniques deployed

Indian Banking Sector Targeting

Mustang Panda's LOTUSLITE variant specifically targets Indian banking institutions, representing continued APT interest in financial sector compromise in South Asia.

NFC Payment Security Concerns

New exploitation techniques for NFC tap-to-pay systems warrant review of contactless payment security controls.

Healthcare & Public Health

HIPAA Security Developments

HHS OCR and NIST have announced an upcoming conference on HIPAA Security requirements scheduled for September 2026, indicating continued regulatory focus on healthcare cybersecurity.

Government Services

French Government Data Breach

Hackers claim to have stolen 19 million records from France Titres, a French government agency:

  • Scale of breach, if confirmed, represents significant government data exposure
  • Highlights ongoing targeting of government identity and records systems

Source: Security Magazine


4. Vulnerability & Mitigation Updates

Critical Vulnerabilities Requiring Immediate Attention

Microsoft ASP.NET Core - CVE-2026-40372 (CRITICAL)

Severity: Critical
Type: Privilege Escalation
Status: Emergency out-of-band patch released

  • Allows attackers to escalate privileges in ASP.NET Core applications
  • Microsoft released emergency patches outside normal update cycle
  • Action Required: Apply patches immediately to all ASP.NET Core deployments

Sources: The Hacker News, Bleeping Computer, CSO Online

Cohere AI Terrarium Sandbox - CVE-2026-5752 (CRITICAL)

Severity: 9.3 CVSS
Type: Arbitrary Code Execution / Container Escape

  • Affects Python-based Terrarium sandbox environment
  • Enables root code execution and container escape
  • Organizations using Cohere AI services should assess exposure

Source: The Hacker News

Oracle April 2026 Critical Patch Update

Patches Released: 481 new security patches across 28 product families

  • Over 300 fixes address remotely exploitable, unauthenticated vulnerabilities
  • Affects database, middleware, and enterprise application products
  • Action Required: Prioritize patching based on exposure and criticality

Source: SecurityWeek

D-Link DIR-823X Routers - CVE-2025-29635 (HIGH)

Severity: High
Type: Command Injection
Status: Actively exploited by Mirai botnet

  • Affects discontinued D-Link router models
  • Exploitation began one year after public disclosure and PoC release
  • No patches available for end-of-life devices
  • Action Required: Replace affected devices; implement network segmentation if replacement not immediately possible

Sources: SecurityWeek, Bleeping Computer

Microsoft SharePoint Spoofing Vulnerability

Status: Over 1,300 servers remain unpatched

  • Originally exploited as zero-day
  • Continues to be abused in ongoing attacks
  • Action Required: Verify SharePoint servers are patched; implement compensating controls if patching delayed

Source: Bleeping Computer

Apple iOS Notification Services Flaw

Apple released out-of-band security updates for iPhone and iPad:

  • Bug caused deleted notification data to remain stored on devices
  • Privacy implications for sensitive notifications

Source: Bleeping Computer

Serial-to-Ethernet Converters

Multiple vulnerabilities identified in devices used across critical infrastructure:

  • Commonly deployed in industrial control system environments
  • Could enable remote compromise of connected OT systems
  • Action Required: Inventory these devices; implement network segmentation; monitor for exploitation

Source: CSO Online

AI-Driven Vulnerability Discovery

Claude Mythos Firefox Vulnerability Discovery

Anthropic's Claude Mythos AI model identified 271 vulnerabilities in Mozilla Firefox:

  • Mozilla confirms all flaws could have been found by elite human researchers
  • Demonstrates AI capability to accelerate vulnerability discovery at scale
  • Anthropic is adopting EPSS (Exploit Prediction Scoring System) to prioritize the expected surge in AI-discovered vulnerabilities
  • Reports suggest unauthorized users may have accessed Claude Mythos, raising concerns about AI security tool misuse

Implications:

  • Organizations should prepare for increased vulnerability disclosure volume
  • Prioritization frameworks like EPSS become more critical
  • Patch management processes may need acceleration

Sources: SecurityWeek, CSO Online, Security Magazine

Recommended Defensive Measures

Priority Action Affected Systems
CRITICAL Apply Microsoft ASP.NET Core emergency patch All ASP.NET Core deployments
CRITICAL Review Oracle CPU and prioritize patching Oracle database, middleware, applications
HIGH Replace end-of-life D-Link routers DIR-823X and similar models
HIGH Audit npm dependencies for compromised packages Node.js development environments
HIGH Verify SharePoint server patch status Microsoft SharePoint deployments
MEDIUM Inventory and assess serial-to-Ethernet converters Industrial control systems

5. Resilience & Continuity Planning

Lessons from Recent Incidents

Wiper Malware Preparedness

The Lotus Wiper attack on Venezuelan energy infrastructure reinforces critical resilience requirements:

  • Offline Backups: Maintain air-gapped backup copies of critical system configurations and data
  • Recovery Testing: Regularly test restoration procedures from offline backups
  • Network Segmentation: Ensure OT networks are properly isolated from IT networks
  • Detection Capabilities: Deploy behavioral detection for file deletion and disk overwrite activities

Supply Chain Security

This week's npm ecosystem attacks highlight supply chain resilience needs:

  • Implement dependency scanning and monitoring
  • Use private package registries where possible
  • Require multi-factor authentication for developer accounts
  • Monitor for unauthorized package publications
  • Consider SBOM implementation with governance layer for actionable intelligence

Cross-Sector Dependencies

Energy-Defense Nexus

CSIS analysis warns that energy constraints could limit U.S. war production capabilities, highlighting:

  • Critical interdependency between energy infrastructure and defense industrial base
  • Need for resilience planning that accounts for surge capacity requirements
  • Importance of protecting energy infrastructure as national security priority

Climate-Infrastructure Interactions

Multiple reports this week address climate impacts on infrastructure:

  • NATO report on climate change effects on security
  • GAO identifies gaps in Pentagon disaster tracking and resilience planning
  • Two decades of extreme weather impacts on U.S. military infrastructure documented

Public-Private Coordination

UK Cyber Resilience Pledge

The UK government has announced £90 million in cybersecurity funding alongside a new "Cyber Resilience Pledge" initiative:

  • Focus on boosting SME resilience
  • Promotion of Cyber Essentials certification
  • Model may inform similar U.S. initiatives

Source: Infosecurity Magazine

NCSC SilentGlass Device

The UK's NCSC has unveiled SilentGlass, a plug-in device designed to protect monitors from cyber-attacks:

  • Devices will be available for purchase by organizations worldwide
  • Addresses emerging threat of monitor-based attacks

Source: Infosecurity Magazine


6. Regulatory & Policy Developments

Federal Leadership Changes

CISA Director Nomination Withdrawn

Sean Plankey has withdrawn his nomination as CISA director after waiting more than a year for Senate confirmation:

  • Leaves CISA without permanent leadership during period of heightened threats
  • Agency reportedly experiencing organizational upheaval
  • Critical infrastructure stakeholders should monitor for policy continuity impacts

Source: CyberScoop

Privacy Legislation

House Republicans National Privacy Bill

House Republicans have introduced new federal privacy legislation:

  • Takes inspiration from Virginia and Kentucky state privacy laws
  • Experts note lack of bipartisan support could limit passage prospects
  • Organizations should monitor for potential compliance implications

Source: CyberScoop

Legal Developments

Supreme Court Geofence Warrant Case

The Supreme Court is preparing to decide Chatrie v. United States, which addresses:

  • How far geofence warrants can extend
  • What "probable cause" means when searches start with everyone in a geographic area
  • Implications for location data collection and privacy

Source: CyberScoop

ICE Spyware Use Confirmed

ICE has admitted to using Graphite spyware from Israeli company Paragon Solutions, raising questions about government surveillance tool deployment and oversight.

Source: Schneier on Security

International Developments

Chinese Telegram Marketplace Evolution

Research from Recorded Future documents the evolution of Chinese-language "guarantee" marketplaces on Telegram:

  • Increasingly popular among Chinese-speaking criminal groups
  • Continued operation despite 2025 shutdown of Huione Guarantee
  • Implications for understanding criminal ecosystem resilience

Source: Recorded Future

SIM Farm Infrastructure Exposed

Researchers have uncovered ProxySmart software powering over 90 SIM farms:

  • Enables SIM farm activity at "industrial scale"
  • Supports fraud, account creation, and verification bypass operations

Source: Infosecurity Magazine


7. Training & Resource Spotlight

Upcoming Training Opportunities

NIST Cybersecurity Open Forum

Date: April 30, 2026
Host: Red Hat, NIST, and Office of Space Commerce
Topic: Improving the Nation's Cybersecurity (Fifth Annual)
Relevance: Policy and technical discussions on national cybersecurity priorities

Source: NIST

NICE Webinar: Beyond Technical Skills

Date: May 13, 2026
Topic: The Human Element of a Cyber Career
Speakers: Jeff Welgan (Skillrex), Dr. Qianqian Zhang (Rowan University), Daniel Eliot (NIST)
Relevance: Workforce development and soft skills for cybersecurity professionals

Source: NIST

NIST Workshop on AI Incident Management

Date: May 14, 2026
Host: NIST
Topic: AI Incident Management
Relevance: Emerging frameworks for managing AI-related security incidents

Source: NIST

AI for Manufacturing Workshop

Date: May 27, 2026
Host: NIST
Topic: AI integration in manufacturing

Disclaimer

This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.