AV | This week in Cybersecurity
- Glen Armes
- Feb 24
- 5 min read
2026 Week 9

This week’s threat actor pattern is simple, when attackers can’t break identity, they sidestep security controls through internet exposed admin login pages, weak admin credentials, and login methods that aren’t as tightly controlled as primary sign-ins. That speed of compromise is accelerating as adversaries are using generative AI and automation to compress the time for initial access, internal recon, credential extraction and ultimately deploying ransomware or high jacking data.
At the same time, we’re seeing mobile threat capability using generative AI at runtime and iOS spyware to add undetected foot holds that reduce user-visible signals (mic/camera indicators). This isn’t “mobile privacy”, this is operational security risk for mobile devices including BYOD or mobile devices where employees can install any app on from the app stores freely.
Key Signals (What AV is watching)
Access paths defeat identity posture controls as we have seen over the last week with attackers defeating MFA by exploiting alternative access and authentication workflows and admin logins to get in.
AI is acting as a skill amplifier elevating low-to-medium skill actors allowing them to now scale reconnaissance, scripting, and lateral movement faster than companies can defend assets from cybercriminals.
KEV-style urgency is becoming normal with expectations to “patch within days”. This reaction isn’t cutting it any longer and unless a risk-based approach is used admin logins and non-primary authentication workflows will continue to be compromised.
Threats & Campaigns (This week’s “so what”)
FortiGate compromise at scale (AI-assisted): Amazon reports a Russian-speaking actor breached 600+ FortiGate firewalls across 55 countries in ~5 weeks by targeting internet-exposed management interfaces + weak credentials (no MFA), then using AI/automation for recon and expansion.
BeyondTrust RCE now used in ransomware: CISA warns the BeyondTrust RCE is actively exploited and now showing up in ransomware activity, treat internet-reachable / vendor-accessible deployments as emergency exposure.
Microsoft Entra device-code vishing: attackers are using phone-based social engineering to get victims to complete device code authentication, enabling account takeover that can bypass typical phishing filters.
PromptSpy (Android) uses generative AI at runtime: first known Android malware observed to invoke GenAI while running, supporting adaptive behavior like content generation and command shaping. This is an escalation in “malware flexibility” on mobile assets.
PayPal breach disclosure (6-month exposure window): PayPal disclosed a breach that exposed user information for ~6 months, reinforcing that “slow-burn” monitoring failures still drive material exposure.
Healthcare ransomware disruption (operational impact): ransomware events continue to translate directly into real-world service disruption such as clinic closures and other outage affects. This keeps availability as a board-level risk driver.
Critical Vulnerabilities (Action-focused)
BeyondTrust RCE (actively exploited; now tied to ransomware) → prioritize immediately; isolate if patching is delayed.
Identity-adjacent auth abuse (Entra device code) → not a CVE, but a high-frequency pathway; implement policy controls + detections immediately.
Internet-exposed management interfaces (FortiGate class) → even without a 0-day, exposure + weak creds creates a “practical KEV.”
Mobile asset escalation (PromptSpy runtime GenAI) → increase MTD/MDM attention, especially for exec/BYOD.
What this means (Business impact translation)
Your “admin management tools” are adjusting the perimeter. If attackers access admin logins (cloud infrastructure, firewalls, remote access, privileged tooling), they can rapidly map your environment and reach high-value systems.
Social engineering is still the cheapest attack method. Device-code vishing creates a reliable, repeatable way to bypass many perimeter controls.
Mobile compromise is converging with enterprise compromise. Adaptive mobile malware + spyware stealth reduces early warning and increases the risk of credential/session exposure from “trusted” devices.
Recommended actions (Do this first)
Top 10, prioritized
Eliminate internet exposure of management interfaces (firewalls, VPN, admin consoles) wherever possible; require VPN/allowlisting if needed.
Enforce MFA on all admin logins and confirm it’s actually enforced for local/device admin accounts and cloud infrastructure not just SSO.
Emergency patch / isolate BeyondTrust; treat as assume compromised if exposure paths are unclear.
Entra device-code hardening: restrict device code flow where feasible; implement conditional access policies; alert on anomalous device-code sign-ins.
Credential hygiene for perimeter devices: unique VPN creds (not shared with AD), disable weak accounts, rotate secrets used on edge tooling.
Backup infrastructure hardening: isolate backup servers, restrict admin access, and validate restore time objectives as attackers increasingly target backups first.
Identity hunting focus: token abuse, impossible travel, new risky app consents, and unusual sign-in velocity.
Mobile baseline uplift: enforce OS patch SLAs, restrict sideloading, and apply stronger controls to exec/BYOD populations (PromptSpy-style risk).
Exposure monitoring discipline: continuous checks for “admin plane exposed,” “MFA missing,” “weak cipher/config,” and “new external ports opened.”
Executive comms/tabletop: run a 60-minute “edge admin plane compromise” scenario including decision triggers: isolation, customer comms, restore strategy, law enforcement).
FAIR QuickQuant (Week 9 scenarios annualized)
Scenario QQ-1: Exposed management login → credential compromise → ransomware / disruption (↑)
Loss Event Frequency (LEF): 0.5 – 2.0 / year
Loss Magnitude (LM): $1.2M – $12.0M per event
Annualized Loss Exposure (ALE): $0.6M – $24.0M / year
Why: validated scale pattern (600+ devices), opportunistic targeting, and fast pivot from edge to internal reconnaissance.
Scenario QQ-2: Device-code vishing → Entra takeover → data/mailbox exposure (↑)
Loss Event Frequency (LEF): 0.25 – 1.0 / year
Loss Magnitude (LM): $300k – $6.0M per event
Annualized Loss Exposure (ALE): $75k – $6.0M / year
Why: high-success social engineering pattern that bypasses many traditional email defenses.
Scenario QQ-3: Consumer/fintech exposure window → downstream fraud + notification cost (→)
Loss Event Frequency (LEF): 0.25 – 0.75 / year
Loss Magnitude (LM): $500k – $8.0M per event
Annualized Loss Exposure (ALE): $125k – $6.0M / year
Why: exposure windows create prolonged opportunity for fraud and account abuse; impacts vary by data types and controls.
FAIR-CAM Control Mapping (directly reducing this week’s risks)
Avoidance: remove internet exposure of admin login; disable unused auth flows; reduce public attack surface.
Deterrence: phishing-resistant MFA for privileged/admin access; reduce standing privilege; enforce strong auth policies for device-code usage.
Resistance: harden edge devices; continuous configuration validation; rapid patch/mitigation path for actively exploited items.
Response: identity IR runbooks (token revocation, session reset, mailbox investigation), and ransomware containment/restore playbooks.
Detection & Monitoring (minimum viable signals)
Identity: device-code sign-ins, unusual MFA prompts, risky sign-in spikes, impossible travel, abnormal token refresh.
Admin login: new local admins, config exports, geo/ASN anomalies, repeated login failures, management port exposure changes.
M365/Email: new forwarding rules, bulk mailbox access/export, suspicious OAuth consent grants.
Mobile: risky app installs, policy violations, delayed patch posture on exec/BYOD, suspicious network egress from mobile devices.
Questions to drive decisions this week
Which management/admin login tools are internet reachable today and can we prove MFA + allowlisting are enforced on them?
Can we detect and block device-code auth abuse fast enough to prevent session takeover?
Do we have an emergency mitigation lane for vulnerabilities that move into ransomware exploitation (BeyondTrust class)?
Are backups and restore processes isolated and tested, or would an edge compromise result into recovery failure?




Comments