Cybersecurity News Digest: Outlook Add-Ins, APT Campaigns, and Patch Tuesday

This Week in Cyber Threats: Supply Chain Attacks, Cross-Platform RATs, and Zero-Day Exploits

The digital threat landscape continues to evolve at a breakneck pace, with adversaries refining their tactics to exploit both human nature and technological complexity. This week underscores a dangerous trifecta: the weaponization of trusted software ecosystems, the relentless targeting of critical national infrastructure by sophisticated APT groups, and the urgent need for organizations to patch known vulnerabilities that are actively being exploited. From malicious add-ins in widely-used productivity suites to cross-platform malware campaigns, the incidents highlight that security is no longer just about perimeter defense but requires continuous vigilance across the entire software supply chain and cloud environment. Proactive defense and timely patching have never been more critical.

🔌 First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Security researchers have uncovered a novel and concerning supply chain attack vector: a malicious Microsoft Outlook add-in. In this campaign, threat actors seized control of a domain belonging to an abandoned but legitimate add-in. They then used this foothold to serve a convincing fake Microsoft login page, tricking users into handing over their credentials. This method is particularly insidious because it exploits the inherent trust users place in official-looking extensions within a trusted application like Outlook.

The attack, detailed by Koi Security, successfully harvested over 4,000 credentials before being discovered. This incident marks a significant escalation in supply chain attacks, moving beyond compromised software libraries to target the extensibility of major desktop applications. It demonstrates how attackers are constantly seeking new, low-friction entry points into corporate environments, bypassing traditional email security gateways by operating from within a trusted application itself.

Why this matters: This attack shatters the assumption that add-ins from the official store or familiar sources are always safe. It highlights a critical gap in security awareness and monitoring for third-party integrations within core business software. Organizations must now scrutinize and manage add-ins with the same rigor as any other third-party software.

Read Source

🇮🇳 APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Advanced Persistent Threat (APT) groups linked to geopolitical interests remain highly active, with APT36 (Transparent Tribe) and SideCopy launching sophisticated campaigns targeting Indian defense and government-aligned organizations. These campaigns are notable for their cross-platform nature, deploying remote access trojans (RATs) designed to compromise both Windows and Linux systems. The use of malware families like Geta RAT, Ares RAT, and DeskRAT indicates a focus on persistent access and data exfiltration.

The targeting of Linux environments is a key evolution, reflecting the increasing use of Linux servers and workstations in critical infrastructure and government sectors. By developing and deploying tools for multiple operating systems, these threat actors ensure they can maintain a foothold regardless of the victim’s environment, maximizing their chances of success and intelligence gathering.

Why this matters: This campaign underscores the persistent, state-aligned cyber espionage threat facing national security entities. The shift to cross-platform attacks means defenders can no longer consider Linux a “safe haven” by default. It demands a unified security strategy that protects all endpoints, regardless of OS.

Read Source

🛡️ Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

February’s Patch Tuesday was a massive coordinated effort, with over 60 software vendors releasing critical security updates. This ecosystem-wide patching event highlights the interconnected nature of modern IT, where vulnerabilities in operating systems, cloud services, and network infrastructure can create cascading risks. The sheer volume of fixes underscores the constant discovery of flaws that could be leveraged in attacks.

While Microsoft’s release of 59 patches—including six actively exploited zero-days—grabbed headlines, the simultaneous updates from other major vendors like Adobe, SAP, Cisco, and cloud providers are equally critical. This collective action is essential because attackers often look for the weakest link in a network; an unpatched router or a vulnerable cloud service can be just as valuable an entry point as an unpatched Windows server.

Why this matters: Patch management is a monumental but non-negotiable task. The existence of six known, exploited zero-days in the wild creates a race between defenders applying fixes and attackers scanning for unpatched systems. A holistic, prioritized patching strategy that encompasses all vendor software is essential for enterprise security.

Read Source

☁️ Exposed Training Apps Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

A pervasive and often overlooked risk has emerged in corporate cloud environments: intentionally vulnerable training applications. Tools like OWASP Juice Shop, DVWA, and Hackazon are designed for security education but are frequently deployed in cloud environments without proper isolation or security controls. Attackers are actively scanning for these exposed applications, which serve as perfect, low-resistance entry points.

Once attackers compromise these demo apps, they don’t just stop there. They leverage the access to move laterally, deploy cryptocurrency mining software (cryptojacking), and establish persistence in the cloud tenant. This exploits the victim’s computing resources for profit and can lead to significant cloud bills, data breaches, and compliance violations, all stemming from a well-intentioned training setup.

Why this matters: This is a stark reminder that any internet-facing asset, even those meant for “training,” must be secured. The assumption that these apps are harmless is dangerous. It highlights critical gaps in cloud security posture management (CSPM) and the need for strict governance over what is deployed in production cloud environments.

Read Source

⚠️ Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Delving deeper into Microsoft’s Patch Tuesday, the details are alarming. The tech giant addressed 59 flaws, with six already under active exploitation by threat actors. These zero-days span various Windows components and could allow attackers to bypass security features, escalate privileges, execute remote code, or cause denial-of-service conditions. The fact that they were exploited before a patch was available represents the highest level of immediate threat.

The breakdown of the vulnerabilities—25 privilege escalation flaws, followed by remote code execution and information disclosure bugs—paints a clear picture of the attacker’s kill chain. They often chain these vulnerabilities together: first gaining a foothold, then escalating privileges to gain administrative control, and finally moving to execute their payload or steal data. Patching these flaws disrupts every stage of this process.

Why this matters: Actively exploited zero-days are a “patch immediately” emergency. They are the weapons in an attacker’s arsenal for which there is no prior defense. The prevalence of privilege escalation bugs highlights the critical importance of following the principle of least privilege on all systems to limit the potential damage even if an initial breach occurs.

Read Source

Key Takeaways for Security Teams:

  • Audit & Lock Down Add-Ins: Review and restrict third-party add-ins/extensions in productivity suites like Outlook. Implement an approval process for any new integrations.
  • Assume Cross-Platform Threats: Extend your endpoint detection and response (EDR) and rigorous hardening standards to Linux and macOS systems, not just Windows.
  • Prioritize Patching, Especially Zero-Days: Develop a rapid response process for Patch Tuesday and critical out-of-band updates. The six exploited Microsoft zero-days should be your top priority.
  • Secure Your Cloud Demo/Training Environments: Isolate intentionally vulnerable applications in separate cloud accounts or VPCs with no connection to production assets. Tear them down when not in use.
  • Adopt a Supply Chain Security Mindset: Every piece of software, from the OS kernel to a simple Outlook plugin, is part of your attack surface. Trust must be verified, not assumed.