Advisory ID: ngCERT-2026-040003
SUMMARY
ngCERT is aware of multiple critical and high-severity vulnerabilities in Zoom products, including Zoom Workplace, Zoom Clients, Zoom Rooms, and VDI components. These vulnerabilities, tracked under several CVEs (CVE-2026-30900 to CVE-2026-30903), range from privilege escalation and command injection to improper input validation and path handling flaws. Successful exploitation may allow threat actors to achieve privilege escalation, unauthorized access, and system compromise. These flaws impact widely deployed enterprise collaboration tools, making them high-value targets for threat actors. Organisation and individuals are advised to immediately remediate these vulnerabilities.
DESCRIPTION
Zoom Products is a unified communications platform for video conferencing, chat, webinars, and collaboration across multiple operating systems. Multiple vulnerabilities stemming from multiple weaknesses in Zoom’s Windows-based components, including improper privilege management, insufficient input validation, and inadequate file path handling. The most critical flaw, CVE-2026-30903, involves external control of file names or paths within the Zoom Workplace Mail feature, allowing unauthenticated attackers to manipulate file operations and escalate privileges remotely. Additional vulnerabilities, CVE-2026-30902 (improper privilege management), CVE-2026-30901 (input validation flaw), and CVE-2026-30900 (improper version check), further enable attackers to elevate privileges or bypass security controls under certain conditions. These vulnerabilities expose Windows systems to both local and remote exploitation scenarios, particularly when systems are unpatched or misconfigured.
Damage: Critical (CVSS 7.8)
Probability: High
Platform(s): Windows
CONSEQUENCES
Exploitation of these vulnerabilities may result in:
- Privilege escalation.
- Denial of Service (DoS).
- Sensitive data exposure.
- Remote Code Execution (RCE).
- Cross-Site Scripting (XSS) and data manipulation.
- Operational and business disruption/risk.
- Malware/Ransomware Deployment.
SOLUTION/MITIGATION
ngCERT recommends the following:
- Update all Zoom products to the latest versions and apply patched releases (Zoom Security Bulletins - ZSB-26001 to ZSB-26005).
- Enable automatic updates across all Zoom clients and components.
- Monitor for abnormal privilege escalation events.
- Remove or upgrade deprecated/unsupported Zoom versions.
- Enforce endpoint protection (EDR/antivirus) and monitor for suspicious activity.
HYPERLINK
Advisory ID: ngCERT-2026-040001
SUMMARY
ngCERT is aware of an ongoing ClickFix (pastejacking) campaign targeting developers and users of AI tools. The campaign distributes Atomic macOS Stealer (AMOS), a sophisticated information-stealing malware affecting macOS systems. The attack leverages social engineering techniques to trick users into executing malicious terminal commands. Organisations and individuals are strongly advised to exercise caution and implement appropriate security controls.
DESCRIPTION
ClickFix (pastejacking) is a social engineering technique that manipulates users into copying and executing malicious commands from deceptive sources such as fake documentation pages, malicious advertisements, or AI-generated content. In this campaign, attackers disguise harmful terminal commands, often obfuscating them with encoding techniques such as base64, as legitimate setup or troubleshooting instructions. Once executed, these commands download and install AMOS. The malware establishes persistence on the compromised system, harvests sensitive information (including credentials and files), and may deploy additional backdoors to enable persistent remote access.
Damage: Critical
Probability: High
Platform(s): macOS
CONSEQUENCES
If successfully exploited, this campaign may result in:
- Credential theft, including browser-stored passwords and Apple Keychain data.
- Unauthorized remote access through backdoor mechanisms.
- Data exfiltration, including sensitive files and developer assets.
- Compromise of cryptocurrency wallets and financial information.
- Deployment of additional malware and further system exploitation.
- Organisational risks such as supply chain compromise and credential leakage.
SOLUTION/MITIGATION
ngCERT recommends the following:
- Avoid executing terminal commands from untrusted sources, including advertisements, unknown websites, or unverified AI-generated content
- Verify all documentation and instructions, ensuring they originate from official vendor domains
- Educate users and developers on pastejacking techniques and social engineering risks
- Deploy Endpoint Detection and Response (EDR) solutions to monitor suspicious shell activity
- Restrict and monitor script execution on macOS systems
- Enable and maintain built-in protections such as Gatekeeper and XProtect
- Regularly update macOS and security tools to detect emerging threats
- Monitor for unusual outbound network traffic and unauthorized persistence mechanisms
- Implement least-privilege access controls to limit the impact of compromised accounts
HYPERLINK
- https://www.sophos.com/en-us/blog/evil-evolution-clickfix-and-macos-infostealers
- https://www.bleepingcomputer.com/news/security/claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack/
- https://smechannels.com/kaspersky-discovers-infostealers-mimicking-claude-code-openclaw-and-other-ai-developer-tools/
Advisory ID: NCC-CSIRT-2026-014
Summary:
The Nigerian Communications Commission Computer Security Incident Response Team (NCC-CSIRT) alerts stakeholders to an ongoing ransomware campaign attributed to the XP95 Ransomware Group, which has recently targeted government institutions and critical sectors globally.
The attackers employ data exfiltration and extortion techniques, compromising sensitive information and threatening public disclosure unless ransom demands are met. Recent incidents indicate a rapid escalation in the group’s activities, with multiple high-impact breaches recorded within a short timeframe.
Given similarities in system vulnerabilities and cybersecurity posture across institutions, Nigerian organizations, particularly within government and critical infrastructure sectors, are at elevated risk of similar attacks.Damage: Critical
Probability: High
Product(s)
- Enterprise IT Systems
- Government Databases
- Healthcare Information Systems
- Web Applications and Network Infrastructure
Version(s):
- All unpatched or improperly configured systems
- Systems with weak authentication mechanisms
Platform(s):
- Windows
- Linux
- Cloud-based environments
- On-premise enterprise networks
Description:
The XP95 ransomware group is an emerging and highly active threat actor known for targeting data-rich organizations, including government agencies and healthcare providers.
Recent reported incidents include:
- A South African government agency breach involving over 453,000 files ( approximately 154GB) of sensitive data.
- A Spanish healthcare software provider was compromised, resulting in the exfiltration of approximately 165GB of patient data.
- Additional attacks on provincial government institutions targeting job seekers and student databases.
The group’s attack techniques involve:
- Exploiting unpatched software vulnerabilities
- Leveraging weak authentication and poor password practices
- Gaining unauthorized access to enterprise networks
- Exfiltrating large volumes of sensitive data
- Issuing ransom demands with threats of public data release
Impacts:
- Large-scale data breaches involving sensitive information
- Financial loss due to ransom payments and remediation costs
- Disruption of critical services and operations
- Reputational damage and loss of public trust
- Regulatory and legal implications
Threat Types:
- Ransomware (Double Extortion)
- Data Exfiltration
- Unauthorized Network Access
- Exploitation of System Vulnerabilities
Solutions/Mitigations:
NCC-CSIRT recommends the following mitigation steps:
- Apply timely security patches and updates across all systems
- Conduct regular vulnerability assessments and penetration testing
- Enforce Multi-Factor Authentication (MFA)
- Implement strong password policies
- Adopt least-privilege access principles
- Segment critical networks
- Deploy Intrusion Detection and Prevention Systems (IDS/IPS)
- Monitor for unusual network activity
- Maintain regular, secure, and offline backups
- Test backup restoration procedures periodically
- Implement Security Information and Event Management (SIEM) solutions
- Establish and regularly update incident response plans
- Conduct regular cybersecurity awareness training
- Educate users on phishing and social engineering risks
References:
-
https://redpiranha.net/news/threat-intelligence-report-march-3-march-9-2026
-
https://www.upguard.com/news/statistics-south-africa-data-breach-2026-03-31
-
https://databreaches.net/2026/03/30/south-african-government-agency-and-spanish-psychological-software-provider-victims-of-cyberattacks-by-xp95/
-
https://witness.co.za/news/2026/03/30/stats-sa-confirms-data-breach-hackers-demand-ransom/
-
https://helm.news/2026-03-30/stats-sa-confirms-ransomware-attack-hr-database-group-xp-demanding-ransom.html
-
https://app.megazone.fm/news/c/0/i/95713595/stats-sa-hit-ransomware-attack-over-450000-files-compromised
Advisory ID: NCC-CSIRT-2026-012
Summary:
Damage: Critical
Probability: High
Product(s)/Platform(s):
The campaign does not target a specific vendor product but rather infrastructure commonly used in telecommunications environments, including:
- Linux Servers and Web Servers
- Edge Network Devices
- Telecom Core Network Systems
- Subscriber Databases
- Call Data Record (CDR) Systems
- Network Management Systems
- Cloud Infrastructure and SaaS Platforms
Indicators of Compromise (IOCs):
- Suspicious connections to Google Sheets API or unusual SaaS API traffic
- Unknown system services (e.g., xapt.service)
- Unauthorized SSH lateral movement
- Use of SoftEther VPN connections
- Unknown service accounts
- Persistent malware in /usr/sbin directories
- Unusual outbound encrypted connections
- Cloud API traffic from servers that normally do not use cloud services
Description:
Impacts:
- Gain persistent access to telecom networks
- Monitor communications and subscriber data
- Access call data records and SMS metadata
- Conduct surveillance on targeted individuals
- Move laterally across telecom infrastructure
- Maintain long-term undetected access
- Compromise government communications
- Access lawful interception systems
Threat Types:
- Cyber Espionage
- Advanced Persistent Threat (APT)
- Backdoor Malware
- Command and Control (C2)
- Data Exfiltration
- Network Intrusion
- Persistence / Unauthorized Access
Solutions/Mitigations:
NCC-CSIRT recommends the following mitigation steps:
- Patch and secure all public-facing web servers and edge devices.
- Strictly monitor outbound connections to cloud services such as Google Sheets, Google Drive, and other SaaS platforms.
- Implement network segmentation within telecom infrastructure.
- Monitor for unauthorized system services and persistence mechanisms.
- Audit service accounts and SSH access logs.
- Deploy Endpoint Detection and Response (EDR) solutions on critical servers.
- Implement multi-factor authentication for administrative accounts.
- Monitor VPN usage and block unauthorized VPN tools such as SoftEther.
- Conduct threat hunting for advanced persistent threats.
- Review access to subscriber databases and call data record systems.
References:
Advisory ID: NCC-CSIRT-2026-013
Summary:
Damage: Critical
Probability: High
Product(s):
Linux-based enterprise servers
Version(s):
No specific version; affects general Linux distros
Platform(s):
Linux (Ubuntu, Debian, CentOS, RHEL); virtualized cloud instances
Indicators of Compromise (IOCs):
Organizations are advised to cross-check the following IoCs with their SIEM and endpoint monitoring tools:
- Unexpected kernel modules loaded on Linux servers
- Unauthorized system services or startup scripts
- Outbound connections to unusual cloud storage APIs from critical servers
- Unauthorized file changes in system directories (/etc, /usr/bin)
- Anomalous processes running with root privileges
Description:
Impacts:
- Compromise of Sensitive Data
- Unauthorized System Control
- Lateral Network Compromise
- Operational Disruption
- Long-Term Surveillance
- Reputational and Regulatory Impact
- Financial Consequences
Threat Types:
- Advanced Persistent Threat (APT)
- Kernel-Level Malware / Rootkit
- Data Exfiltration / Espionage
- Unauthorized Access / Privilege Escalation
- Command-and-Control (C2) Abuse
- Lateral Movement
- Telecom / Infrastructure Disruption
Solutions/Mitigations:
NCC-CSIRT recommends the following mitigation steps:
- Isolate compromised systems from the network
- Conduct full system integrity checks and Memory Forensics
- Monitor unusual outbound connections to cloud services
- Apply the latest OS and kernel security updates and disable unused services and accounts
- Restrict administrative and root access
- Implement network and host-based anomaly detection
- Monitor for abnormal process execution and kernel module loading
- Review system logs for unauthorized access events
- Implement UEFI Secure Boot where possible to prevent the loading of unsigned malicious kernel modules
References:
-
https://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign
-
https://thehackernews.com/2026/02/google-disrupts-unc2814-gridtide.html
-
https://www.reuters.com/sustainability/boards-policy-regulation/google-disrupts-chinese-linked-hackers-that-attacked-53-groups-globally-2026-02-25/
-
https://www.csoonline.com/article/4137834/china-linked-hackers-used-google-sheets-to-spy-on-telecoms-and-governments-across-42-countries.html
- Apple Fixes WebKit Vulnerability That Could Allow Malicious Websites Access User Data
- NCC-CSIRT Cybersecurity Advisory on Rogue Cellular Network Attacks and Mobile Signal Hijacking Used for Banking Fraud
- NCC-CSIRT Cybersecurity Advisory on Global Server Espionage Campaign on Telecom and Government Entities
- NCC-CSIRT Cybersecurity Advisory on LockBit Strikes with New 5.0 Version Targeting Windows, Linux, and ESXi Systems