AV | This Week in Cybersecurity
- Glen Armes
- 2 days ago
- 4 min read
2026 Week 5

This week’s signals put cybercriminals cross hairs on identity and trust breakpoints. Attackers are abusing SSO/MFA processes to reach cloud data, supply-chain style tampering via legitimate update paths, and continued pressure from data-only extortion (steal → threaten → leak).
Late breaking but highly relevant, the Notepad++ updater traffic hijack highlights how “routine updates” can become an adversary-controlled delivery channel. Meanwhile, exposed databases remain a reliable monetization path (extortion without “ransomware”), and automation platforms running internet-exposed workflows are being targeted for RCE.
Operationally, the direction of risk is for organizations with weak IAM hygiene (stale accounts, weak SSO monitoring, permissive OAuth), and for teams behind on patching known-exploited enterprise platforms.
Key Signals (What AV is watching)
SSO abuse + cloud data theft: adversaries targeting identity flows and post-auth access paths over “break-in” exploits.
Trusted distribution channels as attack surfaces: software update infrastructure and browser extension ecosystems remain highly leveraged delivery mechanisms.
Exposed data stores feeding extortion campaigns: misconfigured / publicly reachable databases continue to be attacked and extorted.
Known-exploited enterprise vulns: CISA KEV additions and reporting emphasize “patch gap” risk (vCenter noted).
Insider risk is back on the front page: CISA messaging is pushing critical infrastructure to formalize insider threat management teams and practices.
Threats & Campaigns (This week’s so what)
SSO/MFA and helpdesk-adjacent abuse to reach cloud data: Attackers are operationalizing identity focused playbooks; vishing/social engineering + SSO workflow manipulation + rapid data access/exfiltration once authenticated.
Supply chain / update-path tampering: Late-breaking but critical: Notepad++ update traffic was reportedly hijacked for months in 2025 with selective targeting, highlighting how “normal updates” can mask compromise.
Database exposure → data attack → extortion MongoDB instances exposed to the internet remain a recurring extortion target, reinforcing the need for hard default-deny posture and continuous exposure monitoring.
Automation / workflow platforms exposed to RCE: Internet-exposed n8n instances are being highlighted for sandbox escape → RCE risk, particularly where deployments are unmanaged and publicly reachable.
Data-only extortion hits major brands: Nike is investigating claims of large-scale data theft and leakage by an extortion group - reinforcing “steal-and-leak” as a primary business risk even without encryption.
Critical Vulnerabilities (Action-focused)
VMware vCenter Server: bug added to CISA-known exploited narrative (patch gap risk; treat as urgent if exposed/accessible).
SolarWinds Web Help Desk: reported critical RCE/auth bypass risk - review exposure and patch/mitigate quickly.
Microsoft: roadmap signal - NTLM being disabled by default in future Windows releases; start dependency discovery now to avoid change-driven outages later.
n8n sandbox escape/RCE: prioritize patching and restrict exposure (no direct internet access).
What this means (Business impact translation)
Identity continues to be the new perimeter: if SSO/MFA workflows are poorly monitored, attackers can “legitimately” authenticate and exfiltrate at speed.
Operational disruption risk rises with legacy auth: NTLM reduction will force modernization; organizations that delay discovery/testing risk outages.
Extortion without encryption is here to stay you can “win” on backups and still lose on data exposure, IP leakage, regulatory duty, and reputational impact (Nike/SoundCloud pattern).
Recommended actions (Do this first)
Top 10, prioritized
SSO hardening sprint (Week 1): enforce phishing-resistant MFA where feasible; tighten conditional access; block legacy auth paths.
SSO telemetry (Week 1): alert on impossible travel, new device enrollment, MFA resets, admin consent grants, anomalous token use.
OAuth/app governance (Week 2): restrict marketplace installs; enforce admin approval; review high-risk scopes.
Exposure management (Week 1–2): continuous scans for public databases, admin panels, automation tools (MongoDB, n8n).
Patch the patch-gap systems (Week 1): prioritize internet-adjacent management platforms (vCenter, help desk tooling).
Software update trust controls (Week 2): certificate/signature validation enforcement; egress allowlisting for update channels where possible.
Data exfil controls (Week 2–3): CASB/DLP tuned for bulk download, mass sharing, unusual API pulls.
Insider threat basics (Week 2): define a multi-disciplinary team, escalation paths, and “trusted user” anomaly playbooks.
Vendor access hygiene (Week 2): shorten token lifetimes; just-in-time admin; session recording for privileged SaaS actions.
Executive comms (Week 1): “data-only extortion” tabletop scenario and decision tree (pay/no-pay, disclosure triggers, comms timing).
FAIR QuickQuant (Week 5 scenarios annualized)
Scenario QQ-1: SSO compromise → SaaS data exfiltration (↑)
Loss Event Frequency (LEF): 0.5 - 2.0 / year
Loss Magnitude (LM): $750k- $6.0M per event (primary + secondary)
Annualized Loss Exposure (ALE): $0.4M - $12.0M / year
Scenario QQ-2: Exposed database (MongoDB) → extortion + recovery (↑)
Loss Event Frequency (LEF): 0.25 - 1.0 / year
Loss Magnitude (LM): $250k - $2.5M per event
Annualized Loss Exposure (ALE): $62.5k - $2.5M / year
Scenario QQ-3: Internet-exposed automation tool (n8n) → RCE + lateral movement (↑)
Loss Event Frequency (LEF): 0.25 - 0.75 / year
Loss Magnitude (LM): $500k - $4.0M per event
Annualized Loss Exposure (ALE): $125k - $3.0M / year
FAIR-CAM Control Mapping (directly reducing this week’s risks)
Avoidance: eliminate public exposure of admin/workflow/DB services; deprecate legacy auth dependencies (NTLM discovery migration and testing plan).
Deterrence: stronger auth policies, device compliance, conditional access; vendor access terms + logging requirements.
Resistance: phishing-resistant MFA; SSO token protections; OAuth app governance; secure update verification controls.
Response: identity incident runbooks (MFA reset fraud, SSO compromise), rapid revocation, eDiscovery readiness for extortion cases.
Detection & Monitoring (minimum viable signals)
SSO: admin consent grants, token replay anomalies, suspicious MFA resets, new IdP app integrations
SaaS: bulk export/download, unusual API rates, new “sharing” spikes
Network: unexpected egress to cloud storage, “update servers” outside allowlist
Exposure: continuous scan for internet-facing DBs and automation panels
Questions to drive decisions this week
Which SSO events do we alert on today vs. only log?
Do we have a complete NTLM dependency map and migration timeline?
Can we prove that no public MongoDB (or equivalent) is reachable right now?
Are vCenter/helpdesk systems isolated, patched, and monitored as “crown-jewel admin attack surfaces”?




Comments