InfoSec.Watch — Newsletter

🚨 Top Stories

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

Guardio researchers reported a Vietnamese-linked campaign that used Google AppSheet as a phishing relay to compromise Facebook accounts and monetize stolen access.

Source: https://thehackernews.com/2026/05/30000-facebook-accounts-hacked-via.html

💡 Key Takeaway: Treat trusted SaaS links as part of the phishing surface. Tune detections for brand impersonation, unexpected AppSheet links, and post-login account changes.

Exposed Jenkins Servers Abused to Deploy DDoS Botnet Against Gaming Targets

Darktrace research highlighted a campaign abusing misconfigured Jenkins servers to deploy a DDoS botnet aimed at Valve Source Engine game infrastructure.

Source: https://hackread.com/hackers-jenkins-ddos-botnet-gaming-servers/

💡 Key Takeaway: Audit internet-facing Jenkins immediately: enforce authentication, restrict build agents, rotate exposed credentials, and alert on unexpected shell execution from CI workers.

Malicious Lightning Framework Packages Steal Cloud Secrets and Poison Repositories

Researchers warned that malicious Lightning framework releases were designed to steal cloud secrets and tamper with developer repositories, turning an AI supply-chain dependency into an access path.

Source: https://securityonline.info/lightning-framework-ai-supply-chain-attack-team-pcp/

💡 Key Takeaway: Pin and verify AI/dev dependencies like production code. Review recent installs, check repository tokens, and monitor for unusual commits or secret access after package updates.

🛡️ Vulnerability Spotlight

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

CISA added CVE-2026-31431 to the Known Exploited Vulnerabilities catalog after evidence of active exploitation affecting Linux distributions.

Source: https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html

💡 Key Takeaway: Prioritize Linux privilege-escalation bugs by exposure and role. Patch, then verify kernel/package versions and review recent sudo, auth, and persistence activity.

CVE-2026-41940: cPanel & WHM Authentication Bypass

Rapid7 detailed a critical cPanel & WHM authentication-bypass issue tied to session loading and saving behavior, with potential impact across hosting environments.

Source: https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass

💡 Key Takeaway: Patch hosting control planes first, then hunt for unexplained admin sessions, changed account settings, new web shells, and suspicious database or file access.

📈 Trend to Watch

Telegram Mini Apps Abused for Crypto Scams and Android Malware Delivery

Researchers uncovered a large fraud operation using Telegram Mini Apps to impersonate brands, run crypto scams, and deliver Android malware through a platform users already trust.

Source: https://www.bleepingcomputer.com/news/security/telegram-mini-apps-abused-for-crypto-scams-android-malware-delivery/

💡 Key Takeaway: Mobile and social-platform abuse belongs in enterprise risk planning. Update user reporting paths, monitor brand impersonation, and treat chat-app lures as credential and device exposure events.

⚡ Quick Hits

Instructure Confirms Data Breach After ShinyHunters Claim

The Canvas LMS maker confirmed a breach after ShinyHunters claimed theft of a large education dataset.

Source: https://www.bleepingcomputer.com/news/security/instructure-confirms-data-breach-shinyhunters-claims-attack/

💡 Key Takeaway: Education and SaaS providers should revisit third-party access reviews and verify breach-notification runbooks before student or employee data exposure becomes chaotic.

CISA Orders Agencies to Patch Exploited Windows Zero-Day

CISA directed federal agencies to patch CVE-2026-32202 after Microsoft reported exploitation of the Windows flaw.

Source: https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-flaw-exploited-in-zero-day-attacks/

💡 Key Takeaway: Use KEV additions to trigger rapid asset lookups, owner assignment, and confirmation that endpoint controls actually see attempted exploitation.

PayPal Email Abuse Used in Tech Support Scam Lures

Malwarebytes reported scammers abusing PayPal emails to push victims toward fake support numbers.

Source: https://www.malwarebytes.com/blog/news/2026/05/actively-exploited-cpanel-bug-exposes-millions-of-websites-to-takeover

💡 Key Takeaway: Security awareness should cover legitimate-service abuse, not just suspicious domains. Users need clear guidance on invoice, receipt, and support-call scams.

Hundreds of Internet-Facing VNC Servers Expose ICS and OT

Forescout research found widespread exposure of RDP and VNC services, including systems tied to industrial and operational technology environments.

Source: https://www.securityweek.com/hundreds-of-internet-facing-vnc-servers-expose-ics-ot/

💡 Key Takeaway: Remote access should sit behind gateways and MFA. Run external exposure checks and prioritize OT-adjacent findings before attackers find them first.

Jenkins Publishes Security Advisory for Microsoft Entra ID Plugin

Jenkins disclosed a plugin issue that could allow phishing through unsafe redirect behavior after authentication.

Source: https://www.jenkins.io/security/advisory/2026-04-29/

💡 Key Takeaway: CI/CD security is not just build execution. Review plugin advisories, remove unused plugins, and test authentication redirects in developer tooling.

⚔️ Actionable Defense Move of the Week

One-Week Tier-Zero Validation Loop

For every Tier-Zero patch this week—firewalls, MDM/EMM, VPN, IAM, backup, CI/CD, and hosting control panels—verify the new version on-box, confirm external exposure is removed or allowlisted, review 14 days of admin/auth/config logs, and rotate secrets if compromise is plausible.

💡 Key Takeaway: Patching is step one. Validation, exposure reduction, and assumed-breach log review are what turn patching into risk reduction.

🧠 Final Word

Final Word

The pattern this week is trust-path fragility. Attackers are not just breaking in through exotic zero-days; they are abusing the platforms, workflows, plugins, and admin paths teams already rely on.

💡 Key Takeaway: Inventory trusted paths, reduce unnecessary exposure, and verify that alternate auth, CI/CD, SaaS, and mobile workflows are covered by logging and response playbooks.

Keep Reading